{"id":4784,"date":"2017-02-01T15:49:32","date_gmt":"2017-02-01T20:49:32","guid":{"rendered":"http:\/\/journals.law.harvard.edu\/nsj\/?p=4784"},"modified":"2017-02-01T15:50:03","modified_gmt":"2017-02-01T20:50:03","slug":"who-watches-the-watchlisters","status":"publish","type":"post","link":"https:\/\/journals.law.harvard.edu\/nsj\/2017\/02\/who-watches-the-watchlisters\/","title":{"rendered":"Quis custodiet ipsos custodies?: Who Watches the Watchlisters?"},"content":{"rendered":"<p style=\"text-align: center;\">Jerome H. Kahan*<\/p>\n<p style=\"text-align: center;\"><strong>Abstract<\/strong><\/p>\n<p>Not everyone knows that the federal government runs a secret terrorist watchlisting program that carries the names and other identifying information on known and suspected terrorists and that, if there is \u201creasonable suspicion,\u201d also includes derogatory material about the associates and families of these entries. This program consists of four interrelated lists aimed at helping federal, state, and local authorities determine whether individuals they encounter might pose a threat to homeland security by trying to illegally enter the country, flee from domestic authorities, board aircraft when banned from doing so, obtain visas or passports when these require special investigations, or engage in suspicious activities\u00a0noticed by authorities or reported by citizens. However, in the course of populating these lists, the program also sweeps up the names of innocent people without their knowledge who then experience adverse consequences as a result of being \u201cblacklisted,\u201d thus raising serious issues about the constitutionality of a process based upon the presumption of guilt until proven otherwise\u2014the reverse of our how our criminal justice system works. Recent acquisition and publication of the 2013 Watchlisting Guidance by an online journal provided rare insight into how this watchlist operates and stimulated investigation into the workings of all the related watchlists. This article summarizes the nature and purpose of the terrorist watchlists, discusses the rules followed by agency screeners, explores the civil liberties implications of watchlisting, notes the links between gun controls and the watchlists, and identifies the need for oversight of the process. It offers conclusions about the efficacy of these lists and suggests ways that President Trump can improve them so they help capture terrorists without ensnaring innocent individuals, consistent with constitutional principles.<\/p>\n<p>&nbsp;<\/p>\n<p style=\"text-align: center;\"><strong>Introduction<\/strong><\/p>\n<p>What if you showed up at the airport with a ticket and went through the screening process without any problem, but at the last moment were denied boarding a commercial flight from Washington, D.C., to Seattle, Washington, with no explanation when you questioned authorities?<a href=\"#_edn1\" name=\"_ednref1\"><sup>[1]<\/sup><\/a> What if you were driving fifteen miles per hour over the speed limit and were pulled over by a policeman for what seemed to be a traffic violation, only to be told that you were a suspected terrorist and were then immediately taken to the police station for questioning?<a href=\"#_edn2\" name=\"_ednref2\"><sup>[2]<\/sup><\/a> What if a federal agent appeared at your door and took you into custody because you were supposedly an associate of a known terrorist, offering no further explanation?<a href=\"#_edn3\" name=\"_ednref3\"><sup>[3]<\/sup><\/a> These are not fictional scenarios, but rather real life vignettes of what could happen as a result of a secret watchlist program run by the federal government that collects and records information about individuals identified as being known terrorists or suspected of being involved in terrorist activities and can also include derogatory material about the associates and families of these entries.<\/p>\n<p>Established by Presidential Directives, approved by the Attorney General, and implemented by the National Counterterrorism Center (NCTC) and the FBI, the watchlisting \u00a0program consists of four interrelated lists aimed at helping federal agencies and law enforcement authorities at all levels determine whether individuals they encounter might pose a threat to homeland security by illegally entering the country, fleeing from domestic authorities having being accused of committing a crime, or seemingly engaging in suspicious activities or planning to take dangerous actions noticed by authorities or reported by citizens.<a href=\"#_edn4\" name=\"_ednref4\"><sup>[4]<\/sup><\/a> However, the system has often been accused of failing to catch potentially dangerous individuals, while at the same time inadvertently vacuuming up data on thousands of innocent people and entering their names on a watchlist.<a href=\"#_edn5\" name=\"_ednref5\"><sup>[5]<\/sup><\/a> These unfortunate individuals did not know and may never find out if, why, or when this occurred, yet once blacklisted a person can run into unexplained difficulties\u2014including unrevealed invasions of their constitutional freedoms\u2014when trying to travel or to find or hold jobs.<a href=\"#_edn6\" name=\"_ednref6\"><sup>[6]<\/sup><\/a><\/p>\n<p>Recent acquisition and publication by <em>The Intercept<\/em> of a 166-page restricted copy of the 2013 Watchlisting Guidance triggered a furor in the press, the public, pundits, and civil liberties organizations by opening up a window into how this list operates and the workings of the overall watchlisting system.<a href=\"#_edn7\" name=\"_ednref7\"><sup>[7]<\/sup><\/a> This article summarizes the nature and purpose of the terrorist watchlists, discusses the rules that screeners follow when individuals are encountered, explores the civil liberties implications of watchlisting, notes the links between gun controls and the watchlists, and highlights the need for independent oversight. It offers conclusions about the efficacy of these lists, suggests ways these lists can fulfill their missions more openly and consistent with constitutional principles, and recommends a series of steps President Trump should take to improve the watchlisting process so it can work against terrorists and for the safety and well-being of the American people.<\/p>\n<p style=\"text-align: center;\"><strong> I. The Watchlisting System<\/strong><\/p>\n<p>One of the reasons the U.S. government failed to anticipate and thwart the 9\/11 attacks was that \u201cinformation on terrorist suspects was disorganized and poorly used\u201d in part due to \u201cthe lack of an integrated terrorist watch list,\u201d which \u201chas long been described as a critical shortfall in homeland security and the war against Al Qaeda and other terrorist groups.\u201d<a href=\"#_edn8\" name=\"_ednref8\"><sup>[8]<\/sup><\/a> This gap was not only recognized by Congress but also by President Bush in his 2002 National Strategy for Homeland Security when he pledged to \u201cbuild and continually update a fully integrated, fully accessible terrorist watch list,\u201d making the FBI responsible for integrating the dozen existing terrorist lists operated by multiple agencies.<a href=\"#_edn9\" name=\"_ednref9\"><sup>[9]<\/sup><\/a> No actions were taken to implement this pledge, however, until September 16, 2003, when a Presidential Directive established a Terrorist Screening Center (TSC) that would be run by the FBI and would create \u201ca unified and comprehensive watchlist [that] all investigators, agents, and screeners\u201d could quickly consult to help them detect and disrupt terrorist threats.<a href=\"#_edn10\" name=\"_ednref10\"><sup>[10]<\/sup><\/a><\/p>\n<p>Although such a consolidated Terrorist Watchlist was developed by 2004, uniform policies and procedures for managing and populating this list were not issued until TSC published an official Terrorist Watchlisting Guidance in July 2007, followed by two annual updated editions.<a href=\"#_edn11\" name=\"_ednref11\"><sup>[11]<\/sup><\/a> Unexpectedly, this process was severely criticized on Christmas Day 2009 when it was discovered that the name of a suspected terrorist, the so-called \u201cunderwear bomber,\u201d was not on this list, thus preventing authorities from identifying him as a potential threat and barring him from boarding a commercial airline flight at Amsterdam airport bound for the United States\u2014a serious system failure publicly acknowledged by the Secretary of Homeland Security that could have endangered hundreds of lives if not for the alert intervention of passengers and crew while the plane was airborne.<a href=\"#_edn12\" name=\"_ednref12\"><sup>[12]<\/sup><\/a> This failure led to an interagency review of the watchlisting system, which recommended improvements to policies, processes, and standardization mechanisms that were captured in the July 2010 version of the Watchlisting Guidance and, after further improvements, the 2013 edition obtained by <em>The Intercept<\/em>.<a href=\"#_edn13\" name=\"_ednref13\"><sup>[13]<\/sup><\/a> The 2013 Guidance provides the latest set of rules for managing the Terrorist Watchlist, including the process for placing individuals on this list and conditions that might lead to removal of names, and also offers guidelines for the No-Fly and Selectee Lists, as will be discussed later.<\/p>\n<p>The Watchlisting Guidance defines a \u201cknown terrorist\u201d as an individual who has: (1) been indicted for conducting terrorist acts; (2) committed acts \u201cdangerous to human life, property, or infrastructure . . . intended to intimidate or coerce a civilian population; . . . [sought to] influence the policy of a government by intimidation or coercion; or [(3)]. . . [tried to] affect the conduct of a government by mass destruction, assassination, kidnapping, or hostage-taking.\u201d<a href=\"#_edn14\" name=\"_ednref14\"><sup>[14]<\/sup><\/a> The Guidance also explains that an individual can be watchlisted if he or she <em>supports or facilitates<\/em> a terrorist by providing safe houses, funds, and\/or false documentation; makes available weapons such as conventional arms or explosives and\/or weapons of mass destruction; offers transportation and\/or communications; or possibly administers training on how to undertake terrorist operations.<a href=\"#_edn15\" name=\"_ednref15\"><sup>[15]<\/sup><\/a> Mainly focused on <em>international<\/em> terrorists, the Watchlist also includes data provided by the FBI on known <em>domestic<\/em> terrorists who engage in the foregoing activities within the territorial jurisdiction of the United States.<a href=\"#_edn16\" name=\"_ednref16\"><sup>[16]<\/sup><\/a><\/p>\n<p>The Watchlisting Guidance defines a \u201csuspected terrorist\u201d as an individual \u201cwho is reasonably suspected to be, or has been, engaged in conduct constituting, in preparation for, in aid of, or related to terrorism and terrorist activities based on an <em>articulable and reasonable suspicion<\/em>.\u201d<a href=\"#_edn17\" name=\"_ednref17\"><sup>[17]<\/sup><\/a> This is a weak standard that presumes an individual suspected of being a terrorist or having ties to terrorism is guilty until proven otherwise\u2014the opposite of what is perhaps the most sacred principle in our criminal justice system, that is, the assumption that a defendant is <em>innocent <\/em>until proven guilty.<a href=\"#_edn18\" name=\"_ednref18\"><sup>[18]<\/sup><\/a> The Guidance further states that neither irrefutable evidence nor concrete facts are needed to meet the reasonable suspicion criteria, as long as careful attention is given to all the information about an individual\u2019s possible terrorist-related activities, including \u201cderogatory information\u201d to determine whether the reasonable suspicion standard has been met.<a href=\"#_edn19\" name=\"_ednref19\">[19]<\/a> In this connection, about forty percent of the total entries on the Terrorist Watchlist consist of people who have no affiliation with terrorist groups but are nonetheless classified as suspected terrorists under the broad reasonable suspicion standard.<a href=\"#_edn20\" name=\"_ednref20\"><sup>[20]<\/sup><\/a><\/p>\n<p>Finally, the Guidance explains that anyone can be placed on a watchlist if they are associated with a terrorist group, even if that group has not been designated as an official terrorist organization by the U.S. government. It also explains that information about a suspected terrorist\u2019s immediate family and other associated individuals is maintained as long as there is derogatory information sufficient to meet the reasonable suspicion standard.<a href=\"#_edn21\" name=\"_ednref21\"><sup>[21]<\/sup><\/a> The Guidance also warns that care must be taken before any person is entered on the Terrorist Watchlist, since many activities individuals undertake may be unrelated to terrorism.<\/p>\n<p style=\"text-align: center;\"><strong> II. Four Key Watchlists<\/strong><\/p>\n<p>The four watchlists discussed below\u2014TIDE, the Terrorist Watchlist, and the No-Fly and Selectee Lists\u2014are shared with all relevant federal, state, and local intelligence and law enforcement authorities in the country, as well as with selected foreign entities to assist them in screening and potentially interdicting individuals who might be terrorists when they plan to travel, arrive or depart a country, or pose homeland security dangers.<\/p>\n<p style=\"text-align: center;\"><strong> A. TIDE<\/strong><\/p>\n<p>The Intelligence Reform and Terrorism Prevention Act (IRTPA) of 2004, which created NCTC, mandated that this center, among its many duties, establish and maintain a \u201ccentral and shared knowledge bank on known and suspected terrorists and international terror.\u201d<a href=\"#_edn22\" name=\"_ednref22\"><sup>[22]<\/sup><\/a> Activated in May 2005, this repository, officially termed the Terrorist Identities Datamart Environment (TIDE), is comprised of all records possessed by the U.S. government related to known and suspected terrorists, including those affiliated with Hamas, Hezbollah, ISIS, and other recognized international terrorist groups. TIDE also includes high profile domestic terrorists, including information on \u201cwhat terrorists have done and how we have been tracking them.\u201d<a href=\"#_edn23\" name=\"_ednref23\"><sup>[23]<\/sup><\/a> Individual entries include names and other associated materials as well as other \u201cderogatory information,\u201d with each record assigned specific classifications from unclassified to the highest levels available\u2014causing the entire database to be classified Top Secret\/Sensitive Compartmented Information (SCI).<a href=\"#_edn24\" name=\"_ednref24\"><sup>[24]<\/sup><\/a><\/p>\n<p>Since it began functioning, members of the Intelligence Community (IC), the Department of Homeland Security (DHS), the FBI, and other federal agencies have nominated thousands of individuals for inclusion in TIDE. The records of these nominations are forwarded to NCTC, where special groups of analysts with authorized access to all-source terrorist-related intelligence information determine whether or not these individuals merit inclusion on this database as known or suspected terrorists.<a href=\"#_edn25\" name=\"_ednref25\"><sup>[25]<\/sup><\/a> In addition to obtaining information from IC sources and data acquired from its close contacts with select foreign counterparts, the CIA reportedly uses \u201ca previously unknown program, code-named Hydra, to secretly access databases maintained by foreign countries and extract\u00a0data to add to the watchlists.\u201d<a href=\"#_edn26\" name=\"_ednref26\"><sup>[26]<\/sup><\/a> Based on a daily review of nominations received, NCTC analysts create new TIDE records and enhance existing ones as appropriate, while also exporting a sensitive but unclassified subset of terrorist identifiers each day to the consolidated Terrorist Watchlist.<\/p>\n<p>As of June 2016, it was estimated that TIDE contained records for about 1.5 million people, primarily from outside the United States, with the records on American citizens and lawful permanent residents accounting for only about 15,000 of the total.<a href=\"#_edn27\" name=\"_ednref27\"><sup>[27]<\/sup><\/a> Due to its high classification and extraordinary sensitivity, NCTC will neither publicly confirm nor deny whether someone\u2019s name has been entered on TIDE.<\/p>\n<p style=\"text-align: center;\"><strong> B. Terrorist Watchlist<\/strong><\/p>\n<p>The Terrorist Watchlist discussed earlier, officially designated as\u00a0 the \u201cTerrorist Screening Database\u201d (TSDB), was established on September 16, 2003, by Homeland Security Presidential Directive (HSPD)-6 to help government officials screen individuals they encounter by developing, integrating, and maintaining a database that contains complete, precise, and up-to-date information about individuals known or suspected to be terrorists.<a href=\"#_edn28\" name=\"_ednref28\"><sup>[28]<\/sup><\/a> As of June 2016, this Watchlist was estimated to contain over one million individual identifier records, primarily information about known or suspected terrorists living and operating overseas, with about 5,000 records containing names of U.S. citizens and legal permanent residents\u2014a large number, but only a very small fraction of the total.<a href=\"#_edn29\" name=\"_ednref29\"><sup>[29]<\/sup><\/a><\/p>\n<p>As noted, TIDE is the main source for populating the Terrorist Watchlist with a subset of its unclassified listings. In turn, this Watchlist feeds information into a number of other lists, including the FBI\u2019s special file on known and suspected terrorists, which is distributed to law enforcement authorities across the nation, the Consular Lookout and Support System (CLASS), a State Department list of people who might not be eligible for a visa or passport, and the TECS System operated by Customs and Border Protection to assist with the monitoring of border crossings. While sent to a range of government users, the Terrorist Watchlist is unclassified but sensitive and cannot be made available to the general public.<a href=\"#_edn30\" name=\"_ednref30\"><sup>[30]<\/sup><\/a><\/p>\n<p>TSC maintains and operates the nomination and distribution process for the Terrorist Watchlist, receiving proposed unclassified but sensitive nominations for inclusion on the list from the NCTC on a daily basis that are not only drawn from the larger TIDE database, but also from inputs received from other nominating agencies, such as CIA, DIA, DOS, and selected international entities.<a href=\"#_edn31\" name=\"_ednref31\"><sup>[31]<\/sup><\/a> The FBI is responsible only for domestic terrorism, including individuals associated with violent extremist organizations such as white supremacist movements. The Bureau\u2019s Terrorist Review and Examination Center (TREX) sends nominations of known and suspected domestic terrorists with their identifiers directly to the TSC, based on investigative information in the Bureau\u2019s databases and also from so-called \u201csuspicious activity reports\u201d (SARs) received by the FBI from alert citizens or cops on the beat.<a href=\"#_edn32\" name=\"_ednref32\"><sup>[32]<\/sup><\/a><\/p>\n<p>Whatever the origin, each submission to the TSC must meet the reasonable suspicion watchlisting standard, based on \u201carticulable facts that objectively link a specific individual to terrorism or terrorist activities . . . [meaning] there must be an objective factual basis for the nominator to believe that the individual is a known or suspected terrorist\u201d; in other words, not based upon a hunch, but a careful examination of the credibility of all sources and accounting for all other available information.<a href=\"#_edn33\" name=\"_ednref33\"><sup>[33]<\/sup><\/a> Only if the NCTC concludes that information qualifies under this standard will that data be sent to the TSC where this data will be further reviewed before being accepted for inclusion on the watchlist.<\/p>\n<p>An individual can be placed on this Watchlist even if acquitted of a terrorism-related crime on the grounds that \u201cconviction in U.S. courts requires evidence beyond a reasonable doubt, whereas watchlisting requires only a reasonable suspicion\u201d of terrorist-related activities.<a href=\"#_edn34\" name=\"_ednref34\"><sup>[34]<\/sup><\/a> The vast majority of nominations submitted to the NCTC for entry on the Terrorist Watchlist are accepted and new identifier records established, though this can result in some individuals having multiple records with different information or classifications.<a href=\"#_edn35\" name=\"_ednref35\"><sup>[35]<\/sup><\/a><\/p>\n<p>A name can be removed from the Terrorist Watchlist if the nominating and validating agencies have credible reasons to believe that the individual is no longer engaging in terrorist-related activities or may have been mistakenly placed on this list. Unfortunately, innocent individuals, as well as known or suspected terrorists are not likely to know that their names are on the Terrorist Watchlist. Even if this is discovered, persons who have done no wrong face a difficult if not impossible redress procedure, which entails referring this complaint to TSC\u2019s Traveler Redress Inquiry Program (TRIP) that is not known to be responsive to such concerns. Moreover, individuals who have a name similar to that of a known or suspected terrorist is already on the Terrorist Watchlist can result in innocent people being accused of involvement in terrorist activities\u2014an \u201cinconvenience\u201d that TSC supposedly seeks to minimize.<a href=\"#_edn36\" name=\"_ednref36\"><sup>[36]<\/sup><\/a><\/p>\n<p style=\"text-align: center;\"><strong> C. No-Fly List<\/strong><\/p>\n<p>The\u00a0No-Fly List, also maintained by the TSC and classified sensitive, is primarily used by the\u00a0Transportation Security Administration (TSA)\u00a0to screen commercial air travelers at home and abroad to prevent known or suspected terrorists from flying into, out of, or within the United States, or at least to identify suspected terrorists who can be allowed to board a flight but will remain under surveillance.<a href=\"#_edn37\" name=\"_ednref37\"><sup>[37]<\/sup><\/a> Simply put, to be nominated for placement on the No-Fly List, an individual, regardless of her citizenship, must be seen as representing a threat to the safety of airlines and their passengers.<a href=\"#_edn38\" name=\"_ednref38\"><sup>[38]<\/sup><\/a> Of particular concern is the danger of terrorists seeking to hijack an aircraft and use it like a weapon or cause a mid-flight explosion. More generally, agencies can nominate individuals for the No-Fly List if they are operationally capable of posing a threat of committing an act of international terrorism abroad, but who do not meet the more specific other criteria.<a href=\"#_edn39\" name=\"_ednref39\"><sup>[39]<\/sup><\/a> Nominations for the No-Fly List require that nominated individuals reach a higher degree of plausible relationships to terrorism than it takes to get placed on the Terrorist Watchlist and are therefore closely scrutinized by a TSA person who works at TSC then given a thumbs up by a supervisor at the TSC if inclusion is warranted.<\/p>\n<p>In recent years, the No-Fly List has experienced huge growth, with the TSC selecting names from the Terrorist Watchlist to be added to this list each evening, bringing the current number of entries to \u201cabout 81,000 names, with fewer than 1,000 U.S. persons.\u201d<a href=\"#_edn40\" name=\"_ednref40\"><sup>[40]<\/sup><\/a> However, this is still only a very small fraction of the number of individuals on the terrorist watchlist.<\/p>\n<p>Regarding airline security, each time an individual arrives at an airline ticket counter, that person\u2019s name is checked to determine whether his or her name is on this list. If there is a match to that person\u2019s name or to the same or similar name to someone on the No-Fly List, the individual could be detained for hours while being investigated and, if suspected of being a terrorist or associated with a terrorist or a terror group, not allowed to board at all.<a href=\"#_edn41\" name=\"_ednref41\"><sup>[41]<\/sup><\/a> Individuals placed on this list are not given official notification, and they often only discover this fact at the airport when they are denied boarding.<a href=\"#_edn42\" name=\"_ednref42\"><sup>[42]<\/sup><\/a> As with TIDE and the Terrorist Watchlist, it is government policy to neither confirm nor deny placement of an individual on the No-Fly List, keeping this information from both members of Congress and the public.<a href=\"#_edn43\" name=\"_ednref43\"><sup>[43]<\/sup><\/a><\/p>\n<p>Individuals who are denied travel on commercial air flights and assume this is because their name has been mistakenly placed on the No-Fly List can employ the latest version of the Traveler Redress Inquiry Program (TRIP), which provides individuals who have experienced difficulties with air travel or airport screening as well as when crossing U.S. borders a new redress process that is no longer \u201cconstitutionally deficient or otherwise improper.\u201d<a href=\"#_edn44\" name=\"_ednref44\"><sup>[44]<\/sup><\/a> The current TRIP process represents a major improvement by triggering a review of the data on the No-Fly List that honestly seeks to determine whether and why an individual is on the list, and within a short period notifies the person in question about the results of this review, whether their name will be removed, or whether they must remain on the list for certain reasons. If this review shows no basis for that person\u2019s name and identifiers to be on the list, this data would be removed and he or she will receive a letter to that effect. On the other hand, if the review determines that the individual needs to remain on the No-Fly List, the letter would confirm this status and in response to a request send a second letter that identifies \u201cthe specific criterion under which the individual has been placed on the No Fly List and will include an unclassified summary of information supporting the individual\u2019s status, to the extent feasible, consistent with the national security and law enforcement interests at stake.\u201d<a href=\"#_edn45\" name=\"_ednref45\"><sup>[45]<\/sup><\/a> While TRIP was improved in connection with No-Fly List issues, this was not the case for complaints relating to the Terrorist Watchlist, where the redress process remained flawed.<\/p>\n<p>Finally, after the December 2009 \u201cunderwear bomber\u201d episode, the Assistant to the President\u2019s for Homeland Security and Counterterrorism was given the responsibility of temporarily placing an entire category of individuals whose names appear in TIDE or the Terrorist Watchlist onto the No-Fly List, assuming this proposal is approved by a panel of senior NSC officials.<a href=\"#_edn46\" name=\"_ednref46\"><sup>[46]<\/sup><\/a> The goal of this immediate Temporary Threat-Based upgrade (TBU) is to enable the government to rapidly prevent any known or suspicious terrorist who fits this classification from boarding airlines, but only as a precaution if there are credible intelligence reports indicating that a terrorist attack from members of the banned group was imminent.<a href=\"#_edn47\" name=\"_ednref47\">[47]<\/a> However, the ability of a highly-placed executive to temporarily prevent an entire category of individuals from taking commercial flights to flee the country, supposedly after a few members of this category had committed a terrorist act, led to concerns that TBU could support profiling by barring an entire religious group or other categories of people from boarding international flights, especially since religious profiling via application of the TBU is inconsistent with Watchlisting Guidance and overall U.S. policy.<a href=\"#_edn48\" name=\"_ednref48\"><sup>[48]<\/sup><\/a> In May 2014, Judicial Watch validated the policy of no watchlisting based on religious profiling by obtaining a cache of modestly redacted DHS documents in response to a Freedom of Information (FOIA) request, including a recent Memorandum stating that \u201cindividuals could only be watchlisted if they were associated with a known or suspected terrorist, not based on their affiliation with\u00a0 . . . [a religious] or any other non-terrorist-related organization.\u201d<a href=\"#_edn49\" name=\"_ednref49\"><sup>[49]<\/sup><\/a><\/p>\n<p style=\"text-align: center;\"><strong> D. Selectee List<\/strong><\/p>\n<p>A Secondary Security Screening Selection List, or Selectee List for short, also maintained by the TSC, is a subset of both the No-Fly List and the Terrorist Watchlist and identifies individuals who need to undergo additional questioning, inspection, and screening before being allowed to board flights to, from, or over U.S. territory.\u201d<a href=\"#_edn50\" name=\"_ednref50\"><sup>[50]<\/sup><\/a> The decision to include a person on the No-Fly List or Selectee List must include \u201cadditional derogatory requirements\u201d that go beyond criteria required for inclusion in the Terrorist Watchlist but, as the ACLU observes, the government has refused to disclose those requirements.<a href=\"#_edn51\" name=\"_ednref51\"><sup>[51]<\/sup><\/a> However, we do know that there are circumstances when an individual not on the No-Fly List can appear on the Selectee List. Unless they are subject to independent derogatory information, immediate family members of known or suspected terrorists are either ineligible or unsuitable for inclusion on the Selectee List\u2014or the No-Fly List for that matter\u2014regardless of whether they have met the criteria for inclusion on the other lists, as noted earlier. The Selectee List currently contains 28,000 records, of which less than 1,700 are U.S. citizens or permanent residents.<a href=\"#_edn52\" name=\"_ednref52\"><sup>[52]<\/sup><\/a><\/p>\n<p>The Expanded Selectee List (ESEL) includes records from the comprehensive Terrorist Watchlist that contain an individual\u2019s full name and date of birth, but fail to meet the special criteria for placement on either the No-Fly or Selectee Lists.<a href=\"#_edn53\" name=\"_ednref53\"><sup>[53]<\/sup><\/a> As with the Selectee List, individuals on the ESEL must undergo enhanced screening by Transportation Security Officers prior to boarding an aircraft, but neither the reasons why a person is placed on the ESEL nor the differences in the screening procedures for this list compared to those for persons on the Selectee List have been divulged. The TSA is required to notify the TSC of encounters with all individuals on the ESEL as well as on the No-Fly and Selectee Lists.<a href=\"#_edn54\" name=\"_ednref54\"><sup>[54]<\/sup><\/a> It is unclear whether the new TRIP process applies to individuals on the ESEL or Selectee List.<\/p>\n<p style=\"text-align: center;\"><strong>III. Screening for Watchlisted Individuals<\/strong><\/p>\n<p>HSPD-11, issued in August 2004, sets forth comprehensive procedures for front-line screening agencies to employ when checking individuals against the Watchlist with the goal of \u201cdetecting, identifying, tracking, and interdicting people\u201d that might pose a threat to homeland security as they try to illegally enter the country or board aircraft, obtain visas or passports that require special attention, or engage in suspicious activities\u00a0noticed by authorities or reported by citizens.<a href=\"#_edn55\" name=\"_ednref55\"><sup>[55]<\/sup><\/a> To this end, the TSC sends the latest version of the Terrorist Watchlist \u201cdownstream\u201d to all front-line federal screening agencies, including TSA, CBP, USIS, ICE, and USCG\u2014all components of DHS\u2014as well as to the \u00a0Drug Enforcement Administration (DEA), the Internal Revenue Service (IRS), the Departments of Defense (DoD) and State (DOS, and all overseas\u00a0 diplomatic posts.<a href=\"#_edn56\" name=\"_ednref56\"><sup>[56]<\/sup><\/a> The Watchlist is also distributed by the TSC to law enforcement agencies at all levels across the nation for use when an individual is arrested, detained for questioning, or stopped for a traffic violation.<a href=\"#_edn57\" name=\"_ednref57\"><sup>[57]<\/sup><\/a> Required information to be obtained from an encountered individual includes names and aliases, dates and places of birth, fingerprints or other biometric data, passport information, home location, countries of origin and nationality, license plate numbers, employment data, email addresses, and phone numbers.<a href=\"#_edn58\" name=\"_ednref58\"><sup>[58]<\/sup><\/a><\/p>\n<p>After questioning an encountered individual, all data gathered are transferred to the TSC, where experts in the Terrorist Screening Operations Center (TSOC) assess whether information about a person encountered by a screener matches a Watchlist record. If there is a match, TSOC coordinates the appropriate operational response to be taken by the FBI and\/or other agencies; that could include immediately arresting the individual, subjecting the individual to additional screening at an airport checkpoint, denying the person in question a visa application, or subjecting the individual to a low level of monitoring\u2014depending upon the Handling Codes assigned to each record. These codes run from the highest and most dangerous Code 1, which designates individuals as known terrorists, to the lowest and least dangerous Code 4, which classifies individuals as possibly associated with a suspected terrorist.<a href=\"#_edn59\" name=\"_ednref59\"><sup>[59]<\/sup><\/a> Most of the individuals questioned were released because neither watchlist records nor the information obtained during the encounter justified taking further steps, though valuable material that might lead to discovery of a possible terrorist is often developed. All information collected through an encounter is either used to create a new record or added to a person\u2019s existing file for further scrutiny by authorities. Usually, TSOC notifies all relevant users when a screening process identifies a known or suspected terrorist, but in some cases, when a police officer notifies TSC of an encounter that is matched with a Watchlist entry, the FBI and other government agencies will track that person <em>without <\/em>alerting law enforcement officers of the individual\u2019s status, a so-called \u201csilent hit.\u201d<a href=\"#_edn60\" name=\"_ednref60\"><sup>[60]<\/sup><\/a><\/p>\n<p style=\"text-align: center;\"><strong> IV. Challenges to Civil Liberties<\/strong><\/p>\n<p>Over the years, concerns have been expressed that the watchlisting process violates individuals\u2019 civil liberties and due process rights, as well as that the practice lacks clear standards by which to determine who is placed in the various databases, does not notify persons that they have been placed on these lists, and results in ethnic, religious, economic, political, and racial discrimination. In short, the watchlisting system has been accused of stigmatizing hundreds of thousands of innocent people by using an overbroad \u201creasonable suspicion\u201d standard that requires neither irrefutable evidence nor concrete facts for placing someone on a watchlist, without publicizing these criteria.<a href=\"#_edn61\" name=\"_ednref61\"><sup>[61]<\/sup><\/a><\/p>\n<p style=\"text-align: center;\"><strong> A. Blacklisting Innocent People<\/strong><\/p>\n<p>TIDE and the Terrorist Watchlist have grown exponentially in recent years, as has the No-Fly List, causing a former senior FBI special agent to argue that the watchlisting system is \u201crevving out of control.\u201d<a href=\"#_edn62\" name=\"_ednref62\"><sup>[62]<\/sup><\/a> Indeed, as these lists have grown, they have become \u201cmore error-prone, unreliable, and increasingly applied in an arbitrary and discriminatory manner,\u201d with the result that watchlist records are filled with inappropriate, inaccurate, or outdated data.<a href=\"#_edn63\" name=\"_ednref63\"><sup>[63]<\/sup><\/a> This can be attributed, at least in part, to the fact that assessments of watchlisting nominations are in the hands of busy NCTC analysts whose decisions are not independently vetted by higher level officials who might otherwise consult intelligence data and other pertinent information to determine whether there is enough specific and credible information to support these judgments.<a href=\"#_edn64\" name=\"_ednref64\"><sup>[64]<\/sup><\/a> Moreover, in naming individuals for inclusion on the Terrorist Watchlist, analysts rely predominantly on the subjective standard of reasonableness, based on the dubious assumption \u00a0that all nominations of known or suspected terrorists are by definition considered justified, <em>unless<\/em> NCTC has evidence to the contrary.<a href=\"#_edn65\" name=\"_ednref65\"><sup>[65]<\/sup><\/a> In essence, watchlisting individuals requires nominations to be \u201cpresumptively valid\u201d reflecting grounds for reasonable opinion or belief\u2014a standard that requires far less of a burden of proof than the need to prove guilt \u201cbeyond a reasonable doubt\u201d as a key element of our criminal justice system. This results in a program that secretly blacklists people and then gives them \u201cthe impossible task of proving themselves innocent\u201d of terrorist actions they have not committed.<a href=\"#_edn66\" name=\"_ednref66\"><sup>[66]<\/sup><\/a><\/p>\n<p>In response to these charges, government officials have repeatedly said there is a rigorous process for making sure no one is unfairly placed on any of the watchlists, claiming that any mistakes that do happen are corrected as soon as they are discovered.<a href=\"#_edn67\" name=\"_ednref67\"><sup>[67]<\/sup><\/a> This is quite an overstatement, given that the TSC conducts periodic \u201cquality assurance reviews \u2026 to ensure that all . . . [watchlisted] records maintained are current, accurate, and thorough,\u201d yet mistakes continue to be made.<a href=\"#_edn68\" name=\"_ednref68\"><sup>[68]<\/sup><\/a> Other officials reportedly admit that TIDE, for instance, has never operated perfectly, given its \u201cfundamental design flaws that make the data difficult or even impossible to search [&#8230; and the fact that] there is no full proof way to ensure that only good data gets into the . . . system and unqualified data stays out\u201d\u2014so mistakes found in TIDE can trickle down into the Terrorist and No-Fly Lists.<a href=\"#_edn69\" name=\"_ednref69\"><sup>[69]<\/sup><\/a><\/p>\n<p>Considering the almost overwhelming amount of possible terrorist-related data collected on individuals, estimates suggest that the most accurate imaginable system would still generate on the order of \u201c1 billion false alarms\u201d\u2014that is, emails, meetings, associations, phone calls, or items falsely tagged as terrorism-related\u2014\u201cfor every real terrorist plot it uncovers.\u201d<a href=\"#_edn70\" name=\"_ednref70\"><sup>[70]<\/sup><\/a> Making matters more frightening is the lack of an official procedure for discovering whether an individual has been placed on the highly classified TIDE roster or on the sensitive but unclassified Terrorist Watchlist.<a href=\"#_edn71\" name=\"_ednref71\"><sup>[71]<\/sup><\/a><\/p>\n<p>The 2013 Guidance calls for the Watchlist to be reviewed at least every two years or as needed, and also calls for all the watchlists to be periodically reviewed and audited to ensure that records are accurate, timely, consistent with anti-terrorism objectives, and purged of the names of innocent individuals.<a href=\"#_edn72\" name=\"_ednref72\"><sup>[72]<\/sup><\/a> In practice, however, efforts to rid watchlists of records judged to be outdated or obsolete have never kept up with the constant and growing ingestion of new names or identifier data for placement on the various lists. This phenomenon has led to watchlists that now contain massive numbers of records on innocent people who had been inadvertently placed on a list, many of whom, due to changed circumstances such as the availability of exculpatory evidence, should no longer be classified as suspected or actual terrorists. Additionally, one of the so-called \u201chidden costs\u201d of terrorist watchlists is the high number of false positives caused by the growing number of records that should not have been retained, which in turn has the effect of swamping the data pertaining to individuals identified as known or suspected terrorists, thereby leading to more false positives in what can be characterized as a vicious circle.<a href=\"#_edn73\" name=\"_ednref73\"><sup>[73]<\/sup><\/a> In discussing this issue, the ACLU has argued that a focused watchlist with few false accusations \u201cis not only better for civil liberties, but more likely to provide a security benefit\u201d by catching known or suspected terrorists who might otherwise be lost in the maze of names on the currently inflated list of names.<a href=\"#_edn74\" name=\"_ednref74\"><sup>[74]<\/sup><\/a><\/p>\n<p>The rise in the number of innocent people falsely accused of being actual or potential terrorists and placed on watchlists has often led to serious consequences for the person in question, including ruining prospects for employment, unexplained audits by federal authorities, intrusive screening at points of entry into and egress from the United States, and being asked to provide all sorts of identifying evidence when encountered by law enforcement officials such as fingerprints and DNA samples. These and other adverse impacts on the privacy of individuals were reflected in the strong statement recently issued by a U.S. district judge that \u201c[o]nce derogatory information is posted to the . . . [Terrorist Watchlist], it can propagate extensively through the government\u2019s interlocking complex of databases, like a bad credit report that will never go away.\u201d<a href=\"#_edn75\" name=\"_ednref75\"><sup>[75]<\/sup><\/a> There are even reports of \u201cshadow\u201d lists that continue to maintain the names and identifiers of people deemed as suspicious, even if their records are removed from one of the mainline watchlists.<a href=\"#_edn76\" name=\"_ednref76\"><sup>[76]<\/sup><\/a> As one commenter wryly put it: \u201cGiven that the information gleaned through this watchlisting process is shared with law enforcement throughout the land and the fact that concrete facts are not really necessary to get one\u2019s name on the list, anyone could be in for a significant and unexpected surprise the next time that they are pulled over by a member of their local police force for a minor traffic infraction.\u201d<a href=\"#_edn77\" name=\"_ednref77\"><sup>[77]<\/sup><\/a><\/p>\n<p style=\"text-align: center;\"><strong> B. Violation of Civil liberties<\/strong><\/p>\n<p>The 2013 Guidance acknowledges that \u201cwatchlisting is not an exact science, [\u2026because] [T]here are inherent limitations in any primarily name based system and analytic judgments may differ regarding whether subjective criteria have been met.\u201d<a href=\"#_edn78\" name=\"_ednref78\"><sup>[78]<\/sup><\/a> The Guidance goes on to say, \u201c[G]iven these realities, the U.S. Government&#8217;s watchlisting process attempts to safeguard the American people from a terrorist attack while safeguarding privacy, civil rights and civil liberties.\u201d<a href=\"#_edn79\" name=\"_ednref79\"><sup>[79]<\/sup><\/a> However, the ACLU has argued the watchlisting process is not only inconsistent with constitutional principles but also \u201cunreliable and ineffective as a security measure . . . [leading to] a massive number of innocent people placed on the watchlists who have no connection to terror . . . [T]he false positives . . . [will soon outweigh] the numbers of those who are dangerous,\u201d thereby swamping the system.<a href=\"#_edn80\" name=\"_ednref80\"><sup>[80]<\/sup><\/a><\/p>\n<p>In managing the watchlisting process, the TSC claims to be \u201cdedicated to ensuring activities are conducted in a manner consistent with protecting privacy and civil liberties, [\u2026 not watchlisting individuals] based solely on race, ethnicity, national origin, religious affiliation, [\u2026or harming their First Amendment-protected activities, such as freedom of speech and the press as well as] \u201cthe right to peaceably assemble and to petition the government for a redress of grievances.\u201d<a href=\"#_edn81\" name=\"_ednref81\"><sup>[81]<\/sup><\/a> In this connection, the ACLU Foundation of Southern California is suing USCIS for running the Controlled Application Review and Resolution (CARRP) program, a previously-secret effort that \u201cdirects agency officers to delay and ultimately deny the immigration benefits applications of applicants it has blacklisted, all without even telling these individuals that they were labeled threats to our nation, let alone giving them an opportunity to respond to the allegations.\u201d<a href=\"#_edn82\" name=\"_ednref82\"><sup>[82]<\/sup><\/a><\/p>\n<p>As discussed earlier, until recently many innocent individuals banned from boarding a commercial flight presumably under the No-Fly List had great difficulty when following the redress procedures in finding out why they were placed on the list and seeking to get their names removed.<a href=\"#_edn83\" name=\"_ednref83\"><sup>[83]<\/sup><\/a> Now they can employ the new and improved TRIP in an effort to remove their names and associated records, a process that works relatively well in validating that\u00a0 an individual was indeed wrongly placed on the No-Fly list and taking steps to fix this error.<a href=\"#_edn84\" name=\"_ednref84\"><sup>[84]<\/sup><\/a> \u00a0When it comes to the Terrorist Watchlist, however, individuals mistakenly recorded do not have a fair, effective, and prompt redress procedure.<a href=\"#_edn85\" name=\"_ednref85\"><sup>[85]<\/sup><\/a> To begin with, an innocent person must first find out that his or her name has been listed, which presents a formidable hurdle given the government\u2019s policy of not informing individuals of their placement on the Watchlist. Many people go about their business without knowing they have been watchlisted, though individuals being subjected to surveillance and\/or frequent questioning by law enforcement officers might guess that this might be the case. Other hints include denial of employment, difficulty in obtaining commercial or professional licenses, renewal of a passport, and\/or delays or denials when applying for citizenship applications. Another way an innocent person might suspect that he or she has been watchlisted is to suddenly have to undergo a potentially lengthy investigation by the FBI for unspecified reasons but which entails multiple efforts to find evidence that the individual has ties to terrorism, including examination of the person\u2019s family and associates for any connections they might have to known or suspected terrorists. Under certain circumstances, an FBI agent investigating a person might divulge the fact of that individual being watchlisted, with no details provided.<a href=\"#_edn86\" name=\"_ednref86\"><sup>[86]<\/sup><\/a><\/p>\n<p>If an innocent individual either discovers or suspects that he or she is on the Terrorist Watchlist, the only current recourse is to submit a form to the same redress program that handles No-Fly List issues. In this case, however, TSC is brought into the picture to work with the original nominating entity to determine whether the person\u2019s name matches an individual listed in the Watchlist and, if so, assesses whether that person should remain on the list or be removed. This lengthy process attempts to be fair, but often leads to either controversial results or no final conclusion.<\/p>\n<p>Meanwhile, the sizes of the various lists have exploded, notably the No-Fly List.<a href=\"#_edn87\" name=\"_ednref87\"><sup>[87]<\/sup><\/a> Administration officials argue that this exponential growth has not \u201cchoked the system\u201d as critics claim, but rather have made it more effective by enabling analysts to have more data to analyze using sophisticated methods to uncover information and relationships that can lead to the prevention of terrorist attacks and the prosecution of potential perpetrators.<a href=\"#_edn88\" name=\"_ednref88\"><sup>[88]<\/sup><\/a> However, experts argue that the strategy of including a landslide of names on the watchlists has resulted in a \u201cdata glut,\u201d making it more demanding, rather than less challenging, for the government to discover, investigate, and apprehend terrorists.<a href=\"#_edn89\" name=\"_ednref89\"><sup>[89]<\/sup><\/a><\/p>\n<p style=\"text-align: center;\"><strong> V. Need for Oversight<\/strong><\/p>\n<p>Notwithstanding efforts by the DHS and DOJ Inspector Generals to monitor the\u00a0 functioning of the Terrorist Watchlist, a 2012 GAO investigation of the 2010 Guidelines concluded there was no executive agency or other entity responsible and accountable for periodically assessing the accuracy of the nominating process, the credibility of procedures leading to decisions to enter a nomination into the system, the efficacy of the screening process, or determining if adjustments to agency programs are needed.<a href=\"#_edn90\" name=\"_ednref90\"><sup>[90]<\/sup><\/a> In its 2016 study, the ACLU concluded that \u201cthe current watchlisting system lacks adequate substantive oversight,\u201d arguing that the Executive Branch can be said to \u201cown\u201d this system and thus cannot be expected to credibly and independently oversee this effort, despite claims to the contrary.<\/p>\n<p>As if anticipating the results of the ACLU\u2019s study referred to above, that organization issued a statement for the record at a 2007 Hearing before the House Homeland Security Committee\u00a0 expressing concern that unless the legislative branch acts to overhaul the watchlisting process and the list itself, \u201c[w]e will be stuck with a massive blacklist of mostly innocent persons that is hopelessly unreliable.\u201d<a href=\"#_edn91\" name=\"_ednref91\"><sup>[91]<\/sup><\/a> In that same year, the Chairman of this Committee warned that \u201c[t]he American people will support the watch list\u00a0 . . . [only] if there is accountability . . . [and] trust . . . [that this enterprise] is being done right, not\u00a0 . . . [instilling] fear that they are being monitored by Big Brother.\u201d<a href=\"#_edn92\" name=\"_ednref92\"><sup>[92]<\/sup><\/a> Despite these warnings, Congress has failed to undertake the legislative actions needed to provide effective oversight that would ensure the watchlisting system does not ensnare innocent individuals as it seeks to meet its goal of recording essential information on known and suspected terrorists for use by enforcement authorities.<\/p>\n<p style=\"text-align: center;\"><strong>VI. Gun Control and Watchlisting<\/strong><\/p>\n<p>At the present time, \u201cthere is no . . . [legal] basis to automatically prohibit a person from possessing firearms or explosives because they appear on\u201d any of the terrorist watchlists.<a href=\"#_edn93\" name=\"_ednref93\"><sup>[93]<\/sup><\/a> Though the phrase \u201cNo Fly\u2013No Buy\u201d is being used as a rallying cry for many legislators, bills proposed by gun control advocates in Congress are based on the proposition that not only names on the No-Fly List, but also those on the more comprehensive Terrorist Watchlist, should be barred from buying firearms.<a href=\"#_edn94\" name=\"_ednref94\"><sup>[94]<\/sup><\/a> As explained by the current Speaker of the House, \u201cto allow someone who is on the terror watch list, who could be under investigation by the FBI, to purchase a weapon just doesn&#8217;t make sense.\u201d<a href=\"#_edn95\" name=\"_ednref95\"><sup>[95]<\/sup><\/a> Others on the Hill have argued against these gun control advocates on the grounds that the watchlists are not only incomplete, but that they also include innocent people who might then mistakenly be denied the opportunity to buy guns.<a href=\"#_edn96\" name=\"_ednref96\"><sup>[96]<\/sup><\/a><\/p>\n<p>While all bills aimed at closing loopholes in gun purchasing and expanding background checks have failed thus far, these issues will continue to be heatedly debated in the Senate and the House. In the months prior to his election, Donald Trump, who welcomed support from the National Rifle Association, raised eyebrows by endorsing the policy of denying all types of guns to watchlisted individuals, and Mr. Trump will presumably work with the Republican-dominated Congress to implement the necessary legislation after taking office.<a href=\"#_edn97\" name=\"_ednref97\"><sup>[97]<\/sup><\/a><\/p>\n<p style=\"text-align: center;\"><strong>VII. Conclusions<\/strong><\/p>\n<p>The federal government\u2019s watchlisting system has developed \u201ca life of its own,\u201d with no external oversight, no true transparency, and no accountability about either the process of placing individuals on the various lists or how the screening process works in practice. There have even been reports of quotas being established for filling the various watchlists.<a href=\"#_edn98\" name=\"_ednref98\"><sup>[98]<\/sup><\/a> On the other hand, counterterrorism officials have recently described the watchlists as \u201ca cornerstone of their efforts to detect possible terrorists before they can strike,\u201d while guarding against improper listings of innocent individuals.<a href=\"#_edn99\" name=\"_ednref99\"><sup>[99]<\/sup><\/a><\/p>\n<p style=\"text-align: center;\"><strong> A. Watchlisting System is Damaged<\/strong><\/p>\n<p>In March 2014, after an extensive investigation, the DOJ Inspector General (IG) reportedly found that \u201cthe FBI has made considerable progress in improving the accuracy and timeliness of the . . . terrorist watchlist,\u201d but concluded that more needs to be done to ensure that this list was current and complete.<a href=\"#_edn100\" name=\"_ednref100\"><sup>[100]<\/sup><\/a> In this connection, the IG reportedly made a dozen recommendations, including requiring the TSC to \u201cbetter document its actions during national security events, clarifying FBI information sharing policies to ensure they are consistent with those of the watchlist community, and improving the efficiency of the FBI\u2019s watchlist nomination process for investigative and non-investigative subjects\u201d\u2014measures that were accepted by the Bureau with corrective action already underway.<a href=\"#_edn101\" name=\"_ednref101\"><sup>[101]<\/sup><\/a><\/p>\n<p>According to a well-known civil rights lawyer, approximately forty percent of the entries on the Terrorist Watchlist have no connection to a terrorist group yet are still branded as suspected terrorists due to the loose standards for watchlisting an individual.<a href=\"#_edn102\" name=\"_ednref102\"><sup>[102]<\/sup><\/a> Moreover, because the watchlist is not limited to known terrorists, an official can watchlist a person if there is \u201creasonable suspicion\u201d to believe that the person is a suspected terrorist. In addition, watchlisting standards \u201care so low that the U.S. government\u2019s guidelines specifically allow for a single, uncorroborated source of information\u2014including a Facebook or Twitter post\u2014to serve as the basis for placing you on its master watchlist.\u201d<a href=\"#_edn103\" name=\"_ednref103\"><sup>[103]<\/sup><\/a> However, former officials who worked with the TSC reportedly acknowledged that while a single suspicious social media post can lead an individual to come to the attention of the FBI or other nominating agencies, \u201cthe full nominating process must be followed and the reasonable standard suspicion must be met before someone is placed on the watchlist.\u201d<a href=\"#_edn104\" name=\"_ednref104\"><sup>[104]<\/sup><\/a><\/p>\n<p>In March 2014, the ACLU published a scathing criticism of the current watchlisting system, subtitled Unfair Process and Devastating Consequences, which pleaded that \u201cCongress and the Obama administration must rein in what the Ninth Circuit Court of Appeals has called \u2018a vast, multi-agency, counterterrorism bureaucracy that tracks hundreds of thousands of individuals\u2019\u2014a bureaucracy that remains secret and unaccountable to the public or the individuals that it targets for blacklisting.\u201d<a href=\"#_edn105\" name=\"_ednref105\"><sup>[105]<\/sup><\/a> This study argued that we must ensure the system institutes stringent criteria for placing individuals on these lists, applies rigorous procedures for reviewing and removing incorrect entries, establishes guidelines that employ due process rather than the weak standards for inclusion currently in use, employs a credible process allowing individuals to question their inclusion on a watchlist, and reassesses whether watchlists should continue to carry the names of people who have passed away since terrorists often adopt identities of persons who have died.<a href=\"#_edn106\" name=\"_ednref106\"><sup>[106]<\/sup><\/a> Other critics have \u201cblasted the effectiveness and reliability of the . . . [current] terrorist watch list system, asserting that too many people . . . are swept up by law enforcement agencies without proper vetting or due process\u2014and that too many other . . . certifiable threats are left out.\u201d<a href=\"#_edn107\" name=\"_ednref107\"><sup>[107]<\/sup><\/a><\/p>\n<p>A few years after the watchlisting program was initiated, the GAO concluded that \u201cthe government lacks an up-to-date strategy and implementation plan for optimizing use of the terrorist watch list . . . [that would] establish government wide screening priorities, assess progress toward policy goals and intended outcomes, consider factors related to privacy and civil liberties, ensure that any needed changes are implemented, and respond to issues that hinder effectiveness.\u201d<a href=\"#_edn108\" name=\"_ednref108\"><sup>[108]<\/sup><\/a> Almost a decade later, these sensible recommendations remain relevant, with the proper balance still to be found between giving screening agencies the listings they need to discover terrorists or potential terrorists while keeping the names of innocent people off these lists.<\/p>\n<p style=\"text-align: center;\"><strong> B. For the new President to Fix<\/strong><\/p>\n<p>In his inaugural address, President Trump promised to fix those broken systems that are adversely affecting the functioning of our nation, though he did not cite the need to fix the terrorist watchlisting process.<a href=\"#_edn109\" name=\"_ednref109\"><sup>[109]<\/sup><\/a> Once this issue is brought to his attention, the new President should take the following actions during his first hundred days to remedy this problem:<\/p>\n<ul>\n<li><em>Ask<\/em> his Attorney General to propose changes in managing and employing terrorist watchlists that would make the processes more transparent and consistent with the constitutional rights of citizens, while retaining an updated database for screening individuals encountered by all front-line federal agencies and law enforcement authorities.<\/li>\n<li><em>Order<\/em> the NCTC to take appropriate steps to reduce the likelihood of innocent people being placed on a watchlist and ensure that families and associates of watchlisted individuals are included only if there is strong evidentiary material that ties them to terrorist activities.<\/li>\n<li><em>Require<\/em> the NCTC to cleanse the TIDE database of information that has become obsolete, irrelevant, or inaccurate, and require TSC to do the same by purging the Terrorist and No-Fly Lists.<\/li>\n<li><em>Assign<\/em> DHS the job of enacting an effective redress program for individuals who discover they have been erroneously placed on the Terrorist Watchlist, which would permit individuals to be exposed to and challenge the reasons for their inclusion and provide a transparent and objective adjudication process.<\/li>\n<li><em>Seek<\/em> legislation to the effect that watchlists must only be used for countering terrorism and not for unrelated reasons such as denial of employment, withholding professional licenses, or in other ways that would embarrass or hinder the functioning of listed individuals, but should be used in background checks for purchases of firearms in retail outlets and gun shows.<\/li>\n<\/ul>\n<p style=\"text-align: center;\"><strong>C. Establishing Effective Oversight<\/strong><\/p>\n<p>In addition to the foregoing actions, President Trump should take immediate steps to provide sorely needed oversight of the entire watchlisting system in terms of its effectiveness, efficiency, and respect for civil liberties. One such step should entail commissioning the Privacy and Civil Liberties Oversight Board (PCLOB)\u2014an independent, bipartisan agency within the Executive Branch\u2014to ensure that names and identifiers placed on the various watchlists to protect the nation from terrorism are balanced against the need to protect the constitutional rights and civil liberties of all individuals.<a href=\"#_edn110\" name=\"_ednref110\"><sup>[110]<\/sup><\/a> As an executive agency, however, the PCLOB is potentially subject to the sway of the White House. As an additional measure, therefore, the President should seek legislation to establish a Joint Select Oversight Committee on Watchlisting, modeled after the Senate and House Select Committees on Intelligence, to provide independent oversight of the watchlisting process.<a href=\"#_edn111\" name=\"_ednref111\"><sup>[111]<\/sup><\/a> Although a credible solution, this approach raises the philosophical question <em>quis custodiet ipsos custodies<\/em>: \u201cwho would watch the watchlisters\u201d\u2014in this case, members of the proposed Joint Watchlist Oversight Committee\u2014to ensure they are acting responsibly in guarding the public\u2019s interests?<a href=\"#_edn112\" name=\"_ednref112\"><sup>[112]<\/sup><\/a> On a practical level, this approach can work if members are chosen by the House and Senate leadership, endorsed by the White House, and rotated every few years.<\/p>\n<p style=\"text-align: center;\"><strong>D. Conclusion<\/strong><\/p>\n<p>Some civil liberties experts have reportedly concluded that \u201cthe watchlist system is broken [\u2026and beyond repair, because] in trying to watch too many people, we sometimes miss the glaring threats right in front of us, [\u2026while] government officials who worked closely with the watchlist system . . . say it is a deeply scrutinized process that is backed up by multiple levels of review and a constant concern for the balancing act of safeguarding civil liberties against protecting the American people.\u201d <a href=\"#_edn113\" name=\"_ednref113\"><sup>[113]<\/sup><\/a> Cynics might argue that the government could do a better job in countering terrorism if it \u201cintroduced hidden microphones in every home, and tapped every conversation in every . . . car and train, and in every workplace\u2014but the costs to privacy would be unacceptable.\u201d<a href=\"#_edn114\" name=\"_ednref114\"><sup>[114]<\/sup><\/a> Readers of science fiction might argue that unless appropriate steps are taken, the watchlisting system might evolve into an Orwellian world that could turn the warning made almost fifteen years ago by the Chairman of a House Committee that \u201cBig Brother\u201d might be watching us into a reality rather than a literary allusion.<a href=\"#_edn115\" name=\"_ednref115\"><sup>[115]<\/sup><\/a><\/p>\n<p>Trashing the current watchlisting process would not be in the national security interest of the nation, since we do need to provide the identities of known and identified to screening agencies and law enforcement authorities to safeguard our borders and keep the nation as safe and possible. Information contained in the watchlists not only supports screening operations in the field, but is also systematically reviewed by NCTC analysts in an effort to \u201cconnect the dots\u201d between supposedly unconnected data that can lead to the investigations and perhaps arrests of known or suspected terrorists and\/or their associates. In the words of a U.S. counterterrorism official who did not want to be identified: \u201cThe watch list is created specifically to be one of the big dot-connectors in the counterterrorism effort\u2014it\u2019s among the most sophisticated systems the government has\u2014and it\u2019s proven itself to be effective.\u201d<a href=\"#_edn116\" name=\"_ednref116\"><sup>[116]<\/sup><\/a><\/p>\n<p>If the benefits of terrorist watchlists are to be reaped in the future, we need a process that installs tight definitional and credible evidentiary standards of what is meant by known or suspected terrorists, keeps to a minimum the number of innocent people mistakenly listed, offers redress and review procedures based upon fairness and due process, and provides accurate and responsive information about watchlists to agencies that encounter individuals as part of their official duties. An improved process should classify the contents of watchlists only as needed to keep suspects off guard and be able to bring terrorists to justice through surprise encounters, while making available to the public as much information as possible about the objectives and operations of watchlisting\u2014classifying material only as necessary to avoid telling actual or potential terrorists that we have them on our list.<a href=\"#_edn117\" name=\"_ednref117\"><sup>[117]<\/sup><\/a> Most of all, there needs to be an independent oversight entity with the task of aggressively checking on the operations of the watchlisting system to ensure it is conducted efficiently and effectively<\/p>\n<p>In sum, the Executive Branch and Congress need to join forces in reigning in the bloated watchlisting bureaucracy, which reports mainly to itself, has no public accountability, hesitates to accept suggestions that could infringe on its freedom to blacklist individuals without even a nod at due process, sweeps up innocent individuals without periodically cleansing its lists of invalid entries, and is not subjected to any meaningful oversight. Without mincing words, it can be said that \u201ca watchlist based on poor standards and secret processes raises major constitutional concerns, including the right to travel freely and not to be deprived of liberty without due process, [\u2026and] watchlists filled with records on innocent people not only threaten to ruin lives, but has the unintended consequences of diverting the attention of policy makers from real threats.\u201d<a href=\"#_edn118\" name=\"_ednref118\"><sup>[118]<\/sup><\/a><\/p>\n<p>Once an improved process with independent oversight is in place that fixes these and other problems, citizens should feel comfortable that our government is finally maintaining watchlists that contain complete and current records on actual and potential terrorists, are classified only as far as necessary to identify and apprehend such individuals, and lead to a minimal number of mistakes that result in innocent people being watchlisted. In such a world, the watchlisting system will be valued, concerns of excessive governmental intrusion will be assuaged, and Kafkaesque fears of \u201cBig Brother\u201d will subside. Left for pundits, politicians, and policy-makers to discuss, however, is the outstanding philosophic question of \u201cWho Watches the Watchlisters?\u201d<\/p>\n<p>&nbsp;<\/p>\n<hr \/>\n<p><a href=\"#_ednref1\" name=\"_edn1\"><\/a>* Jerome H. Kahan is an independent writer and analyst, having worked in and out of government for over forty years in the national security, arms control, and homeland security fields. At the State Department, Mr. Kahan held positions on the Policy Planning Staff, as Deputy Assistant Secretary with the Political-Military and Intelligence Bureaus, and as Politico-Military Counsellor in our Embassy in Turkey. Mr. Kahan has written and\/or contributed to a number of books, published articles in a variety of journals, and taught for ten years as an Adjunct Professor in the School of Foreign Service at Georgetown University.<\/p>\n<p>[1] Zara Stone, <em>The Secret<\/em> <em>Airline Passenger Rights You Don\u2019t Know About, <\/em>The Hustler (Nov. 24, 2015), http:\/\/thehustle.co\/the-secret-airline-passenger-rights-you-dont-know-about.<\/p>\n<p><a href=\"#_ednref2\" name=\"_edn2\">[2]<\/a> Alice Wang, Yale Law Sch. Civil Liberties and Nat\u2019l Security Clinic with the Am. Civil Liberties Union, Trapped in a Black Box: Growing Terrorism Watchlisting in Everyday Policing 24\u201327 (Apr. 2016). https:\/\/www.google.com\/?gws_rd=ssl#q=trapped+in+a+black+box:+growing+terrorism+watchlisting+in+everyday+policing.<\/p>\n<p><a href=\"#_ednref3\" name=\"_edn3\">[3]<\/a> Paula Mejia, <em>H<\/em><em>ere\u2019s How You End up on the U.S. Watchlist for Terrorists<\/em>, Newsweek (July 25, 2014), http:\/\/www.newsweek.com\/you-could-be-next-top-secret-rulebook-labeling-terrorists-leaked-261236.<\/p>\n<p><a href=\"#_ednref4\" name=\"_edn4\">[4]<\/a> The White House, Homeland Security Presidential Directive\/HSPD-11, Comprehensive Terrorist-Related Screening Procedures (Aug. 27, 2004), https:\/\/www.gpo.gov\/fdsys\/pkg\/PPP-2004-book2\/pdf\/PPP-2004-book2-doc-pg1763.pdf.<\/p>\n<p><a href=\"#_ednref5\" name=\"_edn5\">[5]<\/a> Brian Freskos, <em>How the FBI\u2019s Terrorist Watch List Works,<\/em> The Trace (Jun. 29, 2016), https:\/\/www.thetrace.org\/2016\/06\/fbi-terrorist-watch-list-guns\/. <em>See also<\/em> Mackenzie Weinger, <em>How the Terrorist Watchlist Works,<\/em> The Cipher Brief (Oct. 3, 2016), https:\/\/www.thecipherbrief.com\/article\/exclusive\/north-america\/how-terrorist-watchlist-works-1089.<\/p>\n<p><a href=\"#_ednref6\" name=\"_edn6\">[6]<\/a> Nick Wing, <em>7 Ways That You (Yes, You) Could End Up On A Terrorist Watch List<\/em>, Huffington Post (July 25, 2014), http:\/\/www.huffingtonpost.com\/2014\/07\/25\/terrorist-watch-list_n_5617599.html; <em>see also<\/em> Spencer Ackerman, <em>How the US\u2019s terrorism watchlists work\u2013and how you could end up on one,<\/em> The Guardian (July 24, 2014), https:\/\/www.theguardian.com\/world\/2014\/jul\/24\/us-terrorism-watchlist-work-no-fly-list.<\/p>\n<p><a href=\"#_ednref7\" name=\"_edn7\">[7]<\/a> <em>March 2013 Watchlisting Guidance<\/em>, The Intercept (July 23, 2014), https:\/\/theintercept.com\/document\/2014\/07\/23\/march-2013-watchlisting-guidance\/ [hereinafter <em>Guidanc<\/em>e]. This document was reportedly obtained from an unnamed intelligence community source. <em>See also<\/em> Jeremy Scahill and Ryan Devereaux,<em> Blacklisting: The Secret Government Rulebook For Labeling You a Terrorist<\/em>, The Intercept (July 23, 2014), https:\/\/theintercept.com\/2014\/07\/23\/blacklisted\/.<\/p>\n<p><a href=\"#_ednref8\" name=\"_edn8\">[8]<\/a> Democratic Members of the House Select Comm. on Homeland Sec., 108th Cong., Keeping Terrorists Out of America by Unifying Terrorist Watch Lists: Ten Requirements for an Effective Terrorist Screening Center (Nov. 2003), https:\/\/www.hsdl.org\/?view&amp;did=445959. This issue was identified earlier that year in a report by the Government Accountability Office (GAO). U.S. Gov\u2019t Accountability Office, GAO-03-322, Terrorist Watch Lists Should be Consolidated to Promote Better Integration and Sharing (Apr. 30, 2003).<\/p>\n<p><a href=\"#_ednref9\" name=\"_edn9\">[9]<\/a> White House Office of Homeland Security, National Homeland Security Strategy 26 (2002).<\/p>\n<p><a href=\"#_ednref10\" name=\"_edn10\">[10]<\/a> Fed. Bureau of Investigation, <em>War on Terrorism: New Terrorist Screening Center Established<\/em> (Sept. 16, 2003), https:\/\/archives.fbi.gov\/archives\/news\/stories\/2003\/september\/tsc091603.<\/p>\n<p><a href=\"#_ednref11\" name=\"_edn11\">[11]<\/a> U.S. Dep\u2019t of Justice Office of the Inspector Gen., <em>Review of the Terrorist Screening Center, Audit Report 05-27<\/em> (Sept. 2007), https:\/\/oig.justice.gov\/reports\/FBI\/a0741\/final.pdf.<\/p>\n<p><a href=\"#_ednref12\" name=\"_edn12\">[12]<\/a> Deborah Charles, <em>System to keep air travel safe failed: Napolitano<\/em>, Reuters (Dec. 28, 2009), http:\/\/www.reuters.com\/article\/us-security-airline-napolitano-idUSTRE5BQ0Z420091228. Authorities failed to find the culprit\u2019s cleverly hidden explosives during the pre-boarding search process, which did not include electronic scanning that would have presumably been able to detect objects in his underwear. <em>See<\/em> U.S. Gov\u2019t Accountability Office, GAO-12-476, Terrorist Watchlist: Routinely Assessing Impacts of Agency Actions since the December 25, 2009, Attempted Attack Could Help Inform Future Efforts <strong>(<\/strong>May 2012).<\/p>\n<p><a href=\"#_ednref13\" name=\"_edn13\">[13]<\/a> <em>See<\/em> Fed. Bureau of Investigation, Memorandum from FBI Counterterrorism Front Office to all Field Offices: Counterterrorism Program Guidance\/Watchlisting Administrative and Operational Guidance (Dec. 21, 2010) (providing updated version to the July 2010 Watchlisting Guidance); <em>see also Guidance<\/em>, <em>supra<\/em> note 7, at Appendix 11. For more on later updates of the 2010 Watchlist, see U.S. Dep\u2019t of Justice Office of the Inspector Gen., Audit of the FBI\u2019s Management of Terrorist Watchlist Nominations, ii, 25, note 162 (Mar. 2014). The 2013 Guidance reflects minor improvements from the 2010 version.<\/p>\n<p><a href=\"#_ednref14\" name=\"_edn14\">[14]<\/a> <em>Guidance<\/em>, <em>supra<\/em> note 7, at 34.<\/p>\n<p><a href=\"#_ednref15\" name=\"_edn15\">[15]<\/a> <em>Id<\/em>. at 8.<\/p>\n<p><a href=\"#_ednref16\" name=\"_edn16\">[16]<\/a> <em>Guidance<\/em>, <em>supra<\/em> note 7, at 6. Legally, \u201cterritorial jurisdiction\u201d means \u201c[a]ny lands reserved or acquired for the use of the United States, and under the exclusive or concurrent jurisdiction thereof, or any place purchased or otherwise acquired &#8230;by consent of the legislature of the State in which the same shall be, for the erection of a fort, magazine, arsenal, dockyard, or other needful building.\u201d U.S. Dep\u2019t of Justice, U.S. Attorney\u2019s Manual \u00a7 664, 18 U.S.C. \u00a7\u00a07, Section 7(3).<\/p>\n<p><a href=\"#_ednref17\" name=\"_edn17\">[17]<\/a> Italics added. To clarify reasonable suspicion versus probable cause, see the following Supreme Court interpretations as summarized by Devallis Rutledge, <em>Probable Cause and Reasonable Suspicion<\/em>, Police Patrol (June 7, 2011): \u201cProbable cause does not require the same type of specific evidence of each element of the offense as would be needed to support a conviction.\u201d (citing Adams v. Williams, 407 U.S. 143 (1972)); \u201cproof beyond a reasonable doubt or by a preponderance of the evidence, useful in formal trials, have no place in the probable cause decision.\u201d (citing Maryland v. Pringle, 540 U.S. 366 (2003)); \u201cReasonable suspicion is a less demanding standard than probable cause not only in the sense that reasonable suspicion can be established with information that is different in quantity or content than that required to establish probable cause, but also in the sense that reasonable suspicion can arise from information that is less reliable than that required to show probable cause.\u201d (citing Alabama v. White, 496 U.S. 325 (1990)).<\/p>\n<p><sup>18\u00a0\u00a0 <\/sup><em>See<\/em> <em>Presumption of Innocence<\/em>, Nolo\u2019s Plain English Law Dictionary 331 (Gerald N. Hill and Kathleen Thompson Hill, eds., 1st ed., 2009). <em>See also<\/em> Boz Tchividjian, <em>Innocent until proven guilty: What does this really mean?<\/em>, Religion News Serv. (Jan. 16, 2015) http:\/\/religionnews.com\/2015\/01\/16\/innocent-proven-guilty-really-mean.<\/p>\n<p><a href=\"#_ednref19\" name=\"_edn19\">[19]<\/a> Particularized derogatory information demonstrates with specificity the nature of an individual\u2019s or group\u2019s association with terrorism and\/or terrorist activities. For example, \u201csubject x provides false travel documentation for al-Qaida operatives\u201d is specific, whereas \u201csubject y is a supporter,\u201d standing alone, is not considered particularized. <em>See Guidance<\/em>, <em>supra<\/em> note 7, at 38.<\/p>\n<p><a href=\"#_ednref20\" name=\"_edn20\">[20]<\/a> Tim Cushing, <em>Nearly 40% Of Those On The Government\u2019s Terrorist Watchlist Have \u2018No Affiliation With Recognized Terrorism Groups\u2019<\/em>, Techdirt (Aug. 5, 2014), https:\/\/www.techdirt.com\/articles\/20140805\/11295828116\/nearly-40-those-governments-terrorist-watchlist-have-no-affiliation-with-recognized-terrorism-groups.shtml. While the total number of entries on this list has almost doubled since this article was written, the proportions have roughly stayed the same. <em>See<\/em> Rob Port, <em>You Cannot Deny People Their Rights Because You Think They Might Be Terrorists,<\/em> Say Anything (June 15, 2016), https:\/\/www.sayanythingblog.com\/entry\/cannot-deny-people-rights-think-might-terrorist\/#authorInfo (referring to the ACLU\u2019s description of these watch lists as \u201cvirtually standardless\u201d and statement that around forty percent of the people on the lists have\u00a0\u201cno recognized terrorist group affiliation\u201d).<\/p>\n<p><a href=\"#_ednref21\" name=\"_edn21\">[21]<\/a> <em>Guidance, supra<\/em> note 7, at 33, 13.<\/p>\n<p><a href=\"#_ednref22\" name=\"_edn22\">[22]<\/a> Intelligence Reform and Terrorism Prevention Act \u00a7 1021(D)(6) (2004). <em>See also<\/em> <em>National Counterterrorism Center: Terrorist Identities Datamart Environment (TIDE<strong>), <\/strong>What is TIDE?<\/em> (June 30, 2016), https:\/\/www.nctc.gov\/docs\/tide_fact_sheet.pdf; Richard A. Best Jr., Cong. Research Serv., The National Counterterrorism Center (NCTC): Responsibilities and Potential Congressional Concerns (Dec. 19, 2011), https:\/\/fas.org\/sgp\/crs\/intel\/R41022.pdf.<\/p>\n<p><a href=\"#_ednref23\" name=\"_edn23\">[23]<\/a> David Inserra, <em>The Terrorist Watch List,<\/em> <em>Explained,<\/em> The Daily Signal (June 14, 2016), http:\/\/dailysignal.com\/2016\/06\/14\/the-terrorist-watchlist-explained. \u201cA data mart is a subject-oriented archive that stores data and uses the retrieved set of information to assist and support the requirements involved within a particular business function or department.\u201d <em>Data Mart<\/em>, Techopedia, https:\/\/www.techopedia.com\/definition\/134\/data-mart.<\/p>\n<p><a href=\"#_ednref24\" name=\"_edn24\">[24]<\/a> Sensitive Compartmented Information (SCI) encompasses such sensitive information as intelligence sources or methods and names of clandestine agents. <em>See<\/em> John Holst, <em>What is Sensitive Compartmented Information (SCI),<\/em>\u00a0Clearance.Jobs (Mar. 9, 2014), https:\/\/news.clearancejobs.com\/2014\/03\/09\/what-is-sensitive-compartmented-information\/.<\/p>\n<p><a href=\"#_ednref25\" name=\"_edn25\">[25]<\/a> <strong>\u00a0<\/strong><em>Safeguarding Privacy and Civil Liberties While Keeping our Skies Safe<\/em>, <em>hearing before the Subcomm. on Transportation Sec. of the H. Homeland Sec. Comm.<\/em>, 113th Cong. (Sept. 18, 2014) (statement of Christopher M. Piehota, Dir., Terrorist Screening Center).<\/p>\n<p><a href=\"#_ednref26\" name=\"_edn26\">[26]<\/a> Jeremy Scahill and Ryan Devereaux<em>, Barack Obama&#8217;s Secret Terrorist-Tracking System, by the Numbers,<\/em> The Intercept \u00a0(Aug. 5, 2014), https:\/\/theintercept.com\/2014\/08\/05\/watch-commander.<\/p>\n<p><a href=\"#_ednref27\" name=\"_edn27\">[27]<\/a> Chris White, <em>Details of FBI Watch Lists Revealed Including Number of Americans,<\/em> Lawnewz (June 21, 2016), http:\/\/lawnewz.com\/video\/details-of-fbi-watch-lists-revealed-including-number-of-americans-included\/.<\/p>\n<p><a href=\"#_ednref28\" name=\"_edn28\">[28]<\/a> Homeland Security Presidential Directive\/HSPD-6, <em>Directive on Integration and Use of Screening Information to Protect Against Terrorism<\/em> (Sept. 16, 2003), https:\/\/www.gpo.gov\/fdsys\/pkg\/PPP-2003-book2\/pdf\/PPP-2003-book2-doc-pg1174.pdf. HSPD-6 states that it is U.S. policy to \u201cdevelop, integrate, and maintain thorough, accurate, and current information about individuals known or appropriately suspected to be or have been engaged in conduct constituting, in preparation for, in aid of, or related to terrorism . . . [and] use that information as appropriate and to the full extent permitted by law to support . . . [governmental,] diplomatic, military, intelligence, and law enforcement screening processes.\u201d The primary government screening agencies are the Transportation Security Agency (TSA), the Customs and Border Patrol (CBP), the Immigration and Customs Enforcement (ICE), and the Department of State (DOS).<\/p>\n<p><a href=\"#_ednref29\" name=\"_edn29\">[29]<\/a> White, <em>supra<\/em> note 26.<\/p>\n<p><a href=\"#_ednref30\" name=\"_edn30\">[30]<\/a> It is officially marked <em>Unclassified<\/em>, <em>For Official Use Only (FOUO)\/Sensitive Security Information<\/em>, with the additional caveat that access is limited to users with a \u201cneed to know.\u201d<\/p>\n<p><a href=\"#_ednref31\" name=\"_edn31\">[31]<\/a> In fact, names on the Terrorist Watchlist are said to be added and subtracted daily.<em> About the <\/em><em>Terrorist Screening Center, <\/em>Fed. Bureau of Investigation (last visited Jan. 17, 2017), https:\/\/www.fbi.gov\/about\/leadership-and-structure\/national-security-branch\/tsc.<\/p>\n<p><a href=\"#_ednref32\" name=\"_edn32\">[32]<\/a> Frontline law enforcement personnel as well as alert citizens can make SARs available to their local offices if they observe activities \u201creasonably indicative of preoperational planning associated with terrorism or other criminal activity.\u201d <em>See<\/em> <em>About the NSI<\/em>, Nationwide SAR Initiative (last visited Jan. 17, 2017), https:\/\/nsi.ncirc.gov\/default.aspx; <em>see also<\/em> Jerome. H. Kahan, <em>Suspicious Activity Reporting &#8211; A Job for Everyone<\/em>, Domestic Prep (Aug. 10, 2016), https:\/\/www.domesticpreparedness.com\/preparedness\/suspicious-activity-reporting-a-job-for-everyone\/.<\/p>\n<p><a href=\"#_ednref33\" name=\"_edn33\">[33]<\/a> <em>Guidance,<\/em> <em>supra <\/em>note 7, at 4, n.2, 7. The difficult to decipher explanation states: \u201cTo meet the REASONABLE SUSPICION standard, the NOMINATOR, based on the totality of the circumstances, must rely upon articulable intelligence or information which, taken together with rational inferences from those facts, reasonably warrants a determination that an individual is known or suspected to be or has been knowingly engaged in conduct constituting, in preparation for, in aid of, or related to TERRORISM and\/or TERRORIST ACTIVITIES.\u201d <em>Id.<\/em> at 32. \u201cAt the very least, it takes at least one source of credible and reliable information tying an individual to terrorism or terrorist- activities for the reasonable suspicion standard to be met. A more stringent process is needed when a U.S. citizen or permanent resident is nominated for inclusion on the Watchlist, including use of multiple sources of known reliability, review by the nominating agency\u2019s legal counsel as well as the NCTC, and notifying the FBI of these nominations.\u201d <em>Id.<\/em> at 18.<\/p>\n<p><a href=\"#_ednref34\" name=\"_edn34\">[34]<\/a> <em>Id. <\/em>at 15. The Department of Justice\u2019s official standard prohibits \u201cthe collection, maintenance, use, and dissemination\u201d of terrorist-related intelligence information, <em>unless <\/em>there is reasonable suspicion of potentially prosecutable activities.\u201d <em>See<\/em> Jerome H. Kahan, <em>Protecting Civil Liberties for Suspicious Activity Reports<\/em>, Domestic Prep (Oct. 19, 2016), https:\/\/www.domesticpreparedness.com\/commentary\/protecting-civil-liberties-for-suspicious-activity-reports\/ (emphasis added).<\/p>\n<p><a href=\"#_ednref35\" name=\"_edn35\">[35]<\/a> U.S. Dep\u2019t of Justice Office of the Inspector Gen., <em>The Federal Bureau of Investigation\u2019s Terrorist Watchlist Nomination Practices, Audit Report 09-25<\/em> (May 2009). \u201cUnder certain exigent operational circumstances, individual watchlist status determinations can be made by the Director of the TSC, in accordance with the relevant criteria contained in the Watchlisting Guidance, with this information made available to relevant nominating agencies and screeners.\u201d <em>Guidance<\/em>, <em>supra<\/em> note 7, at 36.<\/p>\n<p><a href=\"#_ednref36\" name=\"_edn36\">[36]<\/a> Redress difficulties and same names are among the many issues regarding the Watchlist were discussed by Rick Kopel, Principal Deputy Director, Terrorist Screening Center, Federal Bureau of Investigation, in his statement before the House Subcommittee on Transportation Security and Infrastructure development, on September 9, 2008, available at https:\/\/archives.fbi.gov\/archives\/news\/testimony\/the-terrorist-screening-database-and-watchlisting-process.<\/p>\n<p><a href=\"#_ednref37\" name=\"_edn37\">[37]<\/a> U.S. Dep\u2019t of Homeland Sec., Office of the Inspector Gen., Role of the No Fly and Selectee Lists in Securing Commercial Aviation (Redacted) (July 20, 2009), https:\/\/www.oig.dhs.gov\/assets\/Mgmt\/OIGr_09-64_Jul09.pdf [hereinafter DHS\/OIG 2009 Report].<\/p>\n<p><a href=\"#_ednref38\" name=\"_edn38\">[38]<\/a> The Guidance states there must be a \u201cthreat of committing an act of international or domestic terrorism with respect to an aircraft (including a threat of air piracy, or a threat to airline, passenger, or civil aviation)\u201d or a threat to the security of any \u201cofficial personnel and facilities abroad, including embassies, consulates and missions, military installations and all forms of U.S. owned or leased aircraft or ships, and commercial or entertainment facilities visited by U.S. citizens abroad.\u201d <em>Guidance,<\/em> <em>supra<\/em> note 7, at 50.<\/p>\n<p><a href=\"#_ednref39\" name=\"_edn39\">[39]<\/a> Piehota, <em>supra<\/em> note 24. Known or suspected terrorists are <em>operationally capable<\/em> if they are assessed by credible intelligence as reasonably appearing to have the \u201cability, knowledge, opportunity, and intent or is actively seeking the opportunity to engage in a violent act of terrorism . . . acting individually or in concert with others.\u201d <em>Guidance,<\/em> <em>supra<\/em> note 7, at 34 (emphasis added). For legal aspects of the No-Fly List,<em> see <\/em><em>How Does the U.S. No Fly List Work?<\/em>, HG.org, http:\/\/www.hg.org\/article.asp?id=3174.<\/p>\n<p><a href=\"#_ednref40\" name=\"_edn40\">[40]<\/a> Stephen Dinan, <em>FBI no-fly list revealed: 81,000 names, but fewer than 1,000 are American<\/em>, Wash. Times (June 20, 2016), http:\/\/www.washingtontimes.com\/news\/2016\/jun\/20\/fbi-no-fly-list-revealed-81k-names-fewer-1k-us\/. In addition to the TSA proposing names to be entered on the No-Fly List, its growth may be due to the fact that this list is used by the U.S. Coast Guard to monitor attempts by unwanted individuals to enter the country by sea, and also as part of the TECS system, noted earlier, which is the main system used by the Border Patrol to determine the admissibility of persons seeking to cross our border, consistent with that agency\u2019s \u201canti-terrorism and law enforcement\u201d mission. <em>See<\/em> U.S. Dep\u2019t of Homeland Sec., DHS\/CBP\/PIA-009(a), <em>Privacy Impact Assessment Update for the <\/em><em>No-Fly List has doubled in the past year<\/em><em>TECS System: CBP Primary and Secondary Processing (TECS) National SAR Initiative<\/em> (Aug. 5, 2011). Memoranda of Information Received (MOIRs) are produced for each encounter and submitted \u201cfor review, consideration, and nomination as Suspicious Activity Reports (SARs) for the DHS Information Sharing Environment (ISE) &#8211; SAR Initiative.\u201d<em> Id<\/em>. at 3.<\/p>\n<p><a href=\"#_ednref41\" name=\"_edn41\">[41]<\/a> Steve Kroft, <em>60 Minutes: <\/em><em>Unlikely Terrorists On No Fly List<\/em> (CBS television broadcast, June 7, 2007).<\/p>\n<p><a href=\"#_ednref42\" name=\"_edn42\">[42]<\/a> Sid Lipsey, <em>8 ways you can end up on the no-fly list<\/em>, Yahoo Travel (Sept. 9, 2015), http:\/\/www.foxnews.com\/travel\/2015\/09\/09\/8-ways-can-end-up-on-no-fly-list.html.<\/p>\n<p><a href=\"#_ednref43\" name=\"_edn43\">[43]<\/a> <em>See <\/em>Scahill, <em>supra<\/em> note 7.<\/p>\n<p><a href=\"#_ednref44\" name=\"_edn44\">[44]<\/a> TSA regulations prohibit U.S.-flagged air carriers and foreign flagged air carriers from transporting No-Fly Listed individuals on regulated commercial flights, including all flights operated by U.S. air carriers and all flights operated by foreign air carriers to, from, or over the United States. However, in certain circumstances, the U.S. Government may grant a One-Time Waiver (OTW) to an air carrier that permits the carrier to transport an individual on a specified itinerary under controlled conditions. In some cases<strong>, <\/strong>individuals on the No-Fly List have been stranded abroad and even detained by a foreign government when Embassy officials confiscate their passports. <em>See<\/em> Jared P. Cole, Cong. Research Serv., Terrorist Databases and the No Fly List: Procedural Due Process and Hurdles to Litigation (Apr. 2, 2015), https:\/\/fas.org\/sgp\/crs\/homesec\/R43730.pdf. President Trump\u2019s recent, controversial Executive Order on immigration, <em>inter alia<\/em>, \u201ccalls for a review into suspending the Visa Interview Waiver Program, which allows travelers from 38 countries\u2014including close allies\u2014to renew travel authorizations without an in-person interview, [\u2026and] also calls for implementing \u201ca uniform screening standard and procedure for assessing whether or not an [\u2026immigration applicant] has the intent to commit criminal or terrorist acts after entering the United States.\u201d CNN News, <em>Full text of Trump&#8217;s executive order on 7-nation ban, refugee suspension<\/em>, CNN Politics (Jan. 28, 2017), http:\/\/www.cnn.com\/2017\/01\/28\/politics\/text-of-trump-executive-order-nation-ban-refugees\/.<\/p>\n<p><a href=\"#_ednref46\" name=\"_edn46\">[46]<\/a> <em>Guidance<\/em>, <em>supra<\/em> note 7, at 16. In examining the TBU, a legal expert wrote that the Watchlisting Guidance \u201cdoes not provide examples of either the kind of threat that can justify a group-based departure from the reasonable suspicion requirement or the characteristics by which such groups can be defined \u2026. No public information indicates whether, or how often, the government has made such categorical additions since the [underwear bomber] incident.\u201d Shirin Sinnar, <em>Essay: Rule of Law Tropes in National Security,<\/em> 129 Harv. L. Rev. 1566, 1594\u201395 (Feb. 2016).<\/p>\n<p><a href=\"#_ednref47\" name=\"_edn47\">[47]<\/a> Justin O\u2019Connell, <em>How and Why You Get on a TSA Watch List<\/em>, Dollar Vigilante (July 30, 2014), https:\/\/dollarvigilante.com\/blog\/2014\/07\/30\/how-and-why-you-get-on-a-tsa-watch-list.html. Once a TBU is approved, it can last for 30 days and can be renewed until the threat expires. However, as the <em>Guidance <\/em>states: \u201cWhen necessitated by exigent circumstances, and where there is current and credible intelligence information or a particular threat stream that indicates a certain category of individuals may\u2026 conduct an act of domestic or international Terrorism, the \u2018Appropriate Official\u2019 may direct the TSC and NCTC to place categories of individuals from TIDE or TSDB on the No Fly List [\u2026before written] concurrence is obtained from the [senior NSC Committee] . . . If such concurrence is not obtained within 72 hours, individuals placed on the No Fly List due to the TBU will have their names removed.\u201d <em>See Guidance<\/em>, <em>supra<\/em> note 7, at 26.<\/p>\n<p><a href=\"#_ednref48\" name=\"_edn48\">[48]<\/a> The 2013 Guidance categorically prohibits watchlisting of individuals on the basis of racial profiling. <em>See Guidance, supra<\/em> note 7, at 6. The <em>Guidance<\/em> does not indicate what categories of people can be subjected to TBU, but notes that \u201cAmerican citizens and green card holders are subject to such upgrades.\u201d<em> See<\/em> Scahill, <em>supra<\/em> note 7. In 2014, the Attorney General issued a wider ban that banned profiling \u201con the basis of religion, national origin, gender, sexual orientation and gender identity, [\u2026but included exemptions for CBP agents and TSA screeners given] the unique nature of border and transportation security as compared to traditional law enforcement.\u201d Eric Tucker, Assoc. Press, <em>White House issues guidelines to ban racial and religious profiling<\/em>, at PBS Newshour (Dec. 8, 2014), http:\/\/www.pbs.org\/newshour\/rundown\/white-house-issues-guidelines-ban-racial-religious-profiling\/.<\/p>\n<p><a href=\"#_ednref49\" name=\"_edn49\">[49]<\/a> Susan Stellin, <em>Who Is Watching the Watch Lists?<\/em> N.Y. Times (Nov. 30, 2013), http:\/\/www.nytimes.com\/2013\/12\/01\/sunday-review\/who-is-watching-the-watch-lists.html; <em>see also<\/em> <em>Guidance<\/em>, <em>supra<\/em> note 7, at 7. Other documents revealed that the Obama administration had scrubbed the names of almost 1,000 foreign nationals from the Watchlist, mostly of the Muslim faith, as part of a so-called \u201chands off\u201d list that allowed individuals who had formerly been banned from entering the U.S. because of suspected terrorist ties to enter the country in what turned out to be a misguided effort to protect the civil rights of suspected individuals. <em>See<\/em> Judicial Watch, <em>Homeland Security Records Reveal Officials Ordered Terrorist Watch List Scrubbed<\/em> (Mar. 1, 2016), http:\/\/www.judicialwatch.org\/press-room\/press-releases\/judicial-watch-homeland-security-records-reveal-officials-ordered-terrorist-watch-list-scrubbed\/. When discovered, this secret scrubbing action led to charges that had this data been retained, authorities might have had some warning of the brutal attack in San Bernardino on December 2, 2015 by a married couple with radical extremist beliefs\u2014a false accusation as neither of the perpetrators were ever placed on a watchlist. Kerry Picket, <em>San Bernardino Shooting Suspects Not On Terrorist Watch List<\/em>, Daily Caller (Apr. 12, 2015), http:\/\/dailycaller.com\/2015\/12\/04\/san-bernardino-shooting-suspect-not-on-terrorist-watch-list\/.<\/p>\n<p><a href=\"#_ednref50\" name=\"_edn50\">[50]<\/a> Travelers with \u201cSSSS\u201d printed on their boarding passes, for reasons not explained, must undergo an additional level of scrutiny at airports and borders, such as a strip searches or extended interviews, based on criteria that have not been made public but might include passengers with one-way reservations or individuals paying in cash for their tickets. Wang, <em>supra<\/em> note 2, at 3. The 2009 DHS\/OIG Report referred to earlier explains that the Homeland Security Council recently \u201cloosened the criteria to allow for inclusion of more individuals on the No-Fly list and the TSC\u2019s Policy Board Working Group followed suit with new implementation guidance as of June 2008.\u201d <em>See<\/em> DHS\/OIG 2009 Report, <em>supra<\/em> note 35.<\/p>\n<p><a href=\"#_ednref51\" name=\"_edn51\">[51]<\/a> Wang, <em>supra<\/em> note 2, at 5<\/p>\n<p><a href=\"#_ednref52\" name=\"_edn52\">[52]<\/a> <em>See <\/em>White, <em>supra<\/em> note 26.<\/p>\n<p><a href=\"#_ednref53\" name=\"_edn53\">[53]<\/a> <em>Guidance<\/em>, <em>supra<\/em> note 7, at 35.<\/p>\n<p><a href=\"#_ednref54\" name=\"_edn54\">[54]<\/a> <em>Id.<\/em> at 36<\/p>\n<p><a href=\"#_ednref55\" name=\"_edn55\">[55]<\/a> <em>See supra<\/em> note 4.<\/p>\n<p><a href=\"#_ednref56\" name=\"_edn56\">[56]<\/a> U.S. Dep\u2019t of Justice, Office of the Inspector Gen., <em>Follow-up Audit of the Terrorist Screening Center<\/em>, Audit Report 07-41 (Sept. 2007), https:\/\/oig.justice.gov\/reports\/FBI\/a0741\/final.pdf.<\/p>\n<p><a href=\"#_ednref57\" name=\"_edn57\">[57]<\/a> Donna A. Bucella, <em>The Terrorist Screening Center<\/em>, The Police Chief Mag., at 22\u201324 (Aug. 2006). An encounter means that \u201cduring their normal job duties (e.g., traffic stops, checking of airplane manifests \u2026 or evaluating an application for a U.S. passport or visa),\u201d law enforcement officials might come across an individual who could be a known or suspected terrorist. <em>See<\/em> Ten Requirements for an Effective Terrorist Screening Center, s<em>upra<\/em> note 7, at 49\u201350 n.10. In addition, the Watchlist is made available to the FBI\u2019s National Crime Information Center (NCIC), which maintains \u201ca computerized index of criminal justice information (i.e., criminal record history information, fugitives, stolen properties, missing persons)&#8230;available [&#8230;round the clock] to Federal, state, and local law enforcement and other criminal justice agencies\u201d when encountering suspected individuals. National Crime Info. Ctr., <em>Criminal Justice Information Services Division<\/em>, Fed. Am. Scientists (June 2, 2008), https:\/\/fas.org\/irp\/agency\/doj\/fbi\/is\/ncic.htm.<\/p>\n<p><a href=\"#_ednref58\" name=\"_edn58\">[58]<\/a> See HSPD-6, <em>supra<\/em> note 27.<\/p>\n<p><a href=\"#_ednref59\" name=\"_edn59\">[59]<\/a> U.S. Dep\u2019t of Justice Office of the Inspector General, Review of the Terrorist Screening Center, Audit Report 05-27 (June 2005). A disproportionally greater number of individuals are assigned the less threatening lower code numbers due to the TSC policy of erring on the side of caution by watchlisting individuals with even a slight connection to terrorism as long as certain minimum criteria was met, such as at least part of an entire name and an additional identifier such as birth date. U.S. Gov\u2019t Accountability Office, GAO-08-110, <em>Terrorist Watch List Screening: Opportunities Exist to Enhance Management Oversight, Reduce Vulnerabilities in Agency Screening Processes, and Expand Use of the List<\/em> (Oct. 2007). <em>See also <\/em>Wang, <em>supra<\/em> note 2, at 24\u201326.<\/p>\n<p><a href=\"#_ednref60\" name=\"_edn60\">[60]<\/a> Wang, <em>supra<\/em> note 2, at 2. Citing this ACLU Report, O\u2019Leary explained: \u201cFBI documents from 2009 showed the use of the \u2018silent hit\u2019 system became increasingly widespread, and such routine use underscores that the KST File [known or suspected terrorist] is principally a domestic intelligence-gathering tool.\u201d Mary O\u2019Leary, <em>Yale Law School clinic, ACLU question growth of domestic \u2018watchlist\u2019<\/em>, The Register Citizen (Apr. 18, 2016), http:\/\/www.registercitizen.com\/article\/RC\/20160418\/NEWS\/160419605.<\/p>\n<p><a href=\"#_ednref61\" name=\"_edn61\">[61]<\/a> Am. Civil Liberties Union,<em> U.S. Government Watchlisting: Unfair Process and Devastating Consequences<\/em> (Mar. 2014), \u00a0https:\/\/www.aclu.org\/sites\/default\/files\/assets\/watchlist_briefing_paper_v3.pdf.<\/p>\n<p><a href=\"#_ednref62\" name=\"_edn62\">[62]<\/a> Scahill, <em>supra<\/em> note 7<strong>.\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 <\/strong><\/p>\n<p><a href=\"#_ednref63\" name=\"_edn63\">[63]<\/a> Hina Shamsi &amp; Chris Anders, Am. Civil Liberties Union, <em>The Use of <\/em><em>Error-Prone and Unfair Watchlists Is Not the Way to Regulate Guns in America<\/em> (June 20, 2016), https:\/\/www.aclu.org\/blog\/washington-markup\/use-error-prone-and-unfair-watchlists-not-way-regulate-guns-america. This discussion applies with equal force to issues concerning terror watchlists.<\/p>\n<p><a href=\"#_ednref65\" name=\"_edn65\">[65]<\/a> <em>See <\/em><em>supra<\/em> note 34; <em>s<\/em><em>ee also<\/em> Collins Dictionary of Law (W.J. Stewart, ed., 2006).<\/p>\n<p><a href=\"#_ednref66\" name=\"_edn66\">[66]<\/a> Kim Zetter, <em>How Does the FBI Watch List Work? And Could It Have Prevented Orlando?,<\/em> Wired (June 17, 2016), https:\/\/www.wired.com\/2016\/06\/fbi-watch-list-prevented-orlando-heres-works\/. Using the watchlisting criteria, for example, an individual who is not a known or suspected terrorist could still end up on the TIDE database if the NCTC concludes this person raises \u201creasonable suspicion\u201d because the individual knows someone who might be acting like a terrorist, if somebody else thinks that person poses a potential terror threat, or as a result of terrorist-related information that individual has posted on Facebook or Twitter.\u00a0 <em>Guidance<\/em>, <em>supra<\/em> note 7, at 32.<\/p>\n<p><a href=\"#_ednref67\" name=\"_edn67\">[67]<\/a> Sinnar, <em>supra<\/em> note 45, at 1584.<\/p>\n<p><a href=\"#_ednref68\" name=\"_edn68\">[68]<\/a> Fed. Bureau of Investigation, <em>supra<\/em> note 26<strong>. <\/strong>Unbelievably, according to an IG investigation in August of last year, dozens of DHS employees who have been vetted and given security clearances turn out to be watchlisted. Tori Bedford, <em>Congressman Lynch: 72 Department of Homeland Security Employees On Terrorist Watchlist<\/em>, WGBH News (Dec.1, 2015), http:\/\/news.wgbh.org\/people\/tori-bedford.<\/p>\n<p><a href=\"#_ednref69\" name=\"_edn69\">[69]<\/a> <em>Terror Tuesday: The nerve center of the \u2018disposition matrix,<\/em>\u2019 PrivacySOS (Oct. 30, 2012), http:\/\/archive.privacysos.org\/node\/863 (including comment from August 21, 2008 letter sent by Rep. Brad Miller, Chairman of House Subcommittee on Investigations and Oversight, Committee on Science and Technology, to the IG of the ODNI on how \u201cthe TIDE database is suffering from serious, long-standing technical problems . . . .\u201d).<\/p>\n<p><a href=\"#_ednref70\" name=\"_edn70\">[70]<\/a> Rachel Levinson-Waldman, Brennan Ctr. for Just., <em>What the Government Does with Americans\u2019 Data<\/em> 17\u201318 (2013), https:\/\/www.brennancenter.org\/sites\/default\/files\/publications\/What%20Govt%20Does%20with%20Data%20100813.pdf.<\/p>\n<p><a href=\"#_ednref71\" name=\"_edn71\">[71]<\/a> Of course, if a person is stopped from boarding an aircraft for no apparent reason, the new redress procedures, discussed earlier, can expose whether that individual is on the No-Fly List.<\/p>\n<p><a href=\"#_ednref72\" name=\"_edn72\">[72]<\/a> <em>Guidance<\/em>, <em>supra<\/em> note 7, at 29, 46.<\/p>\n<p><a href=\"#_ednref73\" name=\"_edn73\">[73]<\/a> Anya Bernstein, <em>The Hidden Costs of Terrorist Watchlists<\/em>, 61 Buff. L. Rev. 461 (2013). A false positive \u201cis a test result that is incorrect because [\u2026it indicates] a condition or finding that does not exist.\u201d <em>False-positive<\/em>, Dictionary.com (last visited Jan. 17, 2017), http:\/\/www.dictionary.com\/browse\/false-positive.<\/p>\n<p><a href=\"#_ednref74\" name=\"_edn74\">[74]<\/a> Am. Civil Liberties Union, <em>The Four Biggest Problems with the \u201cSecure Flight\u201d Airline Security Program <\/em>(last visited Jan. 17, 2017), https:\/\/www.aclu.org\/other\/four-biggest-problems-secure-flight-airline-security-program<em>. <\/em>This includes \u201clist bloat,\u201d which is bad for security as well as for liberty. <em>Id.<\/em><\/p>\n<p><a href=\"#_ednref75\" name=\"_edn75\">[75]<\/a> Nicole Flatow, <em>It Took 11,000 Hours of Legal Work to Clear an Innocent Woman Placed on the No-Fly List, <\/em>Think Progress, at 36 (Feb. 10, 2014), https:\/\/thinkprogress.org\/it-took-11-000-hours-of-legal-work-to-clear-an-innocent-woman-placed-on-the-no-fly-list-9dfdfb35d072#.xi1m003dc.<\/p>\n<p><a href=\"#_ednref76\" name=\"_edn76\">[76]<\/a> The Director of the ACLU of Massachusett\u2019s Technology for Liberty Project, Kade Crockford, mentioned the existence of a parallel \u201cshadow\u201d legal system. <em>See <\/em>Kade Crockford, <em>T<\/em><em>he FBI Says it Can\u2019t Disclose its Records Because then the Public Would Know how the Bureau Works,<\/em> Am. Civil Liberties Union (Feb. 2, 2016),\u00a0 https:\/\/www.aclu.org\/blog\/speak-freely\/fbi-says-it-cant-disclose-its-records-because-then-public-would-know-how-bureau?utm_content=buffera5328&amp;utm_medium=social&amp;utm_source=twitter.com&amp;utm_campaign=buffer.<\/p>\n<p>The existence of a parallel \u201cshadow list\u201d was also mentioned by Jeremy Scahill in interviews. <em>See <\/em>\u201cJeremy Scahill: Leaked U.S. Terrorist Watchlist Rulebook Reveals \u2018Global Stop and Frisk Program,\u2019\u201d Democracy Now (July 29, 2014), https:\/\/www.democracynow.org\/2014\/7\/29\/jeremy_scahill_leaked_us_terrorist_watchlist.<\/p>\n<p><a href=\"#_ednref77\" name=\"_edn77\">[77]<\/a><em>America\u2019s Terrorist Watchlist,<\/em> Viable Opposition<strong> (<\/strong>Sept. 20, 2016), http:\/\/viableopposition.blogspot.com\/2016\/09\/americas-terrorist-watchlist.html.<\/p>\n<p><a href=\"#_ednref78\" name=\"_edn78\">[78]<\/a><em> Guidance<\/em>, <em>supra<\/em> note 7, at 15.<\/p>\n<p><a href=\"#_ednref79\" name=\"_edn79\">[79]<\/a> <em>Id<\/em>. On this point, Timothy Healy, former TSC Director, reportedly said that the need to \u201cbalance civil liberties against protecting the American people\u201d is the biggest challenge facing that organization and essential to an effective counterterrorism program. <em>See <\/em>Weinger, <em>supra <\/em>note 5.<\/p>\n<p><a href=\"#_ednref80\" name=\"_edn80\">[80]<\/a> <em>The Progress and Pitfalls of the Terrorist Watch List: Hearing Before the H. Homeland Security Comm.<\/em>, 110th Cong. (Nov. 8, 2007) (statement of Timothy Sparapani et al, Am. Civil Liberties Union), https:\/\/www.aclu.org\/files\/pdfs\/natsec\/watchlist_statement_11_8_2007.pdf [hereinafter Sparapani-ACLU Statement].<em> See also<\/em> <em>What does the government consider \u201cprotected\u201d first amendment activities?<\/em>, EMPTYWHEEL (July 17, 2013), https:\/\/www.emptywheel.net\/2013\/07\/17\/what-does-the-government-consider-protected-first-amendment-activities\/.<\/p>\n<p><a href=\"#_ednref81\" name=\"_edn81\">[81]<\/a> <em>TSC\u2019s Role in the Interagency Watchlisting and Screening Process, hearing before the House Subcomm. on Transportation Security: Hearing Before H. Subcomm. on Transportation Security of the H. Homeland Security Comm<\/em>., 113th Cong. (Sept. 18, 2014) (statement of Christopher M. Piehota, Dir., Terrorist Screening Center).<\/p>\n<p><a href=\"#_ednref82\" name=\"_edn82\">[82]<\/a> Jennie Pasquarella, <em>Muslims Need Not Apply: How USCIS Secretly Mandates the Discriminatory Delay and Denial of Citizenship and Immigration Benefits to Aspiring Americans,<\/em> Am. Civil Liberties Union of S. Cal. (Aug. 2013), https:\/\/www.lccr.com\/wp-content\/uploads\/sites\/82\/MUSLIMS_NEED_NOT_APPLY_LCCR_ACLU_SoCal_Report.pdf.<\/p>\n<p><a href=\"#_ednref83\" name=\"_edn83\">[83]<\/a> <em>See supra<\/em> note 43.<\/p>\n<p><a href=\"#_ednref84\" name=\"_edn84\">[84]<\/a> Paul Rosenzweig, <em>Changes in the No-Fly List Process and Judicial Review<\/em>, Lawfare (Nov. 6, 2015), https:\/\/www.lawfareblog.com\/changes-no-fly-list-process-and-judicial-review. <em>See also<\/em> <em>Safeguarding Privacy and Civil Liberties While Keeping our Skies Safe: HearingBefore H.<\/em> <em>Subcomm. on Transportation Sec. of the H. Homeland Sec. Comm.<\/em>, 113th Cong. (Sept. 18, 2014) (statement of Christopher M. Piehota, Dir., Terrorist Screening Center).<\/p>\n<p><a href=\"#_ednref85\" name=\"_edn85\">[85]<\/a> Evan Van Simon,\u00a0 <em>How \u2018the Terrorist Watch List\u2019 Works,<\/em> ABC News (June 17, 2016), http:\/\/abcnews.go.com\/US\/terrorist-watch-list-works\/story?id=39931316. In September 2007 a group of federal agencies signed a <em>Memorandum of Understanding on<\/em> <em>Terrorist Watchlist Redress Procedures<\/em> that \u201cstandardizes preexisting inter-agency watchlist redress procedures allowing individuals an opportunity to receive a timely, fair and accurate review of their case.\u201d<em>\u00a0<\/em>Fed. Bureau of Investigation, <em>Fact Sheet: Watchlist Redress Memorandum of Understanding<\/em> (Oct. 24, 2007), https:\/\/www.fbi.gov\/about\/leadership-and-structure\/national-security-branch\/tsc\/tsc-watchlist-redress-mou.<\/p>\n<p><a href=\"#_ednref86\" name=\"_edn86\">[86]<\/a> <em>See<\/em> Ctr for Constitutional Rights, <em>If an Agent Knocks: Federal Investigators and Your Rights<\/em> (last updated Sept. 25, 2009), https:\/\/ccrjustice.org\/if-agent-knocks-booklet.<\/p>\n<p><a href=\"#_ednref87\" name=\"_edn87\">[87]<\/a> Jeremy Scahill, <em>Leaked U.S. Terrorist Watchlist Rulebook Reveals \u2018Global Stop and Frisk Program,\u2019<\/em> Democracy Now (July 2, 2014), https:\/\/www.democracynow.org\/2014\/7\/29\/jeremy_scahill_leaked_us_terrorist_watchlist<em>. <\/em>In this interview, Scahill, who has delved deeply into the watchlisting process, said that the No-Fly List \u201creached its highest point under President Obama.\u201d <em>Id.<\/em><\/p>\n<p><a href=\"#_ednref88\" name=\"_edn88\">[88]<\/a> <a href=\"https:\/\/www.washingtonpost.com\/people\/jerry-markon\/\">Jerry Markon<\/a>, <em>Terror watch lists have grown dramatically since 9\/11<\/em>, Wash. Post (June 17, 2016).<\/p>\n<p><a href=\"#_ednref89\" name=\"_edn89\">[89]<\/a> Katie Rucke, <em>\u2018Startling\u2019 Number Of Americans Are On Terrorist Watchlist<\/em>, MintPress News (July 23, 2014), http:\/\/www.mintpressnews.com\/startling-number-of-americans-are-on-terrorist-watchlist\/194356\/.<\/p>\n<p><a href=\"#_ednref90\" name=\"_edn90\">[90]<\/a> U.S. Gov\u2019t Accountability Office, GAO-12-476, <em>TERRORIST WATCHLIST:<\/em> <em>Routinely Assessing Impacts of Agency Actions since the December 25, 2009, Attempted Attack Could Help Inform Future Efforts<\/em> (May 2012).<\/p>\n<p><a href=\"#_ednref91\" name=\"_edn91\">[91]<\/a> <em>See <\/em>Sparapani-ACLU Statement, <em>supra<\/em> note 80.<\/p>\n<p><a href=\"#_ednref92\" name=\"_edn92\">[92]<\/a> <em>The Progress and Pitfalls of the Terrorist Watchlist: Hearing Before the H. Comm. on Homeland Security<\/em>, 110th Cong. (Nov. 8, 2007) (statement of Bernie Thompson, Chairman of Comm. on Homeland Security).<\/p>\n<p><a href=\"#_ednref93\" name=\"_edn93\">[93]<\/a> Letter from Diana C. Mauer, Dir. of Homeland Security and Justice Issues, to Sen. Dianne Feinstein (Mar. 7, 2016), https:\/\/www.feinstein.senate.gov\/public\/_cache\/files\/f\/5\/f53c4195-430d-4d8d-acde-1ec53e97d0fa\/8B0B32645FB7DD74C275F4E0A9B06F96.gao-nics-watchlist-2016-update.pdf. For a detailed account of the current background check process for a person wishing to purchase fire arms from a retail store, see Corinne Jones, <em>Background checks on gun sales: How do they work?<\/em>, CNN (Apr. 10, 2013), http:\/\/www.cnn.com\/2013\/04\/10\/politics\/background-checks-explainer\/.<\/p>\n<p><a href=\"#_ednref94\" name=\"_edn94\">[94]<\/a> Kevin Miller, <em>Maine Senators King and Collins Back Gun Sales Ban Based on Terror \u201cwatchlists<\/em>,<em>\u201d<\/em> Portland Press (June 14, 2016), http:\/\/www.pressherald.com\/2016\/06\/13\/maine-senators-king-and-collins-back-gun-sale-ban-based-on-terror-watch-lists\/.<\/p>\n<p><a href=\"#_ednref95\" name=\"_edn95\">[95]<\/a> Mike Lillis, <em>Ryan pushes back against terrorist watchlist legislation<\/em>, The Hill (June 16, 2016), http:\/\/thehill.com\/policy\/national-security\/283769-ryan-pushes-back-against-terror-watch-list-legislation.<\/p>\n<p><a href=\"#_ednref96\" name=\"_edn96\">[96]<\/a> <em>See US Terror Watchlists: Inaccurate and Ineffective<\/em>, Take on Hate (2015), http:\/\/www.takeonhate.org\/_creating_oversight_over_national_watch_lists_and_creating_a_mechanism_for_being_removed_from_those_lists.<\/p>\n<p><a href=\"#_ednref97\" name=\"_edn97\">[97]<\/a> Jessie Hellmann, <em>Trump: People on terror watchlist should be barred from gun purchases<\/em>, The Hill (June 18, 2016), http:\/\/thehill.com\/blogs\/ballot-box\/presidential-races\/284017-trump-says-those-on-terror-watch-list-should-be-barred; Nick Corasaniti &amp; Alexander Burns, <em>One Ally Remains Firmly Behind Donald Trump: The N.R.A., <\/em>N.Y. Times (Aug. 10, 2016), https:\/\/www.nytimes.com\/2016\/08\/11\/us\/politics\/donald-trump-second-amendment-nra.html?_r=0.<\/p>\n<p><a href=\"#_ednref98\" name=\"_edn98\">[98]<\/a> A decade ago, certain federal air marshals said they were ordered to \u201csubmit at least one report a month [about a passenger] acting in a suspicious manner on an aircraft,\u201d even if no wrong had been committed, but with the prospect that this person\u2019s name might potentially end up on a watchlist that identifies that individual as a potential terrorist posing a threat to aircraft\u2014a charge some top TSA officials denied. <em>See<\/em> <em>Marshals: Innocent People Placed On &#8216;Watch List&#8217; To Meet Quota<\/em>, 7NEWS:<em>\u00a0 <\/em>TheDenverChannel (July 21, 2006), http:\/\/www.thedenverchannel.com\/news\/marshals-innocent-people-placed-on-watch-list-to-meet-quota.<\/p>\n<p><a href=\"#_ednref99\" name=\"_edn99\">[99]<\/a> Eric Lichtblau, <em>After Orlando, Questions Over Effectiveness of Terrorism Watch Lists<\/em>, N.Y. Times (June 22, 2016), https:\/\/www.nytimes.com\/2016\/06\/23\/us\/politics\/after-orlando-questions-over-terrorism-watch-lists.html.<\/p>\n<p><a href=\"#_ednref100\" name=\"_edn100\">[100]<\/a> Charles S. Clark, <em>The FBI Has Built a Better Terrorist Watchlist<\/em><strong>, <\/strong>Gov\u2019t Exec.<strong> (<\/strong>Mar. 25, 2014), http:\/\/www.govexec.com\/defense\/2014\/03\/fbi-has-built-better-terrorist-watchlist\/81199\/.<\/p>\n<p><a href=\"#_ednref101\" name=\"_edn101\">[101]<\/a> <em>Id.<\/em><\/p>\n<p><a href=\"#_ednref102\" name=\"_edn102\">[102]<\/a> Arjun Sethi, <em>The US government can brand you a terrorist based on a Facebook post. We can\u2019t let them make up the rules<\/em>, The Guardian (Aug. 30, 2014), https:\/\/www.theguardian.com\/commentisfree\/2014\/aug\/30\/terrorist-watch-list-rules-innocent-people.<\/p>\n<p><a href=\"#_ednref103\" name=\"_edn103\">[103]<\/a> <em>Id.<\/em><\/p>\n<p><a href=\"#_ednref104\" name=\"_edn104\">[104]<\/a> Weinger, supra note 5.<\/p>\n<p><a href=\"#_ednref105\" name=\"_edn105\">[105]<\/a> <em>See supra<\/em> note 56, at 1, 2.<\/p>\n<p><a href=\"#_ednref106\" name=\"_edn106\">[106]<\/a> <em>Guidance,<\/em> <em>supra <\/em>note 7, at 45.<\/p>\n<p><a href=\"#_ednref107\" name=\"_edn107\">[107]<\/a> Brian Freskos, <em>How the FBI Terrorist Watch List Works<\/em>, The Trace (June 29, 2016), https:\/\/www.thetrace.org\/2016\/06\/fbi-terrorist-watch-list-guns\/.<\/p>\n<p><a href=\"#_ednref108\" name=\"_edn108\">[108]<\/a> <em>Terrorist Watch List Screening: Recommendations to Enhance Management Oversight, Reduce Potential Screening Vulnerabilities, and Expand Use of the List,<\/em> Statement of Eileen R. Larence, Dir. of Homeland Security and Justice Issues, U.S. Gov\u2019t Accountability Office (Oct. 24, 2007), http:\/\/www.gao.gov\/assets\/120\/118217.pdf.<\/p>\n<p><a href=\"#_ednref109\" name=\"_edn109\">[109]<\/a> Marc Fisher, <em>Trump takes charge with vow to fix nation he sees as broken<\/em>, Marin News (Jan. 20, 2017), http:\/\/www.marinij.com\/general-news\/20170120\/trump-takes-charge-with-vow-to-fix-nation-he-sees-as-broken.<\/p>\n<p><a href=\"#_ednref110\" name=\"_edn110\">[110]<\/a> The Privacy and Civil Liberties Oversight Board (PCLOB) is \u201can independent agency within the executive branch established by the Implementing Recommendations of the 9\/11 Commission Act of 2007 . . .\u00a0 to ensure that the federal government\u2019s efforts to prevent terrorism are balanced with the need to protect privacy and civil liberties.\u201d <em>See<\/em> <em>Privacy and Civil Liberties Oversight Board<\/em>, USA.Gov (last visited Jan. 30, 2017), https:\/\/www.usa.gov\/federal-agencies\/privacy-and-civil-liberties-oversight-board.<\/p>\n<p><a href=\"#_ednref111\" name=\"_edn111\">[111]<\/a> The U.S. Senate Select Committee on Intelligence (SSCI) oversees the activities and programs of all the agencies that form the Intelligence Community (IC) as well as the Office of the Director of National Intelligence (ODNI). The House Permanent Select Committee on Intelligence (HPSCI) is charged with oversight of the IC. None of the five joint oversight committees oversee the IC.<\/p>\n<p><a href=\"#_ednref112\" name=\"_edn112\">[112]<\/a> Emphasis added. For the source of this phrase, see Lewis Evans, <em>The Satires of Juvenal, et al, <\/em>Satire VI, 1861, 5.<\/p>\n<p><a href=\"#_ednref113\" name=\"_edn113\">[113]<\/a> Weinger, <em>supra<\/em> note 5.<\/p>\n<p><a href=\"#_ednref114\" name=\"_edn114\">[114]<\/a> Allister Heath, <em>Once again, it\u2019s the old question: who guards the guardians?<\/em>, City A.M. (June 11, 2013), http:\/\/www.cityam.com\/article\/once-again-it-s-old-question-who-guards-guardians. Upset at revelations about more surreptitious government snooping, Heath explained that \u201c[u]nlike some, I take very seriously the threat of terrorism. It is wrong to demonise the security services, who in most cases are having to work very hard to contain all sorts of threats. A number of attacks have been thwarted, and in many cases these successes have received insufficient publicity. But the present system \u2013 mass, indiscriminate surveillance . . . with very little genuine scrutiny \u2013 is not right. The U.S. constitution appears to have been brazenly defied.\u201d<\/p>\n<p><a href=\"#_ednref115\" name=\"_edn115\">[115]<\/a> For more on George Orwell, see Arshia Malik, <em>These Orwellian Times<\/em>, The Nation (Feb. 18, 2016), and Reiner Stach, <em>Death by data: how Kafka\u2019s The Trial prefigured the nightmare of the modern surveillance state<\/em>, NewStatesman (Jan. 16, 2014), http:\/\/www.newstatesman.com\/2014\/01\/death-data-how-kafkas-trial-prefigured-nightmare-modern-surveillance-state.<\/p>\n<p><a href=\"#_ednref116\" name=\"_edn116\">[116]<\/a> Mark Clayton, <em>Terrorist watch lists: Are they working as they should?<\/em>, Christian Science Monitor (May 22, 2013), http:\/\/www.csmonitor.com\/USA\/2013\/0522\/Terrorist-watch-lists-Are-they-working-as-they-should.Latest<\/p>\n<p><a href=\"#_ednref117\" name=\"_edn117\">[117]<\/a> With apologies to Gilbert &amp; Sullivan, here for the civil liberties community is the introduction to the \u201cprivacy version\u201d of \u201cI\u2019ve Got a Little List\u201d from <em>The Mikado<\/em>, modified to say: \u201cI&#8217;ve got a little list \/ I&#8217;ve got a little list . . . Of privacy offenders . . . who never would be missed \/ who never would be missed!\u201d<\/p>\n<p><a href=\"#_ednref118\" name=\"_edn118\">[118]<\/a> <em>See <\/em>Sethi, <em>supra<\/em> note 103.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This article summarizes the nature and purpose of the government&#8217;s terrorist watchlists, discusses the rules followed by agency screeners, explores the civil liberties implications of watchlisting, and identifies the need for oversight of the process.<\/p>\n","protected":false},"author":20,"featured_media":4785,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[4,24],"tags":[],"class_list":["post-4784","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-features","category-online"],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2017\/02\/2013-watchlist-guidance.jpeg?fit=463%2C599&ssl=1","jetpack_shortlink":"https:\/\/wp.me\/peZtUX-1fa","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/journals.law.harvard.edu\/nsj\/wp-json\/wp\/v2\/posts\/4784","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/journals.law.harvard.edu\/nsj\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/journals.law.harvard.edu\/nsj\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/journals.law.harvard.edu\/nsj\/wp-json\/wp\/v2\/users\/20"}],"replies":[{"embeddable":true,"href":"https:\/\/journals.law.harvard.edu\/nsj\/wp-json\/wp\/v2\/comments?post=4784"}],"version-history":[{"count":0,"href":"https:\/\/journals.law.harvard.edu\/nsj\/wp-json\/wp\/v2\/posts\/4784\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/journals.law.harvard.edu\/nsj\/wp-json\/wp\/v2\/media\/4785"}],"wp:attachment":[{"href":"https:\/\/journals.law.harvard.edu\/nsj\/wp-json\/wp\/v2\/media?parent=4784"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/journals.law.harvard.edu\/nsj\/wp-json\/wp\/v2\/categories?post=4784"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/journals.law.harvard.edu\/nsj\/wp-json\/wp\/v2\/tags?post=4784"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}