NSA Whistleblower HOW THEY ARE SPYING ON YOU & "HOW" the CONSTITUTION is violated by the Government & we list "ALL" the words that will put you on the NSA TERRORIST list

 

https://www.youtube.com/watch?v=DPMNrmRgxhc

 

The Official List – Using these words online will put you in the crosshairs Big Brother’s multi-billion dollar spy machine

Domestic Security

Assassination
Attack
Domestic security
Drill
Exercise
Cops
Law enforcement
Authorities

Disaster assistance
Disaster management
DNDO (Domestic Nuclear
Detection Office)
National preparedness
Mitigation
Prevention
Response
Recovery
Dirty bomb
Domestic nuclear detection

Emergency management
Emergency response
First responder
Homeland security
Maritime domain awareness
(MDA)
National preparedness
initiative
Militia
Shooting
Shots fired
Evacuation
Deaths
Hostage
Explosion (explosive)
Police
Disaster medical assistance
team (DMAT)
Organized crime

Gangs
National security
State of emergency

Security
Breach
Threat
Standoff
SWAT
Screening
Lockdown
Bomb (squad or threat)
Crash
Looting
Riot
Emergency Landing
Pipe bomb
Incident
Facility

HAZMAT & Nuclear

Hazmat
Nuclear
Chemical spill
Suspicious package/device
Toxic
National laboratory
Nuclear facility
Nuclear threat
Cloud
Plume
Radiation
Radioactive

Leak
Biological infection (or
event)
Chemical
Chemical burn
Biological
Epidemic
Hazardous
Hazardous material incident
Industrial spill
Infection
Powder (white)

Gas
Spillover
Anthrax
Blister agent
Chemical agent
Exposure
Burn
Nerve agent
Ricin
Sarin
North Korea

Health Concern + H1N1

Outbreak
Contamination
Exposure
Virus
Evacuation
Bacteria
Recall
Ebola
Food Poisoning
Foot and Mouth (FMD)
H5N1
Avian
Flu
Strain
Quarantine
H1N1
Vaccine

Salmonella
Small Pox
Plague
Human to human
Human to Animal
Influenza
Center for Disease Control
(CDC)
Drug Administration (FDA)
Public Health
Toxic
Agro Terror
Tuberculosis (TB)
Tamiflu
Norvo Virus
Epidemic

Agriculture
Listeria
Symptoms
Mutation
Resistant
Antiviral
Wave
Pandemic
Infection

Water/air borne
Sick
Swine
Pork World Health Organization
(WHO) (and components)
Viral Hemorrhagic Fever
E. Coli

Infrastructure Security

Infrastructure security
Airport
CIKR (Critical Infrastructure
& Key Resources)
AMTRAK
Collapse
Computer infrastructure
Communications
infrastructure
Telecommunications
Critical infrastructure
National infrastructure
Metro
WMATA

Airplane (and derivatives)
Chemical fire
Subway
BART
MARTA
Port Authority
NBIC (National
Biosurveillance Integration
Center)
Transportation security
Grid
Power
Smart

Body scanner

Electric
Failure or outage
Black out
Brown out
Port
Dock
Bridge
Cancelled
Delays
Service disruption
Power line
s

Southwest Border Violence

Drug cartel
Violence
Gang
Drug
Narcotics
Cocaine
Marijuana
Heroin
Border
Mexico
Cartel
Southwest
Juarez
Sinaloa
Tijuana
Torreon
Yuma
Tucson
Decapitated
U.S. Consulate
Consular
El Paso

Fort Hancock
San Diego
Ciudad Juarez
Nogales
Sonora
Colombia
Mara salvatrucha
MS13 or MS-13
Drug war
Mexican army
Methamphetamine
Cartel de Golfo
Gulf Cartel
La Familia
Reynosa
Nuevo Leon
Narcos
Narco banners (Spanish
equivalents)
Los Zetas
Shootout
Execution

Gunfight
Trafficking
Kidnap
Calderon
Reyosa
Bust
Tamaulipas
Meth Lab
Drug trade
Illegal immigrants
Smuggling (smugglers)
Matamoros
Michoacana
Guzman
Arellano-Felix
Beltran-Leyva
Barrio Azteca
Artistic Assassins
Mexicles
New Federation

Terrorism

Terrorism
Al Qaeda (all spellings)
Terror
Attack

Iraq
Afghanistan
Iran
Pakistan

Agro
Environmental terrorist
Eco terrorism
Conventional weapon
Target
Weapons grade
Dirty bomb
Enriched
Nuclear
Chemical weapon
Biological weapon
Ammonium nitrate
Improvised explosive device

IED (Improvised Explosive
Device)
Abu Sayyaf
Hamas
FARC (Armed Revolutionary
Forces Colombia)
IRA (Irish Republican Army)
ETA (Euskadi ta Askatasuna)
Basque Separatists
Hezbollah
Tamil Tigers
PLF (Palestine Liberation
Front)
PLO (Palestine Liberation
Organization
Car bomb
Jihad
Taliban
Weapons cache
Suicide bomber
Suicide attack

Suspicious substance
AQAP (AL Qaeda Arabian
Peninsula)
AQIM (Al Qaeda in the
Islamic Maghreb)
TTP (Tehrik-i-Taliban
Pakistan)
Yemen
Pirates
Extremism
Somalia
Nigeria
Radicals
Al-Shabaab
Home grown
Plot
Nationalist
Recruitment
Fundamentalism
Islamist

Weather/Disaster/Emergency

Emergency
Hurricane
Tornado
Twister
Tsunami
Earthquake
Tremor
Flood
Storm
Crest
Temblor
Extreme weather
Forest fire
Brush fire

Ice
Stranded/Stuck
Help
Hail
Wildfire
Tsunami Warning Center
Magnitude
Avalanche
Typhoon
Shelter-in-place
Disaster
Snow
Blizzard
Sleet

Mud slide or Mudslide
Erosion
Power outage
Brown ou
t
Warning
Watch
Lightening
Aid
Relief
Closure
Interstate
Burst
Emergency Broadcast System

Cyber Security

Cyber security
Botnet
DDOS (dedicated denial of
service)
Denial of service
Malware
Virus
Trojan
Keylogger
Cyber Command

2600
Spammer
Phishing
Rootkit
Phreaking
Cain and Abel
Brute forcing
Mysql injection
Cyber attack
Cyber terror

Hacker
China
Conficker
Worm
Scammers
Social media

 

7 Ways That You (Yes, You) Could End Up On A Terrorist Watch List

By Nick Wing

2.6k

93

Earlier this week, The Intercept published a 166-page document outlining the government’s guidelines for placing people on an expansive network of terror watch lists, including the no-fly list. In their report, Jeremy Scahill and Ryan Devereaux highlighted the extremely vague and loosely defined criteria developed by 19 federal agencies, supposedly to fight terrorism.

Using these criteria, government officials have secretly characterized an unknown number of individuals as threats or potential threats to national security. In 2013 alone, 468,749 watch-list nominations were submitted to the National Counterterrorism Center. It rejected only 1 percent of the recommendations.

Critics say the system is bloated and imprecise, needlessly sweeping up thousands of people while simultaneously failing to catch legitimate threats, like Boston Marathon bomber Tamerlan Tsarnaev.

While some individuals are surely placed on these watch lists for valid reasons, the murky language of the guidelines suggests that innocent people can get caught up in this web, too, and be subjected to the same possible restrictions on travel and other forms of monitoring. Here are several ways you could find yourself on a terror watch list, even if you aren’t a terrorist:

1. You could raise “reasonable suspicion” that you’re involved in terrorism. “Irrefutable evidence or concrete facts” are not required.

This guidance addresses how to place people in the broader Terrorist Screening Database (TSDB), of which the no-fly list and the selectee lists — which cover those selected for enhanced screenings before boarding flights — are both subsections.

In determining whether a suspicion about you is “reasonable,” a “nominator” must “rely upon articulable intelligence or information which, taken together with rational inferences from those facts,” can link you to possible terrorism. As Scahill and Devereaux noted, words like “reasonable,” “articulable” and “rational” are not expressly defined. While the document outlines the need for an “objective factual basis,” the next section clarifies that “irrefutable evidence or concrete facts are not necessary” to make a final determination as to whether a suspicion is “reasonable.” So how could intelligence officials be led to put you on the watch list?

2. You could post something on Facebook or Twitter that raises “reasonable suspicion.”

According to the document, “postings on social media sites ... should not be discounted merely because of the manner in which it was received.” Instead, those investigating the individual should “evaluate the credibility of the source” and, if they judge the content to pose a “reasonable suspicion” of a link to terrorism, nominate the person to the watch list, even if that source is “uncorroborated.” If this sounds disturbing, don’t worry: There’s a sentence that explicitly prohibits listing an individual “for engaging solely in constitutionally protected activities.” So as long as your free speech isn’t accompanied by any other “suspicious” behavior, you should be fine, maybe.

3. Or somebody else could just think you’re a potential terror threat.

The guidelines also consider the use of “walk-in” or “write-in” information about potential candidates for the watch list. Nominators are encouraged not to dismiss such tips and, after evaluating “the credibility of the source,” could opt to nominate you to the watch list.

4. You could be a little terrorist-ish, at least according to someone.

The document explains that you could be put on a suspected-terrorist watch list if you are determined to be a “representative” of a terrorist group, even if you have “neither membership in nor association with the organization.” Individuals accused of being involved with a terrorist organization, but who later are acquitted in a court of law or saw their charges dropped, are still potential nominees for watch-listing, so long as “reasonable suspicion” is established.

5. Or you could just know someone terrorist-y, maybe.

Scahill and Devereaux reported that the immediate family of a suspected terrorist — including spouse, children, parents and siblings — may be added to the Terrorist Identities Datamart Environment (TIDE), a broad terror database that feeds into the TSDB, “without any suspicion that they themselves are engaged in terrorist activity.” According to the document, “associates or affiliates” of known or suspected terrorists, or just those somehow “linked to” them, can also be nominated to the TSDB watchlist, so long as the relationship is defined and constitutes a “reasonable suspicion” of a connection to terrorist activity. The document states that “individuals who merely ‘may be’ members, associates or affiliates of a terrorist organization” may not be put into the latter database, unless that suspicion can be backed by “derogatory information.”

But there’s also a more nebulous connection that could prompt your placement in the TIDE database. The document specifically provides for nominating “individuals with a possible nexus to terrorism ... but for whom additional derogatory information is needed to meet the reasonable suspicion standard.”

6. And if you’re in a “category” of people determined to be a threat, your threat status could be “upgraded” at the snap of a finger.

The watch-list guidelines explain a process by which the assistant to the president for homeland security and counterterrorism can move an entire “category of individuals” to an elevated threat status. It’s unclear exactly how these categories are defined, but according to the document, there must be “current and credible intelligence information” suggesting that the group is a particular threat to conduct a terrorist act. Such determinations can be implemented and remain in place for up to 72 hours before a committee convenes to decide whether the watch-list upgrade should be extended.

7. Finally, you could just be unlucky.

The process of adding people to the terror watch lists is as imperfect as the intelligence officials tasked with doing so. There have been reports of “false positives,” or instances in which an innocent passenger has been subject to treatment under a no-fly or selectee list because his or her name was similar to that of another individual. In one highly publicized incident in 2005, a 4-year-old boy was nearly barred from boarding a plane to visit his grandmother.

The watch-list guidance was supposedly revised in part to prevent incidents like these, but with more than 1.5 million people added to the lists in the last five years, mistakes are always inevitable. Just ask Rahinah Ibrahim, a Stanford University student who ended up on a no-fly list in 2004 after an FBI agent accidentally checked the wrong box on a form.

But then if you were to be mistakenly added to a list, you probably wouldn’t know — unless it stopped you from flying. The government has been extremely secretive about the names on the various watch lists. If you were to learn that you were wrongly placed on a watch list, good luck getting off it. As Scahill and Devereaux reported, you can file a complaint with the Department of Homeland Security’s Traveler Redress Inquiry Program, which begins a review “that is not subject to oversight by any court or entity outside the counterterrorism community.”