ArtsAutosBooksBusinessEducationEntertainmentFamilyFashionFoodGamesGenderHealthHolidaysHomeHubPagesPersonal FinancePetsPoliticsReligionSportsTechnologyTravel
  • »
  • Politics and Social Issues»
  • Terrorism

If Everybody Is A Terrorist Then Nobody Is a Terrorist

Updated on August 18, 2016

Guilty Until Proven Innocent

How can you prove yourself innocent if you don't know if you are on the Watchlist? Why is there an exception to the one of the most fundamental and sacred precepts of the United States of America criminal justice system where a person is presumed innocent until proven guilty?

The exceedingly extensive definition of what is 'terrorist activity' coupled with rock-bottom threshold for labeling someone a terrorist is not only unjust but self destructive by wasting vital resources that should be devoted to actual threats.

The Terrorist Identities Datamart Environment (TIDE) is the United States' central repository of information on international terrorist identities. From TIDE it goes into the Federal Bureau of Investigation (FBI) Terrorist Screening Database (TSDB), information that is then shared with law enforcement, foreign governments and other organizations. All without your knowledge, nor any reason given why. Even dead people are placed on the Watchlist.

To cross the line under the Minimum Substantive Derogatory Criteria, the government authority has to meet Reasonable Suspicion - but no actual facts are required. Doublespeak.

Twitter or Facebook posts can and are used as sufficient grounds to be considered a “known or suspected terrorists” (KSTs), for more information on this go to The Secret Government Rulebook For Labeling You a Terrorist, by Jeremy Scahill, Ryan Devereaux
July 23 2014


What Information Is Collected During An Encounter?

The Assassination Complex

From the above paperback version on Page 23 excerpt:

In addition to date like fingerprints, travel itineraries, identification documents, and gun licenses, the rules encourage screener to acquire health insurance information, drug prescriptions, "any cards with an electronic strip on it (hotel cards, grocery cards, gift cards, frequent flyer cards)," cell phones, email addresses, binoculars, peroxide, bank account numbers, pay stubs, academic transcripts, parking and speeding tickets, and want ads.

Continuing onto Page 24:

Screeners are also instructed to collect data on any "pocket litter," scuba gear, EZ Passes, library cards, and book titles, along with information about their condition, "e.g. new, dog-eared, annotated, unopened."


The Source

Watchlist Guidance PDF

According to you are not on the No Fly list if you receive a boarding pass but if an Selectee, additional security screening is required.

The Traveler Redress Inquiry Program (DHS TRIP) can be used to File a Complaint / Apply for Redress

To read more about metadata collection and predictive policing please visit my other hub Data Exhaust where it explains how your digital activity (or the lack of it) may have you appear suspicious.

To learn more of the encroaching limitations of constitutional rights please go to Fourth Amendment Flight



Submit a Comment

No comments yet.