<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
     xmlns:content="http://purl.org/rss/1.0/modules/content/"
     xmlns:wfw="http://wellformedweb.org/CommentAPI/"
     xmlns:dc="http://purl.org/dc/elements/1.1/"
     xmlns:atom="http://www.w3.org/2005/Atom"
     xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
     xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
     xmlns:snf="http://www.smartnews.be/snf"
     xmlns:media="http://search.yahoo.com/mrss/" >

    <channel>
        <title>The Intercept</title>
        <atom:link href="https://theintercept.com/surveillance/feed/" rel="self" type="application/rss+xml" />
        <link>https://theintercept.com/surveillance/</link>
        <description></description>
        <lastBuildDate>Fri, 08 May 2026 00:04:15 +0000</lastBuildDate>
        <language>en-US</language>
                <sy:updatePeriod>hourly</sy:updatePeriod>
        <sy:updateFrequency>1</sy:updateFrequency>
        <generator>https://wordpress.org/?v=6.9.4</generator>
<site xmlns="com-wordpress:feed-additions:1">220955519</site>
            <item>
                <title><![CDATA[The $500,000 GoFundMe Charity Campaign for Wealthy Ex-FBI Official Andrew McCabe Is Obscene]]></title>
                <link>https://theintercept.com/2018/03/31/the-500000-gofundme-charity-campaign-for-wealthy-ex-fbi-official-andrew-mccabe-is-obscene/</link>
                <comments>https://theintercept.com/2018/03/31/the-500000-gofundme-charity-campaign-for-wealthy-ex-fbi-official-andrew-mccabe-is-obscene/#respond</comments>
                <pubDate>Sat, 31 Mar 2018 14:40:44 +0000</pubDate>
                                    <dc:creator><![CDATA[Glenn Greenwald]]></dc:creator>
                                		<category><![CDATA[Democrats]]></category>
		<category><![CDATA[FBI]]></category>
		<category><![CDATA[Media critique]]></category>
		<category><![CDATA[Surveillance]]></category>
		<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[Voices]]></category>

                <guid isPermaLink="false">https://theintercept.com/?p=179766</guid>
                                    <description><![CDATA[<p>In the name of “resistance,” small donors — encouraged by a cable news star — have contributed a vast sum of money online to help a rich career FBI official.</p>
<p>The post <a href="https://theintercept.com/2018/03/31/the-500000-gofundme-charity-campaign-for-wealthy-ex-fbi-official-andrew-mccabe-is-obscene/">The $500,000 GoFundMe Charity Campaign for Wealthy Ex-FBI Official Andrew McCabe Is Obscene</a> appeared first on <a href="https://theintercept.com">The Intercept</a>.</p>
]]></description>
                                        <content:encoded><![CDATA[<p><u>In 2017,</u> more than a half-million human beings — 553,742 of them to be exact — <a href="https://www.theguardian.com/us-news/2017/dec/05/america-homeless-population-2017-official-count-crisis">were homeless in the U.S.</a> for at least some time. Last year was the first since the 2008 financial crisis that America&#8217;s homeless population grew. The 2016 U.S. census <a href="https://poverty.ucdavis.edu/faq/what-current-poverty-rate-united-states">found that</a> 12.7 percent of Americans — which translates to just over 43 million human beings — live below the poverty line. Millions of American children <a href="https://edition.cnn.com/2017/06/09/health/champions-for-change-child-hunger-in-america/index.html">live in hunger</a>: according to <a href="https://www.ers.usda.gov/topics/food-nutrition-assistance/food-security-in-the-us/key-statistics-graphics.aspx#children">a 2015 U.S. Department of Agriculture study</a>, the U.S. has &#8220;13.1 million households with children that often go without food: &#8216;food-insecure households.'&#8221;</p>
<p><!-- BLOCK(photo)[0](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22center%22%2C%22width%22%3A%22540px%22%7D) --><figure class="img-wrap align-center  width-fixed" style="width: 540px;"><!-- CONTENT(photo)[0] --> <a href="https://theintercept.com/wp-content/uploads/2018/03/Screen-Shot-2018-03-31-at-07.53.57-1522493697.png"><img data-recalc-dims="1" height="99999" width="540" decoding="async" class="aligncenter size-article-medium wp-image-179767" src="https://theintercept.com/wp-content/uploads/2018/03/Screen-Shot-2018-03-31-at-07.53.57-1522493697.png?fit=540%2C99999" alt="" /></a> <!-- END-CONTENT(photo)[0] --></figure><!-- END-BLOCK(photo)[0] --><!-- BLOCK(photo)[1](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22center%22%2C%22width%22%3A%22440px%22%7D) --><figure class="img-wrap align-center  width-fixed" style="width: 440px;"><!-- CONTENT(photo)[1] --> <a href="https://theintercept.com/wp-content/uploads/2018/03/usda-1522494395.png"><img decoding="async" class="aligncenter size-thumbnail wp-image-179769" src="https://theintercept.com/wp-content/uploads/2018/03/usda-1522494395-440x411.png" alt="" /></a> <!-- END-CONTENT(photo)[1] --></figure><!-- END-BLOCK(photo)[1] --></p>
<p>Those horrifying statistics are just for the U.S. Extreme human deprivation and suffering is pervasive all over the planet: hundreds of millions of human beings live in unimaginable poverty. According to <a href="https://openknowledge.worldbank.org/bitstream/handle/10986/25078/9781464809583.pdf">the 2016 comprehensive World Bank study</a> on global inequality, &#8220;767 million people are estimated to have been living below the international poverty line of US$1.90 per person per day. Almost 11 people in every 100 in the world, or 10.7 percent of the global population, were poor by this standard.&#8221; There is an &#8220;estimated 780 million illiterate adults worldwide, nearly two-thirds are women.&#8221;</p>
<p><!-- BLOCK(photo)[2](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22right%22%2C%22width%22%3A%22179px%22%7D) --><figure class="img-wrap align-right  width-fixed" style="width: 179px;"><!-- CONTENT(photo)[2] --> <img data-recalc-dims="1" height="300" width="300" decoding="async" class="alignright size-medium wp-image-179773" src="https://theintercept.com/wp-content/uploads/2018/03/Screen-Shot-2018-03-31-at-08.18.02-1522495110.png?fit=300%2C300" alt="" /> <!-- END-CONTENT(photo)[2] --></figure><!-- END-BLOCK(photo)[2] -->Although roughly half of the world&#8217;s poor live in sub-Saharan Africa, they are found in large numbers on every continent on the planet (see chart, right). Close to a billion people lack basic plumbing; <a href="https://www.theguardian.com/global-development-professionals-network/2015/jul/01/global-access-clean-water-sanitation-mapped">according to</a> the Guardian in 2015, &#8220;around the world, 946 million people still go to the toilet outside.&#8221; <a href="https://www.theguardian.com/global-development/2016/apr/27/millions-children-dying-preventable-diseases-immunisation-programme">Millions of children</a> all over the world, and <a href="http://www.latimes.com/science/sciencenow/la-sci-sn-preventable-causes-of-death-united-states-20140501-story.html">hundreds of thousands of people in the U.S.</a>, die every year from treatable diseases due to lack of available medical care.</p>
<p>The World Health Organization <a href="http://www.who.int/mediacentre/news/releases/2017/water-sanitation-hygiene/en/">found in July of last year</a> that &#8220;some 3 in 10 people worldwide, or 2.1 billion, lack access to safe, readily available water at home, and 6 in 10, or 4.5 billion, lack safely managed sanitation.&#8221; If one adds in non-human animals — from abandoned, starving pets to industrial systemic cruelty toward farm animals — the amount of deprivation and poverty-caused suffering in the world is virtually endless.</p>
<p>Actual charities in the U.S., non-profits that provide critical services to their communities, have been plagued by extreme financial difficulties for years. In January, the Journal Sentinel, citing a new report, <a href="https://www.jsonline.com/story/news/2018/01/22/u-s-nonprofits-deliver-crucial-human-services-dire-financial-condition/1051567001/">explained that</a> &#8220;the financial health of the nation’s community-based organizations — or CBOs — is increasingly precarious.&#8221;</p>
<p>Large numbers of Americans lack the ability to secure basic legal representation even when charged with serious crimes. One major reason that the U.S. imprisons more people than any other country in the world — both in terms of absolute numbers and proportionally — is that legal aid services <a href="https://www.theguardian.com/us-news/2016/sep/07/public-defender-us-criminal-justice-system">have been continually slashed</a> to the point where poor people and even those who are lower-middle-class have little chance of having competent, zealous representation, because of how overworked public defenders are.</p>
<p>As a result of these severe financial constraints in the legal system, citizens are often forced to plead guilty and accept prison terms because it&#8217;s their only viable option. As the <a href="https://www.theguardian.com/us-news/2016/sep/07/public-defender-us-criminal-justice-system">Guardian wondered</a> in 2016: &#8220;How many of the 30 defendants present for a single &#8216;mass plea&#8217; hearing in Louisiana’s 16th judicial district in June would have pleaded not guilty if they’d had more than 20 seconds of legal counsel?&#8221;</p>
<p><u>In the midst</u> of all of this need, struggle, misery and deprivation, a just-created online charity fund is enjoying massive success and an extraordinary outpouring of donations from small donors. It has become one of the most successful pages on the popular GoFundMe site: <a href="https://www.gofundme.com/andrewmccabelegaldefensefund">a campaign to raise money</a> for former acting FBI Director Andrew McCabe (pictured, above, next to Attorney General Jeff Sessions last year). Created just 48 hours ago with the goal of raising $250,000 for McCabe&#8217;s &#8220;legal defense fund,&#8221; it has already doubled that amount — to over $500,000 — and shows no sign of slowing down, as donations continue to pour in as of publication of this article.</p>
<!-- BLOCK(photo)[3](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22center%22%2C%22width%22%3A%221024px%22%7D) --><figure class="img-wrap align-center  width-fixed" style="width: 1024px;"><!-- CONTENT(photo)[3] --> <a href="https://theintercept.com/wp-content/uploads/2018/03/mccabe-1522496502.png"><img data-recalc-dims="1" height="1024" width="1024" decoding="async" class="aligncenter size-large wp-image-179776" src="https://theintercept.com/wp-content/uploads/2018/03/mccabe-1522496502.png?fit=1024%2C1024" alt="" /></a> <!-- END-CONTENT(photo)[3] --></figure><!-- END-BLOCK(photo)[3] -->
<p>The funds will be used for his attorneys&#8217; fees for various legal fights he faces. Those courtroom battles relate to a report from the Justice Department&#8217;s Office of the Inspector General which recommended that McCabe&#8217;s be fired <a href="http://www.businessinsider.com/andrew-mccabe-firing-shakes-fbi-but-was-not-unreasonable-2018-3">after its investigators found</a> that he repeatedly and deliberately lied to the FBI about his role in various leaks. Any amounts left over from this fund will be donated to a non-profit group designated by McCabe.</p>
<p>The original impetus for a charity drive for McCabe seems to have come from Silicon Valley investor Jason Calacanis, who two weeks ago <a href="https://twitter.com/Jason/status/974846163831570435">announced on Twitter</a> that, at the age of 47, he finally got motivated by someone&#8217;s suffering to create his <a href="https://www.gofundme.com/gqaky4-andrew-mccabe-pension-fund"><em>very first ever</em> GoFundMe campaign</a>: one designed to raise funds that would go to McCabe personally. Calacanis ultimately announced he was terminating the campaign and would transfer the modest funds he received to the new fund drive for McCabe&#8217;s legal defense.</p>
<p>That new charity campaign received a huge boost yesterday when MSNBC&#8217;s beloved-by-Democrats host Rachel Maddow <a href="https://twitter.com/maddow/status/979469170273374208">tweeted a link</a> to the new GoFundMe campaign for McCabe to her 9.4 million followers. At the time of Maddow&#8217;s tweet — which has now been re-tweeted by 4,000 people and &#8220;liked&#8221; by another 11,000 — McCabe&#8217;s fund had $100,000. Less than 24 hours after Maddow&#8217;s viral tweet, the <a href="https://www.nbcnews.com/politics/politics-news/gofundme-page-fired-fbi-no-2-mccabe-legal-defense-fund-n861581">amount quintupled to a half-million dollars</a>.</p>
<!-- BLOCK(photo)[4](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22center%22%2C%22width%22%3A%221024px%22%7D) --><figure class="img-wrap align-center  width-fixed" style="width: 1024px;"><!-- CONTENT(photo)[4] --> <a href="https://theintercept.com/wp-content/uploads/2018/03/maddowcomb-1522506311.jpg"><img data-recalc-dims="1" height="1024" width="1024" decoding="async" class="aligncenter size-large wp-image-179807" src="https://theintercept.com/wp-content/uploads/2018/03/maddowcomb-1522506311.jpg?fit=1024%2C1024" alt="" /></a> <!-- END-CONTENT(photo)[4] --></figure><!-- END-BLOCK(photo)[4] -->
<p>So here&#8217;s the nation&#8217;s 14th highest-paid TV star, just behind Blake Shelton of The Voice and the stars of Grey&#8217;s Anatomy, who earns <a href="http://www.eonline.com/photos/13181/top-tv-star-salaries-you-won-t-believe-who-s-no-1/402466">at least $7 million per year</a> from her Comcast salary alone (i.e, beyond her book and appearance income), successfully encouraging small donors who follow and watch her to charitably donate their money to a rich federal police officer who is married to a doctor and who lives in an extremely expensive home in the the richest county of the world&#8217;s wealthiest nation.</p>
<p>The next time you&#8217;re feeling pessimistic about the nature of humanity, just reflect on this touching act of compassion and empathy for the needy. By the way, the now-closed <a href="https://www.theguardian.com/us-news/2018/mar/30/stephon-clark-shooting-death-police-autopsy-latest">GoFundMe campaign</a> for the family of Stephon Clark — the 22-year-old father of two young children who, while he was unarmed after he ran to his grandmother&#8217;s backyard, was <a href="https://www.theguardian.com/us-news/2018/mar/30/stephon-clark-shooting-death-police-autopsy-latest">gunned down</a> by Sacramento Police with seven bullets in his back, while he took 10 minutes to die as the police officers who shot him did not call for medical help &#8212; generated $83,000 in donations, or 1/7 of what has been raised (thus far) for McCabe.</p>
<p><u>So who exactly</u> is the recipient of this extraordinary public charity? McCabe has <a href="https://www.cnbc.com/2016/09/26/andrew-mccabe.html">spent his career</a> working at the FBI. He began working on organized crime investigations but switched to &#8220;counterterrorism&#8221; work as part of the 17-year-old U.S. &#8220;War on Terror.&#8221; He rose to the position of Deputy Director of the FBI under Jim Comey, where he worked on both the investigation into election-related hacking as well as the criminal investigation of Hillary Clinton for her private email server. It was in connection with those investigations that he was accused by the Inspector General of leaking secret information to the media and then lying about it to FBI officials.</p>
<p>By all metrics, McCabe and his family are financially secure; a more accurate term for them would be &#8220;quite wealthy.&#8221; As Splinter&#8217;s Paul Blest <a href="https://splinternews.com/andrew-mccabe-does-not-need-your-money-1824195062">documented</a> — in an article accurately entitled &#8220;Andrew McCabe Does Not Need Your Money&#8221; — his &#8220;average salary between 2015 and 2017, when he was in the senior leadership of the FBI, was over $157,000.&#8221; That income figure for McCabe does not count the income earned by McCabe&#8217;s wife, who is a <a href="http://www.drjillmccabe.com/meet-jill">highly accomplished medical doctor</a> with multiple sources of income.</p>
<p>McCabe&#8217;s FBI salary alone put his family in the <a href="https://dqydj.com/united-states-income-brackets-percentiles/">top 4-5 percentile</a> of income for all Americans. An <a href="https://www.factcheck.org/2018/03/andrew-mccabes-net-worth/">analysis by FactCheck.org</a> of financial disclosures forms he filed <a href="https://cdn.factcheck.org/UploadedFiles/McCabe-OGE-form-278.pdf">found that</a>, beyond that salary, &#8220;McCabe has several mutual fund accounts, including 529 college savings accounts and a 401K retirement fund, with the total value of those investment accounts ranging from $287,000 to $880,000.&#8221; While his firing significantly reduced the value of his pension (which would have been $1.8 million had he retired as scheduled: $60,000 per year until the 50-year-old McCabe died), he <a href="https://www.forbes.com/sites/ebauer/2018/03/17/no-andrew-mccabe-isnt-losing-his-pension/#236c0740236d">still will receive some pension benefits</a>.</p>
<p>According to public property records, the McCabes purchased their Northern Virginia home in 2006 for a price of $715,000, which means it&#8217;s <a href="https://nvar.com/realtors/news/re-view-magazine/article/sep-oct-2017/2017-09-10-market-metrics-home-sales-prices-continue-to-skyrocket">worth far more than that now,</a> as real state prices in that region have skyrocketed. Indeed, the McCabes&#8217; home almost doubled in value from 2003, when it was sold to the prior owners, to 2006, when the McCabes purchased it. The expensive house in which the McCabes reside is located in Loudoun County, which, according to the <a href="https://wtop.com/loudoun-county/2017/07/loudoun-dubbed-richest-county-america-census-bureau/">latest Census Bureau report</a>, is the <a href="https://www.forbes.com/sites/rebeccalerner/2017/07/13/top-10-richest-counties-in-america-2017/#226a85962ef3">single richest county</a> in the entire United States.</p>
<!-- BLOCK(photo)[5](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22center%22%2C%22width%22%3A%221000px%22%7D) --><figure class="img-wrap align-center  width-fixed" style="width: 1000px;"><!-- CONTENT(photo)[5] --> <a href="https://theintercept.com/wp-content/uploads/2018/04/loudown-county-1522683970.jpg"><img data-recalc-dims="1" height="99999" width="1000" decoding="async" class="aligncenter size-article-large wp-image-179937" src="https://theintercept.com/wp-content/uploads/2018/04/loudown-county-1522683970.jpg?fit=1000%2C99999" alt="" /></a> <!-- END-CONTENT(photo)[5] --></figure><!-- END-BLOCK(photo)[5] -->
<p>And this is all independent of the massive private-sector wealth that is almost certainly making its way to McCabe as you read these words. Given the <a href="https://www.nytimes.com/2018/03/19/books/james-comey-book-higher-loyalty.html">massive pre-publication success</a> and anticipated blockbuster status of the forthcoming book by Jim Comey (just by the way, for other MSNBC hosts who may be considering promoting a GoFundMe campaign for Comey: he&#8217;s <a href="http://politicalticker.blogs.cnn.com/2013/07/08/fbi-nominee-reports-net-worth-tops-11-million/">worth $11 million</a> and received a $3 million payout from a hedge fund when he was confirmed as FBI Director), it is a virtual certainty that publishing houses will be competing to pay a hefty advance to McCabe for a tell-all book of his own, particularly given <a href="http://time.com/5204337/andrew-mccabe-kept-memos-on-interactions-with-president-trump-report/">news that he kept notes</a> on his conversations with President Trump. A cable news contract also seems likely given how many <a href="https://www.politico.com/magazine/story/2018/02/06/john-brennan-james-claper-michael-hayden-former-cia-media-216943">U.S. security state officials are hired by MSNBC and CNN</a>.</p>
<p><u>Beyond the current and future wealth</u> of the McCabe family, what makes this outpouring of charity for him so noxious is the work he&#8217;s spent his adult life doing. For many years, McCabe has<a href="http://www.executivegov.com/2013/10/andrew-mccabe-appointed-fbi-natl-security-branch-lead/"> gone to work</a> every day in a building that actually — and appropriately — bears the name of J. Edgar Hoover.</p>
<!-- BLOCK(photo)[6](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22center%22%2C%22width%22%3A%221024px%22%7D) --><figure class="img-wrap align-center  width-fixed" style="width: 1024px;"><!-- CONTENT(photo)[6] --> <a href="https://theintercept.com/wp-content/uploads/2018/03/AP_17334589263505-1522503304.jpg"><img data-recalc-dims="1" height="1024" width="1024" decoding="async" class="aligncenter size-large wp-image-179800" src="https://theintercept.com/wp-content/uploads/2018/03/AP_17334589263505-1522503304.jpg?fit=1024%2C1024" alt="The Pennsylvania Avenue entrance of the J. Edgar Hoover Federal Bureau of Investigations (FBI) Building is seen in Washington, Thursday, Nov. 30, 2017. (AP Photo/Carolyn Kaster)" /></a>
<figcaption class="caption source">The Pennsylvania Avenue entrance of the J. Edgar Hoover Federal Bureau of Investigations (FBI) Building is seen in Washington, Thursday, Nov. 30, 2017. (AP Photo/Carolyn Kaster)<br/>AP</figcaption><!-- END-CONTENT(photo)[6] --></figure><!-- END-BLOCK(photo)[6] -->
<p>The recipient of this GoFundMe campaign spent much of the last two decades as a senior official of an agency that has long been <a href="https://theintercept.com/2015/03/16/howthefbicreatedaterrorist/">aggressively entrapping</a> <a href="https://www.buzzfeed.com/peteraldhous/fbi-entrapment?utm_term=.rcaK4naQVK#.dyA95eLjw9">young</a> and <a href="https://theintercept.com/2015/02/26/fbi-manufacture-plots-terrorism-isis-grave-threats/">mentally unstable</a> <a href="https://www.motherjones.com/politics/2011/07/fbi-terrorist-informants/">Muslims</a>, got <a href="http://www.washingtonpost.com/wp-dyn/content/article/2010/01/18/AR2010011803982_pf.html">caught repeatedly</a> and <a href="https://www.aclu.org/news/fbi-illegally-gathered-phone-records-and-misused-national-security-letters">systematically breaking the law</a> in spying on Americans, <a href="https://www.aclu.org/other/more-about-fbi-spying">has been</a> &#8220;using race and ethnicity in conducting assessments and investigations,&#8221; <a href="https://theintercept.com/2014/07/09/under-surveillance/">spied on</a> Muslim-American political leaders and scholars, and <a href="https://www.wired.com/2009/09/fbi-nsac/">secretly maintained a mass surveillance program</a> with &#8220;more than 1.5 billion government and private-sector records about citizens and foreigners, the documents show, bringing the government closer than ever to implementing the &#8216;Total Information Awareness&#8217; system first dreamed up by the Pentagon in the days following the Sept. 11 attacks.&#8221; Just a few months ago, the agency McCabe helped run <a href="https://www.nytimes.com/2017/11/15/opinion/black-identity-extremism-fbi-trump.html">got caught creating</a> a special program to target black and Muslim activists in the U.S.</p>
<!-- BLOCK(photo)[7](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22center%22%2C%22width%22%3A%22540px%22%7D) --><figure class="img-wrap align-center  width-fixed" style="width: 540px;"><!-- CONTENT(photo)[7] --> <a href="https://theintercept.com/wp-content/uploads/2018/03/fbiaclu-1522506968.png"><img data-recalc-dims="1" height="99999" width="540" decoding="async" class="aligncenter size-article-medium wp-image-179808" src="https://theintercept.com/wp-content/uploads/2018/03/fbiaclu-1522506968.png?fit=540%2C99999" alt="" /></a> <!-- END-CONTENT(photo)[7] --></figure><!-- END-BLOCK(photo)[7] -->
<p>In one sense, this is just the latest chapter in the bizarre and infinitely ironic spectacle of Democrats venerating security state agencies such as the CIA, NSA and FBI under the banner of &#8220;resistance.&#8221; Canonizing law enforcement agents and intelligence operatives most definitely makes this history&#8217;s strangest rendition of &#8220;resistance,&#8221; a term that — until Democrats <a href="https://www.vox.com/policy-and-politics/2016/11/10/13576488/democratic-party-smoking-pile-rubble">after 2016 desperately needed a re-branding campaign</a> — had been reserved for dissidents who bravely risked imprisonment and even death fighting to subvert, not sanctify, state security agencies that perform those functions.</p>
<p>But a charity campaign fueled by a multi-millionaire cable news host, for the benefit of a rich federal police official, is not just bizarre but obscene. If one wants to protest the tragic plight of Andrew McCabe, there are many ways to do that aside from encouraging people to donate money to his legal battles.</p>
<p>For anyone who works with people who are actually suffering and deprived, or who falls into the huge category of humans who experience that suffering and deprivation, or who lacks legal representation because of poverty, or who has been victimized by the FBI&#8217;s abuses and lawlessness, watching this public campaign direct a tidal wave of money to someone like McCabe is really nothing short of nauseating.</p>
<p>The post <a href="https://theintercept.com/2018/03/31/the-500000-gofundme-charity-campaign-for-wealthy-ex-fbi-official-andrew-mccabe-is-obscene/">The $500,000 GoFundMe Charity Campaign for Wealthy Ex-FBI Official Andrew McCabe Is Obscene</a> appeared first on <a href="https://theintercept.com">The Intercept</a>.</p>
]]></content:encoded>
                                <wfw:commentRss>https://theintercept.com/2018/03/31/the-500000-gofundme-charity-campaign-for-wealthy-ex-fbi-official-andrew-mccabe-is-obscene/feed/</wfw:commentRss>
                <slash:comments>0</slash:comments>
                <media:content url='https://theintercept.com/wp-content/uploads/2018/03/AP_17201538285543-1522507156.jpg?fit=3680%2C2922' width='3680' height='2922' /><post-id xmlns="com-wordpress:feed-additions:1">179766</post-id>
		<media:thumbnail url="https://theintercept.com/wp-content/uploads/2018/03/Screen-Shot-2018-03-31-at-07.53.57-1522493697.png?w=440&amp;h=440&amp;crop=1" />
		<media:content url="https://theintercept.com/wp-content/uploads/2018/03/Screen-Shot-2018-03-31-at-07.53.57-1522493697.png?fit=828%2C259" medium="image">
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2018/03/Screen-Shot-2018-03-31-at-07.53.57-1522493697.png?w=440&amp;h=440&amp;crop=1" />
		</media:content>
		<media:content url="https://theintercept.com/wp-content/uploads/2018/03/usda-1522494395.png?fit=447%2C411" medium="image">
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2018/03/usda-1522494395.png?w=440&amp;h=440&amp;crop=1" />
		</media:content>
		<media:content url="https://theintercept.com/wp-content/uploads/2018/03/Screen-Shot-2018-03-31-at-08.18.02-1522495110.png?fit=261%2C437" medium="image">
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2018/03/Screen-Shot-2018-03-31-at-08.18.02-1522495110.png?w=440&amp;h=440&amp;crop=1" />
		</media:content>
		<media:content url="https://theintercept.com/wp-content/uploads/2018/03/mccabe-1522496502.png?fit=1165%2C648" medium="image">
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2018/03/mccabe-1522496502.png?w=440&amp;h=440&amp;crop=1" />
		</media:content>
		<media:content url="https://theintercept.com/wp-content/uploads/2018/03/maddowcomb-1522506311.jpg?fit=1807%2C813" medium="image">
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2018/03/maddowcomb-1522506311.jpg?w=440&amp;h=440&amp;crop=1" />
		</media:content>
		<media:content url="https://theintercept.com/wp-content/uploads/2018/04/loudown-county-1522683970.jpg?fit=1000%2C838" medium="image">
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2018/04/loudown-county-1522683970.jpg?w=440&amp;h=440&amp;crop=1" />
		</media:content>
		<media:content url="https://theintercept.com/wp-content/uploads/2018/03/AP_17334589263505-1522503304.jpg?fit=5233%2C3334" medium="image">
			<media:title type="html">FBI</media:title>
			<media:description type="html">The Pennsylvania Avenue entrance of the J. Edgar Hoover Federal Bureau of Investigations (FBI) Building is seen in Washington, Thursday, Nov. 30, 2017. (AP Photo/Carolyn Kaster)</media:description>
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2018/03/AP_17334589263505-1522503304.jpg?w=440&amp;h=440&amp;crop=1" />
		</media:content>
		<media:content url="https://theintercept.com/wp-content/uploads/2018/03/fbiaclu-1522506968.png?fit=980%2C805" medium="image">
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2018/03/fbiaclu-1522506968.png?w=440&amp;h=440&amp;crop=1" />
		</media:content>
            </item>
        
            <item>
                <title><![CDATA[Dutch Official Admits Lying About Meeting With Putin: Is Fake News Used by Russia or About Russia?]]></title>
                <link>https://theintercept.com/2018/02/12/dutch-official-admits-lying-about-meeting-with-putin-is-fake-news-used-by-russia-or-about-russia/</link>
                <comments>https://theintercept.com/2018/02/12/dutch-official-admits-lying-about-meeting-with-putin-is-fake-news-used-by-russia-or-about-russia/#respond</comments>
                <pubDate>Mon, 12 Feb 2018 13:43:28 +0000</pubDate>
                                    <dc:creator><![CDATA[Glenn Greenwald]]></dc:creator>
                                		<category><![CDATA[Brexit]]></category>
		<category><![CDATA[Democrats]]></category>
		<category><![CDATA[ISIS]]></category>
		<category><![CDATA[Media critique]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[Surveillance]]></category>
		<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[United Kingdom]]></category>
		<category><![CDATA[Voices]]></category>

                <guid isPermaLink="false">https://theintercept.com/?p=170946</guid>
                                    <description><![CDATA[<p>As a film studio revitalizes a once-successful super-villain franchise for a new generation of moviegoers, we're back to Russia occupying center stage.</p>
<p>The post <a href="https://theintercept.com/2018/02/12/dutch-official-admits-lying-about-meeting-with-putin-is-fake-news-used-by-russia-or-about-russia/">Dutch Official Admits Lying About Meeting With Putin: Is Fake News Used by Russia or About Russia?</a> appeared first on <a href="https://theintercept.com">The Intercept</a>.</p>
]]></description>
                                        <content:encoded><![CDATA[<p><u>Every empire needs</u> a scary external threat, led by a singular menacing villain, to justify its massive military expenditures, consolidation of authoritarian powers, and endless wars. For the five decades after the end of World War II, Moscow played this role perfectly. But the fall of Soviet Union meant, at least for a while, that the Kremlin could no longer sustain sufficient fear levels. After some brief, largely unsuccessful auditions for possible replacements &#8212; Asian actors <a href="http://www.weeklystandard.com/a-national-humiliation/article/12603">like China</a> and <a href="http://www.businessinsider.com/japans-eighties-america-buying-spree-2014-9">a splurging Japan</a> were considered &#8212; the post-9/11 era elevated a cast of Muslim understudies to the starring role: Al Qaeda and Osama bin Laden, ISIS and Abu Bakr al-Baghdadi, and &#8220;jihadism&#8221; generally kept fear alive.</p>
<p>The lack of any 9/11-type catastrophic attack on U.S. (or any Western) soil for the past 17 years, along with the killing of a pitifully aged, ailing bin Laden and the erosion of ISIS, has severely compromised their ongoing viability as major bad guys. So now &#8212; just as a film studio revitalizes a once-successful super-villain franchise for a new generation of moviegoers &#8212; we&#8217;re back to the Russians occupying center stage.</p>
<p>That Barack Obama spent eight years (including up through his final year-end news conference) mocking the notion that Russia posed a serious threat to the U.S. given their size and capabilities, and that he <a href="https://theintercept.com/2016/09/09/whats-behind-obamas-ongoing-accommodation-of-vladimir-putin/">even tried repeatedly to accommodate and partner with</a> Russian President Vladimir Putin, is of no concern: In the internet age, &#8220;2016&#8221; is regarded as ancient history, drowned out by an endless array of new threats pinned by a united media on the Russkie Plague. Moreover, human nature craves a belief in an existential foreign threat because it confers a sense of purpose and cause, strengthens tribal unity and identity, permits scapegoating, shifts blame for maladies from internal to external causes, and (like religion) offers a simplifying theory for understanding a complex world.</p>
<p>One of the prime accusations sustaining this script is that the Kremlin is drowning the West in &#8220;fake news&#8221; and other forms of propaganda. One can debate its impact and magnitude, but disinformation campaigns are something the U.S., Russia, and countless other nations have done to one another for centuries, and there is <a href="https://www.nytimes.com/2015/06/07/magazine/the-agency.html">convincing evidence</a> that Russia does this sort of thing now. But evidence of one threat does not mean that all claimed threats are real, nor does it mean that that tactic is exclusively wielded by one side.</p>
<p>Over the past year, there have been numerous claims made by Western intelligence agencies, mindlessly accepted as true in the Western press, that have turned out to be baseless, if not deliberate scams. Just today, it <a href="https://www.nytimes.com/aponline/2018/02/12/world/europe/ap-eu-netherlands-foreign-minister.html">was revealed</a> that Dutch Foreign Minister Halbe Zijlstra lied when he claimed he was at a meeting with Putin, in which the Russian president &#8220;said he considered Belarus, Ukraine and the Baltic states as part of a &#8216;Greater Russia.'&#8221;</p>
<!-- BLOCK(photo)[0](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22center%22%2C%22width%22%3A%22540px%22%7D) --><figure class="img-wrap align-center  width-fixed" style="width: 540px;"><!-- CONTENT(photo)[0] --> <a href="https://theintercept.com/wp-content/uploads/2018/02/lying-1518438886.png"><img data-recalc-dims="1" height="99999" width="540" decoding="async" class="aligncenter size-article-medium wp-image-170964" src="https://theintercept.com/wp-content/uploads/2018/02/lying-1518438886.png?fit=540%2C99999" alt="" /></a> <!-- END-CONTENT(photo)[0] --></figure><!-- END-BLOCK(photo)[0] -->
<p>&#8220;Fake news&#8221; is certainly something to worry about when it emanates from foreign adversaries, but it is at least as concerning and threatening, if not more so, when emanating from one&#8217;s own governments and media. And there are countless, highly significant examples beyond today&#8217;s of such propaganda that emanates from within.</p>
<h3>Russian Interference in Brexit Vote</h3>
<p><a href="https://www.theguardian.com/world/2018/jan/10/russian-influence-brexit-vote-detailed-us-senate-report">The Guardian, January 10, 2018</a>:</p>
<!-- BLOCK(photo)[1](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22center%22%2C%22width%22%3A%22540px%22%7D) --><figure class="img-wrap align-center  width-fixed" style="width: 540px;"><!-- CONTENT(photo)[1] --> <a href="https://theintercept.com/wp-content/uploads/2018/02/brexit-1518437231.png"><img data-recalc-dims="1" height="99999" width="540" decoding="async" class="aligncenter size-article-medium wp-image-170956" src="https://theintercept.com/wp-content/uploads/2018/02/brexit-1518437231.png?fit=540%2C99999" alt="" /></a> <!-- END-CONTENT(photo)[1] --></figure><!-- END-BLOCK(photo)[1] -->
<p><a href="https://www.reuters.com/article/us-britain-eu-youtube/youtube-found-no-evidence-of-russian-interference-in-brexit-referendum-idUSKBN1FS2AQ">Reuters, February 8, 2018</a>:</p>
<!-- BLOCK(photo)[2](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22center%22%2C%22width%22%3A%22540px%22%7D) --><figure class="img-wrap align-center  width-fixed" style="width: 540px;"><!-- CONTENT(photo)[2] --> <a href="https://theintercept.com/wp-content/uploads/2018/02/youtube-1518437340.png"><img data-recalc-dims="1" height="99999" width="540" decoding="async" class="aligncenter size-article-medium wp-image-170957" src="https://theintercept.com/wp-content/uploads/2018/02/youtube-1518437340.png?fit=540%2C99999" alt="" /></a> <!-- END-CONTENT(photo)[2] --></figure><!-- END-BLOCK(photo)[2] -->
<h3>Russians Responsible for #ReleaseTheMemo Campaign</h3>
<p><a href="https://www.usatoday.com/story/tech/news/2018/01/22/russian-twitter-accounts-push-releasethememo-conservative-meme-researchers-say/1053315001/">Associated Press, January 22, 2018</a>:</p>
<!-- BLOCK(photo)[3](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22center%22%2C%22width%22%3A%22540px%22%7D) --><figure class="img-wrap align-center  width-fixed" style="width: 540px;"><!-- CONTENT(photo)[3] --> <a href="https://theintercept.com/wp-content/uploads/2018/02/release-1518437529.png"><img data-recalc-dims="1" height="99999" width="540" decoding="async" class="aligncenter size-article-medium wp-image-170958" src="https://theintercept.com/wp-content/uploads/2018/02/release-1518437529.png?fit=540%2C99999" alt="" /></a> <!-- END-CONTENT(photo)[3] --></figure><!-- END-BLOCK(photo)[3] -->
<p><a href="https://www.thedailybeast.com/source-twitter-pins-releasethememo-on-republicans-not-russia?source=twitter&amp;via=mobile">Daily Beast, January 23, 2018</a>:</p>
<!-- BLOCK(photo)[4](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22center%22%2C%22width%22%3A%22540px%22%7D) --><figure class="img-wrap align-center  width-fixed" style="width: 540px;"><!-- CONTENT(photo)[4] --> <a href="https://theintercept.com/wp-content/uploads/2018/02/dbhash-1518437692.png"><img data-recalc-dims="1" height="99999" width="540" decoding="async" class="aligncenter size-article-medium wp-image-170959" src="https://theintercept.com/wp-content/uploads/2018/02/dbhash-1518437692.png?fit=540%2C99999" alt="" /></a> <!-- END-CONTENT(photo)[4] --></figure><!-- END-BLOCK(photo)[4] -->
<h3>Russian Interference in German Elections</h3>
<p><a href="https://www.reuters.com/article/us-germany-election-russia/germany-says-expecting-russian-effort-to-influence-election-idUSKBN19P1FK">Reuters, July 4, 2017</a>:</p>
<!-- BLOCK(photo)[5](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22center%22%2C%22width%22%3A%22540px%22%7D) --><figure class="img-wrap align-center  width-fixed" style="width: 540px;"><!-- CONTENT(photo)[5] --> <img data-recalc-dims="1" height="99999" width="540" decoding="async" class="aligncenter size-article-medium wp-image-170947" src="https://theintercept.com/wp-content/uploads/2018/02/german1-1518434488.png?fit=540%2C99999" alt="" /> <!-- END-CONTENT(photo)[5] --></figure><!-- END-BLOCK(photo)[5] -->
<p><a href="https://www.nytimes.com/2017/09/21/world/europe/german-election-russia.html">New York Times, September 21, 2017</a>:</p>
<p><!-- BLOCK(photo)[6](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22center%22%2C%22width%22%3A%22540px%22%7D) --><figure class="img-wrap align-center  width-fixed" style="width: 540px;"><!-- CONTENT(photo)[6] --> <a href="https://theintercept.com/wp-content/uploads/2018/02/german2-1518434674.png"><img data-recalc-dims="1" height="99999" width="540" decoding="async" class="aligncenter size-article-medium wp-image-170948" src="https://theintercept.com/wp-content/uploads/2018/02/german2-1518434674.png?fit=540%2C99999" alt="" /></a> <!-- END-CONTENT(photo)[6] --></figure><!-- END-BLOCK(photo)[6] --><!-- BLOCK(photo)[7](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22center%22%2C%22width%22%3A%22540px%22%7D) --><figure class="img-wrap align-center  width-fixed" style="width: 540px;"><!-- CONTENT(photo)[7] --> <a href="https://theintercept.com/wp-content/uploads/2018/02/german4-1518437034.png"><img data-recalc-dims="1" height="99999" width="540" decoding="async" class="aligncenter size-article-medium wp-image-170955" src="https://theintercept.com/wp-content/uploads/2018/02/german4-1518437034.png?fit=540%2C99999" alt="" /></a> <!-- END-CONTENT(photo)[7] --></figure><!-- END-BLOCK(photo)[7] --></p>
<h3>Russians Hacked Macron Campaign:</h3>
<p><a href="http://www.telegraph.co.uk/news/2017/05/05/macron-campaign-blasts-massive-hacking-attack-ahead-french-presidential/">Telegraph, May 6, 2017</a>:</p>
<!-- BLOCK(photo)[8](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22center%22%2C%22width%22%3A%22540px%22%7D) --><figure class="img-wrap align-center  width-fixed" style="width: 540px;"><!-- CONTENT(photo)[8] --> <a href="https://theintercept.com/wp-content/uploads/2018/02/telegraph-1518438460.png"><img data-recalc-dims="1" height="99999" width="540" decoding="async" class="aligncenter size-article-medium wp-image-170961" src="https://theintercept.com/wp-content/uploads/2018/02/telegraph-1518438460.png?fit=540%2C99999" alt="" /></a> <!-- END-CONTENT(photo)[8] --></figure><!-- END-BLOCK(photo)[8] -->
<p><a href="https://www.usnews.com/news/world/articles/2017-06-01/the-latest-putin-says-attempts-to-contain-russia-wont-work">Associated Press, June 1, 2017</a>:</p>
<!-- BLOCK(photo)[9](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22center%22%2C%22width%22%3A%22540px%22%7D) --><figure class="img-wrap align-center  width-fixed" style="width: 540px;"><!-- CONTENT(photo)[9] --> <a href="https://theintercept.com/wp-content/uploads/2018/02/aphack-1518438632.png"><img data-recalc-dims="1" height="99999" width="540" decoding="async" class="aligncenter size-article-medium wp-image-170962" src="https://theintercept.com/wp-content/uploads/2018/02/aphack-1518438632.png?fit=540%2C99999" alt="" /></a> <!-- END-CONTENT(photo)[9] --></figure><!-- END-BLOCK(photo)[9] -->
<!-- BLOCK(photo)[10](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22center%22%2C%22width%22%3A%22540px%22%7D) --><figure class="img-wrap align-center  width-fixed" style="width: 540px;"><!-- CONTENT(photo)[10] --> <a href="https://theintercept.com/wp-content/uploads/2018/02/aphack1-1518438670.png"><img data-recalc-dims="1" height="99999" width="540" decoding="async" class="aligncenter size-article-medium wp-image-170963" src="https://theintercept.com/wp-content/uploads/2018/02/aphack1-1518438670.png?fit=540%2C99999" alt="" /></a> <!-- END-CONTENT(photo)[10] --></figure><!-- END-BLOCK(photo)[10] -->
<p>And this is all independent of <a href="https://theintercept.com/2017/09/28/yet-another-major-russia-story-falls-apart-is-skepticism-permissible-yet/">all those cases</a> when the U.S. media was forced to retract, or issue humiliating editor&#8217;s notes, about stories regarding the &#8220;Russian threat&#8221; that turned out to be false. Even in those cases in which some evidence can be found suggesting that some &#8220;Russians&#8221; were engaged online in support for a particular cause, the size and impact of it is usually so minute as to be laughable. In response to months of demands and threats to Twitter from the U.K. government to investigate how its service was used by Russians to support the Brexit referendum, Twitter &#8212; to satisfy mounting complaints &#8212; <a href="https://www.engadget.com/2018/02/08/twitter-49-russian-accounts-sway-brexit-vote/">finally came up with this</a>:</p>
<!-- BLOCK(photo)[11](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22center%22%2C%22width%22%3A%22540px%22%7D) --><figure class="img-wrap align-center  width-fixed" style="width: 540px;"><!-- CONTENT(photo)[11] --> <a href="https://theintercept.com/wp-content/uploads/2018/02/twitterbrex-1518440084.png"><img data-recalc-dims="1" height="99999" width="540" decoding="async" class="aligncenter size-article-medium wp-image-170965" src="https://theintercept.com/wp-content/uploads/2018/02/twitterbrex-1518440084.png?fit=540%2C99999" alt="" /></a> <!-- END-CONTENT(photo)[11] --></figure><!-- END-BLOCK(photo)[11] -->
<p>For the six decades of the miserable Cold War, those Americans who tried to argue that the Russian threat was being exaggerated for nefarious ends and who advocated for better relations between Washington and Moscow were branded as &#8220;traitors,&#8221; Kremlin apologists, or at best, &#8220;useful idiots.&#8221; The revitalization of Russia as prime villain has also given new life to those old right-wing tactics, though this time wielded by the same people who were once its targets:</p>
<!-- BLOCK(photo)[12](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22center%22%2C%22width%22%3A%22197px%22%7D) --><figure class="img-wrap align-center  width-fixed" style="width: 197px;"><!-- CONTENT(photo)[12] --> <a href="https://theintercept.com/wp-content/uploads/2018/02/charen4-1518441655.png"><img data-recalc-dims="1" height="300" width="300" decoding="async" class="aligncenter size-medium wp-image-170970" src="https://theintercept.com/wp-content/uploads/2018/02/charen4-1518441655.png?fit=300%2C300" alt="" /></a> <!-- END-CONTENT(photo)[12] --></figure><!-- END-BLOCK(photo)[12] -->
<p>But the reason this matters so much &#8212; this coordinated devotion to once again depicting Russia as a grave threat &#8212; is because of the serious, enduring policy implications. New Democratic Party star Joseph Kennedy III is following in the footsteps of his Cold Warrior ancestors by <a href="https://kennedy.house.gov/media/press-releases/kennedy-intros-bill-to-create-russian-response-center">proposing</a> massive new military, propaganda, and cybersecurity programs to combat the Russian threat. Senators such as <a href="http://thehill.com/policy/cybersecurity/322002-dem-senator-we-should-determine-if-russian-election-hacking-was-act-of">Democrat Jeanne Shaheen</a> and <a href="https://edition.cnn.com/2016/12/30/politics/mccain-cyber-hearing/index.html">Republican John McCain</a> routinely refer to &#8220;acts of war&#8221; when discussing U.S.-Russia relations. British generals and <a href="https://www.thesun.co.uk/news/5402297/british-army-chief-sir-nick-carter-warns-war-with-vladimir-putins-russia-could-happen-sooner-than-we-expect/">tabloids</a> are <a href="https://edition.cnn.com/2018/01/22/europe/uk-warning-russian-aggression-intl/index.html">hyping the Russian threat</a> beyond all measure of reason in their quest to obtain new weapons systems and increased military spending at the expense of austerity-battered British subjects.</p>
<!-- BLOCK(photo)[13](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22center%22%2C%22width%22%3A%22540px%22%7D) --><figure class="img-wrap align-center  width-fixed" style="width: 540px;"><!-- CONTENT(photo)[13] --> <a href="https://theintercept.com/wp-content/uploads/2018/02/sun-1518441923.png"><img data-recalc-dims="1" height="99999" width="540" decoding="async" class="aligncenter size-article-medium wp-image-170971" src="https://theintercept.com/wp-content/uploads/2018/02/sun-1518441923.png?fit=540%2C99999" alt="" /></a> <!-- END-CONTENT(photo)[13] --></figure><!-- END-BLOCK(photo)[13] -->
<!-- BLOCK(photo)[14](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22center%22%2C%22width%22%3A%221000px%22%7D) --><figure class="img-wrap align-center  width-fixed" style="width: 1000px;"><!-- CONTENT(photo)[14] --> <a href="https://theintercept.com/wp-content/uploads/2018/02/etra-1518441956.png"><img data-recalc-dims="1" height="99999" width="1000" decoding="async" class="aligncenter size-article-large wp-image-170972" src="https://theintercept.com/wp-content/uploads/2018/02/etra-1518441956.png?fit=1000%2C99999" alt="" /></a> <!-- END-CONTENT(photo)[14] --></figure><!-- END-BLOCK(photo)[14] -->
<p>If there&#8217;s any lesson that should unite everyone in the West, it&#8217;s that the greatest skepticism is required when it comes to government and media claims about the nature of foreign threats. If we&#8217;re going to rejuvenate a Cold War, or submit to greater military spending and government powers in the name of stopping alleged Russian aggression, we should at least ensure that the information on which those campaigns succeed are grounded in fact. Even a casual review of the propaganda spewing forth from Western power centers over the last year leaves little doubt that the exact opposite is happening.</p>
<p class="caption">Top photo: The Dutch minister of foreign affairs Halbe Zijlstra speaks during a joint press conference with the German minister of foreign affairs Sigmar Gabriel at the ministry of foreign affairs in Berlin, Germany, 16 November 2017.</p>
<p>The post <a href="https://theintercept.com/2018/02/12/dutch-official-admits-lying-about-meeting-with-putin-is-fake-news-used-by-russia-or-about-russia/">Dutch Official Admits Lying About Meeting With Putin: Is Fake News Used by Russia or About Russia?</a> appeared first on <a href="https://theintercept.com">The Intercept</a>.</p>
]]></content:encoded>
                                <wfw:commentRss>https://theintercept.com/2018/02/12/dutch-official-admits-lying-about-meeting-with-putin-is-fake-news-used-by-russia-or-about-russia/feed/</wfw:commentRss>
                <slash:comments>0</slash:comments>
                <media:content url='https://theintercept.com/wp-content/uploads/2018/02/Halbe-Zijlstra-1518452557.jpg?fit=4712%2C2356' width='4712' height='2356' /><post-id xmlns="com-wordpress:feed-additions:1">170946</post-id>
		<media:thumbnail url="https://theintercept.com/wp-content/uploads/2018/02/lying-1518438886.png?w=440&amp;h=440&amp;crop=1" />
		<media:content url="https://theintercept.com/wp-content/uploads/2018/02/lying-1518438886.png?fit=837%2C560" medium="image">
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2018/02/lying-1518438886.png?w=440&amp;h=440&amp;crop=1" />
		</media:content>
		<media:content url="https://theintercept.com/wp-content/uploads/2018/02/brexit-1518437231.png?fit=926%2C696" medium="image">
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2018/02/brexit-1518437231.png?w=440&amp;h=440&amp;crop=1" />
		</media:content>
		<media:content url="https://theintercept.com/wp-content/uploads/2018/02/youtube-1518437340.png?fit=737%2C635" medium="image">
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2018/02/youtube-1518437340.png?w=440&amp;h=440&amp;crop=1" />
		</media:content>
		<media:content url="https://theintercept.com/wp-content/uploads/2018/02/release-1518437529.png?fit=774%2C477" medium="image">
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2018/02/release-1518437529.png?w=440&amp;h=440&amp;crop=1" />
		</media:content>
		<media:content url="https://theintercept.com/wp-content/uploads/2018/02/dbhash-1518437692.png?fit=750%2C464" medium="image">
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2018/02/dbhash-1518437692.png?w=440&amp;h=440&amp;crop=1" />
		</media:content>
		<media:content url="https://theintercept.com/wp-content/uploads/2018/02/german1-1518434488.png?fit=746%2C546" medium="image">
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2018/02/german1-1518434488.png?w=440&amp;h=440&amp;crop=1" />
		</media:content>
		<media:content url="https://theintercept.com/wp-content/uploads/2018/02/german2-1518434674.png?fit=726%2C641" medium="image">
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2018/02/german2-1518434674.png?w=440&amp;h=440&amp;crop=1" />
		</media:content>
		<media:content url="https://theintercept.com/wp-content/uploads/2018/02/german4-1518437034.png?fit=824%2C289" medium="image">
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2018/02/german4-1518437034.png?w=440&amp;h=440&amp;crop=1" />
		</media:content>
		<media:content url="https://theintercept.com/wp-content/uploads/2018/02/telegraph-1518438460.png?fit=621%2C792" medium="image">
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2018/02/telegraph-1518438460.png?w=440&amp;h=440&amp;crop=1" />
		</media:content>
		<media:content url="https://theintercept.com/wp-content/uploads/2018/02/aphack-1518438632.png?fit=904%2C436" medium="image">
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2018/02/aphack-1518438632.png?w=440&amp;h=440&amp;crop=1" />
		</media:content>
		<media:content url="https://theintercept.com/wp-content/uploads/2018/02/aphack1-1518438670.png?fit=668%2C267" medium="image">
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2018/02/aphack1-1518438670.png?w=440&amp;h=440&amp;crop=1" />
		</media:content>
		<media:content url="https://theintercept.com/wp-content/uploads/2018/02/twitterbrex-1518440084.png?fit=664%2C504" medium="image">
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2018/02/twitterbrex-1518440084.png?w=440&amp;h=440&amp;crop=1" />
		</media:content>
		<media:content url="https://theintercept.com/wp-content/uploads/2018/02/charen4-1518441655.png?fit=224%2C341" medium="image">
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2018/02/charen4-1518441655.png?w=440&amp;h=440&amp;crop=1" />
		</media:content>
		<media:content url="https://theintercept.com/wp-content/uploads/2018/02/sun-1518441923.png?fit=644%2C755" medium="image">
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2018/02/sun-1518441923.png?w=440&amp;h=440&amp;crop=1" />
		</media:content>
		<media:content url="https://theintercept.com/wp-content/uploads/2018/02/etra-1518441956.png?fit=1021%2C685" medium="image">
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2018/02/etra-1518441956.png?w=440&amp;h=440&amp;crop=1" />
		</media:content>
            </item>
        
            <item>
                <title><![CDATA[Republicans Have Four Easy Ways to #ReleaseTheMemo — and the Evidence for It. Not Doing So Will Prove Them to Be Shameless Frauds.]]></title>
                <link>https://theintercept.com/2018/01/19/republicans-have-four-easy-ways-to-releasethememo-and-the-evidence-for-it-not-doing-so-will-prove-them-to-be-shameless-frauds/</link>
                <comments>https://theintercept.com/2018/01/19/republicans-have-four-easy-ways-to-releasethememo-and-the-evidence-for-it-not-doing-so-will-prove-them-to-be-shameless-frauds/#respond</comments>
                <pubDate>Fri, 19 Jan 2018 21:23:23 +0000</pubDate>
                                    <dc:creator><![CDATA[Glenn Greenwald]]></dc:creator>
                                    <dc:creator><![CDATA[Jon Schwarz]]></dc:creator>
                                		<category><![CDATA[Chelsea Manning]]></category>
		<category><![CDATA[CIA]]></category>
		<category><![CDATA[Donald Trump]]></category>
		<category><![CDATA[Edward Snowden]]></category>
		<category><![CDATA[FBI]]></category>
		<category><![CDATA[FISA Court]]></category>
		<category><![CDATA[Surveillance]]></category>
		<category><![CDATA[Uncategorized]]></category>

                <guid isPermaLink="false">https://theintercept.com/?p=166799</guid>
                                    <description><![CDATA[<p>If the FISA memo and underlying evidence prove pervasive criminality and abuse of power, then why isn't the GOP letting the public see it?</p>
<p>The post <a href="https://theintercept.com/2018/01/19/republicans-have-four-easy-ways-to-releasethememo-and-the-evidence-for-it-not-doing-so-will-prove-them-to-be-shameless-frauds/">Republicans Have Four Easy Ways to #ReleaseTheMemo — and the Evidence for It. Not Doing So Will Prove Them to Be Shameless Frauds.</a> appeared first on <a href="https://theintercept.com">The Intercept</a>.</p>
]]></description>
                                        <content:encoded><![CDATA[<p><u>One of the</u> gravest and most damaging abuses of state power is to misuse surveillance authorities for political purposes. For that reason, The Intercept, from its inception, has focused extensively on these issues.</p>
<p>We therefore regard as inherently serious strident warnings from public officials alleging that the FBI and Department of Justice have abused their spying power for political purposes. Social media last night and today have been flooded with inflammatory and quite dramatic claims now being made by congressional Republicans about a <a href="http://www.foxnews.com/politics/2018/01/18/gop-lawmakers-demand-alarming-memo-on-fisa-abuses-be-made-public.html">four-page memo</a> alleging abuses of Foreign Intelligence Surveillance Act spying processes during the 2016 election. This memo, which remains secret, was reportedly written under the direction of the chair of the House Permanent Select Committee on Intelligence, GOP Rep. Devin Nunes, and has been read by dozens of members of Congress after the committee voted to make the memo available to all members of the House of Representatives to examine in a room specially designated for reviewing classified material.</p>
<p>The rhetoric issuing from GOP members who read the memo is notably extreme. North Carolina Republican Rep. Mark Meadows, chair of the House Freedom Caucus, <a href="http://www.foxnews.com/politics/2018/01/18/gop-lawmakers-demand-alarming-memo-on-fisa-abuses-be-made-public.html">called the memo</a> “troubling” and “shocking” and said, “Part of me wishes that I didn&#8217;t read it because I don’t want to believe that those kinds of things could be happening in this country that I call home and love so much.” GOP Rep. Scott Perry of Pennsylvania stated: “You think about, ‘Is this happening in America or is this the KGB?’ That&#8217;s how alarming it is.”</p>
<p>This has led to a ferocious outcry on the right to “<a href="https://twitter.com/search?q=%23releasethememo&amp;src=typd">release the memo</a>” – and presumably thereby prove that the Obama administration conducted unlawful surveillance on the Trump campaign and transition. On Thursday night, Fox News host and stalwart Trump ally Sean Hannity <a href="http://insider.foxnews.com/2018/01/18/sean-hannity-monologue-memo-fisa-surveillance-shows-abuse-power-bigger-watergate">claimed</a> that the memo described “the systematic abuse of power, the weaponizing of those powerful tools of intelligence and the shredding of our Fourth Amendment constitutional rights.”</p>
<p>Given the significance of this issue, it is absolutely true that the memo should be declassified and released to the public — and not just the memo itself. The House Intelligence Committee generally and Nunes specifically have a history of making unreliable and untrue claims (its report about Edward Snowden was full of falsehoods, as Bart Gellman <a href="https://tcf.org/content/commentary/house-intelligence-committees-terrible-horrible-bad-snowden-report/">amply documented</a>, and prior claims from Nunes about &#8220;unmasking&#8221; have <a href="http://edition.cnn.com/2017/04/11/politics/intelligence-contradicts-nunes-unmasking-claims/index.html">been discredited</a>). Thus, mere assertions from Nunes &#8212; or anyone else &#8212; are largely worthless; Republicans should provide American citizens not merely with the memo they claim reveals pervasive criminality and abuse of power, but also with <em>all of the evidence underlying its conclusions. </em></p>
<p>President Donald Trump and congressional Republicans have the power, working together or separately, to immediately declassify all the relevant information. And if indeed the GOP’s explosive claims are accurate – if, as HPSCI member Steve King, R-Iowa, says, this is “worse than Watergate” — they obviously have every incentive to get it into the public&#8217;s hands as soon as possible. Indeed, one could argue that they have the <em>duty</em> to do so.</p>
<p>On the other hand, if the GOP&#8217;s claims are false or significantly misleading – if they are, with the deepest cynicism imaginable, simply using these crucial issues to whip up their base or discredit the Mueller investigation, or exaggerating or making claims that lack any evidentiary support, or trying to have the best of all worlds by making explosive claims about the memo but never having to prove their truth &#8212; then they will either not release the memo or they will release it without any supporting documentation, making it impossible for Americans to judge its accuracy for themselves.</p>
<p>Anyone who is genuinely concerned about the claims being made about eavesdropping abuses should understand why the issue of evidence is so critical. After all, the House, Senate, and FBI investigations into any Trump collusion with Russia have so far proceeded with many startling claims in the media, but to date little hard evidence for the public to judge. Nobody rational should be assuming any claims or assertions from partisan actors about the 2016 election are true without seeing evidence to substantiate those claims.</p>
<p>The good news is there are at least four easy ways for congressional Republicans and/or Trump to definitively prove that all the right’s darkest suspicions about the Obama administration are true. If this memo and the underlying documents prove even a fraction of what GOP politicians and media figures are claiming about them, then what could possibly justify its ongoing concealment? Any or all of these methods should be promptly invoked to ensure that the public sees this evidence:</p>
<h3>1. Trump can declassify anything he wants.</h3>
<p>All classification by the U.S. government has no basis in laws passed by Congress (with <a href="https://fas.org/sgp/library/quist/chap_4.pdf">one tiny exception</a> that is irrelevant here). Rather, all classification is based on presidential executive orders, which rely on the president’s constitutional role as commander in chief of the armed forces. <a href="https://books.google.com/books?id=w_fiIQ20AIQC&amp;lpg=PA15&amp;ots=yxv7u8B89o&amp;dq=%22authority%20to%20classify%20and%20control%20access%20to%20information%20bearing%20on%20national%20security%22&amp;pg=PA15#v=onepage&amp;q=%22authority%20to%20classify%20and%20con">According to the Supreme Court</a>, the presidential power “to classify and control access to information bearing on national security … flows primarily from the constitutional investment of power in the president.”</p>
<p>That means presidents can also <em>declassify</em> anything they chose to &#8212; for any reason or no reason &#8212; as they have done in the past. George W. Bush, under pressure in 2004, <a href="http://nsarchive.gwu.edu/NSAEBB/NSAEBB116/">declassified</a> the section of the 2001 presidential daily brief headlined “Bin Laden Determined to Strike in U.S.” Barack Obama declassified the <a href="http://www.nytimes.com/2009/04/17/us/politics/17detain.html">Justice Department memos</a> produced during the Bush presidency on the legality of torture.</p>
<p>Thus if the House Intelligence Committee merely releases a version of its memo without the supporting documentation, that won’t be just because they don’t want Americans to see it – it will be because Trump doesn’t want us to see it either. Note that GOP House members are insistent that releasing the memo and the underlying source material would not remotely harm national security:</p>
<p><!-- BLOCK(oembed)[0](%7B%22componentName%22%3A%22OEMBED%22%2C%22entityType%22%3A%22EMBED%22%7D)(%7B%22embedHtml%22%3A%22%3Cblockquote%20class%3D%5C%22twitter-tweet%5C%22%20data-width%3D%5C%22550%5C%22%20data-dnt%3D%5C%22true%5C%22%3E%3Cp%20lang%3D%5C%22en%5C%22%20dir%3D%5C%22ltr%5C%22%3EReleasing%20this%20classified%20info%20doesn%26%2339%3Bt%20compromise%20good%20sources%20%26amp%3B%20methods.%20It%20reveals%20the%20feds%26%2339%3B%20reliance%20on%20bad%20sources%20%26amp%3B%20methods.%3C%5C%2Fp%3E%26mdash%3B%20Lee%20Zeldin%20%28%40LeeMZeldin%29%20%3Ca%20href%3D%5C%22https%3A%5C%2F%5C%2Ftwitter.com%5C%2FLeeMZeldin%5C%2Fstatus%5C%2F954103149287170048%3Fref_src%3Dtwsrc%255Etfw%5C%22%3EJanuary%2018%2C%202018%3C%5C%2Fa%3E%3C%5C%2Fblockquote%3E%3Cscript%20async%20src%3D%5C%22https%3A%5C%2F%5C%2Fplatform.twitter.com%5C%2Fwidgets.js%5C%22%20charset%3D%5C%22utf-8%5C%22%3E%3C%5C%2Fscript%3E%22%2C%22endpoint%22%3A%22https%3A%5C%2F%5C%2Fpublish.twitter.com%5C%2Foembed%22%2C%22type%22%3A%22unknown%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Ftwitter.com%5C%2FRepLeeZeldin%5C%2Fstatus%5C%2F954103149287170048%22%7D) --></p>
<blockquote class="twitter-tweet" data-width="550" data-dnt="true">
<p lang="en" dir="ltr">Releasing this classified info doesn&#39;t compromise good sources &amp; methods. It reveals the feds&#39; reliance on bad sources &amp; methods.</p>
<p>&mdash; Lee Zeldin (@LeeMZeldin) <a href="https://twitter.com/LeeMZeldin/status/954103149287170048?ref_src=twsrc%5Etfw">January 18, 2018</a></p></blockquote>
<p><script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script><!-- END-BLOCK(oembed)[0] --></p>
<p>So what possible justification is there for Trump to continue to conceal this alleged evidence of massive criminality from the American people by hiding it behind &#8220;classified&#8221; designations? Indeed, it is illegal to abuse classified designations to hide evidence of official criminality: so not only <i>can</i> Trump declassify such evidence, one could argue that he <em>must</em>, or at least should.</p>
<h3>2. The House (and Senate) intelligence committees can declassify any material they possess.</h3>
<p>According to the procedural rules of both houses of Congress, their intelligence committees <a href="https://fas.org/sgp/crs/secrecy/RS21900.pdf">can declassify material</a> in their possession if the committee votes that such declassification would be in the public interest. It is then declassified after five days unless the president formally objects. If the president does object, the full chamber votes on the question.</p>
<p>It is true that – in a measure of how embarrassingly deferential Congress is to the executive branch – neither the House nor the Senate intelligence committees has ever utilized this power, so it’s impossible to know how this gambit would play out in practice. But if Trump refused to release proof of the Obama administration’s misdeeds, congressional Republicans should have a straightforward way to overrule him.</p>
<h3>3. The Constitution protects members of Congress from prosecution for “any speech or debate in either House.”</h3>
<p>Members of Congress have legal immunity for acts they commit as part of the legislative process. Article I, Section 6, clause 1 of the Constitution states that “for any speech or debate in either House, [Senators and Representatives] shall not be questioned in any other place.” It is this constitutional shield that <a href="https://fas.org/sgp/crs/misc/R42648.pdf">protected Sen. Mike Gravel of Alaska from legal consequences</a> in 1971 when he read sections of the Pentagon Papers during a meeting of the Senate Subcommittee on Public Buildings and Grounds, and then placed the rest of the Pentagon Papers into the Congressional Record.</p>
<p>It’s true that members could face legal consequences for ancillary acts — perhaps if they unlawfully removed the relevant material from the congressional SCIF. But they could go to the House floor and describe both the memo&#8217;s revelations and the underlying evidence for it without any fear of legal consequences.</p>
<p>If the memo really proves what they claim, it would seem to be their patriotic duty would compel them do this. Ordinary citizens &#8212; like Daniel Ellsberg, Edward Snowden, and Chelsea Manning &#8212; have risked prison in order to expose what they believed were serious official crimes; these members of Congress can do this without any of those consequences. So what justifies their failure to do this?</p>
<h3>4. Republicans can leak everything to the news media.</h3>
<p>If for some reason Trump and the congressional leadership refuse to use any of the above options to vindicate themselves, a brave member of Congress could turn whistleblower and transmit the classified proof of the GOP’s claims about the memo to the news media.</p>
<p>Many outlets now have secure methods of sending sensitive material to them, such as Secure Drop. Those for The Intercept can be found <a href="https://theintercept.com/source/">here</a>. (All leaking entails risks, as we describe in our manual for whistleblowers.)</p>
<p>So that’s that. All Americans, particularly conservatives, should ask every Republican making spectacular assertions about this memo when they will be using the above ways to conclusively demonstrate that everything they’ve said is based in rock-solid fact.</p>
<p>If they do not, Republicans will conclusively demonstrate something else. They will prove conclusively that all of this is about them shamelessly making claims they do not actually believe, fraudulently posturing as caring about one of the most vital, fundamental issues facing the United States: how the U.S. government uses the vast surveillance powers with which it has been vested.</p>
<p class="caption">Top photo: The official seal of the FBI is seen on an iPhone&#8217;s camera screen outside the J. Edgar Hoover headquarters in Washington, on Feb. 23, 2016.</p>
<p>The post <a href="https://theintercept.com/2018/01/19/republicans-have-four-easy-ways-to-releasethememo-and-the-evidence-for-it-not-doing-so-will-prove-them-to-be-shameless-frauds/">Republicans Have Four Easy Ways to #ReleaseTheMemo — and the Evidence for It. Not Doing So Will Prove Them to Be Shameless Frauds.</a> appeared first on <a href="https://theintercept.com">The Intercept</a>.</p>
]]></content:encoded>
                                <wfw:commentRss>https://theintercept.com/2018/01/19/republicans-have-four-easy-ways-to-releasethememo-and-the-evidence-for-it-not-doing-so-will-prove-them-to-be-shameless-frauds/feed/</wfw:commentRss>
                <slash:comments>0</slash:comments>
                <media:content url='https://theintercept.com/wp-content/uploads/2017/04/fbi-nsa-terror-cases-aclu-1492723786.jpg?fit=2000%2C1000' width='2000' height='1000' /><post-id xmlns="com-wordpress:feed-additions:1">166799</post-id>
            </item>
        
            <item>
                <title><![CDATA[Watch How Casually False Claims Are Published: New York Times and Nicholas Lemann Edition]]></title>
                <link>https://theintercept.com/2017/01/10/watch-how-casually-false-claims-are-published-nyt-and-nicholas-lemann-edition/</link>
                <comments>https://theintercept.com/2017/01/10/watch-how-casually-false-claims-are-published-nyt-and-nicholas-lemann-edition/#comments</comments>
                <pubDate>Tue, 10 Jan 2017 11:31:24 +0000</pubDate>
                                    <dc:creator><![CDATA[Glenn Greenwald]]></dc:creator>
                                		<category><![CDATA[Edward Snowden]]></category>
		<category><![CDATA[Media critique]]></category>
		<category><![CDATA[NSA]]></category>
		<category><![CDATA[Surveillance]]></category>
		<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[Voices]]></category>

                <guid isPermaLink="false">https://theintercept.com/?p=105114</guid>
                                    <description><![CDATA[<p>The Paper of Record publishes a claim it knows to be false about the Snowden reporting. Why?</p>
<p>The post <a href="https://theintercept.com/2017/01/10/watch-how-casually-false-claims-are-published-nyt-and-nicholas-lemann-edition/">Watch How Casually False Claims Are Published: New York Times and Nicholas Lemann Edition</a> appeared first on <a href="https://theintercept.com">The Intercept</a>.</p>
]]></description>
                                        <content:encoded><![CDATA[<p><u>Like most people,</u> I&#8217;ve long known that factual falsehoods are routinely published in major media outlets. But as I&#8217;ve pointed out before, nothing makes you internalize just how often it really happens, how completely their editorial standards so often fail, like being personally involved in a story that receives substantial media coverage. I cannot count how many times I&#8217;ve read or heard claims from major media outlets about the Snowden story that I knew, from firsthand knowledge, were a total fabrication.</p>
<p>We have a perfect example of how this happens from the New York Times today, in <a href="http://www.nytimes.com/2017/01/09/books/review/is-edward-snowden-a-spy-a-new-book-calls-him-one.html">a book review</a> by Nicholas Lemann, the Pulitzer-Moore professor of journalism at Columbia University as well as a longtime staff writer for the New Yorker. Lemann is reviewing a new book by Edward J. Epstein &#8212; the longtime neocon, right-wing Cold Warrior, WSJ op-ed page writer, and <a href="http://www.breitbart.com/author/edward-jay-epstein/">Breitbart contributor</a> &#8212; which basically claims Snowden is a Russian spy.</p>
<p>The book has been widely discredited even before its release as it is filled with demonstrable lies. The usually rhetorically restrained Bart Gellman, whose work on the Snowden story at the Washington Post won the 2014 Pulitzer Prize for Public Service, <a href="https://twitter.com/bartongellman/status/815672306169212929">called the book</a> &#8220;bad faith work&#8221; that is filled with &#8220;distortions&#8221; and &#8220;baseless and bizarro claims,&#8221; several of which he documented. I&#8217;ve <a href="https://twitter.com/ggreenwald/status/815895876656922624">documented</a> some of the other obvious falsehoods in the book.</p>
<p>Suffice to say, so fringe is Epstein&#8217;s conspiracy claim that <a href="https://twitter.com/ggreenwald/status/815896444657930240">even top NSA</a> and <a href="https://twitter.com/ggreenwald/status/815896376391372800">CIA officials</a> &#8212; who despise Snowden and have repeatedly attempted to disparage him &#8212; have rejected the book&#8217;s central conspiracy theory that Snowden has worked with the Kremlin. In 2014, Epstein, citing what he claimed a government official told him &#8220;off the record,&#8221; <a href="http://www.wsj.com/articles/SB10001424052702304831304579542402390653932">wrote my favorite sentence</a> about this whole affair, one that I often quoted in my speeches to great audience laughter: &#8220;There are only three possible explanations for the Snowden heist: 1) It was a Russian espionage operation; 2) It was a Chinese espionage operation; or 3) It was a joint Sino-Russian operation.&#8221; He&#8217;s apparently now opted for Door No. 1.</p>
<p>Lemann himself is highly dismissive of the book&#8217;s central accusations about Snowden and does a perfectly fine job of explaining how the book provides no convincing evidence for its key conspiracies:</p>
<blockquote><p>Epstein proves none of this. &#8220;How America Lost Its Secrets&#8221; is an impressively fluffy and golden-brown wobbly soufflé of speculation, full of anonymous sourcing and suppositional language like &#8220;it seems plausible to believe&#8221; or &#8220;it doesn’t take a great stretch of the imagination to conclude.&#8221;</p></blockquote>
<p>Lemann&#8217;s review is worth reading to see what a farce this book is, and especially &#8212; for all those authoritarian liberal New Cold Warriors tempted to embrace the book because it smears Snowden as a Russian operative &#8212; to understand who Epstein is and the ideological agenda to which he&#8217;s long been devoted.</p>
<p>&nbsp;</p>
<p><u>Nonetheless, there is</u> one statement in Lemann&#8217;s review that is misleading in the extreme and another that is so blatantly, factually false that it&#8217;s mind-boggling it got approved by a NYT editor and, presumably, a fact-checker. But it is worth looking at because it illustrates how easily this happens. Here&#8217;s the first one:</p>
<blockquote><p>Snowden, Julian Assange of WikiLeaks, and their immediate circle of allies come from a radically libertarian hacker culture that, most of the time, doesn’t believe there should be an NSA at all, whether or not it remains within the confines of its legal charter.</p></blockquote>
<p>Though ambiguous about who exactly it is describing, this passages strongly implies that Snowden &#8220;doesn’t believe there should be an NSA at all.&#8221; Snowden believes nothing of the kind. In fact, he believes exactly the opposite: that the NSA performs a vital function and many of its programs are legitimate and important. He has said this over and over. That&#8217;s why he wanted to work for the agency. It&#8217;s why he refused to dump all the documents he took and instead gave them to journalists, <a href="http://billmoyers.com/2014/03/11/our-chat-with-edward-snowdens-legal-counsel/">demanding that they only publish</a> those that <a href="https://twitter.com/ggreenwald/status/715323533824548864?lang=en">exposed information necessary to inform the public debate</a>: precisely because he did not want to destroy NSA programs he believes are justifiable.</p>
<p>It&#8217;s unclear who Lemann means by Snowden&#8217;s &#8220;immediate circle of allies,&#8221; but I personally have never heard anyone who qualifies as such express the cartoon view Lemann has manufactured here. What I&#8217;ve heard from both Snowden and his &#8220;immediate circle of allies&#8221; has been quite consistent: that &#8212; as is true of all countries &#8212; it is legitimate for NSA to engage in <em>targeted surveillance</em> (i.e., monitoring specific individuals whom a court, based on evidence, concludes are legitimate targets) but inherently illegitimate to engage in <a href="https://www.theguardian.com/world/2013/jun/06/nsa-phone-records-verizon-court-order">suspicion-less <em>mass surveillance</em></a> (i.e., <a href="https://www.theguardian.com/commentisfree/2013/jul/07/nsa-brazilians-globo-spying">subjecting entire populations</a> to monitoring). Everything Snowden has said and done is the antithesis of this absolutist abolish-the-NSA view Lemann concocted (indeed, Snowden has been harshly criticized by actual radicals for being too protective and supportive of NSA&#8217;s functions, as have the journalists who worked with him for refusing to dump the whole archive).</p>
<p>But while that passage from Lemann is misleading, his final paragraph is outright false as a clear factual matter:</p>
<blockquote><p>This time around, [Epstein&#8217;s] concern seems to be half with the celebratory closed loop between Snowden and the journalists who covered him, and half with the causes and consequences of a major security breach at the NSA. The heart of the matter is the second of these concerns, not the first. In the Snowden affair, the press didn’t decide what stayed secret, and neither did Congress, the White House or the NSA. Snowden did.</p></blockquote>
<p>This is the exact opposite of the truth. It is a fundamentally false description of what happened. Most amazingly, the New York Times knows firsthand that this claim it just published is false because of its direct involvement in reporting the Snowden archive.</p>
<p>Not a single document that saw the light of day was published because Snowden decided it should be: literally not one. Snowden <a href="https://theintercept.com/2014/03/23/facts-nsa-stories-reported/">played no decision-making role whatsoever</a> in determining which documents were published and which were withheld. What happened was exactly the opposite of what Lemann told New York Times readers: It was the press, not Snowden, that decided what stayed secret and what was reported.</p>
<p>After giving the journalists with whom he worked the documents and asking them to withhold those that could harm innocent people or destroy legitimate programs, Snowden lost all ability to control what was and was not published. As is true of most leaks &#8212; from the routine to the spectacular &#8212; those publishing decisions rested solely in the hands of the media outlets and their teams of reporters, editors, and lawyers. Every Snowden document ever published was published by a media outlet with teams of professionals, which means that not one Snowden document was ever published without multiple reporters, editors, and lawyers jointly deciding that the public interest was served by its publication.</p>
<p>The New York Times knows firsthand that Lemann&#8217;s claim is false because that paper possessed a large portion of the Snowden archive and published all of its stories without ever obtaining Snowden&#8217;s permission. Indeed, Snowden at times vehemently disagreed with the decisions made by the NYT and other outlets to publish certain material.</p>
<p>As Snowden <a href="http://poy.time.com/2013/12/11/runner-up-edward-snowden-the-dark-prophet/4/">told Time</a>: &#8220;There have of course been some stories where my calculation of what is not public interest differs from that of reporters, but it is for this precise reason that publication decisions were entrusted to journalists and their editors.&#8221; As the ACLU&#8217;s Ben Wizner, who represents Snowden, <a href="http://billmoyers.com/2014/03/11/our-chat-with-edward-snowdens-legal-counsel/">explained</a>: &#8220;He didn’t want and didn&#8217;t think that he should have the responsibility to decide which of these documents should be public.&#8221; Anyone who has even casually followed this story knows this was the journalist-driven process that determined which documents got published.</p>
<p>&nbsp;</p>
<p><u>Ironically,</u> the most controversial Snowden stories &#8212; the type <a href="http://www.slate.com/articles/news_and_politics/war_stories/2016/09/what_snowden_gets_wrong_about_its_hero.html">his critics cite</a> as the ones that should not have been published because they exposed sensitive national security secrets &#8212; were often the ones the NYT itself decided to publish, such as <a href="https://www.nytimes.com/2014/03/23/world/asia/nsa-breached-chinese-servers-seen-as-spy-peril.html?hp">its very controversial exposé</a> on how NSA spied on China&#8217;s Huawei. It was the NYT&#8217;s David Sanger and Nicole Perlroth and their editors &#8212; not Snowden &#8212; who decided that this program should be exposed. That same dynamic drove every story based on Snowden documents.</p>
<p>Even if one wants to argue that Snowden bears some moral responsibility for exposure of this program by virtue of having made these documents available to news outlets, it is undeniably true &#8212; to reverse Lemann&#8217;s formulation &#8212; that Snowden didn’t decide what stayed secret. The press did. As the ACLU&#8217;s Wizner <a href="https://twitter.com/benwizner/status/818557927975976965">put it simply</a> about Lemann&#8217;s review: &#8220;The last lines are just false.&#8221;</p>
<p>(One great irony highlights this dynamic: In September, Perlroth &#8212; after exploiting Snowden&#8217;s leaks for her own benefit &#8212; <a href="https://twitter.com/nicoleperlroth/status/777904463012962304">argued</a> that her own source should <em>not</em> be pardoned on the ground that he leaked documents &#8220;that had nothing to do with privacy violations.&#8221; But it was <em>she</em>, Nicole Perlroth &#8212; not Snowden &#8212; who decided to expose, on the front page of the NYT, the NSA&#8217;s spying activities on Huawei.)</p>
<p>How can the New York Times allow Lemann to make such a blatantly false claim about how this reporting took place and who made the decisions about what should and should not be secret? One of the great benefits of new media &#8212; of online reporting &#8212; is that one can provide proof of one&#8217;s claims in the form of links (as I&#8217;ve done here), so that readers can determine if journalistic claims have evidentiary support. That is such a vital exercise because, as Lemann and the NYT just demonstrated, it is so often the case that the most influential media outlets publish factually false statements using the most authoritative tones. This episode illustrates yet again why everyone is well-advised not to believe assertions from any authority or institution that are unaccompanied by evidence you can see and evaluate for yourself.</p>
<p>* * * * *</p>
<p>As is true of many enduring news stories, there are several zombie myths associated with the Snowden story that will never die no matter how often they are debunked. Perhaps the most annoyingly persistent is that Snowden said at the start that he was only exposing privacy violations on Americans, so that one can prove he&#8217;s a liar by demonstrating that he also leaked documents pertaining to spying on foreigners.</p>
<p>But Snowden never said anything like that. From the beginning, he always said the exact opposite: that he greatly values the privacy rights of Americans but also values the privacy rights of the <a href="https://www.theguardian.com/commentisfree/2013/jul/07/nsa-brazilians-globo-spying">95 percent of the world&#8217;s population called &#8220;non-Americans.&#8221;</a> As <a href="https://www.theguardian.com/world/2013/jun/17/edward-snowden-nsa-files-whistleblower">Snowden said in his first online interview</a> with readers that I conducted back in June 2013: &#8220;Suspicionless surveillance does not become OK simply because it’s only victimizing 95 percent of the world instead of 100 percent.&#8221; That Snowden said he only wanted to expose privacy violations on Americans is just one of those falsehoods that no matter how many times you disprove it, commentators for some reason feel perfectly entitled to keep repeating it.</p>
<p class="caption">Top photo: US National Security Agency (NSA) whistleblower Edward Snowden speaks to European officials via videoconference during a parliamentary hearing on improving the protection of whistleblowers, at the Council of Europe in Strasbourg, eastern France, on June 24, 2014.</p>
<p>The post <a href="https://theintercept.com/2017/01/10/watch-how-casually-false-claims-are-published-nyt-and-nicholas-lemann-edition/">Watch How Casually False Claims Are Published: New York Times and Nicholas Lemann Edition</a> appeared first on <a href="https://theintercept.com">The Intercept</a>.</p>
]]></content:encoded>
                                <wfw:commentRss>https://theintercept.com/2017/01/10/watch-how-casually-false-claims-are-published-nyt-and-nicholas-lemann-edition/feed/</wfw:commentRss>
                <slash:comments>316</slash:comments>
                <media:content url='https://theintercept.com/wp-content/uploads/2018/01/Edward-Snowden-GG-1517329893.jpg?fit=4928%2C2464' width='4928' height='2464' /><post-id xmlns="com-wordpress:feed-additions:1">105114</post-id>
            </item>
        
            <item>
                <title><![CDATA[Two Short Paragraphs That Summarize the U.S. Approach to Human Rights Advocacy]]></title>
                <link>https://theintercept.com/2015/09/13/two-short-paragraphs-summarize-us-approach-human-rights-advocacy/</link>
                <comments>https://theintercept.com/2015/09/13/two-short-paragraphs-summarize-us-approach-human-rights-advocacy/#comments</comments>
                <pubDate>Sun, 13 Sep 2015 12:32:15 +0000</pubDate>
                                    <dc:creator><![CDATA[Glenn Greenwald]]></dc:creator>
                                		<category><![CDATA[Libya]]></category>
		<category><![CDATA[Saudi Arabia]]></category>
		<category><![CDATA[Surveillance]]></category>
		<category><![CDATA[Terrorism]]></category>
		<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[Voices]]></category>

                <guid isPermaLink="false">https://theintercept.com/?p=37437</guid>
                                    <description><![CDATA[<p>Support for human rights abuses and tyranny — not opposition to it — is a staple of U.S. foreign policy. Standing alone, how can anyone believe that the same government that lavishes the Saudi regime with support is waging war or using other forms of violence in order to stop human rights abuses?</p>
<p>The post <a href="https://theintercept.com/2015/09/13/two-short-paragraphs-summarize-us-approach-human-rights-advocacy/">Two Short Paragraphs That Summarize the U.S. Approach to Human Rights Advocacy</a> appeared first on <a href="https://theintercept.com">The Intercept</a>.</p>
]]></description>
                                        <content:encoded><![CDATA[<p>In <a href="https://theintercept.com/2015/09/12/accusations-anti-semitism-jeremy-corbyn-nothing-anti-semitism/">his excellent article</a> on the unique guilt-by-association standard being imposed on newly elected Labour leader Jeremy Corbyn, my colleague Jon Schwarz references a passage from <a href="https://www.washingtonpost.com/world/national-security/niger-rapidly-emerging-as-a-key-us-partner/2013/04/14/3d3b260c-a38c-11e2-ac00-8ef7caef5e00_story.html">a 2013 <em>Washington Post</em> article</a> that I want to highlight because of how illuminating it is. That <i>Post </i>article describes the Obama administration&#8217;s growing alliance with human-rights-abusing regimes in Africa, which allow the U.S. to expand its drone operations there, and contains this unusually blunt admission from a &#8220;senior U.S. official&#8221; (emphasis added):</p>
<blockquote><p>Human-rights groups have also accused the U.S. government of holding its tongue about political repression in Ethiopia, another key security partner in East Africa.</p>
<p><em>&#8220;The countries that cooperate with us get at least a free pass,&#8221; acknowledged a senior U.S. official who specializes in Africa but spoke on condition of anonymity to avoid retribution. &#8220;Whereas other countries that don&#8217;t cooperate, we ream them as best we can.&#8221;</em></p></blockquote>
<p>The <em>Post </em>article went on to note that the Bush administration &#8220;took the same approach,&#8221; and that while &#8220;many U.S. diplomats and human-rights groups had hoped Obama would shift his emphasis in Africa from security to democracy &#8230; that has not happened.&#8221; In fact, &#8220;&#8216;There&#8217;s pretty much been no change at all,&#8217; the official said. &#8216;In the end, it was an almost seamless transition from Bush to Obama.'&#8221;</p>
<div>
<p>The italicized portion of the quote explains the crux of feigned U.S. concerns for human rights abuses: It&#8217;s never genuine, never anything more than a weapon cynically exploited to advance U.S. interests. The U.S. <em>loves</em> human-rights-abusing regimes and always has, provided they &#8220;cooperate&#8221;: meaning, honor U.S. dictates. On human rights abuses, such compliant regimes &#8220;get at least a free pass&#8221;: <em>at least</em>, meaning either passive acquiescence or active support. The only time the U.S. government pretends to care in the slightest about human rights abuses is when they&#8217;re carried out by &#8220;countries that don&#8217;t cooperate,&#8221; in which case those flamboyant objections to abuses are used by U.S. officials as punishment for disobedience: to &#8220;ream them as best we can.&#8221;</p>
<!-- BLOCK(promote-post)[0](%7B%22componentName%22%3A%22PROMOTE_POST%22%2C%22entityType%22%3A%22SHORTCODE%22%2C%22optional%22%3Atrue%7D)(%7B%22slug%22%3A%22killing%22%2C%22crop%22%3A%22promo%22%7D) --><aside class="promote-banner">
    <a class="promote-banner__link" href="/collections/making-a-killing/">
              <span class="promote-banner__image">
          <img loading="lazy" decoding="async" width="300" height="150" src="https://theintercept.com/wp-content/uploads/2018/10/saudi-collection-promo-1540416194.jpg?fit=300%2C150" class="attachment-medium size-medium" alt="Senior White House Adviser Jared Kushner, and his wife, Assistant to the President Ivanka Trump, U.S. Commerce Secretary Wilbur Ross, U.S. Secretary of State Rex Tillerson, and White House Chief of Staff Reince Priebus are seen as they arrive with President Donald Trump and First Lady Melania Trump to the Murabba Palace as honored guests of King Salman bin Abdulaziz Al Saud of Saudi Arabia, Saturday evening, May 20, 2017, in Riyadh, Saudi Arabia. (Official White House Photo by Shealah Craighead)" srcset="https://theintercept.com/wp-content/uploads/2018/10/saudi-collection-promo-1540416194.jpg?w=1000 1000w, https://theintercept.com/wp-content/uploads/2018/10/saudi-collection-promo-1540416194.jpg?w=300 300w, https://theintercept.com/wp-content/uploads/2018/10/saudi-collection-promo-1540416194.jpg?w=768 768w, https://theintercept.com/wp-content/uploads/2018/10/saudi-collection-promo-1540416194.jpg?w=540 540w" sizes="auto, (max-width: 300px) 100vw, 300px" />        </span>
            <div class="promote-banner__text">
                  <p class="promote-banner__eyebrow">
            Read our Complete Coverage          </p>
        
        <h2 class="promote-banner__title">Making a Killing</h2>
      </div>
    </a>
  </aside><!-- END-BLOCK(promote-post)[0] -->
<div>
<p>This is not remotely new, of course, nor should it be even slightly surprising for people who pay minimal attention to the role of the U.S. government in the world. But this nonetheless highlights what baffles me most about U.S. political discourse: how &#8212; whenever it&#8217;s time to introduce the next &#8220;humanitarian war&#8221; or <a href="http://www.huffingtonpost.com/2015/03/16/unasur-venezuela-sanctions_n_6881886.html">other forms of attack</a> against the latest Evil Dictator or Terrorist Group of the Moment &#8212; so many otherwise intelligent and well-reasoning people are willing to believe that the U.S. government is motivated by opposition to human rights abuses and oppression.</p>
<div>
<p>Support for human rights abuses and tyranny &#8212; not opposition to it &#8212; is a staple of U.S. foreign policy. Standing alone: how can anyone believe that the same government that lavishes <em>the Saudi regime</em> <a href="http://www.nytimes.com/2015/04/19/world/middleeast/sale-of-us-arms-fuels-the-wars-of-arab-states.html">with arms</a>, <a href="https://theintercept.com/2014/07/25/nsas-new-partner-spying-saudi-arabias-brutal-state-police/">surveillance capabilities and intelligence</a> is waging war or using other forms of violence in order to stop human rights abuses? (Read <a href="http://www.nytimes.com/2015/09/13/world/middleeast/airstrikes-hit-civilians-yemen-war.html?partner=rss&amp;emc=rss&amp;smid=tw-nytimes&amp;smtyp=cur">this informative <em>New York Times</em> article</a> today describing the central role played by the U.S. government in the ongoing, truly heinous slaughter of Yemeni civilians by its close Saudi ally, consistent with the months of <a href="https://theintercept.com/2015/09/01/yemen-hidden-war-saudi-coalition-killing-civilians/">Yemen-based reporting</a> done <a href="https://theintercept.com/2015/07/10/yemen-airstrike/">by <em>The Intercept</em> on these atrocities</a>.)</p>
<div>
<p>If one wants to spout the Kissingerian &#8220;realist&#8221; view that only U.S. interests matter and human rights abuses are irrelevant, then fine: One can make that argument cogently and honestly if amorally. But to take seriously U.S. rhetoric on human rights abuses and freedom &#8212; <em>we&#8217;re going to war against or otherwise sternly opposing these monstrous human-rights abusers &#8212; </em>is totally mystifying in light of U.S. actions. The next time you&#8217;re tempted to do that, just read what U.S. officials, in their rare, candid moments, themselves say about how they cynically concoct and exploit human rights concerns.</p>
<div>
<p>Aside from accuracy for its own sake, this most matters because of what it means for proposed American &#8220;humanitarian wars.&#8221; Even if you accept the extremely dubious proposition that the U.S. <em>could</em> manipulate political outcomes for the better with bombs and military force in complex, faraway countries, it utterly lacks the <em>desire</em>, the <em>will</em>, to do that; it wants only to ensure those outcomes serve its interests, which more often than not means <em>supporting</em> despotism or, at best, <a href="https://twitter.com/UrbanAchievr/status/639240072693465088">chaos and disorder</a>.</p>
<div>
<p>That&#8217;s why the feigned U.S. concern for humanitarianism in Libya &#8212; <em>we are so very eager to protect the Libyan People from abuse and tyranny and bring them freedom &#8211;</em>&#8211; extended only to dropping bombs on that country and completely disappeared the moment that fun, glorious part was over. Even though it&#8217;s self-satisfying to believe your government is some sort of crusader for human rights and freedom, it&#8217;s not asking too much to just be as honest about U.S. exploitation of human rights concerns as this &#8220;senior U.S. official&#8221; was when talking to the<i> Washington Post.</i></p>
<p><em>Photo: Shiite rebels known as Houthis, gather at houses destroyed by a Saudi-led airstrike in Sanaa, Yemen, July 3, 2015 </em></p>
</div>
</div>
</div>
</div>
</div>
</div>
<p>The post <a href="https://theintercept.com/2015/09/13/two-short-paragraphs-summarize-us-approach-human-rights-advocacy/">Two Short Paragraphs That Summarize the U.S. Approach to Human Rights Advocacy</a> appeared first on <a href="https://theintercept.com">The Intercept</a>.</p>
]]></content:encoded>
                                <wfw:commentRss>https://theintercept.com/2015/09/13/two-short-paragraphs-summarize-us-approach-human-rights-advocacy/feed/</wfw:commentRss>
                <slash:comments>122</slash:comments>
                <media:content url='https://theintercept.com/wp-content/uploads/2015/07/yemen-airstrike.jpg?fit=1440%2C900' width='1440' height='900' /><post-id xmlns="com-wordpress:feed-additions:1">37437</post-id>
		<media:thumbnail url="https://theintercept.com/wp-content/uploads/2018/10/saudi-collection-promo-1540416194.jpg?fit=300%2C150" />
		<media:content url="https://theintercept.com/wp-content/uploads/2018/10/saudi-collection-promo-1540416194.jpg?fit=300%2C150" medium="image">
			<media:title type="html">Senior White House Adviser Jared Kushner, and his wife, Assistant to the President Ivanka Trump, U.S. Commerce Secretary Wilbur Ross, U.S. Secretary of State Rex Tillerson, and White House Chief of Staff Reince Priebus are seen as they arrive with President Donald Trump and First Lady Melania Trump to the Murabba Palace as honored guests of King Salman bin Abdulaziz Al Saud of Saudi Arabia, Saturday evening, May 20, 2017, in Riyadh, Saudi Arabia. (Official White House Photo by Shealah Craighead)</media:title>
		</media:content>
            </item>
        
            <item>
                <title><![CDATA[Controversial GCHQ Unit Engaged in Domestic Law Enforcement, Online Propaganda, Psychology Research]]></title>
                <link>https://theintercept.com/2015/06/22/controversial-gchq-unit-domestic-law-enforcement-propaganda/</link>
                <comments>https://theintercept.com/2015/06/22/controversial-gchq-unit-domestic-law-enforcement-propaganda/#comments</comments>
                <pubDate>Mon, 22 Jun 2015 11:03:38 +0000</pubDate>
                                    <dc:creator><![CDATA[Glenn Greenwald]]></dc:creator>
                                    <dc:creator><![CDATA[Andrew Fishman]]></dc:creator>
                                		<category><![CDATA[Edward Snowden]]></category>
		<category><![CDATA[Surveillance]]></category>
		<category><![CDATA[Uncategorized]]></category>

                <guid isPermaLink="false">https://theintercept.com/?p=28239</guid>
                                    <description><![CDATA[<p>JTRIG’s use of behavioral science research is emphasized as critical to its operations, including discussions of how to foster “obedience” and “conformity.”</p>
<p>The post <a href="https://theintercept.com/2015/06/22/controversial-gchq-unit-domestic-law-enforcement-propaganda/">Controversial GCHQ Unit Engaged in Domestic Law Enforcement, Online Propaganda, Psychology Research</a> appeared first on <a href="https://theintercept.com">The Intercept</a>.</p>
]]></description>
                                        <content:encoded><![CDATA[<p>The spy unit responsible for some of the United Kingdom’s most controversial tactics of surveillance, online propaganda and deceit focuses extensively on traditional law enforcement and domestic activities — even though officials typically justify its activities by emphasizing foreign intelligence and counterterrorism operations.</p>
<p>Documents published today by <em>The Intercept</em> demonstrate how the Joint Threat Research Intelligence Group (JTRIG), a unit of the signals intelligence agency Government Communications Headquarters (GCHQ), is involved in efforts against political groups it considers “extremist,” Islamist activity in schools, the drug trade, online fraud and financial scams.</p>
<p>Though its existence was secret until last year, JTRIG quickly developed a distinctive profile in the public understanding, after documents from NSA whistleblower Edward Snowden <a href="http://www.nbcnews.com/news/investigations/snowden-docs-british-spies-used-sex-dirty-tricks-n23091">revealed</a> that the unit had engaged in “dirty tricks” like deploying sexual “honey traps” designed to discredit targets, launching denial-of-service attacks to shut down Internet chat rooms, pushing veiled propaganda onto social networks and generally <a href="https://theintercept.com/2014/02/24/jtrig-manipulation/">warping discourse</a> online.</p>
<p>Early official claims attempted to create the impression that JTRIG’s activities focused on international targets in places like Iran, Afghanistan and <a href="https://theintercept.com/2015/04/02/gchq-argentina-falklands/">Argentina</a>. The closest the group seemed to get to home was in its targeting of transnational “hacktivist” group Anonymous.</p>
<p>While some of the unit&#8217;s activities are focused on the claimed areas, JTRIG also appears to be intimately involved in traditional law enforcement areas and U.K.-specific activity, as previously unpublished documents demonstrate. An August 2009 JTRIG memo entitled “Operational Highlights” boasts of “GCHQ’s first serious crime effects operation” against a website that was identifying police informants and members of a witness protection program. Another operation investigated an Internet forum allegedly &#8220;used to facilitate and execute online fraud.&#8221; The document also describes GCHQ advice provided &#8220;to assist the UK negotiating team on climate change.&#8221;</p>
<p>Particularly revealing is a fascinating <a href="https://theintercept.com/document/2015/06/22/behavioural-science-support-jtrig/">42-page document</a> from 2011 detailing JTRIG’s activities. It provides the most comprehensive and sweeping insight to date into the scope of this unit’s extreme methods. Entitled “Behavioral Science Support for JTRIG’s Effects and Online HUMINT [Human Intelligence] Operations,” it describes the types of targets on which the unit focuses, the psychological and behavioral research it commissions and exploits, and its future organizational aspirations. It is authored by a psychologist, Mandeep K. Dhami.</p>
<p>Among other things, the document lays out the tactics the agency uses to manipulate public opinion, its scientific and psychological research into how human thinking and behavior can be influenced, and the broad range of targets that are traditionally the province of law enforcement rather than intelligence agencies.</p>
<p>JTRIG’s domestic and law enforcement operations are made clear. The report states that the controversial unit “currently collaborates with other agencies” including the Metropolitan police, Security Service (MI5), Serious Organised Crime Agency (SOCA), Border Agency, Revenue and Customs (HMRC), and National Public Order and Intelligence Unit (NPOIU). The document highlights that key JTRIG objectives include “providing intelligence for judicial outcomes”; monitoring “domestic extremist groups such as the English Defence League by conducting online HUMINT”; “denying, deterring or dissuading” criminals and “hacktivists”; and “deterring, disrupting or degrading online consumerism of stolen data or child porn.”</p>
<p>It touts the fact that the unit “may cover all areas of the globe.” Specifically, “operations are currently targeted at” numerous countries and regions including Argentina, Eastern Europe and the U.K.</p>
<p>JTRIG’s domestic operations fit into a larger pattern of U.K.-focused and traditional law enforcement activities within GCHQ.</p>
<p><a href="https://theintercept.com/document/2015/06/22/gchq-ministry-relationships/" target="_blank">Many GCHQ documents</a> describing the “missions” of the “customers” for which it works make clear that the agency has a wide mandate far beyond national security, including providing help on intelligence to the Bank of England, to the Department for Children, Schools and Families on reporting of “radicalization,&#8221; to various departments on agriculture and whaling activities, to government financial divisions to enable good investment decisions, to police agencies to track suspected “boiler room fraud,” and to law enforcement agencies to improve “civil and family justice.”</p>
<p>Previous reporting on the spy agency established its focus on what it regards as political radicalism. Beyond <a href="https://theintercept.com/2014/02/24/jtrig-manipulation/">JTRIG’s targeting of Anonymous</a>, other parts of GCHQ targeted political activists deemed to be &#8220;radical,&#8221; even <a href="https://theintercept.com/2014/02/18/snowden-docs-reveal-covert-surveillance-and-pressure-tactics-aimed-at-wikileaks-and-its-supporters/">monitoring the visits of people to the WikiLeaks website</a>. GCHQ also stated in one internal memo that it studied and hacked popular software programs to “enable police operations” and gave two examples of cracking decryption software on behalf of the National Technical Assistance Centre, one &#8220;a high profile police case&#8221; and the other a child abuse investigation.</p>
<p>The JTRIG unit of GCHQ is so notable because of its extensive use of propaganda methods and other online tactics of deceit and manipulation. The 2011 report on the organization&#8217;s operations, published today, summarizes just some of those tactics:<br />
<a href="https://theintercept.com/wp-content/uploads/2015/06/jtrig.png"><img data-recalc-dims="1" height="99999" width="540" decoding="async" class="aligncenter size-article-medium wp-image-28242" src="https://theintercept.com/wp-content/uploads/2015/06/jtrig.png?fit=540%2C99999" alt="" /></a></p>
<p>Throughout this report, JTRIG’s heavy reliance on its use of behavioral science research (such as psychology) is emphasized as critical to its operations. That includes detailed discussions of how to foster “obedience” and “conformity”:<br />
<a href="https://theintercept.com/wp-content/uploads/2015/06/jtrig2.png"><img data-recalc-dims="1" height="99999" width="540" decoding="async" class="aligncenter size-article-medium wp-image-28243" src="https://theintercept.com/wp-content/uploads/2015/06/jtrig2.png?fit=540%2C99999" alt="" /></a>&#8230;<br />
<a href="https://theintercept.com/wp-content/uploads/2015/06/jtrig4.png"><img data-recalc-dims="1" height="99999" width="540" decoding="async" class="aligncenter size-article-medium wp-image-28244" src="https://theintercept.com/wp-content/uploads/2015/06/jtrig4.png?fit=540%2C99999" alt="" /></a>&#8230;<br />
<img data-recalc-dims="1" height="99999" width="540" decoding="async" class="aligncenter size-article-medium wp-image-28246" src="https://theintercept.com/wp-content/uploads/2015/06/iop.png?fit=540%2C99999" alt="" /></p>
<p>In response to inquiries, GCHQ refused to provide on-the-record responses beyond its boilerplate claim that all its activities are lawful.</p>
<p>———</p>
<p><em>Documents published with this article:</em></p>
<ul>
<li><a href="https://theintercept.com/document/2015/06/22/behavioural-science-support-jtrig/">Behavioural Science Support for JTRIG’S Effects and Online HUMINT Operations</a></li>
<li><a href="https://theintercept.com/document/2015/06/22/gchq-ministry-relationships/" target="_blank">U.K. Ministry Stakeholder Relationships Spreadsheets</a> (13 documents merged)</li>
</ul>
<p>———</p>
<p><em>Photo: Getty Images</em></p>
<p>The post <a href="https://theintercept.com/2015/06/22/controversial-gchq-unit-domestic-law-enforcement-propaganda/">Controversial GCHQ Unit Engaged in Domestic Law Enforcement, Online Propaganda, Psychology Research</a> appeared first on <a href="https://theintercept.com">The Intercept</a>.</p>
]]></content:encoded>
                                <wfw:commentRss>https://theintercept.com/2015/06/22/controversial-gchq-unit-domestic-law-enforcement-propaganda/feed/</wfw:commentRss>
                <slash:comments>172</slash:comments>
                <media:content url='https://theintercept.com/wp-content/uploads/2015/06/jtrig.jpg?fit=1700%2C1228' width='1700' height='1228' /><post-id xmlns="com-wordpress:feed-additions:1">28239</post-id>
		<media:thumbnail url="https://theintercept.com/wp-content/uploads/2015/06/jtrig.png?w=440&amp;h=440&amp;crop=1" />
		<media:content url="https://theintercept.com/wp-content/uploads/2015/06/jtrig.png?fit=799%2C770" medium="image">
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2015/06/jtrig.png?w=440&amp;h=440&amp;crop=1" />
		</media:content>
		<media:content url="https://theintercept.com/wp-content/uploads/2015/06/jtrig2.png?fit=780%2C437" medium="image">
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2015/06/jtrig2.png?w=440&amp;h=440&amp;crop=1" />
		</media:content>
		<media:content url="https://theintercept.com/wp-content/uploads/2015/06/jtrig4.png?fit=787%2C368" medium="image">
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2015/06/jtrig4.png?w=440&amp;h=440&amp;crop=1" />
		</media:content>
		<media:content url="https://theintercept.com/wp-content/uploads/2015/06/iop.png?fit=773%2C418" medium="image">
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2015/06/iop.png?w=440&amp;h=440&amp;crop=1" />
		</media:content>
            </item>
        
            <item>
                <title><![CDATA[The NSA's New Partner in Spying: Saudi Arabia's Brutal State Police]]></title>
                <link>https://theintercept.com/2014/07/25/nsas-new-partner-spying-saudi-arabias-brutal-state-police/</link>
                <comments>https://theintercept.com/2014/07/25/nsas-new-partner-spying-saudi-arabias-brutal-state-police/#comments</comments>
                <pubDate>Fri, 25 Jul 2014 20:19:21 +0000</pubDate>
                                    <dc:creator><![CDATA[Glenn Greenwald]]></dc:creator>
                                    <dc:creator><![CDATA[Murtaza Hussain]]></dc:creator>
                                		<category><![CDATA[Surveillance]]></category>
		<category><![CDATA[Terrorism]]></category>
		<category><![CDATA[human rights]]></category>
		<category><![CDATA[NSA]]></category>
		<category><![CDATA[saudi arabia]]></category>
		<category><![CDATA[state department]]></category>
		<category><![CDATA[torture]]></category>

                <guid isPermaLink="false">https://theintercept.com/?p=2997</guid>
                                    <description><![CDATA[<p>The National Security Agency last year significantly expanded its cooperative relationship with the Saudi Ministry of Interior, one of the world&#8217;s most repressive and abusive government agencies. An April 2013 top secret memo provided by NSA whistleblower Edward Snowden details the agency&#8217;s plans “to provide direct analytic and technical support” to the Saudis on &#8220;internal [&#8230;]</p>
<p>The post <a href="https://theintercept.com/2014/07/25/nsas-new-partner-spying-saudi-arabias-brutal-state-police/">The NSA&#8217;s New Partner in Spying: Saudi Arabia&#8217;s Brutal State Police</a> appeared first on <a href="https://theintercept.com">The Intercept</a>.</p>
]]></description>
                                        <content:encoded><![CDATA[<p>The National Security Agency last year significantly expanded its cooperative relationship with the Saudi Ministry of Interior, one of the world&#8217;s most repressive and abusive government agencies. An <a href="https://theintercept.com/document/2014/07/25/saudi-arabia-information-paper/">April 2013 top secret memo </a>provided by NSA whistleblower Edward Snowden details the agency&#8217;s plans “to provide direct analytic and technical support” to the Saudis on &#8220;internal security&#8221; matters.</p>
<p>The Saudi Ministry of Interior—referred to in the document as MOI— has been condemned for years as one of the most brutal human rights violators in the world. In 2013, <a href="http://www.state.gov/j/drl/rls/hrrpt/humanrightsreport/#wrapper">the U.S. State Department reported</a> that &#8220;Ministry of Interior officials sometimes subjected prisoners and detainees to torture and other physical abuse,” specifically mentioning a 2011 episode in which MOI agents allegedly &#8220;poured an antiseptic cleaning liquid down [the] throat&#8221; of one human rights activist. The report also notes the MOI&#8217;s use of invasive surveillance targeted at political and religious dissidents.</p>
<p>But as the State Department publicly catalogued those very abuses, the NSA worked to provide increased surveillance assistance to the ministry that perpetrated them. The move is part of the Obama Administration&#8217;s increasingly close ties with the Saudi regime; beyond the new cooperation with the MOI<b>, </b>the memo describes &#8220;a period of rejuvenation” for the NSA&#8217;s relationship with the Saudi Ministry of Defense.</p>
<!-- BLOCK(promote-post)[0](%7B%22componentName%22%3A%22PROMOTE_POST%22%2C%22entityType%22%3A%22SHORTCODE%22%2C%22optional%22%3Atrue%7D)(%7B%22slug%22%3A%22killing%22%2C%22crop%22%3A%22promo%22%7D) --><aside class="promote-banner">
    <a class="promote-banner__link" href="/collections/making-a-killing/">
              <span class="promote-banner__image">
          <img loading="lazy" decoding="async" width="300" height="150" src="https://theintercept.com/wp-content/uploads/2018/10/saudi-collection-promo-1540416194.jpg?fit=300%2C150" class="attachment-medium size-medium" alt="Senior White House Adviser Jared Kushner, and his wife, Assistant to the President Ivanka Trump, U.S. Commerce Secretary Wilbur Ross, U.S. Secretary of State Rex Tillerson, and White House Chief of Staff Reince Priebus are seen as they arrive with President Donald Trump and First Lady Melania Trump to the Murabba Palace as honored guests of King Salman bin Abdulaziz Al Saud of Saudi Arabia, Saturday evening, May 20, 2017, in Riyadh, Saudi Arabia. (Official White House Photo by Shealah Craighead)" srcset="https://theintercept.com/wp-content/uploads/2018/10/saudi-collection-promo-1540416194.jpg?w=1000 1000w, https://theintercept.com/wp-content/uploads/2018/10/saudi-collection-promo-1540416194.jpg?w=300 300w, https://theintercept.com/wp-content/uploads/2018/10/saudi-collection-promo-1540416194.jpg?w=768 768w, https://theintercept.com/wp-content/uploads/2018/10/saudi-collection-promo-1540416194.jpg?w=540 540w" sizes="auto, (max-width: 300px) 100vw, 300px" />        </span>
            <div class="promote-banner__text">
                  <p class="promote-banner__eyebrow">
            Read our Complete Coverage          </p>
        
        <h2 class="promote-banner__title">Making a Killing</h2>
      </div>
    </a>
  </aside><!-- END-BLOCK(promote-post)[0] -->
<p>In general, U.S. support for the Saudi regime is long-standing. One secret 2007 NSA memo lists Saudi Arabia as one of four countries where the U.S. “has [an] interest in regime continuity.”</p>
<p>But from the end of the 1991 Gulf War until recently, the memo says, the NSA had a &#8220;very limited&#8221; relationship with the Saudi kingdom. In December 2012, the U.S. director of national intelligence<b>, </b>James Clapper<b>,</b> authorized the agency to expand its &#8220;third party&#8221; relationship with Saudi Arabia to include the sharing of signals intelligence, or &#8220;SIGINT,&#8221; capability with the MOD&#8217;s Technical Affairs Directorate (TAD).</p>
<p>“With the approval of the Third Party SIGINT relationship,&#8221; the memo reports, the NSA &#8220;intends to provide direct analytic and technical support to TAD.&#8221; The goal is “to facilitate the Saudi government&#8217;s ability to utilize SIGINT to locate and track individuals of mutual interest within Saudi Arabia.”</p>
<p>Even before this new initiative in 2012, the CIA and other American intelligence agencies had been working with the Saudi regime to bolster “internal security” and track alleged terrorists. According to the memo, the NSA began collaborating with the MOD in 2011 on a &#8220;sensitive access initiative… focused on internal security and terrorist activity on the Arabian Peninsula&#8221;; that partnership was conducted &#8220;under the auspices of CIA’s relationship with the MOI’s Mabahith (General Directorate for Investigations, equivalent to FBI).&#8221;</p>
<p>The NSA&#8217;s formal &#8220;Third Party&#8221; relationship with the Saudis involves arming the MOI with highly advanced surveillance technology. The NSA &#8220;provides technical advice on SIGINT topics such as data exploitation and target development to TAD,&#8221; the memo says, &#8220;as well as a sensitive source collection capability.”</p>
<p>The Saudi Ministry of Defense also relies on the NSA for help with “signals analysis equipment upgrades, decryption capabilities and advanced training on a wide range of topics.” The document states that while the NSA &#8220;is able to respond to many of those requests, some must be denied due to the fact that they place sensitive SIGINT equities at risk.”</p>
<p>Over the past year, the Saudi government has escalated its crackdown on activists, dissidents, and critics of the government. Earlier this month, Saudi human rights lawyer and activist Waleed Abu al-Khair was <a href="http://www.4029tv.com/national/Saudi-activist-gets-15-year-sentence/26815924">sentenced to 15 years in prison</a> by a so-called “terrorist court” on charges of undermining the state and insulting the judiciary. In May, a liberal blogger, Raif Badawi, was <a href="http://www.bbc.com/news/world-middle-east-27318400">sentenced to 10 years in prison and 1,000 lashes</a>; in June, human rights activist Mukhlif Shammari was sentenced to five years in prison for writing about the mistreatment of Saudi women.</p>
<p>At the time of the al-Khair sentencing, State Department spokesperson Jen Psaki issued a statement saying, “We urge the Saudi government to respect international human rights norms, a point we make to them regularly.&#8221;</p>
<p>Asked if the U.S. takes human rights records into account before collaborating with foreign security agencies, a spokesman for the office of the director of national intelligence told <em>The Intercept</em>: &#8220;Yes. We cannot comment on specific intelligence matters but, as a general principle, human rights considerations inform our decisions on intelligence sharing with foreign governments.”</p>
<p>The post <a href="https://theintercept.com/2014/07/25/nsas-new-partner-spying-saudi-arabias-brutal-state-police/">The NSA&#8217;s New Partner in Spying: Saudi Arabia&#8217;s Brutal State Police</a> appeared first on <a href="https://theintercept.com">The Intercept</a>.</p>
]]></content:encoded>
                                <wfw:commentRss>https://theintercept.com/2014/07/25/nsas-new-partner-spying-saudi-arabias-brutal-state-police/feed/</wfw:commentRss>
                <slash:comments>316</slash:comments>
                <media:content url='https://theintercept.com/wp-content/uploads/2014/07/saudi-king-obama_1024-copy.jpg?fit=659%2C467' width='659' height='467' /><post-id xmlns="com-wordpress:feed-additions:1">2997</post-id>
		<media:thumbnail url="https://theintercept.com/wp-content/uploads/2018/10/saudi-collection-promo-1540416194.jpg?fit=300%2C150" />
		<media:content url="https://theintercept.com/wp-content/uploads/2018/10/saudi-collection-promo-1540416194.jpg?fit=300%2C150" medium="image">
			<media:title type="html">Senior White House Adviser Jared Kushner, and his wife, Assistant to the President Ivanka Trump, U.S. Commerce Secretary Wilbur Ross, U.S. Secretary of State Rex Tillerson, and White House Chief of Staff Reince Priebus are seen as they arrive with President Donald Trump and First Lady Melania Trump to the Murabba Palace as honored guests of King Salman bin Abdulaziz Al Saud of Saudi Arabia, Saturday evening, May 20, 2017, in Riyadh, Saudi Arabia. (Official White House Photo by Shealah Craighead)</media:title>
		</media:content>
            </item>
        
            <item>
                <title><![CDATA[The Secret Government Rulebook for Labeling You a Terrorist]]></title>
                <link>https://theintercept.com/2014/07/23/blacklisted/</link>
                <comments>https://theintercept.com/2014/07/23/blacklisted/#comments</comments>
                <pubDate>Wed, 23 Jul 2014 18:45:50 +0000</pubDate>
                                    <dc:creator><![CDATA[Jeremy Scahill]]></dc:creator>
                                    <dc:creator><![CDATA[Ryan Devereaux]]></dc:creator>
                                		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Surveillance]]></category>
		<category><![CDATA[Terrorism]]></category>
		<category><![CDATA[national counterterrorism center]]></category>
		<category><![CDATA[No-Fly List]]></category>
		<category><![CDATA[privacy]]></category>
		<category><![CDATA[selectee list]]></category>
		<category><![CDATA[terrorism]]></category>
		<category><![CDATA[terrorist identities datamart environment]]></category>
		<category><![CDATA[terrorist screening database]]></category>
		<category><![CDATA[tide]]></category>
		<category><![CDATA[watchlisting]]></category>

                <guid isPermaLink="false">https://theintercept.com/?post_type=article&#038;p=2727</guid>
                                    <description><![CDATA[<p>The watchlist system now requires neither “concrete facts” nor “irrefutable evidence” to designate you a terrorist. <!--more--></p>
<p>The post <a href="https://theintercept.com/2014/07/23/blacklisted/">The Secret Government Rulebook for Labeling You a Terrorist</a> appeared first on <a href="https://theintercept.com">The Intercept</a>.</p>
]]></description>
                                        <content:encoded><![CDATA[<p>The Obama administration has quietly approved a substantial expansion of the terrorist watchlist system, authorizing a secret process that requires neither &#8220;concrete facts&#8221; nor &#8220;irrefutable evidence&#8221; to designate an American or foreigner as a terrorist, according to a key government document obtained by <em>The Intercept</em>.</p>
<p>The &#8220;March 2013 Watchlisting Guidance,&#8221; a <a href="https://theintercept.com/?p=2936">166-page document</a> issued last year by the National Counterterrorism Center, spells out the government&#8217;s secret rules for putting individuals on its main terrorist database, as well as the no fly list and the selectee list, which triggers enhanced screening at airports and border crossings. The new guidelines allow individuals to be designated as representatives of terror organizations without any evidence they are actually connected to such organizations, and it gives a single White House official the unilateral authority to place entire &#8220;categories&#8221; of people the government is tracking onto the no fly and selectee lists. It broadens the authority of government officials to &#8220;nominate&#8221; people to the watchlists based on what is vaguely described as &#8220;fragmentary information.&#8221; It also allows for dead people to be watchlisted.</p>
<p>Over the years, the Obama and Bush Administrations have fiercely resisted disclosing the criteria for placing names on the databases—though the guidelines are officially labeled as unclassified. In May, Attorney General Eric Holder even invoked the state secrets privilege to prevent watchlisting guidelines from being disclosed in litigation launched by an American who was on the no fly list. In <a href="https://www.documentcloud.org/documents/1232048-holder-on-watchlist.html">an affidavit</a>, Holder called them a &#8220;clear roadmap&#8221; to the government&#8217;s terrorist-tracking apparatus, adding: &#8220;The Watchlisting Guidance, although unclassified, contains national security information that, if disclosed &#8230; could cause significant harm to national security.&#8221;</p>
<!-- BLOCK(fullbleed)[0](%7B%22componentName%22%3A%22FULLBLEED%22%2C%22entityType%22%3A%22RESOURCE%22%2C%22resource%22%3A%7B%22__typename%22%3A%22Image%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Ftheintercept.com%5C%2Fwp-content%5C%2Fuploads%5C%2F2014%5C%2F07%5C%2Fwatchlist-cover.jpg%22%7D%7D)(%7B%22align%22%3A%22bleed%22%2C%22caption%22%3Anull%2C%22src%22%3A%22https%3A%5C%2F%5C%2Ftheintercept.com%5C%2Fwp-content%5C%2Fuploads%5C%2F2014%5C%2F07%5C%2Fwatchlist-cover.jpg%22%7D) --><figure class='img-wrap align-bleed'><img data-recalc-dims="1" src="https://theintercept.com/wp-content/uploads/2014/07/watchlist-cover.jpg?w=1200" /></figure><!-- END-BLOCK(fullbleed)[0] -->
<p>The rulebook, which <em>The Intercept</em> is publishing in full, was developed behind closed doors by representatives of the nation&#8217;s intelligence, military, and law-enforcement establishment, including the Pentagon, CIA, NSA, and FBI. Emblazoned with the crests of 19 agencies, it offers the most complete and revealing look into the secret history of the government&#8217;s terror list policies to date. It reveals a confounding and convoluted system filled with exceptions to its own rules, and it relies on the elastic concept of &#8220;reasonable suspicion&#8221; as a standard for determining whether someone is a possible threat. Because the government tracks &#8220;suspected terrorists&#8221; as well as &#8220;known terrorists,&#8221; individuals can be watchlisted if they are suspected of being a suspected terrorist, or if they are suspected of associating with people who are suspected of terrorism activity.</p>
<p>&#8220;Instead of a watchlist limited to actual, known terrorists, the government has built a vast system based on the unproven and flawed premise that it can predict if a person will commit a terrorist act in the future,&#8221; says Hina Shamsi, the head of the ACLU&#8217;s National Security Project. &#8220;On that dangerous theory, the government is secretly blacklisting people as suspected terrorists and giving them the impossible task of proving themselves innocent of a threat they haven&#8217;t carried out.&#8221; Shamsi, who reviewed the document, added, &#8220;These criteria should never have been kept secret.&#8221;</p>
<p>The document&#8217;s definition of &#8220;terrorist&#8221; activity <a href="https://www.documentcloud.org/documents/1227228-2013-watchlist-guidance.html#document/p48">includes</a> actions that fall far short of bombing or hijacking. In addition to expected crimes, such as assassination or hostage-taking, the guidelines also define destruction of government property and damaging computers used by financial institutions as activities meriting placement on a list. They also define as terrorism any act that is &#8220;<a href="https://www.documentcloud.org/documents/1227228-2013-watchlist-guidance.html#document/p9">dangerous</a>&#8221; to property and intended to influence government policy through intimidation.</p>
<p>This combination—a broad definition of what constitutes terrorism and a low threshold for designating someone a terrorist—opens the way to ensnaring innocent people in secret government dragnets. It can also be counterproductive. When resources are devoted to tracking people who are not genuine risks to national security, the actual threats get fewer resources—and might go unnoticed.</p>
<p>&#8220;If reasonable suspicion is the only standard you need to label somebody, then it&#8217;s a slippery slope we&#8217;re sliding down here, because then you can label anybody anything,&#8221; says David Gomez, a former senior FBI special agent with experience running high-profile terrorism investigations. &#8220;Because you appear on a telephone list of somebody doesn&#8217;t make you a terrorist. That&#8217;s the kind of information that gets put in there.&#8221;</p>
<p>The fallout is personal too. There are severe consequences for people unfairly labeled a terrorist by the U.S. government, which shares its watchlist data with local law enforcement, foreign governments, and &#8220;private entities.&#8221; Once the U.S. government secretly labels you a terrorist or terrorist suspect, other institutions tend to treat you as one. It can become difficult to get a job (or simply to stay out of jail). It can become burdensome—or impossible—to travel. And routine encounters with law enforcement can turn into ordeals.</p>
<!-- BLOCK(caption)[1](%7B%22componentName%22%3A%22CAPTION%22%2C%22entityType%22%3A%22SHORTCODE%22%7D)(%7B%7D) --><div class="shortcode shortcode-caption" data-shortcode="caption" data-caption="%3Cimg%20class%3D%22size-full%20wp-image-2915%22%20src%3D%22https%3A%2F%2Ftheintercept.com%2Fwp-content%2Fuploads%2F2014%2F07%2Fnomination_chart.jpg%22%20alt%3D%22nomination_chart%22%20width%3D%221000%22%20height%3D%22785%22%3E%20A%20chart%20from%20the%20%26%238220%3BMarch%202013%20Watchlisting%20Guidance%26%238221%3B"><!-- CONTENT(caption)[1] --><img loading="lazy" decoding="async" class="size-full wp-image-2915" src="https://theintercept.com/wp-content/uploads/2014/07/nomination_chart.jpg" alt="nomination_chart" width="1000" height="785" srcset="https://theintercept.com/wp-content/uploads/2014/07/nomination_chart.jpg?w=1000 1000w, https://theintercept.com/wp-content/uploads/2014/07/nomination_chart.jpg?w=300 300w, https://theintercept.com/wp-content/uploads/2014/07/nomination_chart.jpg?w=768 768w, https://theintercept.com/wp-content/uploads/2014/07/nomination_chart.jpg?w=540 540w" sizes="auto, (max-width: 1000px) 100vw, 1000px" /> A chart from the &#8220;March 2013 Watchlisting Guidance&#8221;<!-- END-CONTENT(caption)[1] --></div><!-- END-BLOCK(caption)[1] -->
<p>In 2012 Tim Healy, the former director of the FBI&#8217;s Terrorist Screening Center, <a href="http://www.cbsnews.com/news/inside-a-secret-us-terrorist-screening-center/">described</a> to CBS News how watchlists are used by police officers. &#8220;So if you are speeding, you get pulled over, they&#8217;ll query that name,&#8221; he said. &#8220;And if they are encountering a known or suspected terrorist, it will pop up and say call the Terrorist Screening Center&#8230;. So now the officer on the street knows he may be dealing with a known or suspected terrorist.&#8221; Of course, the problem is that the &#8220;known or suspected terrorist&#8221; might just be an ordinary citizen who should not be treated as a menace to public safety.</p>
<p>Until 2001, the government did not prioritize building a watchlist system. On 9/11, the government&#8217;s list of people barred from flying included just 16 names. Today, the no fly list has swelled to tens of thousands of &#8220;known or suspected terrorists&#8221; (the guidelines refer to them as KSTs). The selectee list subjects people to extra scrutiny and questioning at airports and border crossings. The government has created several other databases, too. The largest is the Terrorist Identities Datamart Environment (TIDE), which gathers terrorism information from sensitive military and intelligence sources around the world. Because it contains classified information that cannot be widely distributed, there is yet another list, the Terrorist Screening Database, or TSDB, which has been stripped of TIDE&#8217;s classified data so that it can be shared. When government officials refer to &#8220;the watchlist,&#8221; they are typically referring to the TSDB. (TIDE is the responsibility of the National Counterterrorism Center; the TSDB is managed by the Terrorist Screening Center at the FBI.)</p>
<p>In a statement, a spokesman for the National Counterterrorism Center told <em>The Intercept</em> that &#8220;the watchlisting system is an important part of our layered defense to protect the United States against future terrorist attacks&#8221; and that &#8220;watchlisting continues to mature to meet an evolving, diffuse threat.&#8221; He added that U.S. citizens are afforded extra protections to guard against improper listing, and that no one can be placed on a list solely for activities protected by the First Amendment. A representative of the&nbsp;Terrorist Screening Center&nbsp;did not respond to a request for comment.</p>
<p>The system has been criticized for years. In 2004, Sen. Ted Kennedy <a href="http://www.nytimes.com/2004/08/20/national/20flight.html">complained</a> that he was barred from boarding flights on five separate occasions because his name resembled the alias of a suspected terrorist. Two years later, CBS News <a href="http://www.cbsnews.com/news/unlikely-terrorists-on-no-fly-list/">obtained</a> a copy of the no fly list and reported that it included Bolivian president Evo Morales and Lebanese parliament head Nabih Berri. One of the watchlists snared Mikey Hicks, <a href="http://www.nytimes.com/2010/01/14/nyregion/14watchlist.html?_r=0">a Cub Scout</a> who got his first of many airport pat-downs at age two. In 2007, the Justice Department&#8217;s inspector general issued a scathing report identifying &#8220;<a href="http://www.justice.gov/oig/semiannual/0711/fbi.htm">significant weaknesses</a>&#8221; in the system. And in 2009, after a Nigerian terrorist was able to board a passenger flight to Detroit and nearly detonated a bomb sewn into his underwear despite his name having been placed on the TIDE list, President Obama admitted that there had been a &#8220;<a href="http://www.whitehouse.gov/the-press-office/remarks-president-strengthening-intelligence-and-aviation-security">systemic failure</a>.&#8221;</p>
<p>Obama hoped that his response to the &#8220;underwear bomber&#8221; would be a turning point. In 2010, he gave increased powers and responsibilities to the agencies that nominate individuals to the lists, placing pressure on them to add names. His administration also issued a set of new guidelines for the watchlists. Problems persisted, however. In 2012, the U.S. Government Accountability Office <a href="http://www.gao.gov/assets/600/591312.pdf">published</a> a report that bluntly noted there was no agency responsible for figuring out &#8220;whether watchlist-related screening or vetting is achieving intended results.&#8221; The guidelines were revised and expanded in 2013—and a source within the intelligence community subsequently provided a copy to <em>The Intercept</em>.</p>
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-2952" src="https://theintercept.com/wp-content/uploads/2014/07/tbu2.jpg" alt="tbu2" width="780" height="200" srcset="https://theintercept.com/wp-content/uploads/2014/07/tbu2.jpg?w=780 780w, https://theintercept.com/wp-content/uploads/2014/07/tbu2.jpg?w=300 300w, https://theintercept.com/wp-content/uploads/2014/07/tbu2.jpg?w=768 768w, https://theintercept.com/wp-content/uploads/2014/07/tbu2.jpg?w=540 540w" sizes="auto, (max-width: 780px) 100vw, 780px" /></p>
<h2>&#8220;Concrete facts are not necessary&#8221;</h2>
<p>The five chapters and 11 appendices of the &#8220;Watchlisting Guidance&#8221; are filled with acronyms, legal citations, and numbered paragraphs; it reads like an arcane textbook with a vocabulary all its own. Different types of data on suspected terrorists are referred to as &#8220;derogatory information,&#8221; &#8220;substantive derogatory information,&#8221; &#8220;extreme derogatory information&#8221; and &#8220;particularized derogatory information.&#8221; The names of suspected terrorists are passed along a bureaucratic ecosystem of &#8220;originators,&#8221; &#8220;nominators,&#8221; &#8220;aggregators,&#8221; &#8220;screeners,&#8221; and &#8220;encountering agencies.&#8221; And &#8220;upgrade,&#8221; usually a happy word for travellers, is repurposed to mean that an individual has been placed on a more restrictive list.</p>
<p>The heart of the document revolves around the rules for placing individuals on a watchlist. &#8220;All executive departments and agencies,&#8221; the document says, are responsible for collecting and sharing information on terrorist suspects with the National Counterterrorism Center. It sets a low standard—&#8221;<a href="https://www.documentcloud.org/documents/1227228-2013-watchlist-guidance.html#document/p34">reasonable suspicion</a>&#8220;—for placing names on the watchlists, and offers a multitude of vague, confusing, or contradictory instructions for gauging it. In the chapter on &#8220;Minimum Substantive Derogatory Criteria&#8221;—even the title is hard to digest—the key sentence on reasonable suspicion offers little clarity:</p>
<blockquote><p>&#8220;To meet the REASONABLE SUSPICION standard, the NOMINATOR, based on the totality of the circumstances, must rely upon articulable intelligence or information which, taken together with rational inferences from those facts, reasonably warrants a determination that an individual is known or suspected to be or has been knowingly engaged in conduct constituting, in preparation for, in aid of, or related to TERRORISM and/or TERRORIST ACTIVITIES.&#8221;</p></blockquote>
<p>The rulebook makes no effort to define an essential phrase in the passage—&#8221;articulable intelligence or information.&#8221; After stressing that hunches are not reasonable suspicion and that &#8220;there must be an objective factual basis&#8221; for labeling someone a terrorist, it goes on to state that no actual facts are required:</p>
<blockquote><p>&#8220;In determining whether a REASONABLE SUSPICION exists, due weight should be given to the specific reasonable inferences that a NOMINATOR is entitled to draw from the facts in light of his/her experience and not on unfounded suspicions or hunches. Although irrefutable evidence or concrete facts are not necessary, to be reasonable, suspicion should be as clear and as fully developed as circumstances permit.&#8221;</p></blockquote>
<p>While the guidelines nominally prohibit nominations based on unreliable information, they explicitly regard &#8220;uncorroborated&#8221; Facebook or Twitter posts as sufficient grounds for putting an individual on one of the watchlists. &#8220;Single source information,&#8221; the <a href="https://www.documentcloud.org/documents/1227228-2013-watchlist-guidance.html#document/p35">guidelines state</a>, &#8220;including but not limited to ‘walk-in,&#8217; ‘write-in,&#8217; or postings on social media sites, however, should not automatically be discounted &#8230; the NOMINATING AGENCY should evaluate the credibility of the source, as well as the nature and specificity of the information, and nominate even if that source is uncorroborated.&#8221;</p>
<p>There are a number of <a href="https://www.documentcloud.org/documents/1227228-2013-watchlist-guidance.html#document/p43">loopholes</a> for putting people onto the watchlists even if reasonable suspicion cannot be met.</p>
<p>One is clearly defined: The immediate family of suspected terrorists—their spouses, children, parents, or siblings—may be watchlisted without any suspicion that they themselves are engaged in terrorist activity. But another loophole is quite broad—&#8221;associates&#8221; who have a defined relationship with a suspected terrorist, but whose involvement in terrorist activity is not known. A third loophole is broader still—individuals with &#8220;a possible nexus&#8221; to terrorism, but for whom there is not enough &#8220;derogatory information&#8221; to meet the reasonable suspicion standard.</p>
<p>Americans and foreigners can be nominated for the watchlists if they are associated with a terrorist group, even if that group has not been designated as a terrorist organization by the U.S. government. They can also be treated as &#8220;representatives&#8221; of a terrorist group even if they have &#8220;neither membership in nor association with the organization.&#8221; The guidelines do helpfully note that certain associations, such as providing janitorial services or delivering packages, are not grounds for being watchlisted.</p>
<p>The nomination system appears to lack meaningful checks and balances. Although government officials have repeatedly said there is a rigorous process for making sure no one is unfairly placed in the databases, the guidelines acknowledge that all nominations of &#8220;known terrorists&#8221; are considered justified unless the National Counterterrorism Center has evidence to the contrary. In a recent <a href="https://www.documentcloud.org/documents/1232171-91-3.html">court filing</a>, the government <a href="http://bigstory.ap.org/article/terrorist-database-continues-grow-rapid-rate">disclosed</a> that there were 468,749 KST nominations in 2013, of which only 4,915 were rejected&#8211;a rate of about one percent. The rulebook appears to invert the legal principle of due process, defining nominations as &#8220;<a href="https://www.documentcloud.org/documents/1227228-2013-watchlist-guidance.html#document/p22">presumptively valid</a>.&#8221;</p>
<!-- BLOCK(fullbleed)[2](%7B%22componentName%22%3A%22FULLBLEED%22%2C%22entityType%22%3A%22RESOURCE%22%2C%22resource%22%3A%7B%22__typename%22%3A%22Image%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Ftheintercept.com%5C%2Fwp-content%5C%2Fuploads%5C%2F2014%5C%2F07%5C%2Fwh-900x6001.jpg%22%7D%7D)(%7B%22align%22%3A%22bleed%22%2C%22caption%22%3Anull%2C%22src%22%3A%22https%3A%5C%2F%5C%2Ftheintercept.com%5C%2Fwp-content%5C%2Fuploads%5C%2F2014%5C%2F07%5C%2Fwh-900x6001.jpg%22%7D) --><figure class='img-wrap align-bleed'><img src='https://theintercept.com/wp-content/uploads/2014/07/wh-900x6001.jpg' /></figure><!-- END-BLOCK(fullbleed)[2] -->
<h2>Profiling categories of people</h2>
<p>While the nomination process appears methodical on paper, in practice there is a shortcut around the entire system. Known as a &#8220;<a href="https://www.documentcloud.org/documents/1227228-2013-watchlist-guidance.html#document/p27">threat-based expedited upgrade</a>,&#8221; it gives a single White House official the unilateral authority to elevate entire &#8220;categories of people&#8221; whose names appear in the larger databases onto the no fly or selectee lists. This can occur, the guidelines state, when there is a &#8220;particular threat stream&#8221; indicating that a certain type of individual may commit a terrorist act.</p>
<p>This extraordinary power for &#8220;categorical watchlisting&#8221;—otherwise known as profiling—is vested in the assistant to the president for homeland security and counterterrorism, a position formerly held by CIA Director John Brennan that does not require Senate confirmation.</p>
<p>The rulebook does not indicate what &#8220;categories of people&#8221; have been subjected to threat-based upgrades. It is not clear, for example, whether a category might be as broad as military-age males from Yemen. The guidelines do make clear that American citizens and green card holders are subject to such upgrades, though government officials are required to review their status in an &#8220;expedited&#8221; procedure. Upgrades can remain in effect for 72 hours before being reviewed by a small committee of senior officials. If approved, they can remain in place for 30 days before a renewal is required, and can continue &#8220;until the threat no longer exists.&#8221;</p>
<p>&#8220;In a set of watchlisting criteria riddled with exceptions that swallow rules, this exception is perhaps the most expansive and certainly one of the most troubling,&#8221; Shamsi, the ACLU attorney, says. &#8220;It&#8217;s reminiscent of the Bush administration&#8217;s heavily criticized color-coded threat alerts, except that here, bureaucrats can exercise virtually standard-less authority in secret with specific negative consequences for entire categories of people.&#8221;</p>
<p>The National Counterterrorism Center declined to provide any details on the upgrade authority, including how often it has been exercised and for what categories of people.</p>
<!-- BLOCK(fullbleed)[3](%7B%22componentName%22%3A%22FULLBLEED%22%2C%22entityType%22%3A%22RESOURCE%22%2C%22resource%22%3A%7B%22__typename%22%3A%22Image%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Ftheintercept.com%5C%2Fwp-content%5C%2Fuploads%5C%2F2014%5C%2F07%5C%2Fline2.jpg%22%7D%7D)(%7B%22align%22%3A%22bleed%22%2C%22caption%22%3Anull%2C%22src%22%3A%22https%3A%5C%2F%5C%2Ftheintercept.com%5C%2Fwp-content%5C%2Fuploads%5C%2F2014%5C%2F07%5C%2Fline2.jpg%22%7D) --><figure class='img-wrap align-bleed'><img data-recalc-dims="1" src="https://theintercept.com/wp-content/uploads/2014/07/line2.jpg?w=1200" /></figure><!-- END-BLOCK(fullbleed)[3] -->
<h2>Pocket litter and scuba gear</h2>
<p>The guidelines provide the clearest explanation yet of what is happening when Americans and foreigners are pulled aside at airports and border crossings by government agents. The fifth chapter, titled &#8220;<a href="https://www.documentcloud.org/documents/1227228-2013-watchlist-guidance.html#document/p59">Encounter Management and Analysis</a>,&#8221; details the type of information that is targeted for collection during &#8220;encounters&#8221; with people on the watchlists, as well as the different organizations that should collect the data. The Department of Homeland Security is described as having the largest number of encounters, but other authorities, ranging from the State Department and Coast Guard to foreign governments and &#8220;certain private entities,&#8221; are also involved in assembling &#8220;encounter packages&#8221; when watchlisted individuals cross their paths. The encounters can be face-to-face meetings or electronic interactions—for instance, when a watchlisted individual applies for a visa.</p>
<p>In addition to data like fingerprints, travel itineraries, identification documents and gun licenses, the rules encourage screeners to acquire health insurance information, drug prescriptions, &#8220;any cards with an electronic strip on it (hotel cards, grocery cards, gift cards, frequent flyer cards),&#8221; cellphones, email addresses, binoculars, peroxide, bank account numbers, pay stubs, academic transcripts, parking and speeding tickets, and want ads. The digital information singled out for collection includes social media accounts, cell phone lists, speed dial numbers, laptop images, thumb drives, iPods, Kindles, and cameras. All of the information is then uploaded to the TIDE database.</p>
<p>Screeners are also instructed to collect data on any &#8220;pocket litter,&#8221; scuba gear, EZ Passes, library cards, and the titles of any books, along with information about their condition—&#8221;e.g., new, dog-eared, annotated, unopened.&#8221; Business cards and conference materials are also targeted, as well as &#8220;anything with an account number&#8221; and information about any gold or jewelry worn by the watchlisted individual. Even &#8220;animal information&#8221;—details about pets from veterinarians or tracking chips—is requested. The rulebook also encourages the collection of biometric or biographical data about the travel partners of watchlisted individuals.</p>
<p>The list of government entities that collect this data includes the U.S. Agency for International Development, which is neither an intelligence nor law-enforcement agency. As the rulebook notes, USAID funds foreign aid programs that promote environmentalism, health care, and education. USAID, which presents itself as committed to fighting global poverty, nonetheless appears to serve as a conduit for sensitive intelligence about foreigners. <a href="https://www.documentcloud.org/documents/1227228-2013-watchlist-guidance.html#document/p64">According to the guidelines</a>, &#8220;When USAID receives an application seeking financial assistance, prior to granting, these applications are subject to vetting by USAID intelligence analysts at the TSC.&#8221; The guidelines do not disclose the volume of names provided by USAID, the type of information it provides, or the number and duties of the &#8220;USAID intelligence analysts.&#8221;</p>
<p>A USAID spokesman told <em>The Intercept</em> that &#8220;in certain high risk countries, such as Afghanistan, USAID has determined that vetting potential partner organizations with the terrorist watchlist is warranted to protect U.S. taxpayer dollars and to minimize the risk of inadvertent funding of terrorism.&#8221;&nbsp;He stated that since 2007, the agency has checked “the names and other personal identifying information of key individuals of contractors and grantees, and sub-recipients.”</p>
<p><span style="font-size: 14px; line-height: 1.5em;"><!-- BLOCK(fullbleed)[4](%7B%22componentName%22%3A%22FULLBLEED%22%2C%22entityType%22%3A%22RESOURCE%22%2C%22resource%22%3A%7B%22__typename%22%3A%22Image%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Ftheintercept.com%5C%2Fwp-content%5C%2Fuploads%5C%2F2014%5C%2F07%5C%2Fscreen2.jpg%22%7D%7D)(%7B%22align%22%3A%22bleed%22%2C%22caption%22%3Anull%2C%22src%22%3A%22https%3A%5C%2F%5C%2Ftheintercept.com%5C%2Fwp-content%5C%2Fuploads%5C%2F2014%5C%2F07%5C%2Fscreen2.jpg%22%7D) --><figure class='img-wrap align-bleed'><img data-recalc-dims="1" src="https://theintercept.com/wp-content/uploads/2014/07/screen2.jpg?w=1200" /></figure><!-- END-BLOCK(fullbleed)[4] --></span></p>
<h2>Death and the watchlist</h2>
<p>The government has been widely criticized for making it impossible for people to know why they have been placed on a watchlist, and for making it nearly impossible to get off. The guidelines <a href="https://www.documentcloud.org/documents/1227228-2013-watchlist-guidance.html#text/p12">bluntly state</a> that &#8220;the general policy of the U.S. Government is to neither confirm nor deny an individual&#8217;s watchlist status.&#8221; But the courts have taken exception to the official silence and footdragging: In June, a federal judge described the government&#8217;s secretive removal process as unconstitutional and &#8220;<a href="https://www.aclu.org/sites/default/files/assets/no_fly_list_ruling__-_latif_v._holder_-_6-24-14.pdf">wholly ineffective</a>.&#8221;</p>
<p>The difficulty of getting off the list is highlighted by a passage in the guidelines stating that an individual can be kept on the watchlist, or even placed <em>onto</em> the watchlist, despite being acquitted of a terrorism-related crime. The rulebook justifies this by noting that conviction in U.S. courts requires evidence beyond a reasonable doubt, whereas watchlisting requires only a reasonable suspicion. Once suspicion is raised, even a jury&#8217;s verdict cannot erase it.</p>
<p>Not even death provides a guarantee of getting off the list. The guidelines say the names of dead people will stay on the list if there is reason to believe the deceased&#8217;s identity may be used by a suspected terrorist&#8211;which the National Counterterrorism Center calls a &#8220;demonstrated terrorist tactic.&#8221; In fact, for the same reason, the rules permit the deceased spouses of suspected terrorists to be placed onto the list <em>after</em> they have died.</p>
<p>For the living, the process of getting off the watchlist is simple yet opaque. A complaint can be filed through the Department of Homeland Security Traveler Redress Inquiry Program, which launches an internal review that is not subject to oversight by any court or entity outside the counterterrorism community. The review can result in removal from a watchlist or an adjustment of watchlist status, but the individual will not be told if he or she prevails. The guidelines highlight one of the reasons why it has been difficult to get off the list—if multiple agencies have contributed information on a watchlisted individual, all of them must agree to removing him or her.</p>
<p>If a U.S. citizen is placed on the no fly list while abroad and is turned away from a flight bound for the U.S., the guidelines say they should be referred to the nearest U.S. embassy or consulate, which is prohibited from informing them why they were blocked from flying. According to the rules, these individuals can be granted a &#8220;One-Time Waiver&#8221; to fly, though they will not be told that they are traveling on a waiver. Back in the United States, they will be unable to board another flight.</p>
<p>The document states that nominating agencies are &#8220;under a continuing obligation&#8221; to provide exculpatory information when it emerges. It adds that the agencies are expected to conduct annual reviews of watchlisted American citizens and green card holders. It is unclear whether foreigners—or the dead—are reviewed at the same pace. As the rulebook notes, &#8220;watchlisting is not an exact science.&#8221;</p>
<p><em>Josh Begley, Lynn Dombek, and Peter Maass contributed to this story.</em></p>
<p><em>Photo credits: TSA: G.J. McCarthy/Dallas Morning News/Corbis (2); Guidance: Josh Begley; White House: Win McNamee/Getty Images; Airport: Nick Ut/AP Photo</em></p>
<p>//</p>
<p><a href="http://s3.documentcloud.org/documents/1227228/2013-watchlist-guidance.pdf">2013 Watchlisting Guidance (PDF)</a></p>
<p>The post <a href="https://theintercept.com/2014/07/23/blacklisted/">The Secret Government Rulebook for Labeling You a Terrorist</a> appeared first on <a href="https://theintercept.com">The Intercept</a>.</p>
]]></content:encoded>
                                <wfw:commentRss>https://theintercept.com/2014/07/23/blacklisted/feed/</wfw:commentRss>
                <slash:comments>682</slash:comments>
                <media:content url='https://theintercept.com/wp-content/uploads/2014/07/blacklisted3.jpg?fit=1400%2C786' width='1400' height='786' /><post-id xmlns="com-wordpress:feed-additions:1">2727</post-id>
		<media:thumbnail url="https://theintercept.com/wp-content/uploads/2014/07/watchlist-cover.jpg?w=1200" />
		<media:content url="https://theintercept.com/wp-content/uploads/2014/07/watchlist-cover.jpg?w=1200" medium="image" />
		<media:content url="https://theintercept.com/wp-content/uploads/2014/07/nomination_chart.jpg?fit=1000%2C785" medium="image">
			<media:title type="html">nomination_chart</media:title>
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2014/07/nomination_chart.jpg?w=440&amp;h=440&amp;crop=1" />
		</media:content>
		<media:content url="https://theintercept.com/wp-content/uploads/2014/07/tbu2.jpg?fit=780%2C200" medium="image">
			<media:title type="html">tbu2</media:title>
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2014/07/tbu2.jpg?w=440&amp;h=440&amp;crop=1" />
		</media:content>
		<media:content url="https://theintercept.com/wp-content/uploads/2014/07/wh-900x6001.jpg" medium="image" />
		<media:content url="https://theintercept.com/wp-content/uploads/2014/07/line2.jpg?w=1200" medium="image" />
		<media:content url="https://theintercept.com/wp-content/uploads/2014/07/screen2.jpg?w=1200" medium="image" />
            </item>
            </channel>
</rss>
