Bowe Bergdahl Full Court Martial Case Referred

While Bowe Bergdahl’s defense team requested a lower level referral for his desertion case, such is not the outcome. He is formally being charged with in his court martial for desertion and abandoning his post as well as mis-behavior before the enemy.

The Republicans issued a 98 page report out of the House Armed Services Committee that concluded the Obama administration violated law by not giving Congress the mandatory 30 day notice of transfer of Guantanamo detainees to Qatar of which 5 were transferred in exchange for Bergdahls’s release.

Then there is the hypocrisy of the Obama administration with regard as to paying ransom for hostages.

But there is plenty more about the Bergdahl case and it includes the FBI, failed information and money.

Inside the Botched Rescue of Bowe Bergdahl

Shane Harris/DailyBeast: The U.S. government paid a ransom in the hopes of freeing the captive American soldier, a congressman alleges. But when the FBI went to get Bowe Bergdahl, he wasn’t there.
In late February of 2014, a representative of the Federal Bureau of Investigation traveled to the border of Afghanistan and Pakistan, ready to bring home Sgt. Bowe Bergdahl, who had been held for nearly five years by an ally of the Taliban.The operation wasn’t announced publicly. But within U.S. national security agencies, word spread that the most well-known American hostage, who had disappeared from his remote post in Afghanistan in 2009, was about to be released. It was a particularly anxious moment because the Taliban had recently broken off talks over a potential prisoner swap for Bergdahl.But the FBI wasn’t anticipating a prisoner exchange. Instead, according to a member of Congress and another individual who is knowledgeable about the operation, the U.S. government had sent money to Bergdahl’s captors in the hopes of freeing him.

The FBI’s representative waited. But Bergdahl never came. Any hopes for his homecoming were soon eclipsed by concerns that the information that prompted the rescue effort was false or misleading. Had the FBI been duped? Had the U.S. paid a ransom for Bergdahl and been cheated?
Bergdahl was eventually freed at the end of May 2014, in exchange for five Taliban prisoners held at Guantanamo Bay. But the botched rescue operation three months earlier raised questions about whether the FBI, which is in charge of efforts to repatriate all Americans held hostage overseas, had received shoddy intelligence about where Bergdahl was being held and his condition, and if other efforts to recover Americans might also be the victim of bad intelligence.
“What we know is that non-DOD [Department of Defense] organizations, led by the Federal Bureau of Investigation (FBI), undertook the recovery mission,” Rep. Duncan Hunter, who has investigated the Bergdahl case and is a critic of the Obama administration’s hostage rescue efforts, wrote in a letter Friday to the Justice Department Inspector General.

“In fact, in February 2014, it was the FBI that disclosed to military officials that Bergdahl’s release was imminent; however, after several days, nothing happened,” Hunter said.
A copy of the letter describing the FBI’s lead role, which hasn’t been previously reported, was obtained by The Daily Beast.
What had prompted the FBI to send an emissary to a dangerous border region, all while efforts were under way, albeit in fits and starts, to conduct a prisoner swap?

Hunter wrote to the the Justice Department that a senior official has claimed that the U.S. government “paid [the] Haqqani Network for Bergdahl’s release and received nothing in return.” The Haqqani are a Taliban ally that operates along the border region, and have a history of negotiating for prisoners.

Based on his own sources and information he has seen, Hunter said, the person sent by the FBI to the border “awaited Bergdahl’s arrival following some form of discussion about facilitating a payment.”

President Obama and his top aides have said many times that the U.S. will not pay ransoms for hostages, despite the willingness of the Haqqani and other groups, including al Qaeda, to barter for the lives of their captives.

But that policy is at best a half-truth. In fact, the government has paid money to hostage takers and helped hostages’ families do the same, and that practice is likely to continue, according to kidnapping ransom experts and current and former U.S. officials.

But the administration has never said it paid a ransom for Bergdahl. Instead, officials have argued that the prisoner swap was the only viable option. The administration faced opposition to the swap in Congress, after senior intelligence officials told lawmakers that the five Taliban were likely to return to hostilities against the U.S. if they were freed. And the families of some civilian hostages questioned why the president was willing to exchange prisoners for a solider but not their loved ones.

Hunter has previously raised allegations that the U.S. government paid a ransom for Bergdahl and questioned whether any intermediaries absconded with the money. But the release of a scathing report on the prisoner swap last week by the House Armed Services Committee has fueled a new effort to learn if the U.S. tried to pay for Bergdahl’s return.

Bergdahl himself is also back in the public spotlight, as the subject of Season 2 of the acclaimed podcast Serial, which premiered last week.

Some of Bergdahl’s fellow soldiers have said the Army risked lives trying to rescue him, and have accused Bergdahl of desertion. And the soldier has become a lightning rod in the 2016 presidential election. The leading Republican presidential candidate, Donald Trump, has repeatedly called Bergdahl a traitor who abandoned his post and endangered other troops who tried to rescue him.

Allegations of failed rescue missions and secret ransoms would only deepen the controversy surrounding Bergdahl’s release.

The Defense Department’s inspector general looked into the allegations of a ransom payment and determined that none was paid. But the watchdog agency has no jurisdiction over the FBI and apparently only looked at whether Pentagon funds were used. Now, Hunter wants the Justice Department to investigate the FBI’s role and whether money came from there or other sources, and if such payments violated any laws.

Two sources familiar with the FBI-led operation in 2014 said it involved no exchange of prisoners, but that there was no reason to believe Bergdahl’s captors would let him go without getting something in return. Indeed, they had already been negotiating for a prisoner swap.

By late February, word of the plan was spreading throughout the corridors of government. On Feb. 27, the committee found, an email was sent around to personnel in the National Security Council, the Defense Department, and the State Department, about a report that “[i]n approximately 7-10 days, there is the possibility that the USG may be able to recover Sgt. Bowe Bergdahl.”

The committee doesn’t identify the author of the email, but two knowledgeable sources said it refers to the FBI operation. There’s no indication from the committee’s report that anyone who received the message realized the operation was going nowhere, and that Bergdahl wasn’t about to be freed.

Some important details of the FBI-led operation remain unclear, including whether the person sent over the border was an FBI agent or a proxy.

A spokesperson for the FBI didn’t comment for this story.

But what is clear is that the Pentagon knew that the FBI was getting involved. How much military officials vetted the intelligence that prompted the bureau to go to the border, however, is an open question. Committee investigators claimed that senior military officials tried to obscure what they knew about the FBI plan, and to portray the five-for-one prisoner swap, which was backed by the administration, as the only real option being pursued.

The Defense Department “was aware of this operation and maintained situational awareness of it, but did not directly participate in it,” the Pentagon’s inspector general told the committee, referring to what sources told The Daily Beast was the FBI operation.

How closely the military and law enforcement worked together to recover Bergdahl is important for understanding whether more could have been done to secure his release without trading the five Taliban prisoners. There are also at least three Americans still being held by the Haqqani network, and understanding what has worked in the past—or hasn’t—could help speed their safe return.

The military was also pursuing a plan to rescue Bergdahl by force, the committee found, another option that apparently involved no prisoner swaps.

An email sent on Feb. 28, 2014, refers to a briefing and “slidedeck” that had been “evidently worked up by JSOC [the military’s Joint Special Operations Command], replete with a code name and an exfiltration plan,” according to the email’s anonymous author.

The email was sent to Michael Dumont, the deputy assistant secretary of defense for Afghanistan, Pakistan, and Central Asia. After receiving it, he wrote to two senior colleagues with concerns that the plan might be exposed.

“For something that was to be very, very close hold and extremely sensitive, this is starting to get out. We need to somehow shut this down and get the info back under control,” Dumont told Rear Adm. Craig Faller, who was then director of operations at U.S. Central Command, and Army Brig. Gen. Robert White, then the director of the Pakistan Afghanistan Coordination Cell for the Joint Staff.

The rescue plan was apparently never launched, and it’s not clear why. But Dumont’s email shows that the prisoner swap was not the only rescue operation on the Pentagon’s drawing board.

When the Armed Services Committee asked Dumont and other officials about alternate plans, they said they had no knowledge of them, a fact that “deeply concerned” the investigators considering there was an email trail and active discussion within several branches of government about multiple efforts, including the allegedly imminent release of Bergdahl to the FBI.

The committee asked Dumont how close any options besides the prisoner swap came to fruition. “Were you on the verge at some point [of recovering Sgt. Bergdahl]?”

Dumont responded, “During my tenure, I would say, no, we were not on the verge. Proposals that people were coming to talk to me about I thought were half-baked and ill-conceived and risky… I didn’t find anything that was viable.”

After Bergdahl was released, senior administration officials also said the trade was the only option to free him. Testifying before the Armed Services Committee in June 2014, then-Defense Secretary Chuck Hagel was asked if the prisoner swap was the only non-military alternative to get Bergdahl.

“Yes…this was the one option that we had,” Hagel said, adding that there were no other “non-kinetic” alternatives that were “serious,” that is, options for freeing Bergdahl that didn’t involve the use of force.

The congressional investigators accused the Pentagon of misrepresenting those plans and how advanced they really were.

“The fact that the Committee did not learn about any prospective alternative recovery planning efforts until related information was produced in the course of this investigation additionally illustrates the fraught oversight relationship which exists between the Committee and the Department.”

The committee said it would continue investigating Bergdahl’s release.

More Hillary Emails are Missing Regarding her Server

State Department can’t find emails of top Clinton IT staffer

The FBI has taken possession of Bryan Pagliano’s computer system.

Politico: The State Department has told Senate investigators it cannot find backup copies of emails sent by Bryan Pagliano, the top Hillary Clinton IT staffer who maintained her email server but has asserted his Fifth Amendment right and refused to answer questions on the matter.

State officials told the Senate Judiciary Committee in a recent closed-door meeting that they could not locate what’s known as a “.pst file” for Pagliano’s work during Clinton’s tenure, which would have included copies of the tech expert’s emails, according to a letter Chairman Chuck Grassley sent to Secretary of State John Kerry that was obtained by POLITICO.

The department also told the committee the FBI has taken possession of Pagliano’s government computer system, where traces of the messages are most likely to be found, according to the letter.

Grassley, an Iowa Republican, has been considering whether to grant Pagliano immunity in exchange for testimony on who approved Clinton’s private email setup and whether anyone raised any objections to the system. The controversy over her decision to bypass a government email address, which would have made her messages easier for reporters and the public to obtain, has dogged the presidential hopeful for much of the year, though it has subsided in recent weeks.

Pagliano — who worked for Clinton’s 2008 presidential campaign, then followed her to the State Department — has refused to discuss Clinton’s email arrangement or his role in it, invoking his right against self-incrimination before the House Benghazi Committee earlier this fall.

Clinton had personally paid Pagliano to maintain her home-made server, which is also currently in the FBI’s possession. The agency has been investigating whether classified material was ever put at risk because she used her own server instead of the standard State email system. The State Department has designated about 1,000 of her emails as classified documents, which would never have been allowed on such a private system. Clinton’s representatives maintain that the emails were not classified at the time they were sent.

Pagliano’s lawyer could not be reached for comment.

Grassley had requested Pagliano’s emails to help inform his decision whether to grant Pagliano immunity.

“Given that the committee is unable to obtain [Pagliano’s] testimony at this time, I am seeking copies of his official State Department emails relevant to the Committee’s inquiry before proceeding to consider whether it might be appropriate to grant him immunity and compel his testimony,” Grassley’s letter states. It notes that such emails are a “top priority” in a list of several outstanding Clinton-related inquiries the panel has sent to the department.

The State Department said that while it has located a backup for emails Pagliano sent after Clinton left State, officials cannot find the file for the backup covering work he did while she was still there.

“The Department has located a .pst from Mr. Pagliano’s recent work at the Department as a contractor, but the files are from after Secretary Clinton left the State Department. We have not yet located a .pst that covers the time period of Secretary Clinton’s tenure,” said Alec Gerlach, a State Department spokesman. “We are continuing to search for Mr. Pagliano’s emails which the Department may have otherwise retained. We will, of course, share emails responsive to Senator Grassley’s requests if we locate them.”

State, like many federal agencies, did not have a systematic email archiving system for years. When the server issue first arose in the spring, State acknowledged that it did not automatically archive the email traffic of senior employees — relying on them to make their own backups, or “.pst,” if needed. Under current rules, federal employees are responsible for ensuring their official emails are saved.

State has not asked Pagliano whether he has any official emails in his possession, as it has with other top Clinton staffers who used personal email for work. It is unclear if Pagliano’s Fifth Amendment rights would protect him from turning over such messages.

Grassley encouraged State to continue searching for Pagliano’s emails by looking at the back-up email files of other State employees he may have emailed about the Clinton server. He letter seeks “a full and detailed written explanation of why it failed to maintain an archive, copy, or backup of Mr. Pagliano’s email file,” among other requests related to the IT staffer’s emails.

While State hasn’t been able to meet Grassley’s requests so far, his letter did offer some rare praise for the department, commending Kerry and State for what Grassley called a “recent increase in cooperation and focus on the committee’s request.” The letter says Judiciary has prioritized 22 requests for information and received seven “fully complete responses” and nine “partially complete responses.”

And State, which has been bombarded by inquiries about Clinton’s email setup, seems to appreciate the recognition: “As Senator Grassley noted, the State Department has been working very closely with his staff to get him the requested information and documents, and we are making progress,” Gerlach added.

Grassley had been blocking the confirmation of about 20 of State’s Foreign Service nominees because the department hadn’t fulfilled various document requests, including those for another probe he’s conducting on the dual-employment status of top Clinton adviser Huma Abedin. Abedin advised Clinton while she was also working for a consulting company; Grassley has been asking for information about the arrangement since 2013.

Given State’s recent responsiveness, however, he recently dropped the 20 holds but maintained a block on two more high-level nominees: Brian James Egan to be a State legal adviser and David Malcolm Robinson to be assistant secretary for conflict and stabilization operations and coordinator for reconstruction and stabilization. In November, Grassley also added a third hold on another top-level Obama State Department nominee, Thomas Shannon Jr., to be undersecretary of state for political affairs.

Grassley in his recent letter, however, hinted that if State continues working with his committee at the current pace, he could be amenable to releasing his holds.

“Assuming the committee receives the additional items promised by your staff in yesterday’s meeting, I intend to take action to recognize this progress before Senators leave town for the holiday break,” he said, nodding specifically to any copies of Pagliano emails they could discover by searching other employee’s emails.

 

 

 

 

Refugee Screening Process via White House

Feds warn of bogus batch of Syrian passports amid report ISIS can print them

In part from FNC: Intelligence agencies have already flagged some 3,800 counterfeit Syrian passports, and will add data on another 10,000 fake Syrian passports recently intercepted in Bulgaria on the way to Germany. The sheer volume of fake passports flooding the market as refugees – or terrorists posing as refugees – pour into Europe has investigators on edge. The fake Syrian passports will add to an already challenging problem of vetting Syrian refugees, said Claude Arnold, a former DHS Investigations special agent in charge for Minneapolis and Los Angeles.

“In absence of specific intelligence that identifies the refugee as a member ISIS, we are not going to know they are a member of ISIS,” Arnold said. “We don’t have those boots on the ground in Syria, no one is really gathering that information, it’s a no mans land. So their application is based solely on story that person tells. It is dangerous, it is idiotic.”

Infographic: The Screening Process for Refugee Entry into the United States

Refugees undergo more rigorous screening than anyone else we allow into the United States. Here’s what the screening process looks like for them:

The Screening Process for Refugees Entry Into the United States (full text of the graphic written below the image)

The Full Text of the Graphic:


The Screening Process for Refugee Entry Into the United States

Recurrent vetting: Throughout this process, pending applications continue to be checked against terrorist databases, to ensure new, relevant terrorism information has not come to light. If a match is found, that case is paused for further review. Applicants who continue to have no flags continue the process. If there is doubt about whether an applicant poses a security risk, they will not be admitted.

  1. Many refugee applicants identify themselves to the U.N. Refugee Agency, UNHCR. UNHCR, then:
    • ​​Collects identifying documents
    • Performs initial assessment
      • Collects biodata: name, address, birthday, place of birth, etc.
      • Collects biometrics: iris scans (for Syrians, and other refugee populations in the Middle East)
    • Interviews applicants to confirm refugee status and the need for resettlement
      • Initial information checked again
    • Only applicants who are strong candidates for resettlement move forward (less than 1% of global refugee population).
  2. Applicants are received by a federally-funded Resettlement Support Center (RSC):​​
    • Collects identifying documents
    • Creates an applicant file
    • Compiles information to conduct biographic security checks
  3. Biographic security checks start with enhanced interagency security checks

    Refugees are subject to the highest level of security checks of any category of traveler to the United States.

    • ​​U.S. security agencies screen the candidate, including:
      • National Counterterrorism Center/Intelligence Community
      • FBI
      • Department of Homeland Security
      • State Department
    • The screening looks for indicators, like:
      • Information that the individual is a security risk
      • Connections to known bad actors
      • Outstanding warrants/immigration or criminal violations
    • DHS conducts an enhanced review of Syrian cases, which may be referred to USCIS Fraud Detection and National Security Directorate for review. Research that is used by the interviewing officer informs lines of question related to the applicant’s eligibility and credibility.
  4. Department of Homeland Security (DHS)/USCIS interview:
    • Interviews are conducted by USCIS Officers specially trained for interviews​​
    • Fingerprints are collected and submitted (biometric check)
    • Re-interviews can be conducted if fingerprint results or new information raises questions. If new biographic information is identified by USCIS at an interview, additional security checks on the information are conducted. USCIS may place a case on hold to do additional research or investigation. Otherwise, the process continues.
  5. Biometric security checks:
    • Applicant’s fingerprints are taken by U.S. government employees
      • Fingerprints are screened against the FBI’s biometric database.
      • Fingerprints are screened against the DHS biometric database, containing watch-list information and previous immigration encounters in the U.S. and overseas.
      • Fingerprints are screened against the U.S. Department of Defense biometric database, which includes fingerprint records captured in Iraq and other locations.
    • If not already halted, this is the end point for cases with security concerns. Otherwise, the process continues.
  6. Medical check:
    • The need for medical screening is determined​​
    • This is the end point for cases denied due to medical reasons. Refugees may be provided medical treatment for communicable diseases such as tuberculosis.
  7. Cultural orientation and assignment to domestic resettlement locations:
    • ​​Applicants complete cultural orientation classes.
    • An assessment is made by a U.S.-based non-governmental organization to determine the best resettlement location for the candidate(s). Considerations include:
      • Family; candidates with family in a certain area may be placed in that area.
      • Health; a candidate with asthma may be matched to certain regions.
    • A location is chosen.
  8. Travel:
    • ​​International Organization for Migration books travel
    • Prior to entry in the United States, applicants are subject to:
      • Screening from the U.S. Customs and Border Protection’s National Targeting Center-Passenger
      • The Transportation Security Administration’s Secure Flight Program
    • This is the end point for some applicants. Applicants who have no flags continue the process.
  9. U.S. Arrival:
    • ​​All refugees are required to apply for a green card within a year of their arrival to the United States, which triggers:
      • Another set of security procedures with the U.S. government.
    • Refugees are woven into the rich fabric of American society!

‎Amy Pope is Deputy Assistant to the President for Homeland Security

Terrifying DHS Testimony on Syrians

DHS: We Have No Idea How Many Syrian Refugees Are In The US

A senior official at the Department of Homeland Security admitted the agency has no clue how many Syrian refugees have entered the United States in the past year, while under fire in an intense congressional hearing Thursday.

Kelli Ann Burriesci, deputy assistant secretary at DHS, told the House Oversight and Government Reform subcommittee DHS doesn’t know how many Syrians entered the United States or how many Americans left the United States for Syria in the past year, reported The Washington Free Beacon.

That answer did not please members of the National Security subcommittee, who had asked DHS to send Secretary Jeh Johnson to testify, but were sent Burriesci instead. Many of their questions went unanswered, to their apparent frustration.

“You can’t give us the number of people on expired visas?” Republican Rep. Ron DeSantis, the  subcommittee chairman, asked Burriesci. “You have staff? can they just call DHS so we get it before the hearing is over? This should not be that difficult.”

Republican Rep. Mark Meadows noted the last time DHS provided Congress with accurate numbers of visa overstays was more than two decades ago, in 1994.

“Islamic jihadists are on the march and 13 people were massacred in San Bernardino, yet DHS seems clueless about what is going on with potential threats to our security,” DeSantis said after the hearing, according to the Free Beacon. “Congress needs to plug holes in immigration programs ranging from the visa waiver program to the refugee program. The testimony by DHS today gave Americans serious cause for concern about whether our government has a handle on the threats we face.”

Forced imposition of Syrian refugees on states throughout the U.S., coupled by the recent attacks in Paris and San Bernardino, have prompted renewed scrutiny on immigration from countries with high levels of terror activity. Members of Congress have struggled to find answers and come up with quick solutions to prevent another terror attack from occurring.

Republican presidential candidate Donald Trump has proposed temporarily banning all Muslim immigration to the U.S.  About 20 percent of Democrats and 65 percent of Republicans expressed support for the proposal in a recent poll, although it has been widely denounced by the administration and members of Congress on both sides of the aisle.
Many seem disillusioned with what appears to be an administration ready to blame terror activity on anything but Islam. The San Bernardino attacks did not improve that perceived track record.

The Obama administration attempted to label the attacks as workplace violence, and a recent report indicated that the only reason the FBI held off classifying the acts as terrorism immediately is because of undue pressure from the White House.

The Variable Terror, Red Flag and Embargo Lists

It is admitted by the General Accounting Office that flaws in watch-lists DO exists as noted by this report titled: TERRORIST WATCH LIST SCREENING

Opportunities Exist to Enhance Management Oversight, Reduce Vulnerabilities in Agency Screening Processes, and Expand Use of the List

It appears this reported dated 2007, has not been updated, amended or reviewed by Congress which is in large part, the debate today given the San Bernardino massacre by a pair of militant Islamists.

 

No-Fly List Is Only One of Many U.S. Watchlists
Obama wants to deny those on list from buying guns; GOP objects and ACLU wants reforms
WSJ: WASHINGTON—Last week’s mass shooting in San Bernardino is sparking a renewed debate about one of the most controversial domestic aspects of the war on terror: The U.S. government’s watchlists.

The federal government maintains several databases of people suspected of links to terrorism, including a no-fly list barring certain individuals from boarding airplanes in the U.S.

Those databases, especially the no-fly list, long have been challenged by civil libertarians regarding the lack of transparency about how and why people are included. Most individuals in the databases have never been charged with a crime and are only suspected of being involved with terrorism.

The no-fly list itself is the smallest of all the government terrorism watchlists with about 16,000 names at last count, though it has attracted the most public criticism and legal challenges. A federal court this year declared the government’s system for dealing with appeals and challenges to inclusion on the no-fly list are unconstitutional.
Passengers on the no-fly list are denied the ability to board flights, but previously weren’t given an explanation why. In response to a lawsuit, the government said this year it would tell passengers if they were on the list and offer them an opportunity to provide additional information as part of an administrative appeals process to potentially be removed from the list.

In the wake of the California attack that killed 14 people and that investigators say may have been inspired by Islamic State, Democrats want people who are banned from air travel to also be prevented from buying weapons. Republicans say such a ban would be overly broad and may deprive some Americans of their constitutional right to bear arms.

The text of a Senate bill didn’t explicitly mention either the no-fly list or any other terrorism list, but Democratic sponsors said it would in practice ban those on the government lists from buying guns. The proposal, which would gave the attorney general the power to block gun sales, was defeated in the Senate last week.

Still, President Barack Obama continued to make the case for the proposal in a speech from the Oval Office Sunday night. “Congress should act to make sure no one on a no-fly list is able to buy a gun. What could possibly be the argument for allowing a terrorist suspect to buy a semi-automatic weapon?” he said.
Some Republicans and other gun rights supporters have pointed to the high error rates and false positives in the government’s terrorism databases. In one notable incident, the late Massachusetts Sen. Ted Kennedy, a Democratic Party icon, was singled out for special scrutiny at airports because his name matched an alias used by a terrorist suspect.

“These are everyday Americans that have nothing to do with terrorism, they wind up on the no-fly list, there’s no due process or any way to get your name removed from it in a timely fashion, and now they’re having their Second Amendment rights being impeded upon,” Sen. Marco Rubio, a Republican presidential candidate, told CNN this week.

Various government agencies maintain databases on suspected terrorists, each with a different function. Most of those lists were either created or vastly expanded after the Sept. 11, 2001 terrorist attacks under President George W. Bush’s administration.

The National Counterterrorism Center runs a central repository of more than 1 million people called Terrorist Identities Datamart Environment, or TIDE. The TIDE database, which includes about 25,000 Americans as of 2013, is drawn from intelligence community sources and is classified.

An unclassified subset of the TIDE database is made available to law enforcement as part of the Terrorist Screening Database. That database contains biographical and biometric information about potential terrorists and can be accessed by local, state and federal law enforcement officials who don’t have security clearances. As of 2011, that database was said to contain about 420,000 names, according to the FBI.

The Transportation Security Administration receives an even smaller list of people subject to travel restrictions drawn from the Terrorist Screening Database. In addition to the 16,000 names on the no-fly list in 2011, another 16,000 were on the selectee list. The selectee list doesn’t prevent individuals from flying but subjects them to extra scrutiny.

Critics say that banning suspected terrorists from buying guns poses the same problems as banning them from traveling: namely, the lack of transparency around the process used and concern of depriving individuals of their rights over the mere suspicion of terrorism.

“There is no constitutional bar to reasonable regulation of guns and the no-fly list could serve as a tool for it—but only with major reform,” said Hina Shamsi, an attorney with the American Civil Liberties Union’s National Security Project.

Ms. Shamsi litigated the ACLU’s ongoing challenge to the no-fly list in federal court, winning a victory for several of her clients who were denied the right to travel. Several plaintiffs in the lawsuit were removed from the no-fly list and the government has made some modifications

“These lists are compiled on the basis of mere suspicions,” said Bruce Ackerman, a constitutional law scholar and professor at Yale University. “What we need is a system in which defense lawyers who have received security clearances can effectively challenge the government’s evidence.”

Per the U.S. State Department, there are several other lists.

Red Flags and Watch Lists

Red Flags

 

These links, and subsequent links found on these web pages, describe the efforts of the U.S. federal government in the area of export control through Project Shield America. The Department of Homeland Security’s Immigration and Customs Enforcement office takes a proactive stance on the prevention of illegal export of sensitive U.S. munitions and strategic technology. Through the inspection of outbound shipments at high-threat ports and border crossings, educational outreach to industry leaders, and international cooperation with foreign governments, Project Shield America endeavors to protect American technological accomplishment from adversaries. These links also inform the public about the effective role that it can play in deterring illegal export activity. “Red Flag Indicators,” from the Department of Commerce’s Bureau of Industry and Security, encourage citizens to play an active role in the fight against proliferation and highlights specific activity indicative of potential export violations.

 

 

U.S. Department of Homeland Security – Shield America Brochure
U.S. Department of Commerce – Red Flag Indicators
 

Watch Lists

The following links provide information on countries, companies, and individuals that the U.S. Departments of State, Commerce, and Treasury have determined constitute a potential threat to domestic export control initiatives. Additionally, summary information about embargoes and sanctions imposed by the United States, United Kingdom, and the United Nations can be found below.

AECA Debarred List – Entities and individuals prohibited from participating directly or indirectly in the export of defense articles, including technical data and defense services.  Pursuant to the Arms Export Control Act (AECA) and the International Traffic in Arms Regulations (ITAR), the AECA Debarred List includes persons convicted in court of violating or conspiring to violate the AECA and subject to “statutory debarment” or persons established to have violated the AECA in an administrative proceeding and subject to “administrative debarment.”

U.S. Denied Persons List – Individuals and entities that have been denied export privileges. Any dealings with a party on this list that would violate the terms of its denial order are prohibited.

U.S. Unverified List – The Unverified List includes names and countries of foreign persons who in the past were parties to a transaction with respect to which the Bureau of Industry and Security (BIS) could not conduct a pre-license check (PLC) or a post-shipment verification (PSV) for reasons outside of the U.S. Government’s control. Any transaction to which a listed person is a party will be deemed by BIS to raise a Red Flag.

U.S. Specially Designated Nationals Lists – OFAC publishes a list of individuals and companies owned or controlled by, or acting for or on behalf of, targeted countries. It also lists individuals, groups, and entities, such as terrorists and narcotics traffickers designated under programs that are not country-specific. Collectively, such individuals and companies are called “Specially Designated Nationals” or “SDNs.” Their assets are blocked and U.S. persons are generally prohibited from dealing with them.

Entity List –  Parties whose presence in a transaction can trigger a license requirement supplemental to those elsewhere in the Export Administration Regulations (EAR). The list specifies the license requirements and policy that apply to each listed party.

U.S. Embargo Reference Chart – Foreign countries against which the United States federal government has imposed controls for the export of defense articles and services.

Consolidated Screening List – Link to a downloadable file that consolidates export screening lists of the Departments of Commerce, State and the Treasury into one spreadsheet as an aide to industry in conducting electronic screens of potential parties to regulated transactions. UK Embargoes – A reference point for lists of UN, EU, OSCE, and UK sanctions.