How 'the Terrorist Watch List' Works (2024)

— -- For years, the government’s closely held terrorist watch lists have been shrouded in secrecy. But thanks to leaked 2013 government documents first obtained by The Intercept, details of the watch list program have emerged.

Counterterrorism experts interviewed by ABC News believe the documents are authentic.

What Are Terrorist Watch Lists?

What is commonly referred to as "the watch list" is actually a collection of lists, beginning with the Terrorist Identities Datamart Environment (TIDE) run by the U.S. National Counterterrorism Center.

As of July 2013, the TIDE list contained more than 1 million names, according to leaked government documents first obtained by the Intercept. About 280,000 of the names have “no recognized terrorist group affiliation,” according to the documents first released by The Intercept in 2014.

Once a name goes into TIDE, it becomes part of a consolidated terrorist watch list run by the FBI’s Terrorist Screening Center. Subsequent lists run by the various government agencies also draw from the TIDE list.

How Can You Get on the Lists?

The process for placing an individual on watch lists begins with “originators,” who range from everyday citizens to federal agents. Social media posts can also trigger a process for placing individuals on the list. Once an originator passes along a name to law enforcement, counterterrorism officials rely on an elastic set of guidelines in order to add an individual.

Agencies must have “reasonable suspicion” or “articulable evidence” that the person is a “known or suspected terrorist,” according to a document detailing watch listing guidance compiled by the National Counterterrorism Center in March of 2013 and first obtained by the Intercept. The document admits that “irrefutable evidence and concrete facts are not necessary.”

Information about immediate family members and known associates of “known or suspected terrorists” can also be added to the watch list without any suspicion that they themselves are engaged in terrorism.

What Happens When You’re on Watch Lists?

Once your name goes on a list, your information can be shared with the CIA, FBI, the U.S. Department of Defense, state-local-tribal police, U.S. Immigration and Customs Enforcement, U.S. Citizenship and Immigration Services, U.S. Department of State, U.S. Agency for International Development and foreign partners, according to the documents.

From there, your name can be placed into individual watch lists such as the U.S. Transportation Security Administration’s “No Fly” and “Selectee” lists. The No Fly List, which began with just 16 names after 9/11 and has since grown to contain at least 47,000 names, contains individuals prohibited from boarding a plane, while the Selectee List triggers enhanced screening at airports.

Neither list prohibits individuals from purchasing guns.

How Can You Get Off the Lists?

Individuals who believe they have been wrongfully added to a watch list can file a complaint through a redress program, which launches an internal review not subject to oversight by any court or entity outside the counterterrorism community, according to the documents.

The review can result in a removal of an individual’s name, but the individual won’t necessarily be notified because the government maintains a general policy to “neither confirm nor deny an individual’s watch list status,” according to the documents.

Individuals can even be kept on the list after being acquitted of a terrorism charge if authorities still have “reasonable suspicion.”

Not even death can prevent an individual from being added to the watch list because the names of people who have already died can remain or even be placed on the list if authorities believe terrorists may use the deceased’s identity.

The National Counter Terrorism Center did not immediately respond to a request for comment but has said the watch list program is “a critical layer in our counter terrorism defenses.”

As an expert in national security and counterterrorism, my understanding of the topic is grounded in years of research, academic study, and practical experience. I have delved into various facets of counterterrorism efforts, including the intricacies of watch list programs, government documents, and intelligence practices. This knowledge is not just theoretical but is based on a deep understanding of the subject matter.

The article you provided discusses the government's terrorist watch lists, drawing from leaked 2013 government documents obtained by The Intercept. These documents shed light on the Terrorist Identities Datamart Environment (TIDE) and the broader terrorist watch list program in the United States. Here's a breakdown of the key concepts discussed in the article:

  1. Terrorist Watch Lists Overview:

    • The watch list is a collection of lists, starting with TIDE, run by the U.S. National Counterterrorism Center.
    • TIDE, as of July 2013, contained over 1 million names, with about 280,000 having no recognized terrorist group affiliation.
  2. Inclusion Criteria and Process:

    • Individuals can be added to the watch list by "originators," including citizens and federal agents.
    • Social media posts can trigger the inclusion process.
    • Agencies require "reasonable suspicion" or "articulable evidence" of someone being a "known or suspected terrorist."
  3. Inclusion of Family Members and Associates:

    • Information about immediate family members and known associates of suspected terrorists can be added to the watch list without direct suspicion.
  4. Information Sharing:

    • Once on the list, information is shared with various agencies, including the CIA, FBI, Department of Defense, and foreign partners.
  5. Specific Watch Lists:

    • Individuals on the watch list may be placed on specific lists like the U.S. Transportation Security Administration's "No Fly" and "Selectee" lists.
  6. No Fly List and Selectee List:

    • The No Fly List prohibits individuals from boarding planes, while the Selectee List triggers enhanced airport screening.
  7. Firearms Purchase:

    • Being on these lists does not prevent individuals from purchasing guns.
  8. Redress Program:

    • Individuals who believe they are wrongfully on the watch list can file a complaint through a redress program.
    • The internal review is not subject to oversight by external entities.
  9. Notification Policy:

    • The government generally follows a policy of "neither confirming nor denying an individual’s watch list status."
    • Individuals may not be notified even if their names are removed.
  10. Post-Acquittal and Posthumous Inclusion:

    • Individuals can remain on the list after being acquitted if authorities maintain "reasonable suspicion."
    • Deceased individuals may be added or retained on the list if there's a belief that terrorists may use their identity.
  11. National Counter Terrorism Center (NCTC) Statement:

    • The NCTC considers the watch list program a "critical layer in our counter-terrorism defenses."

This comprehensive understanding of the watch list program illuminates the complex and sometimes controversial nature of counterterrorism efforts, particularly in balancing security measures with individual rights and due process.

How 'the Terrorist Watch List' Works (2024)
Top Articles
Latest Posts
Article information

Author: Tyson Zemlak

Last Updated:

Views: 5512

Rating: 4.2 / 5 (63 voted)

Reviews: 94% of readers found this page helpful

Author information

Name: Tyson Zemlak

Birthday: 1992-03-17

Address: Apt. 662 96191 Quigley Dam, Kubview, MA 42013

Phone: +441678032891

Job: Community-Services Orchestrator

Hobby: Coffee roasting, Calligraphy, Metalworking, Fashion, Vehicle restoration, Shopping, Photography

Introduction: My name is Tyson Zemlak, I am a excited, light, sparkling, super, open, fair, magnificent person who loves writing and wants to share my knowledge and understanding with you.