. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

I got an email saying I could find out if I was on a terrorist watch list by filing a Freedom of Information Act (FOIA) request about me. I made that FOIA request and all the federal agencies responded saying they could neither confirm nor deny it. However, the Foreign Intelligence Surveillance Act of 1978 offers ways to detect if you are on a terrorist watch list, also known as a no-contact list.

1) If there is a repeat of breaking laws, including traffic violations, and you are rarely stopped by the police. If you are on a terrorist watch list where electronic surveillance is used to investigate you, no law enforcement agency can detain you with that information unless they have “prior authorization from the Attorney General.” 50 US Code Section 1806(b).

2) You have electronically told friends or family that you have a disease that could be contagious. The government does not consider health information from word of mouth to be privileged and may retain this information if the United States Attorney General can claim that your illness “indicates a threat of death or serious bodily harm to any person.” 50 US Code Section 1801(h)(4).

3) Your US mail is regularly delayed or intercepted, especially for financial matters, since the goal is to financially oppress a “suspected” terrorist.

4) Your medical personnel, such as dentists, veterinarians or doctors, commonly engage in negligence or malpractice to harm you or your loved ones. The healthcare industry is no longer neutral and is working with law enforcement to jail these targets.

5) You have a common problem with hacking into your Internet communications. The intelligence community constantly tests its technical capabilities in electronic warfare on these targets.

6) If items in your home go missing and your doorknob comes loose when you pick the lock, you could be a victim of sneaky warrants where the police will enter your home without your knowledge or consent.

7) Look out for any unusual symbolism of public or private people, as they are not supposed to communicate with you directly, so they use the symbolism.

8) If you make complaints of these violations of the law and the authorities do not show due diligence to investigate your complaints.

9) If you notice a repeat of being delayed in a place like a health center with children because the authorities use electronic surveillance to claim that you are a danger to others, even though they are the people responsible for organizing it.

10) If you receive regular emails that could be considered a threat, as law enforcement wants to incapacitate these targets financially, mentally, and physically.

GPO Staff, (1978), “The Foreign Intelligence Surveillance Act of 1978” United States Library of Congress, Government Printing Office (GPO). Document Superintendent Certificate issued by Verisigb CA for Adobe CDS. Publicly available at http://www.GPO.gov/fdsys/granule/statute-92/statute-92-Pg1783/content-detail.html

Leave a comment

Your email address will not be published. Required fields are marked *