0
0

[–] mememeyou ago 

a mirror works too

0
1

[–] DrSelfAppointed 0 points 1 point (+1|-0) ago 

3.9 is their activity list, which the first part about 1st amendment rights is from, they talk about several times . 3.18 below is there examples of terror to be put on the list.

...Furthermore, some activities conducted by US PERSONS or activities taking place within the United States, may be an exercise of rights guaranteed by the First Amendment. Watchlisting an individual for engaging solely in constitutionally protected activities is prohibited...

3.18 Examples of TERRORISM and/or TERRORIST ACTIVITIES may generally include conduct intended to intimidate, coerce, in?uence, or affect civilian populations or government policy consisting of:

3.18.1 destruction of aircraft or aircra? facilities (I 8 U.S.C. 32);

3.18.2 violence at international airports (18 U.S.C. 37);

3.18.3 biological weapons (I 8 U.S.C. 175 or l75b);

3.18.4 variola virus (18 U.S.C. l75c);

3.18.5 chemical weapons (I 8 U.S.C. 229);

3.18.6 assassination and kidnapping of Congressional Members, Cabinet Of?cials, and Supreme Court Justices(18 U.S.C. 351 or

3.18.7 nuclear materials (18 U.S.C. 831);

3.18.8 participation in nuclear and weapons of mass destruction threats to the United States (18 U.S.C. 832);

3.18.9 plastic explosives (l8 U.S.C. 842(m) or footnote

3.18.10 arson and bombing of Government property risking or causing death (18 U.S.C. 344(0(2) or

3.18.1 I arson and bombing of property used in interstate commerce (18 U.S.C. 844(i));

?58 A classi?ed list of recognized terrorist organizations that are known to reuse TERRORIST identity information is available on the Watchlisting Community of Interest portal on NCTC Current.

OR OFFICIAL USE SIT IVE SECURITY INFORMATION

Page 47

UN CLASSIF OR OFFICIAL USE SECURITY INFORMATION

3.18.12 killing or attempted killing during an attack on a Federal facility with a dangerous weapon (18 U.S.C. 930(0));

3.18.13 conspiracy to murder, kidnap, or maim persons abroad (18 U.S.C.

3.18.14 damaging a protected computer used in interstate or foreign commerce or that is used exclusively by a ?nancial institution or the United States Government (18 U.S.C. lO30(a)(1); 18 U.S.C. 1030(a)(5)(A)(i) resulting in damage as de?ned in lO30(a)(5)(B)(ii) through

3.18.15 killing or attempted killing of of?cers and employees ofthe United States (18 U.S.C. 1 1 14);

3.18.16 murder or manslaughter of foreign of?cials, of?cial guests, or internationally protected persons (18 U.S.C. 1 I 16);

3.18.17 hostage taking (18 U.S.C. 1203);

3.18.18 damage to Government property (18 U.S.C. 1361);

3.18.19 destruction of communication lines, stations, or systems (18 U.S.C. 1362);

3.18.20 injury to U.S. aircraft or vessels (18 U.S.C. 1363);

3.18.21 injury to U.S. diplomatic, consular, military, or other property (18 U.S.C. 1363);

3.18.22 destruction of an energy facility (18 U.S.C. 1366(a));

3.18.23 Presidential and Presidential Staff assassination and kidnapping (18 U.S.C. 1751(a), (0), 0r

3.18.24 acts of violence against railroad carriers and against mass transportation systems on land, on water, or through the air (18 U.S.C. 1992);

3.18.25 destruction of national defense materials, premises, or utilities (18 U.S.C. 2115; 18 U.S.C. 2156);

3.18.26 violence against maritime navigation (seizing a ship by force, destroying a ship or damaging its navigation systems) (18 U.S.C. 2280);

3.18.27 violence against maritime ?xed platforms (an arti?cial island, installation or structure permanently attached to the sea-bed for the purpose of exploration or exploitation of resources or for other economic purposes (18 U.S.C. 2281);

3.18.28 homicides and other violence against U.S. nationals occurring outside of the United States (18 U.S.C. 2332);

3.18.29 the use of weapons of mass destruction (18 .S.C. 2332a);

3.18.30 acts of TERRORISM transcending national boundaries (18 U.S.C. 2332b);

3.18.31 bombing of public places and facilities (18 U.S.C. 2332f);

3.18.32 producing, transferring, or threatening to use missile systems designed to destroy aircraft (18 U.S.C. 2332g);

3.18.33 producing, transferring, or threatening to use radiological dispersal devices (18 U.S.C. 2332h);

3.18.34 harboring TERRORISTS (18 U.S.C. 2339);

3.18.35 providing material support to TERRORISTS (18 U.S.C.

3.18.36 providing material support to terrorist organizations (18 U.S.C.

3.18.37 ?nancing TERRORISM (18 U.S.C.

3.18.38 receiving military-type training from a PTO (18 U.S.C.

3.18.39 torture (18 U.S.C.

3.18.40 developing, transferring, possessing, or threatening to use atomic weapons (42 U.S.C. 2122);

[–] [deleted] 0 points 1 point (+1|-0) ago 

[Deleted]

0
1

[–] DrSelfAppointed 0 points 1 point (+1|-0) ago 

Funny how that works. Terrorists are just governments without a nation it seems.

1
-1

[–] ChristiansBeWicked 1 point -1 points (+0|-1) ago  (edited ago)

The governments National Terrorism Center, spells out the government’s secret rules for putting individuals on its main terrorist database

Fixed

0
0

[–] fluhthreeex ago 

isHuman ? terrorist : terrorist;

0
0

[–] derram ago 

https://archive.ph/z4ZDj :

2014-07-23 | Blacklisted: The Secret Government Rulebook For Labeling You a Terrorist

'But another loophole is quite broad—”associates” who have a defined relationship with a suspected terrorist, but whose involvement in terrorist activity is not known. '

'Ted Kennedy complained that he was barred from boarding flights on five separate occasions because his name resembled the alias of a suspected terrorist. '

'So now the officer on the street knows he may be dealing with a known or suspected terrorist.” Of course, the problem is that the “known or suspected terrorist” might just be an ordinary citizen who should not be treated as a menace to public safety. '

'The Obama administration has quietly approved a substantial expansion of the terrorist watchlist system, authorizing a secret process that requires neither “concrete facts” nor “irrefutable evidence” to designate an American or foreigner as a terrorist, according to a key government document obtained by The Intercept. '

'A representative of the Terrorist Screening Center did not respond to a request for comment. '


This has been an automated message.

0
0

[–] BitChuteArchive ago