The Department of Homeland Security has a long list of words it tracks online. Want to get in their radar? Use those words. Want to stay off their radar? You'll have to do a serious dance with your vocabulary. It's a long, very general list.
- Advertisement -
DSA was forced, by a freedom of information request to release the list along with a the department's 2011 ' Analyst's Desktop Binder
-- a manual of policies and procedures for the department on how to track and respond to possible threats-- terrorist, Hazmat, weather and otherwise.
The list has been posted online by the Electronic Privacy Information Center - a privacy watchdog group who filed a request under the Freedom of Information Act before suing to obtain the release of the documents.
In a letter to the House Homeland Security Subcommittee on Counter-terrorism and Intelligence, the centre described the choice of words as 'broad, vague and ambiguous'.
They point out that it includes 'vast amounts of First Amendment protected speech that is entirely unrelated to the Department of Homeland Security mission to protect the public against terrorism and disasters.'
A senior Homeland Security official told the Huffington Post that the manual 'is a starting point, not the endgame' in maintaining situational awareness of natural and man-made threats and denied that the government was monitoring signs of dissent.
However the agency admitted that the language used was vague and in need of updating.
Spokesman Matthew Chandler told website: 'To ensure clarity, as part of ... routine compliance review, DHS will review the language contained in all materials to clearly and accurately convey the parameters and intention of the program.'
Here's the list.
and here are the words in a searchable format:
Assassination Attack Domestic security Drill Exercise Cops Law enforcement Authorities Disaster assistance Disaster management DNDO (Domestic Nuclear Detection Office) National preparedness Mitigation Prevention Response Recovery Dirty bomb Domestic nuclear detection Emergency management Emergency response First responder Homeland security Maritime domain awareness (MDA) National preparedness initiative Militia Shooting Shots fired Evacuation Deaths Hostage Explosion (explosive) Police Disaster medical assistance team (DMAT) Organized crime Gangs National security State of emergency Security Breach Threat Standoff SWAT Screening Lockdown Bomb (squad or threat) Crash Looting Riot Emergency Landing Pipe bomb Incident Facility
HAZMAT & Nuclear
Hazmat Nuclear Chemical spill Suspicious package/device Toxic National laboratory Nuclear facility Nuclear threat Cloud Plume Radiation Radioactive Leak Biological infection (or event) Chemical Chemical burn Biological Epidemic Hazardous Hazardous material incident Industrial spill Infection Powder (white) Gas Spillover Anthrax Blister agent Chemical agent Exposure Burn Nerve agent Ricin Sarin North Korea
Health Concern + H1N1
Outbreak Contamination Exposure Virus Evacuation Bacteria Recall Ebola Food Poisoning Foot and Mouth (FMD) H5N1 Avian Flu Salmonella Small Pox Plague Human to human Human to Animal Influenza Center for Disease Control (CDC) Drug Administration (FDA) Public Health Toxic Agro Terror Tuberculosis (TB) Agriculture Listeria Symptoms Mutation Resistant Antiviral Wave Pandemic Infection Water/air borne Sick Swine Pork Strain Quarantine H1N1 Vaccine Tamiflu Norvo Virus Epidemic World Health Organization (WHO) (and components) Viral Hemorrhagic Fever E. Coli
Infrastructure security Airport Airplane (and derivatives) Chemical fire CIKR (Critical Infrastructure & Key Resources) AMTRAK Collapse Computer infrastructure Communications infrastructure Telecommunications Critical infrastructure National infrastructure Metro WMATA Subway BART MARTA Port Authority NBIC (National Biosurveillance Integration Center) Transportation security Grid Power Smart Body scanner Electric Failure or outage Black out Brown out Port Dock Bridge Cancelled Delays Service disruption Power lines
Southwest Border Violence
Drug cartel Violence Gang Drug Narcotics Cocaine Marijuana Heroin Border Mexico Cartel Southwest Juarez Sinaloa Tijuana Torreon Yuma Tucson Decapitated U.S. Consulate Consular El Paso Fort Hancock San Diego Ciudad Juarez Nogales Sonora Colombia Mara salvatrucha MS13 or MS-13 Drug war Mexican army Methamphetamine Cartel de Golfo Gulf Cartel La Familia Reynosa Nuevo Leon Narcos Narco banners (Spanish equivalents) Los Zetas Shootout Execution Gunfight Trafficking Kidnap Calderon Reyosa Bust Tamaulipas Meth Lab Drug trade Illegal immigrants Smuggling (smugglers) Matamoros Michoacana Guzman Arellano-Felix Beltran-Leyva Barrio Azteca Artistic Assassins Mexicles New Federation
Terrorism Al Qaeda (all spellings) Terror Attack Iraq Afghanistan Iran Pakistan Agro Environmental terrorist Eco terrorism Conventional weapon Target Weapons grade Dirty bomb Enriched Nuclear Chemical weapon Biological weapon Ammonium nitrate Improvised explosive device IED (Improvised Explosive Device) Abu Sayyaf Hamas FARC (Armed Revolutionary Forces Colombia) IRA (Irish Republican Army) ETA (Euskadi ta Askatasuna) Basque Separatists Hezbollah Tamil Tigers PLF (Palestine Liberation Front) PLO (Palestine Liberation Organization Car bomb Jihad Taliban Weapons cache Suicide bomber Suicide attack Suspicious substance AQAP (AL Qaeda Arabian Peninsula) AQIM (Al Qaeda in the Islamic Maghreb) TTP (Tehrik-i-Taliban Pakistan) Yemen Pirates Extremism Somalia Nigeria Radicals Al-Shabaab Home grown Plot Nationalist Recruitment Fundamentalism Islamist
Emergency Hurricane Tornado Twister Tsunami Earthquake Tremor Flood Storm Crest Temblor Extreme weather Forest fire Brush fire Ice Stranded/Stuck Help Hail Wildfire Tsunami Warning Center Magnitude Avalanche Typhoon Shelter-in-place Disaster Snow Blizzard Sleet Mud slide or Mudslide Erosion Power outage Brown out Warning Watch Lightening Aid Relief Closure Interstate Burst Emergency Broadcast System
Cyber security Botnet DDOS (dedicated denial of service) Denial of service Malware Virus Trojan Keylogger Cyber Command 2600 Spammer Phishing Rootkit Phreaking Cain and abel Brute forcing Mysql injection Cyber attack Cyber terror Hacker China Conficker Worm Scammers Social media
|The views expressed in this article are the sole responsibility of the author
and do not necessarily reflect those of this website or its editors.