Travel blacklists target political critics
US government travel blacklists (euphemistically described by the government as merely “watchlists”) are being used to restrict airline travel and target searches of electronic devices of organizers of protests against US support for Israel’s military actions in Gaza, according to a complaint filed this week in Federal court by attorneys for two blacklisted Palestinian-American US citizens, Dr. Osama Abu Irshaid and Mr. Mustafa Zeidan.
It might be tempting to interpret the allegations in this complaint as indicative of the need for oversight or guardrails to prevent “abuse” of the blacklisting and travel control system. But we think it makes more sense to see this case as indicative of the risk of political weaponization inherent in the system of algorithmic, identity-based, extrajudicial administrative control of travel. This case shows why this travel control system should be abolished entirely, and why any restrictions on the right to travel should be imposed through existing judicial procedures for restraining orders and injunctions — adversary procedures that incorporate notice, the right to confront one’s accusers, and the other elements of Constitutional due process.
The heavy lifting that makes this use of travel controls to restrict political dissidents possible was carried out when airlines were required to install communication and control lines enabling the US government to decide, in real time, on the basis of information from airline reservations and travelers’ ID documents, whether or not to give airlines “permission” to transport each would-be passenger. That entailed more than $2 billion, by the US government’s own underestimate, in unfunded mandates imposed on airlines and their IT providers for changes to their reservation and departure control systems.
Now that this infrastructure is in place, only the ruleset needs to be changed to change who is, and who is not, allowed to travel by air, or how they are treated when they fly.
Names and other selectors (phone numbers, IP addresses, etc.) can be added to list-based rules. New category-based rules can be added to the ruleset. New real-time “pre-crime” profiling and scoring algorithms can be applied to fly/no-fly decision-making. New external databases and actors can be connected to the system.
All of this has, in fact, been done, making it harder and harder for anyone to exercise effective oversight over the system or the decisions generated by its secret algorithms.
The potential for targeting of dissidents and political opponents is a feature, not a bug, of secret administrative decision-making, especially in the absence of judicial review.
Here’s how it played out in this case, according to the complaint and other reports: Read More