I would not go that far. What is points out is that the database being used is lumping all people of interest together regardless of their level of threat or type. Lazy or nefarious, who knows. More than likely those who created the system never would have guess how easily people would get on it.
Anyone noticed that the first two example cases are actually political activists being targeted.
- the first is some Chelsea Manning advocate - the second is some pot legalization activist
There you have it for what actually are these rarely used rules used for.