{"id":193866,"date":"2017-05-20T06:31:37","date_gmt":"2017-05-20T10:31:37","guid":{"rendered":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/how-nsa-can-secretly-aid-criminal-cases-consortium-news\/"},"modified":"2017-05-20T06:31:37","modified_gmt":"2017-05-20T10:31:37","slug":"how-nsa-can-secretly-aid-criminal-cases-consortium-news","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/nsa-2\/how-nsa-can-secretly-aid-criminal-cases-consortium-news\/","title":{"rendered":"How NSA Can Secretly Aid Criminal Cases &#8211; Consortium News"},"content":{"rendered":"<p><p>    From the Archive: Official Washington is    thrilled by the choice of ex-FBI Director Mueller as    Russia-gate special counsel, hailing him as a straight-shooter,    but he cut some legal corners in office, ex-CIA analyst Ray    McGovern wrote in 2014.  <\/p>\n<p>    By Ray McGovern (Originally published on June 12, 2014)  <\/p>\n<p>    Rarely do you get a chance to ask a just-retired FBI director    whether he had any legal qualms about what, in football, is    called illegal procedure, but at the Justice Department is    called parallel construction.  <\/p>\n<p>    Government wordsmiths have given us this pleasant euphemism to    describe the use of the National Security Agencys illegal    eavesdropping on Americans as an investigative tool to pass on    tips tolaw enforcement agencies which then hide the    source of the original suspicion and construct a case using    parallel evidence to prosecute the likes of you and me.  <\/p>\n<p>    For those interested in quaint things like the protections    that used to be afforded us by the Fourth and Fifth Amendments    to the Constitution,     information about this parallel construction has been in    the public domain, including the mainstream media, for at    least a year or so.  <\/p>\n<p>    So, I welcomed the chance to expose this artful practice to    still more people with cameras rolling at a large conference on    Ethos & Profession of Intelligence at Georgetown    University on June 11, 2014, during the Q & A after former    FBI Director Robert Mueller spoke.  <\/p>\n<p>    Mueller ducked my question regarding whether he had any legal    qualms about this parallel construction arrangement.He    launched into a discursive reply in which he described the    variousauthorities enjoyed by the FBI (and the CIA),    which left the clear impression not only that he was without    qualms but that he considered the practice of concealing the    provenance of illegally acquired tip-off information somehow    within those professed authorities.  <\/p>\n<p>    Bottom line? Beware, those of you who think you have nothing    to hide when the NSA scoops up your personal information. You    may think that the targets of these searches are just potential    terrorists. But the FBI, Internal Revenue Service, Drug    Enforcement Administration and countless other law enforcement    bodies are dipping their cursors into the huge pool of mass    surveillance.  <\/p>\n<p>    And, chances are that if some of your scooped-up data gets    shared with law enforcement and the Feds conclude that youve    violated some law, youll never become aware of how they got    onto you in the first place. Theyll just find some parallel    evidence to nail you.  <\/p>\n<p>    After all, its altogether likely for a great majority of us    that some dirt can be retrieved with the NSAs voluminous files    an inviting starting point. AT&T, for example, apparently    has kept metadata about its customers, as well as all other    traffic going through its switches, for the past 27 years.  <\/p>\n<p>    For those who are Caesars-wife pure and whose loved ones also    approach perfection, constructing a prosecutable case may be    more of a challenge. But relax not. If for some reason the    government decides to get you if youve popped up as somehow an    obstacle to national security it is not impossible. Even in    recent decades, critics of government policies have ended up    facing dredged-up, if not trumped-up, criminal charges over    some past indiscretion or misdeed.  <\/p>\n<p>    Learning Curve  <\/p>\n<p>    It has been my good fortune to sponge up data and wisdom in    equal measure from NSA alumni like Bill Binney, Kirk Wiebe, Tom    Drake, and Ed Loomis, who in early January 2014 authored    NSA    Insiders Reveal What Went Wrong.  <\/p>\n<p>    More recently (on May 31, 2014), Bill and I took part in a    panel discussion in New York, so this freshly sponged-up    learning still dwelled in my frontal lobe when I was interviewed by    RT on June 5, 2014, the anniversary of the first-published    disclosure from Edward Snowden.  <\/p>\n<p>    When asked how ordinary people in the U.S. were being    affected by the disclosures about bulk collection, I passed    along what I had recently learned from Bill and other    whistleblowers regarding how law enforcement is masking illegal    surveillance to the severe detriment of defendants    constitutional rights.  <\/p>\n<p>    Former FBI Division Counsel in Minneapolis Coleen Rowley who,    with Jesselyn Radack, Tom Drake and me, visited Snowden in    Russia in October 2013 told me of two legal doctrines    established many decades ago: the exclusionary rule and the    rule regarding the fruit of the poisonous tree.  <\/p>\n<p>    These were designed to force over-zealous law enforcement    officers to adhere to the Constitution by having judges throw    out cases derived from improperly obtained evidence. To evade    this rule, law enforcement officials who have been on the    receiving end of NSAs wiretap data must conceal what tipped    off an investigation.  <\/p>\n<p>    After the Tip-Off  <\/p>\n<p>    Among the revelations over the past year was DEAs definition    of parallel construction as the use of normal [read legal]    investigative techniques to re-create the information received    by DEAs Special Ops Division from NSA or other sources that    cant be acknowledged. Some of these sources may be    confidential informants whose identities need protecting, but    the NSAs massive database has become a very inviting place to    trawl for valuable leads.  <\/p>\n<p>    As Reuters     reported in August 2013, A secretive U.S. Drug Enforcement    Administration unit is funneling information from intelligence    intercepts, wiretaps, informants and a massive database of    telephone records to authorities across the nation to help them    launch criminal investigations of Americans.  <\/p>\n<p>    Although these cases rarely involve national security issues,    documents reviewed by Reuters show that law enforcement agents    have been directed to conceal how such investigations truly    begin  not only from defense lawyers but also sometimes from    prosecutors and judges.  <\/p>\n<p>    The undated documents show that federal agents are trained to    recreate the investigative trail to effectively cover up    where the information originated, a practice that some experts    say violates a defendants Constitutional right to a fair    trial. If defendants dont know how an investigation began,    they cannot know to ask to review potential sources of    exculpatory evidence  information that could reveal    entrapment, mistakes or biased witnesses.  <\/p>\n<p>    So, in this way, the NSAs warrantless surveillance can result    in illegal law enforcement. And the FBI, the DEA and other    organs of the deep state have become quite good at it, thank    you very much.  <\/p>\n<p>    Heres how it works:NSAs domestic surveillance though    supposedly restricted to detecting terrorism gets wind of some    potentially illegal activity unrelated to terrorism. So, NSA    passes the information on to the relevant law enforcement    agency. It could be a vehicle transporting illegal drugs or a    transfer of suspicious funds or pretty much anything.  <\/p>\n<p>    This evidence then sparks an investigation, but the original    informationcant be used legally because it was acquired    illegally for national security purposes. After the tip,    parallel law enforcement techniques are introduced to collect    other evidence and arrest and charge the suspects\/defendants.  <\/p>\n<p>    The arrest is made to appear the splendid result of traditional    detective techniques. However, if the court learns of the    initial shenanigans, the defendant may be released because    her\/his constitutional rights were violated.  <\/p>\n<p>    To avoid that possibility, the government simply perjures    itself during the court discovery process by concealing the key    role played by the NSA database, exculpatory evidence that    could weaken or destroy the governments case.  <\/p>\n<p>    Blackmail?  <\/p>\n<p>    Last week a journalist asked me why I thought Congress initial    outrage seemingly genuine in some quarters over bulk collection    of citizens metadata had pretty much dissipated in just a few    months. What started out as a strong bill upholding Fourth    Amendment principles ended up much weakened with only a few    significant restraints remaining against NSAs flaunting of the    Constitution?  <\/p>\n<p>    Let me be politically incorrect and mention the possibility of    blackmail or at least the fear among some politicians that the    NSA has collected information on their personal activities that    could be transformed into a devastating scandal if leaked at    the right moment.  <\/p>\n<p>    Do not blanch before the likelihood that the NSA has the book    on each and every member of Congress, including extramarital    affairs and political deal-making.We know that NSA has    collected such information on foreign diplomats, including at    the United Nations in New York, to influence votes on the Iraq    War and other issues important to U.S. national security.  <\/p>\n<p>    We also know how the late FBI Director J. Edgar Hoover used    much more rudimentary technology a half century ago to develop    dossiers on the personal indiscretions of political and    ideological opponents. It makes sense that people with access    to the NSAs modern surveillance tools would be sorely tempted    to put these new toys to use in support of their own    priorities.  <\/p>\n<p>    I happened to be with a highly accomplished attorney one not    involved in security law when we saw TV reporting that the    Solicitor General of the United States had misled the U.S.    Supreme Court. My lawyer friend kept shaking his head, with his    mouth agape: Now THAT is not supposed to happen is all he    could muster.  <\/p>\n<p>    Other than the Supreme Court justices themselves, the Solicitor    General is among the most influential members of the legal    community. Indeed, the Solicitor General has been called the    tenth justice as a result of the relationship of mutual trust    that tends to develop between the justices and the Solicitor    General.  <\/p>\n<p>    Thus, while it is sad, it is hardly surprising that no one took    President Obamas Solicitor General Donald Verrilli Jr. to the    woodshed. There are seldom penalties in Washington for playing    fast and loose with the truth.  <\/p>\n<p>    Verrilli assured the Court in the Clapper v. Amnesty    International USA case that defendants would be informed of    evidence coming from NSA.The Department of Justice had    reviewed his draft testimony and did not tell Verrilli that    this was not the truth.  <\/p>\n<p>    In the case, a majority of the Supreme Court    justicesdecided to wait until a criminal    defendantwasactually convicted with the admitted    use ofNSA evidencebefore ruling on whether this    violates the Fourth Amendment and the requirement of court    warrants based on probable cause before police searches can    be conducted.  <\/p>\n<p>    The result of the Supreme Courts decision was that the    challenge to the constitutionality of NSAs mass collection was    abruptly stopped, and the mass surveillance continued. But    Verrilli subsequently found out that his assurances had been    false, and there ensued an argument with the Department of    Justice, which opposed revealing use of NSA sources in any    court.  <\/p>\n<p>    Verrilli apparently prevailed partially, with the government    subsequently notifying a fewdefendants inongoing    terrorism cases thatNSA sources were used.  <\/p>\n<p>    Separation of Powers?  <\/p>\n<p>    We cannot escape some pretty dismal conclusions here. Not only    havethe Executive andLegislative branches been    corrupted by establishing, funding, hiding and promoting    unconstitutional surveillance programs during the war on    terror, but the Judicial branch has been corrupted, too.  <\/p>\n<p>    The discovery process in criminal cases is now stacked in favor    of the government through its devious means for    hidingunconstitutional surveillance and using it in ways    beyond the narrow declared purpose of thwarting terrorism.  <\/p>\n<p>    Moreover, federal courts at the district, appeals and Supreme    Court levelshave allowed the government to evade legal    accountability by insisting that plaintiffs must be able to    prove what often is not provable, that they were surveilled    through highly secretive NSA means. And, if the plaintiffs make    too much progress, the government can always get a lawsuit    thrown out by invoking state secrets.  <\/p>\n<p>    The Separation of Powers designed by the Constitutions Framers    to prevent excessiveaccumulation of power by one of the    branches has stopped functioning amid the modern concept of    permanent war and the unwillingness of all but a few hearty    souls to challenge the invocation of national security. Plus,    the corporate-owned U.S. media, with very few exceptions, is    fully complicit.  <\/p>\n<p>    Thus, a massive, intrusive power now looms overevery one    of us and especially those few brave individuals with inside    knowledge who might be inclined to inform the rest of us about    the threat. Whistleblowers, like Chelsea Manning and Edward    Snowden, have faced decades in prison for divulging important    secrets to the American people. And so the legal rot continues.  <\/p>\n<p>    The concept of a United Stasi of America, coined by Pentagon    Papers whistleblower Daniel Ellsberg, has been given real    meaning by the unconstitutional behavior and dereliction of    duty on the part of both the George W. Bush and Obama    administrations.  <\/p>\n<p>    Just days after the first published disclosure from Snowden,    Ellsberg     underscored that the NSA, FBI and CIA now have surveillance    capabilities that East Germanys Stasi secret police could    scarcely have imagined.  <\/p>\n<p>    What, We Worry?  <\/p>\n<p>    In June 2013, Mathew Schofield of McClatchy conducted an    interesting     interview ofWolfgang Schmidt, a former lieutenant    colonel in the Stasi, in Berlin. With the Snowden revelations    beginning to tumble out into the media, Schofield described    Schmidt as he pondered the sheer magnitude of domestic spying    in the United States.  <\/p>\n<p>    Schmidt: You know, for us, this would have been a dream come    true.  <\/p>\n<p>    Schofield continues: In those days, his department was limited    to tapping 40 phones at a time, he recalled. Decide to spy on a    new victim and an old one had to be dropped, because of a lack    of equipment. He finds breathtaking the idea that the U.S.    government receives daily reports on the cellphone usage of    millions of Americans and can monitor the Internet traffic of    millions more.  <\/p>\n<p>    So much information, on so many people, says Schmidt who, at    that point, volunteers a stern warning for Schofield and the    rest of us:  <\/p>\n<p>    It is the height of naivete to think that, once    collected, this information wont be used. This is the nature    of secret government organizations. The only way to protect the    peoples privacy is not to allow the government to collect    their information in the first place. [emphasis    added]  <\/p>\n<p>    (For those who missed it, The Lives of Others, a 2006 film,    offers a chilling depiction of the Stasi, a far more capable    incarnation of which may soon be coming to your home or    neighborhood with assistance of parallel construction.)  <\/p>\n<p>    Take note, those of you who may still feel fearless, those of    you with nothing to hide.  <\/p>\n<p>    Ray McGovern works with Tell the Word, a publishing arm    of the ecumenical Church of the Saviour in inner-city    Washington. He was an Army officer and CIA analyst for a total    of 30 years and is now on the Steering Group of Veteran    Intelligence Professionals for Sanity (VIPS).  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>See the rest here:<br \/>\n<a target=\"_blank\" href=\"https:\/\/consortiumnews.com\/2017\/05\/18\/how-nsa-can-secretly-aid-criminal-cases-2\/\" title=\"How NSA Can Secretly Aid Criminal Cases - Consortium News\">How NSA Can Secretly Aid Criminal Cases - Consortium News<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> From the Archive: Official Washington is thrilled by the choice of ex-FBI Director Mueller as Russia-gate special counsel, hailing him as a straight-shooter, but he cut some legal corners in office, ex-CIA analyst Ray McGovern wrote in 2014. By Ray McGovern (Originally published on June 12, 2014) Rarely do you get a chance to ask a just-retired FBI director whether he had any legal qualms about what, in football, is called illegal procedure, but at the Justice Department is called parallel construction <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/nsa-2\/how-nsa-can-secretly-aid-criminal-cases-consortium-news\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":5,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[94881],"tags":[],"class_list":["post-193866","post","type-post","status-publish","format-standard","hentry","category-nsa-2"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/193866"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=193866"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/193866\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=193866"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=193866"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=193866"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}