Intel on the Enemy: Federal Security and Surveillance

Last summer, Reuters revealed how the NSA and other surveillance organizations would share info with the DEA and other law enforcement agencies, but then tell them to reconstruct the evidence via a process called “parallel construction,” so that the surveillance would not then be discussed in court. This is highly questionable, and probably illegal, as a defendant has the right to know all of the evidence being used against him or her, and should also be told how that evidence was gathered, to make sure the collection was legal. But what’s being done with parallel construction, is that the intelligence community is able to give “hints” to law enforcement, allowing them to come up with various pretenses for an investigation, avoiding ever having to reveal that the NSA or others used potentially illegal surveillance efforts. One example given in that Reuters report was how DEA agents would suddenly be given a tip like this: “Be at a certain truck stop at a certain time and look for a certain vehicle.” The DEA would then have the local police come up with some pretense to stop the truck… and then when evidence is found they can claim it was a random traffic stop, when the reality is anything but that.

After the Reuters report, C.J. Ciaramella used Muckrock to request all DEA training material and official policies concerning “parallel construction” and recently received nearly 300 pages of documents, much of it redacted, but still which reveals that this is common practice at the DEA and widely known.

I’ve heard similar stories, except it’s about SWAT teams mistakenly or intentionally doing no knock raids on people the police suspected owned “lots of guns”. The LEO community already has access to this kind of stuff. They just need a REASON or a pretext to use it against you. Risk assessment and avoidance protocols dictate that strategic planning must be done now for avoidance, and not rely merely upon tactical superiority when you get caught with your pants down.

And try not to go to gov websites, especially if they want to solicit a comment from you about the IRS vs Tea Party.

It’s not necessarily that they have access to your identity, it’s all the hackers that they don’t control that have hacked them and can access your IP, address, etc using the federal government’s own tools. Risk is more than about paranoid conspiracies, mostly because paranoid conspiracies underestimate the scale of the threat.

Explore posts in the same categories: Unconventional Warfare

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: