It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Some features of ATS will be disabled while you continue to use an ad-blocker.
Smoking Gun: DEA Manuals Show Feds Use NSA Spy Data, Train Cops to Construct False Chains of Evidence
Drug Enforcement Administration training documents released to MuckRock user C.J. Ciaramella show how the agency constructs two chains of evidence to hide surveillance programs from defense teams, prosecutors, and a public wary of domestic intelligence practices.
In training materials, the department even encourages a willful ignorance by field agents to minimize the risk of making intelligence practices public.
The DEA practices mirror a common dilemma among domestic law enforcement agencies: Analysts have access to unprecedented streams of classified information that might prove useful to investigators, but entering classified evidence in court risks disclosing those sensitive surveillance methods to the world, which could either end up halting the program due to public outcry or undermining their usefulness through greater awareness.
An undated slide deck released by the DEA to fleshes out the issue more graphically: When military and intelligence agencies “find Bin Laden's satellite phone and then pin point his location, they don't have to go to a court to get permission to put a missile up his nose." Law enforcement agencies, on the other hand, “must be able to take our information to court and prove to a jury that our bad guy did the bad things we say he did.”
The text of the training info is available at Muckrock.com - the date of the material is 2007 - I ask everyone to make note of that date before replying - 2007 - This is exactly what the "War on Terror" hoped to dismantle - our constitutional rights.
NSA uses Google cookies to find targets for hacking, spying
The US National Security Agency is secretly piggybacking on the tools that enable internet advertisers to track consumers, using cookies and location data to pinpoint targets for government hacking and to bolster surveillance.