How NSA Can Secretly Aid Criminal Cases

Though the NSA says its mass surveillance of Americans targets only “terrorists,” the spying may turn up evidence of other illegal acts that can get passed on to law enforcement which hides the secret source through a ruse called “parallel construction,” writes ex-CIA analyst Ray McGovern.

By Ray McGovern

Rarely do you get a chance to ask a just-retired FBI director whether he had “any legal qualms” about what, in football, is called “illegal procedure,” but at the Justice Department is called “parallel construction.”

Government wordsmiths have given us this pleasant euphemism to describe the use of the National Security Agency’s illegal eavesdropping on Americans as an investigative tool to pass on tips to law enforcement agencies which then hide the source of the original suspicion and “construct” a case using “parallel” evidence to prosecute the likes of you and me.

Former FBI Director Robert Mueller.

Former FBI Director Robert Mueller.

For those interested in “quaint” things like the protections that used to be afforded us by the Fourth and Fifth Amendments to the Constitution, information about this “parallel construction” has been in the public domain, including the “mainstream media,” for at least a year or so.

So, I welcomed the chance to expose this artful practice to still more people with cameras rolling at a large conference on “Ethos & Profession of Intelligence” at Georgetown University on Wednesday, during the Q & A after former FBI Director Robert Mueller spoke.

Mueller ducked my question regarding whether he had any “legal qualms” about this “parallel construction” arrangement. He launched into a discursive reply in which he described the various “authorities” enjoyed by the FBI (and the CIA), which left the clear impression not only that he was without qualms but that he considered the practice of concealing the provenance of illegally acquired tip-off information somehow within those professed “authorities.”

Bottom line? Beware, those of you who think you have “nothing to hide” when the NSA scoops up your personal information. You may think that the targets of these searches are just potential “terrorists.” But the FBI, Internal Revenue Service, Drug Enforcement Administration and countless other law enforcement bodies are dipping their cursors into the huge pool of mass surveillance.

And, chances are that if some of your scooped-up data gets shared with law enforcement and the Feds conclude that you’ve violated some law, you’ll never become aware of how they got onto you in the first place. They’ll just find some “parallel” evidence to nail you.

After all, it’s altogether likely for a great majority of us that some dirt can be retrieved with the NSA’s voluminous files an inviting starting point. AT&T, for example, apparently has kept metadata about its customers, as well as all other traffic going through its switches, for the past 27 years.

For those who are Caesar’s-wife pure and whose loved ones also approach perfection, “constructing” a prosecutable case may be more of a challenge. But relax not. If for some reason the government decides to get you if you’ve popped up as somehow an obstacle to “national security” it is not impossible. Even in recent decades, critics of government policies have ended up facing dredged-up, if not trumped-up, criminal charges over some past indiscretion or misdeed.

Learning Curve

It has been my good fortune this year to sponge up data and wisdom in equal measure from NSA alumni like Bill Binney, Kirk Wiebe, Tom Drake, and Ed Loomis, who in early January authored “NSA Insiders Reveal What Went Wrong.

More recently (on May 31), Bill and I took part in a panel discussion in New York, so this freshly sponged-up learning still dwelled in my frontal lobe when I was interviewed by RT on June 5, the anniversary of the first-published disclosure from Edward Snowden.

When asked how “ordinary people” in the U.S. were being affected by the disclosures about bulk collection, I passed along what I had recently learned from Bill and other whistleblowers regarding how law enforcement is masking illegal surveillance to the severe detriment of defendants’ constitutional rights.

Former FBI Division Counsel in Minneapolis Coleen Rowley who, with Jesselyn Radack, Tom Drake and me, visited Snowden in Russia last October told me of two legal doctrines established many decades ago: the “exclusionary rule” and the rule regarding the “fruit of the poisonous tree.”

These were designed to force over-zealous law enforcement officers to adhere to the Constitution by having judges throw out cases derived from improperly obtained evidence. To evade this rule, law enforcement officials who have been on the receiving end of NSA’s wiretap data must conceal what tipped off an investigation.

After the Tip-Off

Among the revelations over the past year was DEA’s definition of “parallel construction” as “the use of normal [read legal] investigative techniques to re-create the information received by DEA’s Special Ops Division” from NSA or other sources that can’t be acknowledged. Some of these sources may be confidential informants whose identities need protecting, but the NSA’s massive database has become a very inviting place to trawl for valuable leads.

As Reuters reported last August, “A secretive U.S. Drug Enforcement Administration unit is funneling information from intelligence intercepts, wiretaps, informants and a massive database of telephone records to authorities across the nation to help them launch criminal investigations of Americans.

“Although these cases rarely involve national security issues, documents reviewed by Reuters show that law enforcement agents have been directed to conceal how such investigations truly begin – not only from defense lawyers but also sometimes from prosecutors and judges.

“The undated documents show that federal agents are trained to ‘recreate’ the investigative trail to effectively cover up where the information originated, a practice that some experts say violates a defendant’s Constitutional right to a fair trial. If defendants don’t know how an investigation began, they cannot know to ask to review potential sources of exculpatory evidence – information that could reveal entrapment, mistakes or biased witnesses.”

So, in this way, the NSA’s warrantless surveillance can result in illegal law enforcement. And the FBI, the DEA and other organs of the deep state have become quite good at it, thank you very much.

Here’s how it works: NSA’s domestic surveillance though supposedly restricted to detecting terrorism gets wind of some potentially illegal activity unrelated to terrorism. So, NSA passes the information on to the relevant law enforcement agency. It could be a vehicle transporting illegal drugs or a transfer of suspicious funds or pretty much anything.

This evidence then sparks an investigation, but the original information can’t be used legally because it was acquired illegally for “national security” purposes. After the tip, “parallel” law enforcement techniques are introduced to collect other evidence and arrest and charge the suspects/defendants.

The arrest is made to appear the splendid result of traditional detective techniques. However, if the court learns of the initial shenanigans, the defendant may be released because her/his constitutional rights were violated.

To avoid that possibility, the government simply perjures itself during the court discovery process by concealing the key role played by the NSA database, exculpatory evidence that could weaken or destroy the government’s case.

Blackmail?

Last week a journalist asked me why I thought Congress’ initial outrage seemingly genuine in some quarters over bulk collection of citizens’ metadata had pretty much dissipated in just a few months. What started out as a strong bill upholding Fourth Amendment principles ended up much weakened with only a few significant restraints remaining against NSA’s flaunting of the Constitution?

Let me be politically incorrect and mention the possibility of blackmail or at least the fear among some politicians that the NSA has collected information on their personal activities that could be transformed into a devastating scandal if leaked at the right moment.

Do not blanch before the likelihood that the NSA has the book on each and every member of Congress, including extramarital affairs and political deal-making. We know that NSA has collected such information on foreign diplomats, including at the United Nations in New York, to influence votes on the Iraq War and other issues important to U.S. “national security.”

We also know how the late FBI Director J. Edgar Hoover used much more rudimentary technology a half century ago to develop dossiers on the personal indiscretions of political and ideological opponents. It makes sense that people with access to the NSA’s modern surveillance tools would be sorely tempted to put these new toys to use in support of their own priorities.

I happened to be with a highly accomplished attorney one not involved in security law when we saw TV reporting that the Solicitor General of the United States had misled the U.S. Supreme Court. My lawyer friend kept shaking his head, with his mouth agape: “Now THAT is not supposed to happen” is all he could muster.

Other than the Supreme Court justices themselves, the Solicitor General is among the most influential members of the legal community. Indeed, the Solicitor General has been called the “tenth justice”as a result of the relationship of mutual trust that tends to develop between the justices and the Solicitor General.

Thus, while it is sad, it is hardly surprising that no one took Solicitor General Donald Verrilli Jr. to the woodshed. There are seldom penalties in Washington for playing fast and loose with the truth.

Verrilli, sworn in as Solicitor General three years ago, assured the Court in the “Clapper v. Amnesty International USA” case that defendants would be informed of evidence coming from NSA. The Department of Justice had reviewed his draft testimony and did not tell Verrilli that this was not the truth.

In the case, a majority of the Supreme Court justices decided to wait until a criminal defendant was actually convicted with the admitted use of NSA evidence before ruling on whether this violates the Fourth Amendment and the requirement of court warrants based on “probable cause” before police searches can be conducted.

The result of the Supreme Court’s decision was that the challenge to the constitutionality of NSA’s mass collection was abruptly stopped, and the mass surveillance continued. But Verrilli subsequently found out that his assurances had been false, and there ensued an argument with the Department of Justice, which opposed revealing use of NSA sources in any court.

Verrilli apparently prevailed partially, with the government subsequently notifying a few defendants in ongoing terrorism cases that NSA sources were used.

Separation of Powers?

We cannot escape some pretty dismal conclusions here. Not only have the Executive and Legislative branches been corrupted by establishing, funding, hiding and promoting unconstitutional surveillance programs for over 12 years, but the Judicial branch has been corrupted, too.

The discovery process in criminal cases is now stacked in favor of the government through its devious means for hiding unconstitutional surveillance and using it in ways beyond the narrow declared purpose of thwarting terrorism.

Moreover, federal courts at the district, appeals and Supreme Court levels have allowed the government to evade legal accountability by insisting that plaintiffs must be able to prove what often is not provable, that they were surveilled through highly secretive NSA means. And, if the plaintiffs make too much progress, the government can always get a lawsuit thrown out by invoking “state secrets.”

The Separation of Powers designed by the Constitution’s Framers to prevent excessive accumulation of power by one of the branches has stopped functioning amid the modern concept of “permanent war” and the unwillingness of all but a few hearty souls to challenge the invocation of “national security.” Plus, the corporate-owned U.S. media, with very few exceptions, is fully complicit.

Thus, a massive, intrusive power now looms over every one of us and especially those few brave individuals with inside knowledge who might be inclined to inform the rest of us about the threat. Whistleblowers, like Chelsea Manning and Edward Snowden, face decades in prison for divulging important secrets to the American people. And so the legal rot continues.

The concept of a “United Stasi of America,” coined by Pentagon Papers whistleblower Daniel Ellsberg a year ago, has been given real meaning by the unconstitutional behavior and dereliction of duty on the part of both the George W. Bush and Obama administrations.

Just days after the first published disclosure from Snowden, Ellsberg underscored that the NSA, FBI and CIA now have surveillance capabilities that East Germany’s Stasi secret police could scarcely have imagined.

What, We Worry?

Last June, Mathew Schofield of McClatchy conducted an interesting interview of Wolfgang Schmidt, a former lieutenant colonel in the Stasi, in Berlin. With the Snowden revelations beginning to tumble out into the media, Schofield described Schmidt as he pondered the sheer magnitude of domestic spying in the United States.

Schmidt: “You know, for us, this would have been a dream come true.”
Schofield continues: “In those days, his department was limited to tapping 40 phones at a time, he recalled. Decide to spy on a new victim and an old one had to be dropped, because of a lack of equipment. He finds breathtaking the idea that the U.S. government receives daily reports on the cellphone usage of millions of Americans and can monitor the Internet traffic of millions more.”
“So much information, on so many people,” says Schmidt who, at that point, volunteers a stern warning for Schofield and the rest of us:

“It is the height of naiveté to think that, once collected, this information won’t be used. This is the nature of secret government organizations. The only way to protect the people’s privacy is not to allow the government to collect their information in the first place.” [emphasis added]

(For those who missed it, “The Lives of Others,” a 2006 film, offers a chilling depiction of the Stasi, a far more capable incarnation of which may soon be coming to your home or neighborhood with assistance of “parallel construction.”)

Take note, those of you who may still feel fearless, those of you with “nothing to hide.”

Ray McGovern works with Tell the Word, a publishing arm of the ecumenical Church of the Saviour in inner-city Washington. He was an Army officer and CIA analyst for a total of 30 years and is now on the Steering Group of Veteran Intelligence Professionals for Sanity (VIPS).

4 comments for “How NSA Can Secretly Aid Criminal Cases

  1. William A. Hamilton
    June 14, 2014 at 13:31

    Very interesting and plausible article.
    During the Reagan Administration, the CIA under William Casey allegedly deployed stolen copies of the PROMIS database software throughout the U.S. intelligence community so PROMIS could serve as the standard intelligence database software for gathering and disseminating U.S. intelligence information between the “producer” agencies such as the NSA, CIA, and the DIA and the “consumer” entitiies.
    One alleged example was the PROMIS-base Main Core domestic spying database system administered by the Federal Emergency Management Agency (FEMA) under the highly classified Continuity of Government (COG) Program at a FEMA computer center in Culpepper, Virginia.

    About a week before the August 10, 1991 death of investigative reporter Danny Casolaro in Martinsburg, West Virginia, I received a telephone call from a self-described former CIA contract operative asking me to use whatever influence I might have to try to persuade Casolaro to abandon plans to visit a four-story townhouse on Jackson Place near the White House because it could result in Casolaro’s death.

    I was later told that the Reagan National Security Council (NSC) Office of Public Diplomacy had its offices in that townhouse and made online searches of the Main Core database from there to obtain information to use in political blackmail of members of Congress, reporters, and judges.

    Do any of your sources know anything about the PROMIS-based Main Core domestic spying database system, including whether (1) it contained non-minimized financial intelligence collected by NSA on Americans and other U.S. Persons under NSA’s PROMIS-based Follow the Money SIGINT intercepts of bank and credit card transactions?

  2. Anon
    June 13, 2014 at 12:48

    Great article.
    The data is probably already being used to steal elections. See Maxine Water’s interview from February of last year when talking about Elections (before the Snowden revelations). Google for: “Obama Has Put In Place Secret Database With Everything On Everyone”

    @john:
    Please stop with this left versus right nonsense. The real divide in the country is pro-government power and power to the people. As a member of the right, I assure you I’m for power to the people every bit as much as you. We can argue about whether Keynes or Friedman were right economically later, but can that please wait until after we dismantle the police state? And just FYI, from the equally correct twisted right’s perspective it’s the left that’s trying to form a government big and powerful enough to micromanage everything and crush any potential dissidents (since once the people in charge conclude that big government is good [who doesn’t think they are doing good?], anyone working against them is an evil terrorist criminal). I don’t support R-Mike Rogers on this issue any more than you support D-Diane Feinstein on this issue. Please stop painting with such a broad brush.

    • John
      June 13, 2014 at 22:20

      I do not refer here to economic right/left. There is no shred of evidence or argument in my reading or experience to support the notion that any progressive faction would do this, so there is no equivalent right wing contention. Glad that your economic right perspective is the same on this.

      But I will stand by the distinction that the US political right are the oligarchs in control of mass media and elections (both dems and repubs), and are the classic “tyrant” warmongers described by Aristotle. My experience in engineering is that those who would do this sort of thing, and those who would use it, are invariably right wing in the sense of warmongers for whom conformism = patriotism and money = virtue, whereas progressives are horrified by the idea. Those are not hypotheses, they are facts.

  3. John
    June 13, 2014 at 09:55

    A far more serious problem than misuse of surveillance data in court, is its misuse to injure those of certain political persuasions, by automatically inflicting economic and social damage.

    With increasing reliance upon internet, it is now a simple matter to block or damage employment relationships, financial qualifications, and social reputations. A small minority within any company or government unit can set this up and use surveillance data to control it. Already this is done automatically in the selection of web advertising based upon past user activities. So the feasibility and use of the technology is well known.

    And these things are not done by progressives, they are done only by right wing elements, for whom conformism = patriotism and money = virtue. So it is those progressives most desperately needed to reform this sick society who are at grave risk of economic and social injury by this technology, and it is being used against them.

Comments are closed.