Archive for the ‘crime’ Category
I was going to respond to the unsigned Chicago Tribune editorial titled, “Clemency for Leonard Peltier? Never”, but James Reynolds, former U.S. attorney did a better job, with less swear words.
In response to your Monday editorial “Clemency for Leonard Peltier? Never,” I was the United States attorney who supervised the prosecution of Leonard Peltier during the critical post-trial period. In December 2016, I wrote to President Barack Obama to support his clemency petition “as being in the best interests of justice in considering the totality of all matters involved.”
Although no trial is perfect, Peltier’s was unusually troublesome, particularly when viewed with the benefit of hindsight. The case against Peltier was a moving target, which shifted from a “deliberate ambush” theory in the earlier trial of Peltier’s co-defendants (who were found not guilty) to a “deliberate execution” at Peltier’s subsequent trial before a different judge, and then to an “accomplice” theory on appeal.
As an “aider and abettor,” according to the government’s theory, Peltier was guilty of the murders because he was present, and he had a weapon. It was a very thin case that likely would not be upheld by courts today. It is a gross overstatement to label Peltier a “cold-blooded murderer” on the basis of the minimal proof that survived the appeals in his case.
Following the conclusion of the appeals, Judge Gerald Heaney, an Eighth Circuit judge who sat on two of the appeals, took the extraordinary step of writing to the Senate Select Committee on Indian Affairs urging it to grant clemency to Peltier in 1991.
Considering all of the surrounding factors, including the prevailing worldview of the time, the FBI’s role in the creation of dangerous conditions on Pine Ridge, the manner in which the case was investigated and prosecuted and the extraordinary length of time already served, in my opinion, Peltier should be released in the interests of justice.
The government has gotten almost 41 years, and 41 pounds of flesh; Peltier is old and sick, and in my opinion, any more time served would be vindictive.
— James Reynolds, former U.S. attorney, Naples, Fla.
(click here to continue reading Leonard Peltier should be released in the interest of justice – Chicago Tribune.)
Exactly, Leonard Peltier has served long enough for a crime he probably didn’t even commit.
A little neutral-esque background from Wikipedia:
Peltier fled to Hinton, Alberta, where he hid in a friend’s cabin. On February 6, 1976, he was arrested. In December 1976, he was extradited from Canada based on documents submitted by the FBI that Warren Allmand, Canada’s Solicitor General at the time, would later state contained false information.
One of those documents was an affidavit signed by Myrtle Poor Bear, a local Native American woman. She claimed to have been Peltier’s girlfriend at the time and to have witnessed the murders. But, according to Peltier and others at the scene, Poor Bear did not know Peltier, nor was she present at the time of the shooting. She later claimed that she was pressured and threatened by FBI agents into giving the statements. Poor Bear attempted to testify about the FBI’s intimidation at Peltier’s trial; however, the judge barred her testimony on the grounds of mental incompetence.
Peltier fought extradition to the United States, even as Bob Robideau and Darrelle “Dino” Butler, AIM members also present on the Jumping Bull compound at the time of the shootings, were found not guilty on the grounds of self-defense by a federal jury in Cedar Rapids, Iowa. Peltier returned too late to be tried with Robideau and Butler, and he was subsequently tried separately. Peltier’s trial was held in Fargo, North Dakota, where a jury convicted Peltier of the murders of Coler and Williams. Unlike the trial for Butler and Robideau, the jury was informed that the two FBI agents were killed by close-range shots to their heads, when they were already defenseless due to previous gunshot wounds. They also saw autopsy and crime scene photographs of the two agents, which had not been shown to the jury at Cedar Rapids. In April 1977, Peltier was convicted and sentenced to two consecutive life sentences.
Doubts about legal proceedings
Numerous doubts have been raised over Peltier’s guilt and the fairness of his trial, based on allegations and inconsistencies regarding the FBI and prosecution’s handling of this case:
- FBI radio intercepts indicated that the two FBI agents had been pursuing a red pickup truck; this was confirmed by the FBI the day after the shootout. Red pickup trucks near the reservation were stopped for weeks, but Leonard Peltier did not drive a red pickup truck. Evidence was given that Peltier was driving a Suburban vehicle; a large station wagon style sedan built on a pickup truck chassis with an enclosed rear section. Peltier’s vehicle was red with a white roof—not a red, open-tray pickup truck with no white paint. The FBI agents’ radio message said that the suspect they were pursuing was driving a red pickup truck, with no additional details. At Peltier’s trial, the FBI testified that it had been searching for a red and white van, which Peltier was sometimes seen driving. This was a highly contentious matter of evidence in the trials.
- Testimony from three witnesses placed Peltier, Robideau and Butler near the crime scene. Those three witnesses later recanted, alleging that the FBI, while extracting their testimony, had tied them to chairs, denied them their right to talk to their attorney, and otherwise coerced and threatened them. Robideau said during an interview in the Robert Redford/Michael Apted film Incident at Oglala (1992), that “we approached” the agents’ cars.
- Unlike the juries in similar prosecutions against AIM leaders at the time, the Fargo jury was not allowed to hear about other cases in which the FBI had been rebuked for tampering with evidence and witnesses.
- An FBI ballistics expert testimony during the trial asserted that a shell case found near the dead agents’ bodies matched the rifle tied to Peltier. He said that a forensics test of the firing pin, which would have more definitively matched the gun to the cartridge case, was not performed because the gun was damaged in the fire. A less definitive test indicated that the extractor marks on the case and rifle matched. Years later, after an FOIA request, the FBI ballistics expert’s records were examined. His report said that he had performed a ballistics test of the firing pin and concluded that the cartridge case from the scene of the crime did not come from the rifle tied to Peltier. That evidence was withheld from the jury during the trial.
- Though the FBI’s investigation indicated that an AR-15 was used to kill the agents, several different AR-15s were in the area at the time of the shootout. Also, no other cartridge cases or evidence about them were offered by the prosecutor’s office, although other bullets were fired at the crime scene.
- During the trial, all the bullets and bullet fragments found at the scene were provided as evidence and detailed by Cortland Cunningham, FBI Firearms expert, in testimony. (Ref US v. Leonard Peltier Vol 9).
- According to Peltier, when he appealed his first-degree murder conviction in 1992, the charge was illegally changed to aiding and abetting.
- The U.S. Parole Commission denied Peltier parole in 1993 based on their finding that he “participated in the premeditated and cold blooded execution of those two officers.” But, the Parole Commission has since stated that it “recognizes that the prosecution has conceded the lack of any direct evidence that [Peltier] personally participated in the executions of the two FBI agents.”
(click here to continue reading Leonard Peltier – Wikipedia.)
Obama seems unlikely to commute Leonard Peltier’s sentence or pardon him, however, he should.
What a bunch of wack-a-doos.
You remember the Bundy cult of ammosexuals, right? Turns out being jailed for armed insurrection isn’t as much fun as it is on television or in a video game. In fact, the mean, mean Oregon jailers won’t even allow the Bundy cult members access to guns. What a travesty!
A well regulated militia being necessary to the security of a free state, the right of the people to keep and bear arms shall not be infringed.
(click here to continue reading Second Amendment to the United States Constitution – Wikipedia, the free encyclopedia.)
The nerve! No guns in jail! That’s, that’s unconstitutional!
Ammon and Ryan Bundy are actively considering whether they should pursue a civil rights lawsuit against the Multnomah County Sheriff’s Office for conditions at the county detention center.
In court documents released Tuesday, the leaders of the Malheur National Wildlife Refuge occupation give a list of conditions at the jail they said are violating their constitutional rights.
But the sheriff’s office also denied many requests from the inmates, including access to internet and chairs in their cells, access to other defendants so they can “strategize together” before the trial, unmonitored phone calls, a cordless printer and scanner, more storage space in jail cells, and “real pens.”
In his conclusion, Arnold said Ammon Bundy may pursue a civil rights lawsuit based upon U.S. Code Section 1983, which guarantees recourse for anyone who has been denied civil rights.
Courtesy of the Multnomah County Sheriff’s Office “My rights are being violated. My right to life is being violated. All of my First Amendment rights are being violated. My right to freedom of religion is being violated,” Ryan Bundy wrote in a supporting statement. “My Second Amendment rights are being violated. I never waived that right. My Fourth Amendment rights are being violated.
“I could argue that my right to life hasn’t been taken. But the FBI tried to take that right when they attempted to kill me.
“They missed on that one,” he added. “I still have the bullet to prove that.”
(click here to continue reading Ammon Bundy Considering Civil Rights Lawsuit Against Multnomah County . News | OPB.)
Coming from a group who doesn’t believe the federal government has any rights in the first place, this gives me a belly laugh…
Sounds like someone watched a few too many gangster movies…
The body of Peter Martinez, 28, better known on the streets as Petey Crack, had washed up near Manhattan Beach in Brooklyn. At one end, his head was wrapped in duct tape. At the other, where his feet should be, was a five-gallon bucket filled with rock-hard concrete — a mix of cement, sand, gravel and water — encasing his legs up to the shins.
The police said Mr. Martinez had a long history of arrests. He had been reported missing in February by his girlfriend. It seems that strong currents dragged Mr. Martinez, despite the homemade anchor, to shore, where he was discovered by a college student. There were no arrests in the case as of Wednesday, and the results of an autopsy were not yet complete.
How long his body had been in the water was just one of the mysteries the police were sorting through; Mr. Martinez’s last outfit — gray sweatpants, blue boxer shorts and a black jacket — was intact, and his tattoo of the Virgin Mary holding a rose was still visible.
Crime historians were mystified, struggling to think of similar cases.
(click here to continue reading Cement Shoes, Fabled Anchor to Watery Grave, Surface in Brooklyn – The New York Times.)
Rare because there are probably more efficient ways of killing people besides having them stand in a bucket of concrete, waiting for the concrete to set, and then dragging the bucket, and target, into water. Cement is heavy! And while the cement is hardening, it can be escaped. For how long? An expert says, maybe 12 hours, temperature depending…
But there is one more important ingredient: time. An amount of uninterrupted time not commonly associated with murderers looking to cover their tracks.
How long would cement shoes take to harden? Paul Bartelotti, owner of M&B Concrete in Brooklyn, tried to imagine the process.
“They could have gotten just a bag and added water,” he said. Not too much — the consistency has to be just right. “Like Carvel ice cream. Not, like, paint-thick. A little thicker.”
For several hours, the captive could still pull his feet out. “It would take at least, I would say, the better part of the day to not get your feet out,” Mr. Bartelotti said. “Depends on the temperature.”
Concrete hardens quickly in warm temperatures, he said. Mr. Martinez disappeared in February.
“It was cold,” Mr. Bartelotti mused. “If you let it sit from 12 hours to a day, the guy wouldn’t be able to get his feet out.” He considered the situations. “They could make it wet and make the guy stand in it, or put his legs in and pour the cement around it. He could have been dead and they just stuck his feet in.”
(click here to continue reading Cement Shoes, Fabled Anchor to Watery Grave, Surface in Brooklyn – The New York Times.)
And speaking of police full to the brim with self-righteousness, a woman was arrested in New Jersey for not answering a variant of the question, “Do you know why we pulled you over”…
Two New Jersey state troopers cuffed a woman along a Warren County roadway and hauled her in on an obstruction charge because she refused to answer questions during a routine traffic stop, according to dashboard camera footage obtained by NJ Advance Media.
The Oct. 16 incident, which happened near the New Jersey-Pennsylvania border on Route 519, is now the subject of a federal civil rights lawsuit filed by the woman, Rebecca Musarra, an attorney from Philadelphia.
Musarra claims in the suit the troopers violated basic rules familiar to anybody who’s ever watched a police show on TV, including the right to remain silent.
She claims at least three troopers insisted during the ordeal that her refusal to answer questions was a criminal act.
NJ Advance Media obtained the footage, along with a dispatch log from that evening, through an Open Public Records Act request filed in April.
The documents show Trooper Matthew Stazzone pulled Musarra over just before 9:30 p.m., suspecting her of speeding. He was quickly joined by a second trooper, Demetric Gosa, records show.
The dashboard camera footage shows Stazzone approached the vehicle on the passenger side and asked Musarra for her license, registration and insurance.
“While you’re looking for that, do you know why you’re being pulled over tonight?” the trooper asked her, according to the tape. She claims she provided the documents but didn’t respond.
After asking her several more times, Stazzone walked to the other side of her car, rapping on the window with his flashlight and again demanding a response.
“You’re going to be placed under arrest if you don’t answer my questions,” he told her. Musarra claims the force of the flashlight chipped her window.
The footage shows she eventually told the trooper she was an attorney and that she did not have to answer questions. Stazzone then ordered her out of the vehicle.
As the two troopers cuffed her and walked her toward a troop car, Musarra asked them, “Are you detaining me because I refused to speak?”
“Yeah,” Stazzone replied, according to the video. “Yeah, obstruction,” Gosa added.
(click here to continue reading WATCH: N.J. troopers arrest woman for remaining silent during traffic stop | NJ.com.)
Obstruction. Yeah, ok. I hope they lose their jobs over this bullying…
If I lived in Idaho, I’d try to get this guy fired; since I don’t, at least Craig Rowland’s retrograde and reprehensible beliefs can be made public for future Google searches…
An Idaho sheriff says the Legislature shouldn’t have gotten involved in creating a statewide system for collecting and tracking rape kits because many rape accusations are false.
The state lawmaker who introduced the bill immediately denounced the comments.
Bingham County Sheriff Craig Rowland made the comments Monday to Idaho Falls TV station KIDK before lawmakers unanimously approved the new system and sent the measure to the governor.
Rowland said legislators should let law officers decide which rape kits need testing, the system that is currently in place.
He said: “The majority of our rapes — not to say that we don’t have rapes, we do — but the majority of our rapes that are called in are actually consensual sex.”
Such claims are part of a larger problem of law enforcement harboring unfair skepticism of victims of rape more so than other crimes
Rep. Melissa Wintrow, a Democrat from Boise who introduced the bill, said the sheriff’s remarks were harmful to women.
“Many times people are focused on a woman’s behavior, and the victim’s response,” she said, “when we should be thinking about what are we teaching men in this society. What are we teaching young boys and men about how we should not initiate or cross any physical boundary without consent.”
She pointed to FBI statistics that show only 33 percent of all rape victims report the crime.
(click here to continue reading Rape kit system unnecessary since most accusations false, Idaho sheriff says | OregonLive.com.)
Democratic Primary Ballot
I’d read before that the law was squishy about whether photographing one’s ballot was legal or tolerated, or not. Since I looked this law up today, I’m posting it here.
On this page, we provide a list of election laws, websites, and contact information for election officials in all 50 states and the District of Columbia. Contacting your state election officials is a great way to get information about what your state allows in terms of documenting the vote. As you learn new information, please contact us and let us know how your state is handling these requests, so we can share that information on this site.
This page begins with a chart summarizing the law in each state in order to determine whether your state allows recording inside polling places. Click on your state for specific information and notes. For general guidelines on photography and videography in and around polling places, see the general Documenting the Vote 2012 page.
Select a state below to jump to its relevant information.
Contact Information: Illinois State Board of Elections Springfield Office: (217) 782-4141 Chicago Office: (312) 814-6440 E-mail: email@example.com
10 Ill. Comp. Stat. 5/29-4 – Intimidation of voter
10 Ill. Comp. Stat. 5/29-9 – Unlawful observation of voting
Illinois Compiled Statutes, Chapter 5, Article 17 10 Ill. Comp. Stat. 5/17-29 – 100-foot zone
10 Ill. Comp. Stat 5/29-9 states that “any person who knowingly marks his ballot or casts his vote on a voting machine or voting device so that it can be observed by another person, and any person who knowingly observes another person lawfully marking a ballot or lawfully casting his vote on a voting machine or voting device, shall be guilty of a Class 4 felony.” It is not clear whether this provision would apply to display of a ballot after it has been marked, or just to the actual act of marking the ballot. If the latter interpretation were followed, it would still be unlawful to livestream your activities in the voting booth, and possibly to post video of your filling out your ballot.
(click here to continue reading State Law: Documenting the Vote 2012 | Digital Media Law Project.)
As far as I can tell, nobody has been prosecuted in Illinois for photographing an actual ballot since smartphones became prevalent, but to my non-lawyer eyes, the law is not crystal clear. Even still, why risk it?
And from a 2014 article:
Illinois: According to state election code, voters are not allowed to take pictures of their marked ballots and show them to other people. Doing so could result in a class 4 felony. Bernadette Harrington, legal counsel for the Illinois State Board of Elections, said that there is no specific prohibition on photography in a polling place, although taking a photo of another person’s marked ballot is barred. Verdict: Ballot photography banned. Polling place photography allowed.
(click here to continue reading A Guide To Not Getting Arrested When You Use Your Cell Phone On Election Day.)
By the way, I forgot to link to another good post by digital forensics expert Jonathan Zdziarski, explaining what the FBI is actually pressuring Apple to provide:
With most non-technical people struggling to make sense of the battle between FBI and Apple, Bill Gates introduced an excellent analogy to explain cryptography to the average non-geek. Gates used the analogy of encryption as a “ribbon around a hard drive”. Good encryption is more like a chastity belt, but since Farook decided to use a weak passcode, I think it’s fair here to call it a ribbon. In any case, lets go with Gates’ ribbon analogy.
Instead of cutting the ribbon, which would be a much simpler task, FBI is ordering Apple to invent a ribbon cutter – a forensic tool capable of cutting the ribbon for FBI, and is promising to use it on just this one phone. In reality, there’s already a line beginning to form behind Comey should he get his way. NY DA Cy Vance has stated that NYC has 175 iPhones waiting to be unlocked (which translates to roughly 1/10th of 1% of all crime in NYC for an entire year). Documents have also shown DOJ has over a dozen more such requests pending. If FBI’s promise of “just this one phone” were authentic, there would be no need to order Apple to make this ribbon cutter; they’d simply tell them to cut the ribbon.
Why has the government waited this long to order such a thing? Because in spite of all of iOS 8’s security, the Chinese invented a ribbon cutter for it called the IP BOX. IP BOX was capable of brute forcing any numeric passcode in iOS 8, and even though it was junky, Chinese-made hardware with zero forensic credibility (and actually called home to servers in China), our government used it widely to break into iOS devices without Apple’s help. The government has really gone dumpster diving for forensic solutions for iOS. This ribbon cutter was used by both law enforcement and anyone with $200 to break into iOS devices, and is a great example of how such a ribbon cutter is often abused for crime.
So here’s the real question: Why is FBI asking for the invention of a ribbon cutter instead of just asking Apple to cut the ribbon? Well the answer to that comes back to precedent. If FBI can order the existence of this ribbon cutter, Cy Vance’s 175 phones will be much easier to push through the courts without the same level of scrutiny as a terrorism case. If FBI were simply asking for Apple to cut the ribbon, all future AWA orders would have to go through the same legal scrutiny in the courts for justification. Getting the ribbon cutter invented for a terrorism case opens the door for such a tool to then be justified by the DA for weaker cases – such as narcotics, computer crimes, or even simply investigations where the government can’t even prove to the courts that a crime was ever committed. Once it’s a tool, just like a Stingray box or a breathalyzer, the court’s leniency in permitting its use increases dramatically.
(click here to continue reading On Ribbons and Ribbon Cutters | Zdziarski’s Blog of Things.)
Now if I could only mandate that all politicians were required to understand the concepts before opening their speaking holes. I know, I know, zero chance…
Also consider that the courts aren’t about to force Apple to hack into their own customer products. In fact, the customer purchased these products trusting that the manufacturer wouldn’t – even couldn’t – intentionally compromise them; ever since iOS 8, Apple has marketed these devices as so secure that Apple themselves cannot hack them. For Apple to be forced to backdoor their own devices would invite countless lawsuits from their own customers, betray consumer trust, and likely cost Apple millions, if not billions, in sales depending on how big of a PR nightmare it created. The courts, however, appear to be OK with forcing Apple to write what is being portrayed by the FBI as an innocent, fluffy tool for just this one device.
(click here to continue reading On Ribbons and Ribbon Cutters | Zdziarski’s Blog of Things.)
No wonder our country is in trouble: not one Republican candidate for president even understands the Apple/FBI issue, or at least admits to understanding it. Not even the CNN moderators! Even though Apple’s official response was released in the afternoon before this debate, nobody spent the time to read what it asserted, they were too busy getting makeup applied and practicing zingers. Facts are for losers.
Apple’s reasoning in the brief rests on three pillars. First, that forcing Apple to write code that weakens its devices and the security of its customers constitutes a violation of free speech as protected by the Constitution.
Second, that the burden the FBI is putting on it by requesting that Apple write the software and assist in unlocking the device is too large. Apple argues that it would have to create the new version of iOS, called GovtOS, which requires coding, signing, verification and testing. It would then have to create an FBI forensics laboratory on site at its headquarters and staff it. The burden would then extend to what Apple views is the inevitable onslaught of additional devices that would follow after the precedent was set.
In addition to free speech, Apple argues that the Fifth Amendment’s Due Process clause prohibits the government from compelling Apple to create the new version of iOS. Apple argues that there is no court precedent for forcing a company to create something new, like GovtOS.
“But compelling minimal assistance to surveil or apprehend a criminal (as in most of the cases the government cites), or demanding testimony or production of things that already exist (akin to exercising subpoena power), is vastly different, and significantly less intrusive, than conscripting a private company to create something entirely new and dangerous. There is simply no parallel or precedent for it,” reads the filing.
(click here to continue reading Apple Files Motion To Dismiss The Court Order To Force It To Unlock iPhone, Citing Free Speech Rights.)
Here’s the relevant part of the Republican presidential debate transcript, held in Houston, FEB. 25, 2016, with a few comments interspersed…
BLITZER: There’s a huge battle underway right now between the tech giant Apple and the federal government. The federal government wants Apple to unlock the phone used by that San Bernardino terrorist to prevent future attacks. Apple has refused, saying it would compromise the security of all of its customers. And just this afternoon, they went to court to block the judge’s order.
To prevent future attacks? Really? The San Bernardino killers are both dead, they destroyed their computers, their other phones, but left their government issued phone untouched. Apple turned over all the iCloud data on Apple servers (email, texts) within hours, and so what exactly is on the locked phone of grave import? Most likely nothing, yet the emotionally charged public opinion is on the FBI’s side, and so they push on.
Dana Bash, pick up the questioning.
BASH: Senator Rubio, you say it’s complicated, and that, quote, “Apple isn’t necessarily wrong to refuse the court order.” Why shouldn’t investigators have everything at their disposal?
Again, this is a misleading framing. Apple complied with the FBI’s request, quickly, and with good intent. What the FBI wants is a tool to allow the FBI to have the ability to open any phone for any reason. Do you really think the FBI couldn’t take the hard drive out of the phone and copy it to some server, and run NSA decryption tools on it? The FBI wants Apple to create a magic can-opener to open each and every phone, as needed, or as suspected they’ll need, in such a way that whatever evidence is found will be able to used in court, and survive questioning by defense lawyers. The San Bernardino killers are not going to be in court, they are both dead. This case is all about the precedent.
RUBIO: No, in fact what I have said is the only thing — the FBI made this very clear 48 hours ago — the only thing they are asking of Apple is that Apple allow them to use their own systems in the FBI to try to guess the password of the San Bernardino killer. Apple initially came out saying, “We’re being ordered to create a back door to an encryption device.” That is not accurate.
The only thing they’re being asked to do, and the FBI made this very clear about 48 hours ago, is allow us to disable the self- destruct mode that’s in the Apple phone so that we can try to guess using our own systems what the password of this killer was.
And I think they should comply with that. If that’s all they’re asking for, they are not asking for Apple to create a back door to encryption.
Rubio is either misinformed, or intentionally wrong. The FBI is quite clearly asking Apple to spend a month or so of its own resources building a new version of Government iOS in order to bypass the weakest point of the iPhone’s protection, namely the passcode.
BASH: So just to be clear, you did say on CNN a couple of weeks ago this is a complicated issue; Apple is not necessarily wrong here.
RUBIO: Because at the time, Apple was portraying that the court order was to create a back door to an encryption device.
BASH: But just to be clear — just to be clear, if you are president, would you instruct your Justice Department to force Apple to comply or not?
RUBIO: To comply with an order that says that they have to allow the FBI the opportunity to try to guess the password?
RUBIO: Absolutely. That Apple phone didn’t even belong to the killer. It belonged to the killer’s employee (sic) who have agreed to allow him to try to do this. That is all they’re asking them to do is to disable the self-destruct mode or the auto-erase mode on one phone in the entire world. But Apple doesn’t want to do it because they think it hurts their brand.
Well, let me tell you, their brand is not superior to the national security of the United States of America.
Christ, what an asshole. Marcobot Rubio’s handlers coached him on this line obviously, you can tell by the smug little grin every time he remembers to recite one of his scripted lines, more or less in the right place. And for the thousandth time, it isn’t just “one phone”. There are multiple other requests in the pipeline, some federal, some at the state level. Thousands of potential cases in the US alone, waiting, anticipating, for precedent to be set.
BASH: Senator Cruz, Apple CEO Tim Cook says this would be bad for America. Where do you stand: national security or personal privacy?
horrible framing. If Apple had refused to turn over iCloud backups, and refused to assist the FBI from the beginning, maybe, maybe this would be a valid question, but Apple isn’t supporting terrorism by refusing to become a code-slave to the federal government! Apple is appealing the ruling, as is their right!
CRUZ: Well, as you know, at that same CNN forum, both Marco and I were asked this question. His answer, he was on both sides of the fence. He’s now agreeing with me. And so I’m glad.
What I said is yes, Apple should be forced to comply with this court order. Why? Because under the Fourth Amendment, a search and seizure is reasonable if it has judicial authorization and probable cause. In this instance, the order is not put a back door in everyone’s cell phone. If that was the order, that order would be problematic because it would compromise security and safety for everyone.
I would agree with Apple on that broad policy question. But on the question of unlocking this cell phone of a terrorist, we should enforce the court order and find out everyone that terrorist at San Bernardino talked to on the phone, texted with, e-mailed. And absolutely, Apple doesn’t have a right to defy a valid court order in a terrorism investigation.
Note: metadata like who was called, texted, e-mailed was already turned over, not to mention most of that is also available from the telecommunication corporation (AT&T, Verizon, whomever), and it was disclosed within hours of the shooting. Apple surely does have the ability to use the courts to dispute a court order, they aren’t going rogue and fleeing the jurisdiction! They are using the American legal system, as is their right. Perhaps Ted Cruz recalls there are multiple levels of the judiciary? Including the Supreme Court…
BASH: Dr. Carson, Tim Cook, again, the CEO of Apple, says that this would be bad for America. What do you think?
CARSON: I think allowing terrorist to get away with things is bad for America.
These particular terrorists are still dead, I’m not quite sure what they are getting away with. Dr. Carson must want the police to exhume the corpses and waterboard them or worse.
You know, we have the — we have a Constitution. We have a Fourth Amendment. It guards us against illegal and unreasonable search and seizure. But we have mechanisms in place with the judicial system that will allow us to gain material that is necessary to benefit the nation as a whole or the community as a whole. And that’s why we have FISA courts and things of that nature.
So absolutely, I would — I would expect Apple to comply with the court order. If they don’t comply with that, you’re encouraging chaos in our system.
If a policeman asks him to turn in all his guns and stop practicing his religion, Dr. Carson would comply, right away, or else he’d be encouraging chaos in our system. Because no matter what the Constitution says or implies, the police get to supersede it whenever they say the magic word, “terrorism”.
BASH: Mr. Trump…
(APPLAUSE) KASICH: I want to weigh in on this please. I want to just tell you that the problem is not right now between the administration and Apple. You know what the problem is? Where’s the president been? You sit down in a back room and you sit down with the parties and you get this worked out. You don’t litigate this on the front page of the New York Times, where everybody in the world is reading about their dirty laundry out here.
The president of the United States should be convening a meeting, should have convened a meeting with Apple and our security forces. And then you know what you do when you’re the president? You lock the door and you say you’re not coming out until you reach an agreement that both gives the security people what they need and protects the rights of Americans. This is a failure of his leadership to get this done as an executive should be doing it.
And I’ll tell you, that’s why you want a governor. I do this all the time. And we reach agreements all the time. Because as an executive, you’ve got to solve problems instead of fighting on the front page of the newspaper.
(click here to continue reading Transcript of the Republican Presidential Debate in Houston – The New York Times.)
Ah, yes, Obama has been golfing again or something, right? And the FBI didn’t make public statements inflaming public sentiment before Apple even had a chance to respond? Uhh, wrong as usual, Mr. Kasich…
from APPLE INC’S MOTION TO VACATE ORDER COMPELLING APPLE INC. TO ASSIST AGENTS IN SEARCH, AND OPPOSITION TO GOVERNMENT’S MOTION TO COMPEL ASSISTANCE:
There are two important and legitimate interests in this case: the needs of law enforcement and the privacy and personal safety interests of the public. In furtherance of its law enforcement interests, the government had the opportunity to seek amendments to existing law, to ask Congress to adopt the position it urges here. But rather than pursue new legislation, the government backed away from Congress and turned to the courts, a forum ill-suited to address the myriad competing interests, potential ramifications, and unintended consequences presented by the government’s unprecedented demand. And more importantly, by invoking “terrorism” and moving ex parte behind closed courtroom doors, the government sought to cut off debate and circumvent thoughtful analysis.
The government says: “Just this once” and “Just this phone.” But the government knows those statements are not true; indeed the government has filed multiple other applications for similar orders, some of which are pending in other courts. And as news of this Court’s order broke last week, state and local officials publicly declared their intent to use the proposed operating system to open hundreds of other seized devices—in cases having nothing to do with terrorism. If this order is permitted to stand, it will only be a matter of days before some other prosecutor, in some other important case, before some other judge, seeks a similar order using this case as precedent. Once the floodgates open, they cannot be closed, and the device security that Apple has worked so tirelessly to achieve will be unwound without so much as a congressional vote. As Tim Cook, Apple’s CEO, recently noted: “Once created, the technique could be used over and over again, on any number of devices. In the physical world, it would be the equivalent of a master key, capable of opening hundreds of millions of locks—from restaurants and banks to stores and homes. No reasonable person would find that acceptable.”
The short-fingered vulgarian didn’t get a chance to respond, but we can guess what he would have said…
Republican presidential candidate Donald Trump called on Friday for a boycott of Apple Inc products until the tech company agreed to help the U.S. government unlock the cellphone of one of the killers in last year’s San Bernardino, California, shooting.
“Boycott Apple until such time as they give that information,” Trump said at a campaign event in Pawleys Island, South Carolina. “It just occurred to me.”
(click here to continue reading Trump calls for boycott until Apple unlocks shooter’s phone | Reuters.)
The unnamed FBI official who was boasting to WSJ journalists about the Farook case being “nearly perfect” as a test probably wishes that quote hadn’t been used now in light of this development:
[Apple said it] had been in regular discussions with the government since early January, and that it proposed four different ways to recover the information the government is interested in without building a backdoor. One of those methods would have involved connecting the iPhone to a known Wi-Fi network and triggering an iCloud backup that might provide the FBI with information stored to the device between the October 19th and the date of the incident.
Apple sent trusted engineers to try that method, the executives said, but they were unable to do it. It was then that they discovered that the Apple ID password associated with the iPhone had been changed. (The FBI claims this was done by someone at the San Bernardino Health Department.) Had that password not been changed, the executives said, the government would not need to demand the company create a “backdoor” to access the iPhone used by Syed Rizwan Farook
(click here to continue reading Apple: Terrorist’s Apple ID Password Changed In Government Custody, Blocking Access – BuzzFeed News.)
Did you notice? The FBI had possession of Farook’s iPhone for over 24 hours, before some agent or other employee changed the Apple ID password. (!!!???!!!)
Changing the Apple ID password isn’t hard, but it isn’t something you do without meaning to. You’d have to log-in, give the old password, then create the new password, entering it twice. Presumedly, you’d either commit the password to memory, or WRITE IT DOWN.
Hmmm, “nearly perfect test case” indeed.
Terrorism theatre, part the 234,323rd.
After the FBI sneeringly complained that encryption, privacy and security were merely marketing phrases to Apple, Apple responded with an eyeroll…
Creating the backdoor access, the executives said, would put at risk the privacy of millions of users. It would not only serve to unlock one specific phone, they said, but create a sort of master key that could be used to access any number of devices. The government says the access being sought could only be used on this one phone, but Apple’s executives noted that there is widespread interest in an iPhone backdoor, noting that Manhattan District Attorney Cyrus Vance said Thursday that his office has 175 Apple devices he’d like cracked. They also claimed that no other government in the world has ever asked Apple for the sort of FBiOS the government is demanding that it build now.
Asked why the company is pushing back so hard against this particular FBI request when it has assisted the agency in the past, Apple executives noted that the San Bernadino case is fundamentally different from others in which it was involved. Apple has never before been asked to build an entirely new version of its iOS operating system designed to disable iPhone security measures.
The Apple senior executives also pushed back on the government’s arguments that Apple’s actions were a marketing ploy, saying they were instead based on their love for the country and desire not to see civil liberties tossed aside.
(click here to continue reading Apple: Terrorist’s Apple ID Password Changed In Government Custody, Blocking Access – BuzzFeed News.)
If you haven’t read digital forensics expert Jonathan Zdziarski’s blog post entitled “Apple, FBI, and the Burden of Forensic Methodology”, you should click through and read it right away (well, within 5 seconds). The FBI’s request is quite a big ask, not something considered last minute, but obviously planned carefully for maximum impact. Director Comey has been pushing for back doors to Apple and Google smartphones for a long time.
Apple must be prepared to defend their tool and methodology in court; no really, the defense / judge / even juries in CA will ask stupid questions such as, “why didn’t you do it this way”, or “is this jail breaking”, or “couldn’t you just jailbreak the phone?” (i was actually asked that by a juror in CA’s broken legal system that lets the jury ask questions). Apple has to invest resources in engineers who are intimately familiar with not only their code, but also why they chose the methodology they did as their best practices. If certain challenges don’t end well, future versions of the instrument may end up needing to incorporate changes at the request of FBI.
If evidence from a device ever leads to a case in a court room, the defense attorney will (and should) request a copy of the tool to have independent third party verification performed, at which point the software will need to be made to work on another set of test devices. Apple will need to work with defense experts to instruct them on how to use the tool to provide predictable and consistent results.
In the likely event that FBI compels the use of the tool for other devices, Apple will need to maintain engineering and legal staff to keep up to date on their knowledge of the tool, maintain the tool, and provide testimony as needed.
In other words, developing an instrument is far more involved than simply dumping a phone for FBI, which FBI could have ordered:
- Developed to forensically sound standards
- Validated and peer-reviewed
- Be tested and run on numerous test devices
- Accepted in court
- Given to third party forensics experts (testing)
- Given to defense experts (defense)
- Stand up to challenges
- Be explained on the stand
- Possibly give source code if ordered
- Maintain and report on issues
- Defend lawsuits from those convicted
- Legally pursue any agencies, forensics companies, or hackers that steal parts of the code.
- Maintain legal and engineering staff to support it
- On appeals, go through much of the process all over again
The risks are significant too:
- Ingested by an agency, reverse engineered, then combined with in-house or purchased exploits to fill in the gap of code signing.
- Ingested by private forensics companies, combined with other tools / exploits, then sold as a commercial product.
- Leaked to criminal hackers, who reverse engineer and find ways to further exploit devices, steal personal data, or use it as an injection point for other ways to weaken the security of the device.
- The PR nightmare from demonstrating in a very public venue how the company’s own products can be back doored.
- The judicial precedents set to now allow virtually any agency to compel the software be used on any other device.
- The international ramifications of other countries following in our footsteps; many countries of which have governments that oppress civil rights.
This far exceeds the realm of “reasonable assistance”, especially considering that Apple is not a professional forensics company and has no experience in designing forensic methodology, tools, or forensic validation. FBI could attempt to circumvent proper validation by issuing a deviation (as they had at one point with my own tools), however this runs the risk of causing the house of cards to collapse if challenged by a defense attorney.
(click here to continue reading Apple, FBI, and the Burden of Forensic Methodology | Zdziarski’s Blog of Things.)
Not something an Apple intern can do in an afternoon, in other words, but a significant task imposed on a private corporation by a government agency, in support of “what some law-enforcement officials privately describe as a nearly perfect test case.”
A few more details re: the FBI vs. Apple case
A conspiracy minded person might wonder how much the FBI and NSA knew about the planned attack before it happened. Maybe James Comey decided a little collateral damage was a fair price to pay?
As the fight between federal officials and tech companies over encryption has intensified in recent years, talks between the two sides have produced few results, while Congress has struggled to craft legislation on the issue.
FBI leaders had been scanning for a case that would make a compelling argument about the dangers of encryption. In the San Bernardino phone, they found what some law-enforcement officials privately describe as a nearly perfect test case.
(click here to continue reading U.S. and Apple Dig In for Court Fight Over Encryption – WSJ.)
Again, having 9 Justices on the SCOTUS is extremely important, for many reasons, including this case:
Apple has a few more days to file its formal response to the court, which can be summed up as: “No.”
After a series of briefings at this local level, if neither side is happy, the case will be passed on to the District Court. Still no solution? The case would then be escalated to the Court of Appeals for the Ninth Circuit, the court which handles these sorts of issues on the US West Coast.
If that court backs the FBI, and Apple again refuses, it could eventually reach the US Supreme Court, whose decision will ultimately be final, and in this utterly fascinating case, precedent setting.
(click here to continue reading Apple vs the FBI – a plain English guide – BBC News.)
Is it even possible to do what the government is requesting? Yes, it does seem so, per the analysis of Dan Guido.
Again in plain English, the FBI wants Apple to create a special version of iOS that only works on the one iPhone they have recovered. This customized version of iOS (*ahem* FBiOS) will ignore passcode entry delays, will not erase the device after any number of incorrect attempts, and will allow the FBI to hook up an external device to facilitate guessing the passcode. The FBI will send Apple the recovered iPhone so that this customized version of iOS never physically leaves the Apple campus. As many jailbreakers are familiar, firmware can be loaded via Device Firmware Upgrade (DFU) Mode. Once an iPhone enters DFU mode, it will accept a new firmware image over a USB cable. Before any firmware image is loaded by an iPhone, the device first checks whether the firmware has a valid signature from Apple. This signature check is why the FBI cannot load new software onto an iPhone on their own — the FBI does not have the secret keys that Apple uses to sign firmware.
(click here to continue reading Apple can comply with the FBI court order – Trail of Bits Blog.)
and finally, some other tech companies spoke up in support of Apple’s stance:
On Wednesday, Apple’s peers in the technology industry – also eager to keep reputations over security intact – gave their backing to the iPhone maker.
Jan Koum, the creator of Whatsapp, which is owned by Facebook, wrote: “We must not allow this dangerous precedent to be set. Today our freedom and our liberty is at stake.”
The Information Technology Industry Council, a lobbying group that represents Google, Facebook, Microsoft, Samsung, Blackberry and a host of others, put out this statement: “Our fight against terrorism is actually strengthened by the security tools and technologies created by the technology sector, so we must tread carefully given our shared goals of improving security, instead of creating insecurity.”
Google chief executive Sundar Pichai said: “Forcing companies to enable hacking could compromise users’ privacy.”
Edward Snowden, whose revelations about US government spying provoked Apple’s stance on passcode-protected data, said the FBI was “creating a world where citizens rely on Apple to defend their rights, rather than the other way around”.
(click here to continue reading Apple vs the FBI – a plain English guide – BBC News.)
I’m on Apple’s side on this, 1,000%, the government should not be allowed such latitude. Apple currently has the full letter on their website, some excerpts below.
The United States government has demanded that Apple take an unprecedented step which threatens the security of our customers. We oppose this order, which has implications far beyond the legal case at hand.
This moment calls for public discussion, and we want our customers and people around the country to understand what is at stake.
We have great respect for the professionals at the FBI, and we believe their intentions are good. Up to this point, we have done everything that is both within our power and within the law to help them. But now the U.S. government has asked us for something we simply do not have, and something we consider too dangerous to create. They have asked us to build a backdoor to the iPhone.
Specifically, the FBI wants us to make a new version of the iPhone operating system, circumventing several important security features, and install it on an iPhone recovered during the investigation. In the wrong hands, this software — which does not exist today — would have the potential to unlock any iPhone in someone’s physical possession.
The FBI may use different words to describe this tool, but make no mistake: Building a version of iOS that bypasses security in this way would undeniably create a backdoor. And while the government may argue that its use would be limited to this case, there is no way to guarantee such control.
(click here to continue reading Customer Letter – Apple.)
A new version of the iOS, created just for the government to inspect our private communications? That doesn’t sound good, in fact, that is a horrible precedent for private industry. I assume this case will be appealed all the way to the Supreme Court, all the more reason to have a full 9 Justices sitting on the court.
Tim Cook continues:
The government suggests this tool could only be used once, on one phone. But that’s simply not true. Once created, the technique could be used over and over again, on any number of devices. In the physical world, it would be the equivalent of a master key, capable of opening hundreds of millions of locks — from restaurants and banks to stores and homes. No reasonable person would find that acceptable.
The government is asking Apple to hack our own users and undermine decades of security advancements that protect our customers — including tens of millions of American citizens — from sophisticated hackers and cybercriminals. The same engineers who built strong encryption into the iPhone to protect our users would, ironically, be ordered to weaken those protections and make our users less safe.
We can find no precedent for an American company being forced to expose its customers to a greater risk of attack. For years, cryptologists and national security experts have been warning against weakening encryption. Doing so would hurt only the well-meaning and law-abiding citizens who rely on companies like Apple to protect their data. Criminals and bad actors will still encrypt, using tools that are readily available to them.
Rather than asking for legislative action through Congress, the FBI is proposing an unprecedented use of the All Writs Act of 1789 to justify an expansion of its authority.
The government would have us remove security features and add new capabilities to the operating system, allowing a passcode to be input electronically. This would make it easier to unlock an iPhone by “brute force,” trying thousands or millions of combinations with the speed of a modern computer.
The implications of the government’s demands are chilling. If the government can use the All Writs Act to make it easier to unlock your iPhone, it would have the power to reach into anyone’s device to capture their data. The government could extend this breach of privacy and demand that Apple build surveillance software to intercept your messages, access your health records or financial data, track your location, or even access your phone’s microphone or camera without your knowledge.
Opposing this order is not something we take lightly. We feel we must speak up in the face of what we see as an overreach by the U.S. government.
We are challenging the FBI’s demands with the deepest respect for American democracy and a love of our country. We believe it would be in the best interest of everyone to step back and consider the implications.
While we believe the FBI’s intentions are good, it would be wrong for the government to force us to build a backdoor into our products. And ultimately, we fear that this demand would undermine the very freedoms and liberty our government is meant to protect.
(click here to continue reading Customer Letter – Apple.)
The All Writs Act is a United States federal statute, codified at 28 U.S.C. § 1651, which authorizes the United States federal courts to “issue all writs necessary or appropriate in aid of their respective jurisdictions and agreeable to the usages and principles of law.”
(click here to continue reading All Writs Act – Wikipedia, the free encyclopedia.)
The NYT gives a little context:
Apple said on Wednesday that it would oppose and challenge a federal court order to help the F.B.I. unlock an iPhone used by one of the two attackers who killed 14 people in San Bernardino, Calif., in December.
On Tuesday, in a significant victory for the government, Magistrate Judge Sheri Pym of the Federal District Court for the District of Central California ordered Apple to bypass security functions on an iPhone 5c used by Syed Rizwan Farook, who was killed by the police along with his wife, Tashfeen Malik, after they attacked Mr. Farook’s co-workers at a holiday gathering.
Judge Pym ordered Apple to build special software that would essentially act as a skeleton key capable of unlocking the phone.
But hours later, in a statement by its chief executive, Timothy D. Cook, Apple announced its refusal to comply. The move sets up a legal showdown between the company, which says it is eager to protect the privacy of its customers, and the law enforcement authorities, who say that new encryption technologies hamper their ability to prevent and solve crime.
(click here to continue reading Tim Cook Opposes Order for Apple to Unlock iPhone, Setting Up Showdown – The New York Times.)
The WSJ adds:
Apple Inc. Chief Executive Tim Cook said the company will oppose a federal judge’s order to help the Justice Department unlock a phone used by a suspect in the San Bernardino, Calif., attack.
In a strongly worded letter to customers posted on Apple’s website early Wednesday, Mr. Cook called the order an “unprecedented step which threatens the security of our customers” with “implications far beyond the legal case at hand.”
The order, reflected in legal filings unsealed Tuesday, marks a watershed moment in the long-running argument between Washington and Silicon Valley over privacy and security.
In the order, U.S. Magistrate Judge Sheri Pym agreed with a Justice Department request that Apple help unlock an iPhone 5C once used by Syed Rizwan Farook. The order calls on Apple to disable certain security measures on the phone, including a feature that permanently disables the phone after 10 unsuccessful tries at the password. Such measures have kept agents from reviewing the contents of the phone, according to the filing. When the phone is locked, the data is encrypted.
Apple said it isn’t opposing the order lightly nor does it question the FBI’s intentions, but it feels that the government has overreached.
In her order, Judge Pym gave Apple five days to appeal.
(click here to continue reading Apple Opposes Judge’s Order to Help Unlock Phone Linked to San Bernardino Attack – WSJ.)
Police who intentionally skirt civilian oversight by destroying or disabling their dashcams should be fired, plain and simple. Or at least severely reprimanded. The police need to come back to being part of society, not standing alone from it, without accountability. Serve and protect used to be the motto, but destroying evidence of police actions only serves to protect the police themselves.
Why are so many police dashcam videos silent?
Chicago Police Department officers stashed microphones in their squad car glove boxes. They pulled out batteries. Microphone antennas got busted or went missing. And sometimes, dashcam systems didn’t have any microphones at all, DNAinfo Chicago has learned.
Police officials last month blamed the absence of audio in 80 percent of dashcam videos on officer error and “intentional destruction.”
A DNAinfo Chicago review of more than 1,800 police maintenance logs sheds light on the no-sound syndrome plaguing Police Department videos — including its most notorious dashcam case.
Maintenance records of the squad car used by Jason Van Dyke, who shot and killed Laquan McDonald, and his partner, Joseph Walsh, show monthslong delays for two dashcam repairs, including a long wait to fix “intentional damage.”
Between Sept. 1, 2014, and July 16, 2015, maintenance technicians assigned to troubleshoot and repair dashcam systems reported 90 incidents where no microphones were found in squad cars, according to police logs.
Another 13 inspections during that period turned up only one microphone in squad cars that were supposed to be equipped with two audio recording devices, according to the logs.
On 30 occasions, technicians who downloaded dashcam videos found evidence that audio recording systems either had not been activated or were “intentionally defeated” by police personnel, the records show.
(click here to continue reading Chicago Police Hid Mics, Destroyed Dashcams To Block Audio, Records Show – Archer Heights – DNAinfo.com Chicago.)
An important story, and you should read it all…
The police are becoming more and more like an occupying army, obeying their own codes, and ignoring laws at will. Of course #notAllCops – but what troubles me is that the rogue cops always seem to have the backing of the rest of the police. How else can you explain the Chicago Police actions in the LaQuan McDonald execution? Why exactly did police officers on the scene immediately try to destroy evidence? Why are those cops still employed? Jason Van Dyke should serve time for 1st Degree murder, but his buddies shouldn’t get off scott-free.
As the shocking video of a Chicago police officer fatally shooting 17-year-old Laquan McDonald is played worldwide, other footage from the scene that night has gone missing.
Minutes after McDonald was shot 16 times by Officer Jason Van Dyke on a Southwest Side street, several police officers entered a Burger King located just yards from where the teen fell, demanding to view the restaurant’s password-protected surveillance video, Jay Darshane, a district manager for the fast-food chain, told the Tribune this week.
Darshane said the restaurant’s assistant manager called him that night saying about four or five police officers were inside demanding the password to access the surveillance video. He authorized the manager of the store — who wasn’t working at the time — to give the code to the officers.
The officers stayed on the scene until almost midnight and even brought in their own information technology specialist when it appeared they were having trouble operating the system, Darshane said.
The equipment had been in perfect working order for weeks before the shooting, Darshane said. But the next morning, Burger King discovered the 86-minute gap when investigators with the Independent Police Review Authority, which investigates police shootings, sought to make a DVD copy of the surveillance video. Missing was any footage from 9:13 p.m. to 10:39 p.m., Darshane said.
When the video system kicked back on, it recorded two police officers in the Burger King office who appeared to be looking at something on the monitor over and over, according to Michael Robbins, an attorney representing McDonald’s family.
“It is curious,” Robbins said. “If they got there and turned it on and found that there was no video, what were they looking at for two hours?”
(click here to continue reading Burger King manager told grand jury of gap in Laquan McDonald video of police shooting – Chicago Tribune.)
I’ve thought about this for days actually, and it still puzzles me. What possible rationalization can the police give for obstructing justice? Other than the obvious motivation that these rogue cops felt there was some illegal or morally ambiguous action they performed that was worth covering up, and they expected that there would not be consequences from their bosses, nor from the rest of the Chicago Police.
These four or five police officers, and their IT specialist need to be named, and to also be charged with a crime. I’d be happier if these criminal thugs were no longer employed by my tax dollars.
In a just world, these officers would all serve time in prison. Knowing our skewed justice system, they will not spend a moment in jail. The state’s attorney’s office must have been pretty pissed at these guys to file felony perjury charges.
Three Chicago police officers and a Glenview police officer have been charged with lying under oath in court during a drug case last year.
The officers — Chicago police Sgt. James Padar, Officer William Pruente, Officer Vince Morgan and Glenview Officer James Horn — have been charged with felony perjury, according to a statement issued early Monday by the Cook County state’s attorney’s office.
The charges come after a video contradicted the officers’ sworn testimony during a March 2014 court hearing on whether evidence in the drug case had been properly obtained.
The other officers took the stand and backed up Pruente’s version of the stop, to one degree or another, before Sperling’s lawyer played police video of the traffic stop.
The video, a copy of which was obtained by the Tribune, showed Pruente walking up to the car, reaching through the open driver’s window, unlocking the door and having Sperling step out of the car. Sperling was then frisked, handcuffed and led to a squad car while his car was searched.
(click here to continue reading Chicago, Glenview police officers charged with lying in drug case – Chicago Tribune.)
The digital revolution has changed our society in many ways, many negative1 but also in one undeniably positive way. So many citizens now have the capability to record what actually happens during interactions with law enforcement. We are learning that police cannot be trusted to tell the truth unless they know there is contrary evidence. How many drug arrests over the decades come down to the word of a police officer cited as incontrovertible evidence? Thousands? Hundreds of thousands? Millions?Footnotes:
- planned obsolescence leading to massive amounts of environmental pollution, stripping our planet of resources to feed the insatiable maw, isolating people from human contact, etc. [↩]
Electricity is a Bitter Herb…
In a just world, these evil doers would be publicly humiliated, named by name, and forced to stand trial for war crimes at The Hague. The Bush administration too. It’s a travesty that President Obama’s response to war crimes perpetrated by his predecessor was to sweep all the evidence under the rug and shrug, “Bygones…”
The American Psychological Association secretly collaborated with the administration of President George W. Bush to bolster a legal and ethical justification for the torture of prisoners swept up in the post-Sept. 11 war on terror, according to a new report by a group of dissident health professionals and human rights activists.
The report is the first to examine the association’s role in the interrogation program. It contends, using newly disclosed emails, that the group’s actions to keep psychologists involved in the interrogation program coincided closely with efforts by senior Bush administration officials to salvage the program after the public disclosure in 2004 of graphic photos of prisoner abuse by American military personnel at Abu Ghraib prison in Iraq.
“The A.P.A. secretly coordinated with officials from the C.I.A., White House and the Department of Defense to create an A.P.A. ethics policy on national security interrogations which comported with then-classified legal guidance authorizing the C.I.A. torture program,” the report’s authors conclude.
(click here to continue reading Report Says American Psychological Association Collaborated on Torture Justification – NYTimes.com.)
and why did the Bush thugs do it?
The involvement of health professionals in the Bush-era interrogation program was significant because it enabled the Justice Department to argue in secret opinions that the program was legal and did not constitute torture, since the interrogations were being monitored by health professionals to make sure they were safe.