Police Departments Retaliate Against Organized “Cop Watch” Groups Across the US

Police Departments Retaliate Against Organized “Cop Watch” Groups Across the US

film-the-police

When communities attempt to police the police, they often get, well… policed.

In several states, organized groups that use police scanners and knowledge of checkpoints to collectively monitor police activities by legally and peacefully filming cops on duty have said they’ve experienced retaliation, including unjustified detainment and arrests as well as police intimidation.

The groups operate under many decentralized organizations, most notably CopWatch and Cop Block, and have proliferated across the United States in the last decade – and especially in the aftermath of the events that continue to unfold in Ferguson, Missouri, after officer Darren Wilson fatally shot unarmed, black teenager Michael Brown.

Many such groups have begun proactively patrolling their communities with cameras at various times during the week, rather than reactively turning on their cameras when police enter into their neighborhoods or when they happen to be around police activity.

Across the nation, local police departments are responding to organized cop watching patrols by targeting perceived leaders, making arrests, threatening arrests, yanking cameras out of hands and even labeling particular groups “domestic extremist” organizations and part of the sovereign citizens movement – the activities of which the FBI classifies as domestic terrorism.

Courts across the nation at all levels have upheld the right to film police activity. The American Civil Liberties Union (ACLU) and photographer’s associcationshave taken many similar incidents to court, consistently winning cases over the years. The Supreme Court has ruled police can’t search an individual’s cellphone data without a warrant. Police also can’t legally delete an individual’s photos or video images under any circumstances.

“Yet, a continuing stream of these incidents (often driven by police who have been fed ‘nonsense‘ about links between photography and terrorism) makes it clear that the problem is not going away,” writes Jay Stanley, a senior policy analyst at the ACLU’s Speech, Privacy & Technology Project.

Sources who have participated in various organized cop watching groups in cities such as New York; Chicago; Cleveland; Las Vegas; Oakland; Arlington, Texas; Austin and lastly Ferguson, Missouri, told Truthout they have experienced a range of police intimidation tactics, some of which have been caught on film. Cop watchers told Truthout they have been arrested in several states, including Texas, New York, Ohio and California in retaliation for their filming activity.

More recently, in September, three cop watchers were arrested while monitoring police activity during a traffic stop in Arlington, Texas. A group of about 20 people, a few of them associated with the Tarrant County Peaceful Streets Project, gathered at the intersection of South Cooper Street and Lynda Lane during a Saturday night on September 6 to film police as they conducted a traffic stop. A video of what happened next was posted at YouTube.

Arlington police charged Janie Lucero, her husband, Kory Watkins, and Joseph Tye with interference of public duties. Lucero and Watkins were charged with obstructing a highway while Tye was arrested on charges of refusing to identify himself.

Arlington police have defended the arrests of the three cop watchers, but the watchers say they weren’t interfering with police work, and were told to move 150 feet away from the officers – around the corner of a building where they couldn’t film the officers.

“When we first started [cop watching, the police] seemed kind of bothered a little bit,” Watkins told Truthout. “There was a change somewhere where [the police] started becoming a little bit more offended, and we started having more cop watchers so I guess they felt like they needed to start bringing more officers to traffic stops.”

On the night of Watkin’s arrest, his group had previously monitored two other traffic stops without any confrontation with Arlington police officers before the incident that led to the arrests.

Sometimes, though, retaliation against cop watching groups goes far beyond arresting cop watchers on patrol.

Cops Label Cop Watch Groups Domestic Terrorists

On New Year’s Day in 2012, Antonio Buehler, a West Point graduate and former military officer, witnessed two Austin police officers assaulting a woman. He pulled out his phone.

As he began photographing the officers and asking questions about their activities, the cops assaulted and arrested him. He was charged with spitting in a cop’s face – a felony crime.

However, two witness videos of the incident surfaced and neither of them showed that Buehler spit in Officer Patrick Oborski’s face. A grand jury was finally convened in March 2013 and concluded there was not enough evidence to indict Buehler on any of the crimes he was charged with.

A few months after the New Year’s Day incident, Buehler and other Austin-based activists started the Peaceful Streets Project (PSP), an all-volunteer organization dedicated to stopping police abuse. The group has held “Know Your Rights” trainings and a Police Accountability Summit. The group also regularly organizes cop watch patrols in Austin.

Since the PSP was launched, the movement has grown, with local chapters popping up in other cities and states across the United States, including Texas’ Tarrant County chapter, which the three cop watchers arrested in Arlington were affiliated with.

But as the Peaceful Streets movement spread, police retaliation against the groups, and particularly Buehler himself, also escalated.

“[The Austin Police Department (APD)] sees us as a threat primarily because we shine a spotlight on their crimes,” Buehler said.

The group recently obtained documents from the APD through a Freedom of Information Act (FOIA) request that reveal Austin police colluded to arrest Buehler and other cop watchers affiliated with the Peaceful Streets Project. Since the New Year’s Day incident, Buehler has been arrested three more times by APD officers. At least four other members of PSP have been arrested on charges of interference or failing to identify themselves during their cop watching activities.

The emails indicate APD officers monitored Buehler’s social media posts and attempted to justify arresting him for another felony crime of online impersonation over an obviously satirical post he made on Facebook, as well as reveal that some APD officers coordinated efforts to stop PSP members’ legal and peaceful activities, even suggesting reaching out to the District Attorney’s office to see if anything could be done to incarcerate members of the group.

Another internal email from APD senior officer Justin Berry identifies PSP as a “domestic extremist” organization. Berry writes that he believes police accountability groups including PSP, CopWatch and Cop Block are part of a “national domestic extremism trend.” He believes he found “mirror warning signs” in “FBI intel.” Berry makes a strange attempt to lump police accountability activists and the hacker-collective Anonymous in with sovereign citizens groups as a collective revolutionary movement.

“Sovereign citizens” groups generally believe federal, state and local governments are illegitimate and operate illegally. Some self-described sovereign citizens create fake license plates, identification and forms of currency to circumvent official government institutions. The FBI classifies the activities of sovereign citizens groups as domestic terrorism, considering the groups a growing “domestic threat” to law enforcement.

Buehler told Truthout the APD is working with a Department of Homeland Security (DHS) fusion center to attempt to identify PSP as a sovereign citizens group to associate its members with domestic terrorism with state and federal authorities. DHS fusion centers are designed to gather, analyze and promote the sharing of intelligence information between federal and state agencies.

“They have spent a fair amount of resources tracking us, spying on us and infiltrating our group, and we are just peaceful activists who are demanding accountability for the police,” Buehler told Truthout. “They have absolutely no evidence that we’ve engaged in any criminal activity or that we’ve tried to engage in criminal activity.”

APD officials did not respond to a request for comment.

“They’ve pushed us; they’ve assaulted us for filming them; they’ve used their horses against us and tried to run us into walls; they’ve driven their cars up on us; they illegally detained us and searched us; they get in our face and they yell at us; they threaten to use violent force against us,” Buehler said. “But we didn’t realize until these emails just how deep this intimidation, how deep these efforts were to harm us for trying to hold them accountable.”

Buehler also said the group has additional internal emails which have not been released yet that reveal the APD attempted to take another charge to the District Attorney against him for felony child endangerment over the activities of a teenaged member of PSP.

He said he and other members of PSP were interested in pursuing a joint civil action against the APD over their attempts to frame and arrest them for their First Amendment activities.

This is not the first time a municipal police department has labeled a local cop watching group as an extremist organization.

In 2002, internal files from the Denver Police Department’s (DPD) Intelligence Unit were leaked to the ACLU, revealing the unit had been spying on several activist groups in the city, and keeping extensive records about members of the activist groups. Many of these groups were branded as “criminal extremist” organizations in what later became a full-scale controversy widely known as the Denver police’s “spy files.” Some of the groups falsely branded as “criminal extremist” groups included three police accountability organizations: Denver CopWatch, End the Politics of Cruelty and Justice for Mena.

Again, from October 2003 through the Republican National Convention (RNC) in August 2004, intelligence digests produced by the New York City Police Department (NYPD) on dozens of activist groups, including several police accountability organizations, were made public under a federal court order. TheNYPD labeled participants of the “Operation CopWatch” effort as criminal extremists.

Those who participated in “Operation CopWatch” during the RNC hoped to identify undercover cops who might attempt to provoke violence during demonstrations and document police violence or misconduct against protesters.

Communities Benefiting From Cop Watch Patrols Resist Police Retaliation Against Watchers

In some major urban areas, rates of police harassment of individuals drop considerably after cop watchers take to the streets – and communities band together to defend cop watch patrols that experience police retaliation, say veteran cop watchers.

Veteran police accountability activist José Martín has trained and organized with several organizations that participate in cop watch activities. Martín has been detained and arrested several times while cop watching with organized patrols in New York and Chicago.

His arrests in New York are part of a widely documented problem in the city. In fact, retaliation in New York against cop watchers has been so widespread that the NYPD had to send out an official memo to remind officers that it is perfectly legal for civilians to film cops on duty.

Martín described an experience in Chicago in which he felt police unjustly retaliated against him after a local CopWatch group formed and began regularly patrolling Chicago’s Pilsen neighborhood. After the group became well-known by the Pilsen community, residents gathered around an officer who had detained Martín after a patrol one night in 2009, calling for his release. The officer let him go shortly after.

“When cop watchers are retaliated against, if the community is organized, if there is a strong relationship between cop watch patrols and the community, but most importantly, if the cop watchers are people of the community, that community has the power to push back against retaliation and prevent its escalation,” Martín said. “Retaliation doesn’t work if you stand together.”

Another veteran cop watcher, Jacob Crawford, co-founder of Oakland’s We Copwatch, is helping the community of Ferguson, Missouri, organize cop watch patrols and prepare the community for the potential of police retaliation. His group raised $6,000 to pass out 110 cameras to organizers and residents in Ferguson, and train them to monitor police activity in the aftermath of the upheavals that rocked the city after Wilson killed Brown.

“I do expect retaliation, I do expect that these things won’t be easy, but these folks are in it,” Crawford told Truthout. “This is something that makes more sense to them than not standing up for themselves.”

via TruthOut.com

TRAPWIRE: Wikileaks Drops a Surveillance Bombshell – Widescale Facial Recognition & Behavior Pattern Mapping

TRAPWIRE: Wikileaks Drops a Surveillance Bombshell – Widescale Facial Recognition & Behavior Pattern Mapping

Former senior intelligence officials have created a detailed surveillance system more accurate than modern facial recognition technology — and have installed it across the US under the radar of most Americans, according to emails hacked by Anonymous.

Every few seconds, data picked up at surveillance points in major cities and landmarks across the United States are recorded digitally on the spot, then encrypted and instantaneously delivered to a fortified central database center at an undisclosed location to be aggregated with other intelligence. It’s part of a program called TrapWire and it’s the brainchild of the Abraxas, a Northern Virginia company staffed with elite from America’s intelligence community. The employee roster at Arbaxas reads like a who’s who of agents once with the Pentagon, CIA and other government entities according to their public LinkedIn profiles, and the corporation’s ties are assumed to go deeper than even documented.

The details on Abraxas and, to an even greater extent TrapWire, are scarce, however, and not without reason. For a program touted as a tool to thwart terrorism and monitor activity meant to be under wraps, its understandable that Abraxas would want the program’s public presence to be relatively limited. But thanks to last year’s hack of the Strategic Forecasting intelligence agency, or Stratfor, all of that is quickly changing.

Hacktivists aligned with the loose-knit Anonymous collective took credit for hacking Stratfor on Christmas Eve, 2011, in turn collecting what they claimed to be more than five million emails from within the company. WikiLeaks began releasing those emails as the Global Intelligence Files (GIF) earlier this year and, of those, several discussing the implementing of TrapWire in public spaces across the country were circulated on the Web this week after security researcher Justin Ferguson brought attention to the matter. At the same time, however, WikiLeaks was relentlessly assaulted by a barrage of distributed denial-of-service (DDoS) attacks, crippling the whistleblower site and its mirrors, significantly cutting short the number of people who would otherwise have unfettered access to the emails.

On Wednesday, an administrator for the WikiLeaks Twitter account wrote that the site suspected that the motivation for the attacks could be that particularly sensitive Stratfor emails were about to be exposed. A hacker group called AntiLeaks soon after took credit for the assaults on WikiLeaks and mirrors of their content, equating the offensive as a protest against editor Julian Assange, “the head of a new breed of terrorist.” As those Stratfor files on TrapWire make their rounds online, though, talk of terrorism is only just beginning.

Mr. Ferguson and others have mirrored what are believed to be most recently-released Global Intelligence Files on external sites, but the original documents uploaded to WikiLeaks have been at times unavailable this week due to the continuing DDoS attacks. Late Thursday and early Friday this week, the GIF mirrors continues to go offline due to what is presumably more DDoS assaults. Australian activist Asher Wolf wrote on Twitter that the DDoS attacks flooding the WikiLeaks server were reported to be dropping upwards of 40 gigabytes of traffic per second on the site.

According to a press release (pdf) dated June 6, 2012, TrapWire is “designed to provide a simple yet powerful means of collecting and recording suspicious activity reports.” A system of interconnected nodes spot anything considered suspect and then input it into the system to be “analyzed and compared with data entered from other areas within a network for the purpose of identifying patterns of behavior that are indicative of pre-attack planning.”

In a 2009 email included in the Anonymous leak, Stratfor Vice President for Intelligence Fred Burton is alleged to write, “TrapWire is a technology solution predicated upon behavior patterns in red zones to identify surveillance. It helps you connect the dots over time and distance.” Burton formerly served with the US Diplomatic Security Service, and Abraxas’ staff includes other security experts with experience in and out of the Armed Forces.

What is believed to be a partnering agreement included in the Stratfor files from August 13, 2009 indicates that they signed a contract with Abraxas to provide them with analysis and reports of their TrapWire system (pdf).

“Suspicious activity reports from all facilities on the TrapWire network are aggregated in a central database and run through a rules engine that searches for patterns indicative of terrorist surveillance operations and other attack preparations,” Crime and Justice International magazine explains in a 2006 article on the program, one of the few publically circulated on the Abraxas product (pdf). “Any patterns detected – links among individuals, vehicles or activities – will be reported back to each affected facility. This information can also be shared with law enforcement organizations, enabling them to begin investigations into the suspected surveillance cell.”

In a 2005 interview with The Entrepreneur Center, Abraxas founder Richard “Hollis” Helms said his signature product:

“can collect information about people and vehicles that is more accurate than facial recognition, draw patterns, and do threat assessments of areas that may be under observation from terrorists.” He calls it “a proprietary technology designed to protect critical national infrastructure from a terrorist attack by detecting the pre-attack activities of the terrorist and enabling law enforcement to investigate and engage the terrorist long before an attack is executed,” and that, “The beauty of it is that we can protect an infinite number of facilities just as efficiently as we can one and we push information out to local law authorities automatically.”

An internal email from early 2011 included in the Global Intelligence Files has Stratfor’s Burton allegedly saying the program can be used to “[walk] back and track the suspects from the get go w/facial recognition software.”

Since its inception, TrapWire has been implemented in most major American cities at selected high value targets (HVTs) and has appeared abroad as well. The iWatch monitoring system adopted by the Los Angeles Police Department (pdf) works in conjunction with TrapWire, as does the District of Columbia and the “See Something, Say Something” program conducted by law enforcement in New York City, which had 500 surveillance cameras linked to the system in 2010. Private properties including Las Vegas, Nevada casinos have subscribed to the system. The State of Texas reportedly spent half a million dollars with an additional annual licensing fee of $150,000 to employ TrapWire, and the Pentagon and other military facilities have allegedly signed on as well.

In one email from 2010 leaked by Anonymous, Stratfor’s Fred Burton allegedly writes, “God Bless America. Now they have EVERY major HVT in CONUS, the UK, Canada, Vegas, Los Angeles, NYC as clients.” Files on USASpending.gov reveal that the US Department of Homeland Security and Department of Defense together awarded Abraxas and TrapWire more than one million dollars in only the past eleven months.

News of the widespread and largely secretive installation of TrapWire comes amidst a federal witch-hunt to crack down on leaks escaping Washington and at attempt to prosecute whistleblowers. Thomas Drake, a former agent with the NSA, has recently spoken openly about the government’s Trailblazer Project that was used to monitor private communication, and was charged under the Espionage Act for coming forth. Separately, former NSA tech director William Binney and others once with the agency have made claims in recent weeks that the feds have dossiers on every American, an allegation NSA Chief Keith Alexander dismissed during a speech at Def-Con last month in Vegas.

SOURCE: RT.com

 

NOW FOR THE RAW LEAKS:

http://privatepaste.com/c56f6848d2/trapwireCentralizedDatabaseMGMGrandLinkedSystemEtc – centralized database, vegas hotels, linked sites, etc

http://privatepaste.com/e5b7f4a21d/trapwireNYC – NYC circa 2010

http://privatepaste.com/a9bc9274ea/trapwireAustin – Austin

http://privatepaste.com/04eaef4343/trapwireEveryHVTUSCANUK – note the last paragraph

http://privatepaste.com/90198aa545/trapwireTexasBorder – Texas border circa 2009

http://privatepaste.com/568f0a512a/trapwireWalkTheCatBack – Talking about images to analyze and walking the cat back

http://privatepaste.com/318e0e652b/trapwireHVTCitizens – Trapwire for certain citizens that are important, but not USSS important

http://privatepaste.com/670091f5b0/trapwireLondonStockExchange – London Stock Exchange

http://privatepaste.com/b62ceaf254/trapwireNYCDCVegasLondonOttawaLA – NYC, DC, Vegas, London, Ottawa, LA

http://privatepaste.com/fba46e24ca/trapwireAustinDPSAllocated1Point8M – 1.8M for trapwire & equipment from Austin DPS

http://privatepaste.com/caf299c230/trapwireOnDesksOfUSSSMI5LAPDRCMPNYPD – trapwire on the desks of USSS CP, MI5, RCMP, LAPD CT, NYPD CT

http://privatepaste.com/5a71bac416/trapwireDCMetroNationalParkPoliceEtc – trapwire DC metro, National Park Police, etc

http://privatepaste.com/e6031c14f6/trapwireLAPD – trapwire LAPD as a prototype

http://privatepaste.com/febefa287f/trapwirePentagonArmyUSMCNavy – trapwire Army, Pentagon, USMC, Navy

http://privatepaste.com/58a60bff35/trapwireNSIFBIFtMeadeSevenYears – Trapwire 7 years circa 2011, National SAR Initiative (NSI), FBIs eGuardian, Ft. Meade, etc

http://privatepaste.com/f7b7ac02ab/trapwireAmtrackDHSFusionCenters – Amtrack, DHS fusion centers, DC Metro

http://privatepaste.com/7add918e4c/trapwireBehaviorPatternsToIdentifySurveillance – “TrapWire is a technology solution predicated upon behavior patterns in red zones to identify surveillance. It helps you connect the dots over time and distance.

http://privatepaste.com/d503851f0c/trapwireSalesforceGoogleDHSInstitute – salesforce, google, DHS institute

http://privatepaste.com/626712c0fa/trapwireNigerianPresidentialPalace – Nigerian Presidential Palace

http://privatepaste.com/bf0a0abf67/trapwireScotlandYardDowningWhiteHouseWalMartDell – Scotland Yard, 10 Downing St, White House, Wal-Mart, Dell