Posts Tagged ‘FBI’

fbi-terrorist-plotBy William N. Grigg

The FBI once again appears to have averted a terrorist plot of its own manufacture by arresting 57-year-old William Keebler, a man from Stockton, Utah described in press accounts as a militia organizer exhibiting an “extreme hatred” for the federal government. A vociferous critic of the federal Bureau of Land Management who was present during the April 2014 standoff in Bunkerville, Nevada, Keebler was a close friend of the late LaVoy Finicum. FBI agents arrested  Keebler in Nephi, Utah Wednesday morning after he allegedly attempted to bomb a vacant cabin owned by the BLM.

According to a federal charging document, for the past several months FBI undercover operatives have been members of Keebler’s militia, the Patriots Defense Force, which met at his home in Stockton, Utah. On many occasions, he expressed the entirely reasonable view that “the BLM was overreaching their authority to implement grazing restrictions on ranchers” and insisted that state and local governments, rather than Washington, should be in charge of public lands in the western States.

Predicting that future confrontations with the Feds might make violent resistance necessary, Keebler reportedly conducted training exercises and “talked about gathering intelligence on potential targets,” such as the BLM office in Salt Lake City. He made it clear, however, that “he didn’t plan on blowing people up for now”; the federal probable cause affidavit characterizes Keebler’s attitude as wanting his group “to be prepared to escalate things, and take people out if necessary.”

Last April, a federal informant “tasked with building Keebler an explosive device” — the charging document, significantly, doesn’t specify by whom the informant had been “tasked” — showed the subject a video of “a 6-inch pipe bomb blowing up some abandoned furniture in the mountains of southern Utah.” That overt act, which was carried out by a federal asset without (as far as the available evidence shows) Keebler’s approval, advance knowledge, or involvement, is described as an act in which he “maliciously damage[d]” and “destroy[ed] … personal or real property.

A few weeks later, Keebler allegedly selected the abandoned BLM cabin in Arizona as a target. The FBI-controlled informant produced what he described as two pipe bombs — one to be placed at the target and detonated via remote control, the other “was to be used against law enforcement” in the event this was necessary. Late Tuesday night (June 21), someone — the document doesn’t specify who it was — placed “an inert explosive device … against the door of one of the BLM cabins in Mount Turnbull. After the device was placed against the door, Keebler was handed a remote detonation device. Keebler then pushed the detonator button multiple times in order to remotely detonate the inert explosive.” He then departed for Utah, where FBI agents arrested him several hours later.

Keebler spent 13 days in Bunkerville and spent time in the company of the late LaVoy Finicum, whose funeral he attended in Kanab, Utah last February. Significantly, Keebler and several members of his militia were in attendance at an April 1 event in Orem, Utah featuring speeches by Finicum’s widow and Shawna Cox, who was an eyewitness to Finicum’s killing. That event was attended by hundreds of people whom the Feds would characterize as “anti-government extremists.”

“Some people who were with [Keebler] were videotaping all of the speakers with very expensive, professional-grade equipment,” a Utah broadcaster who attended the event told The Free Thought Project. “They were walking the room taking note of everybody who was there.”

According to the timeline described sketchily in the federal probable cause affidavit, it was at about this time that the FBI’s Homeland Security Theater Troupe was finishing its scheme to snare Keebler in a bogus bombing plot.

One likely purpose of this FBI-scripted operation is to depict the late LaVoy Finicum — who has emerged as a folk hero for many residents of the rural West — as a would-be terrorist bomber. The arrest affidavit takes great care to accuse Finicum of scouting out the location eventually used in the FBI-controlled false flag attack. That allegation, which Finicum is no longer alive to dispute, is already being retailed by some progressive media outlets.

One’s personal feelings on the unfoldings in Oregon earlier this year are irrelevant when considering the reality of the situation. This attempted ‘bombing,’ like the overwhelming majority of FBI-foiled terror plots, was little more than a staged scene with easily manipulated actors — being entirely scripted, directed, and produced by the federal government. Though this was theater on a virtually fictional scale, the fruits of the federal government’s success in thwarting their own scheme will be the loss of liberty for all — in spite of the current target only being ‘preppers’ and ‘anti-government constitutionalists.’

William N. Grigg writes for TheFreeThoughtProject.com, where this article first appeared.

Via John Whitehead @ The Rutherford Institute

We want no Gestapo or secret police. The FBI is tending in that direction. They are dabbling in sex-life scandals and plain blackmail. J. Edgar Hoover would give his right eye to take over, and all congressmen and senators are afraid of him.”—President Harry S. Truman

Don’t Be a Puppet” is the message the FBI is sending young Americans.
As part of the government’s so-called ongoing war on terror, the nation’s de facto secret police force is now recruiting students and teachers to spy on each other and report anyone who appears to have the potential to be “anti-government” or “extremist.”
Using the terms “anti-government,” “extremist” and “terrorist” interchangeably, the government continues to add to its growing list of characteristics that could distinguish an individual as a potential domestic terrorist.
For instance, you might be a domestic terrorist in the eyes of the FBI (and its network of snitches) if you:

  • express libertarian philosophies (statements, bumper stickers)
  • exhibit Second Amendment-oriented views (NRA or gun club membership)
  • read survivalist literature, including apocalyptic fictional books
  • show signs of self-sufficiency (stockpiling food, ammo, hand tools, medical supplies)
  • fear an economic collapse
  • buy gold and barter items
  • subscribe to religious views concerning the book of Revelation
  • voice fears about Big Brother or big government
  • expound about constitutional rights and civil liberties
  • believe in a New World Order conspiracy

Despite its well-publicized efforts to train students, teachers, police officers, hairdressers, store clerks, etc., into government eyes and ears, the FBI isn’t relying on a nation of snitches to carry out its domestic spying.
There’s no need.
The nation’s largest law enforcement agency rivals the NSA in resources, technology, intelligence, and power. Yet while the NSA has repeatedly come under fire for its domestic spying programs, the FBI has continued to operate its subversive and clearly unconstitutional programs with little significant oversight or push-back from the public, Congress or the courts. Just recently, for example, a secret court gave the agency the green light to quietly change its privacy rules for accessing NSA data on Americans’ international communications.
Indeed, as I point out in my book Battlefield America: The War on the American People, the FBI has become the embodiment of how power, once acquired, can be easily corrupted and abused.
When and if a true history of the FBI is ever written, it will not only track the rise of the American police state but it will also chart the decline of freedom in America.
Owing largely to the influence and power of the FBI, the United States—once a nation that abided by the rule of law and held the government accountable for its actions—has steadily devolved into a police state where justice is one-sided, a corporate elite runs the show, representative government is a mockery, police are extensions of the military, surveillance is rampant, privacy is extinct, and the law is little more than a tool for the government to browbeat the people into compliance.
The FBI’s laundry list of crimes against the American people includes surveillance, disinformation, blackmail, entrapment, intimidation tactics, harassment and indoctrination, governmental overreach, abuse, misconduct, trespassing, enabling criminal activity, and damaging private property.
And that’s just based on what we know.
Whether the FBI is planting undercover agents in churches, synagogues and mosques; issuing fake emergency letters to gain access to Americans’ phone records; using intimidation tactics to silence Americans who are critical of the government; recruiting high school students to spy on and report fellow students who show signs of being future terrorists; or persuading impressionable individuals to plot acts of terror and then entrapping them, the overall impression of the nation’s secret police force is that of a well-dressed thug, flexing its muscles and doing the boss’ dirty work of ensuring compliance, keeping tabs on potential dissidents, and punishing those who dare to challenge the status quo.
The FBI was established in 1908 as a small task force assigned to deal with specific domestic crimes. Initially quite limited in its abilities to investigate so-called domestic crimes, the FBI has been transformed into a mammoth federal policing and surveillance agency. Unfortunately, whatever minimal restrictions kept the FBI’s surveillance activities within the bounds of the law all but disappeared in the wake of the 9/11 attacks. The USA Patriot Act gave the FBI and other intelligence agencies carte blanche authority in investigating Americans suspected of being anti-government.
As the FBI’s powers have grown, its abuses have mounted.
The FBI continues to monitor Americans engaged in lawful First Amendment activities.
COINTELPRO, the FBI program created to “disrupt, misdirect, discredit, and neutralize” groups and individuals the government considers politically objectionable, was aimed not so much at the criminal element but at those who challenged the status quo—namely, those expressing anti-government sentiments such as Martin Luther King Jr. and John Lennon. It continues to this day, albeit in other guises.
The FBI has become a master in the art of entrapment.
In the wake of the 9/11 terrorist attacks the FBI has not only targeted vulnerable individuals but has also lured them into fake terror plots while actually equipping them with the organization, money, weapons and motivation to carry out the plots—entrapment—and then jailing them for their so-called terrorist plotting. This is what the FBI characterizes as “forward leaning—preventative—prosecutions.”
FBI agents are among the nation’s most notorious lawbreakers.
In addition to creating certain crimes in order to then “solve” them, the FBI also gives certain informants permission to break the law, “including everything from buying and selling illegal drugs to bribing government officials and plotting robberies,” in exchange for their cooperation on other fronts. USA Today estimates that agents have authorized criminals to engage in as many as 15 crimes a day. Some of these informants are getting paid astronomical sums: one particularly unsavory fellow, later arrested for attempting to run over a police officer, was actually paid $85,000 for his help laying the trap for an entrapment scheme.
The FBI’s powers, expanded after 9/11, have given its agents carte blanche access to Americans’ most personal information.
The agency’s National Security Letters, one of the many illicit powers authorized by the USA Patriot Act, allows the FBI to secretly demand that banks, phone companies, and other businesses provide them with customer information and not disclose the demands. An internal audit of the agency found that the FBI practice of issuing tens of thousands of NSLs every year for sensitive information such as phone and financial records, often in non-emergency cases, is riddled with widespread violations.
The FBI’s spying capabilities are on a par with the NSA.
The FBI’s surveillance technology boasts an invasive collection of spy tools ranging from Stingray devices that can track the location of cell phones to Triggerfish devices which allow agents to eavesdrop on phone calls.  In one case, the FBI actually managed to remotely reprogram a “suspect’s” wireless internet card so that it would send “real-time cell-site location data to Verizon, which forwarded the data to the FBI.”
The FBI’s hacking powers have gotten downright devious.
FBI agents not only have the ability to hack into any computer, anywhere in the world, but they can also control that computer and all its stored information, download its digital contents, switch its camera or microphone on or off and even control other computers in its network. Given the breadth of the agency’s powers, the showdown between Apple and the FBI over customer privacy appears to be more spectacle than substance.
James Comey, current director of the FBI, knows enough to say all the right things about the need to abide by the Constitution, all the while his agency routinely discards it. Comey argues that the government’s powers shouldn’t be limited, especially when it comes to carrying out surveillance on American citizens. Comey continues to lobby Congress and the White House to force technology companies such as Apple and Google to keep providing the government with backdoor access to Americans’ cell phones.
The FBI’s reach is more invasive than ever.
This is largely due to the agency’s nearly unlimited resources (its minimum budget alone in fiscal year 2015 was $8.3 billion), the government’s vast arsenal of technology, the interconnectedness of government intelligence agencies, and information sharing through fusion centers—data collecting intelligence agencies spread throughout the country that constantly monitor communications (including those of American citizens), everything from internet activity and web searches to text messages, phone calls and emails.
Today, the FBI employs more than 35,000 individuals and operates more than 56 field offices in major cities across the U.S., as well as 400 resident agencies in smaller towns, and more than 50 international offices. In addition to their “data campus,” which houses more than 96 million sets of fingerprints from across the United States and elsewhere, the FBI is also, according to The Washington Post, “building a vast repository controlled by people who work in a top-secret vault on the fourth floor of the J. Edgar Hoover FBI Building in Washington. This one stores the profiles of tens of thousands of Americans and legal residents who are not accused of any crime. What they have done is appear to be acting suspiciously to a town sheriff, a traffic cop or even a neighbor.”
If there’s one word to describe the FBI’s covert tactics, it’s creepy.
The agency’s biometric database has grown to massive proportions, the largest in the world, encompassing everything from fingerprints, palm, face and iris scans to DNA, and is being increasingly shared between federal, state and local law enforcement agencies in an effort to target potential criminals long before they ever commit a crime.
This is what’s known as pre-crime.
If it were just about fighting the “bad guys,” that would be one thing. But as countless documents make clear, the FBI has no qualms about using its extensive powers in order to blackmail politicians, spy on celebrities and high-ranking government officials, and intimidate dissidents of all stripes.
It’s an old tactic, used effectively by former authoritarian regimes.
In fact, as historian Robert Gellately documents, the Nazi police state was repeatedly touted as a model for other nations to follow, so much so that Hoover actually sent one of his right-hand men, Edmund Patrick Coffey, to Berlin in January 1938 at the invitation of Germany’s secret police. As Gellately noted, “[A]fter five years of Hitler’s dictatorship, the Nazi police had won the FBI’s seal of approval.”
Indeed, so impressed was the FBI with the Nazi order that, as the New York Times revealed, in the decades after World War II, the FBI, along with other government agencies, aggressively recruited at least a thousand Nazis, including some of Hitler’s highest henchmen, brought them to America, hired them on as spies and informants, and then carried out a massive cover-up campaign to ensure that their true identities and ties to Hitler’s holocaust machine would remain unknown. Moreover, anyone who dared to blow the whistle on the FBI’s illicit Nazi ties found himself spied upon, intimidated, harassed and labeled a threat to national security.
So not only have American taxpayers been paying to keep ex-Nazis on the government payroll for decades but we’ve been subjected to the very same tactics used by the Third Reich: surveillance, militarized police, overcriminalization, and a government mindset that views itself as operating outside the bounds of the law.
This is how freedom falls, and tyrants come to power.
The similarities between the American police state and past totalitarian regimes such as Nazi Germany grow more pronounced with each passing day.
Secret police. Secret courts. Secret government agencies. Surveillance. Intimidation. Harassment. Torture. Brutality. Widespread corruption. Entrapment. Indoctrination. These are the hallmarks of every authoritarian regime from the Roman Empire to modern-day America.
Yet it’s the secret police—tasked with silencing dissidents, ensuring compliance, and maintaining a climate of fear—who sound the death knell for freedom in every age.

source

Cyber security expert and Libertarian presidential candidate John McAfee is alarmed at the potential implications from Apple being forced to create a virtual backdoor to their encrypted system. In an enlightening op-ed, McAfee blasts the FBI for its ineptitude, while exposing the archaic hiring practices of the Feds that create a technology gap between FBI and private sector capabilities. McAfee makes clear that if the government gains access, privacy, as we know it, will fail to exist.+

“No matter how you slice this pie, if the government succeeds in getting this back door, it will eventually get a back door into all encryption, and our world, as we know it, is over,” McAfee writes.

The tech guru offers his teams hacking services to the FBI free of charge, as a means of allowing the phone in question to be accessed – without allowing the government to have a backdoor into all iPhones. McAfee would provide the FBI with the information they claim to seek, while at the same time allowing for secure encryption to continue to exist – of course there is a distinct possibility that the actual intention of forcing Apple to create a backdoor isn’t to access this particular phone, but as a means of breaking encryption on a global basis.

Read McAfee’s op-ed to the FBI below:

Using an obscure law, written in 1789 — the All Writs Act — the US government has ordered Apple to place a back door into its iOS software so the FBI can decrypt information on an iPhone used by one of the San Bernardino shooters.

It has finally come to this. After years of arguments by virtually every industry specialist that back doors will be a bigger boon to hackers and to our nation’s enemies than publishing our nuclear codes and giving the keys to all of our military weapons to the Russians and the Chinese, our government has chosen, once again, not to listen to the minds that have created the glue that holds this world together.

This is a black day and the beginning of the end of the US as a world power. The government has ordered a disarmament of our already ancient cybersecurity and cyberdefense systems, and it is asking us to take a walk into that near horizon where cyberwar is unquestionably waiting, with nothing more than harsh words as a weapon and the hope that our enemies will take pity at our unarmed condition and treat us fairly.

Any student of world history will tell you that this is a dream. Would Hitler have stopped invading Poland if the Polish people had sweetly asked him not to do so? Those who think yes should stand strongly by Hillary Clinton’s side, whose cybersecurity platform includes negotiating with the Chinese so they will no longer launch cyberattacks against us.

The FBI, in a laughable and bizarre twist of logic, said the back door would be used only once and only in the San Bernardino case.

Tim Cook, CEO of Apple, replied:

The government suggests this tool could only be used once, on one phone. But that’s simply not true. Once created, the technique could be used over and over again, on any number of devices. In the physical world, it would be the equivalent of a master key, capable of opening hundreds of millions of locks — from restaurants and banks to stores and homes. No reasonable person would find that acceptable.

The government is asking Apple to hack our own users and undermine decades of security advancements that protect our customers — including tens of millions of American citizens — from sophisticated hackers and cybercriminals. The same engineers who built strong encryption into the iPhone to protect our users would, ironically, be ordered to weaken those protections and make our users less safe.

No matter how you slice this pie, if the government succeeds in getting this back door, it will eventually get a back door into all encryption, and our world, as we know it, is over. In spite of the FBI’s claim that it would protect the back door, we all know that’s impossible. There are bad apples everywhere, and there only needs to be in the US government. Then a few million dollars, some beautiful women (or men), and a yacht trip to the Caribbean might be all it takes for our enemies to have full access to our secrets.

Cook said:

The FBI may use different words to describe this tool, but make no mistake: Building a version of iOS that bypasses security in this way would undeniably create a backdoor. And while the government may argue that its use would be limited to this case, there is no way to guarantee such control.

The fundamental question is this: Why can’t the FBI crack the encryption on its own? It has the full resources of the best the US government can provide.

With all due respect to Tim Cook and Apple, I work with a team of the best hackers on the planet. These hackers attend Defcon in Las Vegas, and they are legends in their local hacking groups, such as HackMiami. They are all prodigies, with talents that defy normal human comprehension. About 75% are social engineers. The remainder are hardcore coders. I would eat my shoe on the Neil Cavuto show if we could not break the encryption on the San Bernardino phone. This is a pure and simple fact.

And why do the best hackers on the planet not work for the FBI? Because the FBI will not hire anyone with a 24-inch purple mohawk, 10-gauge ear piercings, and a tattooed face who demands to smoke weed while working and won’t work for less than a half-million dollars a year. But you bet your ass that the Chinese and Russians are hiring similar people with similar demands and have been for many years. It’s why we are decades behind in the cyber race.

Cyberscience is not just something you can learn. It is an innate talent. The Juilliard school of music cannot create a Mozart. A Mozart or a Bach, much like our modern hacking community, is genetically created. A room full of Stanford computer science graduates cannot compete with a true hacker without even a high-school education.

So here is my offer to the FBI. I will, free of charge, decrypt the information on the San Bernardino phone, with my team. We will primarily use social engineering, and it will take us three weeks. If you accept my offer, then you will not need to ask Apple to place a back door in its product, which will be the beginning of the end of America.

If you doubt my credentials, Google “cybersecurity legend” and see whose name is the only name that appears in the first 10 results out of more than a quarter of a million.

Make no mistake that this is one of the most epic battles in the history of privacy, as the decisions that are reached in this case will reverberate throughout the world and have far reaching consequences. There is a fundamental battle taking place as to whether an individual has a right to privacy or, if as the U.S. government is asserting; privacy is a privilege bestowed upon individuals at the behest of the government.+

Ironically, privacy is considered a fundamental human right as recognized in the UN Declaration of Human Rights, the International Covenant on Civil and Political Rights and in many other international and regional treaties. Privacy is the lynchpin of human dignity and many other key values such as freedom of association and freedom of speech have their roots in privacy.

When the U.S. government works to undermine what is considered a fundamental human right by most of the world, perhaps it’s time to seriously question why those elected to represent the people are actively working to undermine the rights of those that put them in office.


Source:

Via The Aging Rebel here

How all of Waco must laugh at the Constitution. How all its bolo tied mandarins must giggle at the men who have died and suffered in the last 240 years for the silly notion that the natural condition of man is to be free.

This morning, a mere 47 days after Dallas Attorney Clint Broden filed a motion to remove a buffoon named Walter H. “Pete” Peterson from presiding over any further proceedings involving his client, Matt Clendennen, a retired judge named Joe Carroll, photo above, granted the motion.

In his motion for recusal, Broden argued that the buffoon had violated the law when he rubber stamped 177 criminal complaints that were identical except for a blank space that could be used to fill in any name – like Benedict Arnold or Charles Manson or Daffy Duck. Peterson broke the law when he allowed the charging officer, a piece of work named Manuel Chavez who wouldn’t have known any of the men he accused if he fell over them, to just swear that a full ream of affidavits was the truth, the whole truth and nothing but the truth.

Oppressive

Broden argued that the $1 million bonds Peterson set for all the defendants were oppressive and unreasonable. Broden also complained that the August 10 date Peterson set  for Clendennen’s “examining trial,” comparable to what most states call a probable cause hearing, essentially undermined the whole point of an examining trial – which is to see if probable cause exists to prosecute. Peterson later refused to expedite Clendennen’s examining trial without explanation.

Broden also complained that Peterson is “not neutral and detached.” He wrote, “It appears that Judge Peterson was at the scene of the alleged incident related to which Mr. C1endennen was arrested. Indeed, upon information and belief, Judge Peterson,
a former Department of Public Safety Trooper, may have injected himself into the law enforcement investigation.”

Broden also accused Peterson of colluding with the McLennan County District Attorney’s Office in choosing the date for Clendennen’s examining trial.

Bottom Line

Peterson is self-evidently biased. He told both the Waco Tribune Herald and the Los Angeles Times that he set all the bonds at $1 million to “send a message” because many of arrested “were from out of town.” And, his actions arrantly violate the Cannons of Judicial Ethics. Broden has filed a complaint against Peterson with the State Commission on Judicial Conduct.

And the result of this seven week long legal dance is nothing. C1endennen’s examining trial was not rescheduled this morning. It is still scheduled for the second Monday in August. A regional judge named Billy Ray Stubblefield will now decide who will preside over it. Perhaps he will select Judge Roy Bean or Popeye the Sailor Man. Clendennon and Broden are still forbidden to publically discuss Clendennon’s case. And today’s ruling will have absolutely no effect whatsoever on the cases of the other 176 defendants charged by Peterson.

Via NRA-ILA

A misleading 2014 FBI report that fueled media claims that mass shooting incidents in the U.S. are rising sharply has been thoroughly debunked. In a piece appearing in the Academy of Criminal Justice Sciences’ March 2015 ACJS Today newsletter, Economist John R. Lott carefully lays out the flaws in the Bureaus’ “A Study of Active Shooter Incidents in the United States between 2000 and 2013” report.

First, Lott takes the media to task for misrepresenting the underlying scope of the report, and for FBI’s failure to adequately explain the content to its readers. Rather than track mass shootings or murders, the report in fact attempts to track “active shooter incidents.” This is significant because it encompasses events where no one was shot or killed.

Despite this, media outlets ran sensational headlines, like the New York Times’, “F.B.I. Confirms a Sharp Rise in Mass Shootings Since 2000.” Lott contends that FBI exacerbated this misperception, noting, “The report discusses mass public shootings, but it never makes it clear to the readers that these types of fatalities and attacks are actually not increasing over time.”

The media’s distortion of findings to fit their own anti-gun agenda is, unfortunately, to be expected. When done under the auspices of the FBI, such behavior is unacceptable. Whether this report is simply shoddy work, or veiled advocacy, is not altogether clear; however, Lott concludes, “The FBI report appears to be politically driven.”

Next, Lott criticizes the authors for selecting their data to show a notable increase in “active shooter incidents.” Lott shows that the inclusion of non-mass shooting incidents where zero or one person was killed have the effect of skewing the data to show a surge. Further, Lott explains that the researchers failed to include at least 20 shooting incidents, and that the omitted events were disproportionately from the earlier years of the period studied.

Lott also takes issue with the limited time period studied by the researchers. When data on mass shootings from 1977 through 2014 are used, and the incidents studied are limited to those where at least two or more people were murdered, the supposed annual increase in shootings is “no longer statistically significant.”

A pair of researchers who worked on the FBI report issued a defense of their work in the May edition of ACJS Today. The researchers attempted to shift blame for the misunderstanding to the media, noting, “We wonder if some members of the media intentionally misreported findings in an attempt to generate a bigger headline or advance their own agendas.” As to why their report was missing so many relevant incidents, they admit, “We acknowledge in the FBI report that our data are imperfect.”

The media’s distortion of findings to fit their own anti-gun agenda is, unfortunately, to be expected. When done under the auspices of the FBI, such behavior is unacceptable. Whether this report is simply shoddy work, or veiled advocacy, is not altogether clear; however, Lott concludes, “The FBI report appears to be politically driven.”

h/t Brittius
The FBI says this program is not secret, but the planes are registered to fictitious companies. The planes also can capture information from cell phones in the area.

WASHINGTON (AP) — The FBI is operating a small air force with scores of low-flying planes across the country carrying video and, at times, cellphone surveillance technology — all hidden behind fictitious companies that are fronts for the government, The Associated Press has learned.

The planes’ surveillance equipment is generally used without a judge’s approval, and the FBI said the flights are used for specific, ongoing investigations. In a recent 30-day period, the agency flew above more than 30 cities in 11 states across the country, an AP review found.

Aerial surveillance represents a changing frontier for law enforcement, providing what the government maintains is an important tool in criminal, terrorism or intelligence probes. But the program raises questions about whether there should be updated policies protecting civil liberties as new technologies pose intrusive opportunities for government spying.

U.S. law enforcement officials confirmed for the first time the wide-scale use of the aircraft, which the AP traced to at least 13 fake companies, such as FVX Research, KQM Aviation, NBR Aviation and PXW Services. Even basic aspects of the program are withheld from the public in censored versions of official reports from the Justice Department’s inspector general.

“The FBI’s aviation program is not secret,” spokesman Christopher Allen said in a statement. “Specific aircraft and their capabilities are protected for operational security purposes.” Allen added that the FBI’s planes “are not equipped, designed or used for bulk collection activities or mass surveillance.”

But the planes can capture video of unrelated criminal activity on the ground that could be handed over for prosecutions.

Some of the aircraft can also be equipped with technology that can identify thousands of people below through the cellphones they carry, even if they’re not making a call or in public. Officials said that practice, which mimics cell towers and gets phones to reveal basic subscriber information, is rare.

Details confirmed by the FBI track closely with published reports since at least 2003 that a government surveillance program might be behind suspicious-looking planes slowly circling neighborhoods. The AP traced at least 50 aircraft back to the FBI, and identified more than 100 flights since late April orbiting both major cities and rural areas.

One of the planes, photographed in flight last week by the AP in northern Virginia, bristled with unusual antennas under its fuselage and a camera on its left side. A federal budget document from 2010 mentioned at least 115 planes, including 90 Cessna aircraft, in the FBI’s surveillance fleet.

The FBI also occasionally helps local police with aerial support, such as during the recent disturbance in Baltimore that followed the death of 25-year-old Freddie Gray, who sustained grievous injuries while in police custody. Those types of requests are reviewed by senior FBI officials.

The surveillance flights comply with agency rules, an FBI spokesman said. Those rules, which are heavily redacted in publicly available documents, limit the types of equipment the agency can use, as well as the justifications and duration of the surveillance.

Details about the flights come as the Justice Department seeks to navigate privacy concerns arising from aerial surveillance by unmanned aircrafts, or drones. President Barack Obama has said he welcomes a debate on government surveillance, and has called for more transparency about spying in the wake of disclosures about classified programs.

“These are not your grandparents’ surveillance aircraft,” said Jay Stanley, a senior policy analyst with the American Civil Liberties Union, calling the flights significant “if the federal government is maintaining a fleet of aircraft whose purpose is to circle over American cities, especially with the technology we know can be attached to those aircraft.”

During the past few weeks, the AP tracked planes from the FBI’s fleet on more than 100 flights over at least 11 states plus the District of Columbia, most with Cessna 182T Skylane aircraft. These included parts of Houston, Phoenix, Seattle, Chicago, Boston, Minneapolis and Southern California.

Evolving technology can record higher-quality video from long distances, even at night, and can capture certain identifying information from cellphones using a device known as a “cell-site simulator” — or Stingray, to use one of the product’s brand names. These can trick pinpointed cellphones into revealing identification numbers of subscribers, including those not suspected of a crime.

Officials say cellphone surveillance is rare, although the AP found in recent weeks FBI flights orbiting large, enclosed buildings for extended periods where aerial photography would be less effective than electronic signals collection. Those included above Ronald Reagan Washington National Airport and the Mall of America in Bloomington, Minnesota.

After The Washington Post revealed flights by two planes circling over Baltimore in early May, the AP began analyzing detailed flight data and aircraft-ownership registrations that shared similar addresses and flight patterns. That review found some FBI missions circled above at least 40,000 residents during a single flight over Anaheim, California, in late May, according to Census data and records provided by the website FlightRadar24.com.

Most flight patterns occurred in counter-clockwise orbits up to several miles wide and roughly one mile above the ground at slow speeds. A 2003 newsletter from the company FLIR Systems Inc., which makes camera technology such as seen on the planes, described flying slowly in left-handed patterns.

“Aircraft surveillance has become an indispensable intelligence collection and investigative technique which serves as a force multiplier to the ground teams,” the FBI said in 2009 when it asked Congress for $5.1 million for the program.

Recently, independent journalists and websites have cited companies traced to post office boxes in Virginia, including one shared with the Justice Department. The AP analyzed similar data since early May, while also drawing upon aircraft registration documents, business records and interviews with U.S. officials to understand the scope of the operations.

The FBI asked the AP not to disclose the names of the fake companies it uncovered, saying that would saddle taxpayers with the expense of creating new cover companies to shield the government’s involvement, and could endanger the planes and integrity of the surveillance missions. The AP declined the FBI’s request because the companies’ names — as well as common addresses linked to the Justice Department — are listed on public documents and in government databases.

At least 13 front companies that AP identified being actively used by the FBI are registered to post office boxes in Bristow, Virginia, which is near a regional airport used for private and charter flights. Only one of them appears in state business records.

Included on most aircraft registrations is a mysterious name, Robert Lindley. He is listed as chief executive and has at least three distinct signatures among the companies. Two documents include a signature for Robert Taylor, which is strikingly similar to one of Lindley’s three handwriting patterns.

The FBI would not say whether Lindley is a U.S. government employee. The AP unsuccessfully tried to reach Lindley at phone numbers registered to people of the same name in the Washington area since Monday.

Law enforcement officials said Justice Department lawyers approved the decision to create fictitious companies to protect the flights’ operational security and that the Federal Aviation Administration was aware of the practice. One of the Lindley-headed companies shares a post office box openly used by the Justice Department.

Such elusive practices have endured for decades. A 1990 report by the then-General Accounting Office noted that, in July 1988, the FBI had moved its “headquarters-operated” aircraft into a company thathttps://wordpress.com/post/71052805/new/ wasn’t publicly linked to the bureau.

The FBI does not generally obtain warrants to record video from its planes of people moving outside in the open, but it also said that under a new policy it has recently begun obtaining court orders to use cell-site simulators. The Obama administration had until recently been directing local authorities through secret agreements not to reveal their own use of the devices, even encouraging prosecutors to drop cases rather than disclose the technology’s use in open court.

A Justice Department memo last month also expressly barred its component law enforcement agencies from using unmanned drones “solely for the purpose of monitoring activities protected by the First Amendment” and said they are to be used only in connection with authorized investigations and activities. A department spokeswoman said the policy applied only to unmanned aircraft systems rather than piloted airplanes.