Feeds

Caution - FBI fit-ups of Muslim patsies in progress

Loose-tongued loser tagged with international terrorizing

Security for virtualized datacentres

Meanwhile the US government has already scheduled professional witness Kohlmann for action in another terror trial this month.

This concerns Marwan el-Hindi, a naturalized American citizen. Along with two others, he stands accused of materially aiding terrorists in Toledo, Ohio. This case also looks dodgy, fitting a now established pattern in which a financially unsuccessful Muslim man is approached at a local mosque by a paid government informant who then works the target into an alleged sting plot aiding terrorism.

In this particular case, the plot was to train insurgents for Iraq. In the government's indictment of el-Hindi, the informant is a character in shadow known only as The Trainer. He has been revealed as Darren Griffin, an ex-military man who has been characterized as an entrapment specialist in dire financial straits by local newspaper reports. Also at the center of this case are alleged seditious materials from jihadist websites, a suicide bomb vest video which the government accuses el-Hindi of downloading and sending to the informant with the suggestion that recruits in Chicago be trained with it.

And here is where it gets sticky. Griffin had personal access to el-Hindi's computer and the defense has filed motion to compel the US government to produce all evidence gained from when the informant was on the defendant's computer. The implication is that the paid source engaged in a frame-up.

The Abu-jihaad verdict is just the latest in what has been a string of convictions of Muslim patsies and men of unfortunate means who appear to have been set up by a network of criminal paid informants in the employ of the FBI's Joint Terrorism Task Force. None have appeared to have been serious threats, just people - at worst unlikeable and on the fringes of society - accused of concocting ridiculous plots, never apprehended with weapons or explosives which would be required for the crimes they're accused of and convicted on.

The benchmark was set by Jose Padilla, an incompetent petty criminal, driven half mad by incarceration, originally accused of being a potential dirty bomber, a charge which proved so ludicrous even the Bush administration was compelled to drop it.

This was followed by the conviction of Hamid Hayat, a man of diminished mental capability living in Lodi, California, his family targeted by the FBI because of the town's Pakistani community. In the Hayat case, the FBI employed an informant, Naseem Khan - paid to the tune of about a quarter of a million dollars, who testified that al Qaeda #2, Ayman al Zawahiri, had once been seen in Lodi.

In Albany, New York, Yassin Aref and Mohammed Hossain, the latter a pizza shop owner, were convicted in a case which was built upon another FBI sting operation; they were lured into a money-laundering operation/fake terror plot said to be for the financing of the sale of a shoulder-fired missile for the killing of a Pakistani diplomat in New York. The case has been viewed as another entrapment operation and that US government secret arguments given only to the judge and prosecution abridged the right to a fair trial for both men.

Hassan Abu-jihaad was probably not a terrorist threat, unless one considers being an inflammatory big mouth internationally terrorizing. He bought tasteless videos and sent careless e-mail. His one-time friend, Derrick Shareef, who pled guilty in another FBI sting, was so crazy and anile that his conversations with Abu-jihaad were ruled inadmissable in the latter's case. Both alleged terrorists were served by another of the FBI's entrapment men, William Chrisman, a former felon with multiple wives - a functional harem - and a stack of children to support.

If you're a Muslim, lower class, and attending mosque in the US, beware of bolt-out-of-the-blue new acquaintances who appear to be in your income bracket. Stung within an inch of its life by 9/11, seven years later the US government is conducting undercover search and destroy missions and it doesn't care if it gets civilians. It wants terrorists and it employs those eager to fit people for al Qaeda jackets on demand, cost being no object. ®

George Smith is a senior fellow at GlobalSecurity.org, a defense affairs think tank and public information group. At Dick Destiny, he blogs his way through chemical, biological, and nuclear terror hysteria, often by way of the contents of neighbourhood hardware stores.

Intelligent flash storage arrays

More from The Register

next story
Scrapping the Human Rights Act: What about privacy and freedom of expression?
Justice minister's attack to destroy ability to challenge state
WHY did Sunday Mirror stoop to slurping selfies for smut sting?
Tabloid splashes, MP resigns - but there's a BIG copyright issue here
Hey Brit taxpayers. You just spent £4m on Central London ‘innovation playground’
Catapult me a Mojito, I feel an Digital Innovation coming on
Google hits back at 'Dear Rupert' over search dominance claims
Choc Factory sniffs: 'We're not pirate-lovers - also, you publish The Sun'
EU to accuse Ireland of giving Apple an overly peachy tax deal – report
Probe expected to say single-digit rate was unlawful
Inequality increasing? BOLLOCKS! You heard me: 'Screw the 1%'
There's morality and then there's economics ...
While you queued for an iPhone 6, Apple's Cook sold shares worth $35m
Right before the stock took a 3.8% dive amid bent and broken mobe drama
EU probes Google’s Android omerta again: Talk now, or else
Spill those Android secrets, or we’ll fine you
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
The next step in data security
With recent increased privacy concerns and computers becoming more powerful, the chance of hackers being able to crack smaller-sized RSA keys increases.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.