Skip to main content

This Week's Corrupt Cops Stories

Submitted by Phillip Smith on (Issue #735)
Drug War Issues

Philadelphia pays for police misbehavior, more cops get caught pilfering the evidence, one gets caught helping a heroin dealer, and another goes down hard for helping drug traffickers. Let's get to it:

In Philadelphia, the city has quietly settled 21 lawsuits filed by shop owners after members of the Narcotics Field Unit stole cash and merchandise when ostensibly raiding the places in search of small plastic bags used to sell drugs. The unit's actions exploded into a major scandal in 2009 when a security camera unit members thought they had disabled recorded their actions on a computer hard drive. The result was an FBI investigation of the officers, dropped charges against some defendants, and numerous federal civil right lawsuits filed by people who said they were abused or framed by the squad. The 21 who have settled so far have received an average pay out of $40,000. No officers have yet been charged, but the FBI continues to investigate.

In Baltimore, a Baltimore police sergeant was arrested last Wednesday on charges he made up information to obtain a drug search warrant. Sgt. Dennis Workley, a 16-year veteran of the force, is charged with perjury and misconduct over a December drug raid. Baltimore police investigated after receiving a citizen's complaint, and it is alleged discrepancies in his warrant application for that raid showed he "cut and pasted" text from another case. Workley has been suspended.

In Hatboro, Pennsylvania, a former Hatboro police detective-sergeant was arrested last Thursday on charges he stole guns, drugs, and cash from the department evidence room and used a police informant to buy drugs for him. John Becker, 42, was the evidence room custodian and is accused of stealing 10 guns between 2003 and 2011, along with $18,000 in cash, and more than $2,000 in drugs. Prosecutors said it was to feed his opiate pain pill habit, and that he also "convinced or coerced several individuals to make numerous drug purchases on his behalf, including powerful prescription pain medications such as OxyContin and Percocet, along with cocaine" under the pretense that he was doing undercover drug investigations. Numerous items missing from the evidence room were found during a search of his home last year. He faces numerous charges.

In Suffield, Connecticut, a Suffield police officer was arrested last Friday for stealing cash from a drug bust. Jeremy DePietro was the arresting officer in a March 2011 call where officers found narcotics and $332 in cash. After the case was disposed of, the court ordered the drugs destroyed and the cash placed in the court's general fund, but the cash was gone. An investigation pointed to DePietro. He is now charged with tampering with evidence and sixth degree larceny. He was also fired. He is out on $24,000 bond.

In New York City, a Queens-based NYPD officer was arrested Tuesday on charge he used his position to gain access to sensitive computer records and pass them on to a convicted heroin dealer. Officer Devon Daniels, 30, went down in a DEA investigation that included wiretaps after agents found evidence he used an NYPD database to look up license plate numbers and check the status of criminal warrants for heroin traffickers in Jamaica, Queens. He is heard on wiretaps asking the dealer for money, "any working revolver," and the use of one of his cars. On one occasion, while driving the dealer's car, he stopped at the scene of an arrest of one of the dealer's crew, quizzed police about what was going on, and immediately reported back to the dealer. He has not yet been formally charged and is out on $150,000 bond awaiting arraignment.

In Carlsbad, California, a Carlsbad police officer pleaded guilty last Thursday to stealing heroin from the department evidence room. Officer Michael Koch, 44, was arrested in January after two employees saw him stealing the dope. Prosecutors said Koch was strung out and stole the drugs for personal use. He entered rehab after being arrested. He will be sentenced June 20 and is expected to receive probation. In the meantime, he's still collecting his $86,000 annual salary while a departmental internal investigation continues.

In San Juan, Puerto Rico, a former Arecibo police officer was sentenced last Friday to 24 years in federal prison for his role in a drug ring. David Gonzalez-Perez was indicted with 16 other people in a 70-count drug trafficking indictment in September 2010 and was found guilty of 28 counts of conspiracy and attempt to possess with intent to distribute cocaine after a two-week trial in August 2011. He participated in 15 drug transactions, which totaled over 200 kilograms of cocaine and received $36,000 in payments for his security services during the drug transactions. He also recruited 15 others to provide armed security with him during these drug transactions, including his brother and sister-in-law.

Permission to Reprint: This content is licensed under a modified Creative Commons Attribution license. Content of a purely educational nature in Drug War Chronicle appear courtesy of DRCNet Foundation, unless otherwise noted.

Comments

kickback (not verified)

Get caught stealing heroin from evidence locker and get probation . In Carlsbad , Cali . .   Go southeast to San Juan , Puerto Rico ... hustle a little peruvian marching powder , get caught and guess what ? ,, 24 years in federal prison . Maybe the " scales of justice " need calibrating .

Thu, 05/24/2012 - 5:11am Permalink
Rwolf (not verified)

Next: Police Drones—Recording Conversations In Your Home & Business To Forfeit Property?

Police are salivating at the prospect of having drones to spy on lawful citizens. Congress approved 30,000 drones in U.S. Skies. That amounts to 600 drones for every state.

It is problematic local police will want to use drones to record without warrants, personal conversations inside Americans’ homes and businesses: Consider the House just passed CISPA the recent Cyber Intelligence Sharing and Protection Act. If passed by the Senate, CISPA will allow——the military and NSA spy agency (warrant-less spying) on Americans’ private Internet electronic Communications by using so-called (Government certified self-protected cyber entities” that may share with NSA your private Internet activity, e.g. emails, faxes, phone calls and confidential transmitted files they believe might relate to a cyber threat or crime—circumventing the Fourth Amendment—with full immunity from lawsuits if done in good faith. CISPA does not clearly define what is an element or self-protected cyber entity, that could broadly mean anything, e.g. a private computer, local or national network, website, an online service.

Despite some cities and counties banning and restricting police using drones to invade citizens’ privacy, local police have a strong financial incentive to call in Federal Drones, (Civil Asset forfeiture sharing) that can result from drone surveillance). Should (no-warrant drone surveillance evidence) be allowed in courts circumventing the Fourth Amendment, for example (drones’ recording conversations in private homes and businesses, expect federal and local police civil asset property forfeitures to escalate. Civil asset forfeiture requires only a preponderance of civil evidence for federal government to forfeit property, little more than hearsay: any conversation picked up by a drone inside a home or business, police can take out of context to institute arrests; or civil asset forfeiture to confiscate the home/business and other assets. Local police now circumvent state laws that require someone be convicted before police can civilly forfeit their property—by turning their investigation over to the Federal Government that can rebate to the referring local police department 80% of assets forfeited. There are more than 350 laws and violations that can subject property to government asset forfeiture that have nothing to do with illegal drugs.

Consider: if CISPA is passed by Congress it will provide Government, police and government contractors (without warrants) the incentive (to take out of context) any innocent—hastily written email, fax or other Internet activity to allege a crime or violation was committed to cause a person’s arrest, assess fines and or civilly forfeit a business or property. U.S. Government can use CISPA to (certify any employee) including employees that work for a Government certified cyber self-protected entity—opening the door for certified employees to spy on their employers and clients. U.S. Government is not prohibited from paying any person including Government Certified Self Protected Cyber Entities, Elements or Certified Employees part of government forfeited assets or other compensation that result from the aforementioned providing U.S. Government a corporation’s confidential information or clients’ private information—that otherwise would require a warrant. U.S. Government currently contracts on a fee/commission basis with Self Protected Cyber Entities, Elements and Contractors that have security clearances to participate in facilitating arrests and Government asset forfeitures.

Currently Government can't use evidence obtained through illegal Internet searches of e.g. private emails and transmitted files without a warrant, however that will change if CISPA or a similar bill is passed by Congress. Since CISPA, two additional cyber-security bills have been created in the Senate called, “The Cyber Security Act of 2012” and “SECURE IT Act”. Both bills appear unconstitutional; appear designed to circumvent the Fourth Amendment. The Cyber Security Act of 2012 formally known as S. 2105 was created by Senate Democrats, Joe Lieberman and Susan Collins. Similar to CISPA, the Cyber security Act of 2012 would abolish legal walls that stop Federal government and private companies sharing information.

The SECURE IT Act: S. 2151 was introduced by Senate Republicans on March 1st 2012: would require federal contractors to alert government about any cyber threats, forcing such communications between government regulators and corporations. The SECURE IT Act authorizes sharing of persons’ private Internet information (without a warrant) going beyond what is necessary to describe a believed cyber threat. SECURE Act fails to create a regulatory system at the Federal level to oversee cyber-security threats opening the door for a person or businesses’ confidential information to be misused and misappropriated by government agencies and private cyber entities. 

Government should be prohibited from using independent contractors, created non-profit organizations and so-call (certified self protected cyber entities) to circumvent the Fourth Amendment. Corrupt police, U.S. Government Agencies and Government Contractors may too easily use private Internet transmissions, emails and transmitted files it is free to collect without a warrant to extort corporations, politicians and Citizens; or sell confidential information gleaned from warrant-less Internet Surveillance. Confidential Information in corrupt hands can be worth more than illegal drugs.

Thu, 05/24/2012 - 3:36pm Permalink
Guest114 (not verified)

Great investigative journalism! Thank you Phillip Smith for this great story, Journalists like you bring out the truth from the secretive world of the criminal empire.Please keep doing what you are doing!

Mon, 05/28/2012 - 6:43pm Permalink

Recently where I am at in Minnesota, local police have made headlines with their recent actions. Apparently they were caught on video handing out marijuana too various people, have them smoke it and then take them somewhere to observe their actions. Designed as a training series but wasn't properly conducted this time around and people are not happy.

It's still being investigated, so we'll see what happens.

http://bayontesting.com/minneapolis-police-suspend-drug-program/

Mon, 05/28/2012 - 9:58pm Permalink

Add new comment

The content of this field is kept private and will not be shown publicly.
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.