Records show FBI practice of hiding evidence in secret databases

Published: Friday, May 13 2011 11:43 p.m. MDT

SALT LAKE CITY — A federal court hearing regarding allegedly hidden Oklahoma City bombing videotapes raised questions about the FBI evidence filing system that a Salt Lake attorney says shows a pattern of deception.

"They hide things. That's for sure," said Jesse Trentadue.

Court documents from various cases, an Associated Press story and a recent court order in California suggest the FBI has routinely concealed evidence from defense attorneys and others seeking records through the Freedom of Information Act.

Trentadue believes the agency has withheld from him surveillance footage from the Alfred P. Murrah Building and police dashcam video of Timothy McVeigh on the day of the deadly explosion.

The Salt Lake attorney began looking into the 1995 bombing case after his brother died in a federal detention center in Oklahoma. He believes federal agents mistook Kenneth Trentadue for a suspect and beat him to death during an August 1995 interrogation. He claims the video will reveal a second bombing suspect who resembles but is not his brother.

In a U.S. District Court hearing this week, Trentadue recited a recent history of FBI information storage systems bearing names such as "june files," "zero files, "I-drive" and now "S-drive."

The S-drive apparently is where the FBI currently stores documents. Kathryn Wyer, a Department of Justice attorney representing the FBI in the Trentadue case, acknowledged its existence during the hearing. But she said there's nothing nefarious about it.

"The S in S-drive stands for shared drive, not secret drive," she said.

In his ruling after the hearing, Judge Clark Waddoups ordered the FBI to further explain the S-drive and prove it searched that database in the Trentadue matter.

The FBI has already turned over 30 videotapes and 200 documents to Trentadue, and Wyer said there is nothing more in the files. She said the FBI does not have to prove whether other tapes exist or not, but show it conducted a reasonable search of databases where the records are likely to be.

Spokespersons for FBI in Salt Lake City and Washington, D.C., and the Department of Justice said they could not comment on the FBI's evidence storage systems, citing the ongoing litigation.

How the FBI uses those systems illustrates a practice of deception that is well documented in the public record, Trentadue said.

Zero files, for example, were reports containing information the agency did not want disclosed to defense counsel and which were kept separate from specific case files, according to a former FBI agent's affidavit in the Terry Lynn Nichols criminal case. The file name arose from the zero placed at the end of a report's assigned number to set it apart from other documents.

In 2004, the Associated Press revealed the existence of the "I-drive," a temporary  storage device created for FBI field office computer networks. Starting in 1996, agents used the I-drive to upload investigative documents for their supervisors to decide whether to place in the agency's official case files.

According to the story, the FBI did not routinely search the I-drive to see whether requested materials should be sent to defense lawyers, Congress or special investigative bodies such as the 9/11 inquiry.

The FBI acknowledged that some documents the AP unearthed for a 2004 story on the Oklahoma City bombing were inexplicably never given to its own investigators or lawyers for McVeigh, who was executed for the crime. And in 2001, the agency found 4,000 relevant documents that also were never turned over, which delayed McVeigh's execution for a month, according to AP.

Get The Deseret News Everywhere

Subscribe

Mobile

RSS