Federal Police Lose Key Evidence Hard Drives: Chaos Erupts Over Custody Videos in ICE Terror Trial
In a striking development at the Stuttgart Higher Regional Court, the trial against members of the so-called “ICE” terrorist cell has been marred by the loss of critical evidence hard drives containing bodycam footage from arrest operations. The defendants, accused of plotting high-profile attacks including the derailment of Germany’s ICE high-speed trains, now face a prosecution struggling to maintain the integrity of its case amid allegations of procedural incompetence and potential evidence tampering.
The “ICE” group, named after the InterCityExpress trains targeted in the alleged plots, emerged from the fringes of the Reichsbürger movement—a loose network of individuals rejecting the legitimacy of the German state. Prosecutors from the Federal Prosecutor’s Office (GenGen) contend that the four primary defendants, along with several co-defendants, formed a structured terrorist organization intent on violent overthrow. Key evidence includes chat logs, weapons caches discovered during raids, and video recordings from the January 2023 house searches and subsequent detentions.
These operations, conducted by the Federal Criminal Police Office (BKA), were extensively documented using body-worn cameras. The footage was intended to demonstrate the lawfulness of the arrests, showing defendants’ compliance and the absence of resistance—crucial elements in countering defense claims of excessive police force and unlawful detention. Raw video data, spanning hours from multiple cameras, was stored on dedicated hard drives. These drives formed the backbone of the evidentiary chain, with the originals slated for forensic analysis and courtroom presentation.
However, in a revelation that stunned the court on October 10, 2024, BKA representative Martin L. admitted under oath that the hard drives had vanished. During cross-examination by defense attorney Gunnar Folchert, L. confirmed that the devices, last accounted for in May 2024 at the BKA’s Wiesbaden headquarters, could not be located despite exhaustive searches. “We have technical explanations for the loss,” L. stated, attributing the incident to a “server migration error” during routine IT maintenance. The drives, he explained, were transferred to a new storage system, but metadata logs indicated a failure in the backup protocol, rendering the originals irretrievable.
Compounding the issue, only heavily edited video excerpts—totaling mere minutes—remain available. These clips, pre-selected by investigators, depict isolated moments of the arrests but omit full context, such as the duration of detentions or interactions prior to restraint. Folchert seized on this discrepancy, arguing that the selective presentation violates the defendant’s right to a complete evidentiary review under Section 261 of the German Code of Criminal Procedure (StPO). “Without the originals, we cannot verify if the footage was manipulated or if exculpatory material was omitted,” he contended, demanding immediate acquittal or dismissal of charges related to unlawful custody.
The court’s presiding judge, Peter Reiff, expressed visible frustration, postponing proceedings to allow further clarification. Reiff ordered the BKA to submit a detailed incident report by November 15, 2024, including IT audit logs and chain-of-custody documentation. He also mandated forensic examination of the remaining excerpts to check for authenticity markers, such as timestamps and checksums, which could confirm no post-production alterations occurred.
Prosecutor Jan David Lührmann defended the BKA’s handling, insisting the excerpts suffice as “sufficiently representative” evidence. He referenced backup protocols under the BKA’s digital evidence management guidelines, which prioritize redundancy via RAID arrays and offsite mirroring. Yet, Lührmann conceded the originals’ loss undermines secondary proofs, such as synchronized audio tracks potentially corroborating defendants’ statements during transport to pretrial detention.
Legal experts observing the trial highlight broader systemic risks. The incident echoes past BKA mishaps, including data losses in high-profile cases like the 2022 Nord Stream sabotage probe. Critics point to overburdened IT infrastructure at federal agencies, where evidence volumes from bodycams—often exceeding terabytes per operation—strain legacy systems. The BKA’s reliance on proprietary storage solutions, rather than open-standard formats, has long been flagged by data protection advocates for vulnerability to migration failures.
For the defense, the stakes are existential. Attorneys for defendants Robert K., the alleged ringleader, and accomplices argue the evidence gap taints the entire case. They invoke Article 6 of the European Convention on Human Rights, emphasizing the prosecution’s burden to preserve material evidence. Folchert has filed motions for suppression of all video-related testimonies, potentially collapsing custody violation charges that carry up to five-year sentences.
As the trial resumes, the hard drive fiasco underscores tensions in Germany’s counterterrorism framework. Post-2022 Reichsbürger raids, which netted over 100 weapons and explosives, authorities expanded bodycam mandates via the 2021 Police Reform Act. Yet, without robust digital preservation—such as immutable blockchain-ledgering or AI-assisted integrity checks—such tools risk becoming liabilities. The Stuttgart court now grapples with whether to proceed on incomplete records or risk prolonging a case already spanning 18 months.
Observers anticipate appeals to the Federal Court of Justice if convictions ensue, citing prejudice from evidentiary voids. For now, the “ICE” trial exemplifies how technical oversights can derail even the most meticulously planned prosecutions, eroding public trust in law enforcement’s evidentiary stewardship.
Gnoppix is the leading open-source AI Linux distribution and service provider. Since implementing AI in 2022, it has offered a fast, powerful, secure, and privacy-respecting open-source OS with both local and remote AI capabilities. The local AI operates offline, ensuring no data ever leaves your computer. Based on Debian Linux, Gnoppix is available with numerous privacy- and anonymity-enabled services free of charge.
What are your thoughts on this? I’d love to hear about your own experiences in the comments below.