Handbook 9.4
Investigative Techniques
Chapter 6
Surveillance and Non-Consensual Monitoring
|
|
Contents
|
|
|
-
Enforcement activities include a wide spectrum of Criminal Investigation
(CI) activities. Surveillance is an enforcement technique used to obtain
information, leads, and evidence. CI surveillance techniques include:
-
Physical visual.
-
Electronic.
-
Video.
-
Aerial surveillance.
-
This chapter covers the following topics:
-
General
-
Surveillance and Undercover Distinguished
-
Surveillance at Public Meetings
-
Surveillance Checklist
-
Risk Assessment Guide
-
Electronic Surveillance
-
Restrictions on Electronic Surveillance Techniques
-
Video Surveillance
-
Aerial Surveillance
-
Report of Information Received from State and Local Agencies
|
|
-
The following applies to CI surveillance techniques:
-
Surveillance may be conducted under a Subject investigation, and when included
within the scope of a General or Primary Investigation.
-
Only 1811s will conduct surveillance.
-
Except as provided in paragraph (d) below, a journeyman-level special agent
(GS-1811-12 and above) may conduct surveillance as deemed necessary. A special
agent below the journeyman level must obtain prior approval from the Group
Manager for all surveillance activity except when the occasion arises where
immediate surveillance is necessary and the Group Manager cannot be contacted.
In this instance, the agent should advise the group manager as soon as
practicable of the circumstances which precluded obtaining prior approval.
-
If during the surveillance, the special agent must assume an identity other
than self and cover documents are required, approval for use of these documents
must be obtained from the District Director or designee. (See Investigative
Technique Handbook 9.4, Chapter 8, Undercover Operations concerning cover
documents and or pseudonyms.)
-
Surveillance conducted in a high crime area, either on foot or in a vehicle,
requires the participation of at least two agents. Surveillance requiring
the use of a vehicle should be conducted in government-owned vehicle that
has two-way radio equipment.
|
|
-
The following are required:
-
Daily notes of pertinent activity of person surveilled; and
-
Written summary of notes at the completion of surveillance, to be filed with
any other document prepared, i.e., information item, etc.
|
|
-
The following are some of the reasons for conducting a surveillance:
-
To obtain evidence of a crime or to identify persons who have indicated they
have committed or intend to commit a crime.
-
To locate persons by watching their haunts and associates.
-
To obtain detailed information about a subject's activities.
-
To check on the reliability of informants.
-
To locate hidden property.
-
To obtain probable cause necessary to secure a search warrant.
-
To obtain information for later use in interrogations or interviews.
-
To develop leads and information received from other sources.
-
To know at all times the whereabouts of an individual.
-
To obtain admissible evidence for use in court.
|
|
-
It is important to distinguish between investigative techniques used in
surveillance activities and certain undercover operations.
|
|
-
The following characteristics apply to surveillance:
-
The purpose is to observe ongoing activities and individuals.
-
Interaction with subjects and third parties is usually not initiated. (The
Chief, CI, pursuant to the provisions of Investigative Technique Handbook
9.4, Chapter 7 entitled Consensual Monitoring, may authorize the monitoring
and recording of telephone calls.)
-
Conversations are incidental to the surveillance.
-
Conversations are not monitored or recorded, except as set forth in (b) above.
-
The special agent has limited cover, used to protect the integrity of the
surveillance.
-
Local special agents are used.
-
Special agents need not be trained in undercover techniques.
-
Initiated surveillance activity bears little resemblance to an undercover
operation. The following situations indicate the surveillance activity evolved
into an undercover operation:
-
The activity continues for an extended period, and begins to focus on certain
individuals.
-
Reliance on cover identities increase.
-
Contacts with targets and other individuals are more in-depth.
-
Agents become participants rather than observers of the activities of interest.
-
The Chief, CI, is responsible for ensuring that surveillance activities do
not evolve into undercover operations, without first obtaining the authorization
required in Investigative Technique Handbook 9.4, Chapter 8, Undercover
Operations. Consider obtaining an undercover authorization and use trained
undercover agents in situations in which it is highly likely that a surveillance
will evolve into an undercover operation.
|
|
-
The following characteristics apply to undercover operations:
-
The purpose is to initiate or participate in activities with identified targets.
-
Interaction with subjects and third parties is sought.
-
Undercover agents or other authorized individuals initiate and direct
conversations to further the objectives of the operation.
-
Conversations may be monitored and recorded.
-
The undercover agent has a documented cover. This cover is used as a basis
for contacts with targets or witnesses. The lack of a documented cover does
not mean the activities engaged in do not constitute an undercover operation.
-
Trained undercover agents are suitable for this operation; in most cases
local special agents should not be used.
-
The services of a Confidential Informant can be utilized to perform undercover
activities.
|
|
-
The attendance at such public meetings is to be distinguished from peaceful
demonstrations directed toward some sort of demonstration against the 16th
Amendment. Treasury department policy directs that no information should
be collected on peaceful demonstrations which involve the exercise of First
Amendment rights without contacting the office of the Assistant Secretary
of the Treasury for Enforcement. In such situations, the Chief CI, with the
concurrence of the District Director and the Director of Investigation, CI,
for that region, will notify the Assistant Commissioner, CI, who will contact
the Assistant Secretary of the Treasury for Enforcement.
-
Surveillance activities at public meetings which promote actions in violation
of the Internal Revenue Code will be limited to:
-
Identifying leading figures in the meeting.
-
Obtaining information concerning new techniques to violate tax laws.
-
Special agents may identify those individuals who attend the meetings who
admit or indicate that they:
-
Have committed or intend to commit a tax violation or other crime;
-
Advocate that others commit violations of the tax law or commit other crimes;
-
Advocate the use of threat or assault tactics in dealing with Service personnel
or other federal, state, or local law enforcement personnel.
-
An example of an appropriate surveillance technique for identifying those
individuals who attend the meetings and admit or advocate the violation of
laws or express an intent to do so is as follows:
An unidentified member in the audience at a public meeting states that he/she
has not filed Federal Income Tax Returns for several years, and further states
that he/she never intends to file such returns again. Special agents may
observe this person enter an automobile and record the license plate number
on the automobile in order to attempt to properly identify him or her. If
there is a likelihood that the individual is driving a borrowed or leased
automobile or is riding with someone else, the agents may continue the
surveillance to attempt to establish a positive identification.
|
|
-
Case law has established the characteristics of a public meeting. United
States v. Tijerina found substantial support in the record that the meeting
was public. The meeting was attended by two newspaper reporters and a radio
newscaster. The civic auditorium was set up with a television camera and
a loud speaker system. Invited guests were admitted to the meeting after
paying a $2.00 admission fee and identifying themselves. Between 200 to 600
individuals were estimated to have attended. Based on Tijerina, the following
criteria may be considered to determine whether or not a meeting is public:
-
Where the meeting will be held.
-
If members of the press will be present or involved.
-
If there are unreasonable restrictions upon entry.
-
How many people will be present.
-
Has public notice of the meeting been given.
|
|
-
Recording the proceedings of a public meeting is a permissible means of
surveillance. It is important to establish that the meeting is public
|
|
-
The special agent in charge of a surveillance operation is responsible for
reviewing the surveillance checklist (Exhibit 9.4.6-1). If the surveillance
involves an undercover operation, refer to the applicable undercover checklist.
|
|
-
The risk assessment guides are used to assess the potential risk in any
enforcement operation. The assigned special agent and Group Manager should
prepare the risk assessment. Consider utilizing the assistance of a third
party not assigned to the case to provide objectivity.
-
Comment on each of the considerations and record the level of risk (low,
medium, or high) for each consideration.
-
After reviewing the comments and the assigned level of risk, determine whether
the enforcement operation can be accomplished safely. If it is decided that
the enforcement operation cannot be accomplished safely, abandon any further
planning activity (Exhibit 9.4.6-2.)
|
|
-
The following section refers to electronic surveillance and the monitoring
of electronic communications.
|
|
-
The Electronic Communications Privacy Act (ECPA) of 1986, Public Law No.
99-508, effective January 1987, amended Title III of the Omnibus Crime Control
and Safe Streets Act of 1968 (18 USC 2510 et. seq.). This legislation is
a comprehensive revision of Title III and provides coverage for the technological
advances developed in the area of electronic communications. The offense
for which interceptions of communications provided for in this legislation
can be authorized by court order are listed in 18 USC 2516. ECPA is divided
into three parts:
-
Title I--Interceptions of Communications and Related Matters;
-
Title II--Stored Wire and Electronic Communications and Transactional Records
access;
-
Title III--Pen Registers and Trap-and-Trace Devices.
-
NOTE:
-
What was previously referred to as Title III of the Omnibus Crime Control
and Safe Streets Act of 1968 (18 USC 2510 et. seq.) is now called Title I.
-
This legislation does not authorize wiretaps to investigate the tax crimes
of Title 26 of the Internal Revenue Code, but does authorize wiretaps to
investigate violations of sections 1956 and 1957 of Title 18 (money laundering
offenses) and section 5322 of Title 31 (currency reporting offenses).
-
Internal Revenue Service policy does not provide authorization for the
interception of Title I oral or wire communication, except in extremely limited
situations. It does, however, provide for the use of Title I oral or wire
communication once it has been obtained by other law enforcement agencies.
|
|
-
Title I only covers situations where the contents of wire, oral and electronic
communications are sought to be intercepted through the use of electronic,
mechanical, or other devices, and where no participant consents to such
interception. This statute was formerly called Title III.
|
|
-
Contents , as defined by Title 18 USC 2510 (8), include any information
concerning the substance, purport or meaning of any wire, oral or electronic
communication.
-
A wire communication is defined as a communication that involves the
use of wire, cable, or like method with the human voice at some point in
the transmission. (See 18 USC 2510 (1) and (18)) In addition, tone-voice
pagers are included within the category of wire communication, and interception
of the human voice segment must be treated the same as a wire interception.
A conversation on a telephone is a wire communication.
-
An oral communication means "any oral communication uttered by a person
exhibiting an expectation that such communication is not subject to interception
under circumstances justifying such expectations, but this term does not
include any electronic communication. A conversation between two or more
individuals who have a reasonable expectation of privacy, is an oral
communication."
-
An electronic communication is defined as "any transfer of signs,
signals, writing, images, sounds, data, or intelligence of any nature transmitted
in whole or in part by a wire, radio, electromagnetic, photo-electronic,
or photo-optical system that affects interstate or foreign commerce." Electronic
communication are those which do not contain the human voice at any point
during the transmission. An oral communication can never be an electronic
communication. This category includes systems such as digital display pagers;
electronic mail; electronic bulletin boards; computer-to-computer transmissions;
facsimile transmissions and private video transmissions (but not video
surveillance). Electronic fund transfers are electronic communications.
-
NOTE:
-
ECPA sets forth procedures for interception of electronic communications
while in transmission (Title I) as well as access to stored (Title II) electronic
communications.
-
Interception means "the aural or other acquisition of the contents
of any wire, electronic, or oral communication through the use on any electronic,
mechanical, or other device."
-
Electronic, mechanical or other device is defined by 18 USC 2510(5)
to include "any device or apparatus which can be used to intercept a wire,
oral or electronic communication other than:"
-
Any telephone or telegraph instrument, equipment or facility, or any component
thereof (i) furnished to the subscriber or user by a provider of wire or
electronic communication service and used by the subscriber or user... in
the ordinary course of its business or (ii) being used by a provider...in
the ordinary course of its business or by an investigative or law enforcement
officer in the ordinary course of his duties;
-
A hearing aid or similar device being used to correct subnormal hearing to
not better than normal.
-
NOTE:
-
Merely overhearing a conversation, even if done by someone picking up an
extension telephone or using a normal hearing aid, is not considered an
interception.
-
Consent is defined to mean that one or more of the parties to a wire,
oral or electronic communication has given their prior permission that such
communication may be intercepted. Consent is valid even if less that all
of the parties consent and even if the non-consenting parties are unaware
that one among them has given consent.
|
|
-
Title I does not cover the following:
-
Consensual monitoring--where one of the parties to the conversation consents.
-
Interception where the contents of the conversation are not monitored (i.e.
pen register or a trap and trace).
-
The overhearing of conversations without the aid of electronic, mechanical,
or other devices.
-
Radio or television broadcasts readily accessible by the public.
-
Tone-only pagers.
-
Electronic Tracking Devices, also called Transponders or Beepers.
-
Marine and aeronautical communication systems per Title 18 USC 2511 (2) (g)
(ii) (IV).
-
Public safety radio systems.
-
Amateur radio operator services, citizens band; general mobile radio services.
-
Electronic communications which are readily accessible by the general public.
-
Physical visual surveillance.
-
Telephone extensions.
-
If Title I does not apply, other statutes such as Titles II and III, may
still apply. Failure to comply with them may result in criminal sanctions
or civil liability to the government. Fourth Amendment and privacy issues
may also be present in cases which do not involve Title I.
|
|
-
A Title I wiretap can only be used to obtain evidence of certain enumerated
offenses. However, the wiretap may intercept conversations concerning other
crimes. Title 18 USC 2517 sets forth a statutory scheme under which disclosure
and use of intercepted oral or wire communications are permitted.
-
Title 18 USC 2517 (1) permits law enforcement officers who obtain wiretap
evidence to turn such evidence over to other law enforcement officers for
the latter's use.
-
Title 18 USC 2517 (2) permits the receiving law enforcement officer to use
wiretap evidence in their official duties, such as issuing summonses; obtaining
jeopardy assessments; investigating tax offenses or preparing a Special Agent's
Report.
-
Wiretap evidence of enumerated crimes can also be used in both civil and
criminal cases if an order under Title 18 USC 2517 (5) is obtained.
-
Title 18 USC 2517 (3) and (5) authorize the disclosure and use of otherwise
intercepted offenses by law enforcement officers who are engaged in the
interception. The section also authorizes the receiving law enforcement officers
to use the evidence before a grand jury; in court or any other proceeding;
or they may disclose it via testimony.
-
Title 18 USC 2517 (5) requires a court order, referred to as a derivative
use order, permitting such disclosure as soon as practicable after the law
enforcement officer releases the information. The derivative use order must
be based upon the court's finding that the evidence of the unenumerated crime
(i.e. tax offense) was otherwise (properly) intercepted. Failure to obtain
such an order can result in dismissal of the case, or liability for civil
damages due to unauthorized disclosure.
-
If a federal court authorized the original wiretap, then the same court must
issue the order. If a state court authorized the wiretap, than that particular
court must issue the order.
|
[9.4]
6.7.2.4 (03-02-1999)
Title I Information Obtained by Other Agencies--Offers to be Accepted
|
-
Special agents are qualified to receive and use Title I information obtained
by other agencies because they qualify as law enforcement officers as defined
by Title 18 USC 2510 (7). In certain situations, they may investigate several
of the violations enumerated in Title 18 USC 2516. Title I information, once
received, can be used for any purpose within the scope of official duties
(Title 18 USC 2517 (1) and (2)).
-
Title I information may be accepted in all cases where the electronic
installation was operated by another federal agency. Title I information
from state and local installations will be accepted where the installation
was authorized pursuant to Title 18 USC 2518. Prior to use of the Title I
information in an investigation, an order pursuant to Title 18 USC 2518 and
Title 18 USC 2517 (5) will be sought as required.
-
Title I information for state and local electronic installations will be
accepted where a supervisory attorney determines that the local installation
met federal requirements and secures an order in the nature of the one prescribed
by Title 18 USC 2517 (5). The term supervisory attorney includes a state
or local attorney who occupies, under the applicable state statute, a position
comparable to the supervisory attorney in federal installations. For these
state and local installations, application for an order in the nature of
a Title 18 USC 2517 (5) order should be made to the court which authorized
the electronic surveillance. Prior to accepting information from state and
local installations, the Chief, CI, should discuss with District Counsel
the propriety of accepting information in order not to taint an investigation.
|
|
-
Transcripts, or excerpts from transcripts, from Title I information, gathered
by other law enforcement entities, with potential use will be referred to
the Chief, CI, or designee who should immediately evaluate its potential
for criminal and civil tax purposes.
-
If apparent that the information will be used in a criminal judicial proceeding,
the Chief, CI, or designee should immediately ascertain whether an 18 USC
2517 (5) order covering use by the IRS has been obtained. If an order has
not yet been obtained, the Chief or designee should make arrangements with
the supervisory attorney to obtain it as soon as practicable.
-
Should the Title I information appear to have no criminal potential but may
have some important or significant effect on the determination or collection
of the tax liability, the Chief or designee will transmit the Title I data
by memorandum to the district Examination or Collection function only after
a court order has been obtained. This court order must be obtained pursuant
to Title 18 USC 2517 (5). Once the information is passed on to the Examination
or Collection function, the receiving division should be advised to segregate
the Title I information and its derivative product to the extent possible.
This will enable a tracing of adjustments back to their Title I sources.
-
Should the Title I information not have a significant effect on the determination
or collection of the tax liability, the information should become part of
in the CI background file. Title I information will not be forwarded to the
Examination or Collection function for civil use unless authorized by court
order.
|
|
-
Title II pertains to Stored Wire and Electronic Communications and Transactional
Records Access and addresses access to stored electronic communications and
transactional records. It is patterned after the Right to Financial Privacy
Act, Title 12 USC 3401, in that it balances privacy interests in personal
and proprietary information, with the government's legitimate law enforcement
needs. It establishes procedures for obtaining this information.
-
NOTE:
-
If access is sought to obtain stored wire information, such as a telephone
answering machine which contains a human voice, a Title I order is required.
Title II of ECPA only covers stored electronic communications.
|
|
-
Electronic communications which are in storage includes storage of electronic
messages both before and after transmission; backup copies retained for re-access
by the recipient; and backup copies used by the communications company. This
category includes systems such as digital-display pagers, electronic mail
and bulletin boards, computer to computer transmissions, telex transmissions,
facsimile transmissions and private video transmissions but not video
surveillance. The use of a pen register or a trap and trace device is governed
by Title 18 USC, Sections 3121 through 3126. (See Title III--Pen Registers.)
-
This statute also addresses a storage system called a "Remote Computing
Services." These computer entities provide various electronic bulletin board
services to customers or electronic data for future use or reference. Data
is most often transmitted between these entities and their customers by use
of electronic communications.
-
Interception of electronic transmissions to tone-only pagers does not require
a court order and may be authorized by the Chief CI. The tone-only pager
emits a beep or other signal to inform the user that a message is waiting.
The message can be retrieved by the user calling a predetermined number (usually
an answering service). An authorization memorandum should be submitted for
the Chief's approval.
-
Interception of transmissions to tone-and-voice-pagers is governed by Title
I of the ECPA (formerly Title III of the Omnibus Crime Control and Safe Streets
Act of 1968) and is not authorized for Title 26 investigations. A
tone-and-voice-pager enables callers to transmit short voice messages to
a subscriber's pager. A caller first telephones the paging company and then
dials or touch tones the subscriber's individual code. The caller is notified
by a beep that a short time (9-15 seconds) remains to communicate a message
into the phone. The computer captures both the individuals's code and the
message. As soon as the radio frequency is clear, the computer broadcasts
the message to the subscriber's pager, which self activates and beeps. The
tone-and-voice-pager then remains on the air for a few seconds after code
recognition to receive the audio message from the caller. After the message
is sent, the computer erases it from its memory bank.
-
The monitoring of display-pagers or the display only portion of a
tone-and-voice-pager, and facsimile transmission is governed by Title I during
transmission. Any monitoring activity of display pagers and facsimile
transceivers during the transmission(s) requires the approval of the Assistant
Commissioner, CI, an affidavit, an application (which must be approved by
the Department of Justice), and a court order obtained in accordance with
Title I.
|
|
-
Title 18 USC 2702 prohibits disclosure of electronic communications by the
party storing the information unless:
-
The information is given to its intended recipient or addressee.
-
The information is given to the government pursuant to court order; search
warrant; subpoena.
-
The subscriber/customer gives consent.
-
The disclosure is to a facility used to forward the communication.
-
The disclosure is incident to testing equipment or quality of service.
-
The information was obtained inadvertently and it refers to a crime.
|
|
-
Title 18 USC 2703 sets forth the requirements for government access to electronic
communications in storage and in a remote computing service. This includes
data stored in a display-pager. Utilize the following procedures to obtain:
-
The contents of electronic communication while it is in electronic storage
with an electronic communication service or remote computing service (e.g.,
phone numbers stored in a pager's temporary memory, electronically stored
facsimile communications, stored e-mail, etc.) or
-
Transactional information from an electronic communication service or a remote
computing service (e.g., name, address, telephone toll billing records, telephone
number, and other subscriber and customer identity and service information).
-
If the contents of an electronic communication have been in storage for 180
days or less, the government must obtain a search warrant in order to have
the carrier disclose the contents. The search warrant must be based on probable
cause and notice is not required.
-
If the contents of an electronic communication have been in storage for more
than 180 days, or if the contents are stored in a remote computing service,
Title 18 USC 2703 (b) sets forth the following requirements for obtaining
access:
-
Without notice to the subscriber or customer, the government must
obtain a search warrant.
-
With notice to the subscriber or customer, the government can use:
-
An administrative or trial or grand jury subpoena.
-
A search warrant pursuant to Rule 41.
-
A disclosure court order.
-
The statute also covers situations where the government seeks access to general
information about a subscriber or customer, not the contents of their
communications. This information, commonly referred to as transactional
information, includes data such as the customer's schedules (times and days)
of transmissions; the length and frequency of transmission; billing address;
toll records; and unlisted numbers. This information can be obtained by:
-
An administrative or trial or grand jury subpoena.
-
A search warrant pursuant to Rule 41.
-
A disclosure court order issued on relevancy.
-
Consent from the customer or subscriber of the service.
|
|
-
The Chief, CI, may allow special agents to apply for court orders authorizing
the interception of electronic communication in the investigation of felony
violations and in the enforcement of the wagering tax laws. Court orders
will be sought pursuant to the provisions of Title 18 USC, Sections 2516
(3) and 2518. The Chief will, with the approval of the District Director,
obtain the approval of District Counsel on the legal sufficiency and form
of affidavits in support of an application for a court order. If approved,
the Chief will seek the endorsement of the U.S. Attorney or Strike Force
Attorney about the decision to apply for a court order. Upon approval, a
request will be submitted by memorandum to the Director of Investigations,
CI, who, if in concurrence, will forward the request to the Assistant
Commissioner, CI. An oral request for approval must be confirmed in writing
and submitted within 2 working days after the oral request is made. After
the request has been approved by the appropriate officials and returned by
the Assistant Commissioner, CI, the Chief will contact the U. S. Attorney
or Strike Force Attorney to apply for the necessary court order. This
authorization will be forwarded together with the appropriate affidavit or
application for court order to the U.S. Attorney's office for the Judicial
District in which the interception is scheduled to take place.
-
The request for approval should contain the following information:
-
Investigation name and number and illegal activity code from the Criminal
Investigation Management Information System (CIMIS) Users Handbook.
-
The type of communications to be intercepted, including the identity of the
person, if known, committing the offense and whose communications will be
intercepted.
-
Reasons for the interception, including a full and complete statement of
the facts and circumstances relied upon to justify that an order be issued.
Details should be provided as to the particular offense that has been, is
being, or is about to be committed.
-
Indicate whether or not other investigative procedures have been tried and
failed or why they reasonably appear not likely to succeed.
-
Names and titles of all persons who will install and have access to the
equipment.
-
State the exact days for which the authorization is sought, not to exceed
30 days. Include the date the surveillance will begin. (When the beginning
date is set, consideration should be given to obtaining the necessary equipment
and time for the request to be considered. If the beginning date is not known
or if different from the authorized beginning date, the installer should
notify the National Operations Division, Special Investigative Techniques
(OP:CI:O:S) by telephone on the first workday after installation of the
monitoring equipment.)
-
Steps to be taken to provide security precautions.
-
A statement that the U.S. Attorney or Strike Force Attorney is endorsing
the decision to apply for a court order.
-
Information regarding the substance of the case(s).
-
A statement explaining the significance of the particular type of electronic
communication in furthering the investigation of the alleged violation.
-
Submit a request or memorandum through channels to the Assistant Commissioner,
CI, when the following occurs:
-
If the authorization is not utilized, explain the reasons why the authorization
was not utilized and include the name of the cases for which authorization
was sought by a memorandum.
-
If an extension is necessary, summarize the results to date and the reasons
the extension is necessary and submit a request for an extension no later
than (5) days prior to the end of the prior authorization period. Include
the exact number of days the authorization is to be extended.
-
If the electronic communication being intercepted involves paging devices
and it is determined that additional or different pagers need to be surveilled,
submit a request setting forth the reasons. Include the new pagers to be
monitored and the name(s) and address(es) of the subscriber(s). The request
for an extension of time can be combined with this request if they occur
simultaneously.
|
|
-
This type of monitoring is exempt from Title I requirements because it does
not interfere with or seize the contents of communications. There are many
kinds of devices used to conduct such monitoring but the most common are
the pen register and the trap-and-trace devices. These non-conversational
devices are covered by a separate statute entitled "Pen Registers and
Trap-and-Trace Devices." Title 18 USC 3121-3126.
-
Pen registers and trap-and-trace devices are subject to Fourth Amendment
requirements when physical intrusion is needed for installation. Limited
entries to install this equipment is permitted provided they are done pursuant
to a valid search warrant or court order.
|
|
-
A pen register , which is also called a "Dial Number Recorder," is
a mechanical instrument attached to a telephone line, usually at a central
telephone office. A pen register:
-
Records the outgoing numbers dialed by a particular telephone;
-
Does not record whether an outgoing call is ever completed;
-
Registers incoming calls by recording a dash for each ring of the telephone;
-
Does not identify the telephone from which the incoming call originated.
-
Use of pen registers is restricted to recording data of the dialing or signaling
information necessary to direct or process a call. Pen registers may not
be utilized for gathering transactional data (i.e. account numbers, amounts,
etc.).
-
If possible, use equipment that does not record transactional data. Transactional
data may not be utilized without a court order and must be sealed until a
court order is received.
-
Pen registers and other types of telephone number recorders can be utilized
only when authorized by court order and only in the following situations:
-
Investigations involving a federal felony violation.
-
Wagering tax investigations.
-
Locating fugitives from justice who were the subject of investigation by
CI. To obtain a pen register under this section, a fugitive from justice
is defined as a person against whom criminal action (e.g., return of an
indictment, filing of a complaint or information, or a conviction) has been
taken, and who has fled the jurisdiction to escape prosecution or to avoid
serving a sentence. Requests for pen registers to locate fugitives will be
considered only for fugitives who are charged with felony violations.
-
Butt sets may be used by an IRS employee to accomplish the installation of
the pen register. See detailed procedures regarding the installation in 6.8.3.6.
Pen registers and other types of telephone number recorders may be used in
investigations involving felony violations related to Income Tax Preparers,
Electronic Filers (ELF), Questionable Refund Program (QRP), and significant
income tax investigations. Unless the Assistant Commissioner, CI, specifically
approves, only IRS-owned pen registers and accessory equipment may be used.
|
|
-
The Chief, CI, with the approval of the District Director, will seek the
endorsement of the U.S. Attorney or the Strike Force Attorney to apply for
a court order. Local procedures must be followed to obtain the court order.
If preparation of an affidavit is necessary, obtain the approval of District
Counsel regarding the affidavit's legal sufficiency and form. Pen registers
approved by the District Director and District Counsel must be submitted
on Form 9170, Request for Pen Register and/or Trap and Trace Devices, to
the Assistant Commissioner, CI. If appropriate, the written request may be
transmitted by facsimile (fax).
|
|
-
If time does not permit a written request, the information may be orally
transmitted to the Assistant Commissioner, CI. An oral request for approval
must be confirmed in writing and submitted within 2 working days after the
oral request is made. After the request has been approved by the appropriate
officials and returned by the Assistant Commissioner, CI's, office, the Chief
will contact the U.S. Attorney or Strike Force Attorney to apply for the
necessary court order.
|
|
-
The request for approval should contain the following information:
-
Investigation name, number, and activity code from CIMIS Users Handbook.
-
Telephone numbers to be monitored.
-
Names and addresses of telephone subscribers.
-
Reasons for the use of pen registers.
-
Names and titles of all persons who will install the equipment.
-
The duration for which the authorization is sought and the date the surveillance
will begin. The authorization should conform to the time limits established
by the court order, not to exceed 60 days. When the beginning date is set,
consider the time needed to obtain the equipment and the time for the request
to be considered. If the beginning date is not known, this should be stated
in the request and the District should provide this information by telephone
to the National Operations Division, Special Investigative Techniques (OP:CI:O:S)
on the first workday after installation of the pen register.
-
The steps to be taken to provide limited access to the pen registers during
their operation and other security precautions.
-
A statement that District Counsel concurs that the proposed affidavit is
in support of the application and that it is legally sufficient.
-
A statement that the U.S. Attorney or Strike Force Attorney endorses the
decision to apply for a court order.
-
Information regarding the substance of the investigation(s).
-
A statement explaining the significance of the use of the telephone in furthering
the alleged violation.
-
After approval by the appropriate officials, the Chief, CI, will arrange
for the timely shipment of a pen register(s) and other requested accessory
equipment. Upon receipt of the final approval, the case agent should promptly
contact the U.S. Attorney for the purpose of issuance of a court order by
a federal magistrate or judge.
|
|
-
Title I prohibits the intentional interception of any wire communication
(including the existence of any oral communication) by a law enforcement
agent without court ordered authorization. In compliance with the prohibition,
the following procedures must be completed in order to install a dialed number
recorder (DNR).
-
Contact the telephone company to identify the line that the DNR is to be
attached.
-
If the telephone company does not have the personnel available to confirm
the correctness of the line at the appearance point, the tech agent will
do the following:
-
A voltmeter must be attached to the identified line to determine if the telephone
is in use.
-
If the telephone is not in use, attach the butt set to the line and confirm
that the line is the correct line. If someone attempts to use the line while
the butt set is attached to the line, the butt set will be immediately
disconnected and not be reconnected until it has been determined (using the
voltmeter) that the line is not in use.
-
After the pen register has been set up and initially activated, the cover
and rear terminal strip will be padlocked by the Chief or designee. The Chief
will ensure that installers and operators are competent to install and operate
the equipment. Adequate precautions will be taken to limit access to the
pen register only to its operator and other necessary personnel. The Chief
or designee will sign an affidavit at the end of the usage affirming that
no other individuals had access to the keys or combinations and that the
machine was not tampered with. The operator will maintain a record containing
the date, time, and name of persons having access to the equipment. This
record will be maintained as a part of the investigative file. Upon completion
of use, pen registers must be immediately returned to the issuing office.
-
If the authorization is not utilized, a memorandum will be submitted to the
Assistant Commissioner, CI, setting forth the reasons why. The memorandum
will include the name of the investigations on which authorization is sought.
-
If an extension is necessary, submit a request summarizing results to date
to the Assistant Commissioner, CI, for consideration no later than (5) five
days before the end of the prior authorization. The request will set forth
the number of days the extension is sought. The extension may not exceed
60 days.
-
If additional phone numbers need to be surveilled or equipment installed
on phones not in the original request, submit a request setting forth the
reasons. Include in the request the new telephone numbers to be monitored
and the name(s) and address(es) of the subscribers. The request for an extension
of time can be combined with this request if they occur simultaneously.
|
|
-
A trap and trace device is also called a "grabber" . It records the telephone
numbers from incoming calls to a particular telephone. The device used by
the telephone company is a TTS-176 device or an electronic switching system
(ESS) or cross bar switching facilities. Once again, no conversation is obtained.
Trap and trace procedures are necessary when attempting to monitor call
forwarding.
-
Call forwarding is part of the trap and trace procedure. It requires that
a telephone company identify to which facility or number telephone calls
are being forwarded. Historically, telephone companies have been reluctant
to assist in trap and trace procedures or call forwarding monitoring unless
the situation concerns threats to the President or kidnapping. The statute
now protects companies from liability in connection with such devices that
follow the statute. (See Title 18 USC, Section 3124(d).)
-
The telephone company may be able to provide a record of incoming calls to
the telephone of a subject under investigation. This depends on the type
of switching facility (exchange) involved. This information can be as useful
as a pen register.
-
Trap and trace service requires the same approval as pen registers. Requests
and any deviations from requests must conform to the same procedures in pen
register requests and will be considered in the same manner.
-
Consider the availability and use of "caller ID" to obtain desired information
prior to applying for a trap and trace authorization.
-
A court order is required.
-
Whenever possible, before obtaining an order to trace incoming calls to a
particular line, review the proposed trace with the local telephone company's
security officer. The security officer should be able to advise of foreseeable
problems in the execution of the proposed order.
-
Except in very rare instances, orders should be limited to Electronic Switching
System (ESS) or No. 5 cross-bar facilities. The likelihood of successfully
tracing telephone calls through a system using less sophisticated equipment
is extremely low and requires an inordinate amount of time and equipment.
-
Where possible, all orders should also be limited with respect to:
-
Scope: An order should minimize the number of lines on which trap and trace
service is requested at a given switching facility.
-
Geography: It is preferable that the order limit traces to "all calls originating
in X City" or "all calls originating within a Y-mile radius of Z town."
-
Duration: Orders should limit the trace to 60 days, subject to an extension
of an additional 60 days if the supervising attorney determines it to be
necessary.
-
Hours: If it is possible to anticipate when calls will come into a target
phone, tracing should be limited to these hours.
-
Seek the tracing information from the telephone company no more than once
a day and, except in unusual circumstances, only during regular business
hours.
-
Each order should contain a clause forbidding the phone company to disclose
that a trace is or has been in progress. A telephone company should be given
the opportunity for a closed hearing before the issuing judge to seek limitations
of any proposed order if the telephone company feels the order is too burdensome.
-
Exhibits 9.4.6-3 and 9.4.6-4 are examples of narratives for an application
and a model court order for obtaining trap and trace information.
-
Use Form 9170, Request for Pen Register and/or Trap and Trace Devices, to
request approval.
|
|
-
Use of electronic tracking devices is permitted only in cases involving a
felony violation or in wagering tax investigations if:
-
The person in lawful possession of the vehicle or personal property consents
to the installation.
-
The vehicle is not located where a reasonable expectation of privacy exists.
-
The tracking device will be installed on the vehicle in a manner that would
not violate a reasonable expectation of privacy.
-
Authorized by a court order.
-
The Chief, CI, may authorize consensual use of electronic tracking devices.
The Chief, with the concurrence of District Counsel and the local U.S. Attorney's
office, may authorize use of electronic tracking devices in situations described
in (b) above. Electronic tracking devices will not be used in investigations
involving misdemeanor violations (other than wagering investigations).
|
|
-
The Chief, CI, may allow application for court orders authorizing the
installation of an electronic tracking device in the investigation of felony
violations and in the enforcement of the wagering tax laws. The Chief will,
with the approval of the District Director, obtain the approval of District
Counsel on the legal sufficiency and form of affidavits in support of an
application for a court order authorizing the installation and use of an
electronic tracking device(s) prior to contacting the U.S. Attorney or Strike
Force Attorney. Telephonic approval may be obtained 24 hours a day from District
Counsel in situations requiring immediate action. Upon approval by the District
Director and District Counsel, submit by memorandum a request for installation
of an electronic tracking device to the Assistant Commissioner, CI. If
appropriate, consideration should be given to transmittal of a written request
via telephone communication facilities (fax). When time and communication
facilities are insufficient to accomplish a written request, the needed
information may be orally transmitted to the Assistant Commissioner, CI.
An oral request for approval must be confirmed in writing and submitted within
2 working days after the oral request is made. After the request has been
approved by the appropriate officials and returned by the Assistant
Commissioner's, CI, office, the Chief will contact the U.S. Attorney or Strike
Force Attorney to determine whether they concur in the legal sufficiency
and form of the affidavits and whether they will apply for the necessary
court order.
|
|
-
The request for approval should contain the following information:
-
Investigation name, number and activity code from the CIMIS Users Handbook.
-
Identification of vehicle or personal property on which the equipment will
be installed.
-
Reasons for the use of the electronic tracking device.
-
Names and titles of all persons who will install equipment.
-
The duration and the date the surveillance will begin. The authorization
should conform to the time limits established by the court order, not to
exceed 60 days. When the beginning date is set, consider the time needed
to obtain the equipment and the time for the request to be considered. If
the beginning date is not known, this should be stated in the request and
the district should provide this information by telephone to the National
Operations Division, Special Investigative Techniques (OP:CI:O:S) on the
first workday after installation of the electronic tracking device.
-
A statement that District Counsel concurs that the proposed affidavit in
support of the application is legally sufficient.
-
A copy of the proposed affidavit.
-
The name and title of the U.S. or Strike Force Attorney who will apply for
the court order.
-
Information regarding the substance of the case(s).
-
Contact the U.S. Attorney or Strike Force Attorney for the purpose of issuance
of a court order by a federal magistrate or judge upon receipt of the final
approval.
-
If the authorization is not utilized, a memorandum will be submitted to the
Assistant Commissioner, CI, setting forth the reasons why. Include the
investigation(s) seeking the authorization.
-
If an extension is necessary, submit a request summarizing results to date
to the Assistant Commissioner, CI, for consideration no later than (5) days
before the end of the prior authorization. The request will set forth the
number of days that the extension is sought.
-
If additional tracking devices need to be installed or tracking device(s)
installed in a different location, submit a request setting forth the reasons.
This request should include the identification of the vehicle or personal
property on which the tracking device(s) will be installed. The request for
an extension of time can be combined with this authorization request if they
occur simultaneously.
|
[9.4] 6.8 (03-02-1999)
Restrictions on Electronic Surveillance Techniques
|
-
Permanent installation of concealed microphones, recording equipment and
similar devices in IRS offices is prohibited. Temporary installations are
permitted only when authorized in accordance with the requirements for consensual
and non-consensual monitoring.
-
The use of transmitters or other devices to assist in trailing vehicles or
personal property is permitted only if the person in lawful possession of
the vehicle or property consents to the installation, or when authorized
by a court order. (See Use of Electronic Tracking Devices.)
-
Transmitters or other radio signal sending equipment to facilitate communication
between investigators or persons acting under their supervision to coordinate
surveillance or raids is permitted without prior supervisory approval.
-
Investigative devices may be installed and utilized to intercept, overhear,
or record conversations in public telephone booths or any other type of public
telephone. The equipment must be installed immediately prior to the consensual
monitoring and removed immediately thereafter.
-
Miniature recorders and radio transmitters will not be used surreptitiously
in conducting routine surveys and interviews with third parties, unless
consensual monitoring is authorized.
-
Field offices may procure sensitive type equipment only to the extent provided
for in the Fiscal and Personal Handbook, 9.11, Chapter 3, Investigative Property.
Special agents may not use sensitive type equipment procured personally by
them for investigative purposes.
-
Permission to employ eavesdropping devices can only be granted to special
agents. The equipment can only be used by them or by personnel acting under
their direction. The prohibitions and limitations outlined apply equally
to non-Service personnel who act at the direction of special agents.
-
Radio scanners may be used by special agents to avoid unintentional interference
from local police during surveillances.
-
Radio scanners should not be used to listen to transmissions on other radio
frequencies (e.g. mobile telephones and business radio) Normally, citizens
band transmissions can be monitored unless there is reason to believe that
a base station is using a wire link that is supplied by a common communications
carrier.
|
|
-
The government's use of video equipment to covertly intercept and televise
a meeting without the consent of a party, does not violate Title I when there
is no interception of oral, wire or electronic communication. A search warrant
issued pursuant to Rule 41 of the Federal Rules of Criminal Procedure is
required if there is an expectation of privacy.
|
|
-
Use of a video camera to observe activity which is viewable by the public,
either because members of the public can lawfully access the area where this
activity occurs or can see the activity from a lawful vantage point, does
not generally constitute an intrusion into a constitutionally protected private
interest. A warrant is generally not required to visually record activities
that occur in publicly accessible areas such as public parks, sidewalks,
streets, open fields, or other areas outside the curtilage of the home which
are commonly accessible to the public.
-
The Supreme Court stated that the Fourth Amendment is not extended to require
law enforcement officers to shield their eyes when passing a home on a public
thoroughfare. Officers may use video surveillance to assist them in observing
certain areas even when the areas are within the curtilage of one's home
if others can observe these same areas from a place they are lawfully entitled
to be, such as from the street, sidewalk, or an open field. This would include
unobstructed video surveillance of driveways, front doorways, and yards of
businesses or houses.
-
Applying the above rationale, it has been held that video surveillance of
an area of the workplace which was accessible and viewable by others during
work hours did not require a warrant and did not violate the Fourth Amendment.
This rationale must not be universally applied as the facts of each case
must be considered. In the context of an employee's work station or area,
courts have found privacy interests in employees' desks and files.
|
[9.4]
6.9.2 (03-02-1999)
Public Access and Other Areas Entitled to Fourth Amendment Protection
|
-
Video surveillance into public areas, such as a rest room, where one would
reasonably expect their actions to be private must comply with Fourth Amendment
standards and may require a warrant.
|
[9.4]
6.9.3 (03-02-1999)
Video Surveillance When Consenting Party is Present
|
-
Police officers may also observe and video undercover officer(s) or cooperating
witness(es) with subjects if the meeting on private premises is controlled
by the officer or witness. In this situation, the subjects expose their actions
to a participant (the undercover officer or cooperating witness) who consents
to the video monitoring.
|
|
-
Aerial surveillance is not subject to Title I restrictions and is generally
not a search within the meaning of the Fourth Amendment.
-
The Supreme Court rulings are based upon whether or not a person has a
constitutionally protected reasonable expectation of privacy. This involves:
-
Whether the person expected privacy; and
-
Whether society recognizes that expectation as being reasonable.
-
The Court also said that an individual taking measures to restrict views
of his activities does not preclude and officer's observation from a public
vantage point where he has a right to be and which renders the activities
clearly visible. In these cases, the police observations took place within
public navigable airspace, in a physically non-intrusive manner, and any
member of the flying public in the airspace who cared to glance down could
have made the same observations. The Fourth Amendment does not require a
search warrant in order to observe what is visible to the naked eye. If some
enhancement device is used during the overflight, the general rule may not
apply.
|
|
-
Aircraft may be used in investigative situations such as:
-
Surveillance.
-
Electronic tracking.
-
Communications relay.
-
Aerial photography.
-
Undercover support or
-
Expeditious transport or agents or equipment in emergency situations.
-
Federal, state, and local government aircraft should be used where available.
When not available, aircraft will be rented or leased from a local aviation
service. When a decision is made to rent or lease an aircraft, the following
procedures should be used:
-
Prepare and forward a requisition to the appropriate payment office; or
-
Establish an imprest fund in support of the operation.
-
To pilot an aircraft, special agents must meet the following minimum standards:
-
500 hours flight time.
-
100 hours cross-country flight time
-
100 hours of actual or simulated instrument flight time.
-
FAA Commercial Pilot Certificate (appropriate category).
-
Current FAA instrument ratings; and
-
Current FAA Second-Class Medical Certificate.
-
The minimum crew for aircraft surveillance will be a pilot and an observer.
Except for the pilot, only special agents or other federal, state, or local
law enforcement agents or officers will conduct surveillance.
-
All aircraft will be operated under Federal Aviation Administration certification
and Federal Aviation Regulations. Aircraft will be flown in accordance with
the applicable flight manuals and performance limitations. Any deviation
shall be approved in advance by the local Federal Aviation Administration.
Aircraft accidents or incidents shall be reported to the National Transportation
Safety Board in accordance with National Transportation Safety Board Regulations.
|
[9.4]
6.11 (03-02-1999)
Report of Information Received From State or Local Agencies
|
-
The Chief, CI, will submit a report, through channels, including the District
Director to the Assistant Commissioner, CI , concerning electronic surveillance
information received from state or local agencies. The report will be submitted
within 30 days after the information is received.
-
The report of electronic surveillance information received from a state or
local agency shall contain:
-
The investigation name and number (if applicable).
-
The names of the persons whose conversations were monitored, if applicable.
-
A summary of the information obtained, to include the names of all individuals
mentioned in the monitored conversations.
-
The locations (address) where any monitored conversations took place and,
if applicable, the telephone number of the telephone on which the monitoring
equipment was installed.
-
The name of the agency that conducted the electronic surveillance.
-
The periods of time that the equipment was used (dates and times) and
-
The name of the IRS employee who has custody of the records relating to the
monitoring, or the name and location of the IRS activity to which the information
was transmitted.
|
|
Exhibit [9.4] 6-1 (03/02/99)
Surveillance Checklist
> |
(1) |
Pre-Operation Intelligence Gathering |
|
|
a. |
Determine surveillance objectives. |
|
b. |
Research agency files for any information on the target. |
|
c. |
Research personal and criminal background. |
|
d. |
Obtain photographs and physical descriptions from reliable sources. |
|
e. |
Determine description and license numbers of all vehicles belonging to
target, target's close family members, and associates. |
|
f. |
Find out if target or associate is known to carry weapons or prone to
violence. |
|
g. |
Identify prior method of operation. |
|
(2) |
Site Survey |
|
|
a. |
Prepare diagram of site for all members of team with all points of entry
and exit noted. |
|
b. |
Determine how many agents are needed to cover your objective. |
|
c. |
Give each team member a detailed street map of the site and surrounding
areas. Note nearest hospital and trauma centers. |
|
d. |
Determine if site is located in high risk area. If so, decide additional
defensive equipment requirements. |
|
e. |
Determine details members need to know about the area. |
|
(3) |
Staffing: |
|
|
a. |
Select trained and experienced agents (consider those who work and practice
together). |
|
b. |
Consider male/female teams and two-member teams in each vehicle. |
|
c. |
If possible, choose agents who will blend into the environment in terms
of dress, color, race, and language. |
|
(4) |
Equipment: |
|
|
a. |
Test all radio equipment (vehicle and portable). Insure accessories,
such as ear pieces, are available and working. |
|
b. |
Make sure there is sufficient change for telephone calls, parking, tolls,
and admittance fees. |
|
c. |
Make available a first aid kit; jumper cables; spare batteries for hand
held radios, flashlights, and other equipment; flashlight for each automobile,
and flares. |
|
d. |
Consider a tape recorder for surveillance notes. |
|
e. |
Provide hand-held radios for each passenger in two-person moving
surveillance, as well as a method of concealment for hand-held radios used
during foot surveillance. |
|
f. |
Consider a change of clothing or disguise. |
|
g. |
Other items to consider are a portable repeater, mobile cellular telephone,
hand held bullhorn or loudspeaker device, binoculars, telescopic lenses,
starlight scopes, redlights, sirens, and P.A. systems. |
|
h. |
Review site-survey for other equipment needs particular to the site. |
(5) |
Communications: |
|
|
a. |
Field test all radios and base stations. Consider areas which may be
dead zones. Make sure repeater(s) are operating properly. |
|
b. |
Determine radio codes for target, associates, locations, and alternate
plans. |
|
(6) |
Pre-Operational Briefing: |
|
|
a. |
Ensure all surveillance team members understand that no assignment
is worth the loss of life or serious injury. Be prepared to sacrifice operational
success for the sake of safety. |
|
b. |
Discuss objectives of surveillance and techniques, methods, and equipment
to be used. Discuss how the surveillance fits into the big picture. |
|
c. |
Discuss results of intelligence gathering. Distribute all data, sketches,
floor plans, photographs, telephone numbers, addresses, pager numbers, etc. |
|
d. |
Discuss the surveillance log and what it should contain. |
|
e. |
Discuss proper radio communications to include codes to identify contingency
plans, targets, and locations. Designate radio channels to be used. |
|
f. |
Distribute and test all equipment. |
|
g. |
Discuss plans to detect counterintelligence against the surveillance
team. |
|
h. |
Discuss potentially dangerous situations. |
|
i. |
If appropriate, team members should visit target areas prior to execution
date for familiarization of entranceways, exits, people, dress, attitudes,
and geographic area to include detection traps such as one-way and dead-end
streets. |
|
j. |
Inform each driver to make sure gas tank is full prior to beginning each
day's activity. |
|
(7) |
Post-Operational Review: Identify and discuss problems with
tactics, equipment, training, etc., and make sure solutions are addressed. |
|
|
Exhibit [9.4] 6-2 (03/02/99)
Risk Assessment Guide Checklist
> |
(1) |
List comments and level of risk for each of the following
considerations: |
|
(2) |
TIME OF DAY |
|
|
a. |
Day/Hour |
|
b. |
Night/Hour |
|
(3) |
EXPECTATION OF FORCED ENTRY |
|
|
a. |
Open |
|
b. |
Locked |
|
c. |
Fortified |
|
(4) |
LOCATION CONCERNS |
|
|
a. |
Type of structure, apartment, private residence, or business |
|
b. |
Number of entrance areas to structure |
|
c. |
Neighborhood concerns |
|
d. |
Illegal Activity |
|
e. |
Legal Activity |
|
f. |
Lookouts |
|
g. |
Concealed areas |
|
h. |
Alarms or booby traps |
|
i. |
Drug lab on the premises or chemicals which could cause explosion |
|
j. |
Money or drugs on site |
|
(5) |
ANIMALS |
|
|
a. |
Kind (attack dogs) |
|
b. |
Number |
|
c. |
Countermeasures |
|
(6) |
PROXIMITY OF LOCAL |
|
|
a. |
Hospital |
|
b. |
Police Department |
|
c. |
Fire Department |
|
(7) |
PERSONS EXPECTED TO BE PRESENT |
|
|
a. |
Number of persons |
|
b. |
Criminal history |
|
c. |
Militant |
|
d. |
Foreign language requirement |
|
e. |
Martial artist |
|
f. |
Medical concerns |
|
g. |
Children present |
|
h. |
Uninvolved individuals |
|
i. |
Undercover agent on scene |
|
j. |
Risk of flight |
|
(8) |
WEAPONS EXPECTED TO BE PRESENT |
|
(9) |
COUNTER SURVEILLANCE/OPERATIONAL SECURITY |
|
|
a. |
Electronic devices |
|
b. |
Leaks to media and others |
|
(10) |
TEAM PERSONNEL |
|
|
a. |
Multi-agency coordination |
|
b. |
Training and experience level |
|
(11) |
LOGISTICS |
|
|
a. |
Visibility of agent staging area |
|
b. |
Command post site (primary) |
|
c. |
Alternate post site (if necessary) |
|
|
Exhibit [9.4] 6-3 (03/02/99)
Application
> |
(1) |
The following is an example of a narrative for use in the
application for an order authorizing the installation and use of a device
to trap and trace originating telephone numbers. |
|
(2) |
The United States, by its attorney John Doe, moves this court
pursuant to Fed. R. Crim. P. 57(b), to grant an order (1) authorizing the
installation and use of an electronic or mechanical device to trace and identify
the telephone numbers of parties placing calls to telephone number 555-123-4567
located at 1234 Any St., Anytown, USA, and subscribed to by Jane Roe and
(2) directing the Great Telephone Company of Northern Virginia, a communication
common carrier as defined in Section 2510(10) of Title 18, United States
Code, to furnish forthwith Special Agent Richard Moe of Internal Revenue
Service all of the information facilities and technical assistance necessary
to unobtrusively accomplish such tracing and identification, including
installation and operation of the device. |
|
(3) |
In support of this application, the United States represents
as follows: 1. Richard Moe, Special Agent of the Internal Revenue Service,
has been engaged in an investigation of Jane Roe for violations of federal
laws, including 26 USC 7201; 2. It is believed that Jane Roe uses telephone
number 555-123-4567 located at 1234 Any St., Anytown, USA, and subscribed
to by Jane Roe to discuss her criminal activity, to conduct her criminal
activity, and/or to further criminal activity; 3. It is believed that information
concerning the above-mentioned offenses, additional co-conspirators, and
the victims of these offenses will be obtained upon discovery of the numbers,
locations, and subscribers of the telephones from which 555-123-4567 is called. |
|
(4) |
Wherefore it is respectfully requested that this court grant
an order: (1) authorizing the installation and use of an electronic or mechanical
device to trace and identify the telephone numbers of, and the name and address
of the subcriber of record to, each identified incoming call to telephone
number 555-123-4567; (2) directing the Great Telephone Company of Northern
Virginia, a communication common carrier as defined in Section 2510(10) of
Title 18, United States Code, to forthwith furnish Richard Moe, Special Agent
of the Internal Revenue Service, with all information, facilities, and technical
assistance necessary to accomplish the tracing and recording, including
installation and operation of the device, unobtrusively and with a minimum
of disruption to normal telephone service; (3) directing the Great Telephone
Company of Northern Virginia to provide Richard Moe, Special Agent of the
Internal Revenue Service at reasonable intervals during regular business
hours with the results of the tracing and identification, including the telephone
number of, and the name and address of the subscriber of record to, each
identified incoming call to telephone number 555-123-4567 and, where possible,
the time and duration of each such call; and (4) further directing that the
Great Telephone Company of Northern Virginia, its agents and employees shall
not disclose to the listed subscribers of the above-mentioned telephone numbers,
nor to any other person, the existence of this order or of this investigation,
unless otherwise ordered by the court. Furthermore, it is respectfully requested
that the court's order be limited in the following respects: a. The tracing
operation shall be limited to Electronic Switching System (ESS) or No. 5
cross-bar facilities; b. The tracing operation shall be restricted to tracing
and recording only those calls originating from a 10-mile radius of Anytown,
USA; c. The tracing operation shall be restricted to the hours of 9 a.m.
to 9 p.m. daily; d. The court's order shall be in effect for 60 days from
the time it is granted. |
|
Respectfully Submitted,
Assistant United States Attorney |
|
|
Internal Revenue Manual
|
Hndbk. 9.4 Chap. 6 Surveillance and Non-Consensual Monitoring
|
(03-02-1999)
|
|
|