Tax Notes logo
Part 9. Criminal InvestigationChapter 4. Investigative Techniques

9.4.6. Surveillance and Non-Consensual Monitoring


9.4.6. Surveillance and Non-Consensual Monitoring

9.4.6 Surveillance and Non-Consensual Monitoring

Manual Transmittal

August 09, 2024

Purpose

(1) This transmits IRM 9.4.6, Surveillance and Non-Consensual Monitoring.

Material Changes

(1) Added required Internal Controls to comply with IRM 1.11.2.2.4, Address Management and Internal Controls and IRM 1.4.2, Resource Guide for Managers Monitoring and Improving Internal Controls.

(2) Removed § throughout the IRM.

(3) Editorial changes made throughout the IRM for clarity.

Effect on Other Documents

This IRM supersedes IRM 9.4.6, September 03, 2020.

Audience

Criminal Investigation (CI)

Effective Date

(08-09-2024)


Guy A. Ficco
Chief, Criminal Investigation

Program Scope and Objectives

(1) Purpose: Criminal Investigation surveillance techniques include the following types of surveillance:

  1. Physical/Visual,

  2. Electronic,

  3. Internet,

  4. Video,

  5. Aerial surveillance.

(2) Audience: All CI employees.

(3) Policy Owner: Director, Special Investigative Techniques (SIT).

(4) Program Owner: Director, SIT.

(5) Primary Stakeholders: All CI employees.

(6) Contact Information: To make changes to this IRM section email CIHQIRM@ci.irs.gov.

Background

(1) Enforcement activities include a wide spectrum of Criminal Investigation (CI) activities. Surveillance is an enforcement technique used to obtain information, leads, and evidence.

Authority

(1) See IRM 9.1.4, Authority for the delegated authority relating to IRM 9.4.6, Surveillance and Non-Consensual Monitoring.

Roles and Responsibilities

(1) The Director, SIT is responsible for overseeing this IRM and ensuring compliance with current policies and procedures.

Program Management and Review

(1) Program owners and the Director, SIT will:

  1. Review the IRM annually.

  2. Update the IRM when content is no longer accurate and reliable.

  3. Incorporate all permanent interim content into the next revision of the IRM section prior to the expiration date.

Program Controls

(1) The Director, SIT and program owners will review instructions and guidelines related to special agent reports and other IRS documents for procedural, operational, and editorial changes.

Acronyms

(1) The table lists commonly used acronyms and their definitions:

Acronym

Definition

CI

Criminal Investigation

CIMIS

Criminal Investigation Management Information System

CIS

Computer Investigative Specialist

CT

Criminal Tax

CTC

Computer Telecommunications Coordinator

DNR

Dialed Number Recorder

ECPA

Electronic Communications Privacy Act

ESS

Electronic Switching System

Fed. R. Crim. P.

Federal Rules of Criminal Procedure

NTSB

National Transportation Safety Board

SAC

Special Agent in Charge

SCA

Stored Communications Act

SIT

Special Investigative Techniques

SSA

Supervisory Special Agent

Related Resources

(1) IRM 9.4.7, Consensual Monitoring.

(2) IRM 9.4.8, Undercover Operations.

(3) IRM 9.4.9, Search Warrants, Evidence and Chain of Custody.

General

(1) The following applies to CI physical/visual surveillance techniques:

  1. Surveillance may be conducted as part of a subject, primary, or general investigation.

  2. A journeyman level special agent (GS-1811-12 and above) may conduct surveillance as deemed necessary. A special agent below the journeyman level must obtain prior approval from the Supervisory Special Agent (SSA) for all surveillance activity except under those circumstances where immediate surveillance is necessary and the SSA cannot be contacted. In such instances, the special agent should advise the SSA as soon as practicable of the circumstances that precluded obtaining prior approval.

  3. If, during the surveillance, the special agent must assume an identity other than his/her own requiring cover documents, approval for use of these documents must be obtained from the Director, Field Operations or his/her designee (see LEM 9.14.3, Undercover Operations).

  4. Surveillance conducted in a high crime area, either on foot or in a vehicle, requires the participation of at least two special agents. Surveillance requiring the use of a vehicle should be conducted in a government owned vehicle that has two-way radio equipment.

Documentation of Surveillance Activity

(1) The following documentation is required:

  1. Surveillance Checklist (see subsection 9.4.6.5).

  2. Risk Assessment (see subsection 9.4.6.6).

  3. Daily notes of pertinent surveillance activity must be prepared by all participants.

  4. Written summary of daily notes must be prepared at the completion of surveillance.

Reasons for Conducting Surveillance

(1) The following are some of the reasons for conducting surveillance:

  1. To obtain evidence of a crime or to identify persons who have indicated they have committed or intend to commit a crime, or who may be involved in the crime being investigated,

  2. To locate persons by watching locations and associates historically visited by the subject of the surveillance,

  3. To obtain detailed information about a subject's activities,

  4. To corroborate the reliability of informants,

  5. To locate hidden property,

  6. To obtain probable cause necessary to secure a search warrant,

  7. To obtain information for later use in interrogations or interviews,

  8. To develop leads and information received from other sources,

  9. To know, at all times, the whereabouts of an individual.

Surveillance and Undercover Distinguished

(1) It is important to distinguish between those investigative techniques which are used in surveillance activities and those which may be utilized during certain undercover operations.

Surveillance Characteristics

(1) The following characteristics apply to surveillance activities.

  1. The purpose is to observe ongoing activities and individuals.

  2. Interaction with subjects and third parties is usually not initiated.

  3. Conversations are incidental to the surveillance.

  4. Conversations are not monitored or recorded.

  5. The special agent has limited cover. The purpose of the cover is to protect the integrity of the surveillance.

  6. Local special agents are used.

  7. Special agents need not be trained in undercover techniques.

  8. See subsection 9.4.6.8 concerning internet surveillance.

(2) Surveillance activity bears little resemblance to an undercover operation. The following situations indicate the surveillance activity has evolved into an undercover operation:

  1. Reliance on cover identities increases,

  2. Contacts with subjects and other individuals are more in-depth,

  3. Agents become participants, rather than mere observers of the activities of interest.

(3) The SAC is responsible for ensuring surveillance activities do not evolve into undercover operations without first obtaining the authorization set forth in IRM 9.4.8, Undercover Operations.

Undercover Operation Characteristics

(1) The following characteristics apply to undercover operations:

  1. The purpose is to initiate or participate in activities with identified subjects or objectives.

  2. Interaction with subjects and third parties is sought.

  3. Undercover agents or other authorized individuals initiate and direct conversations to further the objectives of the operation.

  4. Conversations may be monitored and recorded.

  5. A covert identity is required to obtain evidence. This cover is used as a basis for contacts with targets or witnesses. However, the lack of a documented cover does not mean the activities engaged in do not constitute an undercover operation.

Surveillance at Public Meetings

(1) Attendance at public meetings that promote conduct in violation of the Internal Revenue Code is to be distinguished from attendance at peaceful demonstrations in general opposition to the Sixteenth Amendment. Treasury Department policy directs that no information should be collected at peaceful demonstrations which involve the exercise of First Amendment rights without first contacting the office of the Treasury Under Secretary for Enforcement. In such situations, the SAC, with the concurrence of the Director, Field Operations will notify the Chief, CI, who will contact the Treasury Under Secretary for Enforcement.

(2) At those public meetings that actually promote conduct in violation of the Internal Revenue Code, surveillance activities will be limited to:

  1. Identifying the leading figures at the meeting,

  2. Obtaining information concerning methods used to violate tax laws.

(3) Special agents may identify those individuals who attend such meetings and who admit or indicate they:

  1. Have committed or intend to commit a tax violation or other crime,

  2. Advocate that others commit violations of the tax law or commit other crimes,

  3. Advocate the use of threats or assault tactics in dealing with IRS personnel or other Federal, state, or local law enforcement personnel.

(4) An example of an appropriate surveillance technique for identifying individuals who attend public meetings and either admit or advocate the violation of laws, or otherwise express an intent to do so, is as follows:

An unidentified member in the audience at a public meeting states that they have not filed Federal income tax returns for several years and never intends to file such returns again. Special agents may observe this person enter an automobile and record the license plate number on the automobile in order to attempt to properly identify them. If there is a likelihood the individual is driving a borrowed or leased automobile, or is riding with someone else, the agents may continue the surveillance in an attempt to establish a positive identification.

Public Meetings Defined

(1) The following criteria may be considered to determine whether or not a meeting is public:

  1. Where the meeting will be held,

  2. If members of the press will be present or involved,

  3. If there are any unreasonable restrictions upon entry,

  4. If public notice of the meeting has been given.

Recording The Proceedings Of Public Meetings

(1) Recording the proceedings of a public meeting is a permissible means of surveillance.

(2) Consensual monitoring authorization must be obtained pursuant to IRM 9.4.7, Consensual Monitoring.

Surveillance Checklist

(1) The surveillance team leader is responsible for reviewing the surveillance checklist. If the surveillance involves an undercover operation, refer to the applicable undercover checklist.

Risk Assessment Guide

(1) A risk assessment should be completed to assess the potential risk of the surveillance activity. The risk assessment should be discussed with the surveillance team prior to the surveillance.

(2) The assigned special agent should comment on each of the considerations set forth in the risk assessment guide and record the level of risk (low, medium, or high) associated with each consideration.

(3) The SSA and the SAC must review the completed risk assessment guide to determine if the operation can be accomplished safely.

(4) If the operation cannot be accomplished safely, the special agent should abandon any further planning activity.

(5) All approved risk assessment forms should be maintained in the investigative folder or filed electronically.

Electronic Surveillance

(1) The following subsections refers to electronic surveillance and the monitoring of electronic communications.

General

(1) The "Electronic Communications Privacy Act" (ECPA) of 1986, Pub. L. No.99-508, 100 Stat.1848, amended Title III of the Omnibus Crime Control and Safe Streets Act of 1968 (18 USC 2510 et. seq.). This legislation significantly revised Title III to reflect technological advances in electronic communications. It also added provisions: (1) specifying how government entities may obtain access to stored electronic communications; and (2) updating the provisions relating to pen registers and trap-and-trace devices. The ECPA provisions amended or modified the following statutes:

  1. Title I-Interceptions of Communications and Related Matters (codified in 18 USC 2510 et. seq.). As originally enacted, the wiretap statute regulated the real-time acquisition of "wire" and "oral" communications. A "wire communication" is the transmission of human voice over a "wire" (" telephone circuit") or other means of electronic communication. An "oral communication" is a conversation between or among individuals in circumstances in which there exists an expectation that the communication will not be "intercepted." The ECPA added "electronic communications" to the wiretap statute and provided slightly different rules for obtaining orders for the real-time acquisition of such communications.

  2. The ECPA provides rules for the real-time acquisition of wire, oral, or electronic communications, as well as the acquisition of stored wire and electronic communications (see subsection 9.4.6.7.3).

(2) Orders for real time interceptions (i.e., "wiretaps") have traditionally been referred to as "Title IIIs" or "T-IIIs" because the authority to obtain such orders originated in Title lll of the Omnibus Crime Control and Safe Streets Act of 1968. This section refers to such orders simply as "wiretap" orders.

  1. Title II-Stored Wire and Electronic Communications and Transactional Records Access (codified in 18 USC 2701 et. seq.).

  2. Title III-Pen Registers and Trap-and-Trace Devices (codified in 18 USC 3121 et. seq.).

  3. On October 25, 1994, Congress enacted the Communications Assistance for Law Enforcement Act, Pub. L. 103-414, Oct. 25, 1994, which amended certain provisions of Titles I, II, and III of ECPA and became effective on January 6, 1995. The Communications Assistance for Law Enforcement Act is intended to preserve the government's ability, pursuant to court order or other lawful authorization, to intercept communications involving advanced technologies (e.g., digital or wireless transmission modes), or features and services (e.g., call forwarding, speed dialing and conference calling), while protecting the privacy of communications and without impending the introduction of new technologies, features, and services. To guarantee that law enforcement agencies can continue to conduct authorized interception in the future, the Communications Assistance for Law Enforcement Act requires telecommunications carriers to ensure that their systems have the capability to: (1) isolate the content of targeted communications transmitted by the carrier within the carrier's service area; (2) isolate the information identifying the origin and destination of targeted communications; (3) provide intercepted communications and call identifying information to law enforcement agents so they can be transmitted over lines or facilities leased by law enforcement agents to a location away from the carrier's premises; and, (4) carry out interceptions unobtrusively, so targets are unaware of the interception and in a manner which does not compromise the privacy and security of other communications. The Communications Assistance for Law Enforcement Act allows the industry to develop the standards to implement the equipment.

  4. On October 25, 2001, Congress passed the United Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism (USA Patriot Act) of 2001, Pub.L. 107-56, Oct. 25, 2001, which became effective on October 26, 2001. The purpose of the USA Patriot Act is to deter and punish domestic and international terrorist acts, as well as to enhance law enforcement investigatory tools. Title II (Enhanced Surveillance Procedures) of the USA Patriot Act amends certain provisions of ECPA, the Communications Assistance for Law Enforcement Act and 18 USC Chapters 119 (Wire and Electronic Communications Interception of Oral Communications), 121 (Stored Wire and Electronic Communications and Transactional Records Access) and 206 (Pen Registers and Trap and Trace Devices.

(3) Interception of wire, oral, or electronic communications without the consent of a party to the communication.

  1. Non-consensual Monitoring of Oral and Wire Communications -
    The non-consensual interception of oral and wire communications is restricted to those investigations which involve the felonies listed in 18 USC 2516. Although, that section does not refer to tax crimes, the felonies listed therein include 18 USC 1956 and 18 USC 1957 (money laundering offenses), and certain offenses for which 31 USC 5322 provides the criminal penalties related to currency reporting offenses. IRS policy therefore restricts the use of non-consensual interception of oral and wire communications to "extremely limited situations" and only in "significant money laundering investigations."

  2. Non-consensual monitoring of Electronic Communications -
    18 USC 2516(3) authorizes the real time interception of electronic communications to investigate any Federal felony.

  3. Access to Stored Electronic Communications -18 USC 2703 specifies the means by which law enforcement (government) may obtain access to stored electronic communications and transactional records.

  4. Title 18 USC 3122 authorizes the use of pen registers and trap and trace devices for investigations of all Federal felonies.

Restrictions on Electronic Surveillance Techniques

(1) The permanent installation of concealed microphones, recording equipment, and similar devices in IRS offices is prohibited. Temporary installations are permitted only when authorized in accordance with the requirements for consensual and non-consensual monitoring.

(2) The use of transmitters or other devices used to assist in trailing vehicles or personal property is permitted pursuant to subsection 9.4.6.7.5 and 18 USC 3117.

(3) Although mechanical devices may be used to intercept, overhear, or record conversations at public telephones, pursuant to the procedures outlined in 18 USC 2510, et seq., extreme care must be exercised to segregate conversations of innocent third parties from conversations of the identified subject(s). In each instance of monitoring, the equipment must be installed immediately prior to monitoring the identified subject and removed immediately thereafter. Due to the potential for inadvertent monitoring of innocent third party conversations and the elevated standard of probable cause required for this type of monitoring, it is rarely used; however, extreme caution should be exercised when this technique is utilized.

(4) Miniature recorders and radio transmitters will not be used surreptitiously in conducting routine surveys and interviews with third parties unless consensual monitoring is authorized.

(5) Field offices may not purchase, fabricate, or arrange for the manufacture of any equipment or accessories designed to acquire communications of any type without obtaining approval from the Associate Director, Security and Technical Operations or his/her designee. The acquiring field office shall enter all such equipment into the Criminal Investigation Management Information System (CIMIS).

(6) Permission to employ eavesdropping devices may only be granted to special agents or to personnel acting under their direction. The approval process, prohibitions, and limitations outlined in this section apply equally to non-IRS personnel who act at the direction of special agents.

(7) Title 18 prohibits the use of radio scanners to listen to transmissions on wireless telephone frequencies (e.g., mobile telephones or cordless telephones). Monitoring of wireless transmissions requires a wiretap order pursuant to 18 USC 2518. Normally, citizens band radio transmissions may be monitored unless there is reason to believe that a base station is using a wire link supplied by a common communications carrier.

(8) A search warrant issued pursuant to Rule 41, Federal Rules of Criminal Procedure, is required to obtain evidence that cannot be observed from a public place with the naked eye. Federal statutes and the Supreme Court have placed restrictions on the use of sense enhancing devices. The local Criminal Tax attorney should be consulted prior to the use of such technology.

Real Time - lnterceptions of Communications and Related Matters

(1) The "wiretap statute", 18 USC 2510 et. seq., governs the interception of wire, oral, and electronic communications in transmission (i.e., "real-time" interceptions) through the use of electronic, mechanical, or other devices.

Definitions

(1) Contents are defined by 18 USC 2510(8) to include any information concerning the substance, purpose, or meaning of any given communication.

(2) A wire communication is defined as a communication that involves the human voice being transmitted through the use of a wire, cable, or similar method between the points of origin and reception (see 18 USC 2510(1) and (18).) In addition, tone-and-voice pagers are included within the definition of a wire communication, and the interception of the human voice segment must be treated the same as a wire interception. A conversation on a telephone is a wire communication.

(3) An oral communication is "any oral communication uttered by a person exhibiting an expectation that such communication is not subject to interception under circumstances justifying such expectations, but this term does not include any electronic communication." A conversation between two or more individuals who have a reasonable expectation that the conversation will not be intercepted constitutes an oral communication.

(4) An electronic communication is defined as "any transfer of signs, signals, writing, images, sounds, data, or intelligence of any nature transmitted in whole or in part by a wire, radio, electromagnetic, photo-electronic, or photo-optical system that affects interstate or foreign commerce." The term electronic communication does not include communications containing the human voice. An electronic communication includes the "real-time" point-to-point transmission of, for example, digital display pager information, electronic mail, computer-to-computer transmissions, facsimiles, transmissions, and private video transmissions (but not video surveillance).

(5) Interception means "the aural or other acquisition of the contents of any wire, electronic, or oral communication through the use on any electronic, mechanical, or other device."

(6) Electronic, mechanical or other device is defined by 18 USC 2510(5) to include "any device or apparatus which can be used to intercept a wire, oral or electronic communication other than." Examples of such a device or apparatus include:

  1. Any telephone or telegraph instrument, equipment or facility, or any component thereof (i) furnished to the subscriber or user by a provider of wire or electronic communication service and used by the subscriber or user...in the ordinary course of its business or (ii) being used by a provider...in the ordinary course of its business or by an investigative or law enforcement officer in the ordinary course of his duties.

  2. A hearing aid or similar device being used to correct subnormal hearing to no better than normal.

Note: Merely overhearing a conversation by listening in on an extension telephone or using a "normal" hearing aid is outside the definition of an interception because the telephone set and hearing aid are excluded from the definition of an "electronic or mechanical device."

(7) Consent is defined to mean that one or more of the parties to a wire, oral, or electronic communication has given his/her prior permission that such communication may be intercepted. In the Federal system, one party’s consent is needed, even if the other parties to the conversation are unaware that the communication is being intercepted or recorded.

Access to "Real-Time" Oral Communication - Wiretaps

(1) A "wiretap" is the acquisition of the contents of a wire or oral communication through the use of any electronic, mechanical, or other device where an expectation exists that the communication is not subject to interception. See subsection 9.4.6.7.1(3)(a) for a discussion of those offenses for which wiretaps may be authorized.

(2) The following are not covered by the wiretap statute:

  1. Use of pen registers or trap and trace devices; authority for the use of these techniques is found in 18 USC 3122,

  2. Overhearing of conversations without the aid of electronic, mechanical, or other devices,

  3. Radio or television broadcasts readily accessible by the public,

  4. Tone-only pagers per 18 USC 2510 (12)(B),

  5. Electronic tracking devices, also called transponders or beepers (18 USC 3117),

  6. Marine and aeronautical communication systems per 18 USC 2511(2)(g)(ii)(IV),

  7. Public safety radio systems,

  8. Amateur radio operator services, citizens band radio, and general mobile radio services,

  9. Electronic communications which are readily accessible by the general public,

  10. Physical/visual surveillance,

  11. Individuals’ use of telephone extensions.

(3) Consensual monitoring where one of the parties consents to the monitoring of the conversation or internet communication is addressed and specifically excepted out of the wiretap statute.

Disclosure and Derivative Use Orders

(1) An order to intercept wire, oral, or electronic communication may be obtained only to investigate those offenses enumerated in 18 USC 2516 (Title 26 offenses are not included). However, if the contents of intercepted wire, oral, or electronic communications relate to other criminal acts, that evidence may be used by other law enforcement officers (including CI special agents) in furtherance of their investigations, including Title 26 offenses. Title 18 USC 2517 sets forth a statutory scheme under which the disclosure and use of intercepted oral, wire, or electronic communications is permitted.

(2) Title 18 USC 2517(1) permits law enforcement officers (obtaining officers) who obtain intercepted wire, oral, or electronic communications to disclose such evidence to other law enforcement officers (receiving officers) as is appropriate in the performance of the obtaining and receiving officers’ duties.

(3) Title 18 USC 2517(2) permits law enforcement officers who have lawfully obtained or received intercepted wire, oral, or electronic communications, or evidence otherwise derived from intercepted wire, oral, or electronic communications, to use the contents of that evidence to the extent such use is appropriate for the proper performance of his/her official duties.

(4) Title 18 USC 2517(3) permits law enforcement officers who have obtained or received information from intercepted wire, oral, or electronic communications, or evidence otherwise derived from intercepted communications, to disclose such information while giving testimony under oath in any Federal or state, criminal, or civil proceeding. This includes testimony before a grand jury.

(5) Title 18 USC 2517(5) requires that a court order, referred to as a "derivative use order," be obtained prior to any disclosure as defined in 18 USC 2517(3), of intercepted communications relating to offenses other than those specified in the order of authorization or approval to intercept. Such an order must be obtained prior to any law enforcement officer making any testimonial disclosure of information or evidence relating to intercepted wire, oral, or electronic communications, or evidence derived from such intercepted communications. Such an application should be made as soon as practicable. The derivative use order must be based upon the court's finding that the information and evidence to be disclosed was otherwise properly intercepted. Failure to obtain such an order can result in the dismissal of the case or subject the officer to liability for civil damages related to the unauthorized disclosure.

Evaluation of Wiretap Information

(1) As soon as practicable, information or evidence received by CI special agents from other law enforcement officers that originated from intercepted wire, oral, or electronic communications, or evidence otherwise derived from the intercepted communications or transcripts thereof, will be referred to the SAC, or his/her designee, who should immediately evaluate the potential use for criminal and civil tax purposes.

(2) If it is apparent that the information or evidence is likely to or will be used by IRS in a criminal or civil judicial proceeding, the SAC, or his/her designee, should immediately ascertain whether an 18 USC 2517(5) order covering use by the IRS has been obtained. If an order has not yet been obtained, the SAC or his/her designee should contact and consult with the supervisory Assistant United States Attorney (AUSA) to ensure the order is obtained prior to disclosure.

Wiretap Approval Process

(1) Three situations exist where approval is required for IRS CI special agents' participation in investigations where non-consensual monitoring of voice communications occurs:

  1. When CI special agents are present in the wire room and do NOT have the responsibility of monitoring conversations as they occur.

  2. Criminal Investigation monitoring of non-consensual conversations where an agent from another agency prepared the affidavit in support of an application for monitoring.

  3. Criminal Investigation monitoring of non-consensual conversations where an agent from CI prepared the affidavit in support of an application for monitoring.

Criminal Investigation Special Agents Present in the Wire Room, but DO NOT have the Responsibility of Monitoring Conversations

(1) IRS CI special agents can provide valuable assistance in some investigations using the non-consensual monitoring technique where the assistance DOES NOT involve the real-time monitoring of conversations. The duties may require a scheduled presence in the wire room and require significant resources. The duties include oversight of occurring activity, issuing surveillance assignments, reviewing previously recorded conversations, etc.

(2) Approval of these situations is required in writing by the SAC and must address the significance of the investigation, any issues concerning staffing needs, and any CI equipment to be used during the operation.

Criminal Investigation Monitoring of Non-Consensual Conversations When Criminal Investigation IS NOT the Affiant Agency

(1) A copy of the affidavit and a memorandum from the field office through the Director, Field Operations to Special Investigative Techniques is required. Prior to the memorandum being sent officially to Special Investigative Techniques and through the agent's chain of command, the preparing agent should contact a senior analyst in Special Investigative Techniques responsible for the T-III program for vetting of the memorandum. The memorandum must include the following information:

  1. The complete background of the investigation, including the other participating Federal, state and local law enforcement agencies involved in the investigation. The name of the criminal organization and the criminal offenses which are being investigated.

  2. The significance of the target, organization, or compliance problem being investigated. The type of phone line, telephone number(s) to be monitored, and subscriber information should also be mentioned (e.g., telephone line, cellular telephone, etc.).

  3. Financial information (e.g., how the organization launders proceeds amount of money being wired, increments, and currency seized to date).

  4. Why CI participation in the monitoring is necessary (e.g., due to the volume of calls, or CI has the financial expertise to analyze the information as it is being received to prevent minimization of conversations that other officers or agents might not properly recognize as being material to the financial aspects of the investigation).

  5. The amount of CI resources needed. This number should include separate categories covering the number of special agents actually monitoring the calls and the number of special agents who will assist in surveillance or related support duties.

(2) Upon receipt of the affidavit and memorandum, Special Investigative Techniques will prepare a request for the concurrence of the Chief, CI, and a routing slip seeking the approval from the Deputy Commissioner, IRS.

Criminal Investigation Monitoring of Non-Consensual Conversations When Criminal Investigation IS the Affiant Agency

(1) A copy of the affidavit and a memorandum from the field office, through the Director, Field Operations, to Special Investigative Techniques is required prior to obtaining the court order. Prior to the memorandum being sent officially to Special Investigative Techniques and through the agent's chain of command, the preparing agent should contact a senior analyst in Special Investigative Techniques responsible for the T-III program for vetting of the memorandum. The memorandum must include the following information:

  1. The complete background of the investigation, including the other participating Federal, state and local law enforcement agencies involved in the investigation. The name of the criminal organization and the criminal offenses which are being investigated.

  2. The significance of the target, organization, or compliance problem being investigated.

  3. The type of phone line, telephone number(s) to be monitored, and subscriber information should be mentioned (e.g., telephone line, cellular telephone, etc.).

  4. Financial information (e.g., how the organization launders proceeds (amount of money being wired, increments, and currency seized to date).

  5. The opinion and any recommendations from the field office’s Criminal Tax attorney.

  6. Why CI participation in the monitoring is necessary, such as CI has the financial expertise to analyze the information as it is being received to prevent minimization of conversations that other officers or agents might not properly recognize as being material to the financial aspects of the investigation.

  7. The amount of CI resources needed should be listed in the memorandum. This number should include separate categories covering the number of special agents actually monitoring the calls and the number of special agents who will assist in surveillance or related support duties.

(2) Upon receipt of the affidavit and memorandum, Special Investigative Techniques will forward the affidavit to Division Counsel/Associate Chief Counsel (Criminal Tax) seeking their advice. Special Investigative Techniques will prepare a request for the Chief, CI’s, concurrence and a routing slip seeking the approval from the Deputy Commissioner, IRS.

Reports, Extensions, Expansions and Closing Reports Related to Wiretaps When CI Special Agents Are Actively Monitoring Conversations

(1) Copies of the 10-day reports and closing reports must be sent to Special Investigative Techniques within 15 days of the completion of the report.

(2) If an extension of time is required, the Director, Field Operations is the approving official. A request must be prepared by the field office providing a summary of the results obtained to date and a reason for the extension. Upon approval by the Director, Field Operations, the request will be electronically forwarded to Special Investigative Techniques.

(3) If an expansion is required to add new telephone lines related to the same targets and the same offenses, the Director, Field Operations is the approving official. A request must be prepared by the field office providing a summary of the results obtained to date and a reason for the expansion. Upon approval by the Director, Field Operations, the request will be electronically forwarded to Special Investigative Techniques.

(4) If it becomes necessary to include additional targets or additional offenses, approval by the Deputy Commissioner, IRS is required. The procedures for the expansion to add new targets or add new offenses mirrors the procedures required to initiate a wiretap request (see subsections 9.4.6.7.2.5.2 or see 9.4.6.7.2.5.3).

Access to "Real Time" Electronic Communications

(1) The "real time" or simultaneous interception of digital display pagers in transmission, transmission of electronic mail, computer-to-computer transmissions, facsimile transmissions, and private video transmissions (but not video surveillance) are all covered by the wiretap statute (see subsection 9.4.6.7.2.1 - stored electronic communications 18 USC 2703.)

(2) The interception of electronic communications can provide valuable information and evidence relating to any Federal felony under the investigative jurisdiction of CI, including Title 26 offenses. Under 18 USC 2516(3), the order authorizing such interception must conform to 18 USC 2518. However, cost, technical requirements, and encryption are all factors that can impact its actual use.

Approval/Authorization for "Real Time" Electronic Communications

(1) Prior to seeking a wiretap order for electronic communications, the special agent must prepare an affidavit for the application and a memorandum seeking approval. Both must be forwarded from the SAC, through the Director, Field Operations, to Special Investigative Techniques. The field office Criminal Tax attorney and the Computer Telecommunications Coordinator (CTC) in the local United States Attorney’s office should be contacted for assistance in preparing those documents. The memorandum must include the following information:

  1. The complete background of the investigation, including the other participating Federal, state and local law enforcement agencies involved in the investigation. The name of the criminal organization and the criminal offenses which are being investigated.

  2. The significance of the target, organization, or compliance problem being investigated.

  3. Specific description of the device(s) that the field office intends to monitor.

  4. Financial information, e.g., how the organization launders proceeds, how tax evasion is being promoted, and/or the scope of the problem.

  5. The opinion, and any recommendations from, the field office’s Criminal Tax attorney.

  6. Why CI participation in the monitoring is necessary, e.g., CI has the financial expertise to analyze the information as it is being received to quickly respond to financial transactions as they occur or the details of complex transactions can only be obtained through the computer information since the financial activity is conducted offshore.

  7. The amount of CI resources needed should be listed in the memorandum.

(2) Upon receipt of the affidavit and memorandum, Special Investigative Techniques will review the request and forward it to the Director, Operations Policy and Support for approval.

Reports, Extensions, Expansions and Closing Reports Related to "Real Time" Access of Electronic Communications

(1) Following approval to seek a wiretap order, copies of the 10-day reports and closing reports must be sent to Special Investigative Techniques.

(2) If an extension of time is required, the Director, Field Operations is the approving official. A request must be prepared by the field office providing a summary of the results obtained to date and a reason for the extension. Upon approval by the Director, Field Operations, the request will be electronically forwarded to Special Investigative Techniques.

(3) If an expansion is required to add new internet sites or e-mail accounts related to the same targets and the same offenses, the Director, Field Operations is the approving official. A request must be prepared by the field office providing a summary of the results obtained to date and a reason for the expansion. Upon approval by the Director, Field Operations, the request will be electronically forwarded to Special Investigative Techniques.

(4) The same procedures used to initiate a request must be followed to add targets or offenses to a wiretap order. Such expansion requests must be approved by the Director, Operations Policy and Support.

Stored Wire and Electronic Communications

(1) Title 18 USC 2701 et. seq., specifies how governmental entities may obtain access to stored electronic communications, transactional records, and subscriber records.

Stored Electronic Communication/Transactional Information/Subscriber Information

(1) Stored electronic communications (defined in 18 USC 2510) includes those electronic messages temporarily stored by an electronic communications service provider prior to delivery to the intended recipient or stored as a backup. The term also includes information stored with a"remote computing service". The term includes display data stored in digital-display pagers and cell phones, stored electronic mail, stored computer-to-computer transmissions, stored telex transmissions, stored facsimile data, and private video transmissions.

(2) The statute applies only to data stored with an electronic communications service provider. The real-time interception of transmissions to tone-and-voice-pagers is governed by the wiretap statute. (A tone-and-voice-pager enables callers to transmit short voice messages to a subscriber's pager). The acquisition of transmissions to or from display pagers and facsimile transceivers during the transmission(s) requires the approval of the Deputy Commissioner, IRS, an affidavit, an application (which must be approved by the Department of Justice), and a court order obtained in accordance with 18 USC 2516 and 2518 (see subsection 9.4.6.7.2.7).

Disclosure of Stored Communications

(1) Title 18 USC 2702 prohibits disclosure of electronic communications by providers of electronic communication services or remote computing services unless one or more of the following conditions is met:

  1. The information is given to its intended recipient or addressee,

  2. The information is given to the government pursuant to a court order, search warrant, or subpoena,

  3. The subscriber/customer gives consent,

  4. The disclosure is to a facility used to forward the communication,

  5. The disclosure is incident to testing equipment or quality of service,

  6. The information was obtained inadvertently and specifically refers to a crime.

(2) Title 18 USC 2702(c)(4) permits, but does not require, a service provider to disclose to law enforcement either content or non-content customer records in emergencies involving an eminent act which could result in the death of or cause serious physical injury to any person as provided by the USA Patriot Act.

Judicial Process for Obtaining Stored Electronic Communications, Transactional Information, and Subscriber Information

(1) Title 18 USC 2703 specifies the means by which a governmental entity may obtain access to stored electronic communications. The statute prohibits electronic communications providers from voluntarily providing information to a governmental entity, and requires law enforcement to use either a search warrant, court order, or subpoena (as described below in paragraphs 2, 3, 4, and 5) in order to obtain the following classes of information:

  1. The contents of electronic communication in electronic storage with an electronic communication service (such as unopened e-mail) or with a remote computing service (such as records in off-site archives).

  2. Basic subscriber information; including the name, address, local and long distance telephone toll billing records, telephone number or other subscriber number or identity (such as temporarily assigned Internet Protocol (IP) addresses); length of service; and types of services the customer or subscriber utilized.

  3. Transactional information, which includes all other records or information pertaining to a subscriber or customer that are not included in a) or b).

(2) If the contents of a wire or electronic communication have been in storage for 180 days or less, the government must obtain a search warrant, based on probable cause, to obtain access to the contents. Notice to the subscriber or customer is not required. Because the statute requires the use of a search warrant to obtain this class of information, it is not necessary to prepare an Enforcement Action Approval Form or to justify the use of the warrant as the least intrusive means to obtain the Information. Form 9809, Request for Stored Electronic Information is used to obtain the appropriate authorization for the search warrant application and execution.

  1. The government may obtain the contents of an electronic communication that has been in storage for more than 180 days using a search warrant, a court order issued under 18 USC 2703(d), or a grand jury subpoena or administrative summons.

  2. Notice need not be given to the subscriber if a search warrant is used to obtain the information. The statute requires that the customer or subscriber to whom the information pertains be notified if the government obtains a court order or issues a subpoena or summons for the information. That notice may be delayed for up to ninety days pursuant to 18 USC 2705. (This initial 90-day period can be extended for an additional 90-day period upon application to the court for an extension under 18 USC 2705(4).) Exhibit 9.4.6-1 is a sample of a 18 USC 2703(d) Order.

(3) The above-stated transactional information may be obtained, without providing notice to the subscriber, by any of the following means:

  1. A search warrant.

  2. A court order for disclosure per 18 USC 2703(d).

  3. Consent from the customer or subscriber of the service.

  4. Submission of a formal written request, pursuant to a law enforcement investigation concerning telemarketing fraud, for the name, address, and place of business of a subscriber or customer of such provider, when a subscriber or customer is engaged in telemarketing as defined in 18 USC 2325.

Note: At least one Circuit Court of Appeals has found portions of the Stored Communications Act (SCA) that permit the obtaining of e-mails pursuant to subpoena or court order unconstitutional. Thus, a search warrant may be required notwithstanding the language of the SCA or this IRM. Where the obtaining of e-mails by subpoena or court order is contemplated, consult with a local CT Attorney before proceeding.

(4) Basic subscriber information may be obtained with any of the means described in (3) above or with a grand jury subpoena or administrative summons, without providing notice to the subscriber.

(5) Title 18 USC 2703(f) imposes on the provider of wire or electronic communication services or a remote computing service the obligation, upon the written request of a governmental entity, to take all necessary steps to preserve records and other evidence in its possession pending the issuance of a court order or other process.

  1. The Preservation Letter requires providers of wire or electronic communication services or remote computing services to retain records for a period of 90 days. This initial 90-day period can be extended for an additional 90-day period upon a renewed request by the governmental entity.

Approval/Authorization for Stored Electronic Communications, Transactional Information, and Subscriber Information

(1) The investigating special agent should consult with the local Computer Investigative Specialist (CIS) and Criminal Tax attorney about access to stored electronic or wire communications to determine the proper method of obtaining the desired information. The use of court orders and search warrants to obtain stored electronic information, transactional information, or subscriber information requires approval by the SAC on Form 9809. After SAC approval, the Form 9809 must be forwarded electronically to Special Investigative Techniques for filing. The SAC must seek the endorsement of the United States Attorney to apply for a court order to obtain stored electronic communications. Local procedures must be followed to obtain the court order. If preparation of an affidavit is necessary, the local Criminal Tax attorneys opinion regarding the affidavit’s legal sufficiency and form should be obtained. The SAC approval is not required when a subpoena is used for obtaining the information.

Note: At least one Circuit Court of Appeals has found portions of the Stored Communications Act (SCA) that permit the obtaining of e-mails pursuant to subpoena or court order unconstitutional. Thus, a search warrant may be required notwithstanding the language of the SCA or this IRM. Where the obtaining of e-mails by subpoena or court order is contemplated, consult with a local CT Attorney before proceeding.

Closing Reports for Stored Electronic Communications/Transactional Information/Subscriber Information

(1) In situations where a court order or search warrant was used, a memorandum will be submitted to CI:OPS:SIT. The memorandum is due 15 working days after receipt of the information by the field office. The memorandum should contain information identifying the investigation name and number, the allegations involved, the reason the information was acquired, and a description of the information obtained.

Pen Registers and Trap and Trace Devices

(1) Devices connected to telephone circuits may be used to obtain the telephone numbers dialed by a target telephone (pen register) or the telephone number dialing the target telephone (trap-and-trace devices). The acquisition of dialed numbers is governed by 18 USC 3121 thru 3126. Title 18 USC 3121 was amended by the USA Patriot Act to prohibit obtaining contents of any wire or electronic communication via pen register or trap and trace device.

(2) Pen registers and trap-and-trace devices are subject to Fourth Amendment requirements when physical intrusion is needed for the installation of such devices. Limited entries to install this equipment are permitted provided they are done pursuant to a valid search warrant.

Use of Pen Registers

(1) A pen register, which is more appropriately called a "Dialed Number Recorder" (DNR), is a mechanical instrument attached to a telephone line, usually at a central telephone office. A pen register:

  1. Records the outgoing numbers dialed on a particular telephone,

  2. Registers incoming calls,

  3. Does not identify the telephone number from which the incoming call originated unless caller identification (ID) service is present, the service is on, and no one has blocked the caller ID service.

(2) Use of pen registers is restricted to recording the area code, telephone number, and extension dialed. Pen registers may not be utilized for gathering transactional data input by a touch-tone phone (i.e., account numbers, amounts, etc.).

(3) If possible, equipment that does not record transactional data should be used. Gathering transactional data input by touch-tone phone constitutes interception of electronic communication in transmission and requires a wiretap order that must be obtained under the procedures in subsection 9.4.6.7.2.

(4) Pen registers and other types of telephone number recorders can be utilized only when authorized by court order, except as provided by 18 USC 3121(b). They may be used in both tax and non-tax investigations where CI has the authority to investigate and locate fugitives from justice who are the subject of a CI investigation. A fugitive from justice is defined as a person against whom criminal action (e.g., return of an indictment, filing of a complaint or information, or a conviction) has been taken, and who has fled the jurisdiction to escape prosecution or to avoid serving a sentence. Requests for pen registers to locate fugitives will be considered only for fugitives who are charged with felony violations.

(5) Unless an exception is approved by the SAC, only IRS-owned pen registers and accessory equipment may be used in CI investigations.

(6) The USA Patriot Act amended 18 USC 3121, 3123, 3124, and 3127 to clarify that the pen register and trap and trace statute applies to a broad variety of communication technologies. As a result, law enforcement may use pen registers and trap and trace device orders to trace communications on the Internet and other computer networks.

(7) The USA Patriot Act added 18 USC 3123(a)(1) which gives Federal courts the authority to compel assistance from any provider of communication services in the United States whose assistance is appropriate to effectuate the order.

(8) The USA Patriot Act added 18 USC 3123(a)(3) whereby law enforcement authorities are required to file a special report with the court whenever it is necessary to install a separate device, such as Etherpeek or the FBI’s DCS 1000, to collect the information sought. The special report must include: the identity of the officers who installed or accessed the device; the date and time the device was installed, accessed, and uninstalled; the configuration of the device at installation with any subsequent modifications; and the information collected by the device.

(9) The USA Patriot Act added 18 USC 3123(b)(1)(C) such that there are no geographic limitations placed upon pen registers and trap and trace devices; thus, pen register and trap and trace orders extend nationwide and are not limited to the jurisdiction in which the order was issued. The issuing court must, however, have jurisdiction over the crime under investigation

Request for Approval

(1) The SAC, or his/her designee, will seek the endorsement of the US Attorney to apply for a court order pursuant to 18 USC 3123. Pen registers require approval by the SAC on Form 9170, Request for Pen Register and/or Trap and Trace Devices. After SAC approval, the Form 9170 must be forwarded electronically to Special Investigative Techniques for filing.

(2) Upon final approval by the SAC, the investigating special agent should promptly contact the US Attorney for the purpose of obtaining a court order based upon an application by the AUSA pursuant to 18 USC 3122. (Exhibit 9.4.6-3 Application for Pen Register; Exhibit 9.4.6-4, Court Order for Pen Register). After approval by the magistrate or judge, the SAC, or his/her designee, will arrange for the timely shipment of a pen register(s) and other requested accessory equipment.

(3) Orders pursuant to 18 USC 3123 which authorize the installation of pen registers or trap and trace devices shall also authorize the use of such devices for a period not to exceed 60 days. Extensions for a period not exceeding 60 days are available upon application for another court order pursuant to 18 USC 3122 and 18 USC 3123(C)(1) and (2).

Oral Requests

(1) If time does not permit the completion of Form 9170, the information may be orally transmitted to the SAC. An oral request for approval must be confirmed in writing and submitted within 2 working days after the oral request is made. After the oral approval has been obtained, the investigating special agent will contact the US Attorney to apply for the necessary court order. The previously discussed approval process and routing of the Form 9170 applies.

(2) Title 18 USC 3125 addresses emergency pen register installation prior to obtaining a court order and relates only to those situations involving the immediate threat of death or serious bodily injury, or conspiratorial activities characteristic of organized crime. The local Criminal Tax attorney and AUSA should be consulted to ensure the statute is followed.

Installation of a Pen Register

(1) The intentional installation or use of pen registers or trap and trace devices without first obtaining a court order under 18 USC 3123 is prohibited. In compliance with the prohibition, the following procedures must be completed in order to install a pen register.

(2) Contact the telephone company to identify the line to which the pen register is to be attached.

(3) If the telephone company does not have the personnel available to confirm the correctness of the line at the appearance point, the tech agent will do the following:

  1. A voltmeter must be attached to the identified line to determine if the telephone is in use.

  2. If the telephone is not in use, attach the telephone test set to the line and confirm that the line is the correct line. If someone attempts to use the line while the butt set is attached to the line, the butt set will be immediately disconnected and not be reconnected until it has been determined (using the voltmeter) that the line is not in use.

  3. Note that if physical intrusion is necessary for installation, a search warrant or consent is required.

(4) After the pen register has been activated, the SAC will ensure that installers and operators are competent to operate the equipment. Adequate precautions will be taken to limit access to the pen register only to its operator and other necessary personnel. Upon completion of use, pen registers must be immediately returned to the issuing office.

(5) Pen registers may not be utilized for gathering any transactional data inputted by a touch-tone phone (i.e., account numbers, amounts, etc.).

(6) If the authorization is not utilized, a memorandum will be submitted to the SAC setting forth the reasons for not using the pen register. The memorandum will include the name of the investigations pursuant to which authorization was sought.

(7) If an extension is necessary, submit a request per Form 9170 to the SAC for consideration. The request must summarize the information that has been obtained to date, and set forth the number of days the extension is sought. The extension may not exceed 60 days.

(8) Requests to add additional phone numbers or equipment not specified in the original order must be made per Form 9170 and must set forth the reasons supporting the issuance of another order under 18 USC 3123. Include in the request the new telephone numbers to be monitored and the name(s) and address(es) of the subscribers. The request for an extension of time can be combined with this request where appropriate.

Trap and Trace ("Grabber")

(1) A trap and trace device is also called a "grabber". It records the telephone numbers from incoming calls to a particular telephone. The device used by the telephone company is a TTS-176 device, an electronic switching system (ESS), or a cross bar switching facility. Like a pen register, no conversations will be recorded. Trap and trace procedures are necessary when attempting to monitor call forwarding.

(2) Call forwarding is part of the trap and trace procedure. It requires a telephone company to identify which facility or number telephone calls are being forwarded. Historically, telephone companies have been reluctant to assist in trap and trace procedures or call forwarding monitoring unless the situation concerns threats to the President of the United States and/or involves a kidnapping. The statute now protects companies from any liability resulting from the use of such devices (see 18 USC 3124(d)).

(3) The telephone company may be able to provide a record of incoming calls to the telephone of a subject under investigation. This depends on the type of switching facility (exchange) involved. This information can be as useful as a pen register/DNR.

(4) Trap and trace service requires the same approval as pen registers/DNRs. Requests, extensions, and any deviations from requests must conform to the same procedures governing pen register requests and will be considered in the same manner.

(5) Consider the availability and use of "caller ID" to obtain desired information prior to applying for a trap and trace authorization.

(6) A court order under 18 USC 3123 is required. This order requires the same application and the same information as the order for installation of pen registers.

(7) Whenever possible, before obtaining an order to trace incoming calls to a particular line, review the proposed trace with the local telephone company's security officer. The security officer should be able to advise of foreseeable problems in the execution of the proposed order.

(8) Except in very rare instances, orders should be limited to Electronic Switching System (ESS) or No. 5 cross-bar facilities. The likelihood of successfully tracing telephone calls through a system using less sophisticated equipment is extremely low and requires an inordinate amount of time and equipment.

(9) Where possible, all orders should also be limited with respect to the following:

  1. Scope: An order should minimize the number of lines on which trap and trace service is requested at a given switching facility.

  2. Geography: It is preferable that the order limit traces to "all calls originating in X city" or "all calls originating within a y-mile radius of Z town."

  3. Duration: Orders must limit the trace to 60 days, subject to an extension of an additional 60 days if the supervising attorney determines it to be necessary.

  4. Hours: If it is possible to anticipate when calls will come into a target phone, tracing should be limited to these hours.

(10) Seek the tracing information from the telephone company no more than once a day and, except in unusual circumstances, only during regular business hours.

(11) Each order should contain a clause forbidding the telephone company to disclose that a trace is or has been in progress as provided by 18 USC 3123(d). A telephone company should be given the opportunity for a closed hearing before the issuing judge to seek limitations of any proposed order if the telephone company feels the order is too burdensome.

(12) The SAC's approval of a Form 9170, Request for Pen Register and/or Trap and Trace Devices, is required to obtain authorization to use trap and trace devices. After SAC approval, the Form 9170 must be electronically forwarded to Special Investigative Techniques.

Use and Approval of Electronic Tracking Devices

(1) When the use of an electronic tracking device is necessary during an investigation that CI has the authority to investigate, special agents are required to obtain a search warrant, following the general search warrant procedures set forth in IRM 9.4.9, Search Warrants, Evidence and Chain of Custody (see subsections 9.4.9.2, General Search Warrant Procedures and 9.4.9.3, Search Warrant Process).

(2) Electronic tracking and global positioning system search warrants are authorized under a primary investigation (PI).

(3) There is a forty-five (45) day time limit for electronic and GPS tracking (subject to extensions for good cause), the search warrant affidavit should clearly indicate the period of time necessary for electronic tracking and monitoring. This time frame should include the time necessary for maintaining the equipment. Potential and future extensions should be taken into consideration when determining the period for tracking and monitoring.

(4) In keeping with IRM 9.4.9 (subsection 9.4.9.2), electronic tracking search warrant affidavits require evaluation by Criminal Tax (CT) Counsel. The search affidavit should include the following:

  1. Investigative need for tracking and monitoring of information,

  2. Identification of vehicles upon which the device will be attached,

  3. Potential locations of the vehicles when the device will be attached,

  4. Period of time necessary for monitoring,

  5. Equipment installers and users,

  6. Authorization to perform necessary maintenance to the device (e.g., battery replacement) and removal of the device.

(5) In situations involving sensitive targets, IRM 9.4.9 (subsection 9.4.9.3.3.3, Department of Justice, Tax Division Approval) also applies.

(6) Non-CI affiant tracking search warrants requiring CI special agents participation by attaching, monitoring, maintaining or removing the tracking device, requires adherence to IRM 9.4.9 (subsection 9.4.9.3.4, Non-IRS-Criminal Investigation Affiant Search Warrants).

Internet-Related Investigative Activities

(1) The Internet provides a wealth of information that may be relevant to CI investigations because it has become a widely used means to communicate and to conduct business. Records of Internet transactions may also be important evidence to investigators. As a general rule, the same policies and procedures that govern investigations in the physical world apply to investigations in cyberspace. Agents should therefore apply the most analogous real-world rules and procedures to each online investigative technique they seek to use. For example, law enforcement officials may obtain information from publicly accessible online sources and facilities (web sites, listservs, news groups, chat rooms, etc) under the same conditions they may obtain information from other sources generally open to the public (e.g., newspapers, libraries, etc.). Similarly, the same policies, procedures, and restrictions that apply to physical world investigative activities (for example, restrictions on access to private places, agent identification, and undercover activities) apply equally to online investigative activities. Agents are authorized to conduct surveillance activities on internet social networking, including Facebook, Twitter, Google+, etc., under the following conditions:

  1. A special agent may assume a temporary pretext identity, (IRM 9.4.8, Undercover Operations (subsection 9.4.8.1(4)), when accessing social networking web sites for surveillance purposes only.

  2. Communication, of any kind, between a target, associate, or any other individual, through internet social networking sites utilizing a pretext identity requires an approved undercover operation. Communication includes, but is not limited to, “friend” requests, instant messaging, posts on message boards, etc.

  3. c) Surveillance of social networking web sites may only be conducted under an approved General, Primary or Subject Investigation. Surveillance of social networking web sites may be conducted by any special agent since communication is prohibited under this section.

  4. d) Internet surveillance may only be conducted on a non-CI networked, undercover computer. Computers which leave no government footprint are required for use in this type of surveillance.

  5. e) The SAC will be responsible for monitoring internet surveillance and ensuring proper procedures are followed.

(2) Special rules apply to the interception of online communications and the gathering of information kept by online service providers (see subsections 9.4.6.7.2; 9.4.6.7.3; and 9.4.6.7.4).

(3) Special agents should consult with the CIS in the local field office, the Electronic Crimes Program in HQ, or the Computer and Telecommunications Coordinator in the local US Attorney’s office for advice on conducting online investigations or with questions on using the internet for investigative purposes.

(4) The CIS of the Electronic Crimes Program can also provide technical support in the use of techniques, tools, and non-CI network computer equipment needed to conduct many online investigative activities.

Video Surveillance

(1) The wiretap statute does not prohibit the use of video equipment to record or monitor a public meeting. Any attempt to acquire the participants’ conversations by the video equipment or with other devices, however, must be done in accordance with the provisions of the wiretap statute. The local Criminal Tax attorney should be consulted for advice on the application of the wiretap statute.

(2) A journeyman level special agent has authority to conduct video surveillance.

(3) A search warrant pursuant to 18 USC 3102 and Rule 41(a) of the Federal Rules of Criminal Procedure (Fed. R. Crim. P.) is required to obtain evidence that cannot be observed from a public place with the un-aided eye. If video surveillance from a place not accessible to the public, or if sense enhancing technology is contemplated, the local Criminal Tax attorney should be consulted prior to using this technique.

Video Surveillance of Public View Areas

(1) Use of a video camera or IP camera (pole cameras) to observe activity that is viewable by the public (either because members of the public can lawfully access the area where this activity occurs or can see the activity from a lawful vantage point) does not generally constitute an intrusion into a constitutionally protected private interest. A warrant is generally not required to visually record activities that occur in publicly accessible areas such as public parks, sidewalks, streets, open fields, and other areas outside the curtilage of a house that is not commonly accessible to the public.

(2) The Fourth Amendment does not require law enforcement officers to shield their eyes when passing a home on a public thoroughfare. Officers may, without a search warrant, use video surveillance to assist them in observing certain areas even when the areas are within the curtilage of a house if others can observe these same areas from a place they are lawfully entitled to be (i.e., from the street, sidewalk, or an open field). This would include unobstructed video surveillance of driveways, front doorways, and yards of businesses or houses.

(3) Special rules apply to the video surveillance of the workplace. In general, video surveillance of an area of the workplace that is accessible and viewable by others during work hours may be done without a search warrant. Video surveillance of employee work areas that are not publicly accessible or viewable usually may not be undertaken without a search warrant. The local Criminal Tax attorney should be consulted when there is any question whether a particular area is publicly accessible.

(4) Special Agent in Charge approval is required when:

  1. The installation of video or IP cameras requires the use of an outside utility company for the power drop.

  2. The camera installation, or its use, will incur expenses that must be paid by the field office.

(5) Approval should be obtained using the “Video Surveillance Memorandum” in Document Manager. The request should include a summary of the investigation, the reason other surveillance techniques will not work, and expenses associated with the installation.

Public Access and Other Areas Entitled to Fourth Amendment Protection

(1) Video surveillance into public areas, e.g., a rest room, where one would reasonably expect his/her actions to be private, must comply with Fourth Amendment standards and may require a warrant.

Video Surveillance When Consenting Party is Present

(1) Special agents may also observe and record (video) private meetings between undercover officer(s) or cooperating witness(es) and subjects if the premises are controlled by the special agent or witness.

Aerial Surveillance

(1) Aerial surveillance is not subject to the wiretap statute and is generally not considered to constitute a search within the meaning of the Fourth Amendment.

(2) Supreme Court rulings are based on whether or not a person has a constitutionally protected reasonable expectation of privacy. This involves:

  1. Whether the person had an actual exception of privacy,

  2. Whether society recognizes that expectation as being reasonable.

(3) The Supreme Court has held an individual taking measures to restrict views of his activities does not preclude an officer's observation from a public vantage point where they have a right to be and which renders the activities clearly visible. In these cases, the police observations takes place within public navigable airspace, in a physically non-intrusive manner, and any member of the flying public in the airspace who cared to glance down could have made the same observations. The Fourth Amendment does not require a search warrant in order to observe what is visible to the un-aided eye. If, however, some enhancement device is used during the overflight, the general rule may not apply.

(4) The SAC will approve, in writing, the use of aerial surveillance. The request must include a summary of the investigation, the reason why other surveillance techniques will not work, the budget issues, and the minimum requirements of the pilot/crew.

Use of Aircraft

(1) An aircraft may be used in investigative situations such as:

  1. Surveillance,

  2. Electronic tracking,

  3. Communications relay,

  4. Aerial photography,

  5. Undercover support,

  6. Expeditious transport of special agents or equipment in emergency situations.

(2) Federal, state, and local government aircraft should be used where available. When not available, aircraft may be rented or leased from a local aviation service. When a decision is made to rent or lease an aircraft, the following procedures should be used:

  1. Prepare and forward a requisition to the appropriate payment office; or

  2. Establish an imprest fund in support of the operation.

(3) To pilot an aircraft, special agents must meet the following minimum standards:

  1. 500 hours flight time,

  2. 100 hours cross-country flight time,

  3. 100 hours of actual or simulated instrument flight time,

  4. FAA Commercial Pilot certificate (appropriate category),

  5. Current FAA instrument ratings,

  6. Current FAA Second-Class Medical certificate.

(4) The minimum crew for aircraft surveillance will be a pilot and an observer. Except for the pilot, only special agents or other Federal, state, or local law enforcement agents or officers will conduct surveillance.

(5) All aircraft will be operated under Federal Aviation Administration (FAA) certification and Federal Aviation Regulations. Aircraft will be flown in accordance with the applicable flight manuals and performance limitations. Any deviation shall be approved in advance by the local FAA office. Aircraft accidents or incidents shall be reported to the National Transportation Safety Board (NTSB) in accordance with NTSB Regulations.

Report of Electronic Surveillance Information Received From State or Local Agencies

(1) The SAC will submit a report through proper channels, including the Director, Field Operations to the Chief, CI, concerning electronic surveillance information received from state or local agencies. The report must be submitted within 30 days after the information is received.

(2) The report of electronic surveillance information received from a state or local agency shall contain the following information:

  1. The investigation name and number (if applicable),

  2. The names of the persons whose conversations were monitored, if applicable,

  3. A summary of the information obtained, including the names of all individuals mentioned in the monitored conversations,

  4. The locations (address) where any monitored conversations took place and, if applicable, the telephone number of the telephone on which the monitoring equipment was installed,

  5. The name of the agency that conducted the electronic surveillance,

  6. The periods of time that the equipment was used (dates and times),

  7. The name of the IRS employee who has custody of the records relating to the monitoring, or the name and location of the IRS activity to which the information was transmitted.

2703(d) Order

This is an image: 36209001.gif
This is an image: 36209002.gif
This is an image: 36209003.gif
This is an image: 36209004.gif
This is an image: 36209005.gif
This is an image: 36209006.gif
This is an image: 36209007.gif

Reserved

This is an image: 36209008.gif
This is an image: 36209009.gif
This is an image: 36209010.gif

Application for Pen Register

This is an image: 36209011.gif
This is an image: 36209012.gif
This is an image: 36209013.gif
This is an image: 36209014.gif
This is an image: 36209015.gif

Court Order for Pen Register

This is an image: 36209016.gif
This is an image: 36209017.gif
This is an image: 36209018.gif
This is an image: 36209019.gif
This data was captured by Tax Analysts from the IRS website on August 13, 2024.
Copy RID