Skip to main content

Full text of "FBI Manual of Investigative Operations and Guidelines - Volume 3"

See other formats


FOIPA COVER SHEET 



FREEDOM OF INFORMATION 

AND 
PRIVACY ACTS 

SUBJECT: MANUAL OF INVESTIGATIVE 
OPERATIONS AND GUIDELINES (MIOG) 

VOLUME 3 

SECTIONS 14 -23 



FEDERAL BUREAU OF INVESTIGATION 



I 



THE BEST COPY 

OBTAINABLE IS 

INCLUDED IN THE 

REPRODUCTION OF 

THESE DOCUMENTS. 

PAGES INCLUDED THAT 

ARE BLURRED, LIGHT, OR 

OTHERWISE DIFFICULT 

TO READ ARE THE 

RESULT OF THE 

CONDITION OF THE 

ORIGINAL DOCUMENT. 

NO BETTER COPY CAN BE 

REPRODUCED. 



I M ■ 



i 



' -i 




VOLUME III 

Manual of 
Investigative 
Operations 
and Guidelines 










Sensitive 



Manual of Investigative Operations and Guidelines 
Part II ■-.,::r--v-';. ■ ■ ■-- ■.■ -.;.....:...;• ■■•.■; 



.'.3-,^.,i 



PAGE 14.-V" 1: 



SECTION 14. FINGERPRINT IDENTIFICATION 







■.sm 



lA-1 



HISTORICAL DATA CONCERNING FBI CRIMINAL JUSTICE 
INFORMATION SERVICES (CJIS) DIVISION (FORMERLY THE 
IDENTIFICATION DIVISION) 



j. The insistent demand by police officials for one 
cooperative system for the compilation and exchange of criminal 
ident ification data on a natio nal scale 1 e d to t he format i on of t he 
FBI Identification Division on July 1, 1924. The fingerprint fileT 
from the Leavenworth Penitentiary and the National Bureau of Criminal 
Identification, which totaled 810,188 records, became the foundation 
I of the FBI fingerprint card repository. | The Identification Division 
and the Criminal Justice Information Services (CJIS) Division merged 
5/1/93. The merger was to eliminate duplication and better conform to 
the new organizational structure. This consolidation of services 
enhances communications and services to local, state, federal, and 
international criminal justice agencies. (See MIOG, Part I, Section 
32.) 






'.■Mff> 







EFFECTIVE: 12/13/95 



14-2 FBI I CRIMINAL JUSTICE INFORMATION SERVICES (CJIS) [DIVISION 
RECORDS SYSTEM 



EFFECTIVE: 03/10/94 



Sensitive 
PRINTED: 02/18/98 






-■mm- 
■■' -fSM 

■^ 

■km 

■■'iS'!*» 

':i',f 





Sensitive 



Manual of Investigative Operations and Guidelines 
Part II „ ' 









PAGE 14 



U-2.1 



Categories of Individuals Covered by the System 



^1) Individuals fingerprinted as a result of arrest or 
incarceration. 

(2) Persons fingerprinted as a result of Federal 
employment applications, military service, alien registration and 
naturalization processes, and individuals desiring to have their 
fingerprints placed on record with the FBI for personal identification 
purposes. 



EFFECTIVE: 05/25/90 



14-2.2 



Categories of Records in the System 



(1) Criminal fingerprint cards and related criminal 
justice information submitted by authorized agencies having criminal 
justice responsibilities. 

(2) Civil fingerprint cards submitted by Federal agencies 
and civil fingerprint cards submitted by persons desiring to have 
their fingerprints placed on record for personal identification 
purposes. 

(3) Fingerprint cards relating to missing persons and 
unidentified dead persons which are submitted by authorized agencies 
having criminal justice responsibilities. 

(4) Identification records sometimes referred to as "rap 
sheets" which are compilations of criminal history information 
pertaining to individuals who have criminal fingerprint cards 
maintained in the system. 

(5) A name index pertaining to each individual whose 
fingerprints are maintained in the system. The criminal records and 
the civil records are maintained in separate files. The criminal 
records are contained in either an automated file or a manual file 
depending on date of birth (refer to 14-10.1.2). The civil records 
are contained in a manual file. Both the criminal and civil files 
have an alphabetical name index related to data contained therein. 



Sensitive 
PRINTED: 02/18/98 




Sensitive 



Manual of Investigative Operations and Guidelines 
Part II , , ■'.-.^ . • • ■..- 



PAGE I A - 





■ ,:■**;;»■ 
■' ■>'.l- ->> 








i"- ^' -S*^: 




■ ..ai& 




■■;*!)r''»; 




■ ■^:^' 


3 






.■A 



EFFECTIVE: 05/25/90 



lA-3 



AUTHORITY FOR MAINTENANCE OF THE SYSTEM AND USE OF 
SYSTEM'S RECORDS 



EFFECTIVE: 05/25/90 



14-3.1 Statutory Authority for FBI | Criminal Justice Information 
Services (CJIS) loivision 



I 



The system is established, maintained, and used under 
authority granted by Title 28, United States Code (USC) , Section 53A; 
Public Law 92-5A4 (86 Stat. 1115); Public Law 9A-29 (89 Stat. lAO) ; 
Public Law 95-A05 (92 Stat. 87A) ; and Public Law 99-399 (100 Stat. 
853). The authority is also codified in Title 28, Code of Federal 
Regulations (CFR), Section 0.85 (b) and (j), and Sections 20.1-20,38. 



■■>ffi' 



EFFECTIVE: 03/10/94 



14-3.2 Uses of Records Maintained in thejCriminal Justice 
Information Services (CJIS) (Division 






'Wi' 



The FBI operates the(CJIS |Division Records System to 
perform identification and criminal history record information 
functions for Federal, state, and local criminal justice agencies, and 
for noncriminal justice agencies, and other entities, where authorized 
by Federal statute, state statute pursuant to Public Law 92-544, 
Presidential Executive Order, or regulation of Attorney General of the 
United States. In addition, identification assistance is provided in 
disasters and for other humanitarian purposes. Record requests are 
also processed in accordance with Public Law 94-29, known as the 
Securities Acts Amendments of 1975; Public Law 95-405, known as the 
Futures Trading Act of 1978; and Public Law 99-399, known as the 
Omnibus Diplomatic Security and Anti-Terrorism Act of 1986. 



•;::# 
■"-)>" 




'•i^lr 



Sensitive 
PRINTED: 02/18/98 







Sensitive 



Manual of Investigative Operations and Guidelines 
Part II ,;.,.. 



PAGE 14 - 



EFFECTIVE: 03/10/94 









14-4 DISSEMINATION GUIDELINES FOR FBI | CRIMINAL JUSTICE 

INFORMATION SERVICES (CJIS) | DIVISION RECORDS I (See MAOP, 
Part II, 9-2.8 & 9-3.1.1.) I 



EFFECTIVE: 03/10/94 



14-4.1 



Authorized Dissemination 



1 




EFFECTIVE: 09/26/90 



14-4.1.1 FBI Criminal History Records Made Available: (See MIOG, 
Part II, 14-5.1.) 

(1) To criminal justice agencies for criminal justice 
purposes free of charge. 

(2) To federal agencies authorized to receive them 
pursuant to federal statute or Executive order. Effective 1/3/94, an 
$18 user fee may be charged for processing fingerprint cards submitted 
by federal government agencies for nonlaw enforcement, noncriminal 
justice licensing and employment purposes. A user fee ranging from 
$2.00 to $8.00 may be charged for name-check requests submitted by 
federal agencies for national security purposes. The fee will vary 
for the name-check requests depending upon whether a paper or magnetic 
tape format is used. 

(3) To officials of federally chartered or insured 
banking institutions to promote or maintain the security of those 
institutions and, if authorized by state statute and approved by the 
Attorney General, to officials of state and local governments for 
purposes of employment and licensing (Public Law 92-544); to certain 
segments of the securities industry for record checks on persons 
involved with the transfer of securities (Section 14(f)(2) of Public 
Law 94-29); to the Commodity Futures Trading Commission for record 
checks on persons applying for licenses as commodities brokers (Public 



•f. 



Sensitive 
PRINTED: 02/18/98 





■ • ■ ■ ■ • , ■ . ■ ■■■'"--;.'SH~^ 

Sensitive 'f^' 

■'n -'ft^'* W" 

■ ■ ' . ' , M^.'r 

Manual of Inveitigative Operations and Guidelines -' 

Part II ^ . PAGE 14 - 5 Vff 

. • . ■ ■ •. ;•. ., ... ,:'|^ 

Law 95-405); and to nuclear power plants for record checks on persons r'S 

with unescorted access to nuclear power plants or individuals granted -!* 

access to Safeguards Information by power reactor licensees (Public *!i^" 

Law 99-399). Effective 1/3/94, a user fee of $24.00 per inquiry (non- iS 

Federal applicant fingerprint card submissions) is being charged for *., 

this service. ■•-•■*•= 

I (4)Effective 7/1/94, a user fee of $18,00 will be - 
charged to federal criminal justice agencies for processing applicant , 
fingerprint cards for firearms and related permits. Effective 

10/1/94, a user fee of $24.00 will be charged to state and local - j 

criminal justice agenci ejB_jsubmitti_ng^ppJJ_cant^ f i^ngerprint_ cards for ■>: 

firearms and related permits. | ~ ~~ 



EFFECTIVE: 12/02/94 



(..| I 14-4.1.2 JDeletedj 



EFFECTIVE: 09/26/90 



14-4.2 Unauthorized Disseminations 

The exchange of FBI criminal history records authorized by 
14-4.1 is, subject to cancellation if dissemination is made outside the 
receiving departments or related agencies. Such misuse may also be a 
violation of the Privacy Act of 1974 (see Part I, Section 187 of this 
manual). FBIHQ should be advised of such unauthorized or illegal uses 
without undue delay. 



EFFECTIVE: 09/26/90 

14-5 INDIVIDUAL'S RIGHT TO ACCESS FBI CRIMINAL HISTORY RECORDS 

EFFECTIVE: 09/25/91 



Sensitive 
PRINTED: 02/18/98 











■ ■ --m 

Sensitive •.■;^-, 



14-5.1 Access to the Record | (See MIOG, Part II, 14-A.l.l & 
14-23.) I 

Any" individual may obtain a copy of his/her FBI 
identification record by submitting to the FBI | Criminal Justice 
Information Services (CJIS) |Division a written request, accompanied by 
satisfactory proof of identity, and a certified check or money order 
in the amount of ($18.00|made payable to the Treasurer of the United 
States. Satisfactory proof of identity is defined as full name, date 
and place of birth, and a set of rolled-inked fingerprint impressions. 
For full details refer to T itle 28, CFR . Sec tions 16.30-16.34, or 



Departmental Order 556-73, a copy of which is on file in each field 
office. ThejCJIS [Division is available to fingerprint any person in 
the Washington, D.C., area who wishes to obtain a copy of his/her 
identification record. In the field, local agencies are usually 
available which will fingerprint persons for employment, licensing, 
and other purposes. Each field office should ascertain the identities 
of such agencies in its area where requesters may be referred. 
However, where fingerprinting services are not otherwise available; 
p or, where available but a person who wishes to obtain a copy of 

his/her identification record is experiencing difficulty in obtaining 
his/her fingerprints, the field office should fingerprint the person. 



EFFECTIVE: 03/10/94 



14-5.2 Challenge to Information in FBI Identification Record 

If, after reviewing his/her identification record, the 
subject thereof believes that it is incorrect or incomplete iii any 
respect and wishes changes, corrections or updating of the alleged 
deficiency, he/she should make application directly to the [agency 
which contributed the questioned information. The contributor jshall 
promptly notify the FBl|of any corrections necessary, | and, upon 
receipt of such a notification, the FBI will make any changes 
necessary in accordance with the corrections supplied by the 
contributor of the original information. ' The subject of a record may 
also direct his/her challenge as to the accuracy or completeness of 
any identifiable entry on his/her record to the FBI. The FBI will 
then forward the challenge to the agency which submitted the data 
requesting that agency to verify or correct the challenged entry. 



Sensitive 
PRINTED: 02/18/98 



Manual of Investigative Operations and Guidelines A'*; 

Part II ■ :, - PAGE 14-6 






irf 












jijj.Li.. I1I..1J. .^ ^ ^m^mfmimmm 




Sensitive 

Manual of Investigative Operations and Guidelines 

^"'. " '^ :■■:•• ''■ . PAGE. 14 

EFFECTIVE: 05/1A/93 

14-6 NOTIFICATION OF PENDING LEGISLATION OR PROJECT REQUESTS 
EFFECTIVE: 09/25/91 



— r ' •-"'I'^'l 

- v»*i'<--;.rj- 






14-6.1 




Pending Legislation 



Field offices should advise FBIHQ, Attention: 
I [Criminal Justice Information Services (CJIS) |Division, of any pending 

legislation that might curtail or restrict the legal right of state or 

local criminal justice officials to fingerprint arrested persons. 
I Field offices should also advise the |CJIS(Division of the passage of 

any law, ordinance, or regulation requiring fingerprinting for 

licensing or local/state employment. 



EFFECTIVE: 03/10/94 



;^s* 






14-6.2 



Project Requests 



Field offices should promptly advise the|CJIS|Division of 
any requested fingerprinting projects. Information concerning the 
availability of such services should, be addressed to FBIHQ, Attention: 
|CJIS|Division. The field should make no commitments to handle any 
"project" involving submission of fingerprints to the JCJIS [Division.' 



•■•ft^. 









EFFECTIVE: 03/10/94 




14-7 



INKED FINGERPRINT IMPRESSIONS - TAKING 



EFFECTIVE: 03/23/92 



Sensitive 
PRINTED: 02/18/98 



■M 









mm 




Sensitive 



Manual of Investigative Operations and Guidelines 
Part 11,4 



PAGE 14 - 8 



14-7.1 



General Instructions 




on Services 

images made from black 
ng methods, and specific 



(2) The booklet, "The Science of Fingerprints," if 
carefully read, should thoroughly acquaint even a novice with the 
process of inked fingerprints. With the exception of the actual ink 
preparation, the principles provided also apply to taking chemically 
_PJrodMed_AnOi vers^m generated^ f ingerpHnt^s . _ Live-scan fingerprints 
cannot be used for obtaining fingerprint images fromdeformed fingersT 



(3) Frequently officials fail to comply with all the 
instructions and illegible prints result. Accurate classification 
depends upon the existence of the focal points known as cores and 
deltas, between which ridges may be traced and/or counted. Each 
finger must be fully rolled from one nail edge to the other. Practice 
with the fingerprinting method selected will reveal the best possible 
fingerprint images. It is imperative, that properly prepared prints be 
I furnished the|CJIS|Division in order that errors may be reduced to the 
minimum. 



"ym 



. .1 !<^> 

M 
M 



••X. 



'^h 



EFFECTIVE: 03/10/94 



14-7.2 Common Faults 



(1) Failure to properly cleanse the subject's hands or 
the equipment before | inking or scanning the fingers. | 

(2) Failure to fully roll the impressions in thelcorrect 



finger block. 



(3) Uneven inking. 

(4) Overinking. 

(5) Applying too much or too little pressure when rolling 










Sensitive 
PRINTED: 02/18/98 






i^m 



■■U' --..- 





i 



• ^ /C * '. 



Sensitive 



Manual o£ Investigative Operations and Guidelines 
Part II ■■ :; ■'■■.^r>■ ■_ - ,.■ y ,, , . 

(7) Fingers excessively dry. | 



EFFECTIVE: 03/23/92 



PAGE 14 - 



14-7.3 



Major Case Prints 













■ «^fe'- 




■> ■ ■» 




'■ '^.SS 








..jT-i'i?^.; 




^W 




.;**4fJ 


•■ 


. '»?.H3ji 








:i# 




■«''■ 


9 


,■*'■ ^"".ii' 








•■:f5# 


w, "■ 


i. 




' >«< 




■■-# 




--•■;ilj 




■ Wi!: 
















ifi:¥. 




'f-s- 




-k 



The Latent Fingerprint Section, Laboratory Division will 
retain major case fingerprint cards submitted to the CJIS Division by 
the FBI and other federal agencies, which are appropriately recorded 

_and„inclu,ded^on_arresJ:_^ingejrpH^^ ( Form FD-24 9 ) . The Latent 
Fingerprint Section will review and examine the fingerprint card and 
palm prints. If the Latent Fingerprint Section has no interest in the 
subject, the prints are forwarded to the Special Processing Unit, 

[identification Services Section, CJIS Division, | for handling. Major 
case prints submitted by all other agencies are returned to the 
contributor. 



EFFECTIVE: 12/13/95 



14-7.3.1 Equipment 

The necessary equipment consists of the regular 
fingerprint inking material and fingerprint cards, plain 8- by 8-inch 
cards, and cylindrical object three inches or more in diameter. Place 
an 8- by 8-inch white card on the cylinder. This card is then held in 
place by rubber bands. 



EFFECTIVE: 03/23/92 



l?|;/i' 



7* ..^yK^- 



■m 






■aW. 







14-7.3.2 Procedure 

(1) Set of fingerprints taken in the usual manner. 

(2) Record main palm print of right hand. With a roller, 
roll ink on the inking plate so that the entire roller is covered with 
a thin and even amount of ink. Take the subject's right hand and 
apply the ink with the roller directly to the subject's hand. The 
entire surface of the palm and fingers should be inked. Take the 
subject's inked hand and place the heel of the palm on the card at the 



Sensitive 
PRINTED; 02/18/98 



■ M 

■'r,%i> 

m 



. ..'.'S.JS'' 





ensitive .ntej. 

Manual of Investigative Operations and Guidelines "|? 

Part II.. '.••,, ■-._ ^ ^- p^Qg j^ _ jQ ,.|| 

■^ '■ ■ . ^ • ' '%# 

lower edge. Then by using the cylindrical object placed on a desk as '■ -^.^ 
a roller, the inked palm print can be taken. The right hand, 

including the fingers, should be taken. The fingers are kept stiff '• 

and outstretched in the process of rolling the cylinder. Fingerprints '# 

are taken as a part of the process so that the palm prints can receive '^ 
proper attention in theJLatent Fingerprint Section, Laboratory 

Division, I for filing purposes. s-. 

(3) Record impressions of the outer edges (little finger 
and thumb sides) of the palm. After the usual impression is made on 

the card with the right palm lying flat, the ridges under the little t' 
_finger_and_thumb_should_be_inked_to_the_bottom_of_the palm_and out t o 
the smooth skin. Remove the card from the holder and lay flat on the 

table. The right side of the palm is placed at a A5-degree angle to ;^ 

the right of the previously printed right palm and rolled onto the # 

card. Next the left side of the right palm is placed at a ^-degree .,% 

angle to the left of the already recorded main palm print and rolled ■^' 
onto the card. 



(4) Prints of the sides, lower joints, and tips of the 
fingers of right hand obtained as follows, after having placed the 
card on a smooth flat surface and securing by means of tape or thumb 
tacks: 

(a) Ink the fingers from side to side for their 
entire length. 

(t>) First, an impression is made by laying the 
finger on its left side (45-degree angle) and raising it up to the 
nail. 

(c) A second impression is made just to the right of 
the first impression laying the finger flat and raising inward to the 
nail. 

(d) A third print is made just to the right of the 
second impression by laying the finger on its right side and raising 
to the nail. 

(e) A fourth impression is made above the other 
three impressions by placing the tip only on its left side and rolling 
completely to the right, producing a rolled print of the tip only. 

(f) Lastly, to the immediate right of the four 
impressions, record a fully rolled print of the entire areas of the 
lower joints of the finger. To accomplish this, hold the finger 



Sensitive 
PRINTED: 02/18/98 



i".44- 



: . -^ V 





Sensitive 



Manual of Investigative Operations and Guidelines 
Part II- ■■• ,■'•■•■■'• 



PAGE 14 - 11 



horizontally and place one side of the finger straight down on the 
card. Then, roll the finger 180 degrees to the other side, ensuring 
that all areas of the lower joints are clearly recorded. In recording 
the rolled impression of the lower joints of each finger, the 
direction of the roll should be the same as when recording a set of 
rolled fingerprints on a regular fingerprint card — that is, roll the 
thumbs toward the subject's body and the other fingers away from the 
subject's body. 

(g) The end results consist of five different 
impressions of each finger, i.e., two side-to-tip impressions, one 
-flal.~to-^ip imp£iMs^iqn, one tip^ i^^ one fully rolled 



impression of the lower joints. Prints of the same finger should be" 
grouped on the card and identified as to right thumb, right index, 
etc. As many finger groups as possible may be placed on the same card 
and several cards may be used, if necessary; however, prints should be 
recorded on one side only. 

(5) The same process is followed with the left hand. 

(6) If more than one impression of any area is made to 
ensure legibility, all prints should be submitted for comparison. 

(7) Every card, regardless of the type of print appearing 
on it, must bear the subject's name, the name of the person taking the 
prints, and the date taken. 



EFFECTIVE: 12/13/95 



m 

■ ■■;*■■ 



\W' 



K 







14-7.4 



Live-Scan Electronically Produced Fingerprint Impression 






(1) On November 10, 1988, the Identification 
Division! (now CJIS Division) (published the document, "Minimum Image 
Quality Requirements for Live-Scan, Electronically Produced, 
Fingerprint Cards." This document established the criteria that live- 

and 
jysl 



scan fingerprint cards must meet to be accepted for processing 
retention in the|FBI's identification records system. I 



(2) Since that time, the|CJIS|Division and Underwriters 
Laboratories, Inc., have performed an aggressive series of tests to 
ensure that the requirements are realistic, and that fingerprints 
produced on live-scan systems support the |CJIS|Division*s processing 
needs. 



Sensitive 
PRINTED: 02/18/98 



^.•:,J# 






mamm 



^m n »i'i»w 




Sensitive 



Manual oi investigative Operations and Guidelines 

Part. II ■,■ ;,::■■■;.<;;, , .. „.■"-. -.; ■ •^^.■ 



PAGE U - 12 



(3) As a result of these tests, live-scan fingerprint 
cards produced on specific equipment configurations are now being 
accepted for |CJIS|Division processing and retention. Appropriate 
announcements are made as live-scan systems are evaluated and accepted 
forjCJIS|Division use. 

(4) On August 30, 1991, the Identification Division] (now 
CJIS Division) (published a revision to the requirements document. The 
revision more accurately reflects the fingerprint processing needs of 
the FBI. 






-^'Wt 






.nffy 



EFFECTIVE: 03/10/94 




14-8 



FINGERPRINT CARD DATA 



EFFECTIVE: 03/23/92 



14-8.1 



Submitted by FBI 



EFFECTIVE: 03/23/92 



14-8.1.1 Subjects Incidental to Arrest 

When fingerprinting, an arrestee, at least two sets of 
fingerprints should be taken on the criminal fingerprint card (Form ' 
FD-249) . Both cards should be filled out completely with particular 
attention given to the following: 



contributor. 



(1) The card should reflect the local FBI office as the 






■■■;*&y 



'■■,';S*53i; 

■^' 
■■'W 




(2) Set forth complete charge in narrative form in the 
"Charge" block; statute citation should go on the back of the 
fingerprint card. 

(3) Date of arrest. 

(4) Full name and descriptive data. 



Sensitive ■ ' 

PRINTED: 02/18/98 

,' ■<'.■■'. ,• • . . . ..' ■ ' ■"■" 



m 



't-X~'t 



-'W:' 




1 



Sensitive 



Manual of Investigative Operations and Guidelines 
Part II::-. " • - 



PAGE 14.-, 13 



(5) Check appropriate "Photo Available" block on back of 
card; retain photo in field office file (do not attach to the 
fingerprint card). 

(6) Show the local United States Marshals Service (USMS) 
Originating Agency Identifier Number (ORI#) and address in the "Send 
Copy To" block on the back of the fingerprint card (local USMS ORI# 
can be obtained from the USMS or through an inquiry' of the NCIC) . 
This notation ensures that the USMS office assuming custody of the 
arrestee will receive a copy of the(Criminal Justice Information 

.Se-rvi-CM_JCJIS)_| Division, res po_^^^^ 

record or a notification that he/she had no prior criminal record. 
The USMS should be provided the duplicate set of prints and should be 
advised that the original fingerprint card has been forwarded to the 
FBI|CJIS|Division. This will assure the USMS that they will receive 
the results of the criminal history record check of the|CJIS|Division 
and will eliminate their need to fingerprint the arrestee. This also 
applies to situations in which a Federal prisoner (who is incarcerated 
in an area where there is no deputy marshal) is released at a hearing 
or arraignment before the marshal can obtain the prisoner's 
fingerprints. { (See MIOG, Part II, 14-8.2.) I 









;•■ '-Vj. 

.■ii?i. 









ascertained. 



(7) Disposition, if known, or submit it promptly when 



'?!*> 



EFFECTIVE: 03/10/94 



14-8.1.2 Suspects Only 



(1) "Suspect" to be indicated in space marked "Charge" on 
fingerprint card. 









(2) Fingerprints returned to field office after search 
and to be filed in 1-A section of investigative case file. 

(3) If identification ia made with a previous arrest 
record, a copy of record will be furnished to the field at time 
fingerprint card returned. 













Sensitive 
PRINTED: 02/18/98 



' :^i-i3 : ■ 



'^^ 
^^- 



?.'a;.^s 




Sensitive 



Manual of Investigative Operations and Guidelines 
Part II. ,^, 



PAGE lA - lA 



EFFECTIVE: 03/23/92 



-■■;.vw,v 

•.■■?u*?. 






14-8.1.3 



Informants 



(1) Us,^cii»4narfingerprij^t3.ar3^^^ and f orward to 

\mm. I Inf ?i^»ant | Vnif^l tttel 1 iggafej ggt i oC'Cr iSiif^"'^TS??I?I?StI^^- 
rision, for referral to th'e|CJISlbivision*f' " i;....;' , .^i* ., 



I 



'li 



t 



;«^?:. 



card. 



(2) 'Contributor is FBI field office. 



~aT 



aaayg-htmiftCTHWf -n— — .^■.»„„, — ^.. , p.^.. 



..Plaferthe word '"inquiry "- in "Cha r g e " space^'fa^ b^ 



U<Xr. 



(4) Full name and descriptive^ daYa7/ 



(5). 
classifiable 



"■'■.o-^-;-V-.V« . ii 




ion if 



EFFECTIVE: 03/10/94 



14-8.1.4 Juveniles 






Juveniles may be fingerprinted in accordance with the 
provisions of Title 18, USC, Section 5038 (see Part II, Section 4 of 
this manual) . 






EFFECTIVE: 03/23/92 




14-8.1.5 FBI Applicants (See MIOG, Part I. 67-11,3.8. 67-17.1.7.) 

FBI support applicants, who are favorably recommended, are 
to be fingerprinted at the time they are interviewed. FBI Special 
Agent applicants are to be fingerprinted at the time of their panel 
interview. Cards are to be submitted to FBI Headquarters, 
Attention: jPersonnel [Division, along with application, interview 
sheets, questionnaires and examination papers. In every instance, 
applicant for FBI position should be fingerprinted by FBI personnel. 



' ■■■-V4^ 



Sensitive 
PRINTED: 02/18/98 









H J W I W [. I f PW , I . IP I F>H» HB W 



iB 




Sensitive 



Manual of Investigative Operations and Guidelines 
Part II 



PAGE 14 - 15 



EFFECTIVE: 04/21/94 






■^^ 



M- 






* 



14-8.2 



Submitted by U.S. Marshals Service 



Primary duty of U.S. Marshals Service (USMS) is to 
fingerprint every Federal prisoner (except juveniles, see 14-8.1.4) 
without delay as soon as custody is assumed. USMS should be shown as 
contributor together with date of arrest, charge, and other data. 
Reverse side of card should be marked to designate copy of reply to 

_inter.es ted_FBI_field_office_or_offices_, Howeyer,_a„defendant_:.turned_ 

over to the custody of the USMS will not be fingerprinted, provided 
the arresting agency assures that it has already done so and has 
included the USMS in the distribution of the criminal history in the 
"Send Copy To" block of the FD-249 (see Section 14-8.1.1). 



rm 




EFFECTIVE: 09/25/91 



14-8.3 Submitted by Other Criminal Justice Agency for FBI 

Where subject is fingerprinted by another criminal justice 
agency for the FBI pursuant to arrest for which Federal process 
outstanding, FBI field office should be shown as contributor, together 
with date of arrest, charge, and descriptive data. Fingerprint card 
should be marked for copy of reply to local criminal justice agency if 
latter interested. 






■??■ 



EFFECTIVE: 09/25/91 




14-8.4 Submitted by Local Criminal Justice Agency on a Local 
Charge 

When subject is fingerprinted by a local criminal justice 
agency on a local charge, such as car theft, and FBI interested as 
possible ITSMV violation, local criminal justice agency should be 
shown as contributor, together with local charge, date of arrest and 
descriptive data. Copy should be indicated for appropriate FBI field 
office I by indicating in the "Send Copy To" block on the back of the 
fingerprint card, the field office Originating Agency Identifier 
Number (ORI#) and address.] 



Sensitive 
PRINTED: 02/18/98 









ffKmfi'^^^^rf^ 




Sensitive 



Manual of Investigative Operations and Guidelines 
Part _II^ , ■:'^f-. ^_ - - 

EFFECTIVE: 09/25/91 



PAGE 14 - 16 






14-9 



FINGERPRINT CARDS - TYPES 






EFFECTIVE: 09/25/91 



Mt 



14-9.1 Distributed to Criminal Justice Agencies Without Charge 



EFFECTIVE: 09/25/91 



14-9.1.1 Criminal Fingerprint Card (FD-249) 









1-^3 



This card is used by criminal justice agencies to record 
the finger impressions of those persons who have been arrested or 
incarcerated in a penal institution. The criminal card includes 
information regarding the arrest charge, the disposition, and other 
information relating to the physical description. Space is provided 
for the FBI number and should be indicated when it is known. Spaces 
are also provided for the contributor of the fingerprints to indicate 
whether or not a reply is desired and if a collect wire reply or 
collect telephone reply is desired. Due to the requirements of the 
[Criminal Justice Information Services (CJIS) [Division's automated 
services system, when a contributor places an FBI number on the 
fingerprint card, it is also necessary to submit a full set of 
fingerprints. 



' -'in 






EFFECTIVE: 03/10/94 



.?# 













Sensitive 
PRINTED: 02/18/98 







Sensitive 






Manual of Investigative Operations and Guidelines 
Part II ,, 

. ■' ' ' . ' ' . .7' , 

14-9.1.2 Applicant Fingerprint Card (FD-258) 



PAGE 14 - 17 



This fingerprint card is used in submitting fingerprints 
to the|CJIS|Division on persons directly employed in or applying for 
criminal justice positions ^or in those instances where authorized by 
Federal statute, Presidential Executive Order, state statute pursuant 
to Public Law 92-544, or regulation of the Attorney General of the 
United States. 



EFFECTIVE: 03/10/94 






14-9.1.3 Personal Identification Card (FD-353) 



This card is used solely for recor 
of those persons who voluntarily submit their 
purposes of identification only. These cards 
who desires to forward his/her fingerprints to 
retention. With regard to the fingerprints of 
printed by parents for identification purposes 
to retain the child's prints which should be f 
appropriate law enforcement authorities only i 
missing. They are not searched against the cr 
identification fingerprint cards are filed in 
ICJISlDivision. 



ding finger impressions 
fingerprints for 
are available to anyone 
the|CJISJDivision for 
children who have been 
, the parents are urged 
orwarded to the 
f the child becomes 
iminal file. Personal 
the civil file of the 







EFFECTIVE: 03/10/94 



14-9.1.4 Personnel Fingerprint Card (FD-380) 

This card is used exclusively for the taking of 
fingerprints of FBI personnel at the time they enter on duty. It is 
distributed to FBI field offices only. 



EFFECTIVE: 09/25/91 



.'>•:! 



Sensitive . 
PRINTED: 02/18/98 











m 
Sensitive "' '■''Tf# 



EFFECTIVE: 09/25/91 



14-9.2.3 U.S. Coast Guard Fingerprint Card 



EFFECTIVE: 03/10/94 



,»v-J^' 



Manual of Investigative Operations and Guidelines 

Part 11,^.:; ..-.■ ■■ :■.- ;; ■ . - page 14 - . 18 '^, 

■ . ■ ■ ' . ■: ■ . ■ -ga. 

14-9.2 Not Distributed by FBI but Processed in thejCriminal 
Justice Information Services (CJIS) [Division 

■ ■ "%;■> 

EFFECTIVE: 03/10/94 -= 

14-9.2.1 Office of Personnel ManageWent (OPM) Fingerprint Card 






This card (SF-87) used for taking of fingerprints of U.S. ; 

Government employees who come within purview of Government security % 

program. ,' 

EFFECTIVE: 09/25/91 

^ 14-9.2.2 Armed Forces Fingerprint Card '^f. 

This card (DD-2280) used by Army, Air Force, Marine Corps, .i-: 

and Navy for taking of fingerprints of military personnel. ?*'- 






This card (DD-2280) used for personnel of U.S. Coast ^t| 

Guard. Identification Division] (now CJIS Division) |has filed since '# 

11/15/48 a copy of these fingerprint cards as part of|its|civil M 

fingerprint file. Coast Guard maintains a separate fingerprint file. -If 






/M^(i,iS 



*^; ( 






Sensitive f '.' 

PRINTED: 02/18/98 . , J^ :i|«#|l" 





\J 



Sensitive 



Manual of Investigative Operations and Guidelines 
Part II.- -v;. -i - 



PAGE U - • 19- 



14-9.2.4 Alien Registration Fingerprint Card! (See MIOG, Part II, 
14-10.2.1 & 14-10. 2. 2. )| r 

This card (AR-4) was used by State Department and U.S. 
Immigration and Naturalization Service. Identification Divisionj (now 
CJIS) |has filed these fingerprint cards since 1940 when Alien 
Registration Act went into effect concerning fingerprinting of aliens. 
The fingerprinting requirement in the Act was rescinded in 1986 and, 
therefore, cards are no longer being received for filing. No other 
fingerprint file is maintained on alien registrations. 



EFFECTIVE: 03/10/94 



14-10 



FILES IN THE (CRIMINAL JUSTICE INFORMATION SERVICES (CJIS) I 
DIVISION 



^?mM. 



sS 






m 



.V3«t; 



EFFECTIVE: 03/10/94 



14-10.1 



Criminal File 



m. 



EFFECTIVE: 09/25/91 



^vs^ 



14-10.1.1 Fingerprint Card File 







The first retain fingerprint card received on persons 
arrested or incarcerated by local, state, and/or Federal authorities 
is assigned an FBI number. This card Ib filed in the Technical 
Section Master Criminal Fingerprint File by the fingerprint 
classification formula. This file is divided into male and female 
sections as well as age group. When a subsequent set of retain 
fingerprints is submitted and found to be identical with the first 
arrest in the CJIS Division's automated services system, the retain 
print will be maintained on microfilm. If the record has not been 
fully automated, the|record will be fully automated before processing 
of the retain fingerprint card is complete. | Alljwanted, flash and 



Sensitive 
PRINTED: 02/18/98 






HSH 




I 




Sensitive -'^^ 



Manual of Investigative Operations and Guidelines 

^"^ ^^.••;;,../ ;, ■ • .,:. , , PAGE 14- '20, ■ '^^'$ 

missing persons [notices are placed injthe subject's computerized -' 

criminal name record.] Unidentified missing person notices are i 

returned to the sender. Unidentified missing person fingerprint cards ' <^r; 

are filed m the criminal file, which is indexed by the fingerprint 
classification formulia. 



EFFECTIVE: 08/18/9A 



_14rJ0_.J_^2_ — Criminal. Name__Indi.ces__ (See MIOG, Part II, 14-2.2(5) & 
14-12.2.) ' " " - 



The name and descriptive information (e.g., aliases, sex, 
race, date and place of birth, social security number, etc.) appearing 
on criminal fingerprint cards submitted to the CJIS Division are 
indexed in the division's criminal name indices. All such data 
relating to offenders born on or after 1/1/29 is computerized. Data 
relating to offenders born prior to 1/1/29 is still maintained on name 
index cards and searched manually. If the current retain criminal 
card IS found to be identical to a [manual record, [ thejsubject 's | record 
will be maintained in the CJIS Division's automated services system. 
A match on the basis of name and. other descriptors cannot be reported 
as a positive identification without a subsequent fingerprint 
comparison. 



"Vrf.- 



■^ 



EFFECTIVE: 08/18/9A '^ 

14-10.2 Civil File Jf' 

EFFECTIVE: 03/23/92 ' '.% 



Si 



Sensitive 
PRINTED: 02/18/98 : ;iv- , . .^..^f,^ 






'i^'&^f 




Sensitive 



Manuial of Investigative Operations and Guidelines 
Part II r' „ .• J',;; -f*'..-.- '-'■ ■■ * .....^ - '■.■. 

lA-10.2.1 Fingerprint Card File :-^-.-- 



PAGE 14 - 21 






... JiTi 



This file contains fingerprint cards of military 
personnel. Federal employees, aliens, miscellaneous applicant-type 
fingerprints, and fingerprints submitted for personal identification.' 
With the exception of the aliens and personal identification cards, 
these cards are placed in this file provided no criminal card is 
located in the criminal file. In the case of personal identification 
fingerprint cards and alien registration fingerprint cards, no search 
is made by either name or fingerprint classification and the cards are 
automatically filed in the civil file. This file is divided into male 
_and_female_. 



EFFECTIVE: 03/23/92 



'•-;,>*:■• 









IA-IO.2.2 Civil Name Indices 



3 

m 



Names appearing on fingerprint cards of military 
personnel. Federal employees, aliens, miscellaneous applicant-type 
fingerprints, and fingerprints submitted for personal identification 
are indexed on 3- by 5-inch cards. On this index card appear name, 
race, height, weight, date of birth, fingerprint classification, 
registry number (military service, alien registration, etc.) and 
submitting agency. This file is divided into male and female. (Refer 
to 14-9.2.4 — No new alien fingerprint cards are being added to file.) 









EFFECTIVE: 03/23/92 






14-10.3 Missing Person Fingerprint File (See MIOG, Part I, 
7-14.8(4), 79-1.2; Part II, 16-16.3(2).) 






.fA-"-. 




This file contains fingerprint cards of persons reported 
missing to law enforcement agencies and entered into the National 
Crime Information Center (NCIC) Missing Person File under any of the • 
NCIC entry criteria. The criteria are. set forth in the NCIC OPERATING 
MANUAL, Part 8, Section 1, Subsection I.l, Page 8-1. The fingerprint . 
card for a person reported as missing is kept in the CJIS Division 
Information Services Section's (ISS) (formerly Technical Section) 
Master Criminal Fingerprint File until advised by the contributor to 
remove the card, or until the missing person reaches the age of 199.1 






-.'■:*r 



Sensitive 
PRINTED: 02/18/98 






tyi^-l'^^ri'^^i. 




Sensitive 



Manual of Investigative Operations and Guidelines 
Part II 



PAGE 14 - 22 -; 



EFFECTIVE: 05/13/96 






■1 






1.4-10.4 



FBI Number 



All criminal fingerprint cards which are to be retained in 
the CJIS Division files are given an FBI number if one has not been 
assigned previously. A number is assigned upon receipt of the first 
set of prints. FBI numbers are assigned in numerical sequence and no 
distinction is made between males and females. Assignment of an FBI 
jLumber^does_not_mean_thaL an i ndividua l has^an arrest record because 



certain civil fingerprint cards are assigned FBI numbers. When FBI 
number is known for an individual, it should be referred to in 
correspondence. An FBI number will be found: 

(1) On|microfilmed|3- by 5-inch index cards in the manual 
name index files. 

(2) I Deleted I " 

(3) In the CJIS Division's automated services system. 

(4) On "master" fingerprint card in the manual 
fingerprint card file of the ISS. 

(5) On other fingerprint cards filed in folders called 
jackets which contain a variety of criminal history records for an 
individual. 

(6) |Deleted| 

(7) On fingerprint cards/records on microfilm. 

EFFECTIVE: 08/18/94-^ 
14-10.5 Deleted 



-.fV, 






1 






^m 










EFFECTIVE: 03/23/92 



,M 



Sensitive 
PRINTED: 02/18/98 









'i^l^^T 



LJ-lLl-.i.l..l.li.....UJii.l.lJl.l.^— 




Sensitive 

Manual of Investigative Operations and Guidelines 
Part. II ^^, ; ' r; ■■■'■;■. , 

lA-10.5. 1 Deleted 
EFFECTIVE: 03/23/92 
l'A-10.5.2 Deleted 



PAGE lA - 23 









,>.■.•-■.■«;.■ 






EFFECTIVE: 03/23/92 



14-10.5.3 Deleted 



EFFECTIVE: 03/23/92 






■*SSi 



14-10.6 





Dead File (See MIOG. Part I, 79-1,2: & Fart II. 
14-15.2.) 



(1) Effective 10/1/88, the| Identification Division 
(now (Criminal Justice Information Services (CJIS) Division) will 
deactivate an identification record and move the record to its Dead 
File only when a current fingerprint (s) submission which the CJIS 
Division knows was taken from the deceased body is matched to the 
record or a Fingerprint Identification Indicator (FII) submission is 
received from a state in conjunction with the National Fingerprint 
File (NFF). When a fingerprint (s) taken from a deceased individual or 
an FII from an NFF state is received and matched to fingerprints on 
file in the CJIS Division's Criminal File, the subject's record is 
removed from the active file and placed in the Criminal Dead File and 
later filmed. Since 1/3/84, all criminal deceased name records have 
been entered in the|former Identif icationJDivision's Automated 
Services System] (IDAS) (now CJIS)|and retained for seven years, if the 
year of birth is 1929 or after. Also, effective 10/1/88, when a 
fingerprint (s) of a deceased individual is matched to fingerprints in 
the[former Identif icationJDivision's | (now CJIS) jCivil File, the civil 
print is retained in the Civil Dead File for seven years with a 
stamped notation on the back as to why the record was deactivated and 
moved to the Dead File. A fingerprint card of an unidentified 
deceased person which is received at the CJIS Division as "John Doe," 
"Jane Doe," or "Unknown" will be searched in the Criminal, Civil, and 
Missing Person Fingerprint Files; and, if no identification is 
effected, the fingerprint card will be retained for a period of seven 
years and then destroyed. 



•:^i. 



"If 

: ■# 
-■^tfSy. 



":M^ 



Sensitive^' 
PRINTED: 02/18/98. 



(^if-^ 



S'-'I'.-" 



iiaS>:3(S 







.. 1^. -. . X ■ 






.•*s 



Sensitive 



Manual of Investigative Operations and Guidelines 
Part II "■.. -:.,.,-■■ .••-■,••- ^ ■ . 



PAGE 14 - 24 



(2) The processing of fingerprint cards for deceased 
persons whose identities are known will be rejected at point of 
receipt. I The CJIS Division will accept and process all known deceased 
fingerprint cards that are accompanied by correspondence or a notation 
on the fingerprint card itself seeking positive verification of 
entitlement to veterans benefits.! 





■:■' ■;;;;^«, 



?#^ 



••^i* 



m 









---!i& 




EFFECTIVE; 03/10/94 



14-11 



PROCESSING OF FINGERPRINT CARDS IN THE I CRIMINAL JUSTICE 
INFORMATION SERVICES (CJIS) IdIVISION 



Fingerprint cards received in the|CJIS|Division are in the 
nature of inquiries demanding prompt replies. All fingerprints 
received are handled on a priority basis consistent with urgency in a 
particular case. Generally speaking, arrest-type fingerprints from 
criminal justice agencies are given top priority followed by various 
categories of applicant-type fingerprints. Processing involves the 
following: 

(1) Deleted 



(2) 



basis, 



Recording the number of prints received on a daily 






■■-;■■*• 







(3) Indicating any special handling, such as wire answer 
or search of military files. ^ 

(4) Record the date of receipt of the fingerprint card by 
assigning a Process Control Number. 

(5) Search all incoming fingerprint cards through th6 
Automated Name Search. If no tentative identification is effected, an 
Automated Technical Search is performed. A manual name and technical 
search is performed on those subjects with a date of birth prior to 

1932. •• . ■•' ;■ . . , .. 

(6) Those tentatively identified with prior records are 
verified by comparison of the finger impressions. 

(7) Deleted 



Sensitive- 
PRINTED: 02/18/98 






-viji^rif 
















Sensitive 



Manual of Investigative Operations and Guidelines 
Part II ^- /..:'5-,^-r. ,■.-,■•:■-:.■,--..-- - . 



PAGE 14 - 25: 



W When an identification has been effected and- 
verified, the complete record is assembled, consolidated, and 
necessary replies forwarded to the interested agencies. 



EFFECTIVE: 03/10/94 







:..AlM 

-mm- 






'ft" 



-i^~^2 REQUES TING RECOR DS FROM TjHE J CRIMJNAi^. .TtTS INFORMATION 



SERVICES (CJIS) I division! (See MAOP, Part ll,"T-2".i7)" 






EFFECTIVE: 03/10/94 



r.:;ste 




14-12.1 Requirements for Positive Identification - One of the 
Following: 

(1) Actual comparison of the fingerprints. 

(2) Submission of name plus FBI number. The Interstate 
Identification Index (lll)„ should be accessed initially to determine 
if an arrest record is available through the III before an inquiry is 
made of the|CJIS(Division (see Section 14-12,3.3). 

(3) Submission of name plus local arrest, commitment, 
registry, applicant, or military service number. There are exceptions 
in this category, such as, common names, which may make a search of' 
the voluminous automated or manual name file impractical. 



EFFECTIVE: 03/10/94 



.,.„,r-:.ai»v 
■-■-If 

• -■-«.,>J-,>Jh-- 

- ■ ssi 






Sensitive 
PRINTED: 02/18/98 






■■•■ ..r^^'^i^ 

■■■" '..iiliP^ 



tess 



ER 




t. 



Sensitive 



Manual of Investigative Operations and Guidelines 



Part II 






PAGE U 



14-12.2 



Possible Identification 



_ ^ A possible identification of a name and general 
descriptive data may be made by searching the Interstate 
Identification Index (ill) or the automated or manual name file 
(depending on date of birth, refer to 14-10.1.2). While good results 
may often be obtained when only general information is available, 
specific identifiable information produces better results and 
considerable savings of time and effort. 

-ElFECIiyE;_09/25 /91 



14 12.3 Procedures for Requesting Records for Field Offi 






26 









« 






m 



ces 








EFFECTIVE: 09/25/91 



14-12.3.1 Submission of Fingerprint Card by Field Office 

I ^„^ ^ ^^^ Preprinted fingerprint cards bearing contributor and 
I OKI number are furnished by the |CJIS|Division. 

(2) Only the field office or agency to which OKI number 
is assigned should use this card, and CARD SHOULD NOT BE EXCHANGED 
BETWEEN OFFICES OR AGENCIES. 

^. , ,. P^ ^° "°t <*elay submission of fingerprint cards pending 
final disposition of case. 

(*> Reply will be furnished to office or agency appearing 
m ORI space on card, and this agency will be listed on identification 
record as the arresting agency. 

(5) Cover letters need not be used. 

(6) FBI number, when available, should be placed on card 
in space designated. 

(7) Full identifying data to appear in spaces provided. 

• .. ^11 Investigative file number, when available, is placed 
in your no. OCA" space on the face of the card. 



Sensitive 
PRINTED: 02/18/98 






1 



m 






■ .-.as 



", '■-*?.& 

51;?,?% 









-:.,,... ,..„^,.^._ . . . ..-:. A. .^:'-m0.. 

— : .-._ ■: ^P -■■-■■■: _J^E„_' ^^ -'•-.^tf^ 

'"■ ■ ■ •'. ■■■'■f "/ V-'"'"' ■ ■■* ■ ,.■_■■••- '■■ - ■• ■ '- -'AfJ^ffii'M'" 

'■ '■'."■' --^ ■'■'. ' ^ ■ ■■■9 

■ ■ ■ Sensitive , ■ , '■Q'^M^ 

• - • . ■ ■ ■ ^ ¥%i;s' 

■.;."■ r-:^* 

Manual of Investigative Operations and Guidelines -.''i^ 

Part II ;-^;;-',"-:o;^^>.u-;-: - "; ■ ^ page 14 - 27 ; ::;;^ 

■'■■'■ ; ■ ■ •■■■'■/?$* 

(9) Note on back of card any special handling desired '^ 

before a specific date, as such eliminates the necessity of a letter "tS' 

or teletype'. " "" ^T^^S 



14-12.3.2 Notation on Fingerprint Card Submitted by Another Agency 
ii)_ S pecifica lly req uests copy of record be forwarded to 



interested field office. 

(2) No cover letter necessary. 

(3) If FBI Agent present at time individual involved in 
FBI investigation is fingerprinted by another agency, ensure above 
notation is placed, and best obtainable set of prints forwarded to 

ICJISlDivision. 



EFFECTIVE: 03/10/94 



14-12.3.3 Form FD-9|(See MIOG, Part I, 26-3(2) & Part II, 14-12.1.) 



L'&. 

■v*V 



EFFECTIVE: 03/10/94 -^}m 



0- 



IP 



-4^ 



(4) Each field office should have a definite arrangement ;^v 

with U.S. Marshal, as well as criminal justice agencies of larger .:!> 

cities, for ensuring above notation placed on back of fingerprint card ""Si' 

when warranted. . itSjj 



Ait}:: 



'Sfx. 



•'t' 



(1) If an NCIC computer terminal is readily available, 
the Interstate Identification Index (III) should be accessed to w 

determine if an arrest record is indexed for your individual before 
submission of FD-9. If the individual inquired upon has a date of. 
birth of 1956 OR LATER and no record is located in III, no record 
exists in the FBI's |CJIS|Division and no submission of an FD-9 is . 

needed. If the individual has a date of birth PRIOR to 1956 and, no .'!?? 

record is located, an FI>-9 should be submitted to the FBI's |CJIS" 

Division I because an arrest record may exist which is not automated and ^0 

indexed in the III. Refer to your NCIC OPERATING MANUAL, Part 10, 't 

which includes the III User's Guide for specific guidelines for 

accessing III. ' "^^ 

■ ■ ■ ^^^^ 

•- ,,, . ■ '.. . . • ^%l# 

J Sensitive • . ■ '^0'Q0^ 

PRINTED: 02/18/98 



i" ivkC.lfiSt^iy'M- 



liUA, 



.«<:■.; 






■#■• 



--}■-,■.■ 



' Hr- : vfy . 












Sensitive 



Manual of Investigative Operations and Guidelines 
Part II . i^r. 












■"•'-'^'■•■■rii-'y- ■'• ' •>:■.•••■'•*■'■;,•;:;•■■ ' V^^--- r-''-'- ■ °AuE 1**;,",^ .£o-;^ ■ i.'iu:s,;^s'" 



(2) When a large volume of record checks is needed and ' 
descriptive data can be obtained from an existing automated file, an . ' 
alternative to using the III or the FD-9 is Name Searching by Machine '-;' 
Readable Data (MRD) . The data is formatted into thejCJISJDivision 
standard format and theii Name Checks can be processed by magnetic tape 
and results provided automatically. . - 



of Form FD-9: 



(3) The following instructions pertain to the submission 



(a ) Name and arrest num ber or other number un der 



which fingerprints have been submitted. 

(b) FBI number if known. 

(c) All known aliases. 

(d) Fingerprint classification, if FBI number not 



known. 



request. 



form. 



(e) No file copy of FD-9 necessary. 

(f) Notation made in field office file showing 

(g) FD-9 returned to field office with results. 

1. No record, so noted on form. 

2. If identified, copy of record attached to 

3. Serialize and place in file. 

(h) FD-9 can be submitted in legible hand printing. 



EFFECTIVE: 03/10/94 



-?M-^-. 



Sensitive ,'-, 
PRINTED: 02/18/98 












Mm 

■•■ • '■'SbV.W • 

- vS^^K. 
. • ii V 

'■■■■ -ii 
■•■■ '^m 

<''¥^ 



m 






•(*•* /'i-r-sv 



IliSSSSiiS^'^^'W^^ 



■',1. '■-•; 



















^,,;. _, 






Sensitive 




■5 '^S^S'^^^dft''f%^ '■'^'^« 




Manual of Investigative Operations and Guidelines 

14-12.3.4 Form Fp-165 (See HIOG, Part I, 137-9.) 

• ■■T'<'v ■■ This form serves a dual function and is used to place' Vj:4-'^-?i^*t^-\f^"'"'' n^^^^^ 
Bureau field division stop whenever the field requests a wanted tor.;'''"' --A'-mm^. 
questioning and/or interview, without a federal warrant or, whenever, 
the field requests a flash be placed for informants, applicants for . 
federal pardons, Pretrial Diversion, etc. (See MIOG, Part I, 73-8.3, 
and Correspondence Guide-Field, 3-13.) 






(1) Causes a stop to be placed against the CJIS 
Division's criminal record file when wanted for questioning and/or. 
interview if fin gerprints exist. I f no fin gerprints e xist on the 



subject, then a stop is placed in the automated name indices file. 

(2) Causes a stop to be placed against the CJIS 
Division's criminal record file when a flash is requested for 
informants, applicants for federal pardons. Pretrial Diversion, etc., 
if fingerprints exist. If no fingerprints exist, the FD-165 is 
returned to the originating field office. When a flash is requested 
for an informant and no fingerprints exist, a name stop is placed. 

(3) At the time a stop is placed, the FD-165 can also be 
used to request the identification record on the subject. The 
identification record will be forwarded to the office submitting the 
FD-165. Thereafter, this record can be accessed through the III for 
any additional requests for the identification record. 



EFFECTIVE: 11/18/96 









'•^r^^C'' 






'»"■.■'^^'Vj^'w!^r 

■m 







14-12.3.5 Request for Photographic or Laminated Copy of Fingerprint 
I Card by FBI Field Office | (See MIOG, Part II, 21-23(22). )| 

(1) Direct airtel, memorandum, or teletype to FBIHQ, 
1 Attention: | CJIS | Division. ' . .^ . 

. (2) FBI number and number of copies needed should be' f.' 
indicated in request., ■ ' ,• . „ ; ;; 

(3) If fugitive, the Office of Origin should ensure'*®'. ;.' 
fugitive's FBI number is entered in his/her Wanted Person File record 
in NCIC before requesting copies of the fingerprint card. 



Sensitive 
PRINTED: 02/18/98. 






>i^m 



..^ilt'., iV .^-- .... - ■ ' . -. 







^^ •-■..,,. Sensitive ' ' ' . ■ -'^;: 

■ . . ■ . •■ ' vft?' 

Manual of Investigative Operations and Guidelines ^'s; 

Part II .:: PAGE 14- 30 t- 

EFFECTIVE: 03/10/94 



14-13 PHRASEOLOGY OF RECORDS FURNISHED BY THE | CRIMINAL JUSTICE 
INFORMATION SERVICES (CJIS) I DIVISION 




EFFECTIVE; 03/10/94 



14-13,1 Identifiable Records 

Since fingerprint records furnished by the |CJIS|Division 
under FBI numbers contain civil as well as criminal notations, they 
should be referred to as "identification," rather than "criminal," 
records. 



EFFECTIVE: 03/10/94 



14-13.2 Nonidentif iable Records 

When a search is made against the criminal fingerprint 
file and no record is found, thejCJIS |Division will use the 
phraseology, "No arrest record FBI." FBIHQ and field offices likewise 
should use such phraseology in their communications when applicable. 



EFFECTIVE: 03/10/94 



Sensitive 
PRINTED: 02/18/98 







Sensitive 



Manual of Investigative Operations and Guidelines 
Part II . 



PAGE 14 - 31 



14-13.3 "Bureau" Page 



data per 
i.e., th 
date on 
identifi 
"Bureau" 
the nota 
Persons 
the FBI 
are not 



When information transcribed for FBI use only, such as 
taining to a' previously processed "Return" fingerprint card, 
e contributor of the fingerprint card, the subject's name, the 
the card, and reason fingerprinted, etc., is added to an 
cation record, it is placed on a special page called the 

page. At the bottom of this page in capital letters will be 
tion "THIS PAGE SHOULD NOT BE DISSEMINATED OUTSIDE THE FBI." 
forwarding copies of identification records to sources outside 
should be governed accordingly. Be aware that "Bureau" pages 
tra nsmi tted with III resp onses to on-line information requests 
ough NCIC. ~ 



made thr 



EFFECTIVE: 12/10/91 



14-14 



CERTIFICATION OF IDENTIFICATION RECORDS AND FINGERPRINTS 



II 



Identification records will be certified by the Assistant 
Director or one of the Inspector-Deputy Assistant Directors of the 
Criminal Justice Information Services (CJIS) |Division upon issuance of 
a court order requiring certification. Such records are typed with or 
without abbreviations, as long as consistent, throughout document, and 
the certification is in accordance with Title 28, USC, Section 1733. 
Fingerprints also can be certified under the same citation. Requests 
for certifications should be limited to court cases or other special 
situations requiring the production of such a record. | (See 
Correspondence Guide-FBIHQ, 1-2.1.) I 



EFFECTIVE: 03/10/94 






';' .■■■•.X'o*'.' 
. 'litis- 



'M 









14-15 FORMS FOR I SUBMITTING, OBTAINING, AND VERIFYING] 
IDENTIFICATION INFORMATION 



EFFECTIVE: 12/10/91 




14-15.1 Final Disposition Report (R-84) 



Sensitive 
PRINTED: 02/18/98 






i^. 





■-mm. 

Sensitive 'i^S-if 

.'"V-- 

Manual of Investigative Operations and Guidelines ,'t. 

Part II PAGE lA - 32 ,^#' 



EFFECTIVE: 12/10/91 



14-15.1.1 Use by Field OfficesjCSee Correspondence Guide-Field, 
3-61.) I 

(1) Reporting final dispositions of criminal cases in 
which fingerprint cards have been previously submitted and retained by 
the Criminal Justice Information Services (CJIS) Division. 



(2) Serves as a follow-up to a specific arrest. 

(3) Only one disposition form should be used to record 
the dispositions against any one individual. 

(4) Only the original need be sent. 

(5) Deleted 

(6) One copy retained in field office file. 

(7) In any case, where a field office takes credit on an 
FD-515 for the arrest or conviction of an FBI subject in connection 
with violations of a federal law, the Office of Origin of this case 
must ensure that the CJIS Division is advised of the final disposition 
or any amended disposition. This can be accomplished by forwarding a 
Final Disposition Form (R-84) to the CJIS Division. If the Office of 
Origin has determined that another field office or other criminal 
justice agency has already submitted the disposition to the CJIS 
Division, it is not necessary to forward the R-84. However, the 
Office of Origin must document in the investigative file the identity 
of the agency or auxiliary office which submitted the R-84, and 
similarly note such information in the "Remarks" section of the 
FD-515, (See MAOP, Fart II, 3-5.4 & 4-6.) 



EFFECTIVE: 07/19/95 



Sensitive 
PRINTED: 02/18/98 



"T-t iy ■ . p^i i^^ n i ft^y^ 








* 




Sensitive 



Kanual of Investigative Operations and Guidelines 

Part II . ■ ' ;. PAGE 14 - 33 

14-15.1.2 Use by Local and State Criminal Justice Agencies 

Submitted in each case at whatever level - law 
enforcement, prosecutor, or court - upon receipt of final disposition. 

EFFECTIVE; 03/23/92 



14-15.1.3 Not Used 

(1 ) If final d is position known at time fin g er prin ts 



submitted to|CJIS|Divi8ion, then disposition data should be recorded 
on fingerprint card thus eliminating need for R-84. 

(2) If subject not fingerprinted, there is no arrest 
record against which disposition data can be posted. 

(3) If the fingerprint was returned by thejCJIS JDivision 
as unclassifiable, etc., and the fingerprints were not resubmitted by 



;i the contributor. 

(4) If reporting new arrest information, since such 
information must be furnished on a fingerprint card. 



EFFECTIVE: 03/10/94 

14-15,1.4 Data for Preparation of Form 

(1) Contributor of fingerprints. 

(2) Name and number under which fingerprints submitted to 
FBI, and State Identification number, if available. 

(3) If the FBI arrested the arrestee, the form should 
reflect the field off ice. file number. U.S. Marshal's number should be 
furnished in every instance in which the U.S. Marshal has 
fingerprinted a prisoner and assigned a number. If this number is not 
available in the FBI field office, it must be obtained from the U.S. 
Marshal's office. 

(4) Date arrested or charged. 



Sensitive 
PRINTED: 02/18/98 






m 



It 



-rfr'^ 



•i¥f 



' ■>'■■■" 




r ^ 



Sensitive .-. :|;C 



Kanual of Investigative Operations and Guidelines !t 

Part II PAGE 14 - 34 -# 

(5) Original charge for which arrested or committed. If 7"'^ 

penal code citations are used, they should be supplemented with a .-fc- 
brief explanation of the type of charges (s); i.e., ITSMV, burglary, 
etc. 



(6) Final disposition and Date thereof; 

(a) Include dispositions for all counts of the ~ 
indictment (s) 

(b) If sentence imposed relates to a charge other 

th an the c harg e for which arrested , state this and als show how 

disposition relates to original charge. 

(7) FBI number, if known. 

(8) Sex 

(9) Fingerprint classification, if available. 
I , (10) Age or date of birth 

(11) Submitting agency. 

EFFECTIVE: 03/23/92 

14-15.1.5 Return of Form to Contributor 

(1) A disposition form should include sufficient 
information to allow the|CJIS|Division to handle it without referring 
to previous submissions. If the required information is not 
furnished, the disposition form is either returned to the contributor 
with reason(s) for the return indicated or it may be destroyed. 

(2) The subject's arrest fingerprint card showing the 
offense quoted on the disposition form must be in the|CJIS|Division's 
Criminal File in order to post the disposition. . If no fingerprints 
for the offense are on file in the |CJIS {Division's Criminal File, the 
disposition form will be appropriately disposed of. 




Sensitive 
PRINTED: 02/18/98 






-/•??« 






Manual of Investigative Operations and Guidelines 
Part II 



PAGE 14 - 35 



(5) FBI number should always be shown when available. 



EFFECTIVE: 03/10/94 



t^ 



14-15.1.7 Accountability for Dispositions 

All missing dispositions on identification records 
received by the field must be accounted for. SAC may, at his/her 
discretion, authorize an exception in "nonfugitive-prosecutive" 
matters where FBI interests are best served by not m aking a 
dispositional inquiry; e,g.,| 




EFFECTIVE: 09/26/90 



',".'H 




Sensitive 



i&- 



EFFECTIVE: 03/10/94 



•^=>:, 



14-15.1.6 FD-10 in Lieu of Final Disposition Report (R-84) 

FD-10 is used by FBI field office to request dispositions 
from a local criminal justice agency (if request is for New York City, 
send two copies of FD-10 to the New York Division of Criminal Justice 
Services, Executive Park Tower, Stuyvesant Plaza, Albany, New York 
12203-3764, rather than the New York City Police Department). | (See 
MIOG, Part II, 23-3.1(2).)! ■ 



(1) Place notation of request in investigative file. 

(2) Upon return of FD-10, note pertinent information in 
investigative file. 

(3) Forward to|CJIS|Division in lieu of R-84 if final 
disposition is set forth or its unavailability is so stated. 

(4) Office of origin has responsibility of sending FD-10 
and advising auxiliary offices, if necessary, of any pertinent data 
obtained. 



:*,> 



£i. 



")h 



Sensitive 
PRINTED: 02/18/98 



■ i' i ' | ''' J ii J. ii »U Wi' HU | iL i - 







Sensitive 



Manual o£ Investigative Operations and Guidelines 
Part II 



I 14-15.2 Death Notice (R-88) ( (See KIOG, Part II, 14-10.6.) 



PAGE 14 - 36 



1% 



■ '3*,. 



This form, previously furnished to criminal justice 
agencies, was used to report the death of an individual whose 
I fingerprints are on file in the|CJIS|Division. This form has been 

discontinued. Correspondence, includine the R-88 form, containing a 
I fingerprint impression(s) that the |CJIS|Division matches to a record, 

will not cause the identification record to be placed in 
I thejCJISJDivision's Dead File unless the|CJIS|Division is positive 

that the incoming fingerprint (s) is an impress ion (s) taken from the 
__body.p„f_thfe_de_c eased person. Unconfirm ed deceas ed infor mation , i.e. . 



not supported by a print (s) from the body, will be added to the record 
to show that the subject of the record was reported deceased on a 
particular date by a specific agency. The record will remain active 
and be subject to dissemination upon request. No cover letter is 
necessary when the R-88 form is used; however, its continued use is 
discouraged. Submission of the individual's fingerprints taken from 
the body of the deceased on the arrest fingerprint card (Forin FD-249) 

.., , is the best method of advising the |CJIS [Division of the death of an 

'■•-i individual with a criminal record. 









EFFECTIVE: 03/10/94 



14-15.3 



Deleted 




EFFECTIVE: 03/23/92 



14-15.4 Fugitive Airtel (FD-65) (See MIOG, Part II, 21-4; MAOP, 
Part II, 7-2.1.) 

Submitted when subject becomes an FBI fugitive. This form 
provides FBIHQ, Criminal Investigative Division, with notification of 
subject's fugitive status. [This form also provides the Savannah 
Information Technology Center (SITC) with notification of the 
fugitive's status and provides it with the basic background to conduct 
appropriate record checks available through the SITC. The SITC will 
provide the Office of Origin with additional background information, 
if available, resulting from these record checks.) The Office of 
Origin uses this form to enter the fugitive warrant into the National 
Crime Information Center (NCIC) Wanted Person File; this results in 









Sensitive 
PRINTED: 02/18/98 



j^*** 




i 




(3) Deleted 

(4) Do not delay the submission of the form to obtain 
additional descriptive information not readily available. 



EFFECTIVE: 03/23/92 



Sensitive 
PRINTED: 02/18/98 






Sensitive " ' . . ' . ..,^B:. 






Manual of Investigative Operations and Guidelines 

Part II- r' PAGE 14- 37:. -« 



the automatic entry of the warrant information into the subject's i 'i^S^ 

automated criminal identification record and/or name indices file if ' -'-aM' 

such a record exists. If no fingerprint file exists on the subject, iS^. 

then a notice is placed in the CJIS Division's automated name indices '|^^| 

file only. '{\ 



EFFECTIVE: 10/11/94. .^ 

J4-15 .Jt .1 Data for Prepa ration o f Fo rm .' fi>;% 

(1) Title appearing on form should contain the names of .ffej-. 

all fugitives involved in the case in accordance with MAOP, Part II, 'f|- 

Section 10-16.7 through 10-16.7.2. V^ 






(2) The original, marked for the attention of the ^^ 

Criminal Investigative Division, should be sent immediately after r'^'. 

fugitive process is obtained. %;f 












14-15.4.2 Data for Supplemental Submission 7® 



rt i'^i 



(1) Pertinent additional descriptive information obtained 'H|^' 
subsequent to initial submission. '.Tf*. 

(2) Mark appropriate block on form. 






(3) Refer to date of initial submission. , ^^SS 

(4) If the information previously furnished ia no longer . ^^l^^ 
accurate, insert either the new information or the word "delete" in ■. • ^^^ 
the appropriate spaces on the form. s^2%^ 



--.-iif-Z'' 




Sensitive 



■ ■■•v.ii»: 



Manual of Investigative Operations and Guidelines 
Part II ■ , 



PAGE 14 - 38 






?-fe 



EFFECTIVE: 03/23/92 



14-15.4.3 No Initial Submission 






An initial fugitive airtel is not necessary in cases 
involving parole or mandatory release violators or deserters. 
However, a supplemental form should be submitted to show any changes, 
additions, or deletions to identifying data furnished in 
correspondence from FBIHQ initiating the investigation. 



EFFECTIVE: 04/19/91 



14-15.4.4 No Supplemental Submission 



It is not necessary to submit a supplemental form when the 
subject's FBI number and fingerprint classification are furnished by 
FBIHQ. However, these items should be modified in the subject's NCIC 
Wanted Person File entry when a positive identification is indicated 
via Form 1-374. 



Ms 



EFFECTIVE: 04/19/91 



14-15.4.5 Results of Submission 



(1) When NCIC provides the |CJIS JDivision with the warrant 
information which has been entered into the Wanted Person File, the 
wanted notice on any Federal fugitive is routinely placed in the 
|CJIS(Division criminal record *or in the automated name indices if no 
record exists. 



■■KJ., 




(2) Arrest and disposition data should be promptly 
forwarded to thejCJIS JDivision in all fugitive matters. Any 
photographs of the fugitive should not be furnished to the 
|CJIS [Division but should be retained in the field office files. 

(a) Six months after an individual is declared a 
fugitive, the office of origin must review its files to determine 
desirability of requesting background data from the|CJIS(Division. 
SAC must personally approve each such request. If it is believed that 
background information in a subject's identification record might 



Sensitive 
PRINTED: 02/18/98 










Sensitive 



Manual of Investigative Operations and Guidelines 
Part II -; 



PAGE lA - 39 



cause prompt apprehension, request nay be made at any time provided 
SAC personally approves same. 

(b) Background data furnished from subject's 
identification record is forwarded by Form 1-374, the pertinent 
portion of which should be included in the next investigative report. 
Descriptive data furnished by|CJIS|Division may be duplicated for 
inclusion in investigative report. These instructions do not alter 
the policy of quoting complete identification record of all subjects 
in an investigative report. 1 (See MAOP, Part II, 10-17.11.1.) | 






'1^ 




EFFECTIVE: 03/10/94 



14-15.5 FBI Field Office Wanted-Flash-Cancellation Notice (FD-165) 



EFFECTIVE: 04/19/91 



14-15.5.1 Submitted for the Placing of Flash Notice in 

Criminal Justice Information Services (CJIS) Division 
when: 

(1) Federal arrest warrant has not been issued. 



(2) Background Investigation - Pardon Attorney's Office 
investigation is being conducted. (See MIOG, Part I,|73-8,3; Part II, 
14-15.5.3.) I 

1(3) Arrestee is in the Pretrial Diversion Program. | (See 
MIOG, Part II, 14-15.5.3.) | 



EFFECTIVE: 11/18/96 



•fc-: 



'M 




14-15.5.2 Submitted for the Cancellation of Flash Notice when: >- 

Need no longer exists in natters referred to in (1) above. 
Submit promptly. 



Sensitive 
PRINTED: 02/18/98 







Sensitive 



Manual of Investigative Operations and Guidelines 
Part II 



. \i- 



PAGE 14 - 40 



EFFECTIVE; 04/19/91 



14-15.5.3 Not Submitted for Cancellation when: 

(1) Involves matter referred to in 14-15.5.1 (2) above. 
Such flashes are automatically removed by FBIHQ upon notification from 
Pardon Attorney or after five years, whichever occurs first. (See 
MIOG, Part I, 73-8.3.) 

„(2) Involves matte r referred to in 14-1 5.5.1 (3) above. 



For instructions regarding removal of flashes in these instances, see 
14-16.7(2). 

(3) Fugitive airtel (FD-65) has been submitted to FBIHQ, 
since FD-65 automatically takes precedence over any prior flash 
notices. 



EFFECTIVE: 11/18/96 



14-15.5.4 Preparation of Form for Placing Flash Notice 

(1) Make duplicate of original for field office file. 

(2) No yellows necessary. 

(3) Indicate on form if fingerprint classification of 
subject desired. 

EFFECTIVE: 03/23/92 




14-15.5.5 Preparation of Form for Cancelling Flash Notice 

(1) No field office file copy necessary. 

(2) Stenographer should mark field office file copy of 
original submitted form to show date cancellation notice submitted and 
initial and date this notation. 






Sensitive 
PRINTED: 02/18/98 



•''•Sit;' 





Sensitive 



EFFECTIVE: 03/23/92 



lA-15.6 Criminal Justice Agency Wanted-Flash-Cancellation Notice 
(1-12) 

This form is available to all local, state, and Federal 
criminal justice agencies. It is not to be used by FBI field offices. 



EFFECTIVE: 05/14/93 



14-15.6.1 Use of Form 

(1) Alleviates necessity of preparing a letter to the 
CJIS Division. 

i 

(2) Same form is used to place or cancel a wanted or 
flash notice. 

I (3) |Deleted| 

(A) |a flash notice will only be placed when fingerprints 
supporting flash offense are on file in CJIS Division or submitted 
with the 1-12. FBI number must be quoted on the 1-12 if prints not 
being submitted with the 1-12. | 

. (5) I Deleted I 

(6) Deleted 



EFFECTIVE: 05/13/96 



Sensitive 
PRINTED: 02/18/98 









Manual of Investigative Operations and Guidelines 



Part 11 . PAGE 14 - 41 "^- 



-•v,-^-i%i',- 



. . «.,. •C-'...j^^\w.t» . , 




Sensitive 



Manual of Investigative Operations and Guidelines 
Part II 



14-15.6.2 Preparation of Form 

The form should be completely filled in so that the 
identification record for the subject can be located. FBI number 
should bejeivenjif known. |lf not knovm, fingerprints should be 
submitted.! 



■■■ 








PAGE 


14 - 


42 




It the 






• ■■ '-':^^ 



^*i' 



EFFECTIVE: 03/23/92 






14-15.7 



Deleted 



-•;•;/, 



EFFECTIVE: 07/19/95 






Mi 



14-16 ACKNOWLEDGMENT OF FINGERPRINTS BY [CRIMINAL JUSTICE 
INFORMATION SERVICES (CJIS) I DIVISION 



,■■■,:?>- 



"-^ 



EFFECTIVE: 03/10/94 



j-'.£?;- 



14-16.1 . If Submitted Fingerprints are Identical with a Prior 
Record (an "Ident") 



..:,m: 



When a search through the identification files discloses 
prior record, the fingerprint currently received is acknowledged by an 
FBI identification record which sets forth in detail the fingerprint 
record available on the individual and furnishes an FBI number which 
should be quoted in all subsequent communications. Copies desired for 
other agencies should be indicated by the contributor on the 
fingerprint card and not in a cover letter. Requests for additional 
copies should be kept to a minimum. 







EFFECTIVE; 12/10/91 



Sensitive 
PRINTED: 02/18/98 






'»f>;\, ■ ■ 




Sensitive 



PAGE 14 -, A3,-. 



Hanual of Investigative Operations and Guidelines 

Part II -.-,, ■^■■a-7--. -..:\ -tr-, ;- - " "/■' '■ .: - 
.•-.,■ ■ r;^'!;".' ■■ .,,.«• ■ ':"_■■■:. -' ■;■■.;•;•;•■ ,. . . ■■..., 

14-16.2 I£ Submitted Fingerprints are not Identical with a Prior V"- 
Record (a "Nonident") 

When a search fails to reveal prior arrest data, an 8 1/2- • 
X 11-inch nonident response which reads, "A search of the fingerprints 
on the above has failed to disclose prior arrest data" is furnished to' 
the contributor of the fingerprint card. Copies of this response are 
forwarded to the agencies which will subsequently assume custody of 
the individual and to the FBI field office when requests for such 
copies are noted on the fingerprint card by the contributor. Copies 
will also be furnished to the State Bureaus, except when acknowledging 

fingerprint s from a F ederal agency. Beginning in February, 1983. 

State Bureaus participating in the Interstate Identification Index 
program began receiving nonident responses on-line via the NCIC 
network. 



EFFECTIVE: 12/10/91 



" '-mm 

*-■ >■■ ; -*^■.lVMt- 

■ ■•.r.iiais^aS;' 
■ '-m 

*■ ■■ .-^'ijn 



,'»*.<!■, 






.vi3#5 







m 



14-16.3 



Fingerprints Submitted Involving Nonserious Offenses 



All criminal fingerprint cards showing only nonserious 
charges are returned to the contributor without being searched through 
the|CJIS|Division files. However, when a fingerprint card bearing 
such data in the "charge" block is submitted to resolve a question of 
identity or for a current investigative purpose, it is searched 
through the files of the|CJIS|Division and both it and the results of 
the search are returned to the contributor. An agency which requested 
a flash or wanted notice and the contributor of the current 
fingerprints are notified if a match is made. Fingerprint cards 
returned to a contributor are not made a part of the FBI 
identification record. 









H;' 



EFFECTIVE: 03/10/94 







Sensitive 
PRINTED: 02/18/98 






, • - v.*-.-,.;s5*- 



.,''^:^?v 




Sensitive 



Manual of Investigative Operations and Guidelines 
Part II •■ 



PAGE 14 - 44 



14-16.3.1 Examples of Nonserious Offense Return Fingerprint Cards 
(not all inclusive) 

(1) Juvenile offenders as defined by state law (unless 
tried as an adult). 

(2) Charge of drunkenness and/or vagrancy. 

(3) Certain public order offenses, 
(a) Disturbing the peace. 



■■m§ 

■ ■..:■*>• 






s 



(b) Curfew violation. 



$ 



(c) Traffic (except arrest for manslaughter, driving 
under the influence of drugs or alcohol, and hit and run). 

(4) Charges of "suspicion" or "investigation" 
(unaccompanied by criterion charge) . 



EFFECTIVE: 12/10/91 



■-■■<s^,. 

f 



14-16.4 



Deleted 



-■'i?! 



EFFECTIVE: 03/23/92 






'^: 



14-16.5 Fingerprints Submitted by Local, State, and Federal 
Criminal Justice Agencies 



in.v 



EFFECTIVE: 03/23/92 










Sensitive 
PRINTED: 02/18/98 



fSif! 
















Sensitive 



Manual of Investigative Operations and Guidelines 
Part II- ■■ "r.v ■ ..,; < ...:■: :,. ;-"-^ ■'■ ■ - "■ 

14-16.5.1 Multiple Submissions 



PAGE 14 - 45 



Agents in daily contact with local, state and Federal 
criminal justice agencies should be alert to detect instances of 
multiple fingerprinting of the same individual by two or more agencies 
on the same or a related offense. This causes unnecessary work by the 
[CJIS |Division and could be eliminated by a notation on the reverse 
side of the fingerprint card requesting additional copies of record(s) 
for agencies which might otherwise fingerprint the individual for the 
offense. 









EFFECTIVE: 03/10/94 






14-16.5.2 Unacceptable Submissions which Request that Copy of Record 
Be Mailed to FBI Field Office 



■'^■■ 




-t 




(1) When fingerprints bearing the notation "Send copy to 
FBI office" are received from a local, state, or Federal criminal 
justice official and these fingerprints are not acceptable for 

I CJIS I Division files, a copy of a form letter returning the prints to 
the contributor will be designated for the field office indicated on 
the fingerprint card. Stamped on the field office copy of this form 
letter is the following statement: "If this individual is subject of 
Bureau case, you should follow to ensure that acceptable fingerprints 
are submitted to FBIHQ. If prints cannot be obtained, advise FBIHQ by 
letter giving reason." 

(2) There will be occasions when new prints are not 
readily obtainable because subject is no longer in custody, charges 
have been dismissed, or it would not be feasible to insist on 
fingerprints. This information and your recommendations should be 
forwarded to FBIHQ in a UACB letter. 

(3) When dealing with local, state, or Federal criminal 
justice agencies, remember that if an acceptable set of fingerprints 
had been received, the reply would have been mailed in the form of an 
identification record with copies to the appropriate field offices if 
the subject had prior criminal prints on file. If the |CJISjDivision 
had no prior criminal history record for the subject, the 

reply would have been in the form of a "nonident" response. 



Sensitive 
PRINTED: 02/18/98 






'5* 



.-- \i 



ify 






,>v: ■. ;(.', X'Si-;'itS;; 



■ -7^ 
" ■ ■■#' 



.,^^^,: ... 




Sensitive 



Manual of Investigative Operations and Guidelines 
Part II . .. /■'■■':: :'■....■ 



EFFECTIVE: 03/10/94 

14-16.6 Mail and Wire Service 

EFFECTIVE: 11/21/89 



PAGE 14 



r 46, 



vi.(.«,.-,,.. ; 

--■■■. '?«^i'.- 






•%?? 






14-16.6.1 First-Class Mail 






All written acknowledgments to requests received in'the 
I jCJISJDivision are sent by first-class mail. In addition to this 
standard procedure, answers forwarded in excess of 350 miles are 
transported by air. If requested by submitting agency, the 
acknowledgment is sent by registered mail. 







I 



EFFECTIVE: 03/10/94 



14-16.6.2 Hires on Wanteds 

Hires are sent via the National Law Enforcement 
Telecommunications System, Inc. (NLETS) when NCIC agency identifiers 
(ORIs) are available; otherwise, wires are sent collect. 






«. 






EFFECTIVE: 11/21/89 



14-16.6.3 Special Handling 



~\ 



A notation on the reverse side of the fingerprint card in 
the space provided to indicate "special handling" is sufficient and no 
cover letter is necessary. 



EFFECTIVE: 11/21/89 



'M 



"0. 
W 



■ ■ n> 




Sensitive * ' - 
PRINTED: 02/18/98 









I J.'J.Iki II, H.1.1 




*. 





■A, "I'-V'U 

m 

Sensitive 



Manual of Investigative Operations and Guidelines 

Part II , . 5 . PAGE 14- 47 

14-16.6.4 Not Automatically Forwarded 



Program I (PDP) 

(1) I In the event the fingerprint card precedes the 
FD-165, the PDP offense should be indicated on the form.j The U.S. 
Attorney determines the eligibility of an offender for the|PDP,|and 
then refers the case to the Chief Pretrial Services Officer. In cases 
not under FBI investigative jurisdiction, the PDP Coordinator submits 
the divertee's fingerprints to the FBI CJIS Division on the criminal 
. Jl fingerprint card (Form FD-249) , together with an 1-12 Flash Notice 

indicating diversion, the expiration date of the diversion period, and 
a request that the Pretrial Services be notified if an arrest occurs 
during the supervised diversion period. The charge should be 
indicated in the "Charge" block of the fingerprint card and "Pretrial 
Diversion" in the "Disposition" block. Upon completion of the 
diversion period, the Chief Pretrial Services Officer will submit a 
Final Disposition Report (R^84) to the CJIS Division. This 
information will be added to the divertee's identification record to 
indicate "Successful Completion - Charges Dropped." 

(2) In a diversion case under the FBI's investigative 
jurisdiction, the Office of Origin must ensure that the subject's 
fingerprint card (FD-249) is submitted to the CJIS Division, together 
with an FD-165 Flash Notice indicating the diversion and the 
expiration date of the diversion period, and requesting that the FBI 
field office be notified if an arrest occurs during the supervised 
diversion period. The "Charge" should be indicated in the charge 
block of the fingerprint, card and "Pretrial Diversion" in the 
disposition block. The Office of Origin must also ensure that the 
CJIS Division is advised by FD-165 to cancel the flash if the ■'-. 
diversion period is terminated at any time prior to its expiration. 
Upon completion of the diversion period, the Office of Origin must 
ensure that a Final Disposition Report (R-84) is submitted to the CJIS 
Division. This information will be added to the divertee's 
identification record to indicate "Successful Completion - 



Sensitive 
PRINTED: 02/18/98 









Current copies of arrest records are not forwarded -.ifSv 

automatically to agencies which had previously submitted fingerprint ' ,^ 

cards unless agency has posted a wanted or flash notice against the ij 

record. . " ;{■ 

EFFECTIVE: 11/21/89 

14-16.7 Finger prin ts Submitt ed Inv olving Pretrial piyers_io_n 



■...'(" 
■?#' 



'I'i 






.■ -.S'M" 



•=s*,^^§S. 






■■ ■ .-s^ 

. •■'■ .■ ■ vM 

Hanual of Investigative Operations and Guidelines "'^;^> 

Part II -.^ ' ■ PAGE 1^ - 48 v -^i^ 

Charges Dropped." (See MIOG, Part II, 14-15.5.3(2).) " ; ^If 



Sensitive 



EFFECTIVE: 12/02/94 



m 



(3) The CJIS Division will retain the PDP information and 

disseminate this information to all authorized recipients of the 'a^f 

record for the period of the diversion and for three years after the ^/^J 

successful completion of the diversion period. If the PDP is revoked, %A> 

proper notification should be submitted to CJIS Division via Form R-84 :-/s^ 

indicating the PDP has been revoked and the date of revocation. IE no'' ' ^} 

information is received by the CJIS Division indicating the divertee I 

failed to successfully complete the diversion period, the CJIS ,.% 

Division will handle the record, as if the diversion period was -5'^ 

successfull y comp leted. After the three- year period, there will be no ■,--;^g-. 

further dissemination of the information pertaining to the Pretrial .-j;; 

Diversion. Once the three years have expired after the successful ''j^- 

completion of the diversion program, any fingerprint cards regarding .-^^ 

the diversion will be expunged from the CJIS Division file and .-.^Sr 

destroyed. If an additional arrest fingerprint card is received by ■■^.. 
the CJIS Division within the period of diversion or the three years 
following the diversion period, the Pretrial Diversion record will not 
be expunged and will be retained indefinitely. 






-!*i»- 
!-''">' 



(4) Fingerprint card submissions involving PDP CHILD 
PORNOGRAPHY CASES are permanently retained by the CJIS Division. The '^ 

record of the Pretrial Divertee' s involvement with CHILD PORNOGRAPHY "S'? 

will not be expunged and is subject to dissemination regardless of 
whether the Pretrial Divertee successfully completed the Pretrial 
Diversion Period. In each case this is based upon a Pretrial 
Diversion agreement between the divertee and the U.S. Attorney's 
Office which provides that the FBI may maintain a permanent record of 
the fingerprint card and of the divertee 's involvement in the PDP as a 
result of the CHILD PORNOGRAPHY CASE. 









^tWWWWW ll. f'ii H i LW ' ! 



m: 



. '•>i^\ 









-lit 



' • "^ir'- 

Sensitive _ Js-r* 

PRINTED: 02/18/98 ,.•,.,,. _,,,_,, ^^..^.^^^^ 



> -:'-j.-n"'-. 





Sensitive 



Manual of Investigative Operations and Guidelines 
Part II ■■::■.-■ ■ ' • ■ ^- ■ v- 



PAGE - lA .- 49 



14-16.8 Fingerprints Submitted Involving Federal Youth Correct ions'-x^ '. 

Act ■ ■ ., --^ %. .•;■/•' ■ " • . 

(1) With the enactment of the Sentencing Reform Act of 
1984 (a part of the Comprehensive Crime Control Act of 1984, Public 
Law 98-473 which was signed into law on October 12, 1984), the Federal 
Youth Corrections Act was repealed. The Department of Justice has 
taken the position that the repeal of the Act is applicable only to 
offenses committed after the date of enactment.' Although the Act may 
still be applied to crimes committed prior to October 24, 1984, if 
Judges so choose, Government attorneys should argue in individual 
ca ses that Judges should not exercise the ir discretion to impose 
sentence under the Act. """ . 

(2) When an individual has been sentenced under the 
provisions of the Federal Youth Corrections Act, the United States 
Parole Commission (USPC) is authorized to grant an "unconditional 
discharge" before the expiration of the maximum sentence imposed 
(Title 18, use. Section 5021). In such case, the USPC automatically 
sets aside the conviction and issues the youthful offender a 
"Certificate Setting Aside Conviction." 



(3) Upon receipt of a copy of the cer 
aside the conviction, the FBI |CJIS|Division, with 
United States Department of Justice, returns the c 
fingerprint card(s) to the original contributor(s) 
identification record has not been automated. If 
identification record is an automated record, the 
fingerprint card(s) is removed from|CJlS|Division' 
destroyed. The return/destruction of the fingerpr 
in the complete expunction of the arrest and convi 
ICJISJDivision's Criminal File. 



EFFECTIVE; 03/10/94 



tificate setting 
concurrence of the 
orresponding 

if the FBI 
the FBI 
corresponding 
s Criminal File and 
int card(s) results 
ction data from FBI 



-'•■■ ■■.■*::-s5# 

• ■.■■^rvrSfr 
v''-'!.vir-r'-;S 

... .'' "aijE^iT^V 












■M 



. ■>,"-l'* 






.#■" 









14-17 EXPUNGEMENT OF FINGERPRINTS BY THE [CRIMINAL JUSTICE 
INFORMATION SERVICES (CJIS) I DIVISION 







Sensitive 
PRINTED; 02/18/98 



.-'■:;,j;^ 









M.SP... ' ' ' t ' . ^TWBiy:»^ n mi i iii i S t If JJ. """ ,^ ' !' 






Sensitive 



.."0m 



Manual of Investigative Operations and Guidelines '"'M- 

Part. II |v-;' ^ •;..-,^^, ■■ PAGE 14 -.,50 ' ' iS' 

■'-■'■. ■;■.■••--. '^'^:m 

■ ■'■'•■' ■ " .' ■ ' ¥-■• S'.»J' 

■ '#- 









t\ 






:.-;? 



EFFECTIVE: 03/10/94 

14-17.1 Fingerprints Submitted by Federal Criminal Justice 
Agencies 

The U.S. Department of Justice has advised that arrest 
fingerprints taken by a Federal agency or by a non-f'ederal agency at 
the request of a Federal agency are official U.S. Government records. 
As such, they cannot be destroyed, except upon the issuance of a 

Federal co u rt order. U SAs have been instructe d to vigorous iy_gppj?se 

motions to expunge Federal criminal history records unless the USA is 
convinced that the interests of justice require that a record be 
expunged. For example, expunction may be appropriate when an arrest 
is based upon a case of mistaken identity. Complete instructions 
pertaining to requests for expunctions (fingerprints and photographs) 
relating to Federal cases are found in Department of Justice 
Memorandum Number 765 to All United States Attorneys, dated March 6, 

., 1972, captioned "Motion for discovery, " or expungement of, arrest •-. 

:k records held by FBI." J"^^ 

-i.f 

EFFECTIVE: 11/21/89 '\ 

14-17.2 Fingerprints Submitted by Local and State Criminal Justice "■;!*.. 

Agencies ^1■S1 

(1) The FBI I CJISJ Division is the central J. 
repository for fingerprint cards submitted by local or state 
criminal justice agencies. Therefore, a request from the submitting 
agency to delete arrest data from an FBI identification record will 
be complied with. The corresponding fingerprint card(s) results in 
the complete expunction of the arrest data from the Criminal File. 

(2) The I CJIS {Division limits notifications regarding 
expungements to the agency which contributed the arrest data being 
deleted and the state identification bureau servicing that agency. An 
exception to this general rule is made when a court order directing 
the expungement /sea ling of an arrest specifically states that all 
prior recipients of the identification record are to be notified of 
the deletion and/or furnished with a current identification record. 






Sensitive . •^' 

PRINTED: 02/18/98 




Sensitive 



Manual of Investigative Operations and Guidelines 
Part II -i. ■• /,.- ■ . -. - 



EFFECTIVE: 03/10/94 

14-18 FINGERPRINT CLASSIFICATION FORMULA 





I'' ■<' '. 


' 


■-' ''• '^"^Si^.^ 


- ' . 


--i'^i.T!.p(rV 








■ '■^*;?€^ 


' : 


-•• '>i^ 




■ !-'S*?- 




■^ ■■■■ t-'tl^ 




' ^.;''?i'i^^ 




Si ' '^•i 










■ 51.., 






. ..■.>'.fc». 




i*'iA<, 




, vWW 






' 






.'<4i.K' 








vlfV 



•:,fi; 



EFFECTIVE: 11/21/89 -^ 

"'•"«:■■?■" 
14-18.1 Henry Classification 'l! 




14-18.1.2 Examples 

(1) Small letters and capital letters, 

6 laUta 10 
1 Tr 

(2) Letters and numerals. 

8 5 U lOI 16 
I 19 W Mil 



EFFECTIVE: 11/21/89 ^. 



Mf 



14-18.1.1 Submission Accompanying Request for Record .\y. 

Supplementing request for identification records with the S\ 

fingerprint classification formula assists in making a search, 'fi'i-., 

particularly in the case of common names. In quoting fingerprint . ■■:^. 

classifications in requests, care should be exercised not to confuse <^jf- 

letters with numerals or small letters with capital letters. 'Sfe 

rj'r. 

EFFECTIVE: 11/21/89 S 



'*>■■, ■" 
■"'-*4 

'&. 






" ■ lOI ■ , ; , ■ '. ;i^" 

The portion of the classification Mil would read as inner, outer, 'X 

inner, over meeting, inner, inner. The booklet, "The Science of "?*► 

Fingerprints," should be consulted for assistance in this matter. .-:> 

■.■i.-:.ia',.: 

• ■ ■ ::!^^. 

Sensitive 
PRINTED: 02/18/98 v" " 

" ' ■ ■ \y-:''(^:'i^ 





Sensitive 



■i- ft?' 

■ • '-'-'^'^ 

- ■' "• 'l&W' 

..'■•■ ..•,.■ -m^ 

-■■ ■ ' f'ff.'. 
Manual of Investigative Operations and Guidelines .":C^ 

Pai^t II ■; -■ PAGE 14 - 52:: • .•:!;:;$ 

■■-■■■. ■ ....._...._, .' ,^,.4^-' 

EFFECTIVE: 11/21/89 \4 

14-18.2 NCIC Classification 7% 

EFFECTIVE: 05/25/90 : 

14-18.2.1 Derivation -M 



NCIC fingerprint classification is derived from 
description of each fingerprint beginning with right thumb, which is 
#1 and continuing through finger #10, with left thumb being #6. Two 
characters are used in describing each pattern. The designation of 
the arch is AA; the tented arch is TT. The ulnar loop is described by 
using the actual ridge count. For example, the number 08 and 15 
represent ulnar loops with eight and fifteen ridge counts, 
respectively. Radial loops are described with their actual ridge 
p count plus fifty. For example, 62 would refer to a 12 count radial 
loop. Whorls are designated by type and tracing with the first 
character indicating type, and the second the tracing, i.e., P for 
plain whorl; C for central pocket loop; D for double loop and X for 
accidental type whorl; I for inner; M for meeting; and for outer 
tracings. For example, a double loop whorl with inner tracing would 
be designated by the letter DI. Missing fingers are indicated by the 
characters XX and mutilated or completely scarred patterns are 
indicated by the letters SR. 



EFFECTIVE: 05/25/90 



14-18.2.2 Example 

The following is an example of NCIC fingerprint 
classification when //I is an ulnar loop, 7 count; ^2, radial loop, 16 
count; #3, plain arch; #4, tented arch; #5, plain whorl, inner 
tracing; #6, double loop whorl, meeting tracing; #7, central pocket . 
loop whorl, outer tracing; #8, accidental whorl with meeting tracing; 
#9, finger is missing; and #10, pattern mutilated and/or completely 
scarred: 

07 66 AA TT PI DM CO XM XX SR 



Sensitive 
PRINTED: 02/18/98 



%. 



■ '^■^ 



v,t 










Sensitive 



Manual of Investigative Operations and Guidelines 
Part ,11 > : 



EFFECTIVE: 05/25/90 



I 14-19 JCRIMINAL JUSTICE INFORMATION SERVICES (CJIS) | DIVISION'S 
AUTOMATED SERVICES SYSTEMS 

I The|CJIS|Division's automated services computerized system 

has, in part, replaced the traditional manual fingerprint card 
j processing functions within the I CJIS I Division. 





. . - V 


*• : ■ '' 


■m 


' .'■'' 


. . „V 


















■ : tJ 


PAGE 


14 - 

-; ■ 


53 








i 


■ m 



.\M 







EFFECTIVE: 03/10/94 



14-19.1 



Three-Phase Plan 



EFFECTIVE: 05/25/90 



14-19.1.1 Phase I 



m 












This phase of aut 
It provided for the computeri 
descriptors, and arrest data 
cards of first-time offenders 
Record" responses to the cont 
were entered into automated f 
subsequent arrest and disposi 
sheets could be generated in 



omation was implemented in August, 1973. 
zation of the names, physical 
appearing on the incoming fingerprint 

and for the computer generation of "No 
ributors of the cards. Once the records 
iles, they could be updated with 
tion data, and computer-printed rap 
response to requests for such records. 



EFFECTIVE: 09/25/91 









.■•^m 



14-19.1.2 Phase II 






This phase became operational in October, 1979. It 
provided expanded Phase I capabilities, as well as automated name 
searching of the computerized arrest record file. 



-•'"l,-V* 




Sensitive; 
PRINTED: 02/18/98 ^,^w,.. 



.S5; 

'■•^'u, 

iS 






\X<-^T' Zf 








Sensitive 



Manual of Investigative Operations and Guidelines 

Part II . s. ., . . , ' PAGE 14 - 54 



EFFECTIVE: 09/25/91 



14-19.1.3 Phase III 

This phase became operational in June, 1989. It provides 
greatly enhanced Phase I and Phase II capabilities, as well as the 
ability to perforin automated on-line name and fingerprint searches/ 
This system permits a much shorter processing time. 



EFFECTIVE: 09/25/91 



14-19.2 Automatic Fingerprint Reader System (AFRS) 

An automatic fingerprint reader system (AFRS) is a 
computerized system which will electronically scan and read a 
fingerprint, enhance its ridge structure, and detect and record, in 
digital form, the characteristic minutiae data in a processing time of 
less than one second per fingerprint. The prototype of this system 
was called FINDER (contraction of FINgerprint reaDER) . However, this 
name is a proprietary term belonging to the company that developed 
FINDER, and is no longer used by the FBI except as a historical 
reference. There are five production model AFRSs in the 
I CJIS {Division. These systems were used to convert the massive file of 
master criminal fingerprint cards of all criminal subjects having 10 
finger impressions who were born on or after 1/1/29. Current incoming 
fingerprint cards of all individuals are read by the AFRSs if an ident 
is not made against the Automated Name Search and, using other 
specialized computers developed to perform high-speed matching, are 
searched against the master criminal fingerprint card digital file at 
computer rates of speed. 



EFFECTIVE: 03/10/94 

14-20 INTERNATIONAL EXCHANGE OF FINGERPRINTS 

EFFECTIVE: 09/25/91 



Sensitive 
PRINTED; 02/18/98 



m 

'CM: 






'. U. 






■ -ikt-" 






: ■.v':m- 



i| ,JfJiii^ii,^,W-J.'. 




Sensitive 



Manual of Investigative Operations and Guidelines 

Part II •:,■;;. n-f:rr'-^+ ":.;,.•.-■ . -.'-. . ". " ■" " •' 

14-20.1 History:^. r, , '• v . r^ 

The 'international exchange of fingerprints and related 
identification data was inaugurated in 1932. - 



EFFECTIVE: 09/25/91 



14-20.2 Submission Requirements j (See MIOG, Part II, 14-20.3.) 





















k ' 


. ,. ' .^^...' 


-■ ':\:^:x^->k:^. 


1 




^,.^^li-^. 








•) '- . 


-,...- 


., . , *-.^*;*>V.v^ 




■,-. \ . 


.-■...4|f 




'-.-. ' ^' 


-* ■■ ' * 


-.v". - 


















^, 


.'■-i'<!^^. 




.** , '- 


■ -. -T.-r''*f^^ 


PAGE 


14.-. 55.. -, 


: -:..v^::*^^ 


'. - ... ; *■■ • 


' ... '/■:.•■'<* ■ -csn . 


' i.^.-S'iWv'i 






■■ •• ,:'7ii?S"S 










. ■• ■■ ■ 




I related- 


■:-M:'y^-^^ 





(3) Exact date and place of birth. 

(4) Last known foreign address. 

(5) Names of parents. 

(6) Mother's maiden name. 

(7) Names and addresses of any relatives residing in the 
country concerned. 

EFFECTIVE: 03/10/94 



:ii-m 



4i 



."Mt 



(1) Individual's fingerprints must be submitted to the .,^^-^ 

Criminal Justice Information Services (CJIS) loivision in duplicate. ■ '■^®: 

(a) One copy is searched, acknowledged, and retained 
in the files of the |CJIS|Division. 



, ...■jSt;' 



Cb; Other copy and available criminal history . ;|i. 

information are transmitted to the country of birth for storage in its ,% 

files. tt^f. 

(2) Fingerprints must be legible to be referred to - l^f 

foreign bureaus. J^t 



: : '.^■' 



m. 



■■■■.wy 









Sensitive . .;?i:|^# 

PRINTED: 02/18/98 



.- I ■^.'- '■■ 1 l i< l >...n ») 






"t-'l;:,;e« 




Sensitive 



Manual of Investigative Operations and Guidelines 
Part II .. . ' 

14-20.3 Necessity for Personal Data 



\ 




-■% 






'^'M: 

'-'V^ 

■.'^■■x^ 










'■^i ■ 


AGE 14 - 


56 





(1) Except in United States and British possessions, the' 
personal data outlined above (3) through (7) are necessary to ensure a 
thorough search. 






handled. 



(2) Foreign inquiries unsupported by fingerprints will be 



EFFECTIVE: 12/20/82 



w. 







14-20.4 Acknowledgment of Foreign Search 

(1) Foreign search information received by the 
|CJIS|Division is transmitted to the original contributor of the prints 

for any action deemed advisable. 

(2) Follow-ups are maintained in ail instances until 
cases are completed. 



■:':-'iK 

:'-'~bo 



EFFECTIVE: 03/10/94 



14-21 



SURVEYS OF FINGERPRINT BUREAUS 







ThejCriminal Justice Information Services (CJIS) foivision 
will conduct surveys and assist in the establishment of a fingerprint 
identification bureau in a local criminal justice agency. It is 
desired that the SAC advise FBIHQ, Attention: (CJIsjDivision, 
concerning the request for survey or establishment of a fingerprint 
bureau in a local agency. Any additional facts concerning a local 
agency's needs for survey or whether it can be performed by an Agent 
in the office should also be submitted. FBIHQ will determine whether 
it should be performed by an Agent in the field office or by one of 
thejCJIS JDivision's technical experts. 



EFFECTIVE: 03/10/94 



k 






'■M' 









Sensitive 
PRINTED: 02/18/98 



• "-;- ; . ■:-3--'r 




Sensitive. 















3tl 



Manual of Investigative Operations and Guidelines 
Part II. ;v -. . ^,A^-cr-'-ir^ : . ■.- ■■•■ ' .^ 



PAGE 14 - 57 



' ■ .■'■:m 




14-22 . FBI LITERATURE CONCERNING [CRIMINAL JUSTICE INFORMATION 
SERVICES (CJIS) I DIVISION WORK AND FUNCTIONS 



EFFECTIVE: 03/10/94 



14-22.1 



"The Science of Fingerprints" 



This booklet is not available for general distribution to 
criminal justice agencies; however, it ia available to the field for 
distribution, free of charge, to class members in basic fingerprint 
schools handled by FBI personnel if the student does not already 
possess a copy. Requests by criminal justice agencies for more than 
one copy will not be processed by the FBI. To obtain multiple copies 
of this booklet, a criminal justice agency should address a letter to 
the Superintendent of Documents, Government Printing Office, 
Washington, D.C. 20402, and enclose the necessary] remittance. | 



- ,'1.C 
1%, 






EFFECTIVE: 12/20/82 






14-22,2 



Other Literature 



FBIHQ-has available for distribution to criminal justice 
agencies literature concerning all phases of identification matters, 
•latent prints, and the Latent Fingerprint Section. These pamphlets 
are reprints of articles which have appeared in the FBI Law 
Enforcement Bulletin. 



EFFECTIVE: 11/21/89 



.A 
■■■:m 










Sensitive 
PRINTED: 02/18/98 












^.;i* , ■-, 



-V'isv- 



i^^M^i: 



■} ■-. i'A-.'"'.l'.*v,>!.J',-.-iJAr'.".>*^J'^ !"'l'..v!? ''".•' 



>.-,; ■Jl:'^■^,^?T7'T; 




PAGE 14 - 58 



Sensitive 



Manual of Investigative Operations and Guidelines 
Part II .■■.:. ■ 

14-23 SUMMARY OF THE SERVICES OF THE CRIMINAL JUSTICE 
INFORMATION SERVICES (CJIS) DIVISION 

(1) Will Iprocess I criminal, law enforcement/criminal 
justice, applicant and personal identification cards. Applicant cards 
for other than law enforcement/criminal justice [(agencies , will be 
processed for a fee.) (Refer also to 14~4.1.1 and 14-5.1.) 

(2) JDeletedl 

(3) Will place wanted notices, flash notices and missing 
person notices in th e|C JIS Divisio n. Automated Services System. ) 




:;-t 



exchange. 



(4) JDeletedj 

(5) Deleted 

(6) Deleted 

(7) Deleted 

(8) Will handle fingerprint cards for international 

(9) Deleted 
(10) Deleted 



EFFECTIVE: 08/18/94 






■ ---^ 









14-24 



FBIHQ SUPERVISION 









'ftp; 

■ ■■?& 



^tSi~ 



EFFECTIVE: 11/21/89 







Sensitive 
PRINTED: 02/18/98 






^ 


■.:%■ 






' 'i-.r 


''^^i?3 






."J 










■4 !--■ 



Sensitive 



Manual of Investigative Operations and Guidelines 

Part II V 4. ,f. ", "i-^ ''■■■-- ':p"' '' . r 'r;-';:^ •; : 

14-24.1, Request for Information 



PAGE. 14 - 59; 



(1) During workday (8 a.m. to 4:30 p.m.) call extens 



ion v^t 




on workday before 8 a.m. and 



(2) During nonworkda, 
alEter 4:30 p.m., call extension 

(3) Direct written request to office of Inspector-Deputy 
Assistant Director (Operations), Room 11262, JEH Building. 



■-, ■■...,-«i-.- 









EFFECTIVE: 03/23/92 



li!-^..- 



14-24.2 




Request for Fingerprint Cards and Jackets 



Due to their voluminous number and the necessity to have 
them immediately available, fingerprint cards and jackets are not sent 
outside the CJIS Division, except to the Investigative Operations and 
Support Section of the Laboratory Division and the Violent 
Crimes/Fugitive Unit of the Criminal Investigative Division. 
Personnel from these work areas are to obtain and handle them as 
follows: 



(1) If FBI number not known, call extension 
direct written request to Room 11262, JEH Building. 



jacket. 



(2) If FBI number is known, call|/ 



or 



■to obtain 



(3) Cards or jackets will have attached 7- by 8-inch pink 
card (Form 1-210) containing instructions regarding handling and 
transfer. This form also serves as a routing slip to return card or 
jacket to the CJIS Division, and should not be removed. 






%■. 










(4 ) To t ransfer individual criminal fingerprint card, 
call extension! 





To transfer individual civil fingerprint card, call 



To transfer a fingerprint jacket, call 



The above transfers are necessary even though the card or jacket is 



Sensitive 
PRINTED: 02/18/98 






■ ^ 






















^. -^<.-^:fi ■■■if : 









Sensitive 



;^;^!.;.^;Ci!;::;^--'; 



■•^■■^:r,.^X^i.J.:::t:^Jk.- 



r:A- .*;!■ 






5* ■• "i.^»''LK"B4<-'';^?'^'S}: 



PAGE . 14 -• 60n.i 



7i0^: 



Manual of Investigative Operations and Guidelines 

Part II --■••'--• ;'r~v:- '...,' .*r.;->f-. ■ ■ '--■-., r^SV --.. ■ 

.^ t.. Zr^.-y^', "■■]';^%'^- 'l^' . ■-...■..,[■ 'J^i,.-- ,. " -.■ft^j'r''-: 

being forwarded to an individual or section in the CJISi Division forf >-' 
handling prior to hieing filed. Cards and jackets shall not be heldi' ■,. 
more than one week; however, if necessary to retain longer, recharge ■■-'■ 
by telephoning above-referred-to numbers. Cards and jackets are to, be 
returned to the CJIS Division in a routing envelope. ' ' • -, -Ir 

HiCrofilming of fingerprint cards is being done to save space within 
the CJIS Division. If a requested jacket or fingerprint card is on 
microfilm, a copy of the microfilmed record or fingerprint card will 
be made and sent in answer to the request. Microfilmed jackets are 
complete copies of the original hardcopy jackets. Microfilmed 
finger print cards are com plete co pies of the ori g inal f in gerpr int 



•rlJV-H '• 






card. Copies of microfilmed jackets or fingerprint cards do not have 
to be returned. They may be disposed of (e.g., destroyed) in a secure 
manner . 




v^a?^ 







I 



EFFECTIVE: 12/13/95 



■\-im- 



Tfrmm 




Sensitive . 
PRINTED: 02/18/98 



■■"^'fkS'- 
■■ ">';4«®J 



"■■,")* l l , ! WJ^, '^ Jji pp 



2^W*]«^"»^^J^^^ 



vilM ! ^ * . J P - i l i f » J ^M . s ^ ■■ . .f.f^. fiF ^ 






* '*^""'*'V- *"' " 





•.;f 



'...::^:^,^'U 



■'ii-:- t:/\-.;i^<'fc--; 



' !- ' —,.*>'■■■' '.,1 













Sensitive 



Manual of Investigative Operations and Guidelines 

Part II •e-:.-.-;-;-,:^.. ■■■'^r ;;,. ...■-- .,,,/-■'; --.■/:,- ; ' /3,.:;;^ -" .pAGE^v 15 r.: .--Ui 

SECTION 15. LATENT FINGERPRINT IDJENTIFICATION ' 



v,!'i^' V ■-'*'■.- ■ 



15-1 DUTIES OF LATENT FINGERPRINT SECTION | (See KIOG, Part I, 

7-14.9(1) (b), 7-14.11(8). 9-7(3). Section 32, 91-17.3(1), 
91-18, 145-2(3), 192-16.1(1), 192-16.3(1), Part II, 
13-6.4.5 & 13-17.) I 

. All wo rk_p_er.tAining to the develo p ment and comparison of 



latent prints, the comparison of infant i footprints, automated latent 
fingerprint searching, the National Unidentified Latent File, and the 
examination of fingers and hands of deceased individuals, is handled 
in the Latent Fingerprint Section. Senior fingerprint specialists of 
the Section form the nucleus of the FBI Disaster Squad which assists 
in the identification of victims of major disasters. The Section 
handles all court testimony needed in regard to fingerprint 
examinations and also conducts training classes regarding fingerprint 
matters. 



EFFECTIVE: 09/24/93 



15-2 



FILES 



EFFECTIVE: 11/21/89 



15-2,1 Automated Searching of Latent Fingerprints (See MIOG, Part 
I,|91-18.1, 145-2(3), 192-16.2.)! 






v.-fc 



m 






.. ■## 







(1) JAutomated Fingerprint Identification System (AFIS) 
technology has provided the Latent Fingerprint Section (LFPS) the 
capability to conduct computer-based latent fingerprint searches 
against the FBI database of 28 million criminals' IQ-print 
fingerprints. This process isknown as ALPS (Automated Latent 
Fingerprint Search), which was previously referred to as ALSA3.' The 
Criminal Justice Information Services Division (CJIS) maintains the 
automated criminal 10-print fingerprint database, which is now called 
Identification Automated Searches. I 



Sensitive i - 

PRINTED: 02/18/98 



■•#'•'■ 



- -^v- ■ 

•"•'■(-.fit 






lir-.'v'i.- 



■( i ' ''^ .1-. 





: !IPL - ' ■^''^■m 

■■■.■,:<?r*' 

■ ■■t-f^fU:. 

. '■' '-^p- 
Sensitive k' vf- 

■^. 

"m. 

Manual of Investigative Operations and Guidelines /,,* 

Part, II • PAGE 15 - 2 ;# 

: , " ■• '^' 

(2) [The ALPS provides a means to solve crines by 

searching unidentified latent fingerprints against the known 

fingerprint records of criminals. This capability is intended to be a - - 

last effort to solve a crime from a fingerprint standpoint. The .^V 

traditional practice of naming suspects/subjects from the 

investigative process, along with the acquisition of elimination 

fingerprints from victims and others, is expected to continue. It is 

not necessary to specifically request an ALFS search as each case 

submitted for latent fingerprint examination is evaluated by the LFPS 

to determine if it meets the criteria for initiating a search. 

However, if it is known at the time of submitting the case that there 

are no sus p ects develo ped and the only purpose of submittijig the case 

is for an ALFS search, then the request should be specifically ~~ ^ 

stated, j i> 

(3) I When requesting an ALFS search, it should be 
understood that not all latent fingerprints are suitable for this type 

of search. Although the latent fingerprints may be of value for '' 

identification purposes by a fingerprint specialist, it may not be 

sufficient for the computer-based search. The ALFS search relies on 

the ability of the fingerprint specialist to determine an approximate V', 

fingerprint classification and finger position of the latent 

fingerprint and the availability of a physical description of the 

suspect (s), 

(4) To better facilitate the ALFS search, submit all ■.; 
physically descriptive information known about the suspect (s). The 

physical descriptors which can be utilized in an ALFS search include 

sex, race, age range, height range, weight range, eye color, hair 

color, place of birth (state or country), and scars, marks and tattoos 

(the location on the body). All these physical descriptors are not 

necessary to conduct an ALFS search, but as much of this information ''' 

as known should be included in your correspondence. 

(5) ALFS searches may also be restricted to specific 
geographic areas (on state or country level) and any crime~type 
category. 

(6) Before the LFPS fingerprint specialist determines 
that an ALFS search can be performed, it may be necessary to contact 
the requesting office for further clarification or additional 
information to more efficiently use this capability. 

(7) The ALSM (Automated Latent System Model) capability 
has been discontinued and is no longer available. ALSM was strictly a 
model and plans are being made to provide a similar yiet more robust 



Sensitive 
PRINTED: 02/18/98 





Sensitive '^-xiL 

'•"■'•' '/Cl^' 

:.w 

Manual of Investigative Operations and Guidelines M 

Part II PAGE 15-3 ■ %, 

■ ■ • . •,,5;j.; 

capability within the future Integrated Automated Fingerprint ' "• 

Identification System (lAFIS) . | ••' 



EFFECTIVE: 07/21/95 



15-2.2 National Unidentified Latent File 

This file consists of classifiable latent fingerprints 
developed a nd remainin g uniden tified in certa in type s of Burea u cases 



having an unknovm subject. Categories in this file consist of Bank * 

Robbery, Bank Burglary, Bank Larceny, Bank Matters-Devices, Interstate ^-A: 

Transportation of Stolen Property-Checks, Major Theft (ITSP) , Theft ", 

From Interstate Shipment, Police Killings, Airline Threats, Interstate 

Transportation of Obscene Material, Interstate Transportation of 

Stolen Motor Vehicle, Kidnaping, Sabotage, Espionage, Explosives, 

Extortion, JHobbs Act and Terrorism.} The inked fingerprints or major 

case prints of subjects received in the Latent Fingerprint Section in 

connection with these violations are compared with the latent prints 'ii. 

in the specific type of violation. For example, the fingerprints or 

major case prints of subjects submitted in a current bank robbery case 

are compared with the latent prints remaining unidentified in the bank '*' 

robbery section of the National Unidentified Latent File. | (See MIOG, 

Part I, 91-9(1) and 91-18.2.) I 



EFFECTIVE: 05/14/93 

15-3 LATENT PRINT EXAMINATIONS 

EFFECTIVE: 11/21/89 



15-3.1 Examination of Evidentiary Materials - Bureau Cases, State 
and/or Local Facilities 



EFFECTIVE: 11/21/89 



Sensitive 
PRINTED: 02/18/98 



■.^^!r 



.4^' 





■■'JW 

Sensitive - *^' 

.*^ "*■/;'■ 

Manual of Investigative Operations and Guidelines . " iv? 

Part II. . PAGE 15 -. A ^ • 3 

■ '■ ' ■ " . ■ ': .... "- .. ■ "- ■ ■•■•■.• ■". — ''-m-. 

15-3.1.1 ■ utilize Technical Expertise o£ FBI's Latent Fingerprint 
Section 

Materials o£ evidentiary value located at crime scenes, or 
otherwise obtained during our investigative activities, offer S 

invaluable potential for investigative information and probative 
results. The laboratory facilities in the Latent Fingerprint Section 
and- technical expertise of FBI latent fingerprint personnel are 
recognized as the finest in the world. These technical fingerprint 
experts are devoted 100 percent to the science of latent print 
technology. Also, the file data base of persons represented in the 
fingerprint files of the FBllCriminal Justice Informat i on 



Services [Division is far greater than that available to state and/or 
local authorities^ For these reasons the technical superiority of the 
Latent Fingerprint Section should be utilized in Bureau cases 
requiring latent print examinations. 



EFFECTIVE: 04/01/96 



15-3.1.2 Joint Jurisdicti 



on 



Instances may arise in matters of joint jurisdiction where 
state and local crime laboratories handle materials obtained by local 
criminal justice agencies prior to our involvement, or have custody of 
items located during their investigations of concurrent violations. 
Such situations call for the exercise of diplomacy and good judgment 
to avoid creating the impression that the FBI lacks respect for the 
investigative, technical or scientific competence of local 
authorities. However, the laboratory facilities in the Latent 
Fingerprint Section and technical expertise of FBI latent fingerprint 
personnel are recognized as the finest in the world and should be 
utilized if at all possible. It should be borne in mind that the 
Latent Fingerprint Section utilizes laser |and other light sources | for 
the detection of latent prints, and this should be taken into 
consideration, inasmuch as local authorities may not have access to 
(these light sources. [ In matters of joint Federal/local jurisdiction, 
we must be positive to ensure that in the event of Federal 
prosecution, the U.S. Attorney may be certain that the more stringent 
Federal safeguards for the handling of evidence have been followed.. 
Processing by the Latent Fingerprint Section will offer this 
guarantee. 



Sensitive 
PRINTED: 02/18/98 





■ ' ' ' •■ri-fr'iii 

Sensitive . ■ ..;;a'# 



Manual of Investigative Operations and Guidelines 

Part II PAGE 15 - 5 



EFFECTIVE: 05/14/93 



15-3.1.3 Conditions to Be Met for Use of State or Local Facilities 

When circumstances and good judgment dictate that 
consideration be given to utilizing state or local fingerprint 
technicians and/or crime laboratory personnel in Bureau cases, the 
following conditions must be met before your decision is made: 

(1) The SAC must be fully aware of _ the . facts of the cas e 



and the nature of the examination(s) to be conducted. Inasmuch as the 
Latent Fingerprint Section utilizes a laser and other light sources as 
the initial process in the detection of latent prints, consider 
whether this technique is available at the local or state level. 

(2) Extenuating circumstances must exist which justify 
SAC approval of the utilization of state/local facilities and 
personnel. 

(3) As soon as time permits, the FBI Laboratory Division 
should be contacted to assure that all necessary examinations are 
being performed. Bear in mind, that concurrent violations frequently 
require different elements of proof. State and local facilities must 
therefore be alerted to the nature of Bureau requirements so that 
nothing will be done to the evidentiary material that will destroy its 
usefulness from our standpoint. They should also be made aware of our 
willingness to consult with them on scientific and technical aspects 
of their examinations as well as provide additional examinations that 
may not be possible locally. 

(4) In each case where local examinations are conducted, 
a copy of the report of same should be furnished the FBI Laboratory 
Division when such becomes available. 



EFFECTIVE: 09/24/93 






Sensitive 
PRINTED: 02/18/98 




Sensitive • ■ ';Mt. 



Manual of Investigative Operations and Guidelines 

Part II . . ■;,. ' PAGE 15 - 6 

15-3.1.4 Negative Aspects of Preliminary Local Analyses 

Under no circumstances should "curbstone" opinions be 
sought of local scientific or technical personnel to assess the 
potential value of evidentiary materials prior to submitting these 
items to PBIHQ for examination. Any preliminary local analyses could 
cause alteration and/or contamination of these materials and a 
possible conflict of opinion due to variation in testing procedures. 
This could severely hamper the effectiveness of our' efforts, as well 
as possible unduly complicate the "chain of custody." 









% 




EFFECTIVE: 08/17/84 



15-3.2 Searching for Latent Prints 

The search for latent prints should be conducted in a 
systematic, intelligent manner. Articles bearing or suspected of 
bearing impressions must be handled with care as most impressions are 
extremely susceptible to injury. ' The slightest contact with another 
surface will usually be sufficient to destroy them; consequently, it 
is not an adequate safeguard if the person handling such articles 
merely protects his/her hands with gloves. By doing so, he/she may 
prevent impressions of his/her own hands being left, but even his/her 
gloved hands must not come in contact with a surface which might bear 
impressions. JAvoid handling articles when wearing thin skintight 
rubber-type gloves since it is possible that latent impressions can be 
left due to the thinness and tightness of the gloves. | If an article 
must be handled, it should be done in such a way that the hands 
whether bare or protected, do not touch a receptive surface. Should 
that be impossible, the part of the article which it is desired to 
handle should first be examined for visible and latent impressions. 
The light from a flashlight or the lights of a fingerprint camera are 
sometimes helpful in locating latent prints as the light reflected at 
an angle often shows the presence of latent prints. Latents should be 
searched for in the following circumstances: 

(1) Surfaces and articles which might have been handled 
by the criminal at the scene of the crime. | Circumstances may warrant 
examining certain areas of a victim's body for latent prints left on 
the skin. | 

(2) Property recovered in any circumstance if it is 
believed to be the proceeds of theft. 



Sensitive 



■''•g*-' 
'«#*• 



PRINTED: 02/18/98 -^i^" 




-•' ■-■,;-' 









Sensitive 



Manual of Investigative Operations and Guidelines 
Parfll „:'¥-:;;.:-v>:i^r'r'--i.-:Jf-' ■■;;■■•■•-- ••■ - 



PAGE 15 ■ 



(3) Vehicles, weapons, tools, and other articles which-' 
nay have been used in the commission of a crime even though they are 
recovered at a distance from the crime. \ . "■ - 

When impressions have been caused by a substance which contrasts in 
color with the surface on which they are made, they will usually be 
visible, though they may not be conspicuous. Such impressions would 
result from a dirty, oily or bloody hand coming in contact with a- 
relatively clean surface. If the impressions have been made in 
plastic substances, such as wax, clay, etc., they will, of course, be 
visible. 



-.■-■•«.'-*-<«-t*?^.'f 

•■ .'■>-r;t<-.Si>»V' 
,. ■•.■•^"<^. 









EFFECTIVE: 08/17/84 






15-3.3 Development of Latent Impressions (See MIOG, Part II, 
15-4.1.) 







■■3 




(1) All evidence that is not too bulky or valuable to be 
shipped should be submitted to the Latent Fingerprint Section, 
Laboratory Division, for latent, print examination. Examination with 
the laser is the initial process used for detecting latent prints; 
that is, it should be used before treatment with fingerprint powders 
or chemicals. After the laser examination and prior to the 
utilization of fingerprint powders. Latent Fingerprint Section 
specialists can enhance the possibility of developing latent prints on 
certain nonporous articles, such as plastic bags and other pliable 
plastics, by subjecting them to fumes from cyanoacrylate glue. 

jConsideration should be given to contacting field office Evidence 
Response Team (ERT) members for possible treatment of nonporous items 
with cyanoacrylate glue prior to submitting to the Latent Fingerprint . 
Section. ERT members also are knowledgeable in the packaging of 
specimens for shipment to the Laboratory. | 

(2) The powders in use at the present time are gray, 
black, aluminum, "dragon's blood," and bronze. Black and gray powders 
should be generally used inasmuch as they most often give the best 
results. Black powder is used on surfaces with a light background and 
gray powder on dark surfaces. It is desirable to emphasize that in 
many instances it is not necessary that any powder be applied to a 
latent impression to develop it, as sometimes these impressions appear 
clearly. Visible prints should be photographed before any attempt is 
made to improve by powdering. Conventional powders are to be used to 
bring the print to a point where it may be photographed or otherwise 
recorded. Fluorescent powders should not be routinely used iand only 



Sensitive 
PRINTED: 02/18/98 



ft' 









■^^ 

-F^' 





'., 


J3i 




■ 45- 




v;^ 







automobile, no powder should be used. Where powders are utilized, 
those which contrast in color with the surface should be used. 
Mirrors and highly polished surfaces photograph black, and this must 
be kept in mind in selecting the proper powder to use. Powders should 
generally be used only on nonporous surfaces such as metal, glass and 
porcelain. Powder generally should not be used on paper, cloth or 
unfinished wood, since these specimens are chemically treated by the 
specialists of the Latent Fingerprint Section. 

(3) Some chemicals which are used to develop latent 
prints are irritating to eyes, nose and throat when not used under 
proper conditions and will stain skin and clothing. Use of these 
chemicals requires close observation by a trained technician to ensure 
proper development of all latent prints. If a human body is to be 
examined for latent prints on the skin, the examination should be done 
immediately utilizing the cyanoacrylate powder method or any other 
available process. When porous-type evidence is too bulky or valuable 
to be shipped, a request can be made for field processing by a latent 
fingerprint specialist. In an instance of field processing of a crime 
scene by a specialist of the Latent Fingerprint Section, a Special ' 
Agent must provide security by remaining with the specialist during 
the processing unless appropriate security is being provided by 
another agency. 



EFFECTIVE: 11/21/97 

15-3.4 Photographing Latent Prints 



•V. „■>,_, 






Sensitive '■':;^'; 

• , ■ '■. ",'-ij^^ 

• . ■ ■ ■ ' • '■ -"^ 

Manual of Investigative Operations and Guidelines ' I'iJ,^ 

Part II;: . ^ -■■..-^-. PAGE 15-8 ' ^ '^^ 

'■. ^ '-"i^f... ■■ ..'■ "; \ ■■..■■ ..-# 

considered after conventional powders prove nonproductive. The * 

visualization of fluorescent prints requires a special light source 
and the photography of such prints is more time consuming. Further, 
surfaces processed with fluorescent powders should be thoroughly 
cleaned as the presence of fluorescent powder cannot be readily 
detected without the aid of a light source and may pose a health risk 
if subsequently handled. Any item which bears a latent print in blood 
(or resemblance of a latent print in blood) should not be examined 
using powders, but should be submitted to the Latent Fingerprint 

Section. All visible latent prints on items to be shipped to the "*;■ 

Latent Fingerprint Section should be photographed before shipment. * 

JftLere_a_p.rint„may_show_.distinctly_J.n_.the_oiJ.__and_gr_ease_on_an ■■■<•:'■ 



^r 






Sensitive s 

PRINTED: 02/18/98 '"^'^'k^^- 



/%X--i-i*.-^--.i*!i 







Sensitive 



Manual of Investigative Operations and Guidelines 
Fart II 



PAGE 15 - 9 



-..■.*rti- 



''3\ 



EFFECTIVE: 08/17/84 




15-3.4.1 The Fingerprint Camera 

I (1) Photographs of latent prints will show more contrast 
in the ridge detail than most lifts will of the same impression. It 
is recommended that a medium format camera, i.e., Hamiya, be used. It 
is not necessary to photograph the latent prints at their natural size 
(1:1). A fingerprint camera that has a fixed focus, its own self~ 

contain e d li g ht source and uses 120 film ma y also be used. If 

necessary, a small format 35mm camera can be used in lieu of a medium 
format camera. Due to its negative size, medium format cameras will 
produce higher quality photographs. Photograph all latent prints 
whether they are of good quality or not (no field evaluations). 

(2) The first frame of each roll of film should depict 
the photographic log showing the roll number, subjects for the film 
and the camera settings. 

(3) Each latent print should be photographed individually 
for better clarity. The following steps should.be utilized when 
photographing latent prints: (a) all latent prints must be 
photographed with an identification tag, (b) the identification tag 
must include a scale, reference number, location of prints, and 
initials, (c) the identification tag should be placed on the same 
plane as the latent print, (d) fill the frame completely with the 
latent prints and the identification tag, (e) photograph latent 
prints that are close to one another in one frame, if possible, 
especially if they are simultaneous prints, (f) use T-Hax 400 film, 
(g) set the f/stop to f/8, (h) adjust the shutter speed setting 
until the green light appears, (i) make two exposures of each latent 
print by bracketing — the first exposure should be what the camera 
suggests with the green light and the second exposure should be one 
stop overexposed by adjusting the shutter speed dial, and (j) 
maintain a photographic log. The information should correspond with 
the latent print log and the evidence recovery log. | 




EFFECTIVE: 07/21/95 



Sensitive 
PRINTED: 02/18/98 



B 



HB 



311 




Sensitive 



Manual of Investigative Operations and Guidelines 
Part II 

15-3. A. 2 Recording Location of Latent Prints 



PAGE 15 - 10 ;, 



■■■ >t.<>i»'«p 

mm- 

■ M 

'.■■K.-«'**' 



Care must be exercised to see that all latent prints 
developed and photographed for possible use are marked properly so 
that they may be identified readily. It is advisable to record in the 
notebook of the investigator the exact location where the latent 
prints were found - position on a safe door, car window, etc. Noting 
these facts may affect the entire presentation of the case, and all 
photographs or exhibits should contain reference thereto. Latent 
prints should be lifted after photographing whenever possible. 



•■:»,:■ 
■■;,Kr,- 



EFFECTIVE: 08/17/84 



15-3.5 



Lifting of Latent Impressions 



Sometimes, due to poor contrasts, reflections of light, 
multicolored surfaces, or the physical location of a latent" print , it 
is not possible to photograph the impression effectively. In all such 
eases, latent prints should be lifted. Latent prints should also be 
lifted even though photographs have been made of the impression. A 
black rubber lift is used for lifting latent prints where gray or 
aluminum powder was used in developing the latent print. The white 
rubber lifting tape is used for the black, dragon's blood and bronze 
powders. A piece of the tape large enough to cover the entire latent 
print to be lifted is selected. The lift must be marked properly for 
identification purposes. Approved transparent tape may be similarly 
used with the exception that the tape should be mounted on a black or 
white card contrasting with the color of powder used. Rubber tape 
generally gives better results than transparent tape on curved or 
uneven surfaces. 






■..•tSs. 



'% 









i-.fi 



EFFECTIVE: 05/11/87 







Sensitive' 
PRINTED: 02/18/98 












•'^M 
^^m. 




Sensitive 



Manual of Investigative Operations and Guidelines 
Part II 



PAGE 15 - 11 



15-3.6 



Elimination Prints 






:M: 



The fingerprints of all persons who have legitimately 
handled the articles must be taken for comparison with any latent 
prints. If latent palm prints are developed, it will be necessary 
also to take palm prints for elimination purposes. Consideration 
should be given to obtaining the prints of a deceased individual 
before interment. Agents should be extremely careful in handling 
objects so as not to leave their own prints thereon. If inadvertently 
handled, such information should be indicated in letter transmittal. 
All fingerprints submitted for elimination purposes, or as suspects, 
should have th e nec essary descriptive data on the cards. Major c ase 



prints submitted for elimination purposes, or as suspects, should 
appropriately be taken on separate cards. The palm prints should 
never be taken on the reverse side of a fingerprint card. 



EFFECTIVE: 05/11/87 



15-4 



SUBMISSION OF EVIDENCE 



EFFECTIVE: 05/11/87 




15-4.1 Letters Submitting Evidence or Articles for 

Examination (See MIOG, Part I, 91-9(1) & Part II, 
15-3.3.) 

(1) Three copies of a letter submitting photographs or 
the lifts of latent impressions, as well as articles to be examined, 
should be forwarded to FBI Headquarters. The letters and packages 
should be addressed in the usual manner, | marked ("At tent ion: Laboratory 
|Division, Evidence Control Center. "| When evidence is transmitted as 
an enclosure to correspondence, an evidence envelope (FD-632) should 
be used as the enclosure envelope. After the information is completed 
on the envelope, place the evidence in the envelope and seal, and 
staple the completed correspondence to the yellow flap of the^ 
envelope. In each instance where the evidence is too bulky to be sent 
enclosed, yellow transparent tape should be placed over the address 
label on each package. A copy of the letter should be placed in the 
package, and the original letter and a copy should be sent separately. 
Letters transmitting evidence and requesting examinations should set 
forth briefly all pertinent material and information which would be of 
value to' the specialist in the course of the examination. Evidence to 



Sensitive 
PRINTED: 02/18/98 



^l^^^A*- 




Sensitive 



Manual of Investigative Operations and Guidelines 
Part II . ; 



PAGE 15 -12 



be transmitted to the Latent Fingerprint Section for examination 
should not be powdered for the development of latent impressions. 
Fragile articles should be carefully packed and the package marked 
fragile. On the inside wrapper of the object to be sent, the gummed 
labels of the Latent Fingerprint Section designating the enclosure as 
"Evidence" should be used. 

(2) In any case where it is known that an article or 
specimen to be submitted may have been contaminated by a person 
infected with, or suspected of being infected with, acquired immune 
deficiency sjmdrome (AIDS), tuberculosis, or hepatitis, the Latent 
Finger print Section m ust be cont acted prior to submission to determine 
if the examination will be conducted. 



':. ■■If,:. 






^^vw 



ill. 



'i 



EFFECTIVE: 04/01/96 



4'. 



15-4.2 Latent Fingerprint Section Reports|(See llAOP, Part II, 
10-13.13.)] 



Each auxiliary office should request FBIHQ to furnish 
original latent fingerprint reports and, if appropriate, the evidence 
to the office of origin upon completion of the latent examinations. 



■;"*■ 
■ -■*■ 



EFFECTIVE: 09/24/93 




15-4.3 Submission of Fingerprint Cards (or Major Case Prints) for 
Comparison 

In submitting fingerprint cards for comparison with latent 
fingerprints in connection with any specific case, a letter should 
also be directed with the fingerprints to the | Laboratory Division, 
Evidence Control Center, | requesting such comparison. When fingerprint 
cards are submitted for comparison purposes with any latent 
fingerprints, the criminal-suspect or noncriminal-elimination nature 
of these prints should be indicated. Criminal prints that do not 
contain the necessary data for retention in the Criminal Justice 
Information Services Division files, as well as suspect and 
elimination prints, are returned to the contributor. 



Sensitive 
PRINTED: 02/18/98 






Sensitive 



Manual of Investigative Operations and Guidelines 
Part 11 -I.. ,■. -s: .■ ■;.. -•: 



EFFECTIVE: 04/01/96 



15-4.4 Preservation of Specimens During Shipment 

(1) In sending exposed films to the Latent Fingerprint 
Section, Laboratory Division, in connection with latent fingerprint 
cases, the outside of the package should be marked "undeveloped 
films," in order that they may be handled properly at FBIHQ. All 
articles, with the exce pti on of pape r s pecimens, shou ld be p acked for 



- ■ ■ ■■ - 


. .' \T-"' 








--^■ 


'■ 


■ ■r-'^i^ 














. _ 


- '*^^' 








;..„.:.'i^ 




" 






PAGE 


15 - 


13-; - 


- >Siife 


: ■ '■'. . 


- , -l^i— 


•'"'- . ' ■■ '■ 
















transfer in such a manner that surfaces which bear latent impressions 
cannot come into contact with any other surface or substance. The 
most effective method to do this is to mount the articles on a 
baseboard. The board can then be fastened inside a stout container. 
With reasonable ingenuity, practically any article can be secured so 
that its surfaces are protected. Absorbent material, such as 
newspapers, cotton, or cloth, should never be placed next to the 

article. Generally, when photographic negatives and photographs of -j| 

;E latent prints are submitted by the field, they will be retained in the 
Latent Fingerprint Section. Other material submitted for latent 
fingerprint examination will be returned unless the letter covering 
the submission of the evidence requests its destruction. 









■•'..if? 

;■>%■£■ 



•^. 

«$.. 



(2) In the event it is necessary to transmit the fingers, 
hands, or feet of a deceased individual to the Latent Fingerprint 
Section for | examination, theyjshould be placed in a container of 70 
percent solution of alcohol, and this should be stated in accompanying ,nS 

correspondence. Entire hands should not be submitted unless there is 
a special need to do so. When submitting the fingers, each finger 
should be amputated and placed in an individual container, and 
appropriately labeled (right thumb, right index, etc.). |Requirements 
for labeling, marking and shipping of body parts should be determined 
by contacting the carrier. | 



EFFECTIVE: 11/21/97 






Sensitive ' ..-•^f 

PRINTED: 02/18/98 V x ' '/JiS^ 



-iK-^' 



m 




Sensitive ..,\V 



Manual of Investigative Operations and Guidelines 

Part II PAGE 15 - lA 

15-5 REQUESTS FOR COPIES OF LATENT PRINTS 

Inasmuch as all latent fingerprint comparisons are to be 
conducted by the experts of the Latent Fingerprint Section, requests 
for photographic copies of latent prints will not be honored unless 
the letter requesting such photographs states specifically the use to 
which these photographic copies are to be placed. 

EFFECTIVE: 05/11/87 



^■ 




15-6 LIAISON WITH U.S. AND PROSECUTING ATTORNEYS 

Maintain close liaison with U.S. and Prosecuting Attorneys 
to ensure prompt notification of trials or changes in trial dates 
involving testimony of latent fingerprint specialists. Communications 
regarding such are to be marked for Attention: Latent Fingerprint 
I Section, [Laboratory Division, | and should refer to the pertinent latent 
case number (s) . 



EFFECTIVE: 09/24/93 

15-7 COURT DECISIONS 

EFFECTIVE: 05/11/87 

15-7.1 Latent Fingerprint Testimony 

Latent fingerprint testimony is universally accepted today 
by the courts of all civilized countries. Field offices should advise 
} thelLatent Fingerprint Section, Laboratory|Division of any current 
decisions involving any phase of fingerprint testimony. In this 
country, such testimony is accepted in Federal, state and military 
courts when it is shown that the witness is a competent expert because 
of his/her experience and knowledge of the subject matter. Numerous 
court decisions in this country uphold the validity and competence of 
such testimony, several of which hold as follows: 

(1) Holt V. U.S., 218 U.S. 245, 1910, the U.S. Supreme 
Court in considering the contention of the defendant's counsel that 



Sensitive 
PRINTED: 02/18/98 





Sensitive 



Manual of Investigative Operations and Guidelines 



EFFECTIVE: 09/24/93 



15-7.2 Latent Palm Print Testimony 

(1) Davis V. Dunn, 90 Vt. 253, 259, 98A, 81 Ann Cas., 
1918D, 994, 1916, court stated, "This knowledge (identification by use 
of fingerprints) of the courts goes so far as to enable them to say, 
without proof, that the imprint of the palm side of the human hand, 
when fairly taken, presents reliable,' individual, and unchanging 
characteristics of the papillary ridges." 

(2) Supreme Court of the State of Nevada held in State v. 
Kuhl, 175 Pac 190, 1918, that an expert may testify positively as to 
the identity of two palm impressions rather than be limited to his/her 
belief or judgment. Further, that "all the learned authors, experts, 
aind scientists on the subject of fingerprint identification agree that 
these patterns, formed by the papillary ridges on the inner surface of 
the human hand and the sole of the foot, are persistent, continuous 
and unchanging from a period in the existence of the individual 
extending from some months before birth until disintegration after 
death." 



Sensitive 
PRINTED: 02/18/98 



'- '-■.-'■*<,. 

■ ym^ 

Part II PAGE 15- 15 "' :# 

■ - , ■■ ' '.■■ ' "'''J^ 

the taking and use of fingerprints of a person and the use of same at -''$j 

the trial of the accused is a violation of the constitutional v 

provision against self-incrimination held, "the prohibition of ;;|«j; 

compelling a man in criminal court to be a witness against himself is ' ''^■. 

a prohibition of the use of physical or moral compulsion to extort -,: 

communications from him, not an exclusion of his body as evidence when 

it be material." ■ 

(2) Duree, et al., v. U.S., 297 Fed 70, 1924, District ^^ 
Court of U.S. for Western District of Oklahoma held that photographs Tit 
of latent prints on a bottle were admissible in evidence. 

(3) Newton Grice v. Texas, 142 T.C.R. 4, 1941, Supreme ''ft 
Court of Texas held that testimony by a competent fingerprint expert ''-'-^' 
concerning a latent fingerprint which was identified as the 

fingerprint of the accused, was in itself sufficient evidence to ,~ 

authorize the jury's finding of the accused guilty of burglary, even « 
in the absence of collateral evidence. 



t. 



■-•• ,r-. 




Sensitive 



Manual of Investigative Operations and Guidelines 
Part II 



PAGE 15 - 





' . -•;.■** 




;v.'-i,,»i 




■'■■'^■■M 




'^ifi' 




;;^ 








•■ Y'm^ 




. :.-)-^M^ 












'-'^m 




■«*1. 




«r. 


16 






■ ■':W:' 



EFFECTIVE: 05/11/87 



15-7.3 



Latent Footprint Testimony 



In the case of Conunonwealth v. Oscar Bartolini, 299 Mass. 
503, 1938, the Supreme Court of Massachusetts (3-1-38) held that there 
was no error in permitting a witness to testify as an expert witness 
where it is shown that, "There was ample evidence of special study and 
knowledge by the witness of the subject of footprints as well as of 

-fingerprints ..J^:^ The_Court_als_o_recognizM_the_lact,JJ:hat_^^^ 

like fingerprints, remain constant throughout life and furnish an 
adequate and reliable means of identification." 



EFFECTIVE: 09/25/91 



15-8 



SERVICES OF DISASTER SQUAD 



EFFECTIVE: 09/25/91 



15-8.1 



Limitations of Assistance 




The FBI Disaster Squad assists in | the fingerprint | 
identification of | casualties | in major disasters. A request for the 
assistance of the FBI Disaster Squad will be honored if it originates 
from one of the following: the ranking law enforcement official 
having jurisdiction over the disaster scene; the medical examiner, 
coroner, or other ranking official, such as the Mayor or Governor; an 
official of the U.S. Department of Transportation (National 
Transportation Safety Board or Federal Aviation Administration); or an 
official of the U.S. Department of State in foreign disasters 
involving American citizens. Unless complete background information 
needed in a case wherein the FBI has investigative jurisdiction, 
|utilization of Agent personnel should be minimal, such as to assist 



IS 



FBI's participation will be 
casualties jas possible by 



the Disaster Squad at the scene. The 

limited to identifying as many of the 

fingerprints. This limitation should be clearly explained to the 

requesting official at the time the request for the Disaster Squad's / 

assistance is received in order that the requester will be on notice' 

of the extent of FBI services that can' be expected. 



Sensitive 
PRINTED: 02/18/98 



;.«?& 



M. 




Sensitive 



Manual of Investigative Operations and Guidelines 
Part II 



PAGE 15 - 17 



^ --■i.i' 

' '''.'it 



# 



EFFECTIVE: 09/25/91 



15-8.2 



Action to Be Taken By Field Office Covering Disaster Site 



(1) Advise FBIHQ by telephone of disaster and whether 
services of the Disaster Squad have been requested. 

(2) FBIHQ will give instructions as to which office will 
be designated office of origin for identification phase of case if 
conflict exists. 



(3) Assign experienced Agent personnel to disaster scene 
to develop any information indicating a federal violation within the 
Bureau's investigative jurisdiction. 

(4) If transportation facility involved, establish close 
liaison with company office so as to obtain, as quickly as possible, 
passengers' full names and descriptions. Office covering point of 
origin of transportation carrier usually in best position to do this. 

(5) Furnish names and descriptive data immediately to 
thejCriminal Justice Iniformat ion Services [Division so search can be 
made for fingerprints which may be in our files. 



EFFECTIVE: 04/08/96 




I 



15-8.3 |Suggested|Action to Be Taken at Scene |by the Official 
Having Jurisdiction Over the Disaster | 

(1) Institute uniform body numbering system and tag 
remains of each | casualty) with assigned number. Severed portion of 
remains should be maintained in a separate area and labeled as to 
location where found. 

(2) During search of disaster scene for jcasualties, | 
personal effects not definitely attached to bodies should be labeled 
and kept separate. Personal items removed from bodies, such as 
clothing, rings, etc., should be placed in individual containers and 
identified by number corresponding with body number. Identity of 
person performing this task should be recorded. FBI personnel are not 
to assume custody of personal valuables. 



Sensitive 
PRINTED: 02/18/98 



.■,■,.:■■ -ii.S?;**".. 



if:" 






Sensitive '!^H 



Manual of Investigative Operations and Guidelines 

Part II ;.^.. •• . - ' PAGE 15 - 18 

(3) Encourage use of a single central morgue. In absence 
of adequate conventional morgue facilities, consider gymnasium, 
armory, or similar large, well-lighted, well-ventilated structure and 
availability of a refrigerated truck. 

(A) Each] casualty! should be fingerprinted, photographed, 
and|a| detailed physical description taken prior to release of body, 
regardless of means used to identify remains. 

I (5) I Ensure that detailed and careful search is made 

-oX|ca^g.ual_ty_^t_jcLorguej_to_record^^^^j cloth ing, scars, marks . . 

tattoos, and any other identifying factors. Property removed from 
each victim should be kept in a separate container appropriately 
documented where found. 

I (6) I Suggest that services of a dentist be obtained for 
detailed charting of the teeth. 

I (7) I Suggest complete pathological examination of remains 
with particular emphasis on evidence of previous removal or repair to 
^ internal organs, age estimate, and physical build. 

I I (8) I Relatives visiting scene or morgue should be 

interviewed by local officials. 

EFFECTIVE: 09/25/91 

15-8. A Instructions for Auxiliary Offices 

I (1) |Deleted| 

I (2) |Deleted| 

(3) In cases where FBI has investigative jurisdiction in 
I the disaster, auxiliary offices will be expected to | immediately] 
forward items such as dental charts and fingerprints. In these 
instances, the cooperation of commercial aircraft personnel should be 
obtained to expedite delivery to the FBI Disaster Squad at the scene. 
Use envelopes bearing postage indicia. 






Sensitive ' 

PRINTED: 02/18/98 ' ^'-i^y$ 



*--U^,t.--F».--a..lL--*T.^..V.L-«.,V.r4Af,y-.t 



■ ; ■ i V " 




Sensitive 



Manual of Investigative Operations and Guidelines 
Part II ' - 



EFFECTIVE: 09/25/91 



15-8.5 



Commercial Airlines 



PAGE 15 - 19 



. ■■■;.■■■"*)* 



'M 



*f 



If commercial airlines involved in disaster, see also Part 
I, Section 149, of this manual for instructions regarding 
investigations under destruction of aircraft or motor vehicle 
statutes. 



EFFECTIVE: 09/25/91 






j 







'3;$'" 



■•ssS 



Sensitive 
PRINTED: 02/18/98 



VS:'. 







Sensitive 



Hftnual of Investigative Operations and Guidelines 

P«rt ii:-: s :.^;'', .■,.= , 






^^^^^^!^a 




PAGET 16 - 



SECTION 16. TECHNICAL SERVICES 












16-1 



COMMUNICATIONS SERVICES | (See MAOP, Part II, 10-5.) 



Communications services include the transmission and 
receipt of official information in textual or graphical form through 
the use of secure and nonsecure teletype and facsimile systems. 



EFFECTIVE; 07/15/93 





















Sensitive 
PRINTED: 02/18/98 



■It' 












7^ 









■•'ijr"a- 



--# 






>t'!rS 






OPCA-20 (12-3-96) 




3 




^ 

y 



FEDERAL BUREAU OF INVESTIGATION 

FOIPA 
DELETED PAGE INFORMATION SHEET 



xxxxxx 




XXXXXX " 




xxxxxx 


y.' '' 








--4 



Pagc(s) withheld entirely at this location in the file. One or more of the following statements, where indicated ii' 
explain this deletion. ' ' 

Deletions were made pursuant to the exemptions indicated below with no segregable material available for '' 

release to you. 



l/(b){2) 
a (b)(3) 



Section 552 



□ (b)(7)(A) 
n (b)(7)(B) 
O (b)(7)(C) 



n (b)(7)(D) 

ZI B^bXTX^ 



Section 552a 
□ (d)(5) 

n 0)(2) 
n (k)(i) 
n (k)(2) 



D (b)(4) 
n (b)(5) 

n (b)(6) 



n (b)(7XF) 

a (b)(8) 
a (b)(9) 



n (k)(3) 

□ (k)(4) 

n (k)(5) 

n (k)(6) 

□ (kjjf ) 



r/'j*-. 



n Information pertained only to a third party with no reference to the subject of your request or the subject of your 
■ request is listed in the title only. 

D Documents originated with another Government agency(ies). These documents were referred to that agcncy(ies) ; 
for review and direct response to you. 

Pages contain information furnished by another Government agency(ies). You will be advised by the FBI as 

to the releasability of this information following our consultation with the other agency(ies). 

Page(s) withheld inasmuch as a fm^ release determination has not been made. You will be advised as to the • 

disposition at a later date. 

_ Pages were not considered for release as they are duplicative of 

_ Page(s) withheld for the following reason(s): • 



ea^The following nimbCTis to be used for reference regarding these pages: 



xxxxxx 
xxxxxx 
xxxxxx 



xxxxxxxxxxxxxxxx 

X Deleted Page(s) X 
X No Duplication Fee X 
X for this page X 

XXXXXXXXXXXXXXXX 



FBiroOJ 



." i' L—. r«p(' ] ' "Tnw ^ ." 



TTt^.tTT:;^ »i. - ■-; 







Sensitive 



Manual of Investigative Operations and Guidelines 

Part II - ^ " ..■■■;:;vic:l,'":x'":,v'^ ■•;'■■■•■•-. ■•-■■ ' 



PAGE , 16 - 41, 






^1^ 













EFFECTIVE: 12/14/93 






16-7.1.7 



Administrative Unit 




The Administrative Unit coordinates budget formulation and 
fiscal nanag,ement of ES programs, provides support services to the ES 
including coordination, security and control of section space, 
telecommunications services, including secure and commercial 
telephones, facsimile and COMSEC, mail and courier service, automotive 
fleet management, inventory, personnel, procurement services, [draft 
system, [shipping and receiving; and other administrative support 
activities necessary for routine operation of the ES. 



EFFECTIVE: 12/07/93 






■?vi- 



m 

'.<*:*. 









Sensitive 
PRINTED: 02/18/98 







Sensitive 



Manual of Investigative Operations and Guidelines 
Part il ■ ' "k; ' 

I 16-7.1.8 Advanced Telephony Unit (ATU) 



PAGE 16 - 42 



The mission of the ATU is to formulate strategies, 
initiate development of methodologies and ensure the ability of the 
FBI to perform court-ordered electronic surveillance with respect to 
the emerging and future telecommunications technologies. 



EFFECTIVE: 09/25/91 



— ' — - — ^' ".^ '" ■ 

'mm 

•■'■ill 



f 




'■0' 

■■-;■*■,.. 



■a 

• ■■■■vsl' 
,:'c 









-V 









Sensitive •' 
PRINTED: 02/18/98 






OFCA-20 (12-3-96) . . ^ ^^ XXXXXX 





9 



XXXXXX * ^^': 

FEDERAL BUREAU OF- INVESTIGATION > | 

FOTPA ■ -^'^ 

DELETED PAGE INFORMATION SHEET J; 

Page(s) withheld entirely at this location in the file. One or more of the following statements, where indicated, f. 
explain this deletion. ' ; 

H Deletions were made pursuant to the exemptions indicated below with no segregable material available for 
release to you. 

Section 552 ^ 

M (b)(1) □ (b)(7)(A) 

Sr (b)(2) n (b)(7)(B) 

n (b)(3) n (b)(7)(C) 



n (b)(7)(D) 



(b)(7)(E) 
n (b)(7)(F) 



D (b)(4) □ (b)(8) 

n (b)(5) n (b)(9) 



r , ;| n (b)(6) 



Section 552a 


D 


(d)(5) 


n 


a)(2) 


D 


(lc)(l) 


D 


(k)(2) 


a 


(k)(3) 


a 


(k)(4) 


a 


(k)(5) 


a 


(k)(6) 


n 


(k)(7) 



□ Information pertained only to a third party with no reference to the subject of your request or the subject of your 
request is listed in the title only. 

D Documents originated with anodier Government agency (ies). These documents were referred to that agency(ies) " 
for review and direct response to you. 

Pages contain information furnished by another Government agency(ies). You will be advised by the FBI as 

to the releasability of this information foUowmg our consultation with the other agency(ies). 

Page(s) withheld inasmuch as a final release determination has not been made. You will be advised as to the 

disposition at a later date. 

Pages were not considered for release as they arc duplicative of 

Page(s) withheld for the following reason(s): 



Gr The followin&numbfir is to be us«l, for reference regarding these pages: 

/MIQ^ Vi^iP S^lL p UW'Sh 



XXXXXX 
XXXXXX 
XXXXXX 



XXXXXXXXXXXXXXXX 
X Deleted Page(s) X 
X No Duplication Fee X 
X for this page X 

XXXXXXXXXXXXXXXX 



<f-- 



FBI/DOJ 










Sensitive 



Manual of Investigative Operations and Guidelines 
Part Ii;.v', ■• ''■-;■■■ .... ■-' If- ;:':'■ K'.'^^^r.: .■■ 



PAGE 16 - 51 




(2) Technically Trained Agent Training Program 

This program is responsible for training all field TTAs, 
the continued upgrading of the technical training curriculum, and for 
administering the TTA On-the-Job Training Program. These 
responsibilities include provisioning all training for TTAs, designing 
and evaluating new courses, identifying technical training, facilities 
and equipment as appropriate. The program is responsible for 
maintaining the high level of technical knowledge required by field 
TTAs . 






■j-s? 



(3) Electronics Technicians Management Program (See MIOG, 
Part I, 67-10.10; MAOP, Part I, 11-16.3.1.) 




This program is responsible for the management of the ET 
Program in the field. These responsibilities include maintaining 
field ET Program staffing levels, ET staffing for major case/crisis 
response incidents, specialty transfer requests, evaluation of the 
field ET Programs, and assisting in the recruitment, evaluation, and 
hiring of ETs for the field and FBIHQ. This program also oversees the 
activities of the Electronics Technician Advisory Committee. 

(4) Electronics Technicians Training Program 

This program, is reisponsible for training of all field ETs 
and the continued upgrading of the training curriculum. These 
responsibilities include providing all radio and data communications 
training for field ETs, designing and evaluating new courses, and 
identifying technical training facilities, vendors, and equipment as 
appropriate. This program is responsible for maintaining the high 
level of technical knowledge required by field ET personnel. 



Sensitive 
PRINTED: 02/18/98 



"/'•^ 






— •^- f III infcfci liii^iinm 



jrnAHMTM.rT- 



:rV' -'=?■■ 






Sensitive 



Manual of Investigative Operations and Guidelines 
Part II .■•.,•- , Xr- ..,._ 

(5) Computer Specialist Manageioent Program 



PAGE 16 T 52 



This program is responsible for the overall management of 
the CS Program. These responsibilities include maintenance of CS ' 
Program staffing levels; CS temporary duty staffing for major case 
investigations or crisis response incidents; evaluations of field CS 
Programs, and overseeing the recruitment, evaluation, hiring, 
promotion, and other related personnel actions for CSs in the field 
and at FBIHQ. This program also oversees the activities of the 
Computer Specialist Advisory Group, and coordinates the annual 
Technical Automation Conference. 



(6) Computer Specialist Training Program 

This program is responsible for the training of field and 
FBIHQ CSs. These responsibilities include the continued development 
and implementation of CS training curricula which will empower CSs 
with the ability to operate and maintain the FBI's existing and 
emerging computer hardware and software systems. 




Sensitive 
PRINTED: 02/18/98 












tfi 



?J7 










OPCA-20 (12-3-96) ^B ^B XXXXXX 

xxxxxx 

XXXXXX 
FEDERAL BUREAU OF INVESTIGATION 

FOiDPA 
DELETED PAGE INFORMATION SHEET 

_/ — Page(s) withheld entirely at this location in the file. One or, more of the foUowing statements, where indicated ' 
explain this deletion. 

/ '.'- 

or Deletions were made pursuant to the exemptions mdicated below with no segregable material available for 
release to you. 

Section 552 Section 552a 
° <''X^> n (b)(7)(A) a (d)(5) 
Bl^ (b)(2) n (b)(7)(B) D (j)(2) 
° (b)(3) n (b)(7)(C) D (k)(l) 
n (b)(7)(D) n (k)(2) 

iy(b)(7)(E) "oWi) ~^ 

'■ a (b)(7)(F) ' a (k)(4) 

n (b)(4) □ (bX8) n (k)(5) ■; 

° (b)(5) □ (b)(9) n (k)(6) 

□ (b)(6) □ (k)(7) 

n Information pertained only to a third party with no reference to the subject of your request or the subject of your 
request is listed in the title only. 

n Documents originated with another Government agency(ies). These documents were referred to that agency(ies) 
for review and direa response to you. 

Pages contain information furnished by another Government agency(ies). You will be advised by the FBI as 

to the releasability of this information following our consultation with the other agency (ies). 

Page(s) withheld inasmuch as a final release determination has not been made. You will be advised as to the 

disposition at a later date. 

Pages were not considered for release as they are duplicative of 

Page(s) withheld for the following reason(s): "'■" ^ 



[M The following ^rabjnjs to be us^ for reference regarding these pages: 



he followmg tfttrabenjs to be used for referee 

nAif^a vtt: Sfx^iu pfe 




xxxxxx 
xxxxxx 
xxxxxx 



xxxxxxxxxxxxxxxx 

X Deleted Page(s) X 
X No Duplication Fee X 
X for this page X 

XXXXXXXXXXXXXXXX 



FBI/DOJ 



l' l i lW )(i^ J IM M PII> ) j| | M >y pi W. WI _ l _ ^^ ^_^ i f. 










Sensitive 



Manual of Investigative Operations and Guidelines 
Part-II^'- ., >■ "■.- ■ 




(2) I The|Technical Operations Section (TOS) 
strongly I recommends that | each field office establish a GS-14 
Technical Supervisor (TS) position as part of its overall office 
management structure. This position should be filled by an 
experienced TTA, capable of overseeing all technical investigative 
activitieis within the field office. The field inspection process, 
on-site technical investigative program reviews, and management 



Sensitive 
PRINTED: 02/18/98 







-.^?3 










Sensitive 



Manual of Investigative Operations and Guideline3 
Part II, 









■ . -■ 




- ::^: 


■ 


-• 


■ -.-j-^^' 






m 


16 - 


55 


^ -'•«£■ 



feedback received from fielc} offices with a TS already in place, 
clearly validate the organizational benefits derived through 
consolidating office technical investigative resources under one 
Supervisory Special Agent with a proven technical investigative 
background. As a rainlmuin, the TOS recommends, in all but the largest 
field offices, that the TS be assigned management oversight for all 
TTA, ET, and CS personnel. The assignment to the TS of additional 
office technical support personnel may be warranted based upon the 
size of the field office.] 






EFFECTIVE: 12/06/96 



16-7.2.3 



b1' 



t 



^K 





Sensitive 
PRINTED: 02/18/98 






-■■-.v^.i.-^..,..,.^. — ,■T..^.^. ■—...... w-^-, ■— -,-j."-.---.-.--i.-:r;.->.. .., . ..vm.,^Y |-^i; 



. ^pPCA-2pjl2.3-96) IP^ : \ ^ ^ XXXXXX _ _^^ ^ V 

xxxxxx 

XXXXXX 
FEDERAL BUREAU OF ESTVESTIGATION 

FOEPA -"^i 

DELETED PAGE INFORMATION SHEET ' 

Page{s) withheld entirely at this location in the file. One or more of the following statements, where indicated, "" 
explain this deletion. ' ' 





K 



tSr Deletions, were made pursuant to the exemptions indicated below with no segregable material available for 
release to you. 

Section 552 Section SS2a 

^(bXD n (b)(7)(A) D (d)(5) 

B^)(2) n (b)(7XB) D (j)(2) 

D (b)(3) n (b)(7)(C) n (kXl) 

^ n (b)(7)(D) n (k)(2) 

H^)(7)(E) n (k)(3) 

— , □ (b)(7)(F) □ (k)(4) 



n (b)(4) n (b)(8) n (k)(S) 

° (b)(5) n (b)(9) n (k)(6) 

} n (b)(6) n (k)(7) -■ 

D Information pertained only to a third party with no reference to the subject of your request or the subject of your 
request is listed in the title only. 

D Documents originated with another Government agency(ies). These documents were referred to that agency(ies) ,- 
for review and direct response to you. 

Pages contain mformation furnished by another Government agency(ies). You will be advised by the FBI as 

to the releasability of this information following our consultation with the other agency(ies). 

Page(s) withheld inasmuch as a final release determination has not been made. You will be advised as to the >. 

disposition at a later date. ? 

Pages were not considered for release as they are duplicative of 

Page(s) withheld for the following reason(s): . 



Or The following nujnJjerJ^ to be used for reference regarding these pages: 



rhe iollow«gnumper js to be. used for reference r 



xxxxxx 
xxxxxx 
xxxxxx 



xxxxxxxxxxxxxxxx 

X Deleted Page(s) X 
X No Duplication Fee X 
X for this page X 

XXXXXXXXXXXXXXXX 



FBI/DOJ 







Sensitive 



Manual of Investigative Operations and Guidelines 




■ ' ,■ - 


■; ^■. • 'm 


r 










:-*^^f^ 








" ■■' ■'^^' 






/ . . '' 


"'■^^ 






6 - 70 


'•.? --. ■ >-■ 


S» 


~C'/ • 


.■■^j-iSi*. 


■ . ■*.■; . . 


■ --.--^-Si 




..;il;. 




^>->'',' 






■k 




■ 


. '\.-.-ti> 


■ ' -.' 


■ ■.. -^^-'V 












EFFECTIVE: 02/10/97 



-"mi 



■VS' 









16-7,3.4 Loan of Electronic Surveillance Equipment (See MIOG, Part 
II, 10-9.14 & 10-10.10.) 




(1) Loan of Electronic Surveillance Equipment to State 
and Local Law Enforcement Agencies. 

(a) By Department Order 890-80, dated 4/29/80, the 
Attorney General delegated to the Assistant Attorney General, Criminal 
Division, Department of Justice (DOJ) , the authority to approve loans 
of electronic surveillance equipment to state and local law 
enforcement agencies for use in their investigations (i.e., not joint 
FBI investigations). Under this delegation, the loan of such 
equipment is to be made only in exceptional circumstances and to be 
consistent with federal and state laws, as well as with state and 
local law enforcement regulations. 

(b) The Office of Enforcement Operations within the 



Sensitive -^ -* 
PRINTED: 02/18/98 



. ..^-iMi. 






^5- 



..:;.. ^■-*.ti;-i^..M^,^ 



'■"■■"■^•Mrhri'-ri ■h-y- ■ - • - ■ ' -■■--■■>' i ■■'■'-^■■■""« 




li/ 




Sensitive 



control of state and local law enforcement; and 

4. without duplication of other federal 
programs of assistance to state and local law enforcement. 

(d) Except in an emergency, requests for loan of 
electronic surveillance equipment will not be approyed until the head 
of state or local law enforcement agency certifies in writing that the 
agency: 

1. has authority under state and local law to 
borrow the equipment on the terms required by the Order; 

2. has valid legal authority under state and 
local law to conduct the particular electronic surveillance for which 
the equipment is requested; 

3. cannot obtain the requested equipment from, 
other law enforcement agencies within the state; and 

4. does not have available to it funds provided 
by the Law Enforcement Assistance Administration or its successor 
agency to obtain the requested equipment. 

(e) Requests must contain a copy of a written 
opinion of the chief legal officer to the state or local government . 
indicating compliance with conditions (d)l. and (d)2. 



Sensitive 
PRINTED: 02/18/98 



-•■.•i'g> 



Manual of Investigative Operations and Guidelines ^ Mf 
Part II ' PAGE 16 - 71 ' ~ 






Criminal Division of the DOJ has been assigned the responsibility of " %' 

coordinating requests received for electronic surveillance equipment. ^^ 

That Office defines electronic surveillance equipment as any equipment <'S^i 

which would be uSed in Title 18, USC, Section 2510, et seq. (Title "r^ 

III) - or consensual electronic coverages. . 

if 

(c) The Departmental Order specifies that the loan ,. '?/ 

of electronic surveillance equipment to state and local law :). 

enforcement agencies is to be discouraged and is to be permitted only: 0^ 

1. in furtherance of the federal government's >.<^; 
-interests- in-the- invest igat ion- and-prosecut ion of violations-of-state :i^ 

criminal law that are of federal concern; '-M. 

2. in compliance with all applicable provisions ^_ 
of federal, state and local law; . ^>; 

3. without interfering with state and local i^_ 



•.try 






'j-iHi^Xi. 





^th'M 



n ii.;. 



Sensitive 

Manual of Investigative Operations and Guidelines -S> 

Part II . PAGE, 16- 72 ;i# 

'■■'•■'- ■ • . . ■ ■■ ■ • ■■ ■•^?: 

(f) The field office must advise FBIHQ when ^^t 

requesting approval to loan electronic equipment (be it either a %^ 

routine or an emergency request) whether there is a current need for . jr 

equipment within its division; whether, in the SAC's opinion, it is •: C/ 

within the interest of the United States to loan the requested .■') 

equipment in the specific criminal investigation; and whether the ,^v- 
agency involved has previously violated the terms of any loan of 
electronic surveillance equipment by the FBI. 



■it 



,->l. 



(g) The Deputy Director, FBI, will formally request 
the Assistant Attorney General, Criminal Division, DOJ, to permit the 

jjlI_to_loa.n the equipment only after receipt of the stat e or lo cal 

request with its attachments and the comments of the field office 
concerning that request. 

(h) In an emergency, if the head of the state or 
local law enforcement agency involved represents that an emergency 
exists, that the need for electronic surveillance equipment exists, 
and that he/she is authorized under state law to conduct emergency 

electronic surveillance specifying the provision of state law upon ,vf^ 

which he/she is proceeding, the Deputy Director, FBIHQ, may grant the 
emergency request. The field office should expeditiously contact 
FBIHQ to explain why advance approval is not possible and secure the 
necessary approval, confirming both by teletype. The emergency loan, 

like the nonemergency loan, must be made pursuant. to a written ..^° 

agreement. However, the Order provides that the written 

certifications required from the state or local agency may be provided 'A 

following the actual loan, if submitted to the Assistant Attorney ':-'>. 

General, Criminal Division, DOJ, within FIVE (5) j work | days of the '.-^ 

loan. Therefore, FBIHQ must receive the certifications in time to . -^^jf 

present them to the Assistant Attorney General, Criminal Division, 

DOJ, no later than the closiS of business on the fifth business day /' ' 

following the loan. 

(i) The actual loan of the electronic surveillance \ 

equipment, in both routine and emergency circumstances, must be made ',.. 

pursuant to a written agreement between the FBI (SAC or designee) and 
the requesting state or local law enforcement agency. This agreement 
must identify the equipment to be loaned, describe the target of the 
surveillance, and detail the purpose (i.e., goal) of the surveillance 
to be conducted. It must also provide: .■■;.. 

1. that the loan of the equipment is subject to 
the needs of the FBI and the equipment must be returned whenever ;r! 

requested; 



Sensitive 
PRINTED: 02/18/98 




:% 



/ 




Sensitive 
PRINTED: 02/18/98 



■.'•'»; 



■. . ■ . ■?i'!^. 

• . ■ • ' ^.-^-^ 

'■* y 

" ■ ■ ■ : ' ■ ■■^ 

Sensitive \ .,>' 

■ ;**t 

Manual of Investigative Operations and Guidelines 

Part II PAGE 16-73 TV> 

2, that the loan of the equipment is limited to 
no longer than the duration of the authorized surveillance for which 
it is requested, or 90 days, whichever is less; -^V 

3. that the equipment may be used only for the . ■ 
validly authorized surveillance for which it was requested; 

A. that the agency will not permit any other 
person or governmental entity to use the equipment; .-^^ 

5. that no FBI personnel may install the 
_equipment-and-no_EBI_personneL__may— part icipate_in_the_surveil lance;. — _. 

and 

6. that the agency will reimburse the United -.*■■ 
States for all loss or damage to the equipment. Any dispute over the 

amount of loss or damage will be resolved by the Assistant Attorney -'' 

General, Criminal Division, DOJ, whose resolution will be final. 

(j) Routine request should be by electronic "\. 

I . communication (EC) to FBIHQ, Information Resources Division, Technical - jv; 

Operations Section, and should enclose both a written request from the 
head of the local or state law enforcement agency and the written 
opinion of the chief legal officer of the local or state government. 
Emergency requests should be by telephone, confirmed by EC, and 
followed by an EC, enclosing the necessary documents. ^ 

(2) Use of FBI technical equipment In Joint Cases where 
state and local law enforcement agencies obtained authority for its 
use (See MIOG, Part II, 10-10.3 | (8) .) j 

(a) A Joint Case, for purposes of this section, is 
an investigation in which there exists significant FBI interest in the 
subject or subjects of local investigation and substantial FBI 
investigative resources have been utilized and/or will be utilized in 
the planned investigation with the local agency. 

(b) FBIHQ authority must be obtained prior to any -- 
use of FBI electronic surveillance equipment or personnel in 
furtherance of any order or authority obtained by state or local law 
enforcement agencies. Should approval be granted for such use, the 
pertinent local or state order or authority must contain specific 
language authorizing FBI participation, whether the assistance is in 
installation, monitoring, or whatever is appropriate. 

(c) In requesting FBIHQ authority, the field office 

■ *i^ 







? 




,■■•■■■ . ;j!^^:^fi' 

■ '■ ■. "■■ '^r^ 

Sensitive ,^--^^ 

■• . ■ ■■.■'*^a(-?4 

■ -'.-^ r.- 

Nanual of Investigative Operations and Guidelines '^4-!% 

Part II - , ■■ ' ....; . ■ : ■" \ ■"■■ PAGE 16 ,-,. 74 ■":-'^. 

■ '"■■"■'■' ;■. ■ ^^ . ■. '• " ;., ; ■ ; ■ '■'^' 

.is to set forth the following information: *■ 



1. A synopsis of the investigation conducted to ., 



j.n. 



'^. 



date by FBI and local agency involved, to include dates FBI case was .;;?> 

opened, as well as when joint investigation was initiated. 

2. Specific SAC comments as to the value of the 
assistance to the FBI investigation and extent of federal control over 
local electronic surveillance. 

3. Exact nature of equipment to be utilized and 
_technical-assistance_required,„and whether^equipment-is-on-hand-in-the _____ — 

requesting division. 

.4. Specific comments of the Technical Advisor 
as to the ability of the local agency to properly utilize technical 
equipment requested. 



.w 



r'ik 



SH. 



5. That the local agency has valid legal 
authority under state or local law to conduct the electronic 

surveillance for which equipment will be utilized. Specific statute '^ 

should be cited. .$• 

6. That the Chief Division Counsel or the, -"- 
Assistant United States Attorney has reviewed the affidavits and ■''^. 
orders to be filed and concurs in their sufficiency. , . tii. 

7. That FBI policy in limiting disclosure as ^4> 
set forth in Part II, Sections 10-10.13 and 10-10.16, of this manual, ' % 
will be honored in any subsequent local proceedings. ,;% 

The above information is to be provided by appropriate communication . ;.|i 

to the attention of the information Resources Division and to either " g; 

the Criminal Investigative Division or the National Security Division. , -/s 

(d) Any request for FBI assistance in execution of a '~ 

locally obtained court order which requires physical entry (i.e., "'j0$ 

microphone installation) will be handled separately and will require K 

significant justification. Emergency requests for such assistance are ' 'M., 

to be discouraged and likely will NOT be approved. - '. 

(3) Loan of Electronic Surveillance Equipment to Other .^-^ 

Federal Agencies. :,^v; 

(a) The loan of FBI technical electronic ^^, 

surveillance equipment to other federal agencies is permissible on a '.mk.,- 

Sensitive • ■•- ■" ../•«'■"'" 

PRINTED: 02/18/98 '— " ' 




PAGE 16 - 75 



Sensitive 



Manual of Investigative Operations and Guidelines 
Part II- ^ ... 

short-term basis. The loan of equipment must be subject to 
availability and must not negatively affect the technical 
investigative efforts of the FBI. 

(b) For agencies of the Department of Justice (DOJ) , 
specifically the Drug Enforcement Administration (DEA) , material 
support and assistance, including the loan of technical equipment, 
should be handled on a local level, subject to the provisions stated 
above. 

(e) For agencies other than DOJ, requests must be . 

made, on-a Headquarters, level, and-the- requesting agency must have 

electronic surveillance authority and capability. 

(d) All technical equipment provided must be from 
existing field office stock. 



• :'i,<Ti-. 












m- 



'} 




EFFECTIVE: 02/28/97 

16-7.3.5 Shipment of Technical Equipment and Parts Documentation 

(1) Bureau Form FD-734 is designed to document shipments 
of technical equipment and parts between field divisions and the 
I Information Resources JDivision for repairs, temporary assignments, and 
permanent transfer. This form consists of ten parts with carbon paper 
separating the parts and is stubbed at the top of the form. 
Designated routing and invoice numbers have been preprinted. 

(a) From top to bottom pages are as follows: 

Part One (Original) - white 

Part Two (Program Manager) - blue - copy 1 

Part Three (Supply Technician) - salmon - copy 2 

Part Four (Property Accounting Systems Unit) - 



pink - copy 3 



Part Five (Bureau File Copy) - yellow - copy 4 
Part Six (Duplicate Copy) - green - copy 5 

Sensitive 
PRINTED: 02/18/98 



■■iE:S^'<-il 




Sensitive 



Manual of Investigative Operations and Guidelines 
Part II " -'-- ■ ,<■■■'- ■ ■ V .;.r 



■ ■ • . , 






■ .r ^!^#: 


PAGE 


16 - 


76 


■ '-m 



Part Seven (Packing Slip) - goldenrod - copy 6 
Part Eight (Return Receipt Copy) - white - copy 

Part Nine (Duplicate Copy) - white - copy 8 
Part Ten (Originator's File Copy) - white - copy 



(b) Distribution of FD-734 form parts 
Part Designated Routing Remarks 

One Original 



Two 



Three 



Four 



Five 




Program Manager 



Supply Technician 



Consignee 
I (Administrative 
Officer)! 



Consignee (Program 
Manager /Tech 
Coordinator) 

Consignee (Property 
Custodian) Retention of 
this copy is required. 
For equipment received 
for permanent transfer, 
retain until equipment 
is reflected on the 
monthly inventory 
supplement. For 
equipment received for 
temporary assignment, 
retain copy until 
equipment returned. 



Property Accounting 
System 



Bureau File Copy 



Send to FBIHQ. 
(Attach FD-514, data 
adjustment form, for 
permanent transfer of 
equipment.) 

Send to FBIHQ. (Record 
on part five shipping 
data, such as 



Sensitive : 
PRINTED: 02/18/98 



-*' 



-:;;;&, 



1 ^. 



M' 









• . r^W i '* i V U ' V ' H m i 9mt* , ' V\V!, ' » f , '^ . '^' ^. 9' . ' ^ ' J ' J> ' ! 



■Kf -y .:.■■ 




Sensitive 



registered mail number, 
^ name of airfreight 

company, airbill 
number, date, number of 
cartons, weight, etc.) 

Six Green Duplicate Copy Send to FBIHQ, 

Attention of cognizant 








Manual of Investigative Operations and Guidelines ^^||^ 

Part. 11-^ ■-^' ■ ■ : , • ;;■:;:■ PAGE 16 -, 77, ." ' . ;; .^^jg| 






section or unit. (For 

information on the 

movement of technical U$v 

equipment.) 



m 



Seven Packing Slip Enclose in box or .3 

carton. For multibox '■ 

shipments a reproduc- 
tion of the packing v. 
slip must be enclosed [k 
in each box indicating 

vk items of equipment 

■"I contained therein. 

Eight Return Receipt Copy Enclose in box 4 

or carton, if -^■■ 

multibox shipment box 
#1 is used. Initial 
and date to acknowledge 
receipt of shipment. 
Note any discrepancies. 
Return to sender. ' u- 

Nine White Duplicate Copy Property Custodian of 

shipping division. 
Retention of this copy 
is required. For 
equipment shipped for 
permanent transfer, 
retain until transfer 
reflected on the 
monthly inventory 
supplement. For 
equipment shipped on 
temporary assignment 
basis, retain copy 
until equipment 
returned. 

■ ■ ■ • ' ■ .:.14s-'M;' 

Sensitive ,■ r>ji§*|f- 

PRINTED: 02/18/98 .,,.i^|^:^ 






.m 



Sensitive 



Manual of Investigative Operations and Guidelines 

Part II PAGE 16 - 78 



(2) Bureau Form FD-750 is designed for documenting 
technical equipment shipments to various contractors for repair, 
modification, trade-in, or exchange in situations where field office 
has been given FBIHQ authority to transport technical equipment for 
aforementioned purposes. This form contains seven parts with carbon 
paper separating parts, and is stubbed at the form top. Each part is 
d.e$ignat.jLd_wi_tJLj?olA-p,rinting,„_fp^ and is nu mbere d 

for reference. 

(a) From top to bottom parts are as follows: 



(b) Distribution of form parts: 

1. Original Copy: Route to field division 
supply technician. 

2. Bureau File Copy: Route to field division 
I lAdministrative Officer.] Indicate pertinent shipping data. 



4. Vendor Acknowledgement Return Receipt: 
Enclose this copy in package with technical equipment, attach a selfr 
addressed envelope for the contractor to return the receipt to the 
field division. 

5. Freight Desk: Retained by support personnel 
tasked with the processing of surface freight, air freight, and 



■ ■ P^W 

•Alt' 

-■'Si ■ 



Ten Originator's File Retained in files by -yi^ 

Copy employee authorizing 



shipment. ,^^- 

. ■ '-Li 









Part One (Original) - White 

Part Two (Bureau File Copy)' - Yellow Mk 

Part Three (Originator Acknowledgement Return Receipt -,!!• 

Copy) - Blue t^^^ 

Part Four (Vendor Acknowledgement Return Receipt Ty|l 

Copy) - Pink ,v 

Part Five .(Freight Desk) - Salmon ~^ 

Part Six (Packing Slip) - Goldenrod Ij 

Part Seven (Originator File Copy) - Green . 4g 



•V'ii-i 



:.m 









3. Originator Acknowledgement Return Receipt 
Copy; Upon return of the technical equipment at the field division, 
record date of receipt, initials, and route copy to the supply '.;.5|j 

technician. ?: 









■ . - ,■•■:■■■ _-^-^.\-rrn^,^ 

Sensitive . ■,■,.-,■•■■' .. • " ■ .' .■■-■'.";■■■-'" 

PRINTED: 02/18/98 ' , ''.."-' "t:'"v '..^ ... "'.y. '-v^,S:>~ 




Sensitive 



Manual of Investigative Operations and Guidelines 
Part II ^ ....•:- 



registered mail. < 

6. Packing Slip Copy; Enclose this copy in 
package with technical equipment for retention by the contractor. 

7. Originator File Copy: Retain in files by 
employee authorizing the shipment. 







'"■■ ,•"»-•§■:' 


- 




-"/^'{tM ■ 






■""ii^fe; 


■ ' 








,':;\ySi{ 






■ h^^i^ 


















■ ■"f\;>' 






■. -r'A^ 
















■ -ism 






■ .■He. 


PAGE 16 - 


79 . 


■ M 




' 


v^ 



••<s 






EFFECTIVE: 12/14/93 




Sensitive..- ' 
PRINTED: 02/18/98 



• .■•.*-'-tt^o 



>, ^.-V;; 



.-•■'•,/. .->,; 



■... ;!««-■?■ • . .;»^' T-' 



r,....:.M, 






OPCA-20 (12-3-96) ■ M W_ _ _ XXXXXX 
— _ ..^. ^w XXXXXX 

^ XXXXXX 

FEDERAL BUREAU OF INVESHGATTON 

FOIPA 
DELETED PAGE INFORMATION SHEET 






i^ 



Page(s) withheld entirely at this location in the file. One or more of the following statements, where indicated, '^■ 
explain this deletion. 'o 

Deletions were made pursuant to the exemptions indicated below with no segregable material available for ' -. 
release to you. 

Section 552 

n (b)(1) a (b)(7)(A) 

K/(b)(2) n (b)(7)(B) 

n (b)(3) D (b)(7)(C) 

□ (b)(7)(D) 

~~~"" " "" ^)(7)(E) ~~ ^ 
O (b)(7)(F) 



Section 552a 


D 


(d)(5) 


□ 


(j)(2) 


□ 


(lt)(l) 


D 


00(2) 


□ 


(k)(3) 


n 


(k)(4) 


□ 


(k)(5) 


n 


(k)(6) 


n 


(k)(7) 



n (b)(4) n (b)(8) 

□ (b)(5) n (b)(9) 

□ (b)(6) 

n Information pertained only to a third party with no reference to the subject of your request or the subject of your . ' 
request is listed m the title only. 

P Documents originated with another Government agency (ies). These documents were referred to that agency(ies) 
for review and direct response to you. 

Pages contain information furnished by another Govenmient agency(ies). You will be advised by the FBI as 

to the releasability of this information following our consultation with the other agency(ies). 

Page(s) withheld inasmuch as a final release determination has not been made. You will be advised as to the , 

disposition at a later date. 



Pages were not considered for release as they are duplicative of 
Page(s) withheld for the following reason(s)': 



Or The following n umbe r is to be used for reference r 



XXXXXXXXXXXXXXXX 
X Deleted Page(s) X 
X No Duplication Fee X 
X for this page X 

XXXXXXXXXXXXXXXX 

XXXXXX 
XXXXXX 
XXXXXX ¥mn>oi 



\- ..-'J ■'■■'- 




Sensitive 



Hanual of Investigative Operations and Guidelines 

Part- TT . ' si;.';;-!*.:- ■<. ■j'j.r •:-< . ' •' ■ ■ \ ,;,, "-•-".■■ .••> >■ 



PAGE 16 - 84 



EFFECTIVE: 07/28/97 










16-7.5.3 Technical Update [Newsletter | 

The Technical Operations Section will periodically 
[publishja Technical Update Newsletter. The newsletter will provide 
operational information of interest to the TTAs, JElectronics 
Technicians (ETs) , and Computer Specialists (CSs) . | Information for 
the newsletter is solicited from Engineering Research 
Facility Program Managers and from, field] technical personnel.] 






^ 



EFFECTIVE: 02/10/97 



\^ 1 16-7.6 




-!i,if^-. 



■■IV- 




Sensitive 
PRINTED: 02/18/98 






m 




Sensitive 



Manual of Investigative Operations and Guidelines 
Part II 



PAGE 16 - 85 









' "' ' "-A, "^ - 




■v#S 




^'."is- 




'v%^. 








- '■.("i**- 




■ ...v-.'^' 




•1 '.f.y- 


85 . 


/M 


■■ -»•- ' ■ 


.^^i'V.|h 




0-S|v 



EFFECTIVE: 02/10/97 



I 16-7.6.1 |Deleted| 



• "■?■.-- 



EFFECTIVE: 02/10/97 



16-7.6.2 |Deleted| 



:;it 



EFFECTIVE: 04/05/94 



16-7.6.3 New Agent Training 



The ES will provide appropriate and current electronic 
surveillance training to new Agents. This training will be conducted 
within the structured New Agent Training curriculum. 






EFFECTIVE: 09/25/91 




Sensitive 
PRINTED: 02/18/98 



..St.- 

■ ■■'**?? 



OPCA-20 (12-3-96) 



xxxxxx 
xxxxxx 
xxxxxx 








7W 




FEDERAL BUREAU OF INVESTIGATION 

FOIPA 
DELETED PAGE INFORMATION SHEET - 

Page(s) withheld entirely at this location in the file. One or more of the following statements, where indicated, 
explain this deletion. 

Deletions were made pursuant to the exen^tions indicated below with no segregable material available for 
release to you. , ' 



[/(b)(1) 
a^)(2) 
□ (b)(3) 



Section 552 



□ (b)(7)(A) 

a (b)(7)(B) 

D (b)(7)(C) 

n (b)(7)(D) 



n (b)(4) 

□ (b)(5) 

□ (b)(6) 



(b)(7)(E) 

□ (b)(7)(F) 
n (b)(8) 

□ (b)(9) 



Section 552a 


a 


(d)(5) 


n 


(i)(2) 


n 


00(1) 


n 


(k)(2) 


n 


(k)(3) 


n 


(k)(4) 


□ 


(k)(5) 


n 


(k)(6) . 


a 


(k)(7) 



n Information pertained only to a third party with no reference to the subject of your request or-5the subject of your ■y- 
request is listed in the title only. 

D Documents originated with another Government agency(ies). These documents were referred to that agency(ies) - 
for review and direct response to you. 

Pages contain information furnished by another Government agency(ies). You will be advised by the FBI as 

to the releasability of this information following our consultation with the other agency (ies). 

Fage(s) withheld inasmuch as a final release determination has not been made. You will be advised as to the 

disposition at a later date. 



Pages were not considered for release as they are duplicative of, 
Page(s) withheld for the following reason(s): 



m The followiniSnumbeEJs to be used for refe) 



regarding these pages: 



xxxxxxxxxxxxxxxx 

X Deleted Page(s) X 
X No Duplication Fee X 
X for this page X 

XXXXXXXXXXXXXXXX 



'4 



XXXXXX 

xxxxxx 

XXXXXX 



FBM>OI,- 



■I 




t,1^ 



Sensitive 



Manual of Investigative Operations and Guidelines 
Part II .^ ' 




PAGE 16 - 89 









EFFECTIVE: 09/25/91 



16-8.2.2 Requests for Examination of Evidence 

All requests should be made after coordination with the TA 

i n_a _wr.i tt en_c ommun i ca t i on..addr e s s.ed_t.o_t he Director, Feder al Burea u 

of Investigation, "Attention: Technical Services Division, 
Engineering Section" under the case caption and should contain the 
following information: 

(1) Reference to any previous correspondence submitted to 
the Technical Services Division. 






■ \* 







(2) A list of evidence being submitted and if the 
evidence is enclosed or being sent under separate cover. (Note: Due 
to chain of custody requirements, evidence sent through the U.S. 
Postal Service (USPS) should be sent registered mail. If the 
submission must be sent on an expedite basis, a service which provides 
a protective or security signature service similar to USPS registered 
mail should be used.) 






(3) Briefly describe the manner in which the recording 
was made; i.e., type of recorder or transmitter, if known, and 
perceived problem with the recording if enhancement is requested. 



(4) The location and content of the pertinent 
conversation(s) on the tape and their approximate duration. 

(5) A request stating the type of examination required 
including, if applicable, the number of copies needed and format (open 
reel or cassette) . 



■<f(.. 






(6) Any time limitation requiring expedite handling 
should be explained, such as a fixed trial date or life-threatening 
situations. 




(7) The name and telephone number of the person to be 
contacted should any questions arise regarding the examination of 
evidence. 



Sensitive 
PRINTED: 02/18/98 



/ ^■- ^"^ ' ■'"'^ ■"^. "/'r :'Hk£^" 5?^^ 



'■'i;-- .,■■■■'■ "■•■^-•^' 








Sensitive 



Manual of Investigative Operations and Guidelines 
Part II ■ ..S.- 



PAGE 16 - 90 



EFFECTIVE: 09/25/91 



•> 



16-8.2.3 Marking of Recordings for Identification 

(1) Marking should be done with black indelible pen. 

(2) Marking should be done on the tape itself on the 
nonrecorded side. The tape is the evidence, not the reel, box or 
other container. 

Cassette tapes should also be narked on the tape. This may be 
a^ccomplished by carefully pulling out a loop of tape and placing 
identifying information on the back side of the tape at the beginning. 
The tape may be wound by hand back into the cassette case. 

(3) Identifying information should include unique 
identifiers and the date the recording was made. 

(4) Suitable identifying information should also be 
placed on the tape box, case, cassette label or container used to 
house the tape. 



■ ,■■•■•*>.¥ 






■Mi 



'^ 




EFFECTIVE: 09/25/91 



16-8.2.4 Submission of Recordings 

Only the original recordings should be submitted for 
examination. One or more copies should be made for retention by the 
field office prior to submission of the original recordings. 

(1) Recordings should be packed in a sturdy cardboard box 
with no less than three inches of packing material on all sides. This 
will prevent accidental erasure in the remote event that the recording 
is exposed to a strong magnetic field while in transit. . 

(2) If a recorder or other items are also submitted, they 
should be packed securely within the box to avoid damage in transit. 

(3) Seal the box with gummed tape and clearly mark the 
outside of the box with the word "EVIDENCE." (If any of the evidence 
in the box is to be subjected, to a latent fingerprint examination, the 
evidence as well as the outside of the box should be clearly marked 



Sensitive ••. 
PRINTED: 02/18/98, ,.. 






.^ 



■'•■^#?sS-i'- 



Va^5>'^>;'. 






iwri^' M ' . 'wi . i . nry 






xirt'lifiS.. 




Sensitive 



Manual of Investigative Operations and Guidelines 
Part II -; ;„.':' ..■•,. . ■ -• ' : -.■'■: 



PAGE 16 - 91 



with the word "LATENT.") 









(4) Place a copy of the original written request for the 
examination in an envelope marked "INVOICE" and securely affix this 
envelope to the outside of the sealed box. 



(5) Enclose the sealed. box in wrapping paper and seal the 
wrapping paper with gummed tape. Prepare the address label, , 
addressing the package to; FBI [Engineering Research 
Facility, |Audio/Video Processing Program, Building 27958A, Quantico, 
Virginia 22135. Cover the label with yellow transparent tape to 
identify the sh ipment a s evi dence. „^ ' 



(6) Ship the package by U.S. Postal Service (USPS) 
registered mail. If the shipment is sent by another carrier, ensure 
that a protective or security signature-type service is available and 
utilized, similarly to USPS registered mail. 






,i:3 



M 




EFFECTIVE: 09/25/91 



16-8.2.5 Tape Enhancement 

Tape enhancement is the selective reduction of interfering 
noise on audio recordings to improve the intelligibility or ease of 
understanding the desired audio information. 

(1) Best enhancement is obtained by processing the 
original recordings; therefore, if available, only the original 
recording should be submitted in accordance with instructions in 
16-8.2.2 and 16-8.2.4. 

(2) No alteration of the original recording occurs during 
the enhancement process. An enhanced copy of the information recorded 
on the original is produced. 

(3) Enhanced recordings may be used for courtroom 
presentation in conjunction with the original tapes, and/or for 
intelligence or lead purposes. 















^f 



(4) Deleted 



•P 




Sensitive 
PRINTED: 02/18/98 






■iiMi 






EFFECTIVE: 09/25/91 



16-8.2,6 Review and Presentation of Enhanced Recordings 

(1) Review of all marginally intelligible recordings, 
including both original and enhanced versions, should be accomplished 
by using high quality recorders and earphones. 



EFFECTIVE: 05/26/89 



•.- x- 



--*■■>. J 

.'■.;...•■ ■ •- ■■' ■' ■ ■ ' ■ . ^-'felffi^. 

■ ' Sensitive ■ .:....£M;- 

■■■"-•,, .. : . ■ . .■ .jrSfriS- 

• ■ ■ • ■ • • ■ • ■-•■..- ^ . . • . ,p|p 

■ ' ' , , , .'VViu 

Manual of Investigative Operations and Guidelines ....#<4. 

Part II. •■ -. "■•v- .■'-■■: •■"■■;■..■■' ' . - ■. '■ PAGE 16 -■ 92, -v^ 

" ' • , ' • ■'■■ ,*"*^ ' ■ . - .-Filv: 

, . ■ ■ • "■'-V-i5J. 



'.7}", 






(2) Courtroom presentation of marginally intelligible 

_r ecordings-should-be- accompli shed- by-^means-of—a-court room -present at ion— 

system consisting of a quality tape recorder, amplifier and an a .; # 

earphone network which provides individual earphones to each of the :;-; ■ 

jury members, the judge, witness box, defense, and prosecution. 

Loudspeakers should be provided for the spectator area but played at a 

level where they cannot be heard by a juror wearing earphones. '^ 






(3) The use of a courtroom presentation system will ^^ 

improve the ability of the jury to understand most recordings and .^.j^i- 

should be considered whenever audio information is played in court. ''"?^^ 



.^i? 
';'.i> 
i^^ 



16-8.2.7 Magnetic Tape Authenticity Examination 

Magnetic tape authenticity examinations are conducted to 
establish that the recording was made as claimed or that no editing, 
stopping, erasing or other tampering of the tape occurred. 

(1) Typically, magnetic tape authenticity examinations 
are conducted in response to allegations of tape tampering by the % 
defense. 

(2) Magnetic tape authenticity examinations may also be 
conducted to determine legitimacy of suspicious recordings offered by 
the defense. 

Should the defense contend tampering has occurred on an evidence tape 

recording, every effort should be made to force the defense to 

precisely specify the areas in contention. This will significantly 

reduce the amount of time necessary to conduct examinations of the * 

recording. 

■■ .7 . :^ -.MB 

Sensitive '..." .,.. . ; ;■.,-•■ -^S-rr^^if^' 

PRINTED: 02/18/98 •^'*'". ^Vu-" :.. .V ...-,. ■^:^ig^ 



.:,.'i ; I'l . 



■ f 









Sensitive ■ 



Manual of Investigative Operations and Guidelines 
Part 11 ^s-:: . r 'r •;,.-■ ^!'-. :--'^- - ■. ■-•^•^:, ;V:-%.v^:' ' 






'^•^.■■■■■■s'i?;sS" 



■'^r-^'. ,•■ ■ ■ PAGE"" l6;y-:"^93'^•^■•v■?l^^^ 



". (3) Questions regarding tape Jauthenticity should be' - 
directed to the Engineering Section of the Technical Services '■• 
Division. 

(4) Requests for tape authenticity examinations should be 
made only in the event that legitimacy of the tape cannot be - 
established through chain of custody and appropriate testimony as to 
integrity of the recording by parties involved in production, copying, 
storage, transcription, etc. 









.EFFECTIVE :_05/26/89_ 



m 

-.-i'-.v^^f 



16-8.2,8 



Submission of Evidence 



Submit in accordance with 16-8.2.2 and 16-8.2.4 above, and 
whenever possible, attempt to identify and locate the recorder used to 
produce the recording in question and ascertain whether, any servicing, 
realignment or cleaning of the recorder has occurred since the 
recording was made. Maintain the recorder in its original condition 
for possible submission for examination or until the situation has 
been resolved. 



EFFECTIVE: 05/26/89 



16-8.2.9 Speaker Identification (Voiceprint) Examinations 

Speaker identification examinations, using the 
spectrographic (voiceprint) method, are conducted to compare the 
recorded voice of an unknown individual to known recorded voice 
samples of suspects or to other unknown recorded voices. The 
examination is conducted by using both graphic (spectral) and aural 
(listening) analyses. 




■-■'tm 










EFFECTIVE: 05/26/89 






Sensitive , 
PRINTED: 02/18/98r 






ia>s^'-- ;■ ■ 



'K;;,^'n 




..... . , ft-, ,.V,;>.p;,.*ii-^St.-jgUf 



m 



"> 



Sensitive 



Manual of Investigative Operations and Guidelines 

Part ii;:i^ '^'..'-j'-'^^j'^- J..:fe"." ;^:/. .. ■■ • ■ , 

16-8.2.10 Speaker Identification Policy 



PAGE 16 



- 9A 



(1) Decisions regarding speaker identification by the 
spectrographic method are not considered conclusive, since there is 
limited scientific research regarding the reliability of the 
examination under the varying conditions of recording fidelity, 
interfering background sounds, sample size, voice disguise, 
restrictive frequency range, and other factors commonly encountered in 
investigative matters. 

(2) Speaker identification examinations are conducted 
_solely_f.or_invesJ:,igatiye_ guidance. No_court_testi.mpny_i_s„p.ro^_ded_. 



(3) Speaker identification examinations are normally 
conducted by comparing an unknown recorded voice sample to a knovm 
recorded verbatim exemplar, where the suspect repeats exactly the same 
wording the unknown speaker used. Nonverbatim comparisons can be 
conducted in high priority cases with the explicit written approval of 
the SAC or appropriate Assistant Director; however, a definitive 
identification can normally only be reached in a small percentage of 
nonverbatim examinations. When nonverbatim examinations are 
requested, typed transcriptions of all voice samples must be provided. 

(4) Speaker identification examinations are conducted for 
local law enforcement agencies provided they agree in writing to use 
the results solely for investigative guidance and will not request 
court testimony. 



(5) Only original tape recordings should be submitted for 



:■- .•*.;;::4»SV- 

• ,<^^ . Si:' 

: Sifts'^ 



■■«»,. 

■■.■;<;t 



'■M: 



u /7. 



.m: 



■'<■•*!'< 



yf. 






:'-&$ 

!, {f^, 

'0^^ 



examination. 



EFFECTIVE: 05/26/89 




16-8.2.11 Obtaining and Submitting Known Voice Exemplars 

(1) Normally known voice exemplars will be verbatim, 
where the suspect repeats exactly the same wording the unknown speaker 
used. When verbatim samples cannot be obtained, attempts should be 
made to elicit as many of the same words and phrases, as possible, 
that were used by the unknown speaker. 

(2) When recording the known voice sample, duplicate as 
closely as possible the recording conditions and equipment used to 
record the unknown voice sample, including the use of the same 



.;A., . Sensitive ■. ,-'■' 
/ . PRINTED: 02/18/98\ . 









EFFECTIVE: 05/26/89 

16-8.2.13 Submitting Tapes for Aural Comparison 

(1) The cover communication should describe the submitted 



tapes. 



minimum. 



(2) The number of tapes submitted should be kept to a 



(a) If possible, top hits and well-known artists 
should be submitted'. 

(b) If more than 10 tapes are submitted, ensure that 
the AUSA wants more than 10 counts- 

(c) One copy of each tape is sufficient. . 



'"' -T^-vVI >^i\ 



..i-VittSl. 



Sensitive 

Manual of Investigative Operations and Guidelines 

Fart II '-■ ■■■■-■ '•■ • ■ ■■■''"'■■., ■ -, PAGE .16:;- 95 ' 'i^^ 

-■■■:, • ■ -,. V- " . . ,', ■ '/■ ' , ■■••-,. ' ■ ■ -. -,:!'& 

■ ■■"' .■■■■v ■' . . , , • •■.:. •■_ • ' ' "■:]^>%. 

telephones, if applicable. '^ 

(3) Recordings should be of high technical quality. Use • ■■:^ 

standard recording tape; do npt use extended play reel tapes with a 
thickness of less than 1.0 mil or cassettes of longer duration than 90 
minutes (45 minutes per side). Tape recorder speed should be at least 
1 7/8 inches per second. ^ " ., 






(4) Verbatim typed transcriptions must accompany each ,, 

recording. . <-^^. 

EFFECTIVE: 05/26/89 >^I 

16-8.2.12 Aural Comparisons ,*^ 



■'M 



This type exaJDination of a sound recording is made to .^ 

determine if two different recordings had the same original. >5?^f 






m 



T^sfe 






(3) Specify songs to be compared in the cover ' ■", 
communication. , ' 

■ ■ . ■■■;i5p* 

(a) This will ensure the proper "N" form is 't^; 

obtained. 4S' 

■ .•*■ "-fe« 
< '■•^•" '..■'. ;t)W 

. , Sensitive. . ... ,.,,.., ,. .•.„..,,., ...'•.!.,,: '-.i^^^-^Bsr 

■' .' PRINTED: 02/18/98' ■■^'■■\'^^: ■'■-■ rx'^ .::r. ■ ■ '-y^^r r/ ':Pi^J^ 




■ t,;^* « ^ '. *' 



^1-^ ,- ■ ■ -? 



Sensitive 



Manual of Investigative Operations and Guidelines 

Part, II "' ' ,> ,.^, . ■ ■■ « . "<■■'%'• ' , '■■'^^■\r^^ ;(..-, ;i.,/-<:; ■ '\ 



PAGE 16 -: , 96 



(b) When a song is not requested, the song conpared 
is picked at randon. 



■mi. 



-'■"mm. 



EFFECTIVE: 05/26/89 



16-8.2.14 Obtaining Knovm Copyrighted Sound Recordings 







(1) The Technical Services Division, Engineering Section, 
does not maintain a reference file of copyrighted sound recordings. 

(2) An authorized copy of the copyrighted sound recording 
should be obtained from the manufacturer and submitted at the same 
time the questioned sound recording is submitted to Technical Services 
Division for examination. 

(3) The authorized copy must be dated and initialed by 
the manufacturer's representative who will be available to testify as 
to the ownership of the copyright and the existence of any licensing 
agreements. . 



EFFECTIVE: 05/26/89 



■■ ■■'■■/*#.■ 

■■■am}: 













16-8.2.15 




'■.■Is!*?? 






■<rt>r^ 



Sensitive ^i. .'''W.-'jij-: 
PRINTED: 02/18/98. ' ' 









)£&-,<! 


■■-■- ■ ■ ■• . 'rm:' 




■ ■» 








■■^■■^1k 


:4'dJ- 








■"^^fi^m ^p^Mt^^^^ 









Sensitive 






■ , •■, ■ .-*V!V'-'',6^ 

- ! - ... ;-f.;.4SB.'- 

,1 -j^'^rSi* ■ 



Manual of Investigative Operations and Guidelines 



I" J- -, 



PAGE 16 -;.. 97', V 






EFFECTIVE: 09/25/91 




'' ' V "^'^ 
\.V«;4 



16-8.2.16 Video Tape Examinations | (See 16-8.2(6).) 






The following types o£ video tape examinations are 
conducted by the Operational Support Unit (OSU) , Engineering Section 
(ES) , Technical Services Division (TSD) : (If there is a question 
regarding the type of examination to be conducted or handling of video 
recordings, telephonically contact the OSU prior to submission of 
evidence.) 






(1) Copyright - a determination is made as to whether a 
video recording is an original or a copy. Suspect recordings should 
be screened before submission to reduce the number of original 
recordings received. This can be by physical appearance, poor video 
quality, or informant information. Not more than | five] recordings 
should be submitted at one time. 

(2) Duplication 

(3) Enhancement 



(4) Photographs of video images ~ (The specific location 
of the image on the recordings should be identified and the image 
described as completely as possible.) 

(5) Standards conversion 



EFFECTIVE: 05/13/93 









Sensitive. •-,-:: 
PRINTED: 02/18/98 




:.•-'■;■ ' '. ^iczxT-'^;^' ' 















Sensitive 









Hanuai of Investigative Operations and Guidelines 
; ''Tart A^'^\.-.^'^ i-j^^r- .■''i{^i-k'^^'^&-'-^f'-'^kif^^^^^'-'-v'-'. •;'#A ■fe.'-ft' y • ■• ■'• 



■mmm: 



^:- PAGE; 16..- 98 



EFFECTIVE: 09/25/91 



16-8.4 Deleted 



EFFECTIVE; 09/25/91 



16-9 



VOICE COMMUNICATIONS 



Voice communications encompass the procurement and 
management of the Federal Telecommunications System (FTS) , Wide Area 
Telecommunications Service (WATS) , and local telephone systems and 
facilities. 



■■■-■ ',-;':'^'";S.ii«.' 







"■-!mi>: 









EFFECTIVE; 07/23/90 







f.<?P^JcJt^ 



li^EASON: 1.5 ( (!) 
-r' '■ ^q!FY ON: )LJ_ 



-■■?4;-,^?: /."■■■'- ■ ,;.;. :''- 




• . Sensitive^-"'-' 
PRINTED; 02/18/98: 



.^^^IN IS USCLASSlPiao 

■ -^n-TiSRESHOWK 






.■:>y.*7A--i. 



, i*^-jv=i;-."«'j3:*i 






"^;.VV5i(?l*y- 








Sensitive -o- . ;. 



Manual of Investigative Operations and Guidelines 
rart ix,,.v.,i,,>^r<-"';..v. ■ », .,-,'<«• ■ • •■ iff- •--• ^^ ■.-. ■ > 



■'»*vr 






■Vb^jj;,. , PAGE,: 16. - 



16-9.1 



Gen 
16 



neral Telephone Policy (See MIOG, Part II, 16-9.4.1 V"##0 
-9.9.1.)".'.- .• .^;i -':,' •■■., '-.■.^' ■.•■•■••*. ■^:;- ■ "?5-;;-'-^s^: 





Whenever, a telephone is utilized, the following. should be -• 



kept in mind: . \ .? 

(1) All telephone calls made on standard telephones are - 
subject to interception by foreign intelligence services. 
Consequently, no national security ^information should be discussed on 
these telephones. 

(2 ) The use of the tele phon e se rvices, equipment, or 










facilities (including calls over commercial systems which will be paid 
for by the FBI) shall be limited to the conduct of official business. 
Such official business calls may include emergency personal calls and 
calls which are determined to be in the interest of the Bureau. No 
^^ other personal calls may be placed (except in circumstances identified 
in paragraphs (3) and (4) below) even if the employee's intention is 
to reimburse the FBI for the cost of the call. 

(3) Use of the telephone systems for emergency personal 
calls may properly be authorized as being necessary in the interest of 
the Bureau if such use satisfies the following criteria. If possible, 
such calls should be made during lunch breaks, or other off-duty 
periods and: ' 

(a) It does not adversely affect the performance of 
official duties by the employee, 

(b) It is of reasonable duration and frequency, and , 

(c) It reasonably could not have been made at 
another time. I ■ ' , ' 

(4) Personal calls that must be made during working 
hours may be made over the commercial long distance network if the 
call is consistent with criteria in paragraph (3) and is:. , 

{a) Charged to the employee's home telephone number 
or other. non-Government number (third number call). 









(b) Made to an 800 toll-free number, :> 






■Kit - 



(c) Charged to the called party if a non-Government 
number (collect call) or. 



■ , ' -,.■-'■....-.,.■■■■ ' . ..'•,,• ■• "':V4v;»''"^?<!i-" . • -I ■ ^•^\- '--.>'■■■' ~ 

'.' -■ ■. " ■■ '""". Sensitive "'''~ ^, "'.'?.' 'V"^"-fii/^."..S^:^;i:|^'; ' 

'-fe^^;,y''y V-- ,■;■-- ■■ ■ • PRINTED: 02/ 18/98 ■^#^^^;i^^pnv' ':':$:"Z:^j^^' "■'"■■\.':' 






- V*:' ■V''?^'.C . ■ -1 ''tl^^^iji:- 



fiig<nmiiT» iniri ■■ mnaMMi 








VP- 




PiS- 



Sensitive 



Manual of Investigative Operations and Guidelines 






;■ '.; i.',.'i2*r-Sii%- 
■"■'.■^-i'i'C'^J'SjSi 



.Part im<;'rv. ^■'?;.3^' 



PAGE 16 - 100 ■ 



(d) Charged to a personal telephone calling card. 




• .• i' 



' (5) Abuse of the telephone privileges set forth above mayvv;' 
result in disciplinary action that may include, but not be limited to, !> 
the reimbursement for the unauthorized calls. ' 

Collection for unauthorized telephone calls shall be * . 
composed of two parts.: 

(a) The value of the call based on commercial long 
distance rates rounded to the nearest dollar and. 



(b) A service (handling) charge of $10.00 on each 
call to cover administrative costs, for example, to determine that the 
call was unauthorized and to process the collection. 

(6) It is essential that maximum economy be exercised but 
FBIHQ and field offices must be kept advised of those matters of 
importance. Therefore, good judgment must prevail. 

(7) Calls from within one field office territory to 
another or to FBIHQ should only be made with the approval of a field 
supervisor or above. However, approval is not needed where an 
agreement between adjoining offices has been previously reached. 




S' - 



(9) Changes in addresses and/or telephone numbers' of the-' 
following must be reported immediately to FBIHQ: (See MAOP, Part I, 
20-2.1.) 



(a) Field offices 



(•" _. "tL-- -i.i-, 

■■■■;.;t/';';J2K: 
■ „ ^ ... ■?£!§. 






■m 


















■'■■iSJiTO- 



''"'M0. 



■\ -mm 












Sensitive., ,-„ 
PRINTED: 02/18/98 












-f, V- . ; . .. . 



Sensitive 

, ■ ,- /■ ■ ■ 



(12) Deleted 



■-r 



EFFECTIVE: 03/07/94 






■ • -V^w- 
', ■ 'I^ 

■■;■;- '^itjH 

Manual of Investigative Operations and Guidelines '^'va 

fart- U\:: :■■■■-::'' ?7----r-j- -■:■,:■■:.:-■--:.■ ^^ ,./•'..■ "^^^^ ^!^.^r ^°^ ' "'^Ip' 

-■ '■-• -- - . _ ..^^1- _ ■ -_ -.. ^ ., - . . . . . . - ■ ....■.,. •'■'-.v.^ 

(b) Resident agencies ■■■.-,■■[■'■ ^ • • ■"' • 'O^ll 



PRINTED: 02/18/98-; ; ^^^rpi^^vi^. 






'-■ .(c)- ASACs and higher ' ' _ 

(10) Oversight of the telephone calling card program will J^ 

rest with Property Procurement and Management Section. (PPMS) , (Finance '^■ 

Division. { The SAC or Assistant Director should submit a written - ' *li* 

request to FBIHQ, PPMS for the issuance of telephone calling cards. Ii§| 
These requests should contain the names of the individuals to whom the 
cards are to be issued. PPMS will forward the telephone calling cards 

with Form FD-^281. The PPMS will maintain the inventory records for ■■•ggjtgi; 

the calling cards as issued personal property. Each calling card will 

have a unique number to enable identification of toll charges made by 

each individual. Each calling card is to be issued to an individual 

and the number shall not be given to other individuals for their use. ' 1& 

A calling card may be retained by an individual upon transfer to ?i|^ 

another field office or headquarters if it can be determined that the ^i'S 

card will be required in the new office. Once a calling card has been ^fMi'. 












^ issued to an individual and it is no longer needed, the card should 



§ immediately be returned to FBIHQ for cancellation.. A calling card may IMt 

not be transferred to another individual. "-^^-Si 

(11) The monthly computer-generated bills for calling "^M 

cards are received by FBIHQ and are paid quarterly with the FTS ;i^S§^ 

billing. . J^ 

"!# 



(13) Employees issued telephone calling cards through .'-'j^^ 

FBIHQ should not use personal telephone calling cards. Employees in s0f 

field offices and divisions which do not have telephone calling cards , ?*%$ 

issued through FBIHQ may use personal telephone calling cards and 111 

claim reimbursement through expense vouchers supported by proper ^'^' 

receipts. ' '^ ■ .■.•.■.■■'■ ' ., . -S-^fi-. 



(14) Lost, or stolen calling cards should be immediately .. 
reported to FBIHQ, Operations Management Section for cancellation and 

Property Procurement and. Management Section for inventory control and . .^^S^l 

issuance of another calling card. ■> fyM^^ 












Sensitive" ■, .^.^^..„.^":::K''-y'i^' ''' '■■/■' ■ ^" '7'--^%^^ 


















Manual 
Part 

16-9 



i£V'-^.rKii;;«::.-. .>v#-?"'"'';'" •'■ ■ Sensitive .■■■> .>-:«=*s--H'T;.-<t;f'^#^>;v:s*?sL^Ktr-^'-;,s 
of Investigative Operations and Guidelines,,,..,-- ^;.;,;/r ,^.,^#;-; V:''l|*>5".l^v^^i'=5^V--'---''^s^ 




(1) Any facility or equipment involving 
installation of $100 or more, or monthly recurring charges of $50 or' 
more, or use of any equipment or facility involving change in Bureau,'., 
policy, must be approved by FBIHQ before its installation or use may'^"' 
be arranged or scheduled by a field office. In an emergency situation' 
in which time is of the essence, permission to install equipment or •'■"'■■' 
use a facility involving substantial costs or change in Bureau policy" 
may be requested by contacting the] Information Resources {Division by 
_telephone_or_other__expedite_means_as_warrant.e_d._„__; • " '"' '' -' 



:¥■ 



(2) Submit to FBIHQ on UACB basis request for minor :..i. 
additional communications facilities, such as a telephone instrument- 
using an extension from your switchboard, or an additional telephone.: 
instrument in a resident agency when installation of additional- • 
telephone trunks or lines is not involved, furnishing justification 
and monthly costs, with installation not to be scheduled before 
requests can be received at FBIHQ and denial received if not approved. 

(3) Speakerphones may be authorized, when individually 
justified, for use by SACs and ASACs. Additionally, one speakerphone 
may be authorized for use in a conference room or command post. The 
Bureau is governed by GSA regulations regarding the acquisition of . 
speakerphones. 





EFFECTIVE: 05/2A/9A 



16-9.3 



Procuring New Telephone Systems 



'^l:-^-^: 



Federal Property Management Regulations (FPMR) now require ;«■ 






that all major "changes to telecommunications facilities be procured; ,i«.^_g-. 
competitively. . This requires the advertising and distribution .of:;t^':';U;A^;^^ 
system requirements and specifications, evaluation of' responses, 'and^^tj|:.=qi/: 
submission of fejcommendations to^GSA for approval. These procedures?np^^';|t?'.,. 
will require approximately 1 12 1 months for completion and must, be\,S:::l;^iifl'^i^y''^'^'^' 
negotiated by FBIHQ%' v'; v^; ^^ 



:omp 



. '•-,.i^Tr.*,:i-Kf^ 



iSir^i^'--';: 



.l^^-V-'^: 
















*a>S«,fc-'.'V«'l-'^' 



'^i^iMH^^'-- ' 




Sensitive 






■■■■-J;!' ■" 



.■^.. ''■■!,• ■ 



,'■'-. ■■':'•',■: 



Manual of Investigative Operations and Guidelines 

Part-II^^v.''.-'-' .... ,. ■ %■■. ^ .f...: " '^ ' '' - 

^'^'^ ■'> ■, V^^>';V-'.'' -.: :\ " . .J:-- • ■■* "... 
EFFECTIVE: 05/2A/94 ' • ' 



16-9.4 Federal Tielecommunication System (FTS) 



PAGE 16 - 103 



EFFECTIVE: 07/23/90 













16-9.4.1 General FTS Policy 






In addition to the general telephone policy mentioned in 
|MI0G, Part II,|l6-9.1 above, the following pertains to FTS: 

(1) In field offices equipped with Station Message Detail 
Recording (SMDR) , direct FTS station access can be approved by the 
Special Agent in Charge. In field offices not equipped with SMDR, FTS 
calls are to be made through the office switchboard for the purpose of 
maintaining records of all outgoing FTS calls. Direct station access 
can be approved by the Special Agent in Charge provided that a record 
is made of all the outgoing FTS calls. 



(2) [Deletedl 




(3) The FTS intercity network and other Government 
provided long distance telephone services are to be used only to 
conduct official business; i.e., if the call is necessary in the 
interest of the Government. These networks are to be used for 
placement of calls instead of the commercial toll network to the 
maximum extent practicable. 

(4) FBI FTS telephone numbers are not to be published in 
FTS telephone directories, but may be furnished to other agencies. , 



(5) FBI FTS lines must not appear on GSA switchboards, or 
be available to GSA telephone operators except on "call sam^^y'", or 
if dialed by GSA operator. Furnish FBI FTS account numbe^^^^^nd 
telephone number of instrument you are using to GSA opera^]^}Rn call, 
is sampled. Use no other number or variation of it. 



■jf. ■ 



(6) No FBI telephone calls are to be placed through GSA 
telephone operators except those switchboards where GSA operators 
cannot access or monitor the call after it is placed. 






■ : .g.'ij^. 



l\ J', '^ii.-'" v'f-' ■:■, ^ 



Sensitive 
PRINTED: 02/18/98 v 








Sensitive 



Manual of Investigative Operations and Guidelines 
Part II -• '/.:^:i-,. .V , , : •.■ ^V.::::' .: ; . - . .■ 



EFFECTIVE: 09/21/93 





■4-,. 




.""^/ 








'. .•■:>"^ 




...■ -''M 




■• ' ■■'■''KXl 












■• ■ r-^^!t 




...^■:M. 


.^ 


'<'m- 












104 


.I'a^f*- 


■.h\'*' ^ 


'•im 








■ '"'■i' 






.':€■•" 


■'- ■' ' 






>'!£■ 




'■iJT^T 



I 16-9.4.2 |Deleted| 



EFFECTIVE: 09/21/93 






''^ 




16-9.4.3 FTS Billing 

(1) Each FTS call made from a field headquarters and from 
each resident agency 24 hours a day, seven days a week will be billed 
on a time- and distance-sensitive, per-minute basis. 

(2) All field office and resident agency FTS service and 
GSA-provided local service are billed directly to FBIHQ by GSA. 



EFFECTIVE: 09/21/93 

16-9.4.4 Requests for FTS Lines 

I (1) In field|offices: | 

(a) JAU field offices are equipped with FTS service. 
If there are indications that additional FTS lines are required, call 
FBIHQ, Operations Management Section, and a traffic study will be 
implemented to determine the appropriate number of FTS lines to be . 
installed. j . ./ 

(2)* In resident agency: ' \ ;^ . 

(a) |FTS service may be installed in all resident 
agencies. If there are indications that additional FTS lines are 
required, call FBIHQ, Operations Management Section, and a traffic 
study will be implemented to determine the appropriate number of FTS 
lines to be installed. j 

I (b) I If the resident agency does not have FTS 



Sensitive . 
PRINTED: 02/18/98 '^tKO- 






^'fiv?: 



« 'ifi'i- 

■A 
- '■»-<■■ 

"■Mr 






,^.,v,: ■■'■■i-.-r,'''^^-. ■ . '^^!S5:^^f?J^;?)f»;'-';. ' ■'':^i''^?^^'?'i^:f<^fi^-'^-.^--'?:'^P^^i 












'"sis;' 




Sensitive 



Manual o£ Investigative Operations and Guidelines 

Part 11^".-... "^-7:,: .■■;^-'r''T ^ ^ -.■:- ^ . 



PAGE 16- 105 



service, a request should be submitted to FBIHQ, Operations Management' 
Section, showing the number of personnel assigned to the resident 
agency along with all commercial telephone numbers in the office and . , 
the purpose of each line.j 

(c) iDeletedl 



fi.'-'XiiJ. 

■ sm- 

■ :-^ 

• . .^^^ 

■^^^ 



:.S 



EFFECTIVE: 09/21/93 



16-9.4.5 



FTS Calls to FBIHQ 



Each field office using the FTS lines on its switchboard 
can direct dial any telephone station at FBIHQ without going through 
the FBIHC^uD^hboard operator. This is accomplished by 
dialin^^^^^^^B)lus the desired foui—digit extension number. The 
FBIHQ ^^^W^^Kreceiving the FTS call has the capability of 
transferring all incoming calls to other extensions. 



I. 



* r'-'<i *. 



■■■-mi: 






EFFECTIVE: 09/21/93 



16-9.5 



Wide Area Telecommunications Service (WATS) 






WATS may be used only for calls of an official nature and 
authority required for its use is the same as that required for making 
long-distance telephone calls via toll facilities. 



EFFECTIVE: 10/27/81 









16-9.6 



Foreign Exchange (FX) Trunk 



•u. 



FX service is a trunk facility between a PBX or Centrex 
system and a central office which is outside the local service area of 
the PBX or Centrex system. Such facilities provide the equivalent of * 
local service to and/or from the distant exchange. FX lines must be. 
authorized by FBIHQ. 













Sensitive 
PRINTED: 02/18/98 









HH 



w 




Sensitive 
Hanual of Investigative Operations and Guidelines 

Part': Ti. •"■■■••■•: ■ : >■ ■"- . .• ■ 

EFFECTIVE: 01/31/78 

16-9.7 Off-Premise Extension (OPX) 

An extension off the switchboard to a remote off-premise 
location. OPX must be authorized by FBIHQ, 

EFFECTIVE: 01/31/78 



.y . ' . ^' ! 


.. ■■ 


-, ■■•-!. -•. 




. , ,.e^-. 


. 


" -/-■ ' 




) 




■■ 


■■ -- rr??#Sf ■ 


■'.,■1,. • . 


t 




■ "'^"■■■■^I^S- 




-.■ 






PAGE 


16 - 


- 106 . 








*" . :.\\ 
















^^■!i- 






• 


-■■^••iS^^^ 














. .. 


<^ 
















- -0^' 








_.^«= 



16-9.8 



Tie Lines 



Tie line is a private line communication channel of the 
type provided by communications common carriers for linking two or 
more switching points together. Tie lines must be authorized by 
FBIHQ. 



EFFECTIVE: 01/31/78 



16-9.9 



Local Telephone Systems 



EFFECTIVE: 01/31/78 



16-9.9.1 Policy 

In addition to the general telephone policy outlined in 
|MI0G, Part II, | 16-9.1 above, the following pertain to local telephone 
systems: 

(1) JDeletedl 

(2) When commercial long-distance (toll) facilities must 
be used, calls should normally be made station to station, directly 
dialed. 

(3) Telephones in resident agencies are for the exclusive 
use of Resident Agents and should be private lines not connected with 
other offices or building switchboards. Tie lines with switchboards 
may be maintained in addition to private lines if approved by FBIHQ. 



Sensitive 
PRINTED: 02/18/98 



^'M 












:^ 

•>5,-jf*VJ; 
■ . .'.-wf 



-MX' 



,v • .Vi>v^,^t-%-- 





■ . ■ ,>&i.'iW' 

."■-•(' V^^' 
. . ;■■, , -■■HA'i 

■ . ' ■ ■ -mM' 

■ ■ ■ . • ■■■^m- 

Part II' •...%■•■..■ ■ ■■ -■■'■- ■ -■ ■■ ■ PAGE 16 - 107 ' 'fi^ 

, . ■ ■■■ ■ ■ ■ , . ,.•....-:....■ -"t^ 

• ' ■ '■ / - . ■ ■ ■ '•"• ■" ■i%|^'' 

''"IS;- 

■ ■■.\Y .' 



Sensitive 



Manual of Investigative Operations and Guidelines 



EFFECTIVE: 09/21/93 



16~9.9.2 Listing of Telephone Numbers in Directories 

(1) Field headquarters listings are to be "Federal Bureau 
of Investigation," (For city, business, building directories, and 
inscriptions on doors, the listing should be "Federal Bureau of 
Inve stigation, United St ates Dep artment of Justice .") Listin g should 



(3) I For locations where there is no field office or 



I (A) I It is not required -that SACs have their home 
telephone numbers listed in the telephone directory. 



EFFECTIVE: 09/21/93 



Sensitive 
PRINTED: 02/18/98 






•.:m 



appear alphabetically under the Fs in the U.S. Government section of -^.^^ 

the I telephone I directory. -7$^ 

(2) Resident agencies listings | should be included in the ;j^ 

U.S. Government section, if available, and in those cases where there 
is no U.S. Government section, the listings should be included in 
alphabetical order in the white pages. (See MAOP, Part II, 1-3.9.) | 



M 



m 



(a) |a11 resident agency legations should be equipped -;||, 

with a telephone answering recorder or voice mail system. This 
equipment can then be activated to advise the caller to call the field 
office number in an emergency situation when the resident agency is 
unmanned. I 






m 



(b) I In no instances shall the residence telephone 
number or address of an Agent be listed as an alternate or emergency "IJI 

number for the resident agency. | 



ip. 



resident agency, no telephone directory listing is required. !§« 

'. ■ ■ ' ■ ^ . . • • ■ ■ ■ ■■":,H| 

There is no objection to listing the field office telephone number in ' ^^l|5v 

the alphabetical section of the directories, provided there is no <® 

charge for the listing.] "f| 

















Sensitive 



Manual of Investigative Operations and Guidelines 

16-9,9.3 ' Annual Teiecommunications Equipment Reports (FD-344) 



PAGE 16 - 108 

•«, ,■.■•- „-.' i"j>»- ■■, ■■'■■-■■ 



' Each April compile Annual Telecommunications Equipment and 
Cost Report, using Forms FD-34A and 344a. Mail report, in duplicate, 
to reach FBIHQ no later than middle of May. If major changes are made 
in telephone system between regular annual submissions of this report,, 
FBIHQ records should be brought up to date with submission of 
pertinent changes to last report submitted. 



EFFJECTiyE :_01 /_31/J78„ 



16-9.9.4 Billing 

Field headquarters' bills should be checked against the 
[station Message Detail Recording (SMDR) , if available, jbefore they are 
approved for payment. Likewise, toll calls | for a resident agency 
should be|certified as to correctness by the Senior Resident Agent 
befbrejthe bills are processed for payment.] 



r,-Vfr«i. -ai^i. 






;.i^lfSj^> 



■v,i" 












EFFECTIVE: 09/21/93 



h9< 




16-9.10 Telephone Answering Devices 
MAOP, Fart II, 1-3.9 (3) .) | 



(See Mice, Part II, 16-9.9.2; 



Telephone answering devices provide the caller with a 
prerecorded announcement identifying the called party and inviting the 
caller to leave a message. The message(s) can be extracted upon 
return to the office or accessed remotely from any other telephone by 
use of a uniquely coded remote access keyer. 

(1) Telephone answering devices will be most appli cable-;;-, 
resident agencies: however, securitj^ consideraLionP requi_rip'^ 




(2) Requests for telephone answering devices should be 



Sensitive" ■"■■"■■"■ "' ' '. .•■"- ■ 

PRINTED: 02/IB/9S f.^i^m^'^^;t: .. ■•■..., 



■:-.'.-,''"fi">;Kl4ii-'4^- ; 









■.-^Wl' 



^ 






■■-A 






vZSm. 



— r -^f-Ay^'^*^ 




^ . • Sensitive 

, _ ■ ■ / ,. . , ■ 

Kanual of Investigative Operations and Guidelines 

Part II .V.C'- - "-t-i^^' V^'"'-- ■ .^^'•■"' . 

submitted to FBIHQ with detailed justification. 



PAGE .16 - 109,-; 



EFFECTIVE: 09/21/93 






'i>s5^r.- 



•JXf! 






16-9.11 



Use of FBIHQ Telephones 





EFFECTIVE: 07/23/90 



16-9.11.1 Computer Record of Calls Made 

Each user should be aware that all calls placed) from 
FBIHQ, I Washington, D.C.|and some field offices on either [the 
commercial or FTS networks are automatically billed to the user's 
station. This billing information, which is computer controlled, 
prints out identifying data similar to that which appears on each 
individual's home telephone toll bill. In addition, the printout will 
show the time the call | was j placed and the length of the call. JAt 
FBIHQ, |the resulting billing information will be furnished to each 
division for verification and control. JEach field office with SMDR 
should furnish the resulting billing information to each squad 
supervisor for verification and control. | All FTS and FTS/WATS calls 
are charged to the Bureau on a per-minute, time- and distance- 
sensitive rate, 24 hours a day, seven days a week. 



EFFECTIVE: 09/21/93 

16-9.11.2 Local Calls 

Local calls may be placed after dialing "9" to access an 
I outside line. 

EFFECTIVE t 07/23/9a ..' ^ ■ 






Sensitive 
PRINTED: 02/18/98 4vpi'fc«:ft 



• ■' -r-./JfUi.- 



- -jAt-j 



■'* ■r^^;" 

: ..-..4«(ji., 

■1 ',ai¥%S 

■'■■■ ' •^^■^^Mf 



•'■^^pF 






>' ■-'-' 




Sensitive 



(•■•t 



Manual of Investigative Operations and Guidelines 
rare li;-' ^.-''--^--fi.y-f'i;-'- ■ '- \\..;^''-'u*i"' ■''V','" ivf'r', ■''..'. ;.,:'"'-V ■' 



PAGE 16 



- no. 



16-9.11.3- FTS Calls- 



Individuals who have unrestricted telephones are able to 
direct dial field offices and other Government telephones on the FTS • ' 
network. This is accomplished by dialing theJETS access number, 
usually|"8" followed by the FTS j.ten-digit | telephone number. The FTS , 
telephone number for each field office is included on the Field Office- 
Hailing List. 



-■**5,. 

■ ms» 






EFFECTIVE; 09/21/93 








16-9. 11. A WATS Calls 

All I long-distance I commercial and residential telephone 
numbers within continental United States may be direct dialed through 
the FTS network (FTS-WATS) by dialinglthe FTS | access | code, usually 
"8", jfoUowed by the ten-digit commercial telephone number. These 
calls are charged as FTS rather than as commercial toll calls. 



EFFECTIVE: 09/21/93 



16-9.11.5 Deleted 



EFFECTIVE: 05/24/94 



16-9.11.6 FBIHQ Office Reorganization/Expansion ' 

(1) When an off ice is to be reorganized, expanded or V'^-p,. 
moved, a written request must be furnished to the [information ... 
Resources j Division. The request must be received at least ten working' 
days prior to actual date service is required to allow ample time for-' 
surveys, order preparation, and scheduling of telephone company 
technicians. 

(2) If the telephone work requires the movement or 






Sensitive 
PRINTED: 02/18/98,-/7*!;:/ 



-^^^^-h 

■ :-m 

m 

■ ■ J^ffe 

■ '^'fer 

.,' - -'f'.WHr 

-■SB 

''''^■ 















. .» 






,-■-->-$•:'':';' 










vi.?;- 







v. ■' , ^**^v■■■ 






Ar-'*'" '-'f "' 



.-■^'-■^ .•■^■' 







ins 

priors eparate arrangement 
Management, Unit, |Personne 
installed prior to the 



nel|Division. to ensurp thit the outlets are^;^K|.? y'^i?^: ■'^'^^'^^^^ 
requested telephone service diate. -...r -V'*- r^m-"'-'"-'--^ ^.:^[ ' -'X'^^:gm 



(3) If the telephone work involves the installation of . 
new furniture, then the written request should be received at least 20 ;| 
working days in advance of the installation date. Floor plans should ; 
accompany the memorandum to assist telephone company personnel in • 
moving telephone cables. 



(^) Move8_to_offr:sit©_locations__require_at__least_3-0_ 



working days' advance notice due to the additional requirements to 
purchase equipment and engineer circuits. 










EFFECTIVE: 04/2 1/9A 



j|l6-9.11.7 Quarterly Telephone Reports 

Offices equipped with SMDR must submit a quarterly 
printout of ALL outgoing calls made from the field headquarters for 
the periods January-March, April-June, July-September, and October- 
December. The printouts are to reach FBIHQ, Attention: Operations 
Management Section, by April 10, July 10, October 10, and January 10, 
respectively, for the appropriate quarter. | 






EFFECTIVE: 09/21/93 




16-10 COMPUTER ASSISTANCE TO THE FIELD] (See MIOG, Part II, 

io-4.).|- ■;■ ■ ■■;■ :.j'r ■ ■■".■ ..■"... , 



In any investigation within FBI jurisdiction, experienced.; 

I Automated I Data Processing (ADP) personnel ass ^ned" to^r^-;- * "v-f^v^f-'^ 

thejlnvestigative Automation Support Section, Information Resources 
Division, [are available, where warranted to: .,'"-: 

(1) Provide on-site assistance in the examination of 
records maintained on data processing equipment, including but not; 



; i*i »■ '■\ . . - -; ■•'•flj^SE'? 
:^ li,-, ,,;;.-i • ,. /;%Saai«¥ ^ 



. ...:;,ic.>JSiTit.>* 






Sensitive..,,. .,^. ;?=,., ':«,2v"''^""'"'^"'' 
^PRINTED: 02/18/98 "''-v.; v ■ V ■•":J:.';A%v;-.^^.:j" 




#«ife' 



, N-;i-^ -^'•l^ . 















3«fe^^ 



■-.■:.*■,'.*■,.' -v.' #^:- 



■v^l^^^r; 




Pv4- 






l':-:Ux-;v; 



„;"M.*. ,,!''■■» 



Sensitive 



'4'- ■ 




1 




Manual of Investigative Operations and Guidelines 
liiaited to, execution of search warrants. ',''-'„ 



-, rj^^^kji^'. PAGE .;■ 16'-% 'll2-fe'"; ■■ 



"''•■-! -J;;,. 



■ iU- ; 



(2) '. Supervise on-site preparation of listings or reports -v 
from automated records, including but not limited to, execution of ' > 
search warrants.;'"-" ■■%'■''' . '■ - *■.;.■. ■ -'^ _ ^./,, .^ 

(3) Arrange for the processing of automated (machine., 
readable) files and large quantities (in excess of 1,000) of , ,- 
nonautomated records. Examples of nonautomated records are checks, 
deposit slips, bank statements, payroll records, other financial 
documents, telephone toll records and bills. 



(a) Types of work previously requested have been 
sequencing, selecting, comparing, preparing accounting schedules, 
and/or mathematical computations. 

(b) Some examples of schemes where processing of 
records have been beneficial are floats, kiting, lapping, skimming, 
padding of payrolls, double billing, land fraud and welfare fraud. 

(4) Implement the Investigative Support Information 
System (ISIS) to support major FBI investigations. There are two 
versions of ISIS: 1. Online - where computer terminals are installed 
at the field office for instantaneous data loading and retrieval, and 
2. Offline - where data encoded at the field office is sent to FBIHQ 
for processing and a hardcopy listing returned to the field. The 
version of ISIS used to support an investigation is dependent upon the 
requirements of the case and the availability of ISIS resources. ISIS 
provides the ability to control, access and correlate all information 
that is generated by major investigations. ISIS has proven beneficial 
for file review prior to interviews, determining pending leads, 
writing reports and preparing for trial proceedings, in addition to 
investigative purposes. 

(5) Implement ISIS reactive capability for immediate 
support of a major case(s). ISIS has the ability to be operational .. 
online at the site of the major case within forty-eight hours of the ^ 
decision to support the case. The ISIS reactive capability is 
utilized at the request of the Director and/or [Deputy ,.; 
Directorlaiid the Assistant Director - Criminal Investigative Diyi si on. 



EFFECTIVE: 06/01/9A 












- f# 

.:S% 






■-.if. 






Sensitive . 
PRINTED: 02/18/98 









■ , -fl^ir^T** 















:::..-..:*....-^f'pJ^:..,.^;g:;^f^ 



-i-'; 









.-^^1' - -C 



,ST_(^ - " " 



'■'f^-^-t ■ 



-'5>'- 



'.\:.-i'\.. -^%:,''y-j'' '" '■:■-:■ , 'Sensitive y-s-.- 

. ■{' ' . ■.'■■^.iiiff'';'- ■;.■ ^ • ' ■' ^ . - V • • . -. • '■ 
Manual of Investigative Operations and Guidelines 
Part II ■ \^:, i<^'-^:p^'^'-^"'^<:y}'i ^i^'Ar T'^' ■"^Vv/" ,. ■ 

16-:i6ri Requests for Computer Assistance 'csr . 






':•■ .«A 






.■"■.'i< 









PAGE 16 - 113 



All requests for computer assistance should be in a . ■ 
written communication addressed to the Director, FBI, Attention: 
I Investigative Automation Support I Section and should: - ^ 

(1) Include in the title of the case: the field office 
and Bureau file numbers, if known, as well as the phrase "Request- for . 
Computer Assistance." 

(2) Furnish any pertinent background data. 









(3) Set forth the specific type of computer assistance 
being requested, along with an estimate of the volume of source 
material. A rough sketch of the desired output (computer printouts) 
should be enclosed showing what data fields are required and in what 
order or sequence they are needed. Totals required should be 
identified to include when needed (end of month, end of year, etc.) 
and where they should be printed. 

(A) Set forth the approximate cost to accomplish the task 
manually. This should include the number of personnel required and 
the amount of time to complete the task. 

(5) List any deadline data and the reason(s) for the 
deadline. 

(6) Enclose typical samples (originals or legible copies) 
of the source material. (Note: Do not send all the source material 
until requested to do so by the | Investigative Automation 

Support {Section.) 

(7) Indicate whether the source material will be used a* "- 
evidence in court and whether any markings can be made on the 
material. It is often desirable to write on or stamp a number on the ,.. 
material to facilitate data entry processing. 

(8) Advise how the material was obtained (Grand Jury ■'■^■^^0.: 
subpoena, search warrant, etc.) and if there are any objections by the 
United States Attorney's office to the subcontracting of data entry , - 
aspect of this request. J' ,- ■' '/., ■-,^^ '.^ '''y.'^''"¥v^''. '■; 

(9) Indicate if it is anticipated that the requested 
computer printouts will be introduced into court and if there is a 

j possibility that [investigative Automation Support [Section personnel 
will be called upon to testify. 



•■''■■A 



Sensitive;-" ■> 
PRINTED: 02/18/98^^ 



:<*■?-•■ 









■ iiSA 
■-^^ 

■ J0l 









"■■■■'■ -"^v'.^it^'" 
■-■v.ftv-' 






.■;^';C,, 









?,n.t.v. 




Sensitive 



Manual of Investigative Operations and Guidelines 

, Part II "v;""-!'"' n"^'-=;w..^''v;'--'3'' .■'•■■-■"■■ ''■— -^;,: 



EFFECTIVE: 06/01/94 



16-10.2 [investigative Automation Support [Section Actions 
Regarding Request 



PAGE .16- 114 



..^ .. .•4j- 





EFFECTIVE: 06/01/94 

16-10.2.1 Approval of Request 

The following factors are considered prior to approval of 
a request for computer assistance: 

(1) Priority of the case - investigation 

(2) Deadline required 

(3) Computerization costs versus manual costs 

(4) Complexity and volume 

(5) All online ISIS requests must be approved by the 
Assistant Director and Deputy Assistant Director(s), Criminal 
Investigative Division. ' ~, .• 

EFFECTIVE: 05/08/81 









■ ^^ 

. • ■ . ■'•••.Sy; 









Sensitive 
PRINTED: 02/18/98 



."■vsfi:]: 



■■■^■@i!%' 




Sensitive 



Manual of Investigative Operations and Guidelines 
Part II 



PAGE 16 - 115 



■% 






:^ 



16-10.2.2 Completed Product 

After a request has been approved, the results of the 
computer assistance will usually be furnished on printouts which will 
all be printed in uppier case (capital) letters. These printouts can 
be prepared: 

(1) In multiple copies where requested and necessary. 

(2) On paper eight and one half inches in length and 
eleven inches in width or on paper eleven inches in length and from 
_t.en to,..sixteen_jLnchej5..in j*i_d_t_h,^ , 



EFFECTIVE: 05/08/81 



16-11 



WORD PROCESSING COORDINATION 



Word Processing (WP) has been defined as the manipulation 
of textual material through the use of a keyboarding device capable of 
controlled storage, retrieval and automated typing. However, within 
the FBI implementation of the WP concept means production of- 
typewritten documents and communications more efficiently through the 
use of systematic procedures, automated office equipment/ 
communications devices and skilled personnel. Equipment used in the 
implementation of this concept include: 

(1) Dictation/Transcription Equipment 

(2) Standalone, nonvisual display and/or visual display 
text-editing machines with a printing device for each machine 

(3) Shared-Logic text-editing systems comprised of 
keyboard visual display units which share a controller and printing 
device 

(4) Shared Resource (distributed/clustered) text-editing 
systems comprised of both standalone and shared-logic capabilities and 
communications interface 




EFFECTIVE: 05/08/81 



Sensitive 
PRINTED: 02/18/98 






^a^titaa] mt\*rmm 




Sensitive 



V. SIS' 



Manual of Investigative Operations and Guidelines 
Part II ... - . 

16-11.1 Requests For Word Processing Equipment 



PAGE 16-116 



All requests for WP equipment are considered according to 
WP equipment standards set forth in Federal Property Management 
Regulations (FPMRs) , Federal Procurement Regulations (FPRs) , and 
Department of Justice (DOJ) Orders. Processing of WP equipment 
requests is as follows: 

(1) The Assistant Director of the] Information Resources | 
Division! (IRD) Ihas been assigned responsibility for reviewing the 
merits and approval/disapproval of all WP equipment requests. 



(2) All requests for WP equipment are to be forwarded by 
appropriate communication, addressed to the Director, FBI, Attention: 
I Information Resources JDivision. 



'.■ .'ji.. 





EFFECTIVE: 06/01 /9A 



16-11.1.1 Dictation/Transcription Equipment 

When reviewing requests for dictation/transcription (d/T) 
equipment, the following equipment vs. manpower parameters will 
normally be used: 

(1) 1 - Portable or desk-top dictation machine for every 
five headquarters (HQ) city Agents 

(2) 1 - Desk-top transcriber for each employee assigned 
to a WP center, excluding supervisors 



Ass 



(3) 1 - Portable dictation machine for | Investigative 
istants] and/or Agents primarily assigned to "record check" duti 



es 



(4) 1 - Portable dictation machine for each Agent in 
resident agencies where no secretary is available and five or less 
Agents are assigned 

(5) 1 - Portable dictation machine for every two Agents 
and a desk-top dictation machine for every five Agents assigned to 
resident agencies having a complement of five or more Agents 

(6) 1 - Combination D/T machine for use of the Senior 
Resident Agent and the secretary/stenographer in those resident 



Sensitive 
PRINTED: 02/18/98 



-f- 



r:.:.r^m 




Sensitive 

Manual of Investigative Operations and Guidelines 

Part II v;-,;- / r , PAGE 16 

agencies where secretarial/stenographic assistance is available 

(7) Telephone dictation capability (if available in HQ 
city) for use. by resident agencies in dictating expedite, nonsensitive 
airtels and teletypes 



- 117 















EFFECTIVE: 07/23/90 



16-11.1.2 Text-Editing Equipment 



When reviewing requests for text-editing equipment, the 
following criteria will normally be used: 

(1) Combined Clerk-Stenographer, Secretary, Clerk-Typist 
and/or Clerk Dictation Machine Transcriber personnel allocation of the 
requesting field office/division 

(2) The average hourly typing production rates determined 
during WP Studies at two representative field offices and FBIHQ for 
the typing personnel identified in (1), directly above. 

(3) Economic justification of WP text-editing equipment, 
normally requires its utilization to a minimum of SOX of its available 
time (l.AOO hours per year, 250 available days/year x 7-hour work 
shift = 1,750 hours x .80 - 1400 hours), and its utilization for the 
processing of appropriate WP applications. 

(a) The studies indicate that an appropriate WP 
application is where 20% or more of all lines typed are repetitive in 
nature, i.e., that portion of a revision which is unchanged during a 
revision cycle. 

(b) Special applications within a specific office 
will be considered on a case-by-case basis. 






M. 






iW- 



■■"7 



EFFECTIVE: 07/23/90 




\,::rh.. 



Sensitive 
PRINTED: 02/18/98 



■if«»[- 







PAGE 16 - 118 



Sensitive 



Manual of Investigative Operations and Guidelines 
Part. 11^ 

[16-11.1.3 Equipment/Vendor Selection 

All decisions as to equipment /vendor selection for HP 
equipment will be made at FBIHQ based on standards set forth in FPMRs. 
FPRs, DOJ Orders, and mandatory and desirable functional requirements. 
Basic selection criteria has been derived from Federal Supply Schedule 
contracts and WP equipment evaluations derived from the WP studies of 
two representative field offices in an effort to ensure procurement of 
appropriate equipment.) 









EFFECT iyE:_ll/_l 2 /.80_ 



[16-11.2 Allocation of Text-Editing Equipment 

(1) In allocating text-editing equipment to field 
offices/divisions, primary consideration will be given to ensuring BOX 
utilization of the text-editing equipment during its available time 
(See 16-11.1.2). It is suggested that allocated equipment be assigned 
to areas where dedicated typing personnel can use any available piece 
of text-editing equipment. 

(2) Results of previously mentioned field office WP 
studies have shown that Secretarial personnel type only 15X of the 
time. For this reason, secretaries are not good candidates for 
assigning text-editing equipment. | 




EFFECTIVE: 11/12/80 



16t11.3 Word Processing (WP) Equipment Inventory Matters 

(1) All WP equipment must be inventoried according to 
provisions set forth in the FBI's "Accountable Property Manual." 

(2) Any problems arising with the WP equipment inventory 
should be referred to] Information Resources |Division| (IRD) . | |lRD|will 
work with the Property Accounting Systems Unit in resolving WP 
equipment inventory problems. 



■■'.'t . 



Sensitive 
PRINTED: 02/18/98 






OPCA-20 (12-3-96) M ^ XXXXXX 

"': ' ■' "" ■"■■ " "" "-' " '■ ""' - - - ■- -■- --- 'XXXXXX T.' 

XXXXXX V • s - 

FEDERAL BUREAU OF INVESTIGATION --^ 

FOIPA ^f 

I DELETED PAGE INFORMATION SHEET • 

Page(s) withheld entirely at this location in the file. One' or more of the following statements, where indicated, '&. 

explain this deletion. '' 

Im Deletions were made pursuant to the exemptions indicated below with no segregable material available for 'i 

release to you. •; 




- 


Section 552 


- 


n (b)(1) 




n (b)(7)(A) 


s/ (b)(2) 




□ (b)(7)(B) 


□ (b)(3) 




n (b)(7)(C) 

a (b)(7)(D) 


_/ 


Era))r7)fE) 


D (bV7)rF^ 


n (b)(4) 




n (b)(8) 


n (b)(5) 




□ (b)(9) 





Section 552a 


n 


(d)(5) 


n 


a)(2) 


□ 


(k)(l) 


n 


(k)(2) 


n 


(k)(3) 


n 


(k)(4) 


□ 


Oc)(5) 


n 


(k)(6) 


a 


(k)(7) 



f' a (bX6) 



D Infonnation pertained only to a third party with no reference to the subject of your request or the subject of your 
request is listed in the title only. i 

□ Documents originated with another Government agency (ies). These doctunents were referred to that agency (ies) 
for review and direct response to you. 

Pages contain information furnished by another (Government agency(ies). You will be advised by the FBI as 

to the releasability of this information following our consultation with the other agency(ies). 



Page(s) withheld inasmuch as a final release determination has not been made. You will be advised as to the 
disposition at a later date. 

Pages- were not considered for release as they are duplicative of 

Page(s) withheld for the following reason(s): 



,/ 



The following jtjmhfit is tcflbe ussd for reference reeardina these paees; 



XXXXXXXXXXXXXXXX 
X Deleted Page(s) X 
X No Duplication Fee X 
X for this page X 

XXXXXXXXXXXXXXXX 

XXXXXX 

XXXXXX 

XXXXXX FBI/DOJ 




Sensitive 



Manual of Investigative Operations and Guidelines 
Part II 






PAGE 16 - 125 



EFFECTIVE: 02/16/89 



16-14 REVIEW OF LONG DISTANCE TELEPHONE TOLL CALL RECORDS . 
(INVESTIGATIVE TECHNIQUE) 

For information concerning this matter see MIOG, Part II, 
Section 10 (Investigative Techniques). 



. :«•• 



-EFFECTIVE :_02/16/89- 



16-15 



NATIONAL LAW ENFORCEMENT TELECOMMUNICATIONS SYSTEM, INC. 




■■% 




(NLETS) 
7-5.2.) 



(See MIOG, Part II, 16-16 and MAOP, Part II, 



(1) NLETS is the only national telecommunications network 
which provides Federal, state, and local law enforcement with the 
capability to exchange free-form criminal justice and criminal 
justice-related information interstate. It provides the capability to 
access most out-of-state vehicle registration and driver's license 
records automatically. Most field offices have access to NLETS via 
state or metropolitan area control terminals used to access the 
National Crime Information Center and/or state and local information 
systems. 

(2) NLETS enhances the effectiveness of the FBI's 
investigative activities. In most instances NLETS makes it 
unnecessary for field offices to use the intra-FBI communications 
process to handle "one shot" leads such as a vehicle registration 
request. Without NLETS the requesting field office would have to 
prepare and transmit a teletype, airtel, or letter to the field office 
covering the territory of the source agency, such as the Department of 
Motor Vehicles (DMV) in another state. The receiving office would 
then open and assign a case, and the case Agent would have to cover 
the auxiliary lead and prepare and send written response to the 
requesting office. Use of NLETS for routine DMV and driver's license 
checks will produce a cost sa.vings resulting from the reduction in 
paperwork. Additionally, the' speed of direct communications will 
provide instantaneous results and an investigative time savings will 
also be realized. 

(3) You should be aware that NLETS does not have any 
telecommunications security capability and care must be taken to limit 



Sensitive 
PRINTED: 02/18/98 




Sensitive 






Manual of Investigative Operations and Guidelines 
Part II ., ■ ■ , ;■.. 



PAGE 16 - 126 



use of NLETS to the acquisition and dissemination of nonsensitive 
information. The following guidelines are set forth regarding the use 
of NLETS by the FBI: 

(a) NLETS should be used to obtain nonsensitive 
record information from state and local law enforcement, license, and 
service agencies. 

(b) NLETS may be used to transmit administrative 
messages (travel plans, weather advisories, etc.) between field 
offices and state and local law enforcement agencies. 






(c) When appropriate, NLETS may be used by field 
offices to transmit AFB-type general descriptive information to all 
law enforcement agencies in specific geographic areas. 






(d) NLETS may not be used to transmit FBI 
investigative information extracted from the Central Records System to 
other Federal, state, or local law enforcement agencies or between FBI 
field offices. NLETS may be used to advise the requestor that the 
desired information will be provided by the specific field office, 
covering the requestor's territory and the requested information 
should be transmitted to that field office via SAMNET, facsimile, or 
registered mail. 




■m. 



■•'.hj' 



■•■«■ 



EFFECTIVE: 08/18/94 










Sensitive 
PRINTED: 02/18/98. 



,-ji. - 







..■ I '■■: ■ ■ . ■■■ ■ . -"^ ■-;■• . :-^> 

' ' ' ■ ■ ■ ■■..■■'■-' ■'■■^.^H- 

Sensitive - - • . :^-^| 

'':■.■ "■..■■... ■ . • ■ . , -,.',..*31^ 

. . . ■ ■ V ■ • . . :.^^. 

- ■ I ■ . ■ ■ ..?■*;' 

Manual of Investigative Operations and Guidelines ■!< 

Part II ■"> ■"■.■■ I ■ "■■ PAGE 16 - 127.. ■.- -r-ig' 



16-16 NATIONAL CRIME INFORMATION CENTER (NCIC) | (See MIOG, Part f 

I, 79-1.2 and MAOP, Part II, 7-5.2.) | "''" .^0 

Those field offices needing assistance or making special ■■i'ijf;^ 

requests should contact the | Criminal Justice Information Services ii' 

Division, Programs Support | Section at FBIHQ. [Programs Support | Section v 
at FBIHQ may be contacted via the National Law Enforcement 

Telecommunications System, Inc. (NLETS) , using the identifier "[ 

|DCFBIWAT8.| (See Section 16-15 above.) .,4i. 



EFFECTIVE: 08/18/94 



16-16.1 Off-Line Search] (See MAOP, Part II, 7-5.1.) | [d. 

An off-line search (inquiry) is a special query of the (, .J^^ 

NCIC computer for information which cannot be obtained through the use .V: 

of an on-line inquiry. An off-line search of NCIC data may be ,:', 

conducted and/or coordinated only by the|Criminal Justice Information ~■^^• 

Services Division, Programs Support [Section at FBIHQ at the request of '^ 

the case Agent or field supervisor. For more details, see the NCIC --vijj 

pamphlet, "NCIC Off-Line Search." •' ^J^; 



EFFECTIVE: 08/18/94 

fSri'iS'.z^i "'■ Canadian Police Information Centre (CPIC) System (See- 
MAOP, Part I II, I 7-5.3.) 

The CPIC System may be accessed through NLETS. Refer to 
your State Operating Manual for guidelines to access this database. 



EFFECTIVE: 05/13/96 



'.*- 



Sensitive. 
PRINTED: 02/18/98 









Sensitive 






(a) Explain to the requestor that the FBI, only 



(b) Ascertain i£ there has been an unambiguous 
refusal by the local authorities to enter the record into NCIC and 
specifically who at the local department refused to make such entry. 






--'If*- 



Manual of Investigative Operations and Guidelines '-f|0. 

Part II • ..:■■■•'■;'• ,.::■-:; •- ■ . / . . .PAGE 16'- 'US'.^; V',3^ 

''-■ . -■ ■■•■■ ■■■...■ .' ■ '^■^■' -- .:.-:- .■:.:.k'.^.^r..- ^^-^ 

16-16.3- Missing Person Reports; 



. .''S.w 



(1) The signing of the Missing Children Act (MCA) on. V^; • .^Q? 
October 12, 1982, requires policy changes in the Bureau's handling of . '~ #^ 
missing person reportis received./- The Act requires the Attorney '^o' 
General to "acquire, collect and preserve any information which would -i^Mi 
assist in the location of any missing person (including an .''^^ 
unemancipated person as defined by the laws of the place of residence ^i-'^ 
of such person) and provide confirmation as to any entry for such a ; r- 
person to the parent, legal guardian, or next of kin of that person ..'iff 
(and the Attorney General may acquire, collect, classify, and preserve -i^r 

_such_ infpraatLon_JEjLOa..s.uch_pare,nt,,_lega^ - •' -^^ 

Therefore, a parent, legal guardian, or next of kin of a missing child 

has the legal right to inquire of the FBI vfhether data on the missing 

child has been entered in the NCIC Missing Person File. When a field 

office receives one of these requests, a determination should be made 

verifying that the requestor is the parent, legal guardian, or next of 

kin by means of any form of identification data. Thereafter, an NCIC 

Missing Person File inquiry should be made to determine the existence 

of a record. JTrj; 

(2) In the rare case where (1) a record has not been ', #; 
entered because the local authorities refused to enter, and (2) the 4' 
parent, legal guardian, or next of kin requests the FBI to enter the ^^ 
record, follow the procedures below. (Use Forms FD-626 and FD-630. ~w 
These forms should be placed in the 79-0 administrative control file .. :.U 
after NCIC entry has been made by the field office. These forms are 
intended for field office use and should not be forwarded to FBIHQ.) 



•.■■■l;is ■ 



■ytm 






enters data on individuals into the file in rare cases where the local '}^' 

police refuse to enter the data on the individual. 






•^*-/*^ 



(c) Inquire of the requestor if a missing person, .^l 

report is on file with a police agency and, if so, secure a copy of j'^ 

same. If possible, have the requestor bring such a copy with him/her. %■ 



:M4 



(d) If at all feasible, insist that the parent, 
legal guardian, or next of kin come to the field office (including 

resident agencies, if applicable) to make the report. Verify the ^j:^. 

identity of the requestor. ^^or 

'■:■■' ■■■^^» 

■ ■.-. ■ ■• ' '■ :-tS. 

Sensitive A^iMiik 

PRINTED: 02/18/98 .,'■_.'.. _ ._ , l^S^ 



'*!i;;-:r 





Sensitive 



Manual of Investigative Operations and Guidelines 
Part 11.^'.. •.■■■..■, 



PAGE 16 









' -# 




'■ ■•It 




..'M' 


; - 129 





(e) Explain to the requestor that the FBI does not 
have authority or jurisdiction to investigate missing person cases 
unless there has been a violation of Federal law falling within our 
jurisdiction, e.g., the Federal kidnaping statute. 

(f) Advise the requestor of the extreme importance 
of notifying the FBI promptly when the child returns. 

(g) Indicate to the requestor that his/her name and 
telephone number will be contained within the text of the message and 
that he/she may be called directly if the child is located. 



(h) The field office will telephonically confirm the 
refusal of the local agency to enter the record and whether or not 
there are extenuating circumstances of which the FBI should be aware. 
Additionally, if the refusing police agency has a "time delay entry" 
rule, the FBI should proceed to enter the record and coordinate the 
removal of such record with the police agency when they enter their 
record. 

(i) After good faith satisfaction of the above, the 
field office will enter the missing person record. If such 
extenuating circumstances exist, advise the parent, legal guardian, or 
next of kin that no entry is being made. 

(3) After an NCIC entry is made, the following validation 
procedures should be followed: 

(a) A written communication should be sent to the 
local authorities confirming that agency's stated refusal to enter the 
record, the FBI entry of the record, and the necessity of being 
immediately notified when the individual returns. 

(b) A copy of the above communication should be sent 
to the parent, legal guardian, or next of kin reiterating the extreme 
importance and necessity for the FBI being promptly advised of the 
individual's return. 

(c) Set a tickler to contact the parent, legal 
guardian, or next of kin on the third working day following the date 
of entry, again at the end of two weeks, four weeks, and then once a 
month until the individual has been located. If, after two " 
consecutive attempts, the FBI cannot, despite reasonable efforts, 
locate a person or agency able to verify the currency of the record, 
the record should be removed from the NCIC File and the requesting 
parent, legal guardian, or next of kin who requested entry should be 



Sensitive 
PRINTED: 02/18/98 



"■^S- 









■I 




Sensitive 



Hanual of Investigative Operations and Guidelines 
Part II 



PAGE 16 - 130 



'"^JA 






'■ •^' 



notified by registered mail. 



(4) The NCIC Operating Manual, Part 8, contains the 
necessary information to enter a missing person record. In addition 
to this information, the following should also be included in 
the |Miscellaneous Field of the record: the parent's, legal 
guardian's, or next of kin's name, address, and telephone number. If 
the local or state law enforcement agency has a pending case, enter 
the agency's name and case number, if available, following the 
parent, legal guardian, or next of kin information. This information 
may have to be abbreviated since the Miscellaneous Field is limited 

t o 121 c harac ters. An y othe r pertinent information may follow, if 

space is available.] 






>1^ 



sS^;* 



^. 




>«• 



I (5) I The Act does not confer upon the FBI any new 
investigative jurisdiction. A positive response to an inquiry should - 
not be interpreted as constituting FBI authorization for detention of 
the individual described in the record. The FBI is not responsible 
for effectuating the return of the individual to the parent, legal 
guardian, or next of kin. Inquiring agencies should be informed 
clearly of these facts. 

I (6) I Upon receipt of a hit confirmation request, the field 
office (being the originating agency (ORI) of the record) must within 
ten minutes furnish a substantive response, i.e., a positive or 
negative confirmation or notice of the specific amount of time 
necessary to confirm or reject. 






I (7) I The field office must make a reasonable attempt to 
notify the investigating agency and/or the parent, legal guardian, or 
next of kin of the missing child of the inquiry on the missing person 
record. If unsuccessful, notify the agency which is seeking hit 
confirmation that all reasonable efforts have been exhausted and that 
the information in the record is the best available information at 
hand. If successful in contacting the parent, legal guardian, or next 
of kin, advise them of the individual's location and the inquiring 
agency's location. Advise them to immediately contact the inquiring 
agency. After contacting all parties concerned, immediately clear 
your record from the file. 



■ . V 






.■-•■!:r 



I (8) I When the subject of a juvenile record becomes 
emancipated, the record is retained indefinitely in NCIC until action 
is taken to remove the record. 



it 




Sensitive 
PRINTED: 02/18/98 



'■■rm 



■I 



miHi 




Sensitive 



Manual of Investigative Operations and Guidelines 
Part II ,• ' •' 



PAGE 16 - 131 



•- ■ -- ,. t?;V 

, .■4'>T','jr,-.V'« 

-■' -St. 






EFFECTIVE: 05/11/87 



16-16.4 



Unidentified Person File 



The Missing Children Act of 1982 also resulted in the 
implementation of the NCIC Unidentified Person File. This file 
contains records for unidentified deceased persons (including victims 
of a catastrophe), body parts that have been recovered, and 
unidentified living persons who are unable to ascertain their 

-identities_Xsuch^as_amnesia_victims_and_small_childr.en„or_infahts)_. 

The Unidentified Person File operates in conjunction with the Missing 
Person File. Specifically, records from one file are searched with 
those in the other file. Personal identifiers can be entered in both 
files, which are used to compare an unidentified person record with 
missing person records and vice versa. For complete details on the 
Unidentified Person File, refer to the NCIC Operating Manual, Part 12, 



1^ 



# 



EFFECTIVE: 07/28/87 



16-16.5 



Foreign Fugitives 



The NCIC Foreign Fugitive File operates for the purpose of 
locating foreign fugitives. Records for fugitives wanted in Canada 
are entered by Royal Canadian Mounted Police Headquarters in Ottawa 
and include individuals, wanted in Canada based on Canada-wide 
warrants. Records for fugitives wanted by other foreign countries are 
entered by the U.S. National Central Bureau (USNCB) , the point of 
contact for the International Criminal Police Organization 
(INTERPOL), based on information received on the Red Notices (wanted 
notices) issued by INTERPOL member countries. All record entries are 
made in accordance with established entry criteria. Refer to Part 9 
of the NCIC Operating Manual for details on inquiries and procedures 
on handling positive responses. 




EFFECTIVE: 07/28/87 



Sensitive 
PRINTED: 02/18/98 








■■.■.-■ • ". ■ ■ ' ■ ■'• .'-.'S 

■ . , ■ ■ ■ . -t . ,, ;-y.i-** 

■ ■ ■ . ■■ . . ' ■ - ■ ■ , ■■ ■■■ -^w 

Sensitive . . ,^_ ..■■■iS?, 

■' ■ •,-"-■'>{ 

■ - ■, ' •''•t-- 

Manual of Investigative Operations and Guidelines j.lk 

Part II PAGE 16-132 ,:;^if 



16-16.6 U.S. Secret Service (USSS) Protective File 



EFFECTIVE: 08/18/9A 



PRINTED: 02/18/98 



ji?- 



>S3» 



This NCIC File lists records of individuals who may pose a v^- 

threat to a USSS protectee. All records are entered and maintained by Svif. 

the USSS. Refer to Part 11 of the NCIC Operating Manual for details.] 

EFFECTIVE: 07/28/87 



[16-16^7 Bureau of Alcohol. Tobacco and Firearms (ATF) Violent 

Felon File (See MAOP, Part il, 7-2.10.) 

The ATF Violent Felon File contains records on individuals 
who have had three or more previous convictions for a violent felony 
or serious drug offense. These persons, if found in possession of a 
firearm, are in violation of Title 18, USC, Section 924 (e)(1), 
which provides a fine of not, more than $25,000 and imprisonment of not 
less than 15 years with no suspension, parole, or probation. All 
records are entered and maintained by the ATF. Refer to NCIC 
Technical and Operational Updates 91-4 and 92-1 for details.] 






1 16-16.8 Deported Felon File (See MAOP, Part II, 7-2.10.) .^ 

The Deported Felon File contains records on criminal , 'J^ 

aliens who have been deported for drug trafficking, firearms ' ,. ':^ 

trafficking, and serious violent crimes in the event they might "xc 
reenter the United States without permission. These criminal aliens ' " '~:X^.- 

who have been deported and reenter the United States without ;^,; 

permission are in violation of Title 8, USC, Section 1326, which *,'■ 

carries a fine of up to $250,000 and incarceration of up to 20 years. ,,.^5^ 
All records are entered and maintained by the Immigration and 
Naturalization Service. Refer to NCIC Technical and Operational 
Update 95-3 for details. 









Sensitive- ' ■ - ' , :hM^ 



.•■■■-!(!■■ 







Sensitive 



Manual of Investigative Operations and Guidelines 
Part II -f^ V, ■ v,;:.;---' :■ '. ''■" ' 



PAGE 16 -.133 



EFFECTIVE: 05/13/96 



16-16.9 Violent Gang and Terrorist Organization File (VGTOF) 
(See also MAOP, Part II, 7-5.8.) 

The VGTOF is designed to provide identifying information 
about violent criminal gangs and members of those gangs and terrorist 
organizations and members of those organizations to law enforcement 

.personnel. The„information_serves_to_warn_law_enforcement_officers_of- 

the potential danger posed by violent individuals and promotes the 
exchange of information about these organizations and members to 
facilitate criminal investigations. Refer to NCIC Technical and 
Operational Updates 94-2 and 95-2 for details.] 



EFFECTIVE: 05/13/96 













.S-r;»i 



_..v^-.. 



■ , ii.!^' 

■- -ffis. 

Jii!-, 

■ A 









PRINTED: 02/18/98 



" -VW-- 

m 

■3m 

'■'■■ '■•*«^, 
■ "'M- 

' '■^*:' 



OPCA-20 (12-3-96) 







^_ _ ___ w _- xxxxxx ^^ 

■ """ xxxxxx ■:% 
xxxxxx '^^ 

FEDERAL BUREAU OF INVESTIGATION 3 

■ . FCMPA -.--^ 

DELETED PAGE INFORMATION SHEET ( 

Page(s) withheld entirely at this location in the file. One or more of the following statements, where indicated, .Ji 
explain this deletion. "" V 

Deletions were made pursuant to the exemptions indicated below with no segregable material available for -*'S- 
release to you. ' '^ £. 



Section 552 




n (b)(1) 

l^(b)(2) 
□ (b)(3) 



a (b)(4) 
□ (b)(5) 
O (b)(6) 



D (b)(7)(A) 

□ (b)(7)(B), 

□ (b)(7)(C) 
n (b)(7)(D) 

^(b)a)(^ 

O (b)(7)(F) 

□ (b)(8) 
D (b)(9) 



Section 552a 


n 


(d)(5) 


□ 


a)(2) 


n 


(Ic)(l) 


D 


(k)(2) 


D 


(k)(3) 


n 


(k)(4) 


D 


(k)(5) 


□ 


(k)(6) 


n 


(kX7) 



□ Information pertained only to a third party with no reference to the subject of your request or the subject of your 
request is listed in the title only. , 

□ Documents originated with another Government agency(ies). These documents were referred to that agency(ies). 
for review and direct response to you. '-^ 

Pages contain information furnished by another Government agency(ics). You will be advised by the FBI as 

to the releasability of this information following our consultation with the other agency(ies). 

Page(s) withheld inasmuch as a final release determination has not been made. You will be advised as to thc..£;: 

■ disposition at a later date. ' \l^''> 

Pages were not considered for release as they are duplicative of ^ . 

Page(s) withheld for the following reason(s): -^ 




H The followingjnumbgr ijLto be used for reference regarding these pages: 



xxxxxx 
xxxxxx 
xxxxxx 



xxxxxxxxxxxxxxxx 

X Deleted Page(s) X 
X No Duplication Fee X 
X for diis page X 

XXXXXXXXXXXXXXXX 






FBI/DOJ- 




Sensitive 



Manual of Inveitigative Operations and Guidelines 
Part. II . .,,•■-■ '•■"U' ■. 



EFFECTIVE: 11/24/97 





•■" '■ ' ' r 


'■ ■ '■ J":';-.- ••%'*l?». 


* 


- ** ..-i ■ -: ' 


-n-^^^r^ 


, 


■ ; • , 


■'•'•■ r.-iifV:' 






...iV-'f'^.'i^V 

'■'9- 


PAGE 


16 - 149 


' ■"■^. 






' Pi 



16-18 



FBI MICROCOMPUTER POLICY 



EFFECTIVE: 02/16/89 





EFFECTIVE: 07/14/95 



16-18.2 Purpose and Objectives of Policy 



(1) The 
appropriate internal 
aanagenent and use o 
tnicrocomputer-proces 
this policy, is any 
intelligent workstat 
manufacturer that pr 
Implementing control 
the risk of illegal 
unauthorized use of 



purpose of this policy is to establish 
practices and procedures to ensure the proper 
f microcomputers and the accuracy of 
sed information. A microcomputer,' as defined for 
computer including the standard terminals, 
ions, and ail similar machines from any - , 
ovides local processing for an end-user. 

procedures unique to microcomputers should reduce 
system access, data loss and stolen or ,,,, ' "• 
hardware and software. '• -* ■;'• 



(2) The objective of this policy is to ensure that the 
management and use of microcomputer resources in the FBI are in 
compliance with regulations relevant to-^automation and information 



Sensitive 
PRINTED: 02/18/98 



,U- 



^'■M- 









. .'ST if 






-1 IV .^.. ,.r,;;.^(v' 




»s^ .■ 



Sensitive 



Kanuat of Investigative Operations and Guidelines 
Part .II -■"■•>"' .> 



PAGE 16 - 150 



management. 



''■■mi 
, ■i-m^T 



.:■:? 



EFFECTIVE: 03/23/92 




16-18.3 Scope and Applicability 
This policy applies to: 

(1) All elements of the FBI which process, store, or 
produc e information o n any m icroco mputer, inclu ding word processors 
with local storage or memory, 

(2) Microcomputers connected to FBI or public 
telecommunications networks, and 

(3) Microcomputers used in standalone mode. 



;. I EFFECTIVE: 03/23/92 



16-18.4 Responsibilities 

(1) The [Operations Management Section (OMS) , | Information 
Resources Division (IRD) , shall: 

(a) Provide hardware and software operational 
guidance and problem resolution; 



(b) Maintain I authorized 
an information clearinghouse for users; 



software listings! and act as 



. (c) Maintain a library of applications for 
dissemination to Computer Specialists | requesting assistance in 
a|particular|area; I 

(d) Communicate noteworthy developments and 
activities to users; '"- 

(e) Deleted ' '■ • 



■slit- 



'"■ w'i;:. 

. ..--W...- 
.■^-■ ■";*■ ■ 

M 



'.''sBi' 
■ ■■■fif 










(f) I Assist in the development, maintenance! and 
I dissemination of !microcomputer principles, standards and guidelines; 



Sensitive : 
PRINTED: 02/18/98 



■S'^'-Vf ■ 

'il-mt 

'•■'..■.,":■"■ 



■•'A-" 




'HP-r. 



: '"'''L- 



Sensitive 



Manual of Investigative Operations and Guidelines 

Part II-, ■-,.,;■ ;^;r--'""- •.•■,-..:' ■ ,••- , ■'•'''■ - " 



PAGE 16 - 151, 



(g) Deleted 



(h) Provide guidance on applicable federal, 
departmental and FBI information resource management laws, policies, 
principles, standards and guidelines; 



•-■.--■^fti.t 









■^m 








(i) Provide Computer Specialists guidance in 
determining the feasibility of using|either a] microcomputer 
|application or a mainframe application! for effective implementation of 
automated technology throughout the FBI; 

Cj) Coordinate _procurement_and. del ivery__of_har_dware_ 



and software; 

(k) Coordinate all | routine |microcomputer. maintenance 
activities, including routine requests for maintenance and maintenance 
contracts for seized and forfeited microcomputers; 

(1) Deleted 

t (m) Provide ADPT Service Support Center operations 
to handle all associated issues, problems and questions.] 

(2) The Assistant Directors (ADs) of each FBI 
Headquarters division and the Special Agents in Charge (SACs) of each 
field office must ensure effective, efficient and economical 
management and allocation of microcomputers as well as enforcement of 
microcomputer policy, principles, standards and guidelines prescribed 
by the Director. 



(3) Each FBI division, through the ComputerjSpecialist, 



shall: 



(a) Systematically maintain a current on-site, 
listing, in accordance with|FBl| inventory guidance, of its 
microcomputer hardware, software, and administrative or investigative 
data bases; (See MIOG, Part I, 190-2.3(3).) /' 

(b) Provide hardware and software operation guidance 
and problem resolution to end-users; 

(c) Communicate noteworthy developments and : 
activities to end-users; 

(d) Develop contingency plans (including emergency 
response, backup operations and recovery) that arc consistent with IRD 



-.rS^- 












-.-r/i-I^'j,— 

... .jjj^^y 

» ''■-M& 
-: lifeMt" ■ 

■imair.- 



-"•"1^':; 






Sensitive . 
PRINTED: 02/18/98 ^feJ'iv- •'^=s'i|.--.^'-'>^ 



,'!■<■;•- 



1 






, ■■■'V ^ ^ ' •'/vV''"--' ■■■',;i;i';4 
.:':'" .'■'' ■ ■ ' - ■■■''■■■-&*!:<■ 




Sensitive 



■t^-' 



PAGE 16 - 152 




Manual of Investigative Operations and Guidelines 

ADPT facility contingency plans to ensure continued operation of * 
essential functions within the division in the event that data 
processing support is interrupted; ■>!', 

(e) Maintain and disseminate to end-users , \^\ 

microcomputer policy, principles, standards and guidelines provided by^, 

|ird; ; . ' . / ^ ' '^ 

(f) Perform preventive maintenance as necessary on 
Information Technology microcomputer equipment.] 



(4) End-users _must ensure that; 



(a) All microcomputer data files are accurate, 
complete and reliable; 

(b) All microcomputer data files are secured 
consistent with central records system procedures; 



(c) Planned backup and recovery procedures are 



t executed; and, 



1 



(d) All other applicable rules, regulations, 
policies and procedures are followed. 

1 (e) Perform preventive maintenance as necessary on 
Information Technology microcomputer equipment (cleaning). j 

(5) The Property Procurement and Management Section of 
the Finance Division shall submit annual inventory reports of 
microcomputer hardware to each Computer Specialist so that these 
inventories can be verified. (See MIOG, Part II, 16-18.9.). 



EFFECTIVE: 08/04/97 






• - ■■•■■0m 

■ ■ V -i..!* rf,'* 

■ ■ ■ • r^i^S 



1 ^i 



m 



:''^Mm 



Am 






■m 






■■-■4-^ 




Sensitive"'' 
PRINTED: 02/18/98 









.^^M: 






.^^3^«:- 






as* 






'-yww- 



3J. 





Sensitive 



Manual of Investigative Operations and Guidelines 
Part II. ■ ^r>X.' -'.S^i^'' ., ^,:-'' '■'. ...ir'-^i- :■ ' ' 



PAGE 16 - 153 



EFFECTIVE: 09/16/93 



16-18.5.1 Deleted 



EFFECTIVE: 07/26/95 



16-18.5.2 Deleted 



EFFECTIVE: 07/26/95 



■ ^Sf ■ 
'.■■.'•.■PS 




■^ 
■ '>^/' 

".V^'.i'- 
■#rW- 

■>■• ;*ips- 



16-18.5.3 JDeleted] 



EFFECTIVE: 07/26/95 



•^M 



-if 




16-18. 5. A Deleted 



Sensitive 
PRINTED: 02/18/98 



"•■j-V., 







Sensitive 



Manual of Investigative Operations and Guidelines 
Part II . ■ •," ■ ■ , ^■ 



EFFECTIVE: 03/23/92 
16^18.5.5 Deleted 
EFFECTIVE: 03/23/92 



PAGE 16 - 15A 



16-18.6 



Information Management 



...Ev*..i.-«S>^ 



-^ 41: 

■■■■^■ 



I 



EFFECTIVE: 03/23/92 



16-18.6.1 Source of Data 



Any information subject to the provisions of the Privacy 
Act that is processed by or stored in microcomputers must be traceable 
to documents serialized in Bureau files (the FBI's Central Records 
System) or in other established FBI systems of records. 



EFFECTIVE: 03/23/92 



1 16-18. 6. 2| Access Controls 

Access to automated records | is | restricted] to |a 
need-to-know basis [consistent with existing controls afforded 
counterpart manual records.] 



EFFECTIVE: 02/16/89 



■ m' 

• 'if 
■ -"^ 

m 
'■-If- 

- ^w- 







Sensitive - ' * 
PRINTED: 02/18/98. 






^'i-X:!^: 






^ 




a 






Sensitive 



Manual of Investigative Operations and Guidelines 

Part'.ii^ ■■: :...■■. .,:%•■ r'- • - ■"■. :'•'■"■ ■'■ 

16-18.6.3 Retention/Destruction o£ [Electronic Information! 



PAGE ,16 - 155 



I (1) At the conclusion of an investigation, the data need 
not be retained in electronic format. However, if paper output from 
the data base was. required by the substantive supervisor or the 
prosecuting attorney, or was introduced as evidehce in a courtroom, 
that output must be serialized in the FBI file and the data in .' 
electronic format must be retained. 

(2) Electronic media to be retained must be stored as a 
serial, lA or IB exhibit. The media must be labeled with the 
_£ollowing_information_in._the_!!Content!!_and_"CommentslL_sections_of,_the^ 
Data Descriptor Label (SF-711): 

(a) Description of the microcomputer being used 
(e.g., standard terminal, intelligent workstation, etc.); 

(b) Identity of the operating .system (e.g., CTOS, 
BIOS, MS-DOS, 0S2, etc.) and its release number; 

(c) Application and release used to create the 
original data base (e.g., RBase, Multiplan, Lotus 123, etc.); and 



(d) Archived data base name and, where applicable, 



password. 



EFFECTIVE: 02/16/89 



16-18.7 



Requests for Microcomputer Resources 



Generally, FBI Headquarters will acquire microcomputers 
and related resources, including software, peripheral devices, initial 
training and maintenance contracts, through large-volume procurements 
as a cost containment measure. Priority, of need will dictate 
microcomputer distribution to field offices by FBI Headquarters and 
the application of microcomputer resources within each field division. 
Microcomputers used as part of a "front" operation of undercover or 
special operations activities will be :'■■• 

approved by either the Criminal Investigative Division orJNational 
Security JDivision with procurement assistance and funding provided by 
llRD. I 



•'-'; •■..i-t»? ■ 

■ ■ ;j;ss-«.i;»r;. 

'■-'' ' •' . 

■ ■-^^SSiii 

... J^s*-i 



■"■S'fM 

■"^^^ 

■ --.^^^ 

■■>"-'■ 

, ;.-*■■«/ 







Sensitive 
PRINTED: 02/18/98 



■-.■'MM'' . 







Sensitive 



Manual of Investigative Operations and Guidelines 
Part II • ■',- . -.. ■-;■.. ■ - v:;. \,; ~- ' .-;,,; 



PAGE 16 - 156 



■ 'W 

■ v'^ 

■-mi. 

- ■ •- i-yi^ 



EFFECTIVE; 07/14/95 



■&?• 



16-18,7.1 Deleted 



EFFECTIVE: 02/16/89 






16-18.7.2 Deleted 



EFFECTIVE: 02/16/89 



0^ 







4 



16-18.7.3 Deleted 



EFFECTIVE: 02/16/89 



16-18.7.4 Deleted 












EFFECTIVE: 02/16/89 



I 16-18.8 ISecurity - See MIOG, Part II, Section 35. | 



'.-iXJ.-. 

-.•■«»■;■ 
■A 



EFFECTIVE: 07/26/95 






I 16-18.8.1 JDeletedj 







Sensitive 
PRINTED: 02/18/98 



•A :.■■ • 






'- ■ ■4-:f. 




Sensitive 



Manual o£ Investigative Operations and Guidelines 



EFFECTIVE: 07/26/95 



PAGE 16 - 157 



>?^>&'^-; 



., -.^,i. ...s:^,.. 










16-18.8.2 Deleted 



EFFECTIVE: 07/26/95 







j 16-18.8,3 |Deleted| 



EFFECTIVE: 07/26/95 



16-18.8.4 Deleted 



EFFECTIVE: 07/26/95 



16-18.8.5 [Deleted 



EFFECTIVE: 07/26/95 



16-18.8.6 Deleted 










i^^W^ 



Sensitive ' ' 
PRINTED: 02/18/98. 






-.xi:<j:jr.. 






■ -■'■ ■ -i-..*' ^•s:--.^*:-. -'■-^c^*'^ .'>>>i^Ay-j?4Jr'' 



: :,-i'n ■'■'■^^ 







Sensitive 



Manual o£ Investigative Operations and Guidelines 



EFFECTIVE: 07/26/95 



16-18.8.7 JDeletedi 



EFFECTIVE: 07/26/95 



PAGE, 16 - 158 j 



J 












'-^ 

■■4M' 
4m' 







16-18.8.8 Deleted 



i EFFECTIVE: 07/26/95 












16-18.8.9 Deleted 










EFFECTIVE: 07/26/95 



16-18.8.10 Deleted 



EFFECTIVE: 07/26/95 



16-18.8.11 



Deleted 












Sensitive 
PRINTED: 02/18/98 



^^■■'v;;^r«ikJ;r'v' 



*,:^ ,'i,-^V^Krt^, 




Sensitive 



Manual of Investigative Operations and Guidelines 

Part II ^'-^"" ■■•w.-'""''"^': >:?■■"•"■■■" ■. ..■-•■ 



EFFECTIVE: 07/26/95 



■ ■ ,^'i' ■' 


■ ■•■ • ■ 






,. 




PAGE 16 


- 159 . 




■ 


in* - . 


■■,&,«!$■ 






■* 



16-18.8.12 



Deleted 



■■V^y 






EFFECTIVE: 07/26/95 



■■■■ ■;«,■ 



16-18.8.13 



Deleted 



Mi- 





EFFECTIVE: 07/26/95 



16-18.9 Reporting Requirements (See MIOG, Part II, 16-18V4(5) and 
35-9.4.7.) ' 

(1) ^Computer Specialists (OS) in conjunction with the 
Supply Technician will maintain current inventories of hardware on the 
FBI's Property Management System. On an annual basis, the Property 
Procurement and Management Section of the Finance Division will submit 
an inventory of microcomputer hardware to each CS for verification. 
Any discrepancies in the report must be rectified immediately. 
Inventory information will include the following: 

(a) Hardware: ^. 

Division 

Equipment type 

Equipment profile (for example. Model Number) 

Hard disk type 

floppy disk type ■ ,. 

Monitor type, including TEMPEST/non- TEMPEST . '.' 

designation ■'. 

Location (Squad/Unit) "^ 

Function (e.g., rotor, squad secretary) 
Other 

(b) Deleted 



M 

■'■-rmk. 

•# 

'-A'if}'- 



\\ '■''■■ 

■ la* 












-V 



Sensitive 
PRINTED: 02/18/98 



^/^s--'"a- 












;;i., /■'' ^ :. :!.__, ,r . 







Sensitive 



Manual of Investigative Operations and Guidelines 
Part II- ." .:J/' :' ■■.\--- „• ■ . -; .,■ ^:,: , ;••■.... 



(2) Deleted 

(3) Deleted 

(4) Deleted 
(5) I Deleted I 



■ ■■■■■'.'■^si"4's 



PAGE 16 -,160- 






EFFECTIVE : 09/22/97 







1 16-18. 10 Automation Training Staff 

(1) The Automation Training Staff, from the Service 
Support & Implementation Unit, SSIU, provides instructor-based 
training in classroom settings on PC-based applications and 
investigative/administrative applications to field, FBIHQ and Legat 
personnel. The staff administers training through the use of 
interactive video (IVD) , computer-based training (CBT) , compact disc 
(CD-ROM) and/or video methods. 

(2) The staff researches training techniques and new 
technologies of data communications and microcomputers. It provides 
assistance and support to automation personnel in problem resolution. 
The staff works with applications program managers, computer clients, 
project teams and appropriate division personnel in the development 
and delivery of training. | 



EFFECTIVE: 07/26/95 



■ ^s^ 







Sensitive ^' 
PRINTED: 02/18/98 






■ ii--^.':Jj;; 



::i!^it:y^:iiy:a 







Sensitive 



Manual of Investigative Operations and Guidelines 
Part. II 



<V • ■ 



':^■!fi, 



PAGE 16 - 161 



16-18.11 IComputer- Specialist Selection Process 

(1) - Computer Specialists conduct programming tasks to 
support the creation, maintenance, and analysis of information files 
and the communication of data in a fourth-generation distributed 
environment. 

(2) Entrance salaries range from GS-5 through GS-13 at 
FBIKQ and range from GS-5 through GS-12 in a field office. Hiring 
may occur at FBIHQ or a field office. The basic salary is 
commensurate with the applica.nt*s education and exper ience. 



■ ■ ■ :;Sv# 

<is>~ ^ 

•- :■ ..„.-rt.J , 






■it 



' .•■'.■I'Sia!- 






EFFECTIVE: 12/13/96 







16-18.11.1 Computer Specialist Eligibility Requirements 

(1) Be a United States citizen. 

(2) Be a high school graduate or its equivalent and have 
additional education as set forth below. 

(3) Pass a rigorous background investigation including 
drug and polygraph tests. 



.,ism. 



•^ 



EFFECTIVE: 12/13/96 



I 16-18.11.2 Computer Specialist Qualifications 

(1) GS-5: Must have a Bachelor's Degree or three years . 
of general experience, one year of which is equivalent to at least 
. the GS-4 in the federal government. General experience is that which, 
provided basic knowledge of data processing functions and general 
management principles that enabled an understanding of the stages ' t 
required to automate a work process. Experience may have been gained 
in positions such as a computer operator or assistant, computer sales 
representative, program analyst, or other position that required the 
use or adaptation of computer programs and systems. 



Sensitive 
PRINTED: 02/18/98 



■ J iHf ■ 









■Mi 



•.•"^■■fl-^iS^T-Si.'A- 
■'"-7'.i'£-"«--i", 










'Vr>fi---''*^ 



■;' '■ '■ *'ii--f*- ' -jt-;- ■■■■' 






','!: 



Sensitive 






Manual of Investigative Operations and Guidelines 



s;-- . PAGE ,16 - 162 



(2) GS-7: . Must have one full year of graduate level 
education of cumulative grade point average of 3.0 or higher or one 
year of specialized experience equivalent to at least the '•' 
GS-5 in the federal government. Specialized experience is that which 
includes the performance of tasks such as: ■' ' < ' 

(a) translating detailed logical steps developed by 
others into language codes; 

(b) conducting user-requirements analysis and 
synthesizing the resul t s into information flowcharts ; . 



(c) troubleshooting, in particular during 
unscheduled halts; 



■mm 

•■■■ ,?;■. :.fVi,g}S|-: 




'"•.■'■*i%^^ 
■ ■ V^ki 

■ ■■•#; 

... S:.'ihu 






efficiency; and 



(d) prioritizing processes for production 



(e) organizing documentation for cost/benefit 



studies. 



(3) GS-9: Must have two full years of progressively 
higher level graduate education or a Master's Degree or equivalent 
graduate degree or one year of specialized experience equivalent to 
at least the GS-7 in the federal government. Specialized experience 
is that which demonstrates knowledge of computer requirements and 
techniques in carrying out multitask project assignments typical of 
minor system modifications. Such assignments must demonstrate 
ability in analysis of: 



project; and 



project. 



(a) interfunctioning system components; 

(b) planning the sequence of actions to complete the 

(c) leadership in at least a segment of the, overall 



(4) GS-11: Must have three years of progressively higher,, 
level graduate education or a Ph.D. or equivalent, doctoral degree br-- 
one year of specialized experience^ equivalent to at least the GS-9 in:^ 
the federal government. Specialized experience is that which > , 
demonstrates successful accomplishment of projects involving a range:;. 
of requirements and techniques as well as those of computer specialty 
areas. In addition to those noted for the GS-9 level, assignments 



^>2S^fe:jv-^'', 



• '.'S?S5 












^s^m 









:'-!M^^h:\, 




PRINTED: 02/18/98,, ., I ..,>.,;.•..... ^■^. j... .;., 













'j- :■^^t^. -.i'v 



" ^ .W. ♦iit!*-. 



Sensitive 



Manual of Investigative Operations and Guidelines 

Fart II ^tfij,^j.l^,->i/>,,->.*.- >^.,,''s,,,-ffej,Cf,'".-,',„;;> , . . ...(-,, . ,, f 















'V "-■• 



<•%*;<• 



,, .PAGE: 16 - 163^; 






.'■■' '.#<^';v® 



r must- have been involved in:" 



J,^i^4it^ 



.■-»#■- 

,>^> 



'^•. ■ (a) planning the sequence of actions to complete the;l:. 

project in codrdination with outside organizational units; and .. -' 



■.■'■T5'<^'f 



guidelines.- 



(b) the development of project controls and 



(5) GS-12 and above: Must have experience that 
demonstrates accomplishment of major project assignments that 
required a wide range of knowledge- of requirements and techniques. 
_Such_assignments_include_.those involving; 









approaches; and 



(a) the analysis of a number of alternative 




(b) advising management regarding major aspects of 
ADP system design such as what system interrelationships, operating 
modes, software, and/or equipment configuration will be required or 
affected during project builds or enhancements. t 

(6) If substituting education for experience, major study 
must be in any of these disciplines: Computer Science, Information 
Science, Management Information Systems, Mathematics, Statistics, 
Operations Research, or Engineering, or course work that required the 
development or adaptation of computer programs and systems and 
provided knowledge equivalent to a major in the computer field. 



EFFECTIVE: 12/13/96 



16-18.11.3 



Computer Specialist Promotions 



A career path for the Computer Specialists has been ^._ ,.; 
established at" the GS-5 through GS-13 level at FBIHQ and, ' 
GS-5 through GS-12 level in the field offices. In order to qualify 
for the next grade level the employee must meet the following 
requirements: ■"'" ■" ■".•';•.■, •f''-./' '' ? '' .. ,"', * ', ""'■•"''.' 

(1) specified technical experience; 

(2) specified training; . 



< ... .- ■ - ' ;' Sensitive^'--., '''' 
., , PRINTED: 02/18/98 

-.Skip- ". .t!f::j;- ■■-■.'■,.. ,^ . •. ■ ■. ■u■^ ■'.■"'!':>"* 






t.-.v,.-iiy;,»ij(:^' 



^-■'ii®? 



,■■■-.. ^-s^-m^. 






'■•**..■ "i'%W 



■ t; 



■1. ^^•^^'^'^isi'v'j^f'**^ 



iS.^^Jm 



v.tr 






' '. '- 


" . ■ '''^A''-' ,.:5':- 


:#J^-;^ 




';■"*■.;•"'■'' 


■■^«'--:!-:-''"""':"^' ,.. . -i^;»^:.ai^i:- ^ 


'-';"'. ■' 




. u 


-"■ I'-i ••.'•:..>■ 1- ■ ■.■•*.-,•''•_ ■:- 






J- 


■ ■ ■ vV";-:^:?!-'' ":'"' 




.....■>: ^,v.ii«/- ■-};;,'i.,'-,:,'-<k. . 




k "^^ '^■'-■.•;'r''^'f'^m^r^i 




) "^- ■;-■•*■;;:;■ -^f ;•.■■; 






;. 


^ ..:;,...-,-'^^^#r?^-', ■.., 






Sensitive 



Manual of Investigative Operations and Guidelines' 
I (3) ^ specif ied performance "rating; ""' 



.■ ■■'•;4^^^S' 



/'N-V!?!;;^ 



sy^:»^--; ■■■ PAGE 16'~- 16^j^ 



.■".''"'■.. ;■ (A) maintain the appropriate level of vorii.inz'-^'''^fP'i'''^:^v'<''W^-^'- 4Vr*''^^37S''M^& 
proficiency in specific applications; q;;-^"' ;■; ■' ■''\\^/^-'' ■• ■■^^■'l^;'^:''^ •;C;V'^^5-''^-^ 



(5) have a favorable recomnendation of inunediate 
supervisor; and " 

(6) approval from the Program Manager (PM) of the 
Computer Specialists Management Program (CSMP) . The Personnel 
Division's Staffing Unit will not take action on a request for 
promoti on wi tho ut the approva l_o f_t he_PM . -■ 



- "••■•##1« 

"■■■^■'■iKit'ft. 









EFFECTIVE: 12/13/96 






16-18.11.4 



Computer Specialist Career Board Selections 



The FM of the CSMP must be notified of all career board 
selections. At the conclusion of the career board, the PM must 
receive all related documentation before approval will be granted. 



EFFECTIVE: 12/13/96 






. ■"■tLavS.; 












16-18.11.5 



Computer Specialist Reassignments 



The PM must give approval before an employee is reassigned, 
into or out of the CS position. "•-' , 



EFFECTIVE: 12/13/96 









•■w 






fcil^ 



Sensitive 
PRINTED; 02/liB/98 



.4=*i.=^<i- 


rK- •'?'■; 


,-y . 


*--' ; 






•>' '"^ ■'- 1 


U,*--: 










..- 


-■■ ■!>■;- 


•■#TS';^- 












NTED; 02/18/98".;.-^., ., , : . .rf^i^^^lfe^^v^.; ';■£:': , ^-.„ -^iJ^^Sf 



ri.,.../; 











Sensitive 






■*'.ir ■ 



■:,■> 



Hanual of Investigative Operations and Guidelines 

rarCXi.! ;»■■;/.,•■,■ .-•, :-..?,.a.v w .■ -i^-i.^' -ir'-*:"'--: ' ■'(-■■'■',i.>-sj>it-i.' .- ■ r->. ■;-*■• -,•■;•''•!■■, 



PAGE: 



. s.f&iY-\ 






.16.- 165 






16-18.11.6 Computer Specialist Internal/External Postings? 



"m- 




The PM is to 
prior to occurrence. I 



EFFECTIVE: 12/13/96 



be notified of all internal/external postings 



116-19 



DATA CIRCUIT TECHNICAL SUPPORT AND TEST EQ UIPMENT 
MAINTENANCE POLICY 









EFFECTIVE: 05/26/89 



16-19.1 



Technical Support Policy 





(1) The communications circuits supporting the] Integrated 
Digital Communications System (IDCS) jand Secure Automated Message 
Network (SAMNET) systems are designed to conserve line costs, while 
providing reliable service. Certain field offices (FOs) have been 
established as SAMNET nodes orllDCS|hubs and are responsible for 
maintaining teletype and data circuits for many other FOs, by 
functioning normally as unattended relay points. Other FOs, although 
on a smaller scale, function as relay points for the j IDCS | by linking 
resident agencies (RAs) and/or off-sites to the major hubs within the 
network. 

(2) The Telecommunications Manager or Supervisory ^.h 
Electronics Technician (SET) in each FO is responsible for providing ., 
prompt technical support for these systems, 'r ^^ ''■':' ; •. • vj -. 

(3) Offices providing communications support for other', 
offices must have a qualified ET available for immediate circuit , ;■ 
restoration assistance during normal work hours.' "^i' " . -j;'!;.:, • 

(4) 'During off-duty hours, weekends and holidays, a. ^ ,^- 
qualified ET must be on call and available" to assist with circuit;" ^J^^^^^^^^^^ 
restoration. On-site response should be within one hour after1'-'>'-y^'^^ — 
notification or as soon as possible considering travel conditions at 
the specific office. .. , 

(5) Exceptions to the above may be granted by FBIHQ on a 



-*m^~ 



■^■cm 






^i^J'^M^ 



Sensitive . 
PRINTED: 02/18/98 



,. ' -.1 ..^-^LrJi'Si. 



''^f*-(Sii^^JM 









^ 



-l'.T-,-?'i0fc5lV)--> 














Sensitive 



Manual of Investigative Operations and Guidelines 
■ Part:il;.i:'- ' ' '" " " "" 






-i^^*-^v;-- ^«f:' -rt.'. •• , ^-. -;;.-• vv.r -f-:.:.-:;:';- ;,/;i: ; page : 16 ■■- 166 ^-x-'-'^-^imi 

aasis; 'Request "for'^^xceptions, should be directed" to';pr7^'^V'^ '.vv*-- •■"" ^f^ 



case-by-case basi.-. ---, — . 

FBIHQ, Attention: Operations Management Section, Room 6421. 



EFFECTIVE: 04/28/9A 



16-19.2 Test Equipment Maintenance Policy 

(1) CMs/SETs are responsible to ensure that all test 
Jcquipment_as3PciatH_^j.^•^„'^"^a_-gj■'^c"^t maintenance, assigned to their 



'SJliy 



• ■ •: :»: 



office, is in proper working order. 

(2) Any test equipment that develops operational problems 
or is subject to routine periodic maintenance/calibration must be 
scheduled for maintenance/calibration promptly. 



EFFECTIVE: 05/26/89 



I 16-19.3 Response to FBIHQ Communications 

(1) FBIHQ aperiodically issues communications directing 
maintenance procedures or data equipment/data test equipment that, 
require technical action and/or formal response. , 

(2) CMs/SETs must respond promptly to any FBIHQ 
inquiries, directives or surveys to ensure proper maintenance of both 
data equipment /data test equipment and maximum usage of 
maintenance/repair contracts. Formal response must be provided when. . 
requested. I 






. ..^ 












EFFECTIVE: 05/26/89 



'"'^r;-:'' 









'"u^r^'.V 



' ■' '? 










Sensitive -;- .. 
PRINTED: 02/18/98 



•-ii. 



' ^-'^i-f 



:l;l^K-.; 









.■ -■ ■ > 











,..'i^H. 


V m" 




,>,, ; 






.',^ 


',^ ' 


-ts.;.,<^ 




Ha- • ■■:: 




■'■>' 


li"? 




■,:>■-;• 

•v:f,<.- 




m^ 




^ 




li*^ 


.^^ 










■-r.;^.;.'.. 






< 



■ r ii,;^i=-;:->*f, /',■ 









■^m 



^ V^i^-H.i'-X'^'^? 






■'Mi 



.)-.'■•' '">. Sensitive/ 

Manual of Investigative Operations and Guidelines 
Part II 



■^t 



'■ '■' '^^"ifil;^;*-! V«fe/ ■■ 

PAGE' 17 :r', 



-■■ -H.'V 



SECTION 17. "^"' APPLICANT AND EMPLOYEE INVESTIGATIONS CONDUCTED)ir>'V 
FOR OTHER GOVERNMENT AGENCIES - GENERAL INSTRUCTIONS 



... ,l,,.,.^..,„t..>;. 



».fi;^^f«';«V:i 



• ■ v■>.^■•j;*-,''.l?^■?i•5ti&4l« 

1 ■■';. IV^.^S^M' 






6'^5-''T 






17-1 



AUTHORITY., 



(1) Executive Order 10A50, which was promulgated in 1953^^, 
, makes appointment to positions in the Executive Branch subject to a 'f- 
background investigation. The Office of Personnel Management has the^^^ 
primary responsibility to investigate persons being employed in the ' ■ * 
competitive service and has permitted other Federal agencies with 
investigative resources to conduct background inquiries. 



(2) Even prior to this Executive Order, however, the FBI 
had been conducting background investigations for other agencies as 
well as for itself. At present, various statutes. Executive Orders, 
Departmental Orders, and agreements between the Attorney General and 
other Federal entities provide a basis for the FBI's role in this 
area. If specific information is desired concerning the authority for 
the FBI to conduct any investigation, contact FBIHQ for detailed 
information. 



EFFECTIVE: 12/10/91 




X-Sf®- 



ii-?l, 



■^m. 









17-2 , CLASSIFICATIONS OF INVESTIGATIONS (See MIOG, 

Introduction, 2-2.2; Part I, 77-1.1 through 77-1.13, 
77-4.3, 77-A.ll, 140-3, 161-4, 161-5. 161-9; MAOP, Part 
II, 3-1.1, 3-1.2, 10-23; & Correspondence Guide-Field, 
1-17.) - ' ■ .. 

Requests for an FBI investigation are made in writing by 
another federal entity. These requests are assigned to a 
classification which, in general, corresponds to the source of the " 
request. The following classifications are currently in use; 



Office 



(1) 73 - Background Investigation - Pardon Attorney's, j; 



(2)= 77,, 
(a) 






Ilk - Background Investigation - -^ ' ' ' -y /:^-i'- ^ 
Presidential Appointment with Senate 



Sensitive - 
PRINTED: 02/18/98 



•V^l^ 



■ • .sii^: .?!t,s,- .■,^^'■^^■i' 







Sensitive 



Manual of Investigative Operations and Guidelines 
Part II 









PAGE 17 - 



Confirmation - Nonreimbursable 

(b) 77B - Background Investigation - 

U.S. Courts - 15 Year - Reimbursable 

(c) 77C - Background Investigation - 

U.S. Courts - 10 Year - Reimbursable 

(d) Deleted 

(e) 77E - Background Investigation - 
...Department_of_Ju.st_iAt.^^ 



(f) 77F - Background Investigation - 

U.S. Attorney's Office (Staff) - 
Reimbursable 



;«?• 



(g) |Deleted| 

(h) 77H - Background Investigation - 

U.S. Attorney's Office (Attorney) - 
Reimbursable 



(i) 771 - Background Investigation - 

Department of Justice - Reimbursable 

(j) 77J - Background Reinvestigation - 

Department of Justice - 10 Year - 
Reimbursable ^ 

(k) 77K - Background Reinvestigation - Department of 
Justice - 7 Year - Reimbursable 

(1) 77L - Background Reinvestigation - Department of 
Justice - 5 Year - Reimbursable 

(m) 77M - Background Reinvestigation - Department of 
Justice - 3 Year - Reimbursable 




(3) 116A - Department of Energy - Applicant 
116B - Department of Energy - Five- Year 

Reinvestigation 
116C - Nuclear Regulatory Commission - Applicant 
116D - Nuclear Regulatory Commission - Five-Year 

Reinvestigation 



Sensitive 
PRINTED: 02/18/98 




Sensitive 



Manual of Investigative Operations and Guidelines 
Part II ■■ 

(4) 140A - Office of Personnel Management 
140B - Office of Personnel Management 
140C - Office of Personnel Management 



PAGE 17 - 




Referral 

Employees 

Other 



(5) 161A - Level 1-Presidential Appointment 

Level I-Presidential Appointment, Senate 
Confirmation 

161B - Level Il-Presidential Appointment, Senate 
Confirmation (Non-White House) 

161C - Level Ill-Presidential Appointment 



Level Ill-Presidential Appointment, Senate 
Confirmation 

161D - Level I-White House Staff 

161E - Level Il-White House Staff 
Level ll-White House Access 
Level II-National Security Council 

161F - Level Il-White House Staff 
(Five-Year Reinvestigation) 
Level Il-White House Access 
(Five-Year Reinvestigation) 

Level II-National Security Council (Five-Year 
Reinvestigation) 

161G - Level Ill-White House Staff 
Level Ill-White House Access 

161H - Level Ill-White House Staff (Five-Year 
Reinvestigation) 
Level Ill-White House Access 
(Five-Year Reinvestigation) 

1611 - Level Ill-Congressional Committee • 

161J - Level Ill-Congressional Committee (Five-Year 
Reinvestigation) 

161K - Expanded Name Check 

161L - Level Il-Presidential Appointment 

Level Il-Presidential Appointment, Senate 
Confirmation (White House) 






w 



'.,,-•. 



Sensitive 
PRINTED: 02/18/98 



..rfs 




Sensitive 



Manual of Investigative Operations and Guidelines 
Part II 



PAGE 17 - 



■.:i 



(6) 259A - Security Clearance Investigations - Classified 
Information Procedures Act (CIPA) 
259B - Security Clearance Investigations - Foreign 

Intelligence Surveillance Act (FISA) \ 
259C - Security Clearance Investigations - Joint Task 

Forces (JTF) 
259D - Security Clearance Investigations - Others 
|259E - Security Clearance Investigations - Periodic 
Reinvestigations/Security Clearances I 

(See MIOG, Part I, 259-2, 259-3, 259-4, 259-6, 
I 259-7. and 259-8.) I 



(7) 260A - Industrial Security Program - Personnel 
Clearance 
260E - Industrial Security Program - Personnel 

Clearance Reinvestigations (See MIOG, Part I, 
260-1(2), 260-5.1, 260-5.2.) 

Any questions involving 259 and 260 classifications should 
be directed to the Security Programs Manager (SPM) , National Security 
Division. 



4;. ■a , 
""■•.'■^i^3''«£.' 






s^i: 




EFFECTIVE: 01/03/97 

17-2.1 TURK Classifications (See MIOG, Part I, 77-1.2, 77-1.3, 
77-1.6, 77-1.8, 77-1.9, 77-1.10, 77-1.11, 77-1.12, 
77-1.13, 77-4.3, 77-4.11; MAOP, Part II, 10-23.) 

For TURK purposes, these classifications are separated 
into reimbursable and nonreimbursable investigations. Reimbursable 
matters are billed to other agencies at a predetermined rate per 
investigative request, andthese funds provide the FBI with the 
resources with which to address these inquiries. Nonreimbursable 
matters are funded in the FBI's budget. Where it is possible to have 
both reimbursable and nonreimbursable requests in one classification, 
alpha designators have been applied. As a general rule, cases 
received from the Administrative Office of the U.S. Courts |(77B and 
77C),|the Department of Energy (116A and 116B), Nuclear Regulatory 
Commission (116C and 116D), Department of Justice (77F, 77H, 771, 77J, 
77K, 77L and 77M) , Office of Personnel Management (140B) , and White 
House (161B) are reimbursable. 



^W 



■:mr 



Sensitive 
PRINTED: 02/18/98 







Sensitive 



Manual of Investigative Operations and Guideli 
Part II . 



nes 



PAGE 17 - 



•^.^•^ 



^-:fiii- 






EFFECTIVE: 12/20/96 



17-2.2 



Applicability of this Section's Instructions 



annl,>.M / fi « i!" Provides instructions and guidance which are 
applxcable to all of the above classifications. Specific requirements 
whxch are unique to individual classifications are set forth in Part I 
ot this manual under the appropriate classification. 



EFFECTIVE: 12/10/91 



17-3 



ADMINISTRATIVE PROCEDURES 




EFFECTIVE: 12/10/91 



17-3.1 



Initiation of Investigation 



h PI.TT,/^ ^Investigative requests are received from client agencies 
at FBIHQ and are initiated by teletype, [electronic communication, lor 
facsimile transmission depending upon the urgency associated with the 
request. Personal history data and release forms as received at FBIHO 
are forwarded to the field if necessary. Files at FBIHQ will be 
reviewed, including records of the | Criminal Justice Information 
Services jDivision, and pertinent information will be forwarded to the 
field for investigative purposes, or for inclusion in the report. 



EFFECTIVE: 04/08/96 



Sensitive 
PRINTED: 02/18/98 



■vlfe" 




Sensitive 



Manual of Investigative Operations and Guidelines 
fart II .■■''•. . 



PAGE 17 - 



17-3.2 



Initial Interview of Applicant 



,-nr-„h-. An interview of applicant should be conducted at the 
inception of the investigation (see Part II. Section 17-5 6 of this 
manual, for additional instructions concern ng this inter^L) T^l 

conil%%T""f '""'"' "^''^^"" ^"^/- employment ^iU normal ly 
conduct the interview and should promptly set out leads for any 
add tional investigation needed a* a result of the interview where 
de^lgn'^U TftilTlT^'': are split between field division: r^PBllSwU 
If a s^bstant^? d^ . ' mtervxew in the opening comunication. 
arranzinffor tL ■ f'' " «n<=?"ntered in contacting the applicant or 

ISoor i!ti f7 "-'"^^^^^^^^^ «» that an 
appropriate course of action can be considered. — — 









EFFECTIVE: 02/12/92 



17-3,3 



Assignment of Cases 



'^' ■ J. . . ^^^^^ matters must be searched, opened, and assigned 
immediately. Investigation is to commence Immediat;iy? ""«"^'^ 

EFFECTIVE: 02/12/92 



17-3.4 



Indices Searches 




azainst th. rlLZl^ * ^"^^ """^ ^^^^ ^""^^^^ ^'^^ searched only 
against the candidate's name and the names of all close relatives 
The name of the candidate and, in presidential appointment cases the 
names of all close relatives (except deceased reiaUves) are als^ 
searched through the|Criminal Law Enforcement Appl ^at on (CLeI) I 

C^nt rlJciC) ""f '°:^ IV'^'' ^"'^' ^^^ '^^'^'-^ '-'- Inform; ion 
Center (NCIC) records at FBIHQ. Circumstances may indicate necessitv 
to also search general indices against the names of other persons "^ 
businesses or organizations with which the candidate has had co^Uct 
or association (i.e.. cohabitants, foreign nationals. eU.) 

advise FBIHO^of tlV^r ^'ll^ °^f'" """"^ ""^^ ' ""^"1 "»«h. and 
advise FBIHQ of the results, of its general and any other special is^ed 

■T/t"l (««Pt confidential and ELSUR) . concerning ^hebeto^HsUd 

s^^a;:;';)'!'^'"'''''" ^^-^^^^-^-^ -«* ^^sur indices need::;tje 



Sensitive 
PRINTED: 02/18/98 



^1^ 



■m.. 




Sensitive 



Manual of Investigative Operations and Guideli 



Part II 



nes 



PAGE 17 



^®^ Candidate - offices covering olaces nf 
residence, employment, or education; "ing places of 

(b) Close relatives (see 17-6.9 for identif ieaf.'nn 



of persons 


office ter 


residence; 



(c) Cohabitants - offi 



ce covering current place of 









■>•'. *1 



„<:-.. . ,^ ^5^ Businesses or associations located in field 

tntlresrffTf^^i^t"'^^^ 
xnterest or is an officer; ■ 



1. - ^®^ Others - circumstances may indicate nece?Ri-h« ^« 



n. • .. ^'^] ^y variations or additional names develoued diirin.r 
the investigation should be checked. The search should include all* 
fTZ ";'-'r "^^^^^"' ^-<^^ « "-den name of a spoise Idv s^ 
the L^nfiJv f"'"*" f'''' °' additional names de?elop;d tnc ^ding 
the Identity of any close relatives whose names were not avaiUMe ft 

nalr'f'' r.°' '""^ investigation. It is not necessary to search 
names of relatives under 15 years of age. searcn 

whVh • -^ ^J^,/""^ "'^''"^^ ^« advised of any information located 






^•-. 



(5) Deleted 



•lir. 




EFFECTIVE: 11/25/94 



Sensitive 
PRINTED: 02/18/98 







I 



Sensitive 



Parril"^' Investigative Operations and Guidelines 



PAGE 17 



I 17-3.5 Deadlines | (See MIOG, Part I, 73-10, 116-6(2), 161-5.) ( 

has a d^.J^l '^^""^ background investigation conducted by the FBI 

da e the fi»;? t"°"" ". • ^""^" ''"'^^^^^ °^ «"^^D- The BUdL is the 
date the complete investigation must be received at FBIHO (in til 

applicable FBIHQ unit). The BUDED is established by JfiJ^Qa^d cannot 
be changed without FBIHQ authority. The BUDED is to be set Jorth in 
each mtra-Bureau communication in accordance with FBI polLy 
I whether generated by FBIHQ or the field. I policy. 



-—-----— (2)^1 BUpEDs_are est3blished_principally to meet the needs 

L to^ ;:" i:" \^rco;:Su::'tr ^"°^°=' /«^«^ wm alloca?e"a:t^ 
e to tne tield to conduct these investigations as possible. | 

(3) jBUDEDs are to be met unless the reason (s) for not 
doing so are beyond the control of the investigating office' 

th- Bimrn -^ -^^l ^^ *" investigating office is unable to meet to 
the. BUDED, it is to promptly advise FBIHQ (the applicable unit) 

elephonically, to include the reason(s) for delajand iheHeceipt 
of the complete investigation at FBIHQ is anticipated. '^^"^Pt 

Rurf^rf m- ^^l s*""^" *" investigative office does not meet its 
Buded, the reason(s) must clearly be set forth in the 

rep^r'l "'''°" °' '''" "'" ""^'^'^ °' ''' investigative 



■.SL,;e.l»;-.-' 



--■■■■ I: •\ . .,-^ .- 

■ ^mi 

. -tin"". 












EFFECTIVE: 11/18/96 






17-3.6 



Prior Applicant Investigate 




off,'.. • ^^!?" investigations are frequently forwarded to field 
offices prior to a completion of a check of FBIHQ records, fie d 
office records may disclose a previous applicant- type inv^tigation 
If so. the following steps should be taken: investigation. 

^v. , ^ . ^^^ '^^ previous investigation was not conducted within 
the last SIX months, notify FBIHQ anS other appropriate offices of 
investigation andlbring previous investigation tho^oughlj ipJo date 
and supplement it as necessary so that tnfai =^„«« ougniy up co date 

.■,t.rv..„.d -ho furni.hed derogatory i„f„rLti.„ if ."^h JoJ.on. „. 



Sensitive 
PRINTED: 02/18/98 



Tyh 



A 

r- 
. -A 










Sensitive 



Parril"^ ^"''''*^'*'*'''''',°P"*^""» ^"'^ ^^"i'leli 



nes 



PAGE 17 

in.:i?^i^;;J?i:r:!^=""^"^-^^^"-^ ^— ^^- -^ ^^ -ch- 

preceding ri«]it^ff^"^'°"' investigation was »ade within six month, 
LmediaU tele ype to "BIHo'a^d %."' '' '' "t« ^hen complete, [send an 
prior case Th^n »,!?/• !" °^^" appropriate offices advising of 
prior case. Then hold investigation in abeyance until furfh^r 
instructions are received from FBIHQ I further 









EFFECTIVE: 01/25/88 



17-3.7 



Leads for Other Offices 



d 




u. . ^\^ Set out leads for other offices iinmediatelv as thev 

become known during investigation. Use most expeditions means of 
communication commensurate with economy to meet deadline. 

setting out leidsf""''' '""^ "''" ^ "^^ °^ ^'' communications 
• ^ . ^^^ ^^ ^*^** ^^ being sent to office which has nnt 

.. ..n. d..i,„,tii„°^ i'^Hu:"?; ?;? till""' ""• '-'fo™,tlo„. ,uch 

(b) Character 

(c) Bureau deadline 

(e) Specific lead 
developed ^^^ ^"'^^ description of any derogatory information 

(4) When a lead is set out for another off,>» n,« 
originating office should include pertinent daJa i^ its re' rj so th.^ 
the investigative record will clearly establish tlTe sonrce'from "hich 



Sensitive 
PRINTED: 02/18/98 




Sensitive 



Manual of Investigative Operations and Guidelines 
Fart II,>^ 

the additional information emanated. 



PAGE 17 - 10 






^v •.':»; 



■■•^•■vSr' 




EFFECTIVE: 01/25/88 



il7-3.8l Receipt of Additional Informati 



on in Closed Cases 



h. .-.„- Individuals investigated under this program will probably 
be serving as Government employees for some time after the 
=!!.!• J®*'i°" is complete. In some instances involving presidential 
-^PP^nLenU._del_ays_jnay_occ.u_r^beIween_the time an investigation is 
conducted and the time in which the nominaTIo.ra,i^onrf7mafi^f^^'^-- 
Cormfr.r" "™Pl«t«' In either event, it is essential that FBIHQ be 

o?fic! hJ .r'' :,"^°'-'"^^'°" V^^"*^ ^* developed by an office after ?hat 
office has closed its investigation. When such information is 
received, the following steps should be taken: 

»,»rf-h- 1 -^P Recheck office indices concerning applicant for any 
additional information not previously reported. 

t i^ .. . ^^^ Furnish information to FBIHQ without delay in 
letterhead memorandum or supplemental report. If case warrants, such 
as a presidential appointment, use teletype. 

(3) If it appears additional investigation will be 
involved in order to resolve allegation, advise FBIHQ by appropriate 
means (telephone or teletype) prior to initiating additional 
investigation I and be guided by instructions from FBIHQ. j 

««„!. \,\ ^t^ /^ ^^^"^ " *" indication the individual is no longer 
employed by the Government, take steps, including setting lead to 
another office, to verify this fact immediately at the inception of 
the investigation. ^ «.* wj. , 



EFFECTIVE: 08/12/86 



■"■%■ 






;5'!V:- 



'i' 



Sensitive 
PRINTED: 02/18/98 




Sensitive 



Manual of Investigative Operations and Guideli 
rart II 



nes 



PAGE 17 - 11 



17-3.91 



Discontinuance of Investigation 



aovise the field regarding discontinuance. If instructed to 









*^i 



r. 



1, 



EFFECTIVE: 08/12/86 



.-it^ 





17-4 



OBJECTIVES OF INVESTIGATION 



thorou^rh n.nI^^.^•^''''•'''^''^ ^^"^'^ investigations is to conduct a 

^:c::pH:;i:g^?^n]:c.vr:rrJH:i:ii:"-.------«"- 

Person-s gen^iil ^f-?SS:%; -:-:J:---;- -j- 
trustworthiness, reliability, and discretion or lack thereof! 

(2) Associates - type of persons J businesses Urouo. 
organizations or movements with which I person has been al ociafed 

been T/l'"^'^ TlV'' " '° "^^^^«^ ^"^ <"f these associations hf^e 

been of a disreputable or disloyal nature. 



(5) 



Qualifications and ability - comments concerning an 



•J 



Sensitive 
PRINTED: 02/18/98 



BWHWBB 





Sensitive 



Manual of Investigative Operations and Guidelines 
Part II ■•"•., -••.„.■-■ .. , .- 



PAGE 17 - 12 



individual s capacity or corapetence (native or acquired) to perform 
well m an occupation or field of employment. Inquiry in this area is 
not necessary in all cases (see instructions under specific 
classifications) but may be requested by FBIHQ in specific instances. 
When necessary, inquiries should encompass performance in all 
employment experiences and relate the positions held and the duties 
and responsibilities associated with those positions. 

I (6) Among concerns which are encompassed by the above 
objectives are the principal suitability and security standards for 
Federal employment, as contained in the Federal Personnel Manual. 
_which_are_set_out_bel.o_w:_ 



employment 



(a) Suitability 

1. delinquency or misconduct in prior 



2. criminal, dishonest, infamous, or 
notoriously disgraceful conduct 

3* intentional false statement or deception or 
fraud in examination or appointment 



excess 

controlled substances 

States 

civil service rules 



4. habitual use of intoxicating beverages to 

5. abuse of narcotics, drugs or other 

6. reasonable doubt of loyalty to the United, 

7. refusal to furnish testimony required by 

8. statutory disqualification (e.g. conviction 




of certain offenses). 

(b) Security 

!• *"y behavior, activities, or associations 
which tend to show that the individual is not reliable or trustworthy 

, 2. any deliberate misrepresentations, 

falsifications, or omission of material facts 



... >A^. 



■>».:■&¥. 



Sensitive 
PRINTED: 02/18/98 








"*^' '' tf^^''^' 



*' ■ ..'*>Ji !-■ 



Sensitive 



Manual of Investigative Operations and Guidelines 
Part II ■.. •;-,■- "r; .- •• v ■ ■■ ■ ■■ «•-; 



PAGE 17 - 13 



. ^* any criminal, infamous, dishonest, immoral, 

or notoriously disgraceful conduct, habitual use of intoxicants to 
excess, drug addiction, or sexual perversion 

- . ,.. . ^* *"y illness, including any mental condition. 
Of a nature which m the opinion of competent medical authority may 
cause significant defect in the judgment or reliability of the 
employee, with due regard to the transient or continuing effect of the 
Illness and the medical findings in such case 



-Vix^j 



-5j! ^y~?a?tsj*hichjFuj;nUh_reason to believe 



that the individual may be subjected to coercion, influence, or 
pressure which may cause the person to. act contrary to the best 
interests of the national security 

6. commission of any act of sabotage 
espionage, treason, terrorism or sedition, or attempts, threat, or 
preparation therefor, or conspiring with, or aiding or abetting 
another to commit or attempt to commit any act of sabotage, espionage 
treason, terrorism or sedition »- o . 

7' establishing or continuing a sympathetic 
association with a saboteur, spy, traitor, seditionist, anarchist, 
terrorist or revolutionist, or with an espionage or other secret agent 
or representative of a foreign nation whose interests may by inimical 
to the interests of the United States, or with any person who 
advocates the use of force or violence to overthrow the Government of 
the United States or the alteration of the form of government of the 
United States by unconstitutional means 

8. advocacy of use of force or violence to 
overthrow the Government of the United States, or of the alteration of 
the form of government of the United States by unconstitutional means 

.... 5' linowirig membership, with specific intent of 

furthering the aims of, or adherence to and active participation in 
any foreign or domestic organization, association, movement, group, 'or 
combination of persons (hereinafter referred to as organizations) - 
which unlawfully advocates or practices the commission of acts of 
force or violence to prevent others from exercising their rights under 
the Constitution or laws of the United States or any State or 
subdivision thereof by unlawful means 



-■ . ,--*-A..,,Jti>Xsj|[, 






eH 



■'Mi 



m. 









■'9 



•""'-}% 
\^'\'^' 



•acl. 



.-■■waf- 

■rSr 



i't: 



iS? 



vi-,s- 



-.sip: 

'•■.•:rf;i. 
?-,'£^-'-' 



-•■IS 




10. intentional, unauthorized disclosure to any 
person of security information, or of other information, disclosure of 



Sensitive 



PRINTED: 02/18/98 







Sensitive 



Manual of Investigative Operations and Guide 1 
rart II 



mes 



which is prohibited by law. or willful violati 
security regulations 



PAGE 17 
on or disregard of 



- lA 



or otherwise actini. II ./V '^.t'' attempting to perform duties. 

eovern™lr,h^ acting, so as to serve the interests of another 
government m preference to the interests of. the United States 

of constitutional priwiegrf^atLt^'self '"^'"'^"*;.! "?«" ^he ground 
t.^e« -i F'^ivixege against self-incrimination, to tesfifu 

before a congressional committee regarding charges of alle^d ^ 
disloyalty or other misconduct) cnarges of alleged 



EFFECTIVE: 08/12/86 



.„ ■■■'I?? 

'■ ■'.^ 
'. ^■' 



17-5 




GENERAL INSTRUCTIONS (See MIOG. Part I. 73-7.. 77-1 and 



examination ^^rin' !" PfO^ided to other government agencies for 
examination and adjudication. Dependina on thp ri.a^f i.-- ^ 
reports prepared in the field or memo^Sda sim:a ^Ing ^i^ftJ^t!'; 
results prepared at FBIHQ are forwarded Tf A0.III I investigative 

developed, that -formatL L^%^::[L1-in"t?%"f! e'tj ^L'r^i r '' 
summary memoranda sent to the White House. In situat ons ^here a 
presidential appointment requires Senate confirmation reports or 



unbiased. 



(1) 



Investigation must be painstakingly exact, fair and 



exhaustive aif sh::{rri:r;dr;:gj:3rjLJir:^; ^i^ :;%• . 

comment professionally about the^ppliL" ^ Lch aHu in^ss " '° 
competitors, clients, and professional associates and thos! „h. . 
:nd%e'°:u'"" 1° 'r-"'^" information as to ti;:^ ;on;uct ^i^rsoc^al 

:ppM::r:o:i^;i;:r:; rrigu-ar-br::- ^-^ -''- ^'^^ -- -* 

to dispense flr^atf"! '^^t^^ ^.^^^i^^' "- 
sp^adJn;'^ accusations of character assassination or rum^ 






Sensitive 
PRINTED: 02/18/98 



:'nt 





■ ■ ■ ■ . ■''^M 

Sensitive --"ff 



Manual of Investigative Operations and Guidelines 
Part II ... . 

PAGE 17 - 15 

nnrf.r c.cU' ^^^ ^°.u°! ""'"'^ impression person being investigated is 
under susp.cxon or that the investigation is of a criminal or 
subversive nature. 

„„, , . ^^\ ^?^^" persons interviewed that investigation is of a 

i^d^^^d-^i; -^^ background inquiry and is being conducted because the 
individual IS under consideration for government employment, for 
l7.lT,r^ ^^ "^r"'-' ^"'^^'•"^tional organization, or ^r access to 
his ai inhere t^^"'""" sensitive information in which the government 



r«i,-oK-i .- t- ^^f.8«neral concerns (for example, trustworthiness. 
«.^ i^K-f -f^' *^f *="'^°"' «°od conduct, and loyalty) addressed by th^ 
suitability and security standards cited in Section 17-4(6) should be 
covered during all interviews. If unfavorable comments are provided, 
obtain specific details including whether the information is based o^ 
direct knowledge or hearsay (see also Section 17-5.1). When 
«Wi; ir' °^ '»;"°"d"'=t are received, the person being interviewed 
should be requested to provide sufficient details to permit an 
«^n!>-r"-'p '^»^%^PPli""t's suitability for employment or access to 
sensitive information. Among factors which should be addressed are 
the nature and seriousness of the conduct, whether the conduct has 

Tkm -f "^""^"« nature, whether there has been any attempt at 
rehabilitation, and what the time frame of the conduct was (i e 
recent or in the past). Where unfavorable information is developed 
concerning a relative or associate, the degree of actual or potential 
influence such persons may exercise on the applicant should be 
determined. This would include some indications of the frequency and 
nature of contacts the applicant has with that individual. 

1- .. -fP. ^^'^^ person interviewed who is knowledgeable of the 
applicant will be asked if the applicant has ever been Lown to abuse 
alcohol or prescription|drugs |or to|use. possess, purchase, sell, or 
distribute Illegal drugs, including marijuana.) Obtain specific 
details regarding any such activity. Record results of ALL responses 
to questions concerning alcohol abuse, prescription drug abuse and 
illegal drug use in the details of the report. , ano 

1- * -5?^ Each person interviewed who is knowledgeable of the 
applicant will be asked questions which will elicit information as to 
whether or no the applicant or candidate has a lifestyle or speeding 
habits consistent with his or her means. The purpose of these 
tZ IT^ ',^ ^l determine if the candidate is financially responsible. 
The general nature of the questions asked and the responses provided 
by the interviewee must be recorded in report of interview. 



Sensitive 
PRINTED: 02/18/98 



snmsi 





Sensitive 

Manual of Investigative Operations and Guidelines 
Part II ■•' 

• ' • <^.;; • • . • . PAGE 17 - 

Inconsistencies in spending versus means should be fully explored 
during the investigation and may require interview of the candidate 
^MH^nnroli r' " !""' financial records, if appropriate and with 
FBIHQ approval (see also Part II. Section 17-5.8 of this manual). 

1- . .5?^. ^^'^^ person interviewed who is knowledgeable of the 
applicant will be asked if they are aware of anything in the 
applicant s background that could be used to influence, pressure 
coerce, or compromise him/her in any way. or that could have an 
adverse impact on his/her character, judgment, stability, discretion, 
trustworthiness, or responsibility. The resulting FD-302/insert of 
-all persons_inter.viewed_mus.t_.also_be„sufficiently_de.tailed to indicate 
this question was asked, clearly answered, and any identifred activi'tV 
or conduct was thoroughly addressed. tcLiviLy 

(10) Investigative personnel should be alert for any 
information disclosed during interviews of persons knowledgeable of 
the applicant or candidate which would indicate the candidate had 
applied for and was denied employment not indicated by the candidate 
during his or her initial interview or when required in response to 
questions on personnel security questionnaires. 

(11) In connection with many federal positions, 

Seci^ioi^'^L'*""" !"''''' 'r.^^^'' an influence on policy and personnel 
decisions, the existence of bias or prejudice against any class of 
T.llTl "^^''v "l^gious, racial, or ethnic group, particularly the 
extent to which it manifests itself (for example, the degree to which 
judgment would be affected), is of interest and concern to employing 
agencies, FBIHQ will identify in opening communications those 
investigations wherein comments concerning possible bias or prejudice 
are needed. When this is done, ensure the results of interviews 
clearly indicate such inquiries were made. If an allegation of bias 
PRtSn*^ xs received concerning an individual not identified by 
FBIHQ as requiring this type of inquiry, conduct appropriate 
investigation to obtain comments to resolve the issue. 

(12) Do not disclose identity of requesting agency or 
position involved when so instructed by FBIHQ. 

(13) These investigations should not be regarded as 
routine. Each inquiry must receive careful analysis and diligent 
attention so that all pertinent and relevant information, either 
favorable or unfavorable, can be obtained. 

,. ,/^*^ °«tails of reports should contain results of all 
investigative activity including, where necessary, an indication of 



Sensitive 
PRINTED: 02/18/98 





' ■■ '-i^^-t 


'. 


■ -iW 




i:-'.',i.,im-, 
.. •'■■•■■5,«?^ 








'ri'^i-, 




--.] L^M 












■' i'%. 


16 


.'•'^ 




'.-•■<-i^r$: 




' •»'. 




*4 









•'j^'- 







Sensitive "■'.--jfi' 



Manuarof Investigative Operations and Guidelines 
rart U •■.■ 

r . -■.;••.-■■• ■ • ■. - PAGE 17 - 17 

why certain investigative steps could not be accomplished or what 
steps with negative results were undertaken. Reports settiL f„th 
anHr^f^rer: "»"^^= ^^^-i'i "« --^ organized and carefull^'pr epired 
TtLrT. ^ sxnce the results are intended for dissen,ination to 

orSer oTTtZ' Jf."''''^''''' '" '^^ "P"' ^''""^^ generally follow the 
order of Items as they are presented under 17-6. Where an intensive 
investigation has been conducted and a lengthy reporJis prepared 
provide a table of contents. The synopsis of the report should 
succinctly present a summary of the detailed investigat on anj 
significant facts, particularly of a derogatory natufe. should be 

loZLV"''J'' ""f '""^'"'^^ ""-^"t= '"=h «« "one individual 

"ould;not..recommend!Lor.i:arrest.r.ecord_set_forth'i„without including 

some indication of the facts associated with those comments *~ —^ 





(15) Interviews should be conducted in person. Teleohonic 
interviews are not permissible unless absolutely reasonaS e I^J" P^°"^" 
llTrlT'^l ^: determination that a telephonic interview is 
f«!r!r p "r ?T ^5* -^"""'^tances should only be made by the SAC 
(see also Part II, Section 7-2.2 of this manual). 

«c..,..e. i^^^ Professional titles of persons interviewed must be 
accurate and complete; e.g., Major General John J. Jones. United 
States Army. Retired, should be set out rather than mere y. General 
John, J. Jones. United States Army. ^ v^enerai 

(17) When reporting the results of a BI interview it is 
very important to always obtain and include as much generic 
information about the interviewee as possible. (See also 17-5 4 ) 
reported:''' '"' '°''°""' information should always be obtain;d and 

IandiSatr^rr'\'''f''''* '!';^'*^ "' P"^'°^ ^^ association with the 
^K cfniuau!" "' '"*'^'" "^"" '^" interviewee has known (knew) . 

The nature of the interviewee's association with the candidate e z 
professional, personal, social. ^-noioace, e.g., 

th! ^!;i-/r ^^^ interviewee's knowing the information provided about 
the candidate, i.e., personal knowledge, hearsay, opinion. 

To illustrate, the following example is being set forth: 

John Allan Doe, President, ABC Bank, 1234 Main Street, Bigger Citv 
Texas, te ephone 404-596-4356; residence. 10001 Cowbo^ RofS Da lal 
Texas, telephone 404-598-9854, advised that he was the candidate's 



Sensitive 
PRINTED: 02/18/98 









"m 





■r-^: 




^T^V-- 




, f- 








..'■,'- 






■ ■ . 


.*<:■'> 




^"i '.. 




'CS»' 




»:■ _^ 




J. 










•■" ■•' ■■ .:-im 


- 




;* 




^ ^^^V - *v,.»j!- 

' '■' - .:■■ :'■ .. .'.^^ 

' • ■ ■ • ■■"■'i»m' 

' . - ' ' ' . '■ .. ' .. -sstfe?!'" 

ensitive ^-^s?®; 

Part II :■-■,. -:■■<:■ ,_, p^Q^ 17-., 18,- •.:f| 

-,..'■ ' -i'M'Jfi', ■ 



Manual of Investigative Operations and Guidelines 



immediate superior at the ABC Bank for the last five years candidate 
was employed at ABC before the candidate resigned in 1990, and had 
known the candidate professionally for the twenty years prior to 1990. 
Doe has not seen or heard from the candidate since his 1990. 
retirement. Doe advised approximately three years ago, in 1993, he 
heard from ABC Vice-President of Consumer Financing, William Johnson, 
that candidate. ... 



EFFECTIVE: 11/18/96 






17-5.1 Derogatory Information 

(1) Off ices(developing|derogatory| information|must ensure 
that sufficient investigation is conducted|in an attempt | to verify or 
disprove the allegation. Expeditiously advise FBIHQ by telephone or 
teletype, as well as other offices which should be cognizant of the 
derogatory information in order] that they may adequately conduct their 
part of the investigation. In 73, 77, 116, 140 and 161 matters, 

'derogatory information is to be immediately telephonically conveyed to 

FBIHQ, to be followed withiii one work day by the facsimiling of -J 

interview(s) or insert (s) containing unfavorable information to FBIHQ. '% 

Teletypes are only to be sent in 73, 77, 116, lAO and 161 matters if 3? 

other offices should be cognizant of the derogatory information in Jp' 

order to conduct adequately their part of the investigation. | % 

(2) Whenever a person furnishes derogatory information, 

comments or conclusions, that person should be requested to provide c ■ 

specific facts, details or examples to support the statements being 7|| 

made. The report should clearly indicate whether or not the '5^' 
information is based on firsthand knowledge. 

(3) Original sources of derogatory information should be id- 
identified and interviewed. It is not sufficient merely to receive v^ 
such information indirectly or secondhand without an effort being made Ci. 
to determine its source and to resolve the matter fully. If for some '^ 
reason it is not possible to interview original source, report should 
clearly show reason. 

(4) If a question of identity is involved, report fully 
the information developed; initiate necessary investigation to resolve 
question of identity; and set out leads to interview original sources. 

(5) In view of the possibility that information gathered 



Sensitive 
PRINTED: 02/18/98 






tB" 




Sensitive 



Manual of Investigative Operations and Guidelines 
Part II"- .... ■ ■ .;■'.■ 



PAGE 17 - 19; 



as a result of FBI investigation'could become testimony at an - 
administrative or judicial proceeding, set forth results on FD-3 



follows: 



FD-302 as 



"JOHN Z. QUICK, Date of Birth (DOB) 1/1/44, 112 March 
Street, Seattle, Washington 90020, telephone (home) (206) 555-1234, 
(office) (206) 555-6789, was advised of the identity of the 
interviewing Agent as well as the fact that he was being contacted in 
connection with the background investigation of Ms. MARY DOE. Mr. 
QUICK provided the following information:" 



^? . <::■. 
_%■■■_ <"S^- 

■ ■' *Si' 

• '..■:■ -'SSSK' 
'■■'■ Ot^^ 






-(6)_ 



J-O— the._eyen_t_^that_add[ijtional^.in^ 



information is to be submitted as an Insert to a report, the following 
format is to be used: 



4-: .'ii 






SE (file number) 

ABCtdef (Dictator's/typist's initials) 

Seattle Division 

At Seattle, Washington 






Special Agent TOM PLAYFAIR conducted the following 
investigation on Monday, January 2, 1989: 

JOHN Z. QUICK, Date of; Birth (DOB) 1/1/44, 112 March 
Street, Seattle, Washington 90020, telephone (home) (206) 555-1234, 
(office) (206) 555-^6789, was advised of the identity of the 
interviewing Agent as well as the fact that he was being contacted in 
connection with the background investigation of Ms. MARY DOE. Mr. 
QUICK provided the following information: 



EFFECTIVE: 07/23/90 






■•2^1 



m-- 







Sensitive 
PRINTED: 02/18/98 








Sensitive 



Manual of Investigative Operations and Guidelines 
Part II 



PAGE 17 - 20 



17-5.2 



Data Obtained From File Searches 



Information obtained from reviews of files on applicant 
close relatives, references and associates should be used as lead 
material during^ the investigation. Pertinent information should also 
be organized for inclusion in the details of the report. Pertinent 
admissions, denials or explanation of associations with individuals or 
groups should be reported. Keep in mind this material will be 
disseminated to other Government agencies and, in some instances, to 
committees of the United States Senate. Any considerations affecting 
dissemination, such as material subject to Rule 6(e), opinion of the 
.United_States_Attorney_regarding_«teas_e_of_information in pending 



investigations, protection of sensitive sources, and any restri'cti^i^ 
on use of information regarding third parties, should be carefully 
examined. If necessary, consult with FBIHQ concerning the manner in 
which the information can be presented. 

(1) Information on applicant - Office discovering 
derogatory information in its files on applicant should organize and 
report it unless data is contained in case in which another office is 
origin and that division has received copy of FBIHQ communication 
initiating investigation. In latter event, only office of origin in 
previous case should report data. 

(2) Information on reference or other person to be 
interviewed - Office conducting interview has primary responsibility 
to report derogatory information. If this office has incomplete 
information but another office, such as office of origin, has complete 
information, office conducting interview must ensure that office 
having complete data reports it fully. 



(3) If the only investigation required by an office is a 
file review, FBIHQ should be advised even if no 
office indices. 



record is located in 






'9': 







EFFECTIVE: 03/23/89 



Sensitive 
PRINTED: 02/18/98 



■M' 



:■'■■•<' 





Sensitive 

Manual of Investigative Operations and Guidelines 

^"^ ^^ ; PAGE 17 - 21 

17-5.3 Association With Individuals or Groups 

(1) While the First "Amendment protects an individual's . ' . 
right of association, there are areas which are of legitimate interest 
to the Government in connection with employment consideration. In 
this category would be associations with individuals or groups which 
would deny other persons their rights under the Constitution, which 
advocate overthrow of legally constituted authority through violent 
means, or which engage in crimes against persons or property. 

(2) Check names of such individuals or groups through 
office indices. 



■■■J!.-fi 
/■If 






(3) Conduct inquiries to verify or disprove the alleged 

affiliation and provide characterizations of individual or group V 

involved. Ascertain knowledge of or agreement with policies of group ■': 

as well as dates of affiliation and extent of participation as member j 

or officer. Contact logical informants familiar with group or ^ 

allegations involved. f 

(4) If an individual is involved, ascertain the degree of ,", 
association which exists and the extent to which applicant is aware of - 
that individual's activities. The extent of influence which this 5 
person can exercise over the applicant should also be determined. '$ 

EFraCTIVE: 08/12/86 ^. 

17-5.4 Freedom of Information Act/Privacy Act of 197A (See Part ' -^ 

I, 190-5(3), 190-7.3.) % 

■ ■ i '■ 

(1) Pursuant to provisions of the Privacy Act of 1974 :"" 
(Privacy Act), all persons interviewed during background 

investigations (Bis) must be advised by the interviewing employee of ■'■'- 

the purpose for which the information is sought (a background "'^' 

investigation), the uses to be made of the information (to determine a 

person's suitability for federal employment or access to national ;? 

security information), the provisions which allow a BI candidate 

access to our records (i.e., the BI results, including an i; 

interviewee's comments), and the interviewee's right to request ^ - 

confidentiality. =v^ 

(2) The Privacy Act permits a United States citizen or -^ 
permanent resident alien to access records pertaining to him or her 

maintained in a system of records by an agency of the Executive Branch 



,vf;. 



Sensitive 
PRINTED: 02/18/98 




Sensitive 

Manual of Investigative Operations and Guidelines 
Part II. ;... .. 

of the federal government. Such an access request is processed under 
the provisions of the Freedom of Information Act and the Privacy Act 
(FOIPA). . 

The Privacy Act also permits the FBI to protect the identities of 
individuals interviewed during Bis who expressly request that their 
identity be held in confidence. 

(3) When an individual has requested and been granted an 
express promise of confidentiality, it is absolutely imperative that 
this fact be clearly recorded along with the results of the interview. 









,-.; 


;i.i" ■ 








' ■ .-0 


;e 17 - • 


22 





Information collected by the FBI in these Bis will be disseminated to ,» 

other government agencies and can also be made available to Senate ' 

committees when confirmation is involved. Therefore, when an •% 

individual interviewed during the course of a Bl requests -.;I 

confidentiality under the Privacy Act, the level of confidentiality ? 

must be clearly set forth in the document recording the results of the ' 
interview (i.e., insert, FD-302) I The three levels of 
confidentiality, an explanation of each, and the proper method to 

record them when reporting the results of interviews are set forth ' ?:i 
below: 

(a) When interviewees request that their identities ;? 

be protected from the candidate only, the following language is to be Hi 

used: -^ 



"(Name, address, etc., of interviewee), who requested 
that (his/her) identity be protected only from the candidate, (name of 
candidate),...." 

Under this level of confidentiality, the interviewee's identity could 
be included in documents provided to those agencies and/or certain 
members of congressional committees which have a need to access the 
candidate's Bl. However, pursuant to an FOIPA request, the 
interviewee's identity and any information provided which could tend 
to identify the interviewee would be withheld from the requesting 
party. 

(b) When interviewees request that their identities 
be protected outside the FBI (total anonymity is desired), the 
following language is to be used: 

"(T-symbol, i.e., WMFO T-1) , who requested that (T- 
symbol's, i.e., WMFO T-l's) identity be protected from anyone outside 
the FBI,...." 



Sensitive ' 
PRINTED: 02/18/98 









. :■■«?- 1 




Sensitive 



Manual of Investigative Operations and Guidelines 
Part II . 



PAGE 17 - 23 



'.'-.'A'r 




1. Under this level of confidentiality, the 
interviewee|s identity would not be included in documents provided to 
those agencies and/or certain members of congressional committees 
having a need to accesis the candidate's BI. Here also, pursuant to an 
FOIPA request, the interviewee's identity and any information provided 
which could tend to identify the interviewee would be withheld from 
the requesting party. 

2. |When reporting the results of a BI interview 
of a person who has requested total confidentiality, it is important 

^t p.. Jnclude_.su_f Jjxijmt injorraat^^^^^ i shthe 

credibility of the information provided and of the person^roviding 
the information. This information assists the client entity in 
assessing the reliability of the interviewee and/or how much weight to 
attach to the information provided by the interviewee. 

FBIHQ recognizes that it is sometimes difficult to include 
specific information with regard to the interviewee due to issues 
involving confidentiality; therefore, it is very important to always 
obtain and include as much generic information about the interviewee 
as possible. (See also 17-5(17).) For example, the following 
information should always be obtained and reported: 

The interviewee's relative length or period of association with the 
candidate, i.e., how long and/or when the interviewee has known (knew) 
the candidate. 

The nature of the interviewee's association with the candidate, e.g., 
professional, personal, social. 

The basis for the interviewee knowing the information provided about 
the candidate, i.e., personal knowledge, hearsay, opinion. 

To illustrate, the following example is being set forth; 

WMFO T-1 (hereinafter referred to as "T-1") , who requested that T-l's 
identity be protected from anyone outside the FBI, advised that T-1 
has known the candidate well professionally for approximately the last 
twenty years, and socially the last ten years. T-1 advised that T-1 
is aware that the candidate used cocaine and marijuana on a frequent 
basis over a five-year period between 1980 and 1985 because the 
candidate has discussed his drug use with T-1 and others in group 
settings on several occasions. ... | 

(c) When interviewees request that their identities 



■Si- 



Sensitive 
PRINTED: 02/18/98 



«KSi 



na>ill'PM>BIUH'< 



ai 




1? 




., -3£l_ 

■■■■.■ ■ : 'i^m^'- 

■ ■ - •■■" ■■ ■ ■ ■■■:;J# 

Sensitive ' . ' ' / ' V^ 

■••■■■ ■ ■ ' ■ " i-S^ 



Manual of Investigative Operations and Guidelines '»l% 

Part II - , ,',-..' . PAGE 17 - 2A 



(a) Use the following paragraph when one or more 
interviewees have been granted confidentiality: "All persons 
interviewed were furnished the appropriate provisions of the Privacy 
Act. Express promises of confidentiality, both limited and unlimited, 
have been granted to the following individuals:...." 

(b) Use the following paragraph when no interviewees 
have been granted confidentiality: "All persons interviewed were 
furnished the appropriate provisions of the Privacy Act. Express 
promises of confidentiality have not been granted." 

(5) Promises of confidentiality are not to be encouraged, 
but granted when it is the only means to secure information from the 
individual being interviewed. At what point in the interview process 
the person interviewed should be told of the Privacy Act and given the 



Sensitive 
PRINTED: 02/18/98 






,'f 



be protected until such time as required in a judicial proceeding or 
administrative hearing, the following language is to be used; 

"(Name, address, etc., of interviewee), who 
requested that (his/her) identity be protected from the candidate 
until such time as it is required in a judicial proceeding or 
administrative hearing,...." 

1. If interviewees request this level of 
confidentiality, it is recommended that they be asked if they would 
like to be advised prior to their identity being disclosed in such 

_p.roceeding8_ pr hear ings., If__S0t th is is also to be set forth in the 

document recording the interview results. ~ ~~ ~~ ~ ~~ ~ 

2, Under this level of confidentiality, the 
interviewee's identity could be included in documents provided to 
those agencies and/or certain members of congressional committees 
having a need to access the candidate's background investigation. It 
would not be unnecessarily revealed in a judicial proceeding or 
administrative hearing to the candidate, until such time as it is 
required. Pursuant to an FOIPA request, the interviewee's identity 
and any information which could tend to identify the interviewee would 
be withheld from the requesting party unless it had been previously 

released to the requesting party in a judicial proceeding, «|§ 

administrative hearing, or was otherwise officially acknowledged. 



i'jr 



(4) In addition to reporting the level of confidentiality ^>|- 

requested by a BI interviewee, one of the following statements must f 

appear in all background investigation communications reporting the ''-■- 
results of interviews under the heading "Administrative": 






m 



^iit 






opportunity to request confidentiality is left to the best judgment of I'' 
the interviewing employee. However, the logical time is at the 
beginning of the interview to avoid the appearance of intentionally 
misleading or misinforming the person being interviewed. 



EFFECTIVE: 06/03/96 
l/~5.5 Terminology 



Sensitive 
PRINTED: 02/18/98 






Sensitive'. :■■■■■'..;■ ; ^" ^t^ 

• . ■ ■ • . ■ . . ,...•;■ ; =f ;;^sg|S 

• • / ' : ■■ ;, - ."g*g' 

Manual of Investigative Operations aiid Guidelines ' Xvi^;> 

^\-::^ [■; ,;/ ••■;," " •- ■ page 17 — ■ 25.- ; '^v^ 









-m 









Stereotypical language should be avoided (e.g., "100 ' ^^~ 

percent American," "liberal," "conservative"). When a general 
attribute is being attached to an individual (e.g., "abrasive"), 
provide specifics or details as to how the person relates that term to 
the applicant. Refrain from giving a negative cast to interviews by 
using statements, such as "unable to furnish any derogatory 
information," but instead report what information the interviewee is 
able to provide. 

EFFECTIVE: OA/18/88 

17-5.6 Interview of Applicant (See MIOG, Part I, 77-5 and Part 
II, 17-3.2.) 

... , (1) Applicant must be interviewed at the inception of 
the I investigation. The applicant must be advised that the purpose of 
the interview is to ensure that complete (current and accurate) ' 
information is available concerning the applicant. The interview is 
not to be confined to biographical data, but also is to be directed at 
developing any information known to the applicant that could have a " 
bearing on the person's suitability for federal employment and/or 
eligibility for a security clearance or access to sensitive 
information. The results of the interview must bejreported on an FD- 
302. Results must be incorporated into details of report and any 
necessary leads set forth for FBIHQ and appropriate offices. The 
narrative of the FD-302|must |be sufficiently detailed to reflect that ■ 

[the applicant was advised of the interview's purpose and that(each of ^^' 

the following points was completely and thoroughly addressed in the &s^ 

interview: '■5?;S 

(a) Completeness and accuracy of the SF-86. The 
majority of the interview should not be spent reviewing the SF-86. In ;" 



'm- 



.','-"1 

S'VT;5 ■ 



■:;"*.«i. 



y-y 











Sensitive 



_^„ui^„_ • . ^' 7 j-.^** vay vuveieo, eitorcs ana/or 

problems in paying the tax. Do not conduct any further investigation 
concerning federal tax delinquencies or back payments—FBIHQ will 
provide the information directly to the client agency which will 
consult directly with the IRS if necessary. For state and local tax 
delinquencies or back payments, immediately notify FBIHO. If 
instructed to do so by FBIHQ, set forth appropriate leads to field 
offices to verify the information provided by the applicant. | 

t .. ^^ Ji'^M^'''^^ suits as plaintiff or defendant, including 
divorces. Identify issues litigated. * 

' ^. |(e)|Any involvement in criminal matters as suspect 
or subject or any criminal charge, arrest and/or conviction. 

I , |(f)|Any denials of/employment and/or dismissals 

particularly m the Federal sector. Include reasons. 

' ^ , |(g)|Any contact with representatives of foreien 
countries. * 

I 

. ^. . ^^^ Details of professional complaints or any 

nonjudicial disciplinary action, e.g.. bar association grievances, 
better business complaints, student or military disciplinary 
proceedings, Equal Employment Opportunity complaints, etc. 

. (i) Business/investment circumstances that could or 

have involved conflict of interest allegations. 

^. , . , ^J^ Details of any psychological counseling with 
psychiatrists, psychologists, other qualified counselors or others. 

(k) Any prescription drug or alcohol abuse, illeeal 
drug use, to include marijuana and participation in drug/alcohol 



Sensitive 
PRINTED: 02/18/98 



■•#■■ 



'* \'' 



Manual of Investigative Operations and Guidelines 
Part II 

•PAGE 17 - 26 ■'i4' 

most cases, it has been reviewed by FBIHQ personnel for completeness. ■¥ 

but no^ i;«;^.^ i-^^'^ Personal and business credit issues, including, 

but not limited to. repossessions, delinquent student loans, debts 

placed for collection and bankruptcy. (See Part II, 17-5.8.) C 

kno^i.x • .t^ Iu>^paid tax obligations. To the best of his/her - 

knowledge. IS the applicant current on all federal, state and local 
tax obligations. Has he/she ever made back payment of any such tax? 
This includes but is not limited to. income taxes, medicare taxes, 
social security taxes and unemployment taxes. If tax delinquencies 
-0£ back Payments_are_idenu^^^ type and amount (original 

and current) of tax owed/paid. taxTea7(s)-c^ered.-Tff or^^A 



•*:■ 
»''i 






i ii W *» .J P»i . - m P l 









fl>:. 



Sensitive :^^* 

■"■.•■• . ■■ '•%# 



Manual of Investigative Operations and Guidelines 

Part 1I:^\ ;. ^; ' PAGE 17- .27- . -■ -:n# 



'-.■'1.-I 



;gV^«- 



counseling/rehabilitation programs, during applicant's entire adult ''0^ 

life (since age 18). Identify all drugs used, when used, duration of ,*# 

usage, amount of drug used, place where drug was used (public or '^f; 

private setting), how the drug was obtained, whether or not applicant ^■■ 
has provided drugs to anyone, if . applicant has purchased or sold 
drugs, others having knowledge of applicant's drug use. 

(1) Memberships in organizations whose policies 
restrict membership on the basis of sex, race, color, religion or 
national origin. . Determine if, in fact, the membership of the 
organization includes minorities (Presidential appointees, U.S. 
_Bankruptcy,_.Special_Tribunal_andJL..S.^Jlagistr^ale_^Ju_dge^^ 
is determined that a candidate has been a member of such an 



•^ 



organization within the most recent five-year period, determine the 
candidate's role, for example, as a policy-making officer, in such an 
organization; determine if any steps have been taken by the candidate 
to alter official or covert restrictive admissions policies; and 
ascertain the candidate's personal viewpoint toward such policies. 
Any organizations that are determined to have potentially 
restrictive/discriminatory admissions policies shall be checked in 
field offices' indices for pertinent references. 

(m) Any involvement in any organization which 
advocates the use of force to overthrow the U.S. Government, or any 
involvement in the commission of sabotage, espionage or assistance of 
others in terrorism. 

(n) I Concealment of any activity or conduct that 
could be used to influence, pressure, coerce, or compromise the 
applicant in any way, or that could have an adverse impact on his/her 
character, judgment, stability, discretion, trustworthiness, or 
responsibility. | 

(2) The report of interview need not reflect the specific 
questions asked of the applicant. A question and answer format is not 
desired as it tends to result in a "checklist" style of interview and 
failure to fully develop all information the applicant may possess 
regarding a specific area of inquiry. 

(3) The FBI accepts investigative requests from other 
agencies with the understanding the referral agency has notified the 
applicant of the Privacy Act requirements described in Part I, 190- 
5(2) and (3) of this manual. This notification would cover an 
interview of the applicant by the FBI if confirmation is received from ■; 
the applicant that the advice was furnished. The applicant can also 

be informed that the interview is being conducted as a result of a 

" \'''' 

Sensitive .^0^ 

PRINTED: 02/18/98 v ^ •- 

... ■■.• ■■" ■ ■■•,;■■ ■ ^ ■ ■ ■ ,"!iiS-' 



■■''y 
'•'<<'' 











Sensitive 



Manual of Investigative Operations and Guidelines 
Part II •• ■ ■ . ■ ..■■■.„ \ . 



PAGE 17 - 28 



request from the, referral agency for the FBI to conduct a background 
investigation; that the purpose is to ensure the FBI has all the 
necessary information to conduct its investigation, the results of 
which will be disseminated by the FBI to the requesting agency as well 
as for other purposes consistent, with the FBI's responsibilities; and 
that failure to provide the requested information could hinder the 
FBI's investigative efforts and cause delay in forwarding the 
completed results to the requesting agency for its use in making an 
employment or appointment determination. 

(4) This interview is intended to obtain information to 
_f a c i H_t a t e _our_i nye s.t igatiye ef fort s. If an applicant provid es 



information which could become a suitability or access issue, this 
should be fully explored with the applicant at the time of the 
interview. However, an applicant should not be contacted to resolve 
suitability or access issues which are developed during the 
investigation since resolution of such matters is primarily an 
adjudicative responsibility of the agency which requested the 
investigation. The FBI will conduct an interview to address such 
matters only when specifically requested or authorized by the 
employing agency. 












■*■>■ 



■■nr 









EFFECTIVE: 05/27/94 






...Jsu' 



17-5.7 



Possible Testimony at Hearings 



The possibility -exists that an individual who furnishes 
derogatory information could be sought for testimony at a hearing if 
employment is being denied based on that information. Therefore, 
attempt to obtain a signed statement whenever such information is 
developed and obtain a statement concerning that person's availability 
to testify at a hearing. 










EFFECTIVE: 01/18/91 



Sensitive 
PRINTED: 02/18/98 



fie 



:feP:|s§i\. 







•I 




Sensitive 



Manual of Investigative Operations and Guidelines 
Part II . 

17-5.8 Review of Financial Records 



PAGE 17 - 29 



FBIHQ will accept an applicant's or candidate's financial 
data when provided by the agency requesting the investigation. When 
such data is provided, it will be reviewed at FBIHQ for any obvious 
leads and then forwarded to the field. Investigative personnel should 
compare the provided data with the results of credit checks and 
responses of financial questions asked of interviewees knowledgeable 
of the applicant or candidate. The candidate will not be specifically 
asked by the FBI to provide financial data unless it is necessary to 
resolve an issue. FBIHQ approval must be obtained before requesting 
.such„dat a[__f jrpin._a_candi da^t e . 



EFFECTIVE: 08/28/91 



17-5.9 Status Inquiries 

Occasionally, representatives of the FBI receive inquiries 
from Executive Branch agencies. Congressional committees or the 
applicants themselves requesting the status of a particular background 
investigation or to request that the matter be expedited. Some client 
aigencies have requested that these inquiries be referred to them. The 
FBI must ensure that the desires of the client agency are followed in 
investigations being conducted at their request. Therefore, any 
requests received regarding the status of a background investigation 
should be referred to FBIHQ prior to a response to ensure that FBIHQ 
is in a position to promptly notify the client. 



EFFECTIVE: 08/28/91 



17-6 SCOPE OF FULL FIELD INVESTIGATIONS 

(See MIOG, Part I, 73-8.4(1) (a) , 77-3, 77-4.5, 77-4.7, 
77-4.8, 77-4.9, 77-4.11, 77-6, 116-7, 260-2.5(2), 
260-4.1(1) (b) and 260-4.2 (3) (a) , Part II, | 17-5(14) .) | 

The scope of investigation may vary depending upon the 
position involved and whether or not there has been a previous 
background investigation concerning the individual. Some 
investigations are limited to the past 10 years of the applicant's 
life, exclusive of records checks. While the general scope of 
investigation is set forth hereinafter, the investigation should not 
be limited solely to the steps described herein. A thorough 



Sensitive 
PRINTED: 02/18/98 



li,--.- 



^^*r 





-'■;% 




■■■'■':'■ ,. . ,. . ■) .;/::,rf 

Sensitive '^-^^'M. 

■"•'■■ ■ :••» 



Manual of Investigative Operations and Guidelines iT^ 

Part II .-r; ■ ■, •■ „ ■ _ 

.f:^^•■.■< ' PAGE- 17 - . 30 



examnation of the applicant's personal history should be made alont 
ri!. i^^k" *"^-°\^^ '^^ position involved. Investigative ingenuity 
should be exercised xn an attempt to identify other leads which could 
reasonably be expected to produce relevant information concerning the 
applicant. The office should determine what resources available to it 
in the form of liaison contacts, informants, or assets which would be 
in a position to have knowledge of or provide comments concerning the 
applicant. For example, if the applicant is a bank official, contact 
should be made with the squad handling banking violations to identify 
any logical contacts which could be made to obtain comments about the 
applicant. In some instances, depending on the position involved 
_ajid/_or_the appJ.icanLLs_.backgr^und,._sp.ec^^ concerning 



contacts with informants or assets may be issued by FBIHQ. Variances 
m the scope of the investigation will be noted in the instructions 
set forth in the opening communication. It should be further noted 
that when issues of a pertinent or derogatory nature develop, 
investigation should be conducted to bring these issues to a logical 
conclusion, irrespective of the scope of the investigation. 



EFFECTIVE: 05/27/94 



17-6.1 Birth 

[Verify applicant's date and place of birth at a bureau of 
vital statistics in all background investigations conducted for other 
Government agencies. 



EFFECTIVE: 08/28/91 



17-6.2 Naturalization 

CD If applicant and/or spouse obtained citizenship 
through naturalization or derived citizenship through naturalization 
of parents, verify this through records of the Immigration and 
Naturalization Service (INS) or from court records. In view of time 
constraints, court records may prove to be more accessible for prompt 
review. In 116 matters in which Sensitive Compartmented Information 
?R?«n? ^'/?^"^«d (which information will be provided to the field by 
FBIHQ) and in all 77 and 161 matters, the naturalization of close ■ 
!«K^i^^°'*r^%"/^^""^*' siblings, children and spouse) and current 
cohabitant (s) (residents of same household, living in spousal-type or 












Sensitive ' , '*' ?0- 

PRINTED: 02/18/98 . ' ' 







m 



Sensitive 



Manual of Investigative Operations and Guidelines 
Part II' : .•■■■--. . ^ , ■ . 



PAGE 17 - 31 



roommate-type, relationships, but not domestic/other employees) also 
must be verified. 

(2) If applicant and/or spouse are foreign nationals, 
verify immigration status through INS, usually at the INS District 
Office covering the current residence; In 116 matters in which 
Sensitive Compartmented Information access is required (which 
information will be provided by the field to FBIHQ) and in all 77 and 
161 matters, the alien status of close family members (parents, 
siblings, children and spouse) and current cohabitant (s) (residents of 
same household, living in spousal-type, or roommate-type, 
XeJJLt Aons^liP-g » but not dome s tic/other_gmployee£J also mus t be 






'"'Mi 









verified. 



EFFECTIVE: 08/28/91 




17-6.3 



Education 



(1) All college attendance and degrees obtained falling 
within the scope of the investigation should be verified. If 
applicant has not obtained a college degree during the period of time 
covered by the investigation,, the highest college degree obtained must 
be verified, regardless of the time frame involved. Although detailed 
records of study need not be reported, dates of attendance and 
available class standing or grade point average (include scale 

used) [are to|be set forth. |a1so report information | concerning 
academic honors or | probation. Make inquiry as to the location of 
disciplinary records and review those records for any information 
concerning appointee. | If school does not m3intain[any of the 
above I information or has a policy against releasing such data, include, 
an appropriate statement in the report. 

(2) If education has occurred during recent years (last 3 
years), professors, teachers, advisers or fellow students should be 
interviewed. 



■ ■•".sj ■ 






(3) If records or professors, etc., are not available, a 
clear statement should be set forth from a responsible official at the 
institution explaining the situation. 



1,- 




(A) When no college degree is indicated, high 
school I graduation must be verified. Even if graduation from high 
school occurred prior to the period of time covered by the 
investigation, that information still must be confirmed. | It will not 



if'**! 



Sensitive 
PRINTED: 02/18/98 








Sensitive ""^f 



Manual^of Investigative Operations and Guidelinea '^'f 

■. ':'-•' /■ ■ ■'-''''' ■- ■ Pj^Qg j7 _ -22. -0:^ 

be sufficient to merely check a^^««/^,- \. ^ . '% 

college institutions wherein nac!?f/^ business, commercial, or 1$ 
without alsoiverifyLglhLh school J'^: ^'?"" ^" ^^«" "^t^^""** 

documented ii those a^ii^mic recorif th^? Jh"' "J'" '' '"^ ^^^^^^^ 

high school, I records that the applicant graduated from .l. 



EFFECTIVE; 01/18/91 
17-6.4 Marital Status 



Office of the pfrd:rAt;orn:v'"n^-r"''"'''°"^ con^u^e-dToV-t he- 
regardless of the scooe of ??' ^^^Y°^"'' ""^t be verified 

divorces in iJ^tl^J^^ co^dicnff^^thrOf ^"elf \'r"^°; °^ 
Attorney, refer to MIOG, Part I. 73-8.4 (2) (g) ^^^ '^"'*°" 

Divorce (s) should be verifipH hh,-«..-», 

(e.g., court records) Jden?ifvwhSh* 'T'" °^ ^PP^priate records 
defendant as well as he gr'^nds for .n^^^""/''" pUintiff and the 
other pertinent informatiormus? be ^h. !'" °- ' ''*" '^^^""- ^H 
has complied/is complying wi?haU.r"^^ ^'^" ^^ ^^'^ applicant 
timely basis (eg chilf Z ""rt-ordered obligations on a 

violence, abuse o;'i^sUbiHtv'oTti '"^^r'/^ ^"''^'^" °^ -J' 
this information is not at! labia tul ^V '' '^' ^PPlicant). If 
records, efforts tnusJbe laJe tJ obUin^^%r^''r °' ^PP^P^^^te 
applicant's attorney of record in ti^H-v ''"^'^ ^" interview of 
attorney's representativr i? fh" • ""^ Proceeding or the 
made to obtain this infor;atifn ^^r/^^l^r"""'"'' «"°^ts must be 
If the aforementioned effort fa frfconL' tTJ""^^'' " — Pouse(s). 
I effort to Obtain/verify the';ec:ss;rri:fL"atio:.r^^^^^ ^" ^" 

reported, iust ^'Je^rTJidiclte^^heJiro" ^"^^r^^^^-^' " 
financial obligations^n the IjpUcant If" H T^' '"^"^^'^ ""^ 
address whether or not the anoU^.^f k* °'. ^^«"txfy each and 

the obligations pursuant to Kec^urt's^ord^r-^'^'f-^^^^^^^^ "^^^ 
no obligations were/have been Lp's'J. so stat;?|' "''^ "'"""• '^ 

Office of s parZ'AJ?or::yf^:rrex-r::;ifrr"^ r^^^-^^^^ ^^^ ^^^ 

within the scope of the investi^-i,! =P°"f«\f'o° divorces occurring 
interviews of ex-spouses in!iif!f-."^ ^° '"' interviewed. For 

Of the Pardon Atto?::^:%:?er"r:i §s^p°:;t^^"13%^^^%^ f) °"i" 

dxvorce occurred prior to the scope of th" in^esHga^io^fie ' ''^ 



Sensitive 
PRINTED: 02/18/98 










Sensitive 






Manual^of Investigative Operations and Guidelines 



PAGE 17 r 33 



considered nicessarv'tf reLJ^r"''** 'f"" "^^ ^« interviewed if 

eo necessary to resolve issues developed during investigation. 

|(5)lf any question about the applicant's curr.»nh «^ 
previous marital status develops, attempt II ^eri y thro^g^ 

verifTJhro'u'r^t?" " not available, efforts are to bTmade to 
verify through other appropriate sources. 



icouxve issues must be clearly reported. 






^«:^ 



EFFECTIVE: 11/18/96 



17-6.5 



if' 




Employment 



... ^. ^^^ ^^^ employments falling within the scona of th«, 
investigation should be verified. If not possJb e to veri^v 

e.ploy„.„t recorded. .„„ th. „.„„ tor t.m^fji^rdit^r.Jn":! 
(2) Supervisors, co-workers or other aDoronriafr» 

.deiti.„ to a„, iho .a'\:"ur?:: ii-riititli o"^":.:.":;..'' '° 

review the articles of incorporation. If the business is a 






"^^i- 



Sensitive 
PRINTED; 02/18/98 



-^3^ 



,' nyr'-v?'" 



iK 



^A^^. 




Sensitive 

Manual of Investigative Operations and Guidelines 
rart II 



PAGE 17 - . 34 



ageJc!es?'^h!cf th"' '"""l' P-fessions regulated by licensing' ' 

eouivalen^^ fr "'"^' "^ ^^^ ^"""^^ Klerk's Office (or ?he 
equivalent; for any grievances. 

lifflit«rf H»^/•'^ If the employment record has been destroyed, or only 
th! s ?he situ^tiin M "r^' "'""^"^ '"" appropriate p;rson St 
persoiallv to th!f r* determine whether applicant is knovm 
the ?rf!if-^ ^/ ^f"°" ""^ whether that person is able to provide 
the Identity and/or location of others who might have known applicant. 

interviews of^L/^''"''" °^ unemployment should be accounted for, and 

ir;rowd!nrrJ"^kn;:nx:!^°^^^^^^'--«^^---^ 



. ■ " • ■;#■ 
.*: • •• >.jr 




EFFECTIVE: 11/28/95 



17-6.6 Military Records 

tnilitarv servJL ^^Sfr-*^"?^. be reviewed if applicant indicates any 
rj^j! Z^- ^ ^ National Guard records should be checked at the 
servicf r'°^- ""** headquarters. Review should include dates of 
service (active and reserve) , awards received, rank attained 

E;pe"oT:i:chr::r::c°ei;ed^:^^^^^^""^ -^^-- -— - «"-ed. and 

service thr J^i .^J^'l^ s::^:^'^^ ^fletr^ils^IfifLs 
Of a^^licanJr^^"' observation of any military records in possesion 

di,rhar<,-H ^^\ ^5 ?PPl^""t is on active duty, or has been recently 
discharged, conduct interviews of supervisor and co-workers at cur«It 
HmitL'tr"' "^^«'^"'«"t' - the United States. | Interne's are 

i^years p^Jor'^i'ti: Tt ^V^^^^" applicants have had within the 
cwo years prior to the date of their last military service, if their 
military service was within five years prior to the date of their 
application (See MIOG. Part I. 67-7.8(9) & (19) & Part II. 
ass?gn;eit."" commanding officer and review records at place of 



^ 



Sensitive 
PRINTED: 02/18/98 







Manual of Investigative Operati 



EFFECTIVE: 11/28/95 



Sensitive 
ons and Guidelines 






PAGE 17 - 35 



17-6.7 



Neighborhoods 



year. should^Je int:?vi:::d?' ?f%"pi ifa^r ''^^^ '"^'"« '""^ '^'' ^-« 
the location, attempt to identifv fh " ""known personally at 
rental agency and verif^ fro^ records.""'' °' ''^ """"''''^ °^ '^« 



(2) 

should be 

five-year limitation. 



II._derogatory information is rfBv«i««»j . / . . 
conducted in lozTcllnllahh^.tj—'-^^ 

logicai neighborhoods without regard to the"^ 



inquiries in neighborhoods ^h'^^u' '" «"<l"voring to conduct 
whe're applicant fesJedl; Trl^JlT, T'^t^i"'-" °^ residences, 
trailer camp, unless investilatL! ^- Periods, such as one month in a 
for such inquiries. '"^"'^^«*t^^« circumstances indicate a necessity 

The summary PalgL^^^^t^irin'Sic^^^e^lharfa^'^^r "^ --"-«<»♦ 
made concerning applicant's ri«„!? favorable comments were 
loyalty, should inc luSe the lenlth^fV*"^""'"' "P^^ation. and 
and should advise if favor^hi * ^'"^ applicant resided there, 
employment wer^^ade.'^n^de o.ItSrTrnlo'lT^ for Government 
in complete detail. For each S!r!! ^"^ ""^"f tion should be set forth 

address and number of ;earsapjii:::;trr:f^' T' '°''' ''^^"'^^y- 
unknown at the location, repo?? identifv of " °'"' " ^PP^^^nt is 
provided that information. ^''^"tity of persons contacted who 

investigatioi!^tt^%^^^^^;?/:^2d:"Lt:: iTr^' ^'^^^ 

and other individuals in a nositfon ?! J^""8h references, associates 



EFFECTIVE: 12/10/91 



Sensitive 
PRINTED: 02/18/98 



:;.m! 




Sensitive 



p^^t'll**^ ^"''*''^«*^^^« Operations and Guidelines 



17-6.8 



References and Associates 



PAGE 17 - 36 









shnt.iH K • f^^ .Generally, all listed references and associates 

wUhiut a^'ex^iT'- f ''^""' '' *" individual cannot be'on acted 
without an expenditure of unreasonable time and travel or an 

d^U^Ihe i^i t': r"^^i^"« ^- '^ P"-«i o^ ti.: :Lch e^uU unduly 
ad«nLh« • ■ ^®* r* ^"terviews need not be conducted provided an 
adequate inquiry can be completed without that interview? The details 
sLu^H "P"'^^*^^" <* ^^J^i" that the individual is unava lable and 
should recount what efforts were made to contact that person! 

IZJT^T^ --f-2l^-^inlor!5ati^n_i_s_avai lable which would preclude an 

interview, the individual should not b^c-^,^t^t^— E^i^^^^^— 

irZpinii:' ^'^ "^°^' ^^^ ^^^^ -^^ - interviewt';;t°" ^'^ 



■tif- 



reference orlL.^T '^^'^^^^tory information exists concerning a 

!^!^^.T , . f"*"'^^^' *" appropriate characterization of that 
individual should be reported and the nature and extent of aoolic.nh'^ 
association with that person should be developed. ^PPl-cant s 

*i„rf o= • /^^ In recording results of interviews with references 

TJJ °V / '"''"^" information as to the nature of thf 

tiif :r?h:^st?i;t!o":^' °^ P-fessional basis) and the length of 









r,nni,V» *• f ^^l ^^''^^^ interviews with persons knowledgeable about 
applicant (such as neighbors, co-workers, supervisors. listed 
references and listed associates), obtain identity of associates of 
app leant and ensure that persons other than those Le^Ified by 
applicant are interviewed. oennriea oy 

individual. 5f f^^'^ish name and identifying data concerning other 

fiaiceje) to FBliS J^^^^^'^^-th applicant such as roommates and 

Service! D,-v- J ^ / '^^''^ "^ Criminal Justice Information 
services Division records. 






■■•J?'' 



■ -jr.* 




EFFECTIVE: 05/27/94 






Sensitive - 
PRINTEDr 02/18/98 






■mm- 



^^B^mm 




Sensitive 



Manual^of Investigative Operations and Guidelines 



PAGE 17 -: 37 



17-6.9 



RelativesKSee MIOG. Part II, 17-3.4(2) (b) . 17-6.U.) 



parents. brotiers'anrsCurs'"other''r ^-^'"'^ ^^°""' ^^^^'*-"' 
residence as applicant or „ho'w«r!^ re atxves who occupy the same 

applicant's u^i^X. llyruTll tl^^^'^'^'^' "^^»^ ^^« 

sfrv In^'"'^"" through I Criminal Just e InfLmatron """" 

-Sgrvi ces. Divis i on records . However if th^l u H ■ 
an office devel^r7.rf"^Tr„r ~^'~^ •-~-"^- other investigation, 
part of a reHti^e nftifv F«T«n !'"'"^ criminal activity^on Ve— ^ 
report. "'*^^^*' ""^^^y ^BIRQ and include information in details of 

included in ^^S^^^^lr^^i^l/^^.tl^'lrr^ 

"TaSSi?!-:/-,--^-^ i^r '' -I --""--;s^:^tif:?::. 

interested offices alon^ii^H"'*• promptly notify FBIHQ and 
•c -k . " oJ^i^ices, along with necessary identifvinc da^a c7-.'i , 
If It IS determined data provided by apnlicant [«?« ! Similarly, 
advise FBIHQ and interested offices! ^^P^'""*^ '^ ^" "«■"' promptly 

concerning a ^ciose^elatKe°'■?h'"'°^'^'''^*''"'^'' '^^ is developed 

the appliLt sh"ld i:':rc;rtain:;'"'^' ^"' ''"^^"^ °' association with 



EFFECTIVE: 04/08/96 



■■■■■ 't v. . • 









'.* 



Js£. 















'S- 




17-6.10 Credit Agency Checks 

bureau p.r.c'ii, ^'r^BiH?"!;; rii; L'v^r"!':?.'' "f "'" — " 



Sensitive 
PRINTED: 02/18/98 










Sensitive 



Manual of Investigative Operations and Guidelines 
rart II -■ , 



PAGE 17 - 38 



covered bv thf R-^il^^ 'l-'" "?"""y to access records which are 
covered by the Right to Financial Privacy Act of 1978 Crppa^ 
(«.„,r,lly bank.. .,vi„,. ,„d U.n ....L^UoL. LLu ^^on. ,„d 

Of 1978, which must be executed by the interviewing Aeent The 

llltolZtZnfllT'' 'T ?'-'"' ''''-'''''' "Custo^r c;nsen and 
nni !a^ K ?/! "**" '° fi'^ancial Records." Copy of executed 
?o be re^::; d ''%^"^"jf'^f.t° «-^ o«-e where finLciarrec rds are 
authorni^"! ; ""^ «««tive use of this customer consent and 
_^M.t)iqpz^Uqn.^op.,_en_sure,app^ all financial 

s": uf^ro^^^ir' '^^r'f '^ ^^^"^^ ""-Th-ryuTposeTSldTTs^^ 
"Certificate LT '*^f. '**""• .^" addition. For« DOJ-461 captioned. 
197^" « ^^ Compliance with the Right to Financial Privacy A^t of 
alon; .ut^'j^lTelToV',' "supervisory official" and transLtUd 
recordrmav hf ohf ■ ^ financial institution before financial 
is an ab^cL? °"^^"«f-./he certification of compliance requirement 

unaer if.ttA. bee Part II, 23-6, of this manual, particularlv 
concerning method of identifying material which is incorporated in 



■ ■■ ;■,■■■■<?•,•*«>;. 



M 






EFFECTIVE: 08/28/91 




17 6.11 Law Enforcement Agency Checks 

(1) |ln all localities of residence, education anrf 
employment check the applicant's name agains fi es "f U;al Uw 
denartr; J^ff '": ' I ''"^ checks|are not to|be limited to pHce 
departments but I are to|include records of sheriffs' office, orither 
du y constitu ed authorities which cover an|area (i.e.. Sui^ary 

veilcle^'di-n' r^-"^"'"'" °"-* ''''''^'^ installation .aif^oTor 
vehicle administrations or equivalent agencies.) Where centralization 
of records on an areawide or statewide Lsis is in effect Ithosel 
recordslare. also|to|be reviewed. jSome law enforcemenragincies ' 
departmentalize their operations, making it necessary to check record, 

necessary da^f wh^fh^dC^Jlfii: ^^^^^^ tl^lt ^^^^ ,,, 

c-h^t-r-hrap^r-jT^^^^ 






.-ir 



Sensitive 
PRINTED: 02/18/98 







1 




Sensitive 

Manual^of Investigative Operations and Guideline, 

PAGE 17 - 39 

blotter, or case fil*. f^^ .^. ^^^^ existing court docket, 

sHouid It -"::ef:a:.:^j- i^-:-L^r:.^?::rlf L^a:rr:!^^^ : 

generic and inLf ?nUri"Lture"'%''' T'^ °" ^'^"«" "^^^^^^ -« 
disorderly conduct? Ui "ring eU ^"J^^'" °^ ^"'^^ --«- charges are 
sufficient merely o report f hat a^oi • T ^"*t^""». it is not 
charge, but the exact Se of annf-'"!" """' arrested on such a 
arrest must be ascertain.^ J ^PPl^"nfs activities resulting in 
encompass activi ies ran.f;. f "^^ °' disorderly conduct might 
exacT'nI^urVof7tf^f;h^^2^'-f^5"-^ 



exact nature~oT-s^,irnh%%%-iJ^^f-f^J^f^^^^ 

report. ascertained for inclusion in 

it is disclosed thr"oug? U: e^forc'el'nt"^' background investigation, if 

the subject of a current crimfn^r .'"''' ^" ^^^"^ ^^« applicant is 

the background investigator nab«r" ''*'.' ^°'^' '''' ''''" ''^'"''^ ^old 
escigation m abeyance and immediately notify FBIHQ. 

EFFECTIVE: 08/28/91 
17-6.12 Tax Matters 

questionable'^n^anfial'staJurco^''"'' '"' '""'^ *"^«" there is 
Federal Judgeships SsAsT^ concerning presidential appointments. 

Associate Aftorney'cenerll L^^^n? :;e°*'"'^ f '""^^ ^-"^^' 
heads members of'u.S. PaJ^le" ^^J" ior:;;ru'%'^\';;' ^^P"^-"^ 
and others as directed bv FBTHn ''^°" ^^Q U.S. Courts applicants, 
standing to auxiliary off ilL?* '^"^'^^^h questionable financial 

of IRS records required the L?'^"^^'" ^'^"'^'- "^"« ^ ^^-k 
requests. "quired, the interested agency will make necessary 

EFFECTIVE: 12/10/91 



Sensitive 
PRINTED: 02/18/98 








, Sensitive 

Manual^of Investigative Operations and Guidel 



mes 



17-6.13 



PAGE 17 - 




appropriate area nff,v« «» ec- *'»*""> security files of 
checked. handled clearance procedures should be 

nan,e should b^ cheaent'the'S's^'I^'"'""' "^"•'"' '""^ -PPHcant's 

Of residence, e.ploy^en? or eLatto^^fo^'' i/"'^' """^"« ^""^ "- 

applicant has been involved in anCF!^ ^ ["5?'^'»ati<>n that the 

the U.S. Attorneys Off^lL „Ul'Sr chec'Ci l^^'^' ^^f/-"^» ^^ 

name during other investigations where the a«n " ^ • ^P^^""''* 

in a sensitive position. regarSJe^s of wh!^h^^ ""^" ^° ^^ employed 

to receive a presidential a?Doint»L? ^ ^'^ "°^ ^*^* candidate i. 

Level II 161 investigation^a^i cer?« ' ^f ■ ^" *'^ ^^^^^ ^ ^"<i 

Administrative Office of JheTs?!?!? ^»^««tigations for the 

Justice. FBIHQ will instruct t'; f e^'in^fhe ! °'^"'"*"' °' 

as to which nonpresidential aDOointi^nf opening communication 

U.S. Attorney's Office? *PP°^"tment cases require checks at the 



Sensitive 
PRINTED: 02/18/98 





Sensitive 

Manual^of Investigative Operation, and Guidelines 

'- ■'' - PAGE 17 - 41 

bacKground aid'in£L:fu:rSe::i^J:rd;J-^«' f « applicant's 

be examined for any other lo!!!,? !„ • * ^ ® investigation should ,. , 

compiled concerning an ind vidua T,"^ "^"^^""<l'' could be 

profession, state assocUt ons or'n-J-""""" " ""'«*«**' ^" * 

to verify issuance of a license r'tHfa^r^^d^olT" '^ 'T'^' 

record of complaints or inv«c«-, •»,•-•• ^° determine if any 

Similarly, carefif La'y JHi Srd\°; T/'l ^^^'^'^^ ^he applicant! 

checks of Federal state and 1.^ f undertaken to ensure logical 

private sources (;.g'?\%tL^\^;s\^n!sTB:r::;r ^ri^f^' ^J-"^^^ " 
-bearing on an individual's character anrf f 'f c '"^°'^"'ation 
thoroughly-exVa^s t^r-Wh^-'r-r^-S^rn-;-^ 









^»« uusnxy exnausted. When a Hcensil^rw^TU chect«r T^"-- 
following statement must aooear. "ti,» -gency is cftecked. the 
licensing agency for (tvne of «: . ^bove-named agency is the 

8 gency for (type of profession) in the state (state name)." 

the deadline.^^advife^BlHo'of thi^f*^'"'^"""°' ^" completed within' 
the investig;tion The case can fhfn ^"^f^^P^^te other aspects of 
in a pending inac ive st"us and H f^li^^ed on tickler or placed 

forwarded to FBiSq when rec^i'd FBIhS wH "' n' ^u'"' "" ^' 

erom the other agenc^J lUl/li ;^-Jd:^wh:n^7i::o\:rai:f Sr^!- 

of records of^LoJhera^ncf i^ff^^^^^" - .<l-eloped from a review 
source and int'^ e" f ag;ncv ^^^nilf %'''"'''^ °' '''' °^^«^-^ 
the source, indicate reason^'a^nd'agr i^revaLa^tioTii' '^ ''r'\'/ 
person interviewed furnishes same information -r- T^"''- " 
report this information was preWousfy proW;:d^.';."°^^"""^ ^° 
If interviewee contradicts information attr Sufed t f>,°f^'' '^'""^• 
another agency, quote information froS ot"er agency" Ss'L?:""" '^ 
discrepancies with interviewee, and report intLvie^ee's ex;lan.^ • 
for discrepancies. Do not revoai ^^ :^i- ^ "^^e**®® ^ explanation 

of other agency should not be maSe know^; ° "' ""'"^'*- '^^^^^^^ 



EFFECTIVE: 07/19/93 



Sensitive 
PRINTED: 02/18/98 










Sensitive 



Manual of Investigative Operations and Guidel 
rart II ■,,,•• ' 



ines 



!l7-6.14( Civil Suits 



PAGE . 17 - 42 



applicant i/2 .*^*"^''«'^ information is developed indicating 
applicant is or has been a party to a civil t>„il « i^.! r 

*"8 applicant. Report succinct summary of suit. 

has occupied ^piblic offL'rmay^e named'" '°'"' 'll'''^^^^ "* """" "^o 
of the position held ^^L !LJ » '".* ""°''^'* °^ ""^'^^ ''y ""^'^ 
out in s'ummarv"fa:iL ^j;:? h Je%:it:":: -""l d T"- f-^^-.P-^t 
_yi^o|«,^clionu.ith_h^^^^^^^ 

indications are received such-a-;li^p^7^Ii^to%T^■e?iff- — 

llZTsll'/ """^"'' '' applicant, no further revL^'^ ^ d be 



••■5 ^557S" 






'gii 



,i*r 




EFFECTIVE: 01/18/91 



17-6.151 



Medical Records 



If background furnished or inv«'<«fi »=►,*«„ --j- *. 
under investigation has been treated fjr!-^! ^"**^"te8 person 
problem, verifv through nh„=- - f*''^''"^ physical or mental 

'edical'rr^ifr wheHeeS^re";" rinp:cui'l ""^'= * °"^'"''^« 
no investigation should be ^nd^rSerunfr^rio'rJru^urb-FBlHS! 






'asp 



EFFECTIVE: 01/18/91 



17-7 



FRAUD VIOLATIONS 






*^>^' 
•*?«»■ 






-•.■?:■,•- 




EFFECTIVE: 01/18/91 



Sensitive! 
PRINTED: 02/18/98 






mm 




Lnes 



Sensitive 

Par^II'*^.^"?-'**''''^ Operations and Guidelir 
17-7.1 Applicable Statutes ' 

(1) Title 5, use. Sections 3333 and 7311 

(2) Title 18. use, Sections 1001 and 1918 

EFFECTIVE: 01/18/91 



PAGE- 17 - 43 









17-7.2 




■ife 



Investigative Procedurej 



«isrepresentiJLns"f^aUr\':ila;L'\°"']'''r''"'^'''"^^^ 
however, in order that'ipl y Lg a^:ncv%a; f' P^r"'"' '" '''' "'^' 
case is to be presented adv^e FsfHn k ""/J^^ ^^ apprised of fact 
including intent to pre en? ous!^'' ^^'^''" °' pertinent facts, 
notified by FBIHQ. field w 11 he ^^V /°°" " employing agency is 
USA as early as feasible ta L^a ^^^ " "" "" ^« presented to 

he/she wouij ::t':";o;!ze;r':::L?^::"""^^"^-^^«-^"" ^" --^ 

an arrest for'Lu^R:;nesni'otSer"^ °' -^^--l o«enses. such as 

^;::sUti^r^^::r?"T^- r:ov:-:{:rn-::;i°r' "^ 

investigative report and are not presented to USA. *^ ^ * 

the applicant-type"i::L1ig:t!o"f 'Z'tll\l?''' ^'°^?"°"^ " ^"^ °^ 
fraud matter is^'resented L llsA add " a^d 1:^':?%^^:- ""'h- 
to character. Set forth in r»«„^h • .^*"° Against the Government" 
discussed. " ^°^ opinion of USA. and ensure venue 






-^ 






EFFECTIVE: 01/18/91 




Sensitive 
PRINTED: 02/18/98 













Sensitive 
Parrir ^ Investigative Operations and Guidel 



mes 



SECTION 18. AGREEMENTS AND COORDINATION BETWEEN FBI, MILITARY 
AND OTHER AGENCIES " roi, niLlTARY 



18-1 THE AGREEMENTS 




EFFECTIVE: 07/11/85 



18-2 MEMORANDUM OF UNDERSTANDING BETWEEN DOJ AND DOD 



CRIMES 
I "A. PURPOSE, SCOPE AND AUTHORITY 



Sensitive 
PRINTED: 02/18/98 






PAGE 18 - 1 '■# 



Oft.. .,,f^ r .":°f- -r j;: 0.%:; L:r:rs:?r '"Z"-' 
«:!%' iL"n:i't"°" '"^/"'""'"" "•^«-'"'"'" .s°::\:t 

Act of 1978, Title 5 Unitid <?h!r T. \ °' ^he Inspector General 
United Stat;s Coie, Section 301 '"''' ^'^'''"''' '' ^"'^ ^^"^ ^' 







wm 



Manual of Investigative 
Part II 



"B. POLICY 



Sensitive 



Operations and Guideli 



nes 



PAGE 18 - 











enforcement of federal ?:;! •„ th^i"^ r.r'""^^ responsibility for 
Department of Defense has e pons biUt^/'^Jr '^'"''^'^^ ^°-^»- ^he 
programs, operations and instaUaJinn.^ .1 ^^^ ^"^egrity of its 
Armed Forces. Prompt admi^^strl ive^^* '" '""^ discipline of the 
investigations within the two fJ^ T^ *"^ completion of 
the Uniform Code of SiH tary Just iL'" ''"'"'' °' limitations under 
to assume an important rU^^in.JerMTj:' *^!'^°^P"tment of Defense 
encourag^joinLand coordinated invI!J'^"'"^^ investigations. To 
cases where the ^ep^tten "of kffcf if f '^^^^^ 

responsibility for a matter rela?inrf!%r'n ^"^"^igative "^ 
should share information a^dcondS the ' ^?P"tment of Defense, it 
xnterested Department of DefeLTuJes^Ug^t^vrrg^^cyf '^ "''' ^^^ 

inflexible rules ^regar^Jnl ItT'""^ "o^ d^i^able to establish 
Defense and the Depfrtm ^f of Juslue'L J'^'"."' '""^ Department of 
they may have concurrent interest inf^ °. '""^ "*"" °^" """^^^ 
agreements within the spiHt of this mS^ "'■^^?«»«-ts and 
I to specific crimes or investigftio^s. "' P^-^-i^ible with respect 

[ "C. INVESTIGATIVE AND PROSECUTIVE JURISDICTION 

i "1. CRIMES ARISING FROM THE DEPARTMENT OF DEFi^SE OPERATIONS 

Personnel "'' """"P^^^" Involving the Department of Defense 

"The Department of Defense tn«o.t-- *. • 
to the FBI on receipt all sign!fxW auL:?^^^''^ ^^'^'^^^^ will refer 
conflict of interest involvij^f mLy or^^'w?^ °' ""^'"^^^ -"^^ 
Department of Defense. In all ciri,■«^^ civiUan personnel of the 
referral to the FBI. he Depaitme^t ofT/^"**" '^" ^"''J^^t of a 
concurrence of the Departmenror^L?" "" '""^'^ "^'^^i" the 
initiating any independe^HLestig: lo" lllUl'^"'' °f '""^ ^'^ ^«^-« 
under the Uniform Code of Military^^is^ice Jri'rV"^"^ action 
Defense is not satisfied with thlin^J- f: . ^^* Department of 

will be reviewed by the C^iinaJVv lol of't'hfr''"^ '""^ "^"^ 
Justice. "ivision of the Department of 

whether they accept ^^e^ref erred matter^? ^^ency promptly regarding 



Sensitive 
PRINTED: 02/18/98 






m: 






-'.hhKT- 




Sensitive 



Manual of Investigative Operations and Guidelines 
rart II 



PAGE 18 - 



I of such natters. 



m 




F«K., 1 "''* /T^'' Against the Department of Defense and Theft and 
Embezzlement of Government Property 

"The Department of Justice and the Department of Defense have 

Defense and theft and embezzlement of government property from the 
Department of Defense. The Department of Defense winnves^Late 
frauds against the Department of Defense and theft of government 

SefeL' ^nZr-'%°''"''"''^' °' °^'^"^«- "^— ^ Departmenf of 
-5^-f^Me_i^e^Ugatiy^ageji.cy_.iden^^ natter which, if developed 

with the United States Attorney or the Criminal Division, the 
Department of Justice, and the FBI field office. At the t m^ of this 
initial conference, criminal investigative responsibility wiJl be 

D:;:r?;r ^? s:v:r'-' -' '-''- '- conLuation ^it^^kr 

I "2. CRIMES COMMITTED ON MILITARY INSTALLATIONS 



a. 



Subject (s) can be Tried by Court-Martial or are Unknovm 

"Crimes (other than those covered by paragraph C.l.) 
committed on a military installation will be inJestfgafed by the 
?ommI t!f b "" investigative agency concerned'and. when 
committed by a person subject to the Uniform Code of Military Justice 
prosecuted by the Military Department concerned. The Department of 
sig^Hc^; cL^:"'' i-ediate notice to the Department of Just ce of 
significant cases in which an individual subject/victim is other than 
a military member or dependent thereof. 



"b. 



One or More Subjects cannot be Tried by Court-Martial 



"When a. crime (other than those covered by paragraph C 1 ) 

to"b:iie"L"?h°? %"i'''r -»^^^^-t-" --^ there is JeaSJe ^^ s 
to believe that it has been committed by a person or persons, some or 

til nf r V ri f"*'^"^ t° »^^« Uniform Code of Military Sus^^ce 

?^i! ^ \- ^° '^^* appropriate Department of Justice 

investigative agency unless the Department of Justice has reliev«rf fh« 



•A- 






^. 



ifly 



Sensitive 
PRINTED: 0i2/I8/98 



-'•.■■sa«.-'- 



._^V;^;f ^','^V 





Sensitive 



Manual of Investigative Operations and Guidelines 
Fart II , 



PAGE 18 - 












"a. Offense is Normally Tried by Court-Martial 

"Crimes (other than those covered bv oaraeraoh r 1 ^ 
commxtted outside a military installation by persons sSje;t to the 
Uniform Code of Military Justice which, normally! "e tried by 
court-martial will be investigated and prosecuted Sy the Department of 
Defense. The Department of Defense will provide immediate n^rof 
iZif •";' ""* ''^ ^^" appropriate Department of Justice 
^!rf »f ^■*^'"'^- J""^ D«P"tment of Defense will provide 
immediate notice m all cases where one or more subiects is not ..nrf«n 
m.U?ary__jurisdi^tJj,^^^^^ the Department of Just ce has rel eved 
^^^:^^'''-- '' th^ep^rtinF-Te^^itnf^i^itTir-- 



I 



"b. 




Crimes Relating to Scheduled Military Activities 



I 



"Crimes relating to scheduled military activities outside of 
a ml\tary installation, such as organized maneuvers in ih!ch persons 
subject to he Uniform Code of Military Justice are suspects shaU Je 

hIZH/" '\t°'":il'^'' °" * ""'"'^^'y installation for purposes of tJe 
Memorandum. The FBI or other Department of Justice investigative 

Scute's Atto"'""' i-isdiction with the concurrence Jf the gn H 
States Attorney or the Criminal Division. Department of Justice! 

"c. Offense is not Normally Tried by Court-Martial 

crime rr^fhl'l^^!! ^^tl^ "^ reasonable grounds to believe that a Federal 
by cour?-mart al" It "^^^^^''^ paragraph C.l.) normally not tried 
Dy court martial, has been committed outside a military installafinn 
by a person subject to the Uniform Code of Military "stcejie 

c:srtnhelo'''"'%'"r'''^"'^'"^ agency win imiedUu"'reJer the 
case to the appropriate Department of Justice investigative aaencv 

De :«:« Of ?!r'^'^"^",^°^ ^-^ice has relieved the Departml^t of ^ 
Defense of the reporting requirement for that type o? class of crime, 

"D. REFERRALS AND INVESTIGATIVE ASSISTANCE 

"1. REFERRALS 



fr«n»f., ?-^r"^f: notices, rep'orts. requests and the general 
lltllenthi fSi r Jr "n'" J"^" Memorandum normally should be 
between the FBI or other Department of Justice investigative aeencv 

iTeullir'^'^'' °^^"^"^"^ °' °«^«"" investigativfa^r^cy':? ?he 



Sensitive 
PRINTED: 02/18/98 






SB 






SensitiveV 
?aTn°- >"''''"*'"''' Operations and Guidelines 



PAGE 18 - 



accept a reffrred'Sttrr"^ H^^'^^r ^"^"tigative agency does not " 
investiMtive n!n!v fr ^he referring Department of befense 
investigative agency then, or subsequently, believes that *.v,-w««.- 
exists supporting prosecution before civiHan courts, f he ZtrZLt 

or the CriJn:n-:-"-'"""' '""^ "" '^ ^^« United'states I? ^^^J 
or the Criminal Division. Department of Justice, for review. '^"'"^ 

"2. INVESTIGATIVE ASSISTANCE 

"E. PROSECUTION OF CASES 

"1. With the concurrence of the Department of Defense th» 
Department of Justice will designate such Department of Sef;nse 

facilitated by the Department of Defense attorneys. 

"2. The Department of Justice will insti^l.^o ^;„.-i ►• 

to facilitate .uch action.. "".Provide appropr.al. aa.i.tanc. 

Of thl'oepa'^LL'rnTLnle'p'^irtri"??^?-' 1'J."'"^? '!" "'- 
individual aubjact to the UniLrrc^Se "f 'itl'ua'rrSi'i:^!'"" " 

ca... and inva.tisation. i„ «?de. to o«ec ve "'c o.li": :°!J7: f!? 
eivil, criminal and administrative remedies. "orainat. the uae of 

"F. MISCELLANEOUS MATTERS 

"1. THE DEPARTMENT OF DEFENSE ADMINISTRATIVE ACTIONS 

"Nothing in this Memorandum limits the Department of Defense 



■M 



M 



■:^^: 



->- 









Sensitive 
PRINTED: 02/18/98 



.m. 









SS^BBSmi 





Siensitive 
Manual of Investigative Operations and Guidelines 

Fart II ■•:-'■: 



PAGE 18- 6. ,; 



takeJ hvfi! n ""f"^^!*^ t"^ ^"PP<"^t of administrative actions to ,be - - 
taken by the Department of Defense. However, the Department of 
Defen e invest.gat ve agencies wiir coordinate all sSch investigation, 
obtaff ^H^^'"'"^*^" Department of Justice prosecutive agency aS 
obtain the concurrence of the Department of Justice prosecutor or fh« 
a^-; rr'.°' ^-^-V -vestigative agency prior to cond't ^g ^ny ' 
J^e^; . r-'"" ^"^««txgat on during the pendency of the criminal 
investigation or prosecution. 



"2. 



SPECIAL UNIFORM CODE OF MILITARY JUSTICE FACTORS 
^l?i sXt^lipns^Hhere^n^di_vl^ 



Code Of Military Justice is a suspect in any cTime'Tor which a 
Department of Justice investigative agency has assumed Jurisdiction 
If a Depar ment of Defense investigative agency believe [haJ the 
crime involves special factors relating to the administration and 
discipline of the Armed Forces that would justify its invesU.aJion 
the Department of Defense investigative agency wHl adtile tie ' 
appropriate Department of Justice investigative agency or the 
Department of Justice prosecuting authorities of Ihese ?L ors 
Inves iga ion of such a crime may be undertaken by the appropriate 
S:p%"E::"f o1 -f-:/-----^- agency with th^e concS^r^r^? the 



• ..-'■VA".^, 



•^M- 



M 






"3. ORGANIZED CRIME 




"The Department of Defense investigative agencies will 
provide to the FBI all information coUected^uringSn^ma course 
of agency operatons pertaining to the element genfraUy J^oS^ as 

nonf^^i^ " "' '"='"''"« '°'^ traditional (d Cosa Nostra) and 
nontraditional organizations whether or not the matter is conaid^roH 
prosecutable. The FBI should be notified of any ^nvLt gation 

"4. DEPARTMENT OF JUSTICE NOTIFICATION TO DEPARTMENT OF DEFENSF 
INVESTIGATIVE AGENCIES arAKintwT OF DEFENSE 

"a. The Department of Justice investigative aaencies «ni 
promptly notify the appropriate Department of DefensIinJest gitlii 
!nvLT- ^• ' ^"i^^!^^^" °f the Department of Defense rela e^ 
i^ffn!'® r"' f "^ are predicated on other than a Department of 
Defense referral except in those rare instances where notification 
might endanger agents or adversely affect the investtgaJ ^n Jw 
Department of Justice investigative agencies will alsfnotify the 
Department of Defense of all allegations of the Departmen of defense 



M^ 


















Sensitive 
PRINTED: 02/18/98 






lJ1^..',^U...,.»...1..^ L-1..JI. ■l.„,f ff|^ 




Sensitive 



Manual of Investigative Operations and Guidel 
Part II ,;' 



ines 



related crimes where investigation is not initiated 
or Justice. 



PAGE 18 
by the Department 







"?,■ "^*'" "quest, the Department of Justice investigative 

reU i^^ to hrr'%''"':'^^'"'"* "P*'^^' <"> -11 investig^ on ' 
relating to the Department of Defense unless the circumstances 
indicate such reporting would be inappropriate. ="»"«""« 




"d. If. judicial or administrative action is beinir 
considered by the Department of Defense, the Departm^^t o Ltice 
will, upon written request, provide existing detailed investigative 
data and documents (less any Federal grand jury material df^fT.cr 

llTnT.l I- ".agent testimony for use in judicial or 

administrative proceedings, consistent with Department of Justice 
!Ln ^' ^t^''^' regulations. The ultimate use of the information 
shall be subject to the concurrence of the Federal prosecutor during 
the pendency of any related investigation or prosecution? ^ 

I "5. TECHNICAL ASSISTANCE 

"a. The Department of Justice will provide to the 
Department of Defense all technical services normally available to 
Federal investigative agencies. ^ available to 

the DeDart2:t J^%°"P-^'^°?'^t of Defense will provide assistance to 
the Department of Justice in matters not relating to the Deoartmenl- «f 
Defense as permitted by law and implementing regulations. ^ 

I "6. JOINT INVESTIGATIONS 

Justice ,-nv!%'^\-*'^ "''^"^ authorized by law. the Department of 
invL??.«? ! * ""* agencies and the Department of Defense 
investigative agencies may agree to enter into Joint investigative 
endeavors, including undercover operations, in appropriate 

^oart^^T'^'r «°!'^^-'.*ll ^^-^ investigations'SiU be subject to 
Department of Justice guidelines. »"ujecL to 

"b. The Department of Defense, in the conduct of anv 
investiga ion that might lead to prosecution in Federal District 
Court, will conduct the investigation consistent with any Department 









't 



Sensitive 
PRINTED: 02/18/98 



• *^ . J'- -t'l; ■ 



T iiiiMwiim>»aiii^ii^ 



.■l.hM»W.,L^h^l'„....-L..^..J..i..U„r,^Wl!Bi-iMp^^ 





Sensitive 



Manual of Investigative Operations and Guidelines 
Part II ' ' 



'•'-C. 



PAGE 18- 8 



of Justice guidelines: The Department of Justice shall provide copies 
of all relevant guidelines and their revisions. P « loe copies 

"7. APPREHENSION OF SUSPECTS 

»„H fh. n "^*'^'=^*"^ent authorized by law. the Department of Justice 

a^fi abl^'?«^r"Vf °"''"" "^'' "^^^ P^^-Pt^y '^^li^" " "^l^* 
!w: ^v. -J Z^^'' suspects, accused individuals and witnesses 
where authority to investigate the crimes involved is lodged in the 
other Department. This MOU neither expands nor limits th! authority 

custod-!l ^T''"""f .'° ^"'°"" apprehensions, searches, seizure, or 
-custodial-interrogations . . -i wi 



"G. EXCEPTION 

fixed"hI;';>."'?07o"f'^'° '^*^^ ""'^ ^"^"^ ^^^ investigative authority now 
fixed by the 1979 'Agreement Governing the Conduct of the Defense 

^^S^^n'' Counterintelligence Activities in Conjunction with the 
Federal Bureau of Investigation' and the 1983 Memorandum of 
Understanding between the Department of Defense, the Department of 
Justice and the FBI concerning 'Use of Federal Military Force in 
Domestic Terrorist Incidents.' 









'.rsF' 




"Signed: 

/a/ William French Smith 
Attorney General 
United States Department 
of Justice 

Date: Aug 14. 1984 



EFFECTIVE: 07/11/85 



/s/ Caspar W. Weinberger 
Secretary of Defense 
United States Department 
of Defense 

Date: August 22, 1984" I 



18-2.1 



Deleted 



EFFECTIVE: 07/11/85 



18-2.1.1 



peletedl 



:V' 



Sensitive ^ 
PRINTED: 02/18/98 






SBSS^^SSSBSSSBBBS? 




Sensitive 



Manual of Investigative Operations and Guideline* 



EFFECTIVE: 07/11/85 



PAGE 18 - 



'/A 



M- 



I 18-2.1.2 iDeletedl 



EFFECTIVE: 07/11/85 



•|ft 



18-2.1.3 iDeletedl 



EFFECTIVE: 07/11/85 



18-3 




MEMORANDUM OF UNDERSTANDING ON MILITARY DESERTERS BETWEEN 
THE FEDERAL BUREAU OF INVESTIGATION (FBI) AND THE 
DEPARTMENT OF DEFENSE (DOD) 



^^i' 

/M 



. . ,. ^^* following agreement between the FBI and DOD relative 

to investigations concerning military deserters was approved and 
entered into: 

THF prnTTDA, 1'^°'^.'^°"" °^ UNDERSTANDING ON MILITARY DESERTERS BETWEEN 

Defense Zd^^ investigation (fbi) and the department of 

"Desertion is a most serious offense under the Uniform Code of Military 
Justice. Vigorous efforts to apprehend deserters are essential in 
desertin T " '^"^'■^^" ^" military control and to deter others from 

"It is, therefore, agreed that: 

"(1) Each Military Department will continue to enter 
information on each deserter into the National Crime Information 
Center Computer. This information will be kept current by the 
Military Departments and remain available to law enforcement officials 
at the national, state, and local levels as long as the individual i, 
aosenc. 

"(2) Responses to inquiries from any law enforcement 
XTL ^■"''f ^"" *"y °ther investigation of offense will disclose 

that the subject of the inquiry is wanted by a Military Department. 



Sensitive 
PRINTED: 02/18/98 



-m 



- m 



II SSBB^S^BSSSSB^ 




§ 





Sensitive 



a8.,-«f M-T-Z'^^^J''* ^^^ Identification Division will continue to 

notice services fir ordl^frv L % '^'^"^ Departments wanted flash 

the AttacL nt These ^rWces "in 'b:""^'"? '/" °"^"^" ^^''^ ^ 
the military's entrv of T^l! . T initiated automatically upon 

, of the NatiL:i^CHre^^?of::Uon";:nt:r?^' '^ ''' "^"^^^ Persons^ile 

-:irS::;c::i^jr^^^^^ 

cases ^h- MJ i • »■ r. " matcers listed on the Attachment. In such 
cases, the Military Department Headquarters will provide the FBI 
Headquarters with written notice which will specify tJeserL^s 
Sufnrtice "'h-'T ^^'^"-tion. of which tie abseiue is'u pected 
Such notice indicates that appropriate judicial or administrativ! 
disposition is contemplated upon return to military control Z„ 
receipt of such notice, the FBI will i»in.7l \.^ . '^°^ 

The FBI w,-ii i,« ,"^^'=^' >■"« f»i will initiate an active investigation. 

sti^f jy-1- r-rfuSi-ri? :i fK i^^i^^;^^^- - ^ 

.re not .it^'^l^^^^^ ^^'l^r^^^^Tl^;^''' 

few instances will be closely mo:??":; b^the Hi t^ ne^^^tme:?' 

with factual detail explaining the seriousness of the offense in 
order to support an FBI investigation. ottense. m 

desertion Jl^f ^''' T !^^^ undertake its own program to deter 
desertion and to apprehend deserters. The Military Denar^™*.n^.^.• 1 1 
engage in desertion prevention programs and wi cLpeJ:[r:?t; ^ ' 
Control ""'"' °""'^'^ '" the. return of deserters'to mnlury 

military perl'L[\%:^Ltei^f";nr:f'the":t?::iT to apprehend 
subsequently escape military confinement ""''' "'^'^'^^ "•^•' 

(Amendment 



PRINTED: 02/18/98. 










Manual^of Investigative Operations and Guidelines "1 

.-, - ■ PAGE 18 -, 10 -iM 






'^# 









Si- 



■S3* 
J- 



.'■."■"■*..■■ I- '* .V '* • -.. . ' ''*',-^3Wr-V 

Sensitive .. .'^ .■ - ..•. • •'.. ,«^i. 



■"^- '—''■'-" ^— ■-' --..-n iMaW^^ ^^y 



.-■'.id'.^:^ 




Sensitive 



Manual of Investigative Operations and Guidelines 
Part ;^ II ■ -•"krv.;-; • ^ .:■■,-. „v. ■ ■ :. \ 

I occurs subsequent to the date this amendment is signed. 



PAGE 18 - 11 



March 19, 1979 
Date 



/s/ William H. Webster 
For the FBI 
Director 















-'kS'S" 






May 9, 1979 
Date 



/s/ Robert B. Pirie, Jr. 
For the DOD 
Assistant Secretary of 
Defense ( Ma.npoweiv,_ _^ 



Reserve Affairs & 
Logistics) 



"General 




■'% 




"Desertion of officers. 



Desertion of those who have had access to certain classified defense 
information which if disclosed could, in the view of the Military 
Department concerned, jeopardize the security interests of the United 
States. 



"Art. 



82 
90 



91 

92 

99 

100 



"Violations of the Uniform Code of Military Justice 

Soliciting or advising another to desert or to mutiny, or 
to commit misbehavior before the enemy. Sedition. 

Striking, drawing or lifting up any weapon or offering any 
violence to his superior commissioned officer in the 
execution of his office. 

Striking or otherwise assaulting a warrant officer or a 
noncommissioned officer or petty officer while in the 
execution of his office. 

Disclosure of classified defense information. 

Misbehavior before the enemy. 

Subordinate compelling surrender. 



Sensitive ' 
PRINTED: 02/18/98 












i'-'- 



■■W 



>.•• 







l iW P 



■''':;s>. 




-=t 



••V ■■■ t? ■ 



'tn ;■■; '.^^ 




Sensitive 
Hanual^of Investigative Operations and Guidelines 



" 103 
" 104 
" 106 



PAGE 18 - 12 



Looting and pillaging. 
Aiding the, enemy. . 
Spying. 



"Art. 116 Riot. 

118 Murder. 



119 Manslaughter, 



120 
122 
124 
125 

126 
127 
128 

134 




Rape. — __ . _ 

Robbery, 
Maiming. 

Arson. 
Extortion. 

orMs'of?ice! """^"--'^ °«-- -t in the execution 

Assault: 

Indecent. 

With intent to commit voluntary manslaughter, robbery 
sodomy, arson or burglary. roooery, 

With intent to commit housebreaking. 
With intent to commit murder or rape. 
Firearm, discharging: 

"'Zill^r r°?.:"""'"" """" ci„„.,t.„c,. a. to .^ 
Homicide, negligent. 



Sensitive 
PRINTED: 02/18/98 









'3fe 



•■>'-*<lVA, 



■■'*■■( hi. • 












5 "i-'iMjr. 



■X¥ 







' ^'^ ■'■"'■" ^ ''■^f^'rr^^^-^r^^^mS^^^^f ffm. 



i.^'ailsL*-!Si.^-.^^Y^_ 



Manual of 
. Part ^11,.;; 



" 80 
81 



Sensitive 



Investigative Operations and Guideli 

^- ' ^" PAGE 18 - 

'Irj'Lr" " """"" "i". a child under th. ig, ,t 



nes 



13 



Attempting to commit any of the above. 
Conspiracy to commit any of the above." 






t. 



EFFECTIVE: 06/08/79 



18-4 





MEMORANDUM OF UNDERSTANDING "b^TV^ DoTTl^C^Isfiu^RD^ 



between the Sp^artmenrs^of^Jis'tTf ""/PP"-««i »-^ -tered into 
investigation and prosecution of . • ^"^"^?°^tation relative to the 
-S. coast Guard s^^l:^^^ ^^ ^^^^^^^^-J-^ 

JUSTICE AND S?S?I0N Sf X'? .^^^^^'^ ^«^ DEPARTMENTS OF 
AND PROSECUTION orStJES OVER ^1^^^ S'^nf ^ ""^ """^ INVESTIGATION 
CONCURRENT JURISDICTION ^"° DEPARTMENTS HAVE 

_„^, , ^'ifhereas, certain crimes committed bv Coast r,,a..^ 

p" c^ d%"y^Co^Lt°G;ar%"?^^°^" '^'^ ^' ^''''^ ^^"icX be 
authorities V?h"Ved^^^'c:X?anT" ^'^^ '°^^ '' '^ ^^'^^-" 

administrati:n^"nisL>iU"o%°^?^rC^asrG:arr"*'^'^ 
types of crimes committed by its personnel h^ "?V^"» 'hat certain 
service and prosecuted before CoastT»;; be investigated by that 
types of crimes committed bv such !•?> "^^^tary tribunals other 
investigated by civil author," f" "^^^tary personnel should be 
tribunals; and ^"thorxties and prosecuted before civil 

impose inflexme"r"ies'to'd:t:rSnr?h'''' '' t'- -^^--»'1« to 
the civilian and Coast G^rf mi HUry'^tho'ritier' T^^-^'^lity of 
over which they may have concurrln?^ authorities as to each crime 

arrangements an'd ag^e::en?;":a";^T'„Jce":arrii?h'res''%' j"'""*^ 
crimes or investigations.' and "^"e^sary with respect to specific 



... o.....r:r";„-%-:.- '(^:::? r°r:rrfHr.--f 



ce and 
areas 



^^ 



■ J3r 



. ?*.» 



■■4I-' 



-J.-,V'- 



Sensitive 
PRINTED: 02/18/98 









^^ams^^m 





I 




Sensitive 



«a„u.J ,, I„v,.tig,tiv. Operation, and Cuid.lin.. 



•ak. the inVMti.ation^ninr^?J J" ; •."""■"■•l"'- <■'•«' '• 
.^i£craft_and i;ssels7!' ZZl'lt Zj^'-^'lV^ installations (including 



to the Uniform C^i^'^rMU a y' L^Ji ^ "^ ^""^ ^^"°""«^ ^^^^^ 
prosecuted by the Coast Guard if the Co JJ r ! ^";'"txgated and 
that there is a reasonable Uk^liiLd^ha only cL'src' determination 
subject to the Uniform Code of Militarv jL??!^ ' "*'"'* P*""'"*^! 
crime as principals or accessori^, ^ Justice are involved in such 
cases, that there is no vict!ri?h* ^"".t' ^""^^ ^" extraordinary 
the Uniform Code of MUitary Jus Jce ^"" P"^°"^ ^^^^ "« «"bject to 
or members of a house^o d o^ »i UryL civir '"' ''"' ^^P^^^-^s 
on the installation. Unless Tich a LfL™ J- Personnel residing 

Guard Shall promptly advisrthrPedera ":^;a;\°f llT.t'' f'^ '"^^ 
crime committed on a militarv in«^=,1 1 1^ • ^! Investigation of any 
investigative authority of the FeleJafr" T"" "^"^ " "^^^^^ ^he 
Federal Bureau of Investifation sh!n • ^'^f" °^ Investigation, The 

for in the first sentenr* r,f t-u- '='^^". ^^ the determination provided 
Guard, it shal pro'paradviselhe'S"";' t' "^^^ ^^ ^"^^ C°"t 
any crime committed on a militarv Lrr»n\ •"''"*" °' Investigation of 
victim who is not suMect to fh7n -f ^'''°" '" "^^""^ there is a 

bona fide depende'nrJj^Lbe^r' ^hr^oTsehord^oVmJ j'r^ '"'^"^ " ^ 
personnel residing on the install^t" "*'""*»°ld of military or civilian 

investigating the^rime be^^se it Z b '5%' '^? "^""^ ^""'^ i" 
extraordinary TV,, r ^®""** ^t has been determined to be 

Burea^o i;v;stlg:ti:rihen:: '"^t'' '""^"^ ^^^^^^ '^^^ ^«<^«"1 
involves fraud agf ins rthe^!' ''^%"^»«' «"Pt in minor offenses. 
f>.«.*t e against the government, misapprooriation ,-«m,- 
theft of government property or funds or is «f • °?' "^''"V' °'^ 
Buch crimes shall be investigated bvthrr« t r 'T^" "**^"''«- ^U 
receives prompt advice that fh!n.^ . 5 ""^ ^""^""^ ""^«" it 
that the crime shouU be !Lesti«?:rbrh'%':;'"" ^" determined 
Investigation and that th: ^e" ffBureL Jf in^ve"?- '?^'*" °' 
undertake the investieation f^- tt "*" °^ Investigation will 

. investigation for the purpose of prosecution in the 






-.•-';».■!■■■ 
'■Ki.,'fJ. 



m 



:m 






Part II 0—-=. ^i^crauions and Guidelines "J^i 

PAGE 18-14 






s:?- 



■■*r 

4 









m- 






•ffcr 



•■"^ 5j?a 



Sensitive '^^^^■ 

PRINTED: 02/18/98 



ggg^^^lBMBg 










. i^:^ 




^..* ' ■ ■■••,- .J.-. - ■ -'.-■ ■• ■ .-.■.■ '*4%S'ja''- 

•, ■ ••: -. .^■.'■-■'■■■^-■. ■• . ., ■ ■ , ■ - - ■ ■'■ ■ . •■■••^Oilm 

•: ■ ■■--■^ '■'.'■ ' '-.O '■■■■-■ ■ .'■ •■-^^^-^^-^ .-. .--^^ 

■ v ..,,5. Sensitiv© ' '-. .. -^^^m' 

■ ..: %, ..... .. • ."., .^ •-.'r^.W 

:■- . ■ - . . . ' -;■■-■:■■ ,»«§ 

^nu.l^of Investigative Operation, .„„ Guideline. ■; /^ 

civilfcourts.- -^. ., ■- . ■ ■■•.,.■ ■;.■"■■• ■■'=.;*-.■■ . ;Sg 
"2. 



Exeepta. herein,! urindi^tlH'" ?f "•' °' "'"">' i»»t=ll«t""«. 

-iuL, i„.t:julL"a:"^;?: i;ir'ii?j!r!>,r-;i::tj,:?.'::^- °' 

i"":v:jvra:'a'':aL1r ' -:'"!." '■""'•«•"•" ^^SnwKid, there 

paragraph 1 above shall apply, unless persons not subject to the 
Uniform Code of Military Justice are involved as principals 
accessories or victims. pnncipais, 

"If, however, there is involved as a suspect or as an 
accused xn any crime committed outside of a military InstaLaUon and 
Ini';?^ ":''''" '^' investigative authority of the Fed^" BirearoJ 

.M -^ T ^"^ '^ ^^* ^''"^ ^"^'■'l authorities believe thafthe 

SI "pUne of%hrr'\'r'°r "'^''"« ^° t^« administr:tron :L 
discipline of the Coast Guard which would justify investi^afinn h« 

them for the purpose of prosecution before^a C^astSu^J mi t'rv'^ 

LiesT :^ ''' "^fJ- '""P"y "''^'" t^^ ^^'^-^l Bureau o?"^ 
Investigation of the crime and indicate their views on the matter 
Investigation of such a crime may> be undertaken by the Coast Guar^ 
mlitary authorities if the Department of Justice agrees 

• . ^. ... "^' Transfer of investigative authority. An 
lnvL% f% • '°^^ °' '"^^ '°"^ ^""<^ "^-h h« iniUateS an 

Mr£B e^S^^^^^^^ R ;r:r L-'^UivThid-it 
View./ BA.re:.':«%:::e:n-?j.'C"L^'trrr5;f?i::%„i''^ »' "• 

L'rnIL"'.":"" *'"" """■"■ '"-''«'t^ve a:tho:*E;"ar?hen b. 



^.'S't?:^ 



■ ,^■..»^.■ 



■*i- 















•, •■-.i.'S:?. 



Sensitive.-(v-^" " -^^^ 

PRINTED: 02/18/98,, . t'^ 




^^-^•-'■•irilH'il^i, l | 



SM 



^sm 



..•■' -• 



Sensitive 



Manual^of Investigative Operation, and Guidelines 



PAGE . 18 - 16 









■ -^m^ 










aoDli«f,-„« '>«"«ver possible, decisions with respect to the 

suspects and accused individual, if a^tij^Uy to i„ve uIaf.":S" 

"Nothing in this memorandum shall prevent th- roa«h r,.» -. 
from promot arreaf an»4 /i.t-..,!-- «; F'^wvenL tne Loast Guard 

rr;jr?:d:L!£ a" K^^^^^^^^^^^^ 

pursuant to tHillZrlLlZ"^"'"' " """ ""°° " "'-"" 



"Approved: 

/s/ Ramsey Clark 

Ramsey Clark 
Attorney General 

Date: 9 October 1967 



/s/ Alan S. Boyd 

Alan S. Boyd 

Secretary of Transportation 



Date: 24 October 1967' 






.''If 















.'^sii^ 




EFFECTIVE: 01/31/78 



Sensitive . 
PRINTED: 02/18/98 






';*VV 



BH^g 



^^^? 




Sensitive 
Parril"^ ^"''"^^«*"^« Operation, and Guidelines 



18-4.1 



FBI Interpretation of Memorandum of . Understanding 



PAGE 18 - 



.. .- 5^^ ^^^' agreement is similar in all resnect- fo hh« 
agreement between the Departments of Justie« =ni n * ^ 

investigation and ProsecStiono military "rs'lel'^fJh"""^"* '^* 
set forth above La the same a« n,I ! ^ personnel, (The agreement 

between the Departments "justce an^^ "''"' P"viously existed 

signed in October, m?. because the Colir?"''''; ^ "«''/««ement was 

the Department of Trans^ortati" rather ?Ln"th'? T "^^^ ^ ^""^ °' 



■ - - ^ 


■ ■■—■ .■m.. 




s^^ 




.■'ii-iV 




, -Ss'-.- 




• , -fi? 




■•.: jm( 




. ■.^■cx^; 


' ' • 


'■''im 






- 










•*?!-S^ 


- 17 








-!.;»• 




: ii 




'--f 



(2) 



various USAs or mifiUry'olf l:!:i:1:raUvrt: ti"^''''" "''" ^"^ 
must be immediately advise" "^^^ive to thxs agreement. FBIHQ 



-•;• 



'•'if S'v 




EFFECTIVE: 05/08/79 



18-4.2 



MEMORANDUM OF UNDERSTANDING BETWEEN THE DIRECTOR PKnFPAT 
BUREAU OF INVESTIGATION AND COMMANDAN?" Sni^eJ STAGES 

sSppL^Tco?'?'?!;^"^^ ^°"^^ °^ MUTUAl'SsS IN 
SUPPORT OF COAST GUARD/FEDERAL BUREAU OF INVESTIGATION 

OPERATIONS TO COUNTERACT TERRORIST ACTIVITIES tna 
MARITIME ENVIRONMENT ««'J«^'>T ACTIVITIES IN A 

between th^ Inr f^'J^""^"* ^Sreement was approved and entered into 
counteract terrorist activifLs^:?r.^LTel'!r^:^^^^^^ 

:f li-tr^^ -^?he";^;r^?nL^r?h: ^^^.. 
fiJ:-rp;:i,-ir:r::;2iS^^ 

lo^a^L L • f i* Jnaintaxns a large number of strateeicallv 
located Special Weapons and Tactics teams (SWAT) Coast Pm^^!^ 
personnel are trained to react to law enforcemen activ ties Jn a 
r" nrto'a^r"'"'' r'^i' '•^^ ^^ ^" P«"--l 'ho ":« s^e^mcauy 

confrontation scenarios!^The ^L^Z^^^^ "e^TSo^-^L in 



Sensitive 
PRINTED: 02/18/98 



■.!«'- 



# 
*• 






„■.,* 



'm^ 



'^~M. 









■Ji-:- 



^n 



BB9 



,._,- ., .«,-. 




I 



Sensitive 






^Manual Of Investigative Operations and Guideli 
rart ,11 v-,.-/'VS"^"."':.'^'^'" - ■••-.- -■'■■'.■,. - ... 



nes 

• .■^.;^;.. i;,' '■*• ■-;i;5;~;-„ •■;; ; „■■= "^v - ^.\ ■■-.., ■ _, -.; '';"""i-.- .,.. page is 

terrorist activu.e. involving such targets ., offshore olatform. 

Zlu' f"a?L'"";""- "'"'f"- "»'""' «" <!^« ?«"'ni: -and • 
vessels, rioating nuclear oower nl9n^e it c .,.•.« • - — »— 
nn.-hs.^ o*-»». • • ^. r? i'"*'er piancs, U.S. or foreign vessels within 

^.i^r^^*^f^^rf{r;^i^'ts^::^fS^ 

making this agreement will provide mutual support to each othfr i^ 
situations involving terrorist activiH«. til I "^^ /ach other m 
j-v,.!- «- 1. * .7 '-"^'^orisc activities, threatened or real, and 
that each Agency will take necessary steps to establish local • 

aL%"d'tLrL';?""/°i '""'''"'"' '^" agreement. It is further 
^« ? 5 ^! continued planning by the two concerned Agencies will 

o^ r«i ?*''\''^^'"'"' "' " '^'"'''^ communications, co^andaii 
control policy between Coast Guard Districts and FBI Region^? offices., 

. .,• ^ . "t.^"^^ objective of this agreement is to insure a 

en^w':": :? 1 rtLr° T-"'""' 1'"°'''' activities in ?he maritime 
eliii^atrHli ■ ' '' "Pected that this agreement will serve- to 
eliminate delays m response time and insure continued develonalnrof 
procedures and contingency plans to counteract terrorist IctiWties in 
the maritime environment. "^'^onsL accivicies in 



- 18 '. 



/s/ John B. Hayes 

John B. Hayes 

Commandant 

United States Coast Guard 



Date: April 17, 1979 



EFFECTIVE: 05/08/79 



/s/ William H. Webst 



er 



William H. Webster 

Director 

Federal Bureau of 

Investigation 

Date: March 23, 1979" 












■ ^ 






'"^V^*- 









m. 




Sensitive 
PRINTED: 02/18/98 



-vim. 







Sensitive 
Manual^of Investigative Operations and Guidelines 
fl8-A.3 FBI INTERPRETATION OF MEMORANDUM OF UNDERSTANDING 

responsibilities on'Jhe'hLh*f;as""i ^""'.^" ""^ '^^ enforcement 
jurisdiction of the United tf? '" "*'"' '"''^'^^^^ to the 
Sections 2^nd 8A the FM haf ^w"' f^''^*'*' ^^ ^'"« ^^^ "^C. 
the Criminal Division Depar?l^t o'? he position, with the support of 

investigative authority over ^e^tain . ' "' '''*' '^" '''' "^^ P^^^^V 
Additionally, the United States I?J "^5 "^°" '^'^ '^^^^ ""' 
9-1.200. et seq tha? the FBI L ^"""f^' "^"^^^^ indicates at Section 
all the „ariti2e c^^ ^^^^V^]^ ,r:^li^^ — -^ 



• 


,;■ - - 'i- 


■■'%.-- 


■•?- .' '.-, 


;,: •.;!"::k:' 









'■ 


:■'' •.-:-.%s»h- 








'T. ■ 




ERSTANDIN< 


PAGE . 

3 


18 - 


19. 






terrorist atha^v= i„ -1° ' ^° * Minuted situation, e.g.. 

Unders Unding basi anv""; :riT'"""^"'- ''''' M-orandu's.'of 
Coast Guard fnd?B?JiL?r^ ''''^'' cooperation between the U.S. 

hostage negotiators 111 , "^"."' *"' ^"'^" ^S"^« teatns and 
attark! "7*'^^"°ff' and Its application is limited to terrorisf 
attacks. CooDe^a^I nn in .-«.--j •. • . "lifccvi to Lerrorisc 

the High seas^ars--i::!"^b::e:r:;--?.rj:-^ri::!r:bie. 

development of stlndinrUnef >°' ""'^"^^anding also necessitates the 

office? and S.S Sa ^'ciirSd strir^ff"^"" 'r'"'^" "' ''^^'^ 
conditions existing in each arlf u f '' ^" ^'^" °^ 'he unique 
resolve local proSf ems. Howe"'' FMlJd""';' "*'"'*' '^ desirable'to 
supervisory authority ^ver the Actions ^JT'h"!-"^'' *^""' 
with Bureau policy.! actions of field divisions, in keeping 



EFFECTIVE: 05/08/79 



18-5 



DOJ GUIDELINES FOR INVESTIGATIVE JURISDICTION OF FBI AND 




majority of case, that we iLTf .^ Paraphernalia statutes. In the 

thi nature of"h: wag ring tLuSf^nf^' ''^'" *'"'"'^*' '^^' ^"- 
following guidelines are foh» . f"f • ^ i ''*'"' *" interest also. The 
g guiceimes are to be utilized by both agencies in such 



Sensitive 
PRINTED: 02/18/98 



' r 












i^f- 



i'."-^ 

■"K"' 



r:®t 






.>G;fe 






npi 





nes 



PAGE 18 - 20 




Sensitive 
"MMl^of Investig.tiv. Operation, and Guidali 

.ff.rl b.t„eln"lRs''!L'F«f ;-",'r ^^^ <"•>""»"»» i" inv,.tig,tiv. 
legi.Ution, the following guideline, appear appropriate. 



:?fe"ti:i™/ei:lS^'^^=^^^^^^^^^«^^^^ 
indicate . p^'^itJn-viJraH::' j^ tL%"n'Ji-';::^iL'n,f'-:.'„% 

ftUrn^'fiJl-afn-rioUfi:;?" "" "'^-"O" °«^"'-" »^ ^-t?ce 

of investiaativi effort" "'"'"'?';<■" "v"!" an apparent duplication 
the IRS ii ?k1 f- f5 ■;, "^"^ °'"'"'° '•P'-Montative. of the FBI and 
invJffjr- ► fi*^ "*'' ""' '" ""'" "spontibility for the 

-x\^-ufLrtrrriOi:— 

azree as ta thf^J"-'*"* T"^ ^•"^'^ ^^^ ^S^^^^ representatives cannot 
agree as to the assignment of responsibility for a particular 

the r.th»r o "^^^ 1!^"" Statutory violations within the jurisdiction of 
the other agency become apparent in the middle or later sta^e.nf»„ 
investigation being conducted by either the IRS or thrPBT ?J 

between representatives of the Lo a«ncif« ?f fK f^'cussion 

LOB cwo agencies. If the agencies are 



;;<v.:-a(St,f. 
-.■ ,'.-cS-r-5;.., 



*^S5«- 






4^ 



^ISv 



V'' 






-Ai^ 



Sensitive 
PRINTED: 02/18/98 






>!■!: 



-"•^"i ijbf 







'Ali;J.,. 









^-■.t -^ ^?*,' 




Sensitive 



Parril"^ ;^SS^!^'- .^^^'If'i^ ^^. Guidelines 



PAGE ' 18^^';2i' 



-■-£■ 3^j:-^l«-//>^-'-'->^?^^^ PAGE ' i8;:jri':2i':jvj.;^'''.^|^^ 

e to agi^e Vs ' to the assigniknt ' of responsibiiit/fijf 'fuMtf^-^^^f^^^^^ 
ligation, the natter should be resolveS aff«. h'L:!!;!! .•!! .^:: "^ C " v- « 



unabl< 

;«„».i-- ♦.•° ^..r" " ""' -""^siiuicnL oi responsibility for further"" ^^ 

investigation, the natter should be resolved after discussion with tri« 

o^fhe'cir: "" ''' ''^'" ^"°"«^ °^ Department at'^Jn^y "Sep JSiig 
on the circumstances,- it nay be preferable for such further ^Ty ^ 

Znc/'ir.ull :l' I'n'"'''' "'°^^^'°"« '" "« condu^teS^y a single 
agency. In such event it is expected that the other agency would 
cooperate and render such assistance as is deemed within iL 
competence and capacity." e ea wicnin its 







EFFECTIVE: 05/08/79 



\ij^$^ 




18-5.1 



FBIHQ Instructions for IRS Guidelines 



\ 



infor™ai-,«. fJ^- f^^"*? "fll continue to make available to IRS current 
information of interest to that agency which is developed in the 
course of our investigations. 

(2) With regard to item two of the guidelines as it 
pertains to notifying IRS when there is indication of a potent al 
si?fie-:M "f*^'--^ '^^ l-«. -ch notification should'bemaie after 

?o low'nd frft^r 'r'°''' '^ '^^^^"'"^ '^« ^°«-^l procedures o 

llflZ ^"^*^* •^^"f "*>«" ""« "0"ld be more meaningful. With 

H™! T "^^ ^"^"t^Sations involving a taxpayer, referred to in the 

ist of";t v:%^:m "' '° individuals whose names are included on a 
liaL^fh ga»blers maintained by Department's Criminal Division. 
Inasmuch as copies of all reports involving the three statutes nlLT/ 
above are furnished the Department by FBIHQ. such shou d U^rtJ ^erve 

tha Us? '"^ °^r^r' '^; r! "^ -yestigating an individual " 
that list. It IS anticipated that when the Department receives our 

thes'e ind-v-f'?'^''' '''" '' "''' ^^^ "« ^ ^^ice that one oT 
these individuals is currently being investigated. 

«»tr , P^ !^®°'' '^^''®« ^n*^ fo"r of the guidelines are 
apiflrs^Jrb!°7/"i^''\'-^^' ^"^ '^""''^ ^^ consulted where there 
res"ved bv fi!lf "^ "''°? t^ investigative effort and such cannot be 
resolved by field representatives of both agencies. In connection 
with Item five, regarding the assignment of invest gaUon Jo a ^iLle 
agency, responsibility for an investigation should Se definitely ?iW 
in one agency insofar as an individual violation is concerned?' In ^^ 
this way each agency would retain it, own jurisdiction and the '^e^^' ^> 
tlllt'llt -''"'' r%J^'' ^°'«""^^ '°' P-sicution w^'d'on iJuHts 

riwf? ::?-on InS'the^^th"''" 'T'' '" ^"^ ^««"^^ proceeding iuh 
Zitl^l -l^ \ °^^" rendering such assistance as is deemed 

withm Its competence and capacity, the agency proceeding wiJh its 



Sensitive 




■ $^& 

mm. 




.-■'mi 






:,... ^^TED:_02/18/98.,,wr,-^.-^fj^.:;i;/v ■ .. 













Sensitive 






— ly 






Manuai^of investigaUve Operations and Guideline. 



PAGE 18 - , 22^ 



jurisdiction in the »ajoritv of fn^L!! ^ l '^* "*"" °^ 

_.leyel_by the two aLnciesandM, ^^^ "" ''^ resolved on a field 

USA or ^par^ent^f ttoVney'woulf ^^:^^^^^^^^ 

regard that afe di!cuss:5°:l?h't\e'SsA''"'r'/' ^'^^ "*""" ^ ^^- 

any investigative actiorwrt;;!;oJ5%L'o;g;\'g^ ::,^?°:l?,''j,f ^-^'^ °^ 

recommendation of the USA. ^""gn agreement with IRS or on 






.-.tii 



'w 
:||l 



'-<m 









I 



EFFECTIVE: 01/31/78 






18-6 




AGREEMENT BETWEEN FBI AND SECRET SERVICE 



"I. Purpose of Agreement 

receives frorot'he^'s'o^Les^rar:! lTV''^^l'°'' ^"^'^ originates, and 
and organizations. Z p^r^ose of ^M^" "T''' °" -d-iduals 
portion of the information on fi if litt ^«'"*''°^"^ ^» ^o define that 
the FBI, Which the Unit^rst^%es Sec ^Se^^[:e"(Us1s)^!:•*'"^'^'^ '^' 
receive in connection with its protectivrrrsponsibmt?:;:"'' '"^ 

in certain J^^lli'^H '^^^'lir^\ZJ''r'''l'>^ ''' ^"«^«« 
persons. (Certain other persons as used in ?h- '"'*'" °^^'"' 
those persons protected bv t-hrQl % c ■ ^^^^ agreement, refers 



Sensitive 
PRINTED: 02/18/98 



to 



W^ 






'" ) 










-'r ■ 


7— — ^T!- — *U. 








^■";*v^^: 












.1- . /'i-i' -iJv^lJ^J 




' '^-^^^^ 




'■ K^^'/ 




' -'^^fi 


'■ 










■ .■»'■«. 


- 2' 


k _:^. 




Sensitive 
PRINTED: 02/18/98 



'W 



. ",■■ .'./'■ Sensitive' 

Manual of Investigative Operations and Guideline. 
Fart II .,;-^ v-\r-\. ~ ■- ■'. ,■ .V ;... ■. . 
<■'■■•%'■. " ■;j":\." I i'"' ■ -.; .■ ,>-'"-'-^- '■■■:^«., ■ PAGE 1 

pers^nf JhTpBll:/ f'^?' '" ^^^ P«-<ient or certain other ' 
persons. The FBI has statutory authority to investigate assaulf 

tne President and other designated individuals. 

"The FBI will make available to the n<!«:«: ;n«:«,- .-i.- ■.. 

p«'o"! " ">' °' "" '"•'"»■>' "" ="t»i" other 

sources and needless duplication of effort. investigations or 
'II. General Responsibilities 

w,>h i-y, "^*'^i'?^? " charged by Title 18. U.S. Code. Section 3056 

tie Unitersf:?'''' ;'^ of protecting the person of the President of 

the United States, the members of his immediate family, the 

President-elect, the Vice President or other officer in th^ order «f 

or:t::t-°" ll '"^ °"'" °' president, and the vl« P ^s L^-eUc?- -^ 

protecting the person of a former President and his wife during his' ^S- 

iefthT ^^' •''"°" °' ^ "^'*°'' °^ ^ ^""^"^ President u^t 1 her W 

?h:y r^LrTn::?:^?"' -""/"^^^^l"" ^^ a former President until ^* 

cney reach 16 years of age, unless such protection is declined- -:>€ 

protecting persons who are determined from time to t me by Jhe'' 

Commi r^ the Treasury, after consultation with the Advisory 

Committee, as being major Presidential and Vice Presidential 

candidates who should receive such protection (unLs ?he"andidate 

h^L o% ^fJ '"'' protection); protecting the person of a WsJ Jng 

Jh^ Pre,ident"oth:r1^t' '""i"!! fovernment and. at the direction of 

Stat^IfnH h- • ? <i^»tinguished foreign visitors to the United 

States and official representatives of the United States oerformfna 

special missions abroad (unless such person, decline pr"tecUo"* 

the Director"^ms?^-"'^r ^"^^^^^^ Service, under the control of - ^ 

with iroteJtion of'ri! F ^'• V^"" ^' "'^- ^°'^«- Section 202. 

with protection of the Executive Mansion and grounds in the District - 

of Columbia any bui ding in which Presidential offices are locate^' '' 

foreign diplomatic missions located in the metropolitan area of the' 

District of Columbia; and foreign diplomatic missions locatedfns^ch ^^ 

other areas in the United States if. ^.^-•^ .•""•""■ iocaceo m such 

the Presidenf r,r.\ JL \ \ ■ territories and possessions, as v^? 

tne ^resident, on a case-by-case basis, may direct. ■ 



•'ft- 



i*: 









i «iirf».iirm:««tJti>.L..'j,».=i— ij..>-^;aq'™' gg; 



^..L..JJ1J,.JUJ.I 




Sensitive' 



.- -.T' ■ ' 



:. ixiiiii 



i^lm- 



Manual of Investigative Operations and Guidelines 
rart II -. :% ,. i:-.^^\:X" ....,, • . ,. . 



PAGE 18 - 2A 






"III. Exch.„s. of Information and Coordination of Responsibilities 













^i% 

•^?i 



A- 



b'7^ 

^^^1^ 



J 




• -,- -J , "^^® "^^^ agrees that it will conduct no investieaS^P 
individuals or groups identified or suspected of being threats to thf 
internal security of the United States without notifying the ?BI 
However, when time for consultation is not availablefand an 



Sensitive 
PRINTED: 02/18/98 



M. 

'W 



'*?¥;r 







Sensitive 









Manual^of Investigative Operations and Guidelines 




PAGE 18 - 25 




indication of immediate daneer exi<h« f-h« ttcoc •. . 

as is necessarv «,>!, r!. f f exists, the USSS may take such action 

r!.« ?^ff?ff^ "^"^^ respect to carrying out its protective 

ac nn^U rr Any information obtained by the'uSSS dir „g such 

action will be furnished to the FBI as expeditiously as possible 

zrour>n^.1.^7^^ ^11 "'^^ "°*^ conduct .investigation of individuals or 

_,,c„e,_, "^^ ^^^^ b« the responsibility of the FBI to advise the 

USSS when xnves t igati on" is" beihg-irii t ia ted-under" Ti tie' 18 n-?-r! ^- 
ect on 1751 and thereafter to furnish the USSs"wI h'cop?;s ; 'tSe ?BI 
investxga ive reports as they are prepared. It will be the 

po n^ioi ir^wh h'' ^''' '"^ '"^-^'^^ ^^-^ ^" -y informatL in its 
in3?^!?! ^^^ "ay.come to its attention which reasonably 
indicates that a violation of Title 18, U.S. Code, Section 1751 has 
been or is being committed. oection i/oi, has 

"The USSS also agrees to furnish the FBI any information 
xn Its possession or which may come to its attention ^ndicati^gl 

li^l^dl^ti:':^"^ ""'''' ^^^^"^" ^^" "^^^^ '^^ ^«^ ^" invesJ^faHve 

. , ... "^^? ^^^' ""<Jer its responsibility for investieation of 
violations of Title 18. U.S. Code. Sections 112. 970, Hie-ll ? ^01 
and 1751 will take cognizance of the protective resp;nsibil I; of 
mirirV. Tn'^'f under Title 3. U.S. Code. Section 2^2 and 
Title 18, U.S. Code, Section 3056 and thus does not limit or intlrf... 
with the authority of the Secretary of the TreL'y ^ he di charf: 
iL.i" ^^''^"t^^y P^tective responsibilities. This is not to be 
construed as vesting concurrent investigative jurisdiction with the 
Treasury Department with respect to investigations of i^^d^vl^uals ^r 
organizations engaged in activities affecting the national securitv 

r^bemo* ^^""""' '««-. -botage. espionage, ^oi^Ur-LJio'Ige 
rebellion or insurrection enrfi' «■;».« -«j-».- . ^oyxvitn.^^, 
V iUBurrecLion, Sedition, seditious conspiracy, neutrality 

" ^U^e SrSifrtf:?'' Registration Act. or any other sf;tr or"^ 
fcxecutive Order relating to national security. Any investieations of 

with ill^'r^" '"^^^^^-;» ^- -V reasons oLer than "con^ ^iJn 
with protective responsibilities must be closely coordinated with and 
have the concurrence of the FBI in order to minimize iriterferr^ce wUh 
national security responsibilities of the FBI. "'•erterence with 

"'''* bC^^hrF^r ^? l^ ^"'^nished to the United States Secret Service 
by the Federal Bureau of Investigation 









Sensitive 
PRINTED; 02/18/98 



u-^ !■ I SB^gg 



■..■?iirt,;- 




Sensitive 



Manual of Investigative Operations and Guidelines 
Part II ■-■r.-i^''' «—■ .vK>----- ••■,.^1:- • 



"B. Types of information to be referred: 









* 






■■7.fe' 



•X^s^y-y^ 



Sensitive 
PRINTED: 02/18/98 






=™™=a2asaa!^5ffl^SHi! 



mmmm 





Sensitive 

Manual of Investigative Operations and Guideline, 
rart II . ■ , , ■ ■ ' 



th^ Priri'^r °5 nfu^"^ ^""^*" ''^ Investigation Personnel to Protect 
the President and Other Protected Persons '^oiect 

c ^- ,«c."^^*^^^^ "^y* ^" accordance with Title 18. U.S. Code 
Section 3056 request FBI Agents be detailed to the USSS "; order to 
augment the capacity of the USSS to perform its protective d^tUs 
Such requests should be addressed to the Director of the FBl! 

nnH .V , • "^" ^^!"^'' detailed to the USSS are under the direction 
nerioH ir^r°''"^°""' ""'"' °' '^« Director of the USSS for the 
rZt/ It^"" assignment. The FBI agents so detailed may perform an 
armed or other protective function. p«i^i:orm an 

VI, Implementation of Agreement 

"In order to effect the best possible security of the 
President and certain other persons and places whose protecUon i. the 
te'^s'^f ;;•'' <>f the. USSS. the FBI and the USSS wiu'con^rrti: 
terms of this agreement liberally and will take such steps as are 
necessary to insure the proper exchange and coordinatlon'^of 
information. - «-■■•«•• uj. 

. "The agreement shall be reviewed annually bv 
representatives of the FBI and tho fiqqq «- -i. i. i.l 
FBT or fh- ITCCQ TDi ano tne USSS, or at such other times as the 
FBI or the USSS may request, to insure that the agreement is both 



"yi...--;-w *?e 

^f*Tt-;';;.i'^.., 




•■SKf 



■*«"•■ 



*^s>' 



S'V 



■ ■■# 



Sensitive 
PRINTED: 02/18/98 




Sensitive 



^^^np 






Manual^of Investigative Operations and Guidelines 



PAGE 18 - 28 



?he"Directofor?fif FBr* h'^^'^A^"'' ""^^ "^ "^'^^ -^^« -thority of 
tne uirector of the FBI and the Director of the USSS. 

the FBI and the'Sssr""' '"P""'^" ^^^ P-or agreements between 



July 16, 1973 
Date 



BY /s/ Clarence M. Kelley 
Director 

Federal Bureau of 
Investigation 






1 1'? 




July 30, 1973 
Date 



EFFECTIVE: 01/31/78 



BY /s/ James J. Rowley 
Director 

United States Secret 
Service" 



18-7 



MEMORANDUM OF UNDERSTANDING BETWEEN FBI AND ERDA 




AKm ,^^„^,« "MEMORANDUM OF UNDERSTANDING BETWEEN THE ENERGY RF<!FARrH 

z ssrr^c"jr jjsLnKSLT""^ .™..„^-?«\?^?So» 

referred to as ERDAi and the Federal Bureau of Investigation 
hereinafter referred to as the FBI nnrfnr ft,. *♦■ ''? '•***^*''"' 
1954. this Memorandum of"niL%tfn;in"rse\ ^%^ ^L';e^lLsiLr , • 
of each agency with regard to nuclear^thre^t incidents '^''" 

"II. IMPLEMENTATION - ERDA and the FBT «,■ 1 1 ^-.. i 
Understanding' ""^^""^"^ implementation of this Memorandum of 
"III. RESPONSIBILITIES 
-II J '^* ^^^ ~ ^^^ ^^^ ^° responsible for investieatin^ =n 

::;i:;tr.rsntL\' iL'i":rjsiri:r 1.'''^"°•^=""''- -' " 

D. or cnac Act. The mission of the FBI in a 



Sensitive 
PRINTED: 02/18/98 



■uwi-tiinrii-ji 



^ *^' ,. r>rtfmr , ^T-ri^^twVtfr i W^ri. '^ Tr^f^i^v..k'«.^^^^ 




Sensitive 






.-.. 'i-.-.W, 
■■irf'f-% 



Manual of Investigative Operations and Guidelines 
Part II 



PAGE 18 - 29 





nuclear threat incident is to take primary jurisdiction where a 
question of the violation' of Federal law exists and, where 
appropriate, to coordinate the utilization of available resources in 
the interest of the public health and safety.' 

"It is therefore understood that the FBI shall: 

"i- Assume jurisdiction over all field. organizations 
associated with a nuclear threat incident. 

"2. Establish and maintain contacts and coordinate 

—nuclear -threat-incidents- with-other-Pederal-and-local-law-enforcement- 
agencies, and military authorities, as appropriate. 

., . "^' Ensure that all reasonable measures are provided for 
the security from physical violence of personnel and equipment to be 
utilized in search, deactivation, and cleanup operations related to a 
nuclear threat incident, and on the advice and recommendation and with 
the assistance of specially trained ERDA and/or DOD teams, ensure that 
all reasonable measures are provided for the safety of personnel from 
radiological hazard. 

„ , ^ "^- Designate .a liaison representative to accompany ERDA 
Nuclear Emergency Search Team (NEST) personnel to the scene of a 
threat incident for the purpose of coordinating with local FBI 
officials and law enforcement agencies. 

"5. Promptly notify National Command Authority of anv 
nuclear threat incident. 

"*• Promptly notify ERDA Headquarters of any actual or 
alleged nuclear threat incident reports. 

"^- Promptly provide ERDA with the exact wording of 
threat messages, copies of drawings, nuclear material samples, or 
other intelligence related to a threat for scientific analysis and 
credibility assessment. 

"8. Promptly provide ERDA with all available information 
pertinent to an assessment of a threat perpetrator's technical 
capabilities to carry out a threat. ,. 

"9. At the scene of a nuclear threat incident, provide 
necessary support as may be needed by ERDA NEST personnel in carrying 
out assigned operations. - ■ 



'^ 



>s.*- 



-Mi- 












Sensitive 
PRINTED: 02/18/98 







Sensitive 

Manual of Investigative Operations and Guidelines 
Part, II ■ ■-^■:- 

•;'-u .'''■• ■ '^-''- "■ ■ ■'. . "" ■" ■ ■ '. ^- .' ■ PAGE ^ 18 

DisDosal '^EOnV: '*^^""' ""Stance of DOD/Civil Explosive Ordnance ' 
disposal (EOD; resources, as appropriate. 

inr^iA^r,^ • ?• ^^^t ~ '^^^ "i"ion of ERDA in a nuclear threat 
incident is to provide expert assistance to the FBI upon notification 
of the existence of such an incident. nocitxcation 

"It is therefore understood that ERDA shall: 

Coordination"T;a«^fFlr?^*^ '""^ ^''°'' Headquarters Emergency Action and 
and dJr!^rrpmt" r^^V ' " ^PP^opriate. to coordinate with the FBI 
__and^i£ec^^RDA^s^j^n^vemen in a nuclear threat incident 





PRINTED: 02/18/98 





■ ^^v?i 








;Ji--i ,,.ii5,.,. 


/.. ■' 


. ■ f ■ •"'.:a*;: 





• -•■•T?55S; 




■ 1- ■ --jfia- 








.■■:5S3t 




, -^m 








* ■•'t»^;-;<:^^ 








- -- ..-^t-vV^i'"-- 




i^tSS^^S^, 


30 > 












... .. _ 


■■■~fm^: 








. ;:S:'Sv 








-^ "i'^Sg;. 








■-*' 




';.i^&v: 






asses«»*.n^ o«h' ^''°;'"'^* scientific and technical support for threat .v^ 

s ora« of Tt "r ;>P"«tions, device deactivation, relocation and -W 

clllnul ^ " ""'"'"' evidence, and/or in post-incident M 

"Scientific and technical support shall include: ■ 

« t ^ '*'. Analysis of threat messages for technical cbntent; '''^ 

nuclear design feasibility, and general credibility. """"C, ^ 

h..,.^ "^' P"<*"tion as to the size of a potential nuclear £ 

burst as may occur from the successful detonation of a threatened ¥ 

nuclear device activation. i."ireatBnea ^ 

levels. "^' ^'"^'*^^'^^°" °^ contamination zones and radioactivity '^ 

d. Recommendations for evacuation, 

"e. Recommendations for special search techniques, 

"f. Operations of special search techniques, 

"g. Identification of isotopes, 

techniques. "^' ^^"^^"'*'*"°"» ^"^ special EOD procedures and 

"i. Identification of nuclear weapons and components. -. 

aetivih,--. Jli'u "^"t^fi'^^tion of radioactive hazards during cleanup 
activities and bomb scene investigation. c<">up 






ft 












Sensitive ■•.. ' " "^sM 



. .■!.'-i:-i[i-)^ 






■■■■•■'■■■'■' '"" ^iuA 



■■ ■ > . » .,. -„„■ rf7nF^,w,n-*.r-.' ,rifn,Trir^.,..n.,>-^.,..,l.^^^^ ^ 





Sensitive 



Manual of Investigative Operations and Guidelines 

rart II •■ . ;?,- 

■ . . • •• .' '"^■. ,■ - ■ ■ ' ■ 



PAGE 18 r 31 



scientific and technical support. 

n,. M. 1 r^' /°°^<^i"ate nuclear threat incident activities with 

tLe^r x^cLe^L -'"^r ''""i"^"" ^'*''^' " appropriate. ;"i::r 
— threat incidents_involvingfaciIities_or_inaterial within the 

jurisdiction of the NRC are initially reported by" N^C t" tLlil J 

- ■• "^' ^'■range for any special transoortation of prha 

eiv,-i;=« '^' ^f^^y «"^ request assistance from the DOD and 
apprJjriate""'' '""^ post-incident cleanup activities as so^n as 

n K , .,''^* ."*^® ^^"^^ authority in matters of (a) Restricted 

inilllt T''°':-^^''- ^'^ ^«°A-originated National Securt" 
Information classification associated with source material L„.,-=.i 

w::n:;:r'"'''; -^-«^-« byproducts, or n^cw'^'^^^'' '''''^' 
weapons/components. 

«r,'«„i-if- I'v Provide, upon request by the Justice Department, 
scientific and technical information and testimony for use in an^ 
legal action taken by the Department of Justice. ^ 

"C. JOINT 

"The FBI and ERDA shall: 

nuclear thr«l'J\- f^°°/^i''^^\^^^ proposed press releases related to 
nuclear threat incidents. Any media or public inquiries will be 
initially referred to the FBI; responses to such inquirierwill he 
coordinated with ERDA. inquiries will be 

fulfill the 2'.;*^^^^ appropriate, identify individuals assigned to 
l" aii 2 and 3 "' responsibilities outlined in Section IV. B.. 



■-■■fmi 



% 






"3. Treat all threat 



incident information with adequate 



Sensitive 
PRINTED: 02/18/98 



;'$'«!3*~ 



.-^» . - , . ■. ■ ■ ■n.-n; TV , „■ . , : i;v ,-T^^,:.,mU,^^„-r-i ,t->^^,., J,...,LUHHi!l^MIS Wy^ 






..Sift- 
Sensitive 



rSjfHi 






Manual of Investigative Operations and Guidelines ^ 

Part II ,,■■■:.■■ 

^ PAGE 18 - 32. ' - 

security and confidentiality co»unensurate with National Security ^ "^ 

guidelines and the standards for.the preservation of criminal 

evicence. 

«...,. • V "^ '^«vie«. as appropriate, the events leading to and 

Tmlrll-l^ f r^ ""^^'" '^"^' ^""'^^"t ^l«-t for the purpose of 

improving upon future joint responses.- pose or ^ 

te«f-,'«. «f "^1* Provide a mechanism for coordinated planning and the 

personnel! "" incident management, equipment and ^^ 



"IV. STANDARD PROCEDURES 



"A. INITIAL NOTIFICATION 

the FBI or ERdI ^"'=^^^'' threat incidents could be reported to either 

the FBI or ERDA. Upon receipt of such a report the agency informed 

sha 1 immediately notify the other agency aEout the situation anSas 
to the exact information known. 

va.,-n..c K u' ^°th agencies shall notify, as appropriate, the 

Ibn. ? ?„ -^ ^f; °"'"' "^ i"di^id"*ls «ithin their Jurisdictions 
about the situation and what actions might be required. 

"B. POINTS OF CONTACT 

r«™™»„M .F /■'\^ ^^^ ^?? '''^^ designate a Special Agent to take 
command of field operations m a nuclear threat incident, and a 
Special Agent to act as a liaison officer with ERDA at the 
Headquarters level. 

p-,-1 .. "I' ^^^ ^^°^ Headquarters EACT will command the ERDA 

I^DA F^lfrM °P"*t^rn ^""^'' ^"** ""^^ Director. EACT. will direct an 
ERDA Field Manager of Operation, to act as ERDA representative for 
field operations m a nuclear threat incident. 

..•11 • ll'cn. "^^^ Director. EACT. will consult with the FBI and 
r;ii»r"^"/^P personnel to provide required support in a nuclear 
threat incident. An FBI liaison representative will be designated to 
accompany NEST personnel to the scene of a threat incident S oca 
coordination purposes. '^"«-«* 

"4. Points of contact with other involved Federal 
agencies will be maintained by the Director. EACT, as appropriate. 



erf,; 



, 3 ■'iV'p-f}^. 



Sensitive --'^SS 

PRINTED: 02/18/98 -y.^m- 






■ ■ . ■ . . . ■ ■ ■ :'^ /i!f ' 

Sensitive --.ffl 

Manual of Investigative Operations and Guidelines "^J^ 

Part II - ^;s; 

■ -^ ■-. .^, ?■ .. .^ PAGE 18 -. 33 , •■ \^ 

"C." THREAT ASSESSMENT • "':.■.. '~" . '■' iS' 

for H«f«.«- •^' ,.P°^ Will provide scientific and technical support 
nnL ^- rr'"^^''^ credibility of specific nuclear threats and the 

potential hazard associated with those threats. \i 

- , , ' j§. 

the NRC and/Ir'mn^°\"ii^ endeavor to verify, with the cooperation of ■ S 

the NRC and/or DOD. whether any source material, special nuclear ' 
material, radioactive byproducts, or ERDA nuclear weapons/components 

are missing or unaccounted-for. r / */« c.ilb , . 

^;;D^_JEARCH. DEVICE DEACTIVATION, AND POST-INCIDENT 



CLEANUP SUPPORI' 



„P-_ ^ "^- ^^^^ ^'ill dispatch, upon request of the FBI, an ERDA 
NEST response group and any necessary specialized equipment to the 
scene of an incident. 

"2. The ERDA NEST lead representative on-scene will: 

"a. Direct the activities of the ERDA response erouo 
xn support of the FBI Agent in Charge. esponse group 

. . ^ "''; Ensure coordinated ERDA support in all matters 
pertaining to search and identification operations and bomb scene 
ex£Lifii na r 1 nne 



examinations 



"c. 



Ensure coordinated ERDA support of the EOD 
services associated with any device deactivation operations. 

^.. ^ .,.,. "*^-. ^"="'^« coordinated ERDA support with the DOD and 
other civilian agencies, as currently provided for under other 
agreements, for post-incident cleanup operations. 

"e. Advise the on-scene Special Agent in Charae of 
any requirement for additional ERDA response capabifi ties and 
coordinate the provision of such additional capabilities as may be 
mutually agreed upon. ' 

"3. The on-scene Special Agent in Charge will: 

"a- Establish and maintain all local contacts with 
other law enforcement agencies. 

"b- Direct the on-scene activities of the FBI and 
other law enforcement agencies. 



Sensitive 
PRINTED: 02/18/98 



4'm 



fifi 



m, 



M . . , ■„ ■ .„.„„■■ n , ^ v,t„ , r.„,H, 'rvm:^t,nim^^m;^-,,^.^^...^,.„^^ 



^R=5yf^W!B^5T^S^^R''J 



I 




• 




Sensitive 



Manual of Investigative Operations and Guidelines 
rare II 



"iii 



PAGE 18 - 34 



"c. Establish a field command post. 
^n Pa^-1-^ ^ "■^' ^^"^^'^^ fo*" necessary escorts as may be reauired 

weapons/components. 



7— "E.-^ MAJOR. EMERGENCY. DISASTER----In the event of a «,o;„. 
emergency/disaster. ERDA will assist in the response Up t-iSd^;^ 
cleanuD reaulreInen^e ,'« /.^^.^^.■^-►.' ..-.., ^. ___ '^''- mciaenc 



-1 . - -»»*o^ A., tuc i-esponse CO post-ii 

c vaian'a^;""'"'' " coordination with the DOD, and various 
mZJ^.^l " ^""^""y provided for under other agreements. 

DOD and ERDA Agreement in Response to Accidents and Incidents 
Involving Radioactive Materials and Nuclear Weapons. 

f'; thf cost«'-^'''"f '' '^'"'^'^ ■ "'°^ ^"'^ ^^« '^"^ -11 ---^ fund 
to meet th!^ incurred in providing the necessary assistance required 
iLT.tl ^ '^^''P^nsibilities defined in this Memorandum of 
Understanding. 

^. . , "^'^" Memorandum of Understanding takes effect 
immediately. 

/s/ Alfred D. Starbird A/n/7A 

Assistant Administrator for National n i 

Security ""® 

Energy Research and Development 
Administration 

/s/ Clarence M. Kelley ^/o/-,^ 

Clarence M. Kelley 0/8/76 

Director ^^^^ 
Federal Bureau of Investigation" 

(NOTE: See Appendix next for definitions and abbreviations.) 

APPENDIX 
"DEFINITIONS AND ABBREVIATIONS 
DOD - Department of Defense 



Sensitive 
PRINTED: 02/18/98 



•^*?0r;~ 




Sensitive 



Manual of Investigative Operations and Guidelines 
rart ■ II ■-:^ • — ' ^ 



PAGE 18 - 35 



EACT - ERDA Headquarters Emergency Action and Coordination Team 
I'SH::/' "P««entatives of the Divisions of Mil tarHpFUcation- 
Safeguards and Security; Operational Safety, and the Office oJpubH; 

EOD - Explosive Ordnance Disposal, U.S. Army 

ERDA - Energy Research and Development Administrati 

FBI - Federal Bureau of Investigation 



on 



NEST - Nuclear Emergency Search TeaF 



NRC - Nuclear Regulatory Commi 



Nuclear Threat Incident - 



ssion 




Source Material 




Any situation involving stolen, lost or 
unauthorized possession of source materials, 
radioactive byproducts, nuclear 
weapons/devices of U.S. and/or foreign 
manufacture, improvised nuclear explosives 
radioactive dispersal devices or the 
threatened use of said items. 

The term "source material" means (1) uranium, 
thorium or any other material which is determined by 
the Administration pursuant to the provisions of 
Section 61 of the Atomic Energy Act to be source 
material; or (2) ores containing one or more of the 
foregoing materials, in such concentration as the 
Administration may by regulation determine from time 
to time. 

Special Nuclear Material - The ^term "special nuclear material" means 

(1; Plutonium, uranium enriched in the 
isotope 233 or in the isotope 235, and any 
other material which the Administration, 
pursuant to the provisions of Section 51 of 
the Atomic Energy Act determines to be 
special nuclear material, but does not 
include source material; or (2) any 
material artificially enriched by any of 
the foregoing, but does not include source 
material. 

Radioactive Byproduct - The term "radioactive byproduct" means any 



'-ft 



..•iSiS5s,' 

...•,;ar 

- '-"ST 












if** 



i^' 






Sensitive 
PRINTED: 02/18/98 



' Mi^- 



^^^^^^^^^^^^^^^^B 



SSr 



''•' ;*" ■! 




Sensitive 



Manual^of Investigative Operations and Guideline. 



PAGE 18.- 36 



radio active material (except special nuclear 
material) yielded in or made radioactive by 
exposure to the radiation incident to the 
process of producing or utilizing special 
nuclear material. 



Improvised Nuclear Explosive Devi 



ce - 



Any non-conventional explosive 
device containing nuclear or 
radioactive material in 
combination with explosives." 






. . ..^^ 




EFFECTIVE: 01/31/78 



18-8 



OF"mEmGAT?L"^f ?if ^'^^ '^ ^«^ '^^^^ B^EAU 

REclRnTMr MnJ, pI^S ^"^ NUCLEAR REGULATORY COMMISSION 

rlc^nT.S:''^^S./^^^^^^^^ -C LICENSED 

"I. PURPOSE 

Fed«r.ll" ""8"ition of the responsibilities and functions of the 
cltlJ' %^rs^ Investigation (FBI) and the Nuclear Regulatory 

" ?;.?rcrSj? °f ""J?"'-""'"* """"" the MC .„d, the D^parLnt 
or Justice (DOJ) regarding cooperation eoncernina DEC .nr„,,.L..i. 

inf:r::tio;:) ^"^^ ^^^-^-^^^ '^ -^' -^ -^ -hang^^;f;%%T?n:nt 

to nuclla:1;ferl:"'^;:nl??ef 'a:r^"^f""'''^^'^'«= "^^^ -«"<^ 
the FBI and NRC «;s?'coopeia ^ fulW ir^^r'-" 'V' V^^^ed States, 
responsibilities in^heLteL^tif'a^LeWnT"' -»P-tive 

informatlon.'fnS'''"' communication and exchange of relevant 




"2, A timely, reliable, and effecti 
threat incident. 



ve response to a nuclear 



Sensitive 
PRINTED: 02/18/98 



■ki'i;.. 

.-"it" 









.Jm 



;M->' 












-^ ^ - •""- -' '- n-n n^ Ff 




J 




Sensitive 



ParrJl"^ ^"''^''^^S*'^^^* Operations and Guidelines 



I "II. DEFINITIONS 



PAGE 18 - 37 



nuclear industry, including the following: 



naterial. 



"Theft or attempted theft of NRC-licensed special nuclear 



^^*'°^^8e or attempted sabotage of Nur-i ;,.«^--j , 
facilifioe «^ Mor-i • J A. »<»uuL«ise or wku licensed nuclear 
taciiities or NRC-licensed transportation activities. 



"Attacks on NRC-licensed nuclear facilities o7~;;^;;rties": 
materials. or'aMiviUes"''' '""'^'"'"^ "''^ ^"^""'' facilities. 
"III. RESPONSIBILITIES 
"A. The FBI 

"The FBI derives the authority to investieate rr;«;«,i 

fr m'the'lJ:''' p° ^'' '"^"^^" facilities. .at^rH f or L U^U es 
"p u-u-/^ '*= E"«'^8y Act of 195A. as amended; Title 18 Section 8^1 

Fede°«? r /r""'"'^' '""°^"^"« "-^"^ »at;ria !" L :tier 

thf l^L ^ ^'^%" "^^ '" applicable. The FBI has' b^n designated as 

the lead agency for coordinating the Federal response to actfof 

"It is therefore understood that the FBI shall: 
. ."^' .Pf*»vide to NRC, intelligence information concerning. 

,^:""itsr:ra:Ji:i^L:!"^^^^ " ^^r ^^^""'^ " --"f^cfuties. 

derogatlry iZ^Z.Zn T^l^l^ZJlli^^r''''' '''''''' "^"' ^ 
occupying positions considered cJiU^aUrtL^rrr" ^"""""r 
nuclear facilities or activities' ^ ^ *''*' security of 

advise NRC rewrdinf ^h °"*°^''?-?""''^'"""'^'"^ ^^"^t situations; 
aavise NRC regarding the credibility and danger of such threats. 

"A. Establish liaison and develop contingency response plan. 



Sensitive 
PRINTED: 02/18/98 



■■■■■■»?¥ 






^mmmmm 





"13. Request Department of Defense (DOD)/Civil Exnl 
Ordnance Disposal (EOD) resources, as appropriate! 

1 "B. The NRC 



Sensitive 
PRINTED: 02/18/98 



osive 



Sensitive 

Part'll"^^''''"'^'*'*'^'''* Operations and Guidelines 

. PAGE 18 - 38 

with pertinent local law enforcement agencies to ensure ^ff^rli^. ^'a 
coordinated law enforcement response operation, ^"'"" «"«tive and 

A .. ^ "^' .^" accordance with the Omnibus Diplomatic Securitv and 

^ Jorrre^":: ^"l 1 ''''' ""^"^^ identification and ^rim ^II ' 
history records checks on individuals with unescorted access to NRC 

InTZltiT''' ''"'' '''^'' °^ """ '^ Onclasaifiers:fU:.r 

Nur "*' ,^^^^^li=^ liaison with pertinent NRC Headquarters staff 
^for:f;°" °'^'"' ""^ '^"""^ facilities to ensure effect ve' 

"In the event of a nuclear threat incident the FBI shall: 

"7. Coordinate the Federal response to a nuclear threat 
ThTtTr t"y°l^ "« NRC-licensed facilities, materials, or activities 

sa ety L he^ Ll%''? ^k °" "'^"^" concerning public health ^n"* 
safety, as they relate to the nuclear facility, material, or activity. 

"8. Manage the law enforcement and intelligence asoects of hho 
response to a nuclear threat incident involving NR?-lice"ed ' 
tacilities, materials, or activities. 

;r,.-A r^* ^****'lif'^ an<* maintain contacts and coordinate the 
incident response with other Federal and local law enforcement 
agencies and military authorities, as appropriate. 

fK« „^ "^O- Ensure that all reasonable measures are provided to ensure 

"12. At the scene of a nuclear threat incident, provide the 

Tslllll? '"'^?''' """^ '^ '^*''^^** "^y '^C personnel. 'in carrying out 

rll\Tllt-^lT"°''l *"*^ *"^^°"» ^° P^^'^-^t the public from / * 
radiological hazards. 



'M 

.: ■'V.S.A., 



^^- 






■'?#«^ 



_ ' ' ' ' -'■■^''^'-'- -U4...^^..- IL_... l .r,„l| ^ffSg" 




Sensitive 



Parril^V^"''"^****''''* Operations and Guideli 



nes 



PAGE 18 - 39 






• ■■•■§' 



jLrj!„* r" ^°"»' *" °^ ""• " '-ended, th. E^"ly "'"'"■' 



M 




•It is therefore understood that NRC shall: 




sy»'„ di."g° "°'" " ' """ '" rul^akins, evaluations. Ld 

FBI i„v„tig.n„. linllaiilt'f J; "''' r°"p"y p^'ioe '■> "., 

to th. .af.?, a„? ::.':"e* i-j^i '^^^ri^i^"' -'""' 
.»jce ;^;.„„^;:?^iii„i:-:%™ :';-»jj:---;-;.^j-. and .uu 

evaluation, and. c„„ti„go„oy „,p„„„ pl,„„j„^ Z" '""•"S'- "-reat 
li=e„s.e^a„d''f^!;^■'?':;^°'"'f° J""'' '""'"e.. planning between 

.n£:::n-^:;— ^^ 

.aciuti'f;. ::t':^Li'J:^ra:^i:^tu:? i^rn'r-L^^i"""-? -r-'"' 

nuclear a.p.ct. and t.e ....i^iAiTl^-^ ^^ T, Zl'^ZlYlt^^' 

Ucenaeef' J'uVt'tTllr •""•'i' '"f""' "^ '•>• ^I. to the affected 
.pecifrrAu^U^r-^fanrjhfeit. """■" """*" '"■ "" ™' =■-'*"' 

"In the event of a nuclear threat incident, mc .hall: 

' Of the re;p„"rto'°a' nCcir'Sre^t it-'/ !'""\»?'' "fety aap.ct. 
facilitie.! ..teri.t.?"J::tivitUa "' '""'""» ™':-""°"'' 

PBI at :?; a::°r'^? S^^l^ri^n?"'"" "" '"""'"' "'-'"" '« t"' 



W"*- 

.*■(" 



- s§- 



.sit 









■^■ 






Sensitive 
PRINTED: 02/18/98 



\ ...■.;i'';> 






E^SESBESS 



E*£rPT7;p'/rwss«<TO«T«'*r*r<sr»ii 






Sensitive 



Manual^of Investigative Operations and Guidelines 



PAGE 18 - AO 



impact upon the public health and safety. Potential or actual 

health and*sff:tror:nlB/:::r"r ---"!-« P-vided for the 
support of the incident P^""""^^ and equipment involved in the 

radiologlcal';::irLf" '''' '"''" ^"^ "^^^^ ^^ ^'^^ P"''^- f- 



"C. 



Joint 

"The FBI and NRC shall: 



during r^ucL'rr^h^L't'L'Jr^::;.'?:/^-"'' '""""%'? •»'' """""« 
lutur. ioint r=.po„SM: '""''•"' f" ""? P"!'"" -' improving „p„o 

"IV. STANDARD PROCEDURES 

"A. Initial Notification 
* ... '.'^* Nuclear threat incidents involving NRr-lJ^-^o«j 

i "2. The FBI and NRC will notify appropriate individuals and 



^:di 






if^ 



-•^* 



''.^ 



-i» 






Sensitive 
PRINTED: 02/18/98 



H ^v*i3#- 



■ "■;?•. 



HHP 






Sensitive 



Manual of Investigative Operations and Guideli 



nes 



iiiiizii z zizJt""" '" »""<'—»"'. =u"."t 



PAGE 18 - 41 



"B. Points of Contact 

fi«ld of J- ^^^f^J Special Agent in Charge of the responding FBI 
tariff ••! V^- ^^^"^ """*"** °^ t^« ^i«l<l operations in a Lcl ear 
act : ties" A ^ri^'n* NRC-licensed facilifies, .aterJats oJ " 
des InaUd't. » I Headquarters level, a Special Agent may be 
designated to act as a Ixaxson officer with the NRC Executive Tea» 



•2. 



;„..., , "^^^ ^^^ Headquarters ET^.riir^HS^^^Sr^Hd~diIFi^iFlhe~~~~~- 
xn.txal stage of the response will direct NRC activities The 

reso'oL°: r^i"n"" ^^^^o-ty for managing the MC :::;gelc; 
response to the Director of Site Operations? ^-^gency 

cooperate 'wiJJMch o^hef" '"'*" "Presentatives will coordinate and 
r-o.;!! -ur^:. '^®'' ^" carrying out their respective 
responsibilities. The FBI and NRC representatives will rLorf .« fK 
sxtuation and make recommendations to their re pect'e agencies 
regarding the need for additional assistance at the scent 

other Fed^rJ^' ^^^^"^NRC will maintain points of contact with the 
other Federal agencies involved in responding to a nuclear threat 
incident involving NRC-licensed facilities, materials! or acUvi ties. 
"V. . THREAT ASSESSMENT 

"1. NRC will provide scientific and technical advice for 
determining the credibility of specific nuclear ^i^reats a^Spf^^ntial 
hazards associated with those threats. * potential 

2, NRC win endeavor to verifv ui'fK n,-. «« *. • - ■ 
D.p,rt..„. of Energy a„d/or th D^p" tl:^ f D^f.^rih Jh^ ° "" 

"VI. FUNDING RESPONSIBILITIES 

responsibilities defined in this MOU. 
"VII. TERMS OF AGREEMENT 






.m 















1 



• Si 






0. 



Sensitive 
PRINTED: 02/18/98 



J??*. 



^SSSSS^ST 



.'tvY's/V 







Sensitive 

Manual^of Inves^tigative Operations and Guidelines 

■■• ■ ■.■■'^■' •';^VV^''\ ■■ ;■■;: ,^;. '-■■ . ; '\.7 . ■:. . ._^ PAGE 18 

signature'by'aU pfrtierLd^'J ??"«'« «"«<=tive immediately'upon 



42 



"For the Federal Bureau of Investigation 



- ■"•'his' 









-/»/- Wl.L!-jaJLJL._ Sess i ons ._dat_ej<ay 29 1991 
William S. Sessions ~ ~ ' 
Director 






f 



"For the Nuclear Regulatory Commissi 



on 



/s/ Kenneth M. Carr, date 13 March 1991 
Kenneth M. Carr 
Chairman"! 



"•-'Jp^- 



EFFECTIVE: 08/28/91 




1 18-9 



"JOINT FEDERAL BUREAU OF INVESTIGATION DEPARTMFNT nir 



"I. PURPOSE AND SCOPE. 

and procedurel'f^r'rfspondin^ Jf 1"' specific areas of responsibility 

nuclear device. ZmV^t^',^ ^^y^:r^^J^^T\- 
Commonwealth of Puerto R,Vn ^^a t» o ""-at-es, District of Columbia, 

1977 nnp/pRT u f'^^'-y «-ne current DOD/DOE Agreement of 1 March 

Attorney ^.n.^Irr e /to Ih^'Li^r^ar^f'Sj'" °"'""!' '""' "» 
Federal ,,e„u, i„ co.b.tUag u'""L""d:t,S°J:v»b™ t""J?r° '" 

"II. TERMS OF AGREEMENT. 






■'•Si'- 



Sensitive 
PRINTED: 02/18/98 : 



>''^^'^ 









^MWBI^^^^ffi Jiy 



v=;i>y) 



.5,ai,f«;; 




Sensitive 



Manual of Investigative Operations and Guidelines 
Part II - 



PAGE 18 - 43 



"a. This agreement shall be effective upon signature by 
representatives of the Federal Bureau of Investigation, thf Department 
of Energy, and the Department of Defense. 

"b- Amendments, modifications, or termination of this 
agreement may be made by written agreement of all parties. 

"III. POLICY. 









- . „"^" ^^^ ^^^"•^ °^ * Nuclear Threat Incident involving an 
Improvised Nuclear Device (IND) . the Federal Bureau of Invest gftt^n 

tillJ-r, i ,1 5°r ::'^^«tigating all alleged or suspec"t~^d~"^7rm7nar^ 

luestiornf^fn * t%'- ^^" ""^^ •^^ P"'""y jurisdiction where a 
question of the violation of Federal law exists and, where 

appropriate, will coordinate the utilization of available resources in 
the interest of public health and safety. 

will nrn^-^ "The Department of Energy and the Department of Defense 
will provide assistance and support to the FBI as listed in Section V 
of this agreement. 

"IV. IMPLEMENTATION. 

\^A ^-f •, <,"^"** f"*^^ "'^^ '""® ^^^ °™ departmental instructions 
delfon ^if operating procedures implementing this agreement and will 
develop and exchange additional instructions and procedures as are 
deemed necessary to be continued implementation of this agreement. 

"V. RESPONSIBILITIES. 

"a. The Federal Bureau of Investigation will: 

of »n Tim ,-..-^ ?* /''*' " ^^^ Federal agency in charge at the scene 
Of an IND incident and assume jurisdiction over all field 
organizations. 

TVTt • -J .. "^' ^''^^''lish and maintain contacts and coordinate 
IND incident support requirements with othc 



't 






enforcement agencies, 



ler Federal and local law 




V. .^.,. .. "^- ^'^^v^'ie security for personnel and equipment tt 
be utilized in search, deactivation, and cleanup operations. 

"4. Provide, at the incident scene, a 
representative to act as liaison with Federal and local authorities. 



''•ejifi^' 



Sensitive' 
PRINTED: 02/18/98 



iill— 




Sensitive 



Manual of Investigative Operations and Guidelines 
Part II -7: ;,?;■■■■.■; . • .• -.,. ■- ■ 



PAGE 18 - 44 



. , ."^v *''>tify appropriate individuals and offices 

ot any nuclear threat incident, - 

,, "6. Notify DOE Headquarters of support 

I requirements and provide: 

, "^*) The exact wording of threat messages, 
copies of drawings, nuclear material samples, or other related 
intelligence for scientific analysis and credibility assessment. 



-l^^fe) Al-L_ijlfp rmation p ertjjient to an 



"rrthreat^ * ^^'"'^^ perpetrator's technical capabiITUe7~u"^^P^ 



..-■■^fM. 
. '- •% 





rwwrrw IT 7" ^°*^^^y ^^« National Military Command Center 
(NMCC)/ Emergency Ordnance Disposal (EOD) of support requirements for 
either standby or deployment. 

^^ , '^' Provide additional support as required bv 
DOE and DOD/EOD personnel in carrying out assigned operations. 

f-K TTHT r "^\.J^^ Department of Energy, upon notification by 
the FBI of an IND incident, will: 

J , . ^ "^" Provide scientific and technical assistance 
and advice to the FBI and DOD in the areas of threat assessment and 
search operations, device deactivation, hazards assessment, 
containment, relocation and storage of special nuclear material 
evidence, and in post-incident cleanup. 

"2. Analyze threat messages for technical 
content, nuclear design feasibility, and general credibility and 
provide such analyses to the FBI. 

"3. Acquire, maintain, and make available any 
special equipment and capabilities required to provide the necessary 
scientific and technical support, 

"*. Coordinate IND incident activities with the 
^nviw-^ f -J-^^ Commission (NRC) , as appropriate. (IND incidents 
involving facilities or material within the jurisdiction of the NRC 
are initially reported by NRC to the FBI.) 

^p , "^- Arrange for any special transportation of 
DOE equipment, personnel, and/or nuclear material, as required. 



% 

.•>!sL- 



X. 



Sensitive 
PRINTED: 02/18/98 



"■"" ■ " ' """"""" ■ ' ' • I - -'■-i-4rii.r r '«!«gM^ ^CTff' 




Sensitive 



Manual of Investigative Operations and Guidelines 
Part II ■ .. 



PAGE 18 - 





• '}■! 




■ --W 




■■' ■ 'S ■'M 




'^::4^ 




■ "^'^Jli 




■v--tS, 




.. - : ■<..,-s^»^. 




■ •,.:. .1:*; 








■A2.'^ 




■■■■ ....fi 


- 45 


■ :;« 


' '^. ' 


,:;:..)j^. 




' "■' "'■rij^' 



"6. Notify the DOD and civilian agencies of 
aTap"?;"[a":''''"" '°'' post-incident cleanup activities is soon 

"7- Have final authority concerning the 
classification of Restricted Data and DOE-originated National Security 
Information associated with source material, special nuclear material 
radioactive by-products, or nuclear weapons/components. »*"'^^1. 

"8« Provide, upon request by the FBI, 

-SCientific_and_technical^information_and_testimony_for_use_in_anv 
legal action undertaken by the Department of Justice. ~~~~ 



FBI, will: 



The Department of Defense, upon request by the 




.*, 




. , "1- Provide EOD technical and operational 

assistance to the FBI. f •■ 

"2. Provide EOD technology, procedures and 
equipment for working point access, device deactivation, and 
nonnuclear device diagnostics. 

I "d. The FBI, DOE, and DOD will: 

"1. Coordinate all proposed press releases 
related to IND incidents. Any media or public inquiries will be 
initially referred to the FBI; responses to such inquiries will be 
coordinated with DOE and DOD. 

"2. Treat all IND incident information with 
adequate security and confidentiality commensurate with National 
security classification guidelines and the standards for the 
preservation of criminal evidence. 

"3- Review the IND incident for the purpose of 
improving upon future joint responses. i- t- »' 

, . ^' Provide a mechanism for coordinated 

planning and for coordinated training and testing of IND incident 
management, equipment, and personnel. 

"e. The DOE and DOD, in support of the FBI, will: 

"1. Develop working point operating procedures 



Sensitive ' 
PRINTED: 02/18/98 



... ,.'i:j 










'/ * 


., ,'- 


' 








,i 






.m. 






r-i$: 


;-•■-.•'. 


.■ ji<'J*M 


s^.. 



ai 




Sensitive 

Manual^of Investigative Operations and Guidelines 

to be followed after location of an IND. 
"2. Provide for: 



PAGE 18 - 46 




ll 



ii.aLi.on sarety precautions for IND. — - 

of render safe and disnffil IVt"^^ ^"^ development in the areas 
containment con«pts ' technology xncluding radiation dispersal 

"VI. PROCEDURES. 

"a. Initial Notification 

attention of the FM. we orthe"^D"";oon'^'''^^'r ""^ '° '""^ 
information, the aEencv infL!^! u ," , ^^ receipt of such 
FBI office and prowSe^U Z:f t'' -mediately notify the nearest 
notify all agenc^eTjn^SweS^Tt;;^ in^rrJ::?; ''' '" ^''' "^"^^^^^ 

offices, or indiviLlf Lnce'^erwlthl' ^l''-'^ •'''' "^^^^^ ^""«h". 
situation and specify wharacti!^«^^ h/" ^''^ Jurisdictions about the 
pecity What actions and/or resources might be required. 



"b. 



Initial Preparation 




command of field op;rations and J ^?'J«"*'« ^ Special Agent to take 

DOE Headquarters, f oca po ice fSr!sd*i^*'"'' '° "' " ^^^^"" ""h 
Military Command CenUr. J""«dictions, and the National 

personnel to provil; r^ui^i's^p^J.^J^ "l^'pE^''' ''"''"'' ^"^^"^ 
will be designated by competenraSJho^itf hi "" representative 
to the scene of an IND in^..„J iTlT.ll lll'^ZlTZ ^^Z'^'' 

^y t.e PBI Of a c:fdib[;%r^n:lJi;.:-J- th^tjlif^ ^^0^"^ 



Sensitive 
PRINTED: 02/18/98 



^^^ 



■:vr 



'■'i-'l^' 



^ 




Sensitive 



ParrJl"^ ^"""^'^^^^^r.^P^^tions and Guidelines 



PAGE 18 - 47 



purloTel. '''"' °' '" '"^ ^"'^^^'^^t ^°^ 1°"! coordination 

the incident ,ite"c;ntr:r center^ """*"' Post will_be collocated in 



SBSBOBBm 



■ .- , :,„£■■■' 






c. Threat Assessment 




*• • .. "1. The FBI with DOE assistance, including nnnT" ~" 

partxc.patxon when appropriate, will provide a th;e:ri;sesL?2?. 

«..• ^ , . "^' ^^^ ^^^^ provide scientific and technical 

assessments to the FBI. "^°''^^^^^ "^^h those threats and report its 

mr if "^' °°^ *'^^^ determine, in coordination with the 

S-;roducts ar"" "'*'«^^*^' ^P«-i-i -clear material, or radioactive 
FBl' SSd Ld i^r^-n^ °l unaccounted for and report results to thl 
nuc earweanlf^! ' ^ ^l? requested by the FBI, determine if any 
nuclear weapons or components are missing. 

credible ^h.«=^- "a' ^^* P^ '''^^ """^^^^ °°^ through the NMCC of any 
credible threat and request DOE and DOD/EOD assistance. 

"d. Search and Location 

search and locatiln'of^J^'s!' "^^r P'^^"^^^ responsibility for the 

nnv - "'^* ^^ "^^^ dispatch, upon request of the FBI a 

DOE^response group and necessary special equipment to the scene ;f an 

... T^* ^^^ response group will bv use nf 



•v..-.:K. 

•■'V-i 









-it: 




i^^^^^^^^"^^'^-^'^''^^?^^^^^ 



Sensitive 
PRINTED: 02/18/98 











Manual^of Investigative Operations and Guidelines 

suspected presenc?;. ^^y-?r^;p:rS:wr::^r^Hrf ^e^'^^^r ^"r " 
xn which the DOE response group is searching! " structure 

the Clearance of Iny boX??" apf or"ther"h:f :''' '^ •"-P-'-i^le ^or 
by the DOE team during ?he seSch hazardous x terns encountered 

security of. and ll'cesl^V^Ll"';^ ^t"^^ ^"i""^ responsibility for 
. y £, ana access to. the location of an IND incident. 



--^e_._Incid_ejvt„Sit^_Recpnnai«ance_^^^^ 



of explosive devil'";. ''°°^^°° Personnel will clear the area/structure 

s^f^t^r .r,A ^-"^l. °°° "^^^ provide a qualified individual for 

safety and coordination of functions at the working point 

"f. Diagnostics and Measurements 
responsibility .o^dia^^^trira^^^l:::::^:?"' "^- ^-« P^^-ry 

diagnostic and «eL';re°ent^%"n»:it''Jetf ns^rrtA through use of 
including its structure and Juiction! ' suspected device. 

function of the dlwce^^n /K^'^'''^i^^*'' anticipated structure and 
persoin^i? '" "'^^ "^ provided by DOE to the FBI and: DOD/EOD 



"g. Dispersal Containment Preparations 

..p.o.t. ^y „,„L^. "rL"? z-^;r?:; ti^^z, ""■ ™' 






Sensitive .,■.■.,. , r^^ 






PAGE ■ 18 - . 48 '--fa 

,.r,,.'.^..<fj,i 



■•-*., 












m 



personnel. " """ "^ ""*• " '^'^^ '"BI and: DOD/EOD ^.^■ 

as related to the"Lide;t!*'* ' """"^ assessment to the DOD and FBI 



i',^^^. 






.W.J. ■ 



Sensitive . . ' ■ ;j^ 

PRINTED: 02/18/98 ^,;« 







I 



PAGE 18 - 49 



Sensitive 

Manual of Investigative Operations and Guidelines 
Part II ~ 

I radiological matter. 

I "h. Device Deactivation 

"1- DOD/EOD, with FBI and DOE support, will have the 
primary responsibility for device deactivation. 

"2. DOD/EOD and DOE personnel will develop suitable 
render safe procedures. 

"3- DOD/EOD personnel will perforin the approved 
-dp_UYation_pxocedures,__D^^^^^^ personnel will work in 
close cooperation to achieve the deactivation of the devicT. " 



"i. Post Incident Operations 

"!• The FBI, with support of DOE, DOD and other 
Federal, state and local authorities will have primary responsibility 
tor post-incident operations. 

"2. DOD/EOD and DOE personnel will work closely 
with, and in support of. the FBI in the preservation of evidence. 

"3. DOE and DOD will arrange for any special 
transportation of nuclear material in coordination with the FBI. 

"4. The FBI will request assistance from DOE, DOD, 
and appropriate civilian agencies for post-incident cleanup. 

"j. Major Emergency or Disaster. 

"In the event of a major emergency or disaster, DOE will 
assist m the response to post-incident cleanup requirements in 
coordination with the DOD and various civilian agencies as provided 
for under other agreements. DOE will have assistance from the DOD as 
provided for in the March 1, 1977, DOD and DOE Agreement in Response 
to Accidents-Incidents Involving Radioactive Material or Nuclear 
Weapons. 



I "VII. Emergency Assistance Expense, 




DOD, DOE, and the FBI will each fund for the costs which 
they incur in providing the equipment and services required to meet 
their responsibilities defined in this agreement. Any reimbursements 
which may subsequently be agreed upon by the undersigned in 
furtherance of this agreement will be in accordance with the Economy 






S\t^' 



Sensitive 
PRINTED: 02/18/98 






t'i^^^^j 



^■Ml;»<i^W«> ^ /..■..■-,,.^;»^.„^,.t;j; 



^ UfL'.u '. m' tger.' w t gy fy- ^ ti'CT'w.r: 






Sensitive 



Manual of Investigative Operations and Guidelines 

Part II . ■ ■■•.,.-■■■•■ ■. „ - 



PAGE 18 - 50 



Act, 31 U.S.C. 8. This agreement takes effect on the last date of 
signature shown below: 



date 2/27/80 



date 1/29/80 



date 2/21/80 



hi Duane C. Sewell, 

Duane C. Sewell, Assistant Secretary 
. for Defense Programs, DOE 

hi David M, Mullaney, 

David M. Mullaney, Brig. Gen, USAF 
^Deputy._AssiBtant-to_the_Secretar y 
of Defense (Atomic Energy) 

hi William H. Webster, 

William H. Webster, Director 
Federal Bureau of Investigation 

"Appendix A 
"Definitions and Abbreviations 

"Improvised Nuclear Device (IND) - Any nonconventional explosive 
device containing nuclear or radioactive material combined with 
explosives. 

"Nuclear Threat Incident - Any situation involving stolen, lost, or 
unauthorized possession of source materials, special nuclear 
materials, radioactive by-products, nuclear weapons/devices of U.S. 
and/or foreign manufacture, improvised nuclear devices, radioactive 
dispersal devices, or the threatened use of said items. 

"Explosive Ordnance Disposal (EOD) - The detection, identification, 
field evaluation, rendering-safe, recovery, and final disposal of 
Unexploded Explosive Ordnance (UXP) . 

"National Military Command Center (NMCC) - Centralized controlling and 
notification point to activate and coordinate DOD activities. 

"Working Point - The area immediately surrounding the device. 

"Special Nuclear Material - The term special nuclear material means 
U; Plutonium, uranium enriched in the isotope-233 or in the 
isotope-235, and any other material which DOE, pursuant to the 
provisions of section 51 of the Atomic Energy Act, as amended. 









43:- 






■■%. 



izH. 



■,'i 



Sensitive 
PRINTED; 02/18/98 






_L ^.4..-i.J-'i..J^'.^..l..L^... ..,.i;, 




Sensitive 



Manual of Investigative Operations and Guidelines 
Part II. ''■■: • 



PAGE 18 - 51 



determines to be special nuclear material, but does not include source- 
material or (2) any material artificially enriched by any of the 
foregoing, but does not include source material."! 



EFFECTIVE: 04/08/80 



— _ ?> '-J&^ -: 






m 








18-10 



MEMORANDUM OF UNDERSTANDING BETWEEN THE DEPARTMENT OF 
JUSTICE AND THE DEPARTMENT OF THE INTERIOR REGARDING 
.FEDERAL_RESPgNSE_TOj:^iyiL. DISORD ER ON IND IAN RRSKRyATTOWg 






The purpose of this agreement is to delineate the responsibilities of 
the various federal agencies for ciyil^disprder control on Indian 
reservations in the United States and to idenri'fy*basi'e-command.and*,,_ 
control channels and general procedures for such operatioiis. The '^^^^^^^^^^ 
policy contained herein shall apply to civil disorder situations 
arising on any Indian Reservation under federal law enforcement 
jurisdiction, either exclusive or concurrent. 

"A current list of reservations and jurisdiction is attached to this 
agreement and will be updated from time to time as necessary by the 
Department of the Interior. 

"For the purposes of this agreement, a civil disorder is defined as 
follows: 

"The term 'civil disorder' means any public disturbance involving acts 
of violence by assemblages of three or more persons, which causes an 
immediate danger of or results in damage or injury to the property or 
person of any other individual." (18, USC, 12, Section 232(1)) 

"Nothing contained in this agreement shall be construed as in any - 
manner limiting, modifying, or redefining the statutory and other 
investigative authority of the Federal Bureau of Investigation. 

POLICY 

"The Attorney General has been designated by the President as chief 

civilian officer for coordination of all federal government ' 

activities relating to civil disturbances, including" - 7' s 

acts of terrorism within the United States. However, it is the policy 

of the Attorney General that existing established law enforcement 

authority on Indian reservations will not be superseded or augmented 

by Department of Justice law enforcement resources and authority 



■ -'^^ 

a 

■.-;#• 



m%. 






- y^- 



' -^r^. 



Sensitive •■ 
PRINTED: 02/18/98 









SEP 




^^'J**' 



:.:.:•! 




PAGE 18 - 52 



Sensitive 



Manual of Investigative Operations and Guidelines 
Part H- . ,.^ .,/--.,r ■•■-.:- •.-'•■.. 

unless absolutely necessary and then only at the request of the 
Secretary of the Interior or his designated representative. 

"The primary responsibility for the law enforcement response to a 
civil disorder situation arising on an Indian reservation under 
Department of the Interior jurisdiction will rest exclusively with the 
Assistant Secretary - Indian Affairs or the Commissioner of Indian 
Affairs or his delegated representative. 

"Where local resources are inadequate to deal with civil disorder, the 
Commander of specially trained Bureau of Indian Affairs law. 
_«!>f or=.ement_of f^ic^s^jji IJ^ act^ j^s^ gnt^^ j^^ ^ 

will be responsible for restoring order. Ail Bureau of" IndianATfal^T" 
law enforcement officers engaged in restoration of order on the 
reservation will operate under the command of the senior Special 
Operations Service Unit official on site. 

'"Whenever^,any^ civil disorder reaches a point beyond the control 
capabilities of local •'and Bureau-of-Indian.Affairs resources, the 
Department of the Interior may elect to req'uesT"aTsislfance froo.the^. 
Department of Justice. ri- -?* 

"Based upon a request for assistance by the Department of the Interior 
and an assessment of the civil disorder situation, the Attorney 
General or the Deputy Attorney General will determine what, if any. 
response is appropriate and shall so advise the Department of the 
Interior in a timely manner. 

"If a decision is made to intervene, the Attorney General or Deputy 
Attorney General will order or request deployment of federal civilian 
or military forces. The selection of Department of Justice resources 
to be committed shall rest exclusively with the Attorney General or 
the Deputy Attorney General. 









,.;^m 



■ f V ' 



^^-^r^mmA*- 







GENERAL PROCEDURES 

"1. In the event of an actual or potential civil disorder on an 
Indian reservation under federal jurisdiction, the Bureau of Indian 
Affairs will take or direct appropriate law enforcement action and 
notify the nearest office of the Federal Bureau of Investigation. 

"2. The Federal Bureau of Investigation (FBI) office notified will 
immediately report the incident to the FBIHQ in Washington. FBIHQ 
will immediately notify the Office of the Deputy Attorney General 
through the Department of Justice Emergency Programs Center. 



Sensitive 
PRINTED:, 02/18/98 









-l.Ji!„iJ^m-Jll.lJ. . .IL. ■l..P..'LLL A11..I1LI-L. 





^zTtinrr^j- 



Sensitive 



Manual of Investigative Operations and Guidelines 
Part 11 -< l:- -" .'^■- ■ 



PAGE 18 - 53 



"3. At this point civil disorder control responsibility rests solely 
with the Department of the Interior and any FBI special agents on site 
are responsible only for normally authorized investigative activity to 
the extent that such activity can be safely conducted and for keeping.' 
FBIHQ apprised of the disorder situation so that the Attorney General 
or Deputy Attorney General will be prepared to act quickly and 
effectively on any subsequent request for assistance. 



"4. When the Department 
disorder on an Indian res 
by local or BIA resources 
_as si stance ,_the_Attorney 
assess the situation and 
Department of Justice or 
civil response resources 
the Attorney General. If 
military forces will be r 
established procedures. 



of V the Interior determines that a civil 
ervation cannot be controlled or terminated 

and requests Department of Justice 
General_.or_the__Deputy, Attorney G enera l will ] 
determine what response is appropriate. If a 
other response is required, the selection of 
to be employed shall rest exclusively with 

federal civilian resources are inadequate, 
equested by the Department of Justice through 



"5. Upon arrival and deplojraent at the scene of a civil disorder, and 
at a time to be designated by the Attorney General or the Deputy 
"Attorney General, ..the^jAttorney General ' s designee on site will assume 
operational control of ' tlm ^iisordi8r'>8ituation;^and_.,wi^ 

for restoring order in accordance with established ^toc%ZurSs^'tin^i^%rrri^'-^^, 
instructions. 

"6. When the law enforcement resources designated by the Attorney 
General or the Deputy Attorney General assume control of a disorder 
situation the Secretary of the Interior will place his law enforcement 
resources at the site at the disposal of the Department of Justice 
designee. 

"7. At a time to be mutually agreed upon by the Department of Justice 
and the Department of the Interior control of law enforcement activity 
at the scene of the civil disorder will be returned to the Department 
of the Interior. 






"'•■Ms; 



.. ,-,5, 



'■'&>■ 









•■Si: 



^♦^;?f«fS!!jjftl 



•ex- ft. 




"It is understood and agreed that a basic objective of this agreement 
is to ensure a coordinated and effective federal effort in response to 
incidents of civil disorder on Indian reservations. It is anticipated, 
that this agreement will serve to' eliminate delays in appropriate 
federal law enforcement action during periods of civil disorder and ' 
will clearly define basic law enforcement responsibilities, which will 
be further implemented through continuous development of contingency 
plans and procedures by the agencies involved. 



Sensitive ' 
PRINTED: 02/18/98 














Sensitive 

Manual of Investigative Operations and Guidelines 
Part. II- ■.^,,^>_.- ■. /■- .• ■.■,••-:. ; ,-. 

FOR THE DEPARTMENT OF JUSTICE 



PAGE 18 - , 5 A 



! 



/s/ Charles B. Renfrew 
CHARLES B. RENFREW- 
DEPUTY ATTORNEY GENERAL 

Dated: 1/20/81 



FOR THE DEPARTMENT OF: 
THE INTERIOR 



/s/ Cecil D. Andrus 



Dated: 1/8/81" 




"The following list of Indian Reservations was furnished by the 
■ DgP.MtMgntg^f__theJ[j^terior. Bureau of Indian Affairs. Division of Law 
Enforcement Services and represents those reservations as" of ~22 '' " 
January 1981 that are included in the scope of this agreement. 

Bureau of Indian Affairs 
Division of Law Enforcement Services 

BIA RESPONSIBILITY FOR LES BY STATE 
AND RESERVATION/TRIBE 






■■'■"■0. 









STATE 



RESERVATION/TRIBE 



5^'^^fff^^^^rrcr:^-— ^ 



^?^^*c?w,>. 



't"?A^Avi,^.-x'n 



1. Alaska (1) 

2. Arizona (Incl. 

NM & Utah) 



%^'?«:S;*fS.:?^~^^, 



(18) 




■¥^S;s?fr^,*»*iJL' Annette Island 

2. Navajo 

3. Colorado River 

4. Cocopah 

5. Fort Mohave 

6. Fort Yuma 

7. Fort Apache 

8. Kaibab 

9. Hopi 

10. Fort McDowell 

11. Papago 

12. Ak Chin (Maricopa) 

13. Gila River 

14. Salt River 

15. San Carlos 

16. Camp Verde 

17. Havasupai 

18. Haulapai 

19. Yavapai-Prescott 



?!feji!J»«;i>i*S, 



W 



. ■■J^i.'/l. 

'■■'■■ISi 















Sensitive 
PRINTED: 02/18/98 






BSSSBSSBEar 




Sensitive 



Manual of Investigative Operations and Guidelines 
Part II. - ■■ '-- ■ •.. , 



|--- ';'■■■• N ■■■:.■ 

I 3. California (i) 

4. Colorado (2) 

5. Florida (1) 

6. Idaho (4) 




7. Kansas (2) 

8. Maine (3) 

9. Michigan (5) 



10. Minnesota (2) 



I 11. Mississippi (1)- "'rs..- 



i-3W»? 



12. Montana (7) 




13. Nebraska (1) 

14. Nevada (26) 



PAGE 18 - 55 



■.i<3V 



20. Tonto Payson 

21. Hoopa/Yurok, 

22. Southern Ute , 

23. Ute Mountain 

24. Miccosukee. 

25. Fort Hall 

26. Kootenai 

27. Coeur D' Alene 



28. Nez Perce 



29. 

30. 



Kickapoo 
Potawatomie 



31. Indian Township 

32. Pleasant Point 

33. Penobscot 

34. Bay Mills 

35. Hannahville 

36. Keweenaw Bay 

37. Saginaw-Isabella 

38. Sault Ste. Marie 

39. Nett Lake 

40. Red Lake 



■;>.j;i.>u.,rt . ^1' Choctaw 



42. Blackfeet 

43. Crow 

44. Flathead 

45. Fort Belknap 

46. Fort Peck 

47. Northern Cheyenne 

48. Rocky Boys 

49 . Omaha . 

50. Battle Mountain 
Col ony 

51. Campbell Ranch 

52. Carson Colony 






'^,/«.;-*^!^.;i 



Sensitive 
PRINTED: 02/18/98 












■ii 



•/■.;?., 

-i 






■■■■■• •rjiCii*. 






:ii; 






rnin iir nrffi'rfn rtwi^'ni 




Sensitive 



Manual of Investigative Operations and Guidelines 
Part II . 



PAGE 18 - 56 



i 




New Mexico (22) 



'■^'SSSir'^:-! 



53. Duck Valley . 
Reservation 

54. Duck Water 
Reservation 

55. Dresslerville 
Co 1 ony 

56. Elko Colony 

57. Fallon Colony 

58. l^'ort McDermitt 
Reservation 

59. Goshute Reservation 

60. Las Ve g as Colon y 

61. Lovelock Colony 

62. Moapa Reservation 

63. Odgers Ranch 

64. Pyramid Lake 
Reservation 

65. Reno-Sparks Colony 

66. Ruby Valley 
Reservation 

67. South Fork 
Reservation 

68. Summit Lake 
Reservation 

69. Walker River 
Reservation ' 

70. Washoe Pinenut 
Allotments 

71. Washoe Ranches 

72. Winnemucca Colony 

73. Woodfords Community 

74. Yerington Colony 

75. Yomba Reservation 

ti,^76. Jicarilla 

77. nescaTerai^:'>-:!:>-f.r:'/f-^»!^!^:^<i„.^, , 

78. Nambe Pueblo 

79. Picuris Pueblo 

80. Pojoaque Pueblo 

81. San Ildefonso 
Pueblo 

82. San Juan Pueblo 

83. Santa Clara Pueblo 

84. Taos Pueblo 

85. Tesuque Pueblo 

86. Acoma Pueblo 






: was,;' 



w 



■1M- 



•■£k 



'•JiKi' 






Sensitive 
PRINTED: 02/18/98 






■' hurt .fc rr'. a «n if Hiftii-h i . 




Sensitive 



Manual of Investigative Operations and Guidelines 
Part II ■■ -;. ' ' ^ 



87. 
88. 
89. 
90. 
91. 
92. 
93. 
94. 



95. 
96. 
97. 



16. North Carolina (1) 

17. North Dakota (3) 

18. Oklahoma (10) 



PAGE 18 - 57 



Cochiti Pueblo 
Isleta Pueblo 
Jemez Pueblo 
Laguna Pueblo 
Sahdia Pueblo 
San Felipe Pueblo 
Santa Ana Pueblo 
Santo Domingo 
Pueblo 
Zia Pueblo 
Zuni Pueblo 
Ram ahi-Nava jo 



98. Eastern Cherokee 



99. 


Fort Berthold 


100. 


Fort Totten 


101. 


Turtle Mountain 


102. 


Absent ee-Shawnee 


103. 


Apache 


104. 


Caddo 


105. 


Cheyenne-Arapaho 




Tribe 


106. 


Comanche 


107. 


Delaware 


108. 


Kiowa 


109. 


Pawnee Tribe 


110. 


Ponca Tribe 


111. 


Wichita 


112. 


Warm Springs 


113. 


Burns Paiute 




Allotments 


114. 


Umatilla 



19. Oregon (3) 



,20.„.. South Dakota (9) 115. Cheyenne River 

■/' ■■■.; ''-i-^'^T~r^??*^?^Tsr".**^--;^,a_, 116. Crow Creek ' 

119. 
120. 
121. 
122. 
123. 



■ -;■>■■ ■•;'<&«• 









Xif. 






m 






■;';5f? . 



■,3' 



Lowi^r^'BruTiS^Si^i^^?^ 

Pine Ridge. ' • 

Rosebud 

Sisseton 

Yankton 

Standing Rock (Inc. 

ND) 












Sensitive , 
PRINTED: 02/18/98 



I 




^i^ 




'■'f 


'.,'-x^'. 






:^;? 



''*"'" •" •* '" i«i''""j"— ''^^ ■■ c::;.:.^-i.^:;r,^^^-i-v.:.'t«v..v,:.v.i;i.i',igia:^^;i-j-'p-fYi":;-^.;. 



■■*5f? 




Sensitive 






Manual of Investigative Operations and Guidelines 
Part II ■ : ,.■■'. '■-■..'■■ 



PAGE 18 - 58 







21. Utah (2) 



22. Washington (25) 



j 23. Wisconsin (1) 
I 24. Wyoming (1) 



124. 


Skull Valley 


125. 


Uintah and Ouray 


126. 


Chehalie 


127. 


Colville 


128. 


Hoh 


129. 


Kalispel 


130. 


Lower Elwah 


131. 


Lummi 


132. 


Makah 


133. 


^Muckleshoot 


134. 


Nisqually 


135. 


Nooksack 


136. 


Ozette 


137. 


Port Ganble 


138. 


Puyallup 


139. 


Quileute 


140. 


Quinault 


141. 


Sauk-Suiattle 


142. 


Shaolwater 


143. 


Skokomish 


144. 


Spokane 


145. 


Squaxon Island 


146. 


Suquamish (Port 




Had is on) 


147. 


Swinomish 


148. 


Tulalip 


149. 


Upper Skagit 


150. 


Yakima 



151. Menominee 

152. Wind River 









f'VSj. 



TOTALS: 24 States - 152 Reservations"! 



EFFECTIVE: 03A)9/8r-f^)^:i^r?'^*«,w^^^^^ 



r#:^Ti "»«•:»»»!!*•,. 







•■;■>■•>■- 



>SJ3 



Sensitive 
PRINTED: 02/18/98 



*:..;.,'ii..>.5Si^-..v^v 



%s^5?#'^^';-y:v 









<■••''" ■ 




Sensitive 



Manual of Investigative Operations and Guidelines 



Part Ii:-|^V;v:;,^^,„. ;: 



PAGE 18-59 



18-11 



"I. 



MEMORANDUM OF UNDERSTANDING AND COORDINATION BETWEEN THE 
FEDERAL AVIATION ADMINISTRATION AND THE FEDERAL BUREAU OF 
INVESTIGATION 



INTRODUCTION 



■mm- 






"The enactinent of Public Law 93-366, on August 5, 1974, 
affects the rEsponsibility of the Federal Aviation Administration for 
the direction of law enforcement activity in aircraft hijacking 
situations. New Section 316(c), entitled "Overall Federal 
Responsibility," states: 







"1. Except as otherwise specifically provided by law, 
no power, function, or duty of the Administrator of the 
Federal Aviation Administration under this section 
shall be assigned or transferred to any other Federal 
department or agency. 

"2, Notwithstanding any other provision of law, the 
Administrator of the Federal Aviation Administration 
shall have exclusive responsibility for the direction 
of any law enforcement activity affecting the safety of 
persons aboard aircraft in flight involved in the 
commission of an offense under Section 902(i) or 902(n) 
of this act. Other Federal departments and agencies 
shall, upon request by the Administrator, provide such 
assistance as may be necessary to carry out the 
purposes of this paragraph. 

"3. For the purposes of this subsection, an aircraft is 
considered in flight from the moment when all external 
doors are closed following embarkation until the moment 
when one such door is opened for disembarkation. 

"In view of these and other changes in the scope of federal 
responsibility, the Memorandum of Understanding, dated September 25, 
1970, between the Attorney General and the Secretary of Transportation 
is no longer sufficient and is hereby superseded. In its place, the 
following statements of authority and responsibilities are agreed 
upon. ","■*■"•• 

"II. DESIGNATION OF AUTHORITY 



■M- 









■■•■ cf^S^„ 










"A. When the aircraft is in flight. 



^•"■!^H*«(*r^iic. 



'iif'"*-*! 



n'*"When'^a*aircraft,^is^.ini.f light, that is from the moment 






Sensitive: .%; ■ - 
PRINTED: 02/18/98' F 










Sensitive 



Manual of Investigative Operations and Guidelines 
Part II-.',-, ■ ■ ,:•• •'■ :.:■ ■:■■. 



PAGE 18 - 60 r 



M 



when all external doors are closed following embarkation, 
until the moment when one such door is opened for 
disembarkation, the pilot in command of the aircraft shall 
have normal operational control of the flight. 

"2. The- Administrator of the Federal Aviation 
Administration has exclusive responsibility for direction 
of any law enforcement activity involving an offense under 
(902 (i) and 902 (n) of the Federal Aviation Act of 1958, as 
amended. 

3. As a ppropriate. jnL__e^a^h^asje_iny^oljyi^ 



j»«55»i« 



offense, the designated official of the Federal Aviation 
Administration shall request the assistance of the 
designated official of the Federal Bureau of 
Investigation. 

"4. After fully considering the expressed wishes of the 
pilot in command, the responsible official of the airline 
operating the aircraft and the designated official of the 
Federal Bureau of Investigation, the designated official 
of the Federal Aviation Administration shall determine if 
law enforcement action is appropriate. In those instances 
in which the designated official of the Federal Aviation 
Administration determines that law enforcement action is 
appropriate, he shall request the designated official of 
the Federal Bureau of Investigation to advise as to the 
appropriate methods to, be used and, after approval of the 
designated official of the Federal Aviation 
Adminis'tration, take the law enforcement action that is 
required. 

"5. Whenever such a request is made, the designated 
official of the Federal Bureau of Investigation shall . 
provide such law enforcement assistance as is necessary. 

"6. The designated official of the Federal Bureau of. 
Investigation and the designated official of the Federal 
Aviation Administration shall maintain continuing 
coordination between their respective offices during the 
course of such law enforcement activity. 

"B. When the aircraft is. not in flight. 

"1. When an aircraft is not in flight, that is prior to 
the moment when all external doors are closed after 

PRINTED: " 02/i8798^'^^^|H!:<?nf?^ 

- .'• .".-■.■ - .. .-. •*:• . ■• -I- ., , , ,.. ij"- - 



. .. .!im- 

■:■ \^^- 
■ ■■ ■"r^n 



^- 






'■4M. 



























eit;iiilrlr»«i'i«il«iVin 



MBMMAWMMMfttal 



'-"■" M il- -^ ii VfH i l l ' l -T''"-" "■■-^ 




Sensitive 



"'■■■'■%'■' 

im 



Manual o£ Investigative Operations and Guidelines 
Part II • ■■ , 



PAGE 18 



embarkation and after the moment when one such door is 
opened for disembarkation, the designated official of the 
Federal Bureau of Investigation shall make the decision to 
take law enforcement action with respect to a hijacking. 
The designated official of the Federal Bureau of 
Investigation shall give full consideration to the 
expressed wishes of the pilot in command, the responsible 
official of the airlines operating the aircraft, and the 
designated official of the Federal Aviation Administration 
prior to initiating action. 



61 



■.ji-k- 



L'C . The_deci s i on of the designated official of the Federal 

Aviation Administration shall prevail in those instances where a 
question arises as to whether an aircraft is in flight or is not in 
flight. 



a 



"III. INFORMATION AND COOPERATION 

"A. The Federal Aviation Administration shall take all 
possible steps to establish a comprehensive information and 
intelligence communications network. To achieve this objective, the 
fullest cooperation of the commercial airlines and their pilots will 
be solicited. 

"B. The Federal Aviation Administration and the Federal Bureau 
of Investigation agree to cooperate fully with each other in order 
that each agency may discharge its responsibilities hereunder. This 
shall include the full exchange of information and intelligence. 

"IV. DELEGATION OF AUTHORITY AND DESIGNATION OF OFFICIAL OF THE 
FEDERAL AVIATION ADMINISTRATION AND THE FEDERAL BUREAU OF 
INVESTIGATION 

"A. Until the Federal Aviation Administrator is otherwise 
notified in writing by the Director of the Federal Bureau of 
Investigation, JAMES B. ADAMS, Assistant to the Director, Deputy 
Associate Director, or the official acting in his capacity, will act 
on behalf of the Federal Bureau of Investigation and will coordinate 
with the Federal Aviation Administration and its designated 
responsible officials. 









JJSjt 



m 






j-im 



"B. Until the Director of the Federal Bureau of Investigation 
is otherwise notified in writing by the Federal Aviation 
Administrator, RICHARD F. LALLY, Director, Civil Aviation Security 
Service, or the official acting in his capacity, will act on behalf of 
the Federal Aviation Administration and will coordinate with the 



Sensitive^ ^ 
PRINTED J 02/18/98 



- '0r 



••■<&:: 




Sensitive 



Kanual o£ Investigative Operations and Guidelines 
Parf II ■ .■■;>« J-if: .>■■"'■ 

Federal Bureau of Investigation and its designated responsible 
officials. 



"Dated at Washington, D.CJ this 26th day of February, 1975. 



PAGE 18 r 62 







i 


■^m^. 


, 


..-■'Y'itp 




,■ .-. ;«•?*! 




' :#t 




■M^ 








"■'i 




. • JV 


62. 


.-i?!i*» 

^^■^m 




■ -"t*'i" 




•?fs 




S 


"■'■ ■, 


■,;iV- 



i^i 



/s/ Alexander P. Butterfield 
Administrator 
Federal Aviation 
Administration 



-ft !/ 
Ad 






.■ *•: 



W- 



/s/ Clarence M. Kelley 
Director, 
Federal Bureau of 
Investigation"! 




EFFECTIVE: 01/08/82 



-3. 



^w 



1 18-12 MEMORANDUM OF UNDERSTANDING BETWEEN THE FEDERAL BUREAU OF 
INVESTIGATION AND OFFICE OF INSPECTOR GENERAL RESOLUTION 
TRUST CORPORATION 

"This memorandum constitutes an agreement voluntarily entered into 
between the Office of the Inspector General (OIG) of the Resolution 
Trust Corporation (RTC) , and the Federal Bureau of Investigation ,. 
(FBI). 







"A. PURPOSE 

"The purpose of this memorandum is to delineate the investigative 
responsibilities of. the FBI and the OIG-RTC to ensure the most 
effective and efficient utilization of the limited resources which are 
available, and to ensure the timely exchange of information regarding 
allegations of criminal conduct involving RTC employees, programs, and 
functions. , 

"B. APPLICABLE AUTHORITY 

"The Inspector General Act of 1978 ("IG ACT"), Public Law 95-452 (5 



iJtft:V-v^.'!\: 



Sensitive - 
PRINTED: 02/18/98,, 



■■^m 



■'A 






;^?>tf^r>^i^Sy 









>'->i*!V*T' 



' ■.':■ .1- . 




Sensttive 



Manual of Investigative Operations and Guidelines 

Part II -'L --'■.:■: ' ■■ '! .:■-'-- 



PAGE 18 - 63 



use App.) , created OIGs with the statutory authority to conduct 
inveistigations relating to £raud, waste, and abuse within their 
respective agencies' programs and operations. The Financial 
Institution Reform, Recovery, and Enforcement Act of 1989 (P. L. 
101-73) (FIRREA). amended the IG Act to add an Inspector General for 
the RTC. 

"The FBI derives its criminal investigative jurisdiction from Titles 
18 and 28 of the United States Code (USC) , the Code of Federal 
Regulations and through the Attorney General of the United States. 









•^';A 






1 



_!lSection_535_of_Title_28.,_USC,_specifically_sets_„for.th _^___ 

the FBI's jurisdiction to investigate violations of Title 18 involving 
Government officers and employees. Further, this statute also imposes 
upon every department and agency head of the Executive Branch of the 
Government a duty to report expeditiously to the Attorney General any 
information, allegations, or complaints relating to possible 
violations of Title 18 involving officers or employees of the 
Government unless the responsibility to perform the investigation of 
that violation is, by law, specifically assigned otherwise. 

"C. BACKGROUND 









"The Attorney General has formulated a written policy statement for 
the Department of Justice (DOJ) regarding its relationship and 
coordination with the statutory Inspectors General. The policy states 
in part, that the Attorney General is the chief law enforcement 
officer of the United States. Further, that whenever there is reason 
to believe that a Federal crime has occurred, the DOJ should be 
advised. This reporting normally will be to the 

United States Attorney (USA) in the district where the crime occurred 
or is occurring. 

"In order to comply with the Attorney General's reporting requirement, 
the FBI and the OIG-RTC agree to present all allegations of a 
violation of Federal criminal statutes to the USA's Office 
in the district where the crime occurred or is occurring. The 
presentation to the USA will occur within 30 days of receipt of the 
information indicating a criminal violation, for the purpose of 
obtaining a preliminary prosecutive opinion. ■ 

"The FBI and the OIG-RTC further agree to advise each other of the 
initiation of any criminal investigation involving RTC employees, 
programs or functions and/or individuals and contractors acting for or 
on behalf of the RTC. The notification shall be in writing and will 
occur within 30 days of the initiation of a criminal investigation. 



Sensitive;, 
PRINTED: 02/18/98 



M 



■,■$■■• 



•TV'.. 



•-■ ..-.,^f.v-'S'--3'- ■• 













li 






Sensitive • -v;...,.:if: 

• ■ ■ . . ■.•■■■ ■ , ■ ■ ^ -K^i^ 

, ■ ■ • -^ 

Manual of Investigative Operations and Guidelines ,;;' 

Part II . . - / . PAGE 18 - 6A' ;^ 

■ ' . ' • y , ; • ■ ■ ■ • . ;.;: 

The notification shall include the predication for initiating the ^ ""^ 

investigation, any facts developed, any evidence obtained, and the 
initial prosecutive opinion rendered by the USA's Office. 

"The FBI and the OIG-RTC further agree to advise each other of the 
final results of those criminal investigations involving RTC 
employees, programs or functions. The notifications of the initiation 
of investigation and the final results of an investigation shall be 
made both to the field office covering the territory where the 
criminal activity took place and to the headquarters of both the FBI 
and the OIG-RTC. 



^•s^^ 



"The reciprocal notifications will allow each agency to be informed of 

investigations being conducted by the other agency, thereby 

facilitating coordination of investigative efforts and avoiding 

duplication of effort. In addition, each agency may request to join V;j 

an investigation being conducted by the other agency. The "J 

investigating agency may, however, decide to conduct the investigation 

unilaterally. -'\^_ 

- V- 

"The above reciprocal notifications shall not apply to those ,i, 

investigations where disclosure might endanger the safety of FBI, OIG- ,'" 

RTC, or other personnel, or otherwise have a potentially adverse rfj 

impact upon the investigation. i-= 

"The FBI and the OIG-RTC agree to obtain the approval of one another jj: 

prior to disseminating the other agency's documents to a third agency. ^' 



•i.i: 



I "D. RESPONSIBILITIES OF THE OIG-RTC 

"1. The OIG will promptly advise the FBI upon the 
initiation of all criminal investigations undertaken by the OIG-RTC 
involving employees, programs, and functions of. RTC and/or individuals 
and contractors acting for or on behalf of RTC, The OIG-RTC will - 
provide the FBI with a list of regional OIG-RTC offices and ensure 
that any changes to the list of offices are provided to the FBI on a 
timely basis. 

"2. The OIG will refer to the FBI, for investigation, all 
allegations of bribery or attempted bribery involving RTC employees 
and other individuals and/or contractors acting for or on behalf of 
RTC, upon receipt. 

"3. The OIG will refer to the FBI for investigation all 
information pertaining to "organized crime," including both 
traditional La Cosa Nostra (LCN) matters and nontraditional criminal 



Sensitive' ;•■';, '^:W^- 



PRINTED: 02/18/98 







Sensitive 



Manual of Investigative Operations and Guidelines 
Part II "''^ ■"■^-' ■'-'■ /-" '-:.:,, ■ ■" i, ' 



PAGE 18 

■■'..% ■'''<■:■ . -. ' 



-■ 65 



enterprises identified in the FBI's National Organized Crime Strategy,' 
upon receipt. . . 

"4. The OIG will refer to the FBI, for investigation, all 
allegations of bank fraud and embezzlement which may have occurred 
prior to the date of "conservatorship." 






fm--: 



1 



"5. The OIG will investigate all noncriminal 
administrative and civil matters arising from and pertaining to RTC 
programs, functions, and personnel. Certain civil investigations 
arising from criminal cases investigated-by the FBI may, however, be 
handled by the FBI. The OIG may institute whatever action is deeme d 



appropriate in those instances where the FBI notifies the OIG that it 
is not going to initiate an investigation or that the USA has declined 
to prosecute a particular matter. 

"E. RESPONSIBILITIES OF THE FBI 






M 



"1. The FBI will promptly advise the OIG-RTC upon the 
initiation of criminal investigations undertaken by the FBI involving 
employees, programs, and functions of RTC and/or individuals and 
contractors acting for or on behalf of RTC except in those situations 
articulated above. The FBI will also advise the OIG-RTC of the 
results of completed investigations as set forth above. The FBI will 
provide the OIG a list of all FBI field offices and ensure that 
changes to the list. of field offices are provided to the OIG-RTC on a 
timely basis. 

"2. The FBI will assume investigative responsibility for 
all allegations of bribery or attempted bribery involving RTC 
employees and other individuals and/or contractors working for or on 
behalf of RTC. 

"3. The FBI will assume investigative responsibility for 
all allegations of criminal activity involving "organized crime" 
including traditional LCN matters and nontraditional criminal 
enterprises identified in the FBI's National Organized Crime Strategy. 
The FBI will promptly furnish the OIG-RTC a copy of the FBI's National 
Organized Crime Strategy and will promptly advise the OIG-RTC of any 
changes to the FBI's National Organized Crime Strategy. 

"4. The FBI will assume investigative responsibility for 
all allegations of bank fraud and embezzlement which may have occurred 
prior to the date of "conservatorship." 












..-'•>.« 

'■'^m- 



^m 



"5. The FBI will advise the OIG whether or not it will 



Sensitive 



PRINTED: 02/18/98 






■ -^.^„^-rr,.^:.i.— .,.,.-,■■ . ....,- ^.:.^-..^..s—,„..-^.-,. -.■..■:., ,1,., ^.f.;., „-,,«r;j.,.-^../ f >,(. ^«^^^^. 






>■ -■»■ ■ :?«■' 




Sensitive 



Manual of Investigative Operations and Guidelines 
Part- II' " , •./•••'^;: -" '■■'■, , ". "' ' v- ' " ■' ■ , ' f ' [ 



PAGE 



18 - 66 :|^; 

■.,v,; t^':, .-■:■:. j;\^- 



investigate a matter referred by the OIG within 45-60 days of thei 
receipt of the information, except in matters of bribery and/or RTC 
employee involvement. In these latter situations, telephonic* 
notifications should be made to the appropriate OIG-RTC Regional 
Inspector General for Investigation within 30 days. 



■MS:. 




"F. JOINT ENDEAVORS BY THE FBI AND THE OIG 

"The OIG and FBI may agree to enter into joint investigative efforts, 
including undercover operations (UCO) , in appropriate circumstances. 
Separate written agreements will be prepared for each joint undercover 

_.investigation,_setting_for.th_the_respective..responsibilities_of _.each 

agency. All UCOS will conform to pertinent Attorney General and FBI 
guidelines. Control of joint UCOs will be the responsibility of the 
FBI. 

"V/hile differing circumstances will result in varied arrangements from 
project to project, certain conditions will remain constant. 
Participating personnel will be supervised by their respective 
agencies. Only one evidentiary document or report of interview will 
be prepared. Any contact with the news media, such as press releases, 
will be coordinated and agreed to in advance. 

I "G. REVISIONS/TERMINATION OF THIS AGREEMENT 

"Both parties agree to consider any proposed changes to this agreement 
which would improve the working relationship between the FBI and the 
OIG-RTC. This agreement may be terminated at any time, by either 
party, by deliverance of a written notice to terminate. 



-^W 



'-Mi 



-;..--i?W5t. 
•5- ■--jii' 

mi: 

■■'■::tiT 



■::Jm 

■■ • -.-^CV 



"H. EFFECTIVE DATE 

"This agreement becomes effective when approved and signed by both 
parties. 






William H. Baker 

ASSISTANT DIRECTOR 

CRIMINAL INVESTIGATIVE DIVISION 

FEDERAL BUREAU OF INVESTIGATION 



10/21/91 
DATE 



John J. Adair 
INSPECTOR GENERAL 
RESOLUTION TRUST CORPORATION 



October 30, 1991 

DATE I ' 



.AiXt. 







Sensitive 
PRINTED: 02/18/98 



■~Ts!i---'- 



;^^iV^«-.-'-' 







Sensitive 



Manual o£ Investigative Operations and Guidelines 
Part II •■ , 



PAGE 18 - 67. 



■1* 

"v'J-'lJK 



-rim 




EFFECTIVE: 04/30/93 



1 18-13 MEMORANDUM OF UNDERSTANDING BETWEEN THE FEDERAL BUREAU OF 
INVESTIGATION, THE UNITED STATES MARSHALS SERVICE, AND THE 
FEDERAL BUREAU OF PRISONS ON VIOLATIONS OF THE FEDERAL' 
ESCAPE AND RESCUE STATUTES 

"I. PURPOSE: This Memorandum of Understanding (MOU) 
be t we en the Federal Bureau o£ Inv est i gation, hereinafte r referr ed to 



aTthe FBI, the United States Marshals Service, hereinafter referred 
to as the USMS, and the Federal Bureau of Prisons, hereinafter 
referred to as the BOP, sets forth the responsibilities of each agency 
with regard to the apprehensions and investigations under the Federal 
Escape and Rescue Statutes (Title 18, United States Code (USC) , 
Sections 751 through 757), 

"il. GOALS: It is mutually agreed that a MOU should be 
established on the Federal Escape and Rescue Statute to ensure an 
effective and efficient federal response to escape incidents and to 
clarify Section D of the 1988 Attorney General 'Policy on Fugitive 
Apprehension, in Federal Bureau of Investigation and Drug Enforcement 
Administration Cases.' 

"It is mutually agreed that each participant in this MOU 
will coordinate, as appropriate, and fully share information and the 
fruits of their respective investigations to assist each in fulfilling 
its own mission and responsibilities concerning violations of the 
Federal Escape and Rescue Statute. 

"III. IMPLEMENTATION: The FBI, the USMS, and the BOP will 
develop and exchange such additional instructions and operating 
procedures as are deemed necessary to the continued implementation of 
this MOU with the goal of a coordinated, efficient, and effective 
interagency response to escape violations. • 

"In accordance with the terms of this MOU, in those 
locations in which a federal correctional institution is situated, a 
single operational plan will be prepared by the three agencies which 
will address those issues unique to that location regarding resources, 
manpower, notification, etc. It will be prepared by and for the 
benefit of the affected personnel in each location who will be 
^directly involved in any situation covered by this MOU. This 
operational plan will in no way circumvent or oppose the letter and 



Sensitive 
PRINTED: 02/liB/98 












^^*- 



-:'.*;. 

M 



m 







Sensitive 



Manual of Investigative Operations and Guidelines 
Part II ■ . ' ^.■':.-: -■.■. 





PAGE 18 



I spirit of this MOU. 

i "IV. RESPONSIBILITIES: 

I "Federal Bureau of Investigation: 

"A. The FBI will have apprehension responsibility 
and investigative jurisdiction for all violations of the Federal 
Escape and Rescue Statute (Title 18, USC, Sections 751-757), involving 
subjects of FBI investigations, up to and including the time of 
sentencing. The FBI will coordinate this apprehension and 
invest igati ve responsibility with the USMS and the BOP , as 





... , .^,.. ...,^ 




. 7 'jt- 




■-I 








^,-'/^' 




' ■- :■ ■£€ 






68 


.. :m 




.-iM' 




.i 


- 





appropriate. 

"B. The FBI will maintain investigative 
responsibility for all violations encompassing conspiracies to violate 
the Federal Escape and Rescue Statute or the conspiracy statutes 
(Title 18, USC, Sections 371-373) covering escape/attempted escape as 
they concern federal penal institutions and detention centers. 

"IT IS THEREFORE UNDERSTOOD THAT THE FBI SHALL: 

"1. Assume apprehension responsibility for an 
escaped federal prisoner, from any facility, at any stage up to and 
including sentencing, who is the subject of an FBI substantive 
investigation, and/or the subject or member of an organization which 
is the subject of an existing FBI National Security, FBI Organized 
Crime, or FBI Terrorism investigation. 

"2, Maintain investigative jurisdiction over all 
conspiracy, rescue, facilitation, incitement, or aid to escape or 
attempt to escape, where the escape or attempt occurs within/from a 
federal penal institution/detention center. 

"3. The FBI will be immediately notified by the BOP 
and/or the USMS whenever an escape occurs from a federal facility and 
circumstances arise indicating a conspiracy to escape/attempted 
escape; the introduction of a firearm/contraband into a federal 
facility; corrupt and/or collusion of correctional facility personnel; 
acts of riot or mutiny; or acts of violence, death or serious bodily 
injury. Coordination will be implemented and maintained with the 
USMS, who will exercise apprehension responsibility for non-FBI 
subjects, and the BOP, as appropriate. Joint FBI and USMS/BOP 
investigation will be viewed as the optimum objective. 

"4. The FBI will assume investigative responsibility 



Sensitive 
PRINTED: 02/18/98 






>4 









'f. :. 



M 









:-'f '?i;.. 




Sensitive 



Manual ot Investigative Operations and Guidelines 

Part II ■•;;;•■;..., ■ ..-;■.•'■■ . ■■,.,■■ 



PAGE 18 - 69 



for conspiracy, rescuei facilitation, incitement, or aid to escape or 
attempt to escape, in^violation of the Federal Escape and Rescue 
Statute (Title 18, USC, Sections 751-757) when the escape occurs 
within/fron a nonfederal institution and involves riot, hostage taking 
or loss of life.' Coordination will be implemented and maintained with 
the USMS and BOP. Joint FBI and USMS investigation will be viewed as 
the optimum objective. 



■■■■';» 



.'■Tfy 



"5. Facilitate USMS participation in, and joint 
investigation of, escape and conspiracy to escape cases where the FBI 
has investigative jurisdiction and the USMS has prisoner, transport, 
_or— court__secur.ity_responsibilities. ______^ ^-. 






m 



"6. Establish and maintain investigative liaison 
with the USMS, the BOP and other federal and local law enforcement 
agencies as appropriate. 

"7. Establish and maintain coordination with the 
USMS when an escaped federal prisoner becomes the subject of an. 
Unlawful Flight to Avoid Prosecution (UFAP) request to the FBI. The 
FBI will not seek a UFAP warrant against any fugitive sought by the 
USMS pursuant to the Federal Escape and Rescue Statute and will notify 
the requesting state or local authority of the USMS's interest. 



t 



■..;¥S*' 



S-Kl 



"United States Marshals Service: 

"A. Pursuant to 28 C.F.R O.lll(q), which delegates 
to the USMS the power and authority vested in the Attorney General to 
conduct and investigate fugitive matters, domestic and foreign, 
involving escaped federal prisoners, th^ USMS will maintain 
investigative jurisdiction for all violations of the Federal Escape 
and Rescue Statute (Title 18, USC, Sections 751-757). 

"IT IS THEREFORE UNDERSTOOD THAT THE USMS SHALL: 

"1. The USMS and the FBI agree that the FBI will 
have investigative and apprehension responsibility with regard to 
violations of the Federal Escape and. Rescue Statute involving subjects 
of FBI investigations, up to and including the time of sentencing, or 
persons who are the subject of or were members of an organization 
which is the subject of an existing FBI National Security, Organized 
Crime or Terrorism investigation. ' . ,. . . 

"2. If the USMS's investigation reveals a possible 
escape conspiracy or systemic corruption on the part of federal 
personnel, concerning a federal penal institution or an FBI subject. 



Sensitive' 



PRINTED: 02/18/98 ^tSi;M?JSSp;v 



i5K 



- '^i 
-.1,^ 

M 






'■■\TM- 



-:s.'.','tr».; 






•*:^s:'h'2" 



'■^-'^•f.'/'s'sji; 









^'■'iS'- i'. 



■■-■■■ '. ■ ■ ■ •■ ■" 'sy^ 

Sensitive _ '.-^':?a 



Manual of Investigative Operations and Guidelines 

Part II... 4 _ •^_--^. ,_ ,\-' :.;.^;, .;■ .. PAGE^ 18^.- ■'o 

that information will be shared with the FBI 'for their investigation 
of the conspiracy or irregularities matter. 

"3. The USMS will have investigative and 
apprehension responsibility for all violations of the Federal Escape 
and Rescue Statute within/from state, county or city (contract) 
facilities in all cases other than presentenced FBI prisoners. In the 
event of a violation of the Escape and Rescue Statute within/from a 
state, county or city (contract) facility, the facility will 
immediately notify the USMS. The USMS will then notify the FBI if the 
escape or attempted escape involved a presentenced FBI prisoner or if 
the in cident involves riot ous behavior , ho stag e taking o r loss of 









life. 'ff 

"4. Inasmuch as the USMS and the FBI agree that a . .^;rj 

full sharing of information and the fruits of investigations benefit '^ 

each agency in fulfilling its missions and responsibilities, the USMS -g-^ 

and FBI will coordinate and bring to bear the two agencies' combined -^' 
expertise and investigative resources upon escaped federal prisoners 
and their conspirators. 



m 









"Bureau of Prisons: 

"A. The BOP will have investigative responsibility 
for all escape issues until the agency (FBI or USMS) , having been 

notified in accordance with provisions set forth in this agreement, ^^ 

has arrived on site and is prepared to assume the investigative role. 



M^^^i^; 






"B. In that the BOP will ordinarily be the agency ;;|| 

which will first discover indications of an escape conspiracy or .^^ 

actual escape event, the BOP recognizes the obligation to take initial 
steps to manage the crime scene appropriately and to make immediate 
notifications to the agency assuming the lead investigative role. , Ml' 

"IT IS THEREFORE UNDERSTOOD THAT THE BOP SHALL: 






■i§5 



m 






"1. Take immediate steps to preserve the crime 
scene, as well as any related audit trails, record systems, and other 
forms of evidence as appropriate. Upon on-site arrival of;. 
representatives of the agency assuming jurisdiction, the BOP will 
assume a joint-jurisdiction supporting role, and provide full access 
to the crime scene and all related evidence and records systems. In 
the event the designated agency cannot immediately respond, a mutual 
agreement will be sought regarding the full processing and release of 
the crime scene by BOP investigative staff. 

■ .:- r.'-,5>?-- 

..:,., ' ■ ■ ^ ■ .' v-Aa 

Sensitivis' ' " ■ ^^' .', V-' ■■ ' :^^' '-^'•100^ 

.,-■<'■ ■•.:.:. ■'■':■-: PRINTED: 02/18/98, .,.Ci?.,5?^fev^:,,:U;.';f&.v-vr:.^^^ 





■M 




Sensitive 



Manual of Investigative Operations and Guidelines 
Part II •^V.-'r"- ■ . -• -'^ ,.'."■.•■.,, -i --.-■,-..; 



PAGE 18 - 



"2. In the event of an actual escape, or suspected 
escape, the BOP. will activate stationary escape posts, roving patrols, 
and special response units as necessary to establish an extended 
perimeter around the BOP facility as may be dictated by local terrain, 
potential routes of egress, and the proximity of population centers. 
Active immediate apprehension activities in the surrounding area shall 
continue until such time as the BOP Warden or CEO concludes that the 
fugitive (s) is (are) no longer in the immediate area of the BOP 
facility, and/or the responding agency has sufficient resources 
actually in place to assume the immediate apprehension role. The BOP 
will provide the responding agency with appropriate information 
_regarding-the_natur.e_and_location_of_BOP_immediate_apprehension 

activities. 

"3. In those cases where an escape conspiracy is 
identified by BOP staff, prompt notification shall be made to the FBI, 
and a joint-investigative plan shall be developed, with the FBI 
assuming lead role as appropriate. BOP investigative staff shall 
provide full access to evidence, record systems, and audit trails as 
appropriate to facilitate the investigative process. 

"A, In all escape investigations that involve inmate 
telephone monitoring tapes, investigative access shall be ptovided in 
strict accordance with procedures established by the Department of 
Justice, Office of Enforcement Operations, as implemented by BOP 
policy. 

"V. PROTOCOL: It is agreed that the contents of this MOU 
will be provided to all agencies involved in this agreement, as well 
as the Executive Office of the United States Attorney, so as to fully 
coordinate notification procedures, points of contact to facilitate 
liaison, crime-scene management procedures, and development of the 
criminal investigation. 

"VI. STANDARD PROCEDURES: 

"A. Initial Notification 

."1, The BOP will immediately notify the FBI in the 
event of any incident involving a violation of the Federal Escape and 
Rescue Statute.. . .)■' .^ : .^y ' _.■ 

"2. The FBI will immediately notify the tJSMS of any 
escape from a federal facility, pursuant to the USMS' apprehension 
responsibilities as stated in this MOU. The FBI will coordinate, as 
appropriate, with the USMS and BOP pursuant to this MOU. 



Sensitive 



■ 


■ ■■" f:^J1i^: 




:•'-•;■&% 




' ■.■^^ 






,. 


- ■ ■ ■ ^"'**''^;4^^St*' 


. ■ , 


■ • ., '.'^aS* 


- 71 




' V _ 


■w 




fe 








■ i& 




-.* .-v*^'"- 




.,',*?iii^; 




' *^3*^ 




-.'*:'*3*i: , 




• ,^i>:'^ii. 




, raavi!. 




■SsS.= 









■MM 






PRINTED: 02/18/98 



•4r„VK«r 



: -■- ■ ' 1;*-.: 




v^. , -.-. 



Sensitive 



■ "■ "'Lz '-^l'- ''-■''''r-rv 



-^ '',".: v.'"' 

, . •,.,■■..■->. 45«fe 



Manual of Investigative Operations and Guidelines 






:'„.:^, PAGE 18 



.72— T-, 



"3. The USMS will immediately advise the nearest FBI 
office of escape incidents involving nonfederal penal institutions, v 
where the escapee is an FBI subject or aggravated circumstances exist 
as described in USMS paragraph 3. 



"B. Point of Contact 



i- 



"1. The USMS, FBI, and the BOP shall each designate 
a point of contact to facilitate lia'ison and implementation of this 
MOU. ' ■ 



I 



"2. Points of contact will be established with 



other 




I involved federal agencies where appropriate, 
j VII. TERMS OF AGREEMENT: 

"This MOU will take effect immediately upon signature 
of all parties. 

("For the Federal Bureau of Investigation: 



Jt /_LOUIS_ J . _FREEH_^ 
LOUIS J. FREEH 
Director 



_June_2A,_199A_ 
Date 



I "For the United States Marshals Service: 



/s/ EDUAIID0_G0NZALE2_ 
EDUARDO GONZALEZ 
Director , • > 

"For the Federal Bureau of Prisons; 



/8/_KATHLEEN_M._HAWK_ 
"KATHLEEN M. HAWK 
Director! 



_6/24/9A_ 
Date 



6/2A/94 
'Date 




Sensitive 



^"fiS 






"f8 












■.".■aw 



— ■ -I- «■--,■*? 

■ ^ 

' ■^V-'jrVii 
■ •*'t?v^:^ .■■■,, 



■i*-*"* 



'■.-ajijw.. 






-os V'--. wi'*'* A'* 



■UMIMMMa** 




Sensitive 



Manual of Investigative Operations and Guidelines 

Part Jl^;^,/: <■•■ %,•>(.■_.■■ ".....,''''.' -..v-/. . 



PAGE 18 - 73 






EFFECTIVE: 09/30/94, 








18-14 



MEMORANDUM OF UNDERSTANDING BETWEEN THE UNITED STATES 
DEPARTMENT OF THE INTERIOR BUREAU OF INDIAN AFFAIRS AND 
THE UNITED STATES DEPARTMENT OF JUSTICE FEDERAL BUREAU OF 
INVESTIGATION 



PURPOSE 



.Ui... 

1 

"This Memorandum of Understanding (MOU) is made by and 
between the United States Department of the Interior (DOI) and the 
Department of Justice (DOJ) pursuant to the Indian Law Enforcement 
Reform Act (Act), 25 U.S.C. 2801 et seq. The purpose of this MOU is 
to establish guidelines regarding the respective jurisdictions of the 
Bureau of Indian Affairs (BIA) and the Federal Bureau of Investigation 
(FBI) in certain investigative matters, and to provide for the 
effective and efficient administration of criminal investigative 
service in Indian country. 

"II. BUREAU OF INDIAN AFFAIRS JURISDICTION 

"The Act establishes a Branch of Criminal Investigations 
within the Division of Law Enforcement (DLE) of the BIA, which shall 
be responsible for providing, or for assisting in the provision of. 
law enforcement services in Indian country. The responsibilities of 
the DLE shall include, inter alia, the enforcement of federal law and, 
with the consent of the Indian Tribe, Tribal law; and in cooperation 
with appropriate federal and Tribal law enforcement agencies, the 
investigation and presentation for prosecution of cases involving 
violations of 18 U.S.C 1152 and 1153 within Indian country (and other 
federal offenses for which the parties have jurisdiction). In 
addition, the Act authorizes the Secretary of the Interior to develop 
interagency agreements with the Attorney General and provides for the 
promulgation of prosecutorial iurisdictional guidelines by United 
States Attorneys (USA) . t / 

j "III. FEDERAL BUREAU OF INVESTIGATION JURISDICTION 

"The FBI derives its investigative jurisdiction in Indian 
country from 28 U.S.C. 533, pursuant to which the FBI was given 
investigative responsibility by the Attorney General. Except as 
provided in 18 U.S.C. 1162 (a) and (c) , the jurisdiction of the FBI 



Sensitive 
PRINTED: 02/18/98 









•;t' 



w 






ilk 



■■'-Sef 






M 













.. -,'-- ,^ ,.: ..'^ ■ .. .t.. 



Sensitive 






Manual of Investigative Operations and Guidelines 

rare ■ ii.->.,vA ■,•■■■"■■■ •■ ■■<< < ■ ..•■■■ 



PAGE 18 - 7A 



includes^ but is not limited to, certain major crimes committed by 
Indians against the persons or property of Indians and non-Indians, 
all offenses committed by Indians against the persons or property of 
non-Indians and all offenses committed by non-Indians against the 
persons or property of Indians. See 18 U.S.C. 1152 and 1153. 



I "IV. 



GENERAL PROVISIONS 





"1) Each USA whose criminal jurisdiction' includes Indian 
country shall develop local written guidelines outlining 
responsibilities of the BIA, the FBI, and Tribal Criminal 

Investi g ators , if a p plicable. Local USA g uidelines shall cover 18 

U.S.C. 1152 and 1153 offenses and other federal offenses within the 
investigative jurisdiction of the parties to this MOU. 

"2) Any other agreements that the DOI, DOJ and Indian 
Tribes may enter into with or without reimbursement of personnel or 
facilities of another federal. Tribal, state, or other government 
agency to aid in the enforcement of criminal laws of the United States 
shall be in accord with this MOU and applicable federal laws and 
regulations. 

"3) The Secretary will ensure that law enforcement 
personnel of the BIA receive adequate training, with particular 
attention to report writing, interviewing techniques and witness^ 
statements, search and seizure techniques and preservation of evidence 
and the crime scene. Successful completion of the basic Criminal 
Investigator course provided by the Department of the Treasury at the 
Federal Law Enforcement Training Center or its equivalent shall 
constitute the minimum standard of acceptable training. The BIA may 
consult with the FBI and other training sources with respect toisuch 
additional specialized training as may be desirable. United States 
■Attorneys may also require, and participate in,. training at the field 
level. 

"A) Any contracts awarded under the Indian Self- 
Determination Act to perform the function of the BIA, Branch of 
Criminal Investigations, must comply with all standards applicable to 
the Branch of Criminal Investigations, including the following: 

I " "a) Local USA guidelines must be followed. 

"b) Criminal Investigators must be certified Peace 
Officers and must have satisfactorily completed the basic Criminal 
Investigator course provided by the Department of the Treasury at the 
Federal Law Enforcement Training Center, or an equivalent course 



Sensitive 
PRINTED: 02/18/98 






,.,.:^-.:jV 

'■•• <vSis* 

;■ 'ft'' 
. ■•.43'." 

"''.'..iii,- 

■■IS 

m. 
■ ^ 

■ '^■ 

;,■ i|$-»^ 
- jmi 

M 
■■??& 

..■j#^ 



■J- ..3sa;; 

m 

■(,.■>■-.;-+.',:, 






-tji-. 













. . -JiW 




^:^%-fc • 


'sfe.i5;«i'^^- 








I 







^<A& 



Sensitive 



Manual of Investigative Operations and Guidelines 
Part II., 



PAGE 18 - 75 



.^i'„. 



approved by the Commissioner of Indian Affairs. Criminal 
Investigators will receive a minimum of 40 hours in-service training 
annually to keep abreast of developments in the field of criminal 
investigations.' 

"c) Compensation for Criminal Investigators must be 
comparable to that of BIA Criminal Investigators. 



citizens. 



"d) Criminal Investigators must be United States 
^e) Criminal Investi g ators must possess a hi gh 



school diploma or its equivalent. 

"f) No Criminal Investigator shall have been 
convicted of a felony offense or crime involving moral turpitude. 

"g) Criminal Investigators must have documentation of 
semiannual weapons qualifications. 

"h) Criminal Investigators must be free from 
physical, emotional, or mental conditions which might adversely affect 
their performance as law enforcement officers. 

"i) Criminal Investigators must be certified by 
Tribal officials as having passed a comprehensive background 
investigation, including unannounced drug testing. Such examinations 
must be documented and available for inspection by the BIA. 

"j) Appropriate procedures shall be devised to 
provide adequate supervision of Criminal Investigators by qualified 
supervisory personnel to ensure that investigative tasks are properly 
completed. • 

"k) When a Tribe is awarded a contract under the 
Indian Self-Determination Act, 25 U.S.C. 450 (a), there must be a 
"phase-in" period of not less than 180 days so as to ensure an orderly 
transition from one law enforcement agency to another. When a Tribe 
retrocedes its contract for- the Criminal Investigator function, there • 
must be a one-year time period from the date of request for 
retrocession, or a date mutually agreed upon by the BIA and the Tribe, 
for the BIA to prepare for reassuming the Criminal Investigation - 
responsibility. All case files, evidence, and related material and 
documents associated with active and closed investigations must be 
turned over to the receiving criminal investigative agency, whether it 
be the BIA or a Tribe. 



Sensitive '"■^"'■'"^ 
PRINTED: 02/18/98 ., 



. •►"■it- jje;-, 

' "! ''■.-fSiy: 

■■'■ ■*:'>.:#?> 

■';. .. •-ftx-^ii 












'■'mi 

-,vyi 

'V. 

■./$.■ 

m 

M 

'^•^ ■■■ 






. ax- 



'.-i-'-L 

-■'am- 



-^Ari^^^p 







SSSSS3SSES83SS3 



^'■^^-^.ii^'^il- 





% 



Sensitive 



Manual of Investigative Operations and Guidelines 



Part II 

1 . .' '*.; ;-. 



PAGE 18--: 76 



"1) Appropriate procedures shall be established with '•< 
respect to the storage, transportation and destruction of, and access 4, 
to, case files, evidence, and, related documents and other material, , i 
with particular attention directed to the confidentiality requirements 
of 18 U.S.C. 3509(d) and Rule 6(e) of the Federal Rules of Criminal 
Procedure. Criminal Investigators shall follow these procedures at 
all times. Access to such material will be for official use only. 

"m) Before any Tribe contracts for the Criminal 
Investigator function, the BIA and the Tribe must ensure that there is 
_sufficient._funding_to..cover_the_costs_of _a_Criminal_Inyestigator_^ _ 

program including salary, equipment, travel, training, and other 
related expenses arising during both the investigation stage and the 
litigation stage of any case or matter covered by the contract. 

"n) Tribal contractors must agree, and the BIA shall 
ensure, that there is an audit and evaluation of the overall 
contracted Criminal Investigator program at least every two years. 
Continuation of the contract shall be contingent upon successful 
completion of each audit and evaluation. 

"o) Criminal Investigators are prohibited from 
striking, walking off the job, feigning illness, or otherwise taking 
any job action that would adversely affect their responsibility and 
obligation to provide law enforcement services in their capacity as 
Criminal Investigators. 

"5) Any individual who is a holder of a BIA Deputy 
Special Officer Commission and performing duties as a Criminal 
Investigator must comply with the standards applicable to Criminal 
Investigators set forth in the preceding paragraph. 



"6) When either the FBI or the BIA receives 
indicating a violation of law falling within the invest 



information 
igative 

the information 
BIA declines , 



jurisdiction of the other agency, the agency receiving 

will notify the other agency. If either the FBI or the 

to investigate a matter within the jurisdiction of both agencies, the 

other agency will be notified. The FBI and the BIA wil 

resolve jurisdictional disputes at the field level. In 

dispute cannot be resolved, it will be reviewed by each 

respective headquarters for resolution. - 



I attempt to 
the event the 
agency's „v 



•■-•'~r-?!5,-'.-s,- 
..Mr 






!#■ 






1^' 






■.■u& 



'. &fil. 










"7) With respect to the use of sensitive investigative 
techniques, such as the nonconsensual interception of wire, oral or 
electronic communications and undercover operations involving any 



Sensitive 
PRINTED: 02/18/98, 









*M- 






ma 



J^liXLUU.IIUJU„IIJI'UlfBN*iJ<^ 



..V- ' ■. 



:> 






".' " -V " . 



fTr"-'"'"iiMn'i'iiiiiiiiiiiTr - - 









v^SM 



A9i)s?iv|J^^ 




i^. "; ■ ,'"'';'^<?'i 




m 




Sensitive 






Manual of Investigative Operations and Guidelines 

ParF-'TT -'-^^:*»^^"' •'•'i'^i-*- ^f-^^if-'' ■ ■•■- -,^',^.-^.- ',V"^''-v. •■■ ■ ' ''v^ ■■. .^^.■ , , PAGE 

sensitive circumstance' (as defi^^ _, 

Guidelines for FBI Undercover Operations), and the investigation of 
organized crime matters, the F;BI shall be the agency primarily j^ 
responsible!' Undercover oper.ations involving sensitive circumstances \ 
shall be conducted in accordance with the Attorney General's ' 
Guidelines for FBI Undercover Operations. This paragraph is not/*:' 
intended to prohibit the BIA from conducting consensual eavesdropping,? 
or undercover operations not involving a sensitive circumstance or 
utilizing other nonsensitive investigative techniques after proper 
training and when authorized by the appropriate United States 
Attorney. 



18 - 77 



"8) Nothing in this MOU is intended to change any 
existing cooperative relationships and responsibilities between the 
BIA and the FBI, and nothing in this MOU shall invalidate or diminish 
any law enforcement authority or responsibility of either agency. 

"9) Consistent with the availability of resources, the 
FBI will offer specialized training to the BIA. 

"10) Consistent with limitations regarding 
confidentiality, the requirements of the Privacy Act and any other 
applicable laws, and respective policies and procedures, the BIA and 
the FBI will cooperate on investigative matters of mutual interest, 
exchange intelligence, and investigative reports, as appropriate. 

"11) To the extent possible and in consideration of 
limited resources, the FBI will continue to assist the BIA in its 
investigative matters by providing investigative support services 
through the Identification Division, Training Division, Criminal 
Investigative Division and Laboratory Division. 

"This document constitutes the full and complete agreement between the' 
BIA and the FBI. Modifications to this MOU will have no force and' 
effect unless and until such modifications are reduced to writing and 
signed by an authorized representative of the parties thereto. This ^ ; 
MOU will, at regular intervals, be subjected to a thorough review to 
determine if changes' are appropriate.. , -. .^^;•.; 't ' \ ~ 't,,.:''^;'/'* ;.Y^"' 

"The provisions set forth in this MOU are solely for the purpose of Br,,- 
internal guidance of components of the Department of the Interior and;, 
the Department of Justice. " This MOU does not, is not intended to; ." 
shall not be construed to, and may not be relied upon to, create any 
substantive or procedural rights enforceable at law by any party in 
any matter, civil or criminal. This MOU does not, is not intended to, 
and shall not be construed to, exclude, supplant or limit otherwise 









Sensitivegg^-,: 
PRINTED: 02/i8/?8,iv^ 



■y-.s-^-'i^' 



::■:' i" 









• I'f.'.'SV'" 












■ - W.- ** ■^^;»«^;'*'- 



,">^,^;, -, , ;,, 



■ - i'-.W^iW 
-■■'"■■ ■-■7»S^J»^.S-- 



... - .. j^m 

- /am 
. t^. 

■J. ^Jyjfiifi 



pRiNTED: {yii\^i99:,i^M::/^t:.-.-'^±^'-'- .■ .^-.Ms^m^^mm^ 



M^.yimm^m 








...,j.» v»' ■>-■.-*,, ••i>.'.«s{-Vi„»vJ.,:-.*v «->f ».■!»■.■■ .5^ v . ■> '>.-■->;;-- ,, .... ■ ■■■ . 

"By subscription of their signatures below, the parties acknowledge 
that they have read, understand, and will abide by the £oregoing«ijV 
statements. "' ■;-■'■• ."' '•''. r:"^? •■'.'" ■ '''■~ ' "^'■■•■;\' ■'*{''■'-', '■'''...' 



_BRUCE_BABBITT_ 
Secretary 



Septeinber_3,_1993 

Date .___ 



United States Department o£ the Interior 



" JANET RENO 

Attorney General 

United States Department of Justice"^ 



EFFECTIVE: 11/07/94 



November_22,_1993_ 

Date 






■ •■'■■■rfs-y' 










'^- ",:^4ir:> 



..»-i)is^?.- 















■-•■'S'<;ti-»<';i- ':■> 






"-."-"v.Sj®!^' 
■■: •■■??'t:?-rjr^, 



'■'■^K-iaii-^j 



, '. . \^\'- •■'^ ■]■ -.^i' X-.'-..,i4'S;^A-f:^^'^T&' •''. ^-'Ifr-f^ •''•'t'^'fi^^^^!' 




:m 




«WWR!ilSt5K?SE«SSS»1" 














,.,,.• .V ■■„.;■■ ,-.,^-* ,."■ .'••j^'*-;,;/,,':.?' " 
■^ '■:-' ■'^■^i|'"i-'''&''-"''^^T^^ ■•'''' 









. 'Vr ,,v ; ->, :;■• 



Sensitive 






Manual of Investigative Operations and Guidelines ._■ . .,'■•' - 'Vh ''^'i" 
Part.I«,,----4';^.J^.^^ 

" SECTION 20. white" COLLAR CRIME ' ' ''i ; 



;fV.A 



20-1 



DEFINITION 



(1) White-Col lar Crimes are defined as. those illegal acts 
characterized by deceit, concealment, violation of trust, and not 
dependent upon the application or threat of physical force or 
violence. They are committed to obtain money, property, or services; 

_or-to-avoid-the-payment-or-loss~of-money,-property,-or-services;-or-to- 

secure personal or business advantage. 

(2) By focusing on the nature of the act, rather than the 
nature of the violator, the classification of the crime will more 
clearly emerge. The modus operandi and objectives are crucial to 
correct categorization of these acts. 

(3) The White-Collar Crime is usually of a more complex 
or sophisticated nature. 

(A) The White-Collar criminal can come from all walks of 
life. The classic image of such a person being of top management 
and/or the pillar of the community is not sufficiently large to 
embrace all such criminals. Conversely, a person of the classic image 
is capable, and indeed has, committed crimes of the most base nature. 

(5) The crime may be committed by individuals acting 
independently or by those who are part of a well-planned conspiracy. 
Clearly a person clothed in the aura of respectability acting in 
concert with a hardened criminal in a conspiracy which would involve 
the violation of |his/her| trust, would attach to that crime the 
significance and character of the "White-Collar Crime." 



EFFECTIVE; 01/21/86 




■ ■ ■. ■■''''A. 
















Sensitive 
PRINTED: 02/18/98- 












■m': 





i 



Sensitive 



Manual of Investigative Operations and Guidelines 
Part. II •:■:•"■ - ■■■■'" ."■" ..*.■'■'. i^-- ■'.: '■• 



PAGE 20 - 



20-2 



POLICY. 



(1) Since "White-Collar Crime" is a generic term and 
cannot be defined in terms of statutory elements as are specific 
crimes within FBI jurisdiction, the definition of White-CoUar Crimes 
has been established as a working definition solely for Bureau use. 

(2) Many crimes which have been investigated by the FBI 
for years can, quite properly, be classified as White-Collar Crimes. 
So toe. many local and state violations are considered White-Collar 
Crimes. Care should be taken not to evaluate local crimes under the 
Bureau de f in ition_sjLnce_the_ Bureau. in_no_way_i^^^^^ 

'definition Tf White-Collar Crimes upon state and local jurisdictions. 

(3) The policy covering the specific classifications of 
the statutes under investigation will prevail in ^^^ "*^ J ^^'^^^ !,".,, . 
Crime matters and no statement within this Section should be construed 
as changing or modifying the policy in any of the substantive 
investigative matters handled by the Bureau. 

(4) All investigations characterized as White-Collar 
Crimes should be given a high priority of investigative attention with 
the assignment of sufficient personnel to ensure the Bureau s 
investigative responsibilities are promptly met. 

(5) Since many of the classifications within the Bureau's 
investigative jurisdiction fall within the general category of 
accounting type, those Special Agent Accountants and Special Agents 
with accounting backgrounds should be utilized where this specific 
expertise is needed. 













■ . -'M 


-. 


2 


■ ■ ■ A^h 




'' 






J^: 






' ^'' ■^v'ffi 






: -Ji^t 






^&- 









■/im 



'vf.ir 












■ ■■ w> 
•" ■;?' 



EFFECTIVE: 11/20/90 



iVtff 




^^ 



20-3 



FBI WHITE-COLLAR CRIME PROGRAM (WCCP) (See MIOG, Part I, 
46-1.14. 58-10, 139-9. 206-6. 207-2, 255-9. 257-11, 258-8. 
264-9, 272-6.2, 275-1; MAOP, Part II, 3-1.1. 3-1.2, 
3-3.2(3), 3-4.5(5), 10-23; Correspondence Guide - Field, 
. 1-17.) 

(1) The Criminal Investigative Division at FBIHQ 
administers the WCCP in the White-Collar Crimes Section. 



subprograms: 



(2) The White-Collar Crimes Section is comprised of five 
Governmental Fraud; Public Corruption; Financial 



"}^- 



m 






Sensitive 
PRINTED: 02/18/98 









w 




Sensitive 

Manual of Investigative Operations and Guidelines 
Part 11^ ■'■':v: ../■■; 



PAGE 20 



Institution Fraud; Economic Crimes; and Other WCC Matters. 

(3) The classifications comprising the WCCP are grouped 



as follows: 




(a) Governmental Fraud Matters 

17 Department of Veterans Affairs Matters 

46 Fraud Against the Government 

60 Antitrust 

62 Lands Division Matter 

Mis cellaneous - Civil Suits 



83 Claims Court 

86 Small Business Administration Matters 

93 Ascertaining Financial Ability 

120 Federal Tort Claims Act 

131 Admiralty Matter 

147 Housing and Urban Development Matters 

187 Privacy Act of 1974 - Criminal 

206 Department of Defense Matters 

206 Department of Agriculture Matters 

206 Department of Commerce Matters 

206 Department of Interior Matters 

207 Environmental Protection Agency Matters 
207 National Aeronautics and Space 

Administration Matters 

207 Department of Transportation Matters 

207 Department of Energy Matters 

208 General Services Administration Matters 
209 Health|Care.Fra'ud| 

210 Department of Labor Matters 

213 Department of Education Matters 

249 Environmental Crimes 

(b) Public Corruption Matters 

51 Jury Panel Investigations 

56 Election Law Violations 

58 Corruption of Federal Public Officials 

62 Administrative Inquiries 
139 Interception of Communications - Public 

Officials or Government Agencies 
139 Interception of Communications - All Others 
194 Corruption of State and Local Public 

Officials 
205 Foreign Corrupt Practices 



Sensitive 



PRINTED: 02/18/98- 









-.-ft"- 



f>tf. 



-i: 



'"0^'^ 



:rf- 



"-^: 



•V(' 






3:;JJK< 




PAGE 20 - 



Sensitive 

Manual of Investigative Operations and Guidelines 
Part II,, , .,■",,■•■.-,;' 

211 Ethics in Government Matters 

(c) Deleted. 

(d) Financial Institution Fraud 



29 Financial Institution Fraud 
275 Adoptive Forfeiture Matter - White Collar 

Crime 



■'np^r 



'00: 

.'!''>-p. 






(e) Economic Crimes 



::■■% 



27 Patent Matters 

28 Copyright Matters 
36 Mail Fraud 

49 Bankruptcy Fraud Matters 

87 Securities Trafficking and Check Matters 
139 Interception of Communications/Signal Theft 
181 Consumer Credit 

186 Real Estate Settlement Procedures 
196 Fraud by Wire 

255 Counterfeiting of State and Corporate 
Securities 

257 Trademark Counterfeiting Act 

258 Credit and/or Debit Card Fraud 
264 Computer Fraud and Abuse 

272B Money Laundering - White-Collar Crime 
Program 

(f) Other Matters 



■-■Bg" 



"m 



\f'Xi.: 






EFFECTIVE: 11/12/93 



69 Contempt of Court 

72 Obstruction of Justice 

74 Perjury 

75 Bondsmen and Sureties 
137 WCC Informants 

232 Training Received - White-Collar Crime 




$i/ 



Sensitive 
PRINTED: 02/18/98 







:.m 












^»V*.'> 






■"m. 












a ■ '' f?' 




- 








-^ ■-. ■ 


■'.*> 


■ f 


«^^ 



-■;^:y'5'T#, 




Sensitive 

Manual of Investigative Operations and Guidelines 
Part 11^. '■•:.} ,,. , 

20-4 PRIORITY AMONG OTHER FBI PROGRAMS 

See MIOG, [introduction, Section 2.| 

EFFECTIVE! 09/27/93 



PAGE 20 - 5 









■ ■iv%^ 



# 



TT-"^ 







■■Mi 






.. . ;,f . 
.'■'^•,!w; 

'. .. :' • -'i > 




Sensitive , 
PRINTED: 02/18/98 



^■;<-..^tt'. 
... .■tf^''^V 




Sensitive 

Manual of Investigative Operationi and Guidelines 
Part II,--- ,..•;,:, • .■■:■' 

SECTION 21. FUGITIVE - GENERAL 



PAGE 21 - 



Mi 

IS 



21-1 



FUGITIVE DEFINITION 



A "fugitive" is the subject of a Bureau investigation for 
whom a Federal arrest warrant has been issued and whose whereabouts is 
unknown; or an individual whose whereabouts is unknown and whom the 
Bureau, by directive or agreement, has the responsibility for 
ap prehend ing. A^ sub j ec t othe rwise meeting these c riteria who ij^ 



outside the United States is considered a fugitive regardless whether 
he/she is in custody or not until such time as he/she is returned to 
United States control in the United States. 



EFFECTIVE: 07/23/90 




21-2 "A," "B," "C," AND "D" FUGITIVE PRIORITIES | (See MIOG, Part 
I,'88-7!!2; MAOP, Part II, Section 10.) ] 

(1) To reflect investigative importance in the fugitive 
area, all fugitives will be designated either an "A," "B," "C," or "D 
priority. 

(2) An "A" fugitive is a subject wanted for crimes of 
violence against the person, such as murder, manslaughter, forcible 
rape, robbery, aggravated assault and felony residential burglary; one 
convicted of such a crime within the past five years or one who has 
been incarcerated after conviction for a crime of violence and escapes 
from custody or supervision (parole, probation) prior to completion of 
their sentence or term of supervision. 

(3) A "B" fugitive is a subject wanted for a crime 
involving the loss or destruction of property valued in excess of 
$25,000, one being sought for criminal charges involving in excess of 
two ounces of heroin or. cocaine, 1,000 pounds of marijuana or 10,000 
dosage units of clandestinely manufactured dangerous or hallucinogenic 
drugs, or a subject convicted of the above crimes within the past five 
years or one who has been incarcerated after conviction for such 
offenses and escapes from custody or supervision (parole, probation) 
prior to completion of their sentence or term of supervision. 



Sensitive 
PRINTED: 02/18/98 



.Ik 







Sensitive 

Manual of Investigative Operations and Guidelines 
Parfll^ . -■■■■ ■ '.:.•■ 



PAGE 21 - 



I (A) "C." All others, except UFAP-Parental] Kidnapping | 

fugitives, who will be designated "D" fugitives. 

(5) All communications, regardless of the fugitive . 
classification, should carry the appropriate priority letter in 
parentheses in the title after the word, fugitive, which will identify 
the subject's priority ranking. For example: 




I 





■■ ' , ' ' 




- 


2 






.i.y- ^^ ■ • 


■ ■■^m 








; 




^ 



JOHN DOE - FUGITIVE (A) 

UFAP-MURDER 

00: Albany 



JOHN DOE - FUGITIVE (C) 

FAG 

00: Albany 



~~ (6) If a situation arises where a fugitive of a lower 
priority becomes wanted for an offense of a higher priority, the case 
should be promptly elevated to the newer appropriate priority letter 
ranking. 

(7) The above priorities are by no means absolute in 
terms of significance of importance. Therefore, priority "C" may 
contain some relatively high-impact cases. 



■■■tyi.a^ 









EFFECTIVE: 10/18/95 



I 21-3 



OBJECTIVES OF THE BUREAU'S FUGITIVE [SUBPROGRAM | 




(1) To effect the swift location and apprehension of all 
FBI fugitives, particularly those wanted in connection with crimes of 
violence, substantial property loss or destruction, illicit drug 
trafficking and parental kidnaping. 

(2) During liaison contact with law enforcement 
authorities and in managing resources available for fugitive 
investigations. "A," "B," and "D" priority fugitives should be 
emphasized so that manpower is concentrated there and not on those 
fugitive matters of lesser impact. 

(3) All requests for assistance in the fugitive area over ^ 
which we have jurisdiction must, of course, be honored regardless of 
their priority. ~ ki^--.- •, 

(4) Each office, in keeping with these objectives, should 
concentrate on the apprehension of "A" and "B" priority fugitives 
regardless of the Bureau classification, and "D" priority fugitives 



Sensitive 
PRINTED: 02/18/98 



.Mm- 



. •mm- 
• "ii'-'.' 



■$^& 
- ■»*>'5i«5 




Sensitive 

Manual of Investigative Operations and Guidelines 
Part II 

(UFAP-Parental Kidnaping) . 



PAGE 21 - 






■*'ok\!-' 









EFFECTIVE: 07/23/90 






21-A 





DETERMINING THE FUGITIVE'S FBI NUMBER AS A MEANS OF 
POSITIVE IDENTIFICATION (See MIOG. Part II, lA-15.4; MAOP. 
Part II, 7-2.2.2.) 



(1) All offices should ensure that a check of the 
Inters tat_e_IdenliHcat ion _IjLdejL J IJiL 



determine the fugitive's FBI number prior to entering the fugitive in 
the NCIC Wanted Person File (WPF) without an FBI number. When the 
subject's fugitive airtel. FD-65, is submitted to FBIHQ at the outset 
of the fugitive investigation, his/her FBI number should be included 
thereon if knovm. 

(2) If the field office is unable to identify an 
identification record identical with the fugitive through the III 
inquiry, ani electronic communication! should be forwarded to the 
Criminal Justice Information Services (CJIS) Division, [West Virginia 
Operations I (Attention: [Module D-2 Answer Hits to Wants 

(AHTW)), I enclosing any available fingerprints of the fugitive so that 
a technical fingerprint search can be conducted and a positive stop 
based upon fingerprints can be placed. A fingerprint-based stop means 
that incoming applicant/criminal fingerprint cards in alias names will 
hit against the stop thereby triggering appropriate field office 
notification(s). (See MIOG. Part II, 21-21(4).) 

(3) "Maybe Ident" stops (a stop in an identification 
record possibly identical with the fugitive) will not be placed in 
identification records for FBI fugitives entered in the NCIC WPF 
without an FBI number; For fugitives entered in the NCIC WPF without 
an FBI number, a "Name Stop" only will be placed in the CJIS 
Division's Criminal File. If, while placing the "Name Stop, the CJIS 
Division discovers a manual record(s) (criminal identification record 
not available through III) possibly identical with the fugitive, a 
copy(s) of the criminal record(8) or a laminated copy(s) of the civil 
fingerprint card(s) will be forwarded to the field office. It will be 
the field office's responsibility to determine if the record or 
fingerprint card is identical with the fugitive. If an identification 
determination is made, the FBI number of the fugitive should be 
modified into his/her NCIC WPF entry or the copy of the civil print 
should be returned to the CJIS Division so a positive stop based upon 
fingerprints can be established in place of the existing "Name Stop. 



'*i; 



. fs. 



■¥ 



Sensitive 
PRINTED: 02/18/98 



,•-•.•■^''- 







Sensitive 



Manual of Investigative Operationa and Guidelines 
Part 11 ., ■- .... y?.;- '■ ■•• • 



PAGE 21 






(See MIOG, Part II, 21-23(22).) 



EFFECTIVE: 05/13/96 



■.;..«t' 



21-5 



POTENTIAL FUGITIVE IDENTITY PROBLEMS 



EFFECTIVE: 05/26/89 




h1^ 



21-5.1 Stolen or Lost Identification 

(1) If it is known that a fugitive is using the stolen or 
lost identification of another individual, and said name is being 
carried as an alias of the subject in NCIC, the following action 
should be taken to prevent this individual from being detained 
erroneously as the subject. 




EFFECTIVE: 05/26/89 



'it,.. 



:Sik 



-*i^r 



.'iSl: 



"is.. 

M 



21-5.2 



Look Alikes 



(1) Where an individual has been reported to an office as 
being identical with a fugitive and investigation determines he/she is 
not identical but he/she so strongly resembles the fugitive in 
appearance that there is a likelihood he/she will be reported again as 
being identical with the fugitive, the office of origin and FBIHQ 
should be advised. 

(2) Upon receipt of this information, the office of 
origin should modify the subject's NCIC record under the miscellaneous 
field to reflect that they are not identical. 






mi 




Sensitive 
PRINTED: 02/18/98 









■MMUUMMMM 



-t -■%: ■ 




Sensitive 



Manual of Investigative Operations and Guidelines 
Part II-. ,vv. ; . „■ ■*'-".i'- ■ 



PAGE 21 ■ 



"■■"■■'■ -•»*' 



.;«V 



m 



W- 



"'riiff'S 



EFFECTIVE: 05/26/89 



21-6 



FUGITIVES TRAVELING TOGETHER 



When it is knovm that two or more subjects are traveling 
or operating together, their respective NCIC records should be cross- 
referenced under the miscellaneous field to reflect this fact. In 
addition, FBIHQ should be notified of this fact and the 
Criminal Justice Information Services JDivision, West Virginia 
Jperat i ons_(Attent ion:__Modul.e_Et2„AHTW)_,.| r>queAted_tp_c_?LOM™r^^^^^^ 
the fugitive stops in their respective fingerprint identification 
records. 












EFFECTIVE: 05/13/96 



.•'f'- 



f 21-7 



CIRCUMSTANCES WHICH REQUIRE FBIHQ NOTIFICATION 



In a fugitive investigation FBIHQ should be promptly 
notified if the following circumstances exist: 

(1) If there is any publicity or anticipated publicity 
regarding the fugitive investigation. 

(2) If the fugitive is prominent locally. 

(3) If good judgment dictates that FBIHQ should be 
notified of events. 







EFFECTIVE: 03/20/86 






Sensitive 
PRINTED: 02/18/98 






" 1?. 




Sensitive 



.- "m 




Manual of Investigative Operations and Guidelines 
Part II'^ ■ . ■"■■.' 



PAGE 21 - 



21-8 



DETERMINING THE OFFICE OF ORIGIN WHEN MORE THAN ONE OFFICE 
PROCESS OUTSTANDING ON A FUGITIVE 



(1) If an office, other than the existing office of 
origin, knowingly obtains additional process on a subject while in 
fugitive status, it should enter him/her in NCIC and bring this 
situation to the attention of FBIHQ and the existing office of origin 
in the following manner. Attach an administrative page to the 
fugitive airtell(FD-65) I setting forth the details and request that 
FBIHQ determine and advise which office should assume origin in the 
investigation. 



(2) There will be instances where an office, other than 
the existing office of origin, unknowingly obtains additional process 
on a subject while in fugitive status. This situation usually occurs 
when the subject has committed offenses under different identities. 
When subsequent investigation by the field determines that these 
individuals are in fact identical, FBIHQ; should be promptly advised of 
the full details by airtel and requested to determine and advise which 
office should assume origin in the investigations. 



EFFECTIVE: 03/20/86 






iyN 







21-9 



COMMUNICATIONS REQUESTING APPREHENSION 



The field office requesting investigation of an auxiliary 
office for the apprehension of a fugitive should include the following 
information in its communication if not' previously furnished so that 
the investigation and apprehension may be handled intelligently and 
effectively: 

(1) Photograph and complete description of the subject. 

(2) Sufficient details of the offense charged to conduct 
a hearing before the U.S. Magistrate. 

(3) Amount of bond fixed by the court or recommended by 
the USA. 

(4) Date and place where prosecuting USA desires the bond 
made returnable. 

(5) Full name of the complainant (individual who signs 
complaint before U.S. Magistrate). 



a'. 



Sensitive 
PRINTED: 02/18/98 



-lri& 



''Vv0§- 






Sensitive 



■it. 






Manual of Investigative Operations and Guidelines 

Part.II ,.:-^— ^■,- . . ,-■ -.-v .-■--.... V'- . PAGE 21 r, .J_ -^ 



.<f.i* 



(6) Full name of U.S. Magistrate or district court judge . , 
issuing the warrant. : . ' ^:^^ 

(7) Full name of USA who filed information or indictment. ^^ 

(8) Details of local offense in unlawful flight cases to f- 
handle any press inquiries. ^ ' 

(9) Caution statement if appropriate. 's-jpl 



EFFECTIVE: 03/20/86 .;||' 

21-10 FUGITIVE DEADLINES .^• 

(1) The following deadlines pertain to all fugitives |^.. 
regardless of the classification, 

(2) Priority "A" and "D" Fugitives 

(a) Fugitive leads in headquarters cities or in j..'|- 

headquarters cities of resident agencies are to be covered and J. 

reported within a total of 15 calendar days. 






•-i^' 

Al 



:^- 
'*»■'-%' 



(b) An additional 7 calendar days are permitted for 

areas outside these cities. . ^;^k 

(3) Priority "B" and "C" Fugitives ' S^ 

(a) Fugitive leads in headquarters cities or in ,:% 
headquarters cities of resident agencies are to be covered and ,^jg 
reported within a total of 30 calendar days. 

(b) An additional 7 calendar days are permitted for 
areas outside these cities. '-^ 

■ ■■ '■ ..<M 

(4) If good judgment indicates a fugitive lead is without >^^ 
immediate productive possibilities and economy can be effected by ^^ 
extending the deadline period, the above deadlines may be exempted. 

(5) It is recognized that certain factors will dictate 
that more preferred attention be given to case than the above ^^ 
deadlines command. For example, a relatively low priority "C" /f^ 
fugitive might be wanted for questioning as a principal subject ma . ;^ 

'. ' ' ' " ' ■ • c ii^- 

Sensitive ., - ■ .-' . .,.'.?,,« ^ 

PRINTED: 02/18/98 -ijiS^' 



w 

■■ .■£■'.- 












Sensitive 
Manual of Investigative Operations and Guidelines 



Parfll- -- '' ■ '■'■■'■■■- ■■ , .- PAGE. 21 -. 8. -Z "^^ 



major investigation. In such situations, the necessity for preferred 
attention should be set out regardless of the priority letter 

designation. 

I- 

EFFECTIVE: 05/29/8A 



21-11 . CAUTION STATEMENTS 

(1) The use of caution statements as a special warning 
^should be„.r.es.tri.c,t.ed_.tp_faj:tual_ jnformat^^ 



(3) There are five basic caution statements: 
(a) Armed and dangerous. 
' (b) Suicidal tendencies. 

(c) Escape risk. 

(d) A physical or mental condition or illness which 
may require immediate or professional care. 



(5) The caution statement should be set forth immediately 
after the case caption of the FD-517 and at the end of the narrative 
in prosecutive reports. In both investigative and nonprosecutive 
summary reports, the caution statement should be included immediately 



Sensitive 



'•?> '-'t 



......t4*-«*j!fJ-- 

■■^■Mp' 









apprehending officers to exercise additional caution in arresting and 

controlling a subject. JS 






(2) They must be included in all appropriate .'y^g 

communications in underlined capital letters and in the subject's NCIC .,^^ 

record. 






;«-!. 



■iif. 



.:■:%■ 






(e) "Warning: Known or Suspected HIV (Human 
Immunodeficiency Virus) Infected Person" (This warning should only be 

used in internal communications when also accompanied by the "Armed -s^^^ 

and Dangerous" warning or when other information is developed that the /^# 

possibility of violence during an arrest is imminent.). ;:^| 






a^ 



(4) The basis of the caution statement must be included 
in the caution statement in all initial communications to other field 
offices and FBIHQ. Subsequent communications to these offices need :/^ 

only set forth the caution statement, and its basis need not be ^^j^ 

restated. ■ ^t^^ 

' -M 



; ;,'if~.>:f^. 



PRINTED: 02/18/98 . T ' - - >i|;^ 



li'^^i 




Sensitive 



Manual of Investigative Operations and Guidelines 
Part II '• • ■■.;•■ ^. ■ 



PAGE 21 r 



?~ 



after the case caption of the first cover page, at the end of the 
synopsis in every instance and at the end of the details of the first 
report. In the case of other communications, such as letters, 
airtels, and LHMs, it should be placed immediately after the case 
caption and at the end of the communication. If desired, an 
appropriate stamp may be used for this purpose. In teletypes, the 
caution statement should be included as the first line of the text. 

(6) Notification when information first developed. 

(a) In wanted flyer, identification order, or check 

c i r c ular cases , the dev eloping offic e should imm ediately notify^FBIHQ,_ 
cTffice of origin, known auxiliary offices, and the office of 
prosecution (when other than the office of origin) by teletype. The 
office of origin should in turn furnish this information by teletype 
to all other auxiliary offices, by regular mail to all other offices 
and modify subject's NCIC record. 

(b) In all other cases, the developing office should 
immediately notify FBIHQ, office of origin, known auxiliary offices, 
and the office of prosecution (when other than the office of origin) 
by teletype or airtel as the circumstances dictate. The office of 
origin should in turn furnish this information to all other auxiliary 
offices by teletype or airtel and modify the subject's NCIC record. 

(7) When requesting the assistance or cooperation of 
local law enforcement officers or other agencies in apprehending the 
subject, fully apprise them of any caution statement. 

I (8) Form FD-65, the fugitive airtel, has a "Caution" 
block which must be checked when information exists indicating the 
need for enhanced caution by law enforcement personnel apprehending or 
controlling the fugitive. The "Caution" block will have checkboxes 
for appropriate warning statements. The basis for the caution 
statement must be stated as the first information reported in the 
"Miscellaneous" block of the FD-65. This information will be included 
in the NCIC record pertaining to the fugitive. | 



S^ 






;f;lt;- 









-i," 



- -i- 



"t. 







EFFECTIVE: 10/11/94 



Sensitive 
PRINTED: 02/18/98 



'■■■ iv-^>. 




Sensitive 

Manual of Investigative Operations and Guidelines 

Part II ■• ^* ■■ . ■ 

21-12 APPREHENSION OF BUREAU FUGITIVES 



PAGE 21 - 10 



I 




I (1) Bureau policy relating to arrest (use of force, 
forcible entry, etc.) is contained in Section 3, Legal Handbook for 
Special Agents. Also, see 21-13.4, infra, regarding entry to arrest. | 

I (2) I When a Bureau fugitive is apprehended or located in 
custody, the apprehending office should immediately notify FBIHQ, 
office of origin, office of prosecution (when other than the office of 
origin), and all knovm auxiliary offices by routine teletype. The 
word, "FUGITIVE," should be carried in the title of all communications 
^nj-jjyjng FBIHQ and interested offices of the appre hension or location 




of a Bureau fugitive. 

I I (3) 1 Good judgment must be exercised and where a more 

urgent communication is obviously justifiable, notification by 
telephone or immediate or priority teletype should be utilized. 

1. j (4) I When one of the Ten Most Wanted Fugitives is 

apprehended or located in custody or fugitive's apprehension appears 
imminent, FBIHQ must be immediately advised by telephone and confirmed 
by teletype. 

I I (5) I Upon notification, the office of origin should review 

its case file and notify any other auxiliary office where 
investigation is pending of the apprehension or location by routine 
teletype. 

j I (6) I If investigation is being conducted by a known Legat 

office, the apprehending office should tequest FBIHQ in its 
apprehension teletype to advise the particular Legat office to 
discontinue. 

I I (7) I If the apprehending office has not requested FBIHQ to 

notify any or all Legat offices conducting investigation to 
discontinue, the office of origin should promptly submit a routine 
teletype to FBIHQ requesting same. 

I I (8) I If the office of origin's case Agent is not readily 

available, it is the responsibility of the appropriate office of 
origin's supervisor to ensure that all auxiliary offices are ladvised 
to discontinue investigation and FBIHQ is requested to advise 
appropriate Legat offices to discontinue. 

I I (9) I If the subject is a Ten Most Wanted Fugitive or the 

subject of an identification order, check circular, or wanted flyer, 



'"I'm- 









-■■V 

-; t'. ■ 



M*- 









Sensitive. 
PRINTED: 02/18/98 



■,?.f|| 



ii# 



•v:''^it;.? ^,%H'.:#=SVfe>4l■#^;,'V■■^!i=%*^j';.>'^,1S'■■' 



;,t-^M^MW~ 



=7.-r?^^=^- 







Sensitive 



Manual of Investigative Operations and Guidelines 
Part II.,,. ■-■ ■-,.,•■..-'■•.•. 



PAGE 21 



11 



FBIHQ will notify all offices and Legats by appropriate communication 
of I his/her I apprehension. 






EFFECTIVE: 10/10/83 






21-13 



HARBORING STATUTES 



EFFECTIVE: 10/10/83 



21-13.1 



Title 18, use, Section 3. Accessory After the Fact 



"Whoever, knowing that an offense against the United 
States has been committed, receives, relieves, comforts or assists the 
offender in order to hinder or prevent his apprehension, trial or 
punishment, is an accessory after the fact. 

"Except as otherwise expressly provided by any Act of 
Congress, an accessory after the fact shall be imprisoned not more 
than one-half the maximum term of imprisonment or fined not more than 
one-half the maximum fine prescribed for the punishment of the 
principal, or both; or if the principal is punishable by death, the 
accessory shall be imprisoned not more than ten years." 



EFFECTIVE: 10/10/83 












■^ 







21-13.2 Title 18, USC, Section 1071. Concealing Person from 
Arrest 

"Whoever harbors or conceals any person for whose arrest a 
warrant or process has been issued under the provisions of any law of 
the United States, so as to prevent his discovery and arrest, after 
notice or knowledge of the fact that a warrant or process has been 
issued for the apprehension of such person, shall be fined not more 
than $1,000 or imprisoned not more than one year, or both; except that 
if the warrant or process issued on a charge of felony, or after 
conviction of such person of any offense, the punishment shall be a 
fine of not more than $5,000, or imprisonment for not more than five 
years, or both." 



.1 -liM^ 



• ' '* > 



Sensitive 
PRINTED: 02/18/98 






■i--:t&, 



.•■.:S:'fft 




Sensitive 



Manual of Investigative Operations and Guidelines 
Part II 



PAGE 21 - 12 






EFFECTIVE: 10/10/83 




21-13.3 Elements 

(1) Accessory after the fact 

(a) A person who knows that ah offense against the 
United States has been committed. 

(})) ^Receives , ..reli_ev6s_,_cpnif orts , or as s_i_s.t s._ the 



offender. 

(c) The act of receiving, relieving, comforting, or 
assisting the offender is committed in order to prevent the offender's 
apprehension, trial, or punishment. 

(2) Concealing person from arrest 

(a) A person harbors or conceals an individual. 

(b) There is a^warrant of arrest or other process 
outstanding for the individual harbored or concealed which was issued 
under the provisions of some Federal law. 

(c) The person harboring or concealing the offender 
knows of the warrant or process. 

(d) The act of harboring or concealing is done to 
prevent discovery and arrest of the offender. 

EFFECTIVE: 01/21/86 



■■■* 



21-13. A 




Policy 



(1) Since harboring is a substantive crime separate and 
distinct from the offense for which the fugitive is sought, Agents are 
justified in arresting a harborer where there is probable cause to 
believe such a violation is being or has been committed. Where 
possible, authorization of the U.S. Attorney should be obtained and an 
arrest warrant issued prior to the arrest of one accused of harboring. 
Entry to the harborer 's own premises to execute the arrest warrant 
requires probable cause to believe the harborer is within, but does 



Sensitive 
PRINTED: 02/18/98 






■r7 .■'■i?=f;^!pf" 





Sensitive 



Manual of Investigative Operations and Guidelines 
Part II ,- ■ ■• . - ■ .''' ' ■^■■- .- ■ 



PAGE 21 - 13 



n6t additionally necessitate a search warrant before entry to the 
premises. 

(2) Where there is probable cause to believe a fugitive 
is located within the premises of a harborer, entry to such premises 



to arrest the fugitive is contemplated, the premises are not the 




the search. (See Section 3-7, Legal Handbook for Special Agents. J 
The search warrant will support the complete and thorough search of 
the premises for the f ugi tive. ■ _ _- — 



(3) An arrest of either the harborer or a fugitive, with 
or without warrant, will justify a cursory search of the premises 
where Agents have a reasonable suspicion that confederates, 
accomplices, or others, lurking therein, may jeopardize their safety. 
(See Section|5-3.9,|Legal Handbook for Special Agents.) 



EFFECTIVE: 01/21/86 






::IE 



■■•'.* 



21-13.5 Venue 

Prosecution shall be in the district in which the offense 
was committed. 



EFFECTIVE: 01/21/86 



m 



21-13.6 Classification 

The same as the substantive violation. 

EFFECTIVE: 01/21/86 

21-13.7 Character 

Substantive offense - HARBORING 



'#■ 




. Sensitive 
PRINTED: 02/18/98 









■■^■i^.-..,ij.i.ai...,.LJ.j..ii|iL« 




Sensitive 



Manual of Investigative Operations and Guidelines 
Part 11 ■ •■■■'- ■..■■• 



PAGE 21 - lA 



EFFECTIVE: 01/21/86 






■ ■ ■-•'i,*-'.%.->'r< 

■ - , •*,"■-% 




1 1 



21-lA LOCATING, CLEARING, AND CANCELLING SUBJECT'S NCIC RECORD 

(1) If the fugitive is apprehended or located in the 
territory of the office having the subject's record on file in NCIC 
they should immediately | (within 24 hours) ("clear" the Bureau's NCIC 
record and place a "located" on any other NCIC record positively 
Identifiable with the fugitive. This is to be done via the. terminal 

J-0_caLe^_J:n_the_offlce^ The_s^ubstanlij^e__case _f ile is to show the 

clear and any "located" action taken in NCIC. " '^^^ "~" 



(2) If the subject is apprehended or located in the 
territory of an office other than the office having the subject's 
record on file in NCIC, the following procedures must be followed by 
said office and the office having the record on file in NCIC: 

(a) The office apprehending or locating the fugitive 
must I immediately (within 24 hours) j change the status of the subject's 
Bureau NCIC record to show "located." Any other NCIC record 
positively identifiable with the fugitive must also be promptly 
changed to a "located" status. This is to be done through the office 
terminal. The substantive case file is to show that the "located" 
action was taken. 



•^'•-F^V 






.^ 




^^^ The office having the subject's record on file 
in NCIC, upon receipt of notification via NCIC computer that a 
"located" message has been placed in the fugitive's Bureau NCIC record 
by another FBI office or military authorities in a deserter case, 
should immediately! (withih 24 hours) [ "clear" the subject's NCIC record 
through the terminal located in the office. The substantive case file 
IS to show that the "clear" action was taken. . ,.^ 

(c) The office having the subject's record on file 
in NCIC, upon receipt of notification via NCIC computer that a 
"located" message has been placed in the fugitive's Bureau NCIC record 
by an agency other than another FBI office or military authorities in 
a deserter case, should instruct the office covering the area of the 

locating agency to promptly verify both the identity and the ' 
apprehension of the fugitive. Following this verification immediately' 
Kwithm 24 hours) I "clear" the subject's NCIC record through the 
J""^"*^ '" ^^* office. The substantive case file is to show that the 
NCIC record has been properly "cleared." 



Sensitive 
PRINTED: 02/18/98 






■ mm 



-..'.'i-PH. 






■•■:• & 



UAl. JJ,.„U'i^L^JJUJ.I.U"" 




Sensitive 



Manual of Investigative Operations and Guidelines 
Part II :V,. ■ 



PAGE 21 - 15 



(3) If the federal process, or local process in the case 
of an unlawful flight fugitive, is dismissed prior to the fugitive's 
apprehension, the office having the Bureau's entry on file in NCIC 
must immediately I (within 24 hours) | "cancel" said entry. The 
substantive case file must reflect that this has been done. 

(4) Refer to the Manual of Administrative Operations and 
Procedures, Part II, Section 7 for additional NCIC procedures in this 
area. 









EFFECTIVE: 02/14/97 



21-15 



LETTERS OF APPRECIATION 




(1) If a local, state, or Federal law enforcement 
official apprehends or assists in the apprehension of a Bureau 
fugitive, a letter of appreciation from the Director will be forwarded 
to the official by FBIHQ upon appropriate recommendation of the SAC. 

(2) The recommendation, which may be set forth in the 

t apprehension teletype, a separate communication, or by|Form|FD-468, 
must the include following: 

(a) Official name, rank, and address of the officer 
causing the apprehension. 

(b) Official name, rank, and address of the person 
in charge of the agency involved. 



individuals. 



(c) Results of office indices checks against these 




(d) Sufficient details to enable FBIHQ to afford the 
matter appropriate attention. 



EFFECTIVE: 11/08/82 






Sensitive 
PRINTED: 02/18/98 














%'■ 




' ■■ . ■ ■ --^m 

Sensitive ■'/^■'fc^ii 

'' ■ ■ ■ -fi,^' 

Manual of Investigative Operations and Guidelines .^i 

_, ^ Vt . PAGE 21 ~ 10 ..'%.''. 

Part II ■■■ - .f.^' :■-■ - ■ , -^-^i 

■-■''.'/■■ ' . ■ ■ ^j ■' . ■ ^ ' . ■ -'"-i^h:- 

21-16 VERIFYING FEDERAL AND LOCAL PROCESS -^ 

(1) For those fugitives for whom Federal arrest process 
is outstanding, the office of prosecution shall verify once a year 
that the process is still outstanding and contact the USA to determine 
whether USA still desires to prosecute the fugitive if apprehended. 

(2) For those fugitives wanted under the Unlawful Flight 
Statute, the underlying local process and intention of local 
authorities to extradite for prosecution or reconf inement must be 
verified once a year. 



(3) When subsequently verifying Federal and/or local 



process for those fugitives after the case has been placed m a 
pending inactive unassigned status, because they are Mexican citizens 
who have fled to Mexico where they are not subject to extradition and 
deportation, it should be made a matter of record in the case file and 
need not be reported to FBIHQ. 

EFFECTIVE: 11/08/82 

21-17 DISMISSAL OF FEDERAL OR LOCAL PROCESS PRIOR TO 
APPREHENSION 

(1) If the federal process, or local process in the case 
of an unlawful flight subject, is dismissed prior to a fugitive's 
apprehension, the office of origin or office of prosecution, when 
other than the office of origin, should immediately notify FBIHQ and 
all auxiliary offices by routine teletype to discontinue. The word, 
"FUGITIVE," should be carried in the title of this teletype. 

(2) This notification will enable FBIHQ to promptly 
remove the fugitive stop in the|Criminal Justice Information 
Services iDivision and delete the subject from its fugitive index. 



EFFECTIVE: 12/02/94 



Sensitive 
PRINTED: 02/18/98 









'm 



£ 

■ 9 






•;S' 












:;j^00 




. • ■ ■ ■ - •. , . ■ - ^f^^f 

. ■- ■ l^'- »^,"/- 

■ ■ . . ; . ,.^ii"v,-^i-, 

.. ' ■, ''■ '-H 

•,■"'■ ■ •. ... •..'•, ■&^'^ 

Sensitive . , v.-^^; 

- ^ ■ " ■ • - ■ , ■ ■ -Isil 

Manual of Investigative Operations and Guidelines 'v^'|-> 

Part II... ■ . •■■ ' J.: •.■■•■.. . ,■■.:'■•' • " > . -. -.: -■ PAGE 21- 17,, ;-ii^;|S 

-, .'• ■■■■;_ , •.:■', .. ' ■;,-v .• ■ ; ":' r ■■ ■:■■ ■ . ...; ;■. ' .' r d^ 

21-18 PENDING INACTIVE STATUS WHEN ALL LOGICAL INVESTIGATION HAS' " '"^"ff- 

BEEN. CONDUCTED /;? 

•....■"'.' " . ,■ ■. - j-fV" 

(1) in fugitive cases, when all logical investigation has .|^' 
been conducted and the subject is still in fugitive status, FBIHQ can ~,^^ 
be requested on a UACB basis to allow the office of origin to place 
the case in a pending inactive status for six months for "A," "B," and 
"D" priority fugitives and for one year for "C" priority fugitives. 

"D" priority cases can also be placed in pending inactive status for -■^•■^■ 

six months when it has been determined that the parent who kidnaped r^ 

the child is residing in a foreign country and, for whatever reason, '^ 

th e lo ca 1 a uthorities will n o t or are unable to have the su bject "-< 

extradited back to the United States. ^t;. , 

(2) Prior to submitting such a request, conduct an v: 
in-depth file review in an effort to develop logical leads which may :jf% 
have been overlooked or bear recoverage due to the passage of time. rg. 

..•5?- . 

(3) Following this review, if your request is still V" 
. ..j, desired, prepare a comprehensive summary report setting forth the full ^ 
,:Vj scope of investigation conducted for review by FBIHQ. V 

(4) The administrative section of the cover page should 
contain a statement that UACB this case is being placed in a pending <if 
inactive status for six months or one year (depending on the fugitive 

priority), since all logical investigation has been thoroughly .; 

conducted, after which time the case will be made pending and j% 
appropriate leads will be set out in an effort to locate and apprehend . 
the subject. 





EFFECTIVE: 10/18/88 



21-19 LOCATING AND RELOCATING FUGITIVES OUTSIDE THE UNITED 

STATES 



EFFECTIVE: 10/18/88 



m. 



V- .-.■ 









^ 






Sensitive 
PRINTED: 02/18/98 ; ■-'•^Vr'X''^^^!^: ''^ '' ^.f--..-^':'^- 










Sensitive 



Manual of Investigative Operations and Guidelines 
Part II . 



PAGE 21 - 18 



21-19.1 



Requesting Investigative Assistance Abroad - Extradition 
Deportation 




-Ki). "in most instances, requgsti^for^ 

fUgltl" --.ii.«-- Ji --a*!... T -. 

, «(i,egat 
'Sover_ 
Section 163-10'; ~of'^tlii'^''oianual) , | thenifST^D^parHmenroF iState^ 




'♦'■'- 



(2) When submitting 
to„our_.Legats_.through_FBIHQ,...inc 
used, and set forth in the admin 
letter or airtel, where no LHM i 
contact with the USA or a local 
unlawful flight (UFAP) in nature 
case, that the USA (state author 
the necessary action for subject 
successfully located and informa 



requests for fugitive investigations 

lude ,in_the_cover__airtel,.when_LHM 

istrative section of a teletype, 
s used, the results of a recent 
prosecutor if the fugitive matter is 

Set out a statement, if such is the 
ities, if UFAP matter) will initiate 
's extradition if the fugitive is 
1 deportation is not a possibility. 



(3) Further, specifically include, where possible, the 
USA's (local prosecutor's, if UFAP matter) assessment of the 
seriousness of the case, the likelihood of conviction and whether 
subject can be expected to be released on bond or remanded to custody 
upon subject's return to this country. 

(A) Legal Attaches will attempt to arrange informal 
deportations for FBI fugitives whenever possible. The U.S. Marshals 
Service (USMS) funds and handles transportation in informal 
deportations in the same manner that they handle extradition 
situations. All Legal Attaches, upon locating an FBI fugitive abroad, 
who would be available for informal deportation, are to notify FBIHQ 
by teletype, furnishing the identity and telephone number, if 
possible, of the local official in the particular country and/or 
embassy representative with whom the matter should be coordinated. 
FBIHQ will then notify the office of origin (00) and the Office of 
International Affairs, Department of Justice (DOJ) , who will then 
coordinate with the Enforcement Operations Division, USMS 
Headquarters, to request appropriate funding and transportation 
assistance. If the fugitive is the subject of an Unlawful Flight 
warrant, the Legal Attache will provide an estimjate of expenses and,, 
through FBIHQ, request 00 to ensure that the interested State '■ 
authorities are willing to assume the cost of the informal 
deportation, which would be subsequently billed to them by the U.S. 
Marshal. If the State authorities agree, 00 is to advise the Legal 
Attache, through FBIHQ, and notify the Marshal holding the Federal 









■• '-^ 




■ ■ 4^- 




■ ''f^-V':. 




■ *•$% 




; '■..■■■'•iK- 




f .. ,;.-'l^ 




■ .-'iftr 




*'ipE" 




~^psm 








""■'•^If^ 




. *.itV' 




: ^i ■; 




^.: ..Ui^. 


' 


• • ' * *'■%'.' 




-.fca. 




■ ■■^:. 




■^ ■'■~^-- 




'«;■-& 




m- 




■■•' .,- 


te 


■■'i- ■ 


y-j-e. 




CtA 






■:^%: 




: !■/' 




?* 




• ai«V 








>.w- 




-Vi- 




', CI- 




■•,-5?-r 




'"•^ 















Sensitive ', 
PRINTED: 02/18/98i>^'(^;|f$e 



^••>^T•" 






■ ., ' '^^ ' "''^v 









■■■ ■■ ■■ ■ ■ ../'w^^vi- 

Sensitive ' . • ' -'S:^ 

■■■■-■ • • -, ■ -\;}0 

Manual of Investigative Operations and Guidelines "'':, 

Part II -.:..;;::..:-;,.•,- :.■•,._. ■■ -..y : ' '' ^^^^ 21- 19 -r| 

warrant that a request for deportation transportation will be made of 
their headquarters by FBIHQ through DOJ. 

EFFECTIVE: 10/18/88 r 

21-19.2 Mexican Citizen in Mexico 

FBI fugitives who are Mexican citizens and who flee to ^ prj 

Mexico are not subject to extradition or deportation. The office of ;%; 

_origin should submit an appropriate comi nunicat ion t o the pro per bo rder '^ 



office or to FBIHQ for transmission to Legat, Mexico City, requesting 
that the fugitive be located. Once the fugitive is initially located 
in Mexico, no further action should be taken to relocate him/her in 
Mexico in the future by either Legat, Mexico City, or a border office 
and the case should be placed in a pending inactive unassigned status 
by the office of origin with the fugitive stops outstanding. If 
information is received that a fugitive has returned to the United 
States, the case should be reopened and investigation conducted to 
effect his/her apprehension. For those fugitives for whom Federal 
arrest process is outstanding, the office of prosecution shall verify 
once a year that the process is still outstanding and contact USA to 
determine whether USA still desires to prosecute the fugitive if 
apprehended. For those fugitives wanted under the Unlawful Flight 
Statute, the underlying local process and intention of local 
authorities to extradite for prosecution or reconf inement must also be 
verified once a year. 



EFFECTIVE: 10/24/85 



21-19.3 Fugitives Outside the United States Other Than Mexican 
Citizens in Mexico 



:^!i 



■ff.- 



■■i'itf'f- 






.■.•* 






The office of origin should submit an appropriate 
communication to the proper border office or to FBIHQ for transmission 
to the appropriate Legat or agency, if the country in question is not 
covered by our Legats, requesting that the fugitive be located. Once jj*. 

the fugitive is initially located in the foreign country and if 
his/her deportation or extradition cannot be legally accomplished or 
will not be instituted, the case should be placed in a pending 
inactive status by the office of origin, with stops outstanding, upon 
completion of all other necessary investigation. If information is 
received that a fugitive has returned to the United States, the case f-' 

■ • ■ "■ ' • ■••■■•■■^si^: 

Sensitive **y' 

•"• ■'■■ -'.r'-- ■ i. ,, PRINTED: 02/18/98. -.;■ , .w '.,..,: ... ■-.■*;.-•. '?;?:)- v--:-^i5S^' 

" " "'...■•. ' "" ■ ■ ' ■ "•'■ '■ . .J'"?KWS^ 



■7r'9r?srv«'W!r-T^TPs"ssf"c=Q?ft-*^*^ 



■.,)...,-.;\"V,<».iV'f, ■. 











. .^^.■tj.^k.:,,„- 



■.%. 



Sensitive 



Manual of Investigative Operations and Guidelines 

Part. I r^ ..V vvX:::^":;. r •'-::■■ ;•.■■■,-■■ '';■.■ ,.:-•'■; --;vv,-' " ■ 



, , , w rrx.:HMism 



PAGE 



21-20 






should be reopened and investigation conducted to effect his/her 
apprehension. For those fugitives wanted under the Unlawful Flight 
Statute, the underlying local process and intention of local"" :.' 
authorities to extradite for prosecution or'reconf inement, if 
apprehended within the United States, must be verified once a year. 
For those fugitives for whom Federal arrest process is outstanding, 
the office of prosecution shall verify once a year that the process 
still outstanding and contact the USA to determine whether USA still 
desires to prosecute the fugitive if apprehended within the United 
States. Fugitive cases involving non-Mexicans in Mexico and others 
previously located abroad should be reopened and the subjects 
_r.elocated_.ev.ery_twoyears_thr.ough_the_above_ procedures. . 



;.CV. ' 



18' 



EFFECTIVE: 10/24/85 



21-19.4 



[Fugitives Outside the United States I 



I (1) I When it is determined a fugitive has left the United 
States, the office of origin should immediately establish and maintain 
a lookout notice (Form FD-315) with the U.S. Immigration and 
Naturalization Service (INS). Upon the fugitive's apprehension or 
dismissal of process, it is likewise the responsibility of the office 
of origin to discontinue this notice (see Part II, 10-7.5.2 of this 
manual for procedures for establishing and canceling INS stops). 

I (2) As soon as it appears likely that a fugitive may be 
located in a foreign country, you should notify the prosecutor, either 
the U.S. Attorney or the local prosecutor in unlawful flight cases, 
that he or she should contact the Office of International Affairs 
(OIA) , Criminal Division, U.S. Department of Justice, promptly. In 
addition, as soon as such an arrest appears likely, you are to notify 
the substantive division at FBIHQ, with copy to the Office of Liaison .; 
and International Affairs, so that FBIHQ may notify OIA. j 



EFFECTIVE: 10/25/89 










^??SiSf 












■v-.iV 







Sensitive 
PRINTED: 02/18/98 






Ij.' V "^'^''i;''---''-^ I '-'A!^-^': 






OPCA-20 (12-3-96) 




3. 



FEDERAL BUREAU OF INVESTIGATION 

FOIPA 
DELETED PAGE INFORMATION SHEET 



XXXXXX Mi^^ 

XXXXXX ~ • 'if»;i'?^ 

xxxxxx 'J&. 



_ Page(s) withheld entirely at this location in the file. One or more of the following statements, where indicatedl^^ 
exolain this deletion. '''%l;< 



explain this deletion. 

J^ Deletions were made pursuant to the exemptions indicated below with no segregable material available for 
release to you. 



Section 552 



□ (b)(1) 

^ (b)(2) 

n (bX3) 




n (b)(4) 

□ (b)(5) 

□ (b)(6) 



a (b)(7)(A) 

a (b)(7)(B) 

n (b)(7)(C) 

□ (b)(7)(D) 

n (b)(7)(F) 
D (b)(8) 

□ (b)(9) 



Section SS2a 

n (d)(5) 

n (j)(2) 

n (k)(i) 

n (k)(2) 






■ 4*4 






"n-(k)(3)- 

n (k)(4) 

a (k)(5) 

□ (k)(6) 

□ (k)(7) 












O Information pertained only to a third party with no reference to the subject of your request or the subject of your? J. 
request is listed in the title only. 5J,7 

n Documents originated with another Government agency(ies). These documents were referred to that agency(ies)"^| 
for review and direct response to you. '^ 

■$$ 



Pages contain information furnished by another Govenunent agency(ies). You will be advised by the FBI as M. 
to the releasability of this information following our consultation with the other agency(ies). 






Page(s) withheld inasmuch as a final release determination has not been made. You will be advised as to the C 
disposition at a later date. "^fc 



Pages were not considered for release as they are duplicative of 
Page(s) withheld for the following reason(s): 






M The following number is to be used for referwice regardiag diese pages: 



M 




•Sm 
I 



xxxxxx 
xxxxxx 
xxxxxx 



»*>w"Wyyi,i,iu.i...il.wf ^tgjli 



g tOJ I J 



xxxxxxxxxxxxxxxx 




X Deleted Pagc(s) X 




X No Duplication Fee X 




X for this page X 


:^ 


XXXXXXXXXXXXXXXX 




. . • ■•,- ■, 


•■•^*ii 




mmxaW' 


■■■<, C\r-^j^-J:^-i:^^^^.y4^. 




. - . ■ -v. ,.-.t'i^.. 





rmn^amu^.n ivi v«i« MaiTa. f ■.-.■.■ i,ix^.Y.i^»i..v:J,:..., : v>.:,7-.-./.-^^-.viyaiK^.ii;ja^ 



i^TP<t??g^?»:^VK??»t^^G?<g^T!!Bg Bi^ 




Sensitive '! 



Manual of Investigative Operations and Guidelines 
Part -11 •:::.•; -..'-;.■•. ■'■■.. ' r: ■ ••..%--' -;<■ '-'■■ -■:."- ■■ • 



PAGE 21 -.2A 



- '■ i■;'•^•..1i:■J■,^'■ 



21-20 



FUGITIVE INVESTIGATIONS FOR OTHER FEDERAL AGENCIES 



(1) Special requests are occasionally received by the 
field from other Federal agencies or from USAs to conduct 
investigation to locate fugitives wanted for Federal violations within 
the primary jurisdiction of other Federal agencies. 

(2) When such requests are received, promptly submit to 
FBIHQ by airtel or teletype, depending on the urgency, the complete 
details including the reasons for the request. Hold all investigation 
in abeyance pending FBIHQ instructions. 



■'■Tv; 






(3) All fugitive investigations conducted by the FBI for 
other Federal agencies (example: DEA Fugitives) should be classified 
as 62E matters. 









■■■% 

'■:■}■ 



EFFECTIVE: 10/25/89 



21-20.1 Fugitive Inquiries Abroad on Behalf of U.S. Marshals 
Service (USMS) 



■^ 



% 



Mm 



(1) Based upon an agreement reached with the FBI, the 
USMS may request, through FBIHQ, investigative assistance of our Legal 
Attaches to conduct limited agency-type inquiries in fugitive matters 
within the Jurisdiction of their agency. 

(2) Requests for assistance will be forwarded, by letter 
to FBIHQ, reviewed, and transmitted to the appropriate Legal Attache 
for handling, if such requests conform to the existing agreement; 
i.e., are merely agency checks and do not involve the location or 
apprehension of a fugitive. Conduct no inquiries unless they are 
forwarded from FBIHQ. . '. 






(3) Upon completion of the inquiry by the Legal Attache, 
it should be forwarded to FBIHQ, Attention: Fugitive/Government 
Reservation Crimes Unit, in a form suitable for dissemination to 
USMSHQ. -. ■:.■'•'_ ' 



'■'m 




mm 



(4) As requests should be few in number. Legal Attaches 
are to establish a control file in the "62" "classification and handle 
inquiries out of such file. All correspondence to FBIHQ should 
utilize the caption noted above and include, as a subcaption, the 
name(s) of the subject (s). Appropriate serializing and indexing 
should be made for record and retrieval purposes. 



i0W 






.:iif^^.. ■.. Sensitive ft|,K...,||;,;.., ■; -^^iii^|?^^%>,^^. 
PRINTED: 02/18/98 •' ,?*>- n« ^.. v^. ; ; ., 






HgwBgrq i 




Sensitive 



Manual of Investigative Operations and Guidelines 
Part II--„„ :-■ -. -■■:■■■■ :''^^--- 



PAGE 21 - 



EFFECTIVE: 10/25/89 



f-A:. 


'■' ■'^' }',!'■ yynf ^7- 


,'.-, .. '., \ 


■ ii^t!m^m:%:. 




;■•" ■■--::^i^ 






- 


:.'.. ■■'~>;n'E 




■ -•■•■■■■^7?^ 




■ '■■ ^ -m 




, .; 'itia-f 




■ ■ ,.>S' i^#Sg 


-1;. 


.- -^ Mi^ 




■•;.:.. -^ 




■■'XzjiM^M: 


25 ; 


v^^l^. 






'.'" ". 


■ ■ ' ■:^: 








.. s^ 








^j^r<'-- 



21-21 



FUGITIVE INQUIRIES 



When attempting to determine if an individual is a Bureau 
fugitive or IS wanted by another agency, the following procedures 
should be followed: 

(1 ) Obtain all known back Rroimd, rioarr^,;pt-,N^^_^j^^^^ 



identifying numbers. 



(2) If identifying numbers, such as date of birth or 
SSAN. are known, make an inquiry of NCIC through the terminal located 
in the field office. 

. ^3) Inquiry can be made through another agency's NCIC 
terminal when advantageous or convenient; however, your office's NCIC 
identifier must be used to identify the inquiry as Bureau originated. 

^^^ ^^ NCIC is negative or cannot be utilized because of 
the lack of an identifying number, direct a teletypejor electronic 
communication, I depending on the urgency, to FBIHQ. Set forth the 
details and data along with the results of the NCIC check and request 
a check of the FBIHQ fugitive index and Criminal Justice Information 
Services Division records. (See MIOG, Part II, 21-4(2).) 

(5) Whenever possible, inquiries should be worded "Advise 
only if fugitive or wanted" to avoid the need for a negative reply. 

(6) If a reply is desired, specifically indicate by 
stating "Advise whether or not a fugitive or wanted." 

„ , ^^^ Avoid ambiguous language such as "Advise if fugitive" 
or Advise if wanted." Such requests will be interpreted to mean 
Advise only if fugitive or wanted." 

(8) In those instances where a reply is desired and an 
[electronic communication! is used, one extra copy of the | electronic 
communication] should be submitted to FBIHQ for each office that is to 
be advised. 



.,i#if.. 









1^ 



~-S' 






.. ;itii^^v^" 



(9) If there is no record of being a Bureau fugitive or 
wanted by another agency. FBIHQ will appropriately stamp copies of the 



Sensitive ^ ' C^- ^-■'^•■•v-v. .-, 
PRINTED: 02/18/98 -.4 ?v .s*-^.. 






i. 






m- 






^■■^M-' 






wi rniMi [ rn !■■<«< ni^<-.i> r^nit -^f mn< m«» ■ ■yiatj^fJiiiL^ii^'^^^-.:^ f ■.^..,v^ 



"y^w?Fty/!»w\vtia»iWK'yciiH^?8sa!St «ta .»« W*KSi ^ w t>r^-^ 




«;-,;•' , 






i , ,>»•■ 




Sensitive 



Manual of Investigative. Operations and Guidelines 
Part. 11-/ ■ ■..•^'■'\- ' ■■ 



PAGE 21 - 26 



incoming communication and forward same to the interested offices by 
routing slip. . 



EFFECTIVE: 05/13/96 



21-22 FBIHQ FUGITIVE INDEX | (See MAOP, Part II, 7-2.1(1).) | 
(1). — An-alphabetical .fugitive_index..containing_all_ 



currently designated Bureau fugitives is maintained in the 
I Violent Crimes/Fugitive|Unit, Criminal Investigative Division, FBIHQ. 

(2) When attempting to determine if an individual is a 
Bureau fugitive and identifying numbers are not available in order to 
check NCIC, an inquiry based on the individual's name can be made of 
these fugitive indexes at FBIHQ. 

(3) Fugitive inquiries may be made using only th^^^^^ 
^ug^^v^s name, if no other data is available, by calling ^^Hl^ Jo3-^ 

7^^m^j^^3^o.m. , [Eastern Time, Monday through [Friday, or 

}y calling ^^^^^^^^^^v during off-hours. I 






■ ■ ■ U;«i&l 






•■■'•'*'ii!i^ii 

. "■->V!' 

• !»;* 

■:'^' 
.•.r,v«t- 



:M 



.1 ■■ :k!&i!l 

■m- 

'W ■ 



EFFECTIVE: 08/18/9A 



21-23 



POSSIBLE FUGITIVE LEADS 







^iS§ 



The following possible fugitive leads are not intended to 
be all inclusive, but should be utilized when appropriate in addition 
to the usual investigative steps taken in a fugitive investigation in 
an effort to locate and apprehend the subject: 



'^f'f 



'iTi ^*^^Tj^ ' ■ ^' 



X^^-»CM^i?.A».>"o™,o?.sMspected that the subject has left i 




j*tf-.o-»*->F^ 



(2) If the subject is an alien, request WMFO to" cause a''* 
ij^^il^ch^of^the records of the Alien Registration Division, iNSj'f^'j* 
iWaahingtbh',i:D.C. ,, for.; information alien is' required to furnish under?^iir 
^heVjrovisipns of;.the of 19fkO.-T^'^'' :'' v"' 



^^Wfj,-:*;!???;" 



' v*?'j?r!r^;?'ii;f''-'''*' 



lo^-" 






Sensitive 
PRINTED: 02/18/98 















■PPWPi 






■'*->.. 




Sensitive, 









Manual of Investigative Operations and Guidelines^v- 



Part II 



'"^f> '. 







■ M' '■'■■'■ . -/,- w ', .v' ; ;; 

PAGE'' 21 - 27: 



n, contact' 

,.§P^J,^.l?.,thrpugh which any compensation or.ins^ranre^ benefits ian be"^^ 
. ; determined. ?ui?r'" .■ ^ ^s.p^- ■• ■■ .- / -"--.- '..,-^.-;;\u3t.,- .-:• ■• ,,,.,..■ --.t^i^^;-. .;„: , ,?ii*-"Ji 
j,;^^-u .. •^. i-^r;,4 ' ■■ -«vi "^- , • '-■■' .' , - v.'.vj^.4^-%, 

s^iivWA'';- :^.*1, ^5*^^* ''"*'J*<=*^. i« o*" «as a merchant seaman, request^' 
^.1:^!? to contact U.J. Coast, Guard Headquarters, Washington. D.C, for a/ 
.,4;S£?,f.f^?Bf,ck:,^^Jhe number, of the subject's seaman's certificate of ^ 
.iflSSif,i?AC?tion,^(^-number), if known, should be'' furnished. > ; 



'^.^ '■>'■•• 



f2.> „ . ^^<Jv|.f;;the>ubject previous ly;_served in. the Aiir Force; s, ^ 
^^' Mf inff. oi^.Navy. request the'proper^Vffice to cause aTevH^of 
fSUbject s military records,.* ~ ' ^- V';;--,/ 

^^^1 ^;x„«^^^ .utilization of a circular letter if appropriate^am 
with FBIHQ approval.!; ,. . " tv.-.r!?'t,«. ?»j 

■ ■ ■ ■■"■- ■ -'irwv.i' -t ^s ^"' ' ' • ■ 




(See 
^the use of this te 



ictions on '.4 



(10) Use of the All Writs Act (awa) , Title 28, USC, 
Section 1651, to obtain records to locate federal fugitives All 
Writs Act orders for the production of records may be requested in all 
federal fugitive investigations, including unlawful flight fugitives, 
subject to the following requirements: 

. (a) There must be an outstanding arrest warrant for 
the fugitive issued by the U.S. District Court (USDC) or the U S 
Magistrate. i. ... 

*n.- (b) The AWA order can only be issued in the federal 
district court, where the criminal case is pending. Such orders are 
valid and may be executed in any federal judicial district; >. i -v- 
Therefore, where the records sought are located in a district 'othe^-< 
than the district of issuance the order should be transmitted to the 
field office where the records are located and the records should be 
produced to Agents of that office. 









■•■<fetii 






Sensitive 
..„.^^ PRINTED: 02/18/98 • 



'-^SiCS^VfKs-.;' 








Sensitive 



■•-Iv 



m 




Manual of Investigative Operations and Guidelines 

Part II 



PAGE 21 - 28 



(c) The order should be obtained from a judge of the 
USDC unless the USDC has delegated appropriate authority to the U.S. 
Magistrate. The USA's office should be able to make this /- 
determination. > 

(d) The orders should allow sufficient time (10-12 
days) between the date of the orders and the required production of 
the records to allow the affected company to challenge the order in 
the district court of issuance if it desires to do iso. This 
requirement does NOT preclude more timely production of the records if 
the company is cooperative. 



— - (^~~The affidavit should demonstrate the reasonable 
belief that the records sought may be of assistance in locating the 

fugitive. / 

Althougb^l^^miJjjjjjjjjjH^BVw^^^ probably 
the most- common records s ought w^l^h^^roceQure , AWA orders may be 
used for the production of other records which might assist in the 
location of the fugitive. However, AWA orders may not be utilized to 
obtain records to locate federal parole violators who are wanted on 
federal parole violators warrants because there is no pending case in 
the USDC and the court thus lacks jurisdiction. Also, AWA orders may 
not be utilized to obtain records to locate mandatory release 
violators (MRVs) since they have the same status as federal parole 
violators (no pending case in the USDC). 

(g) Memorandum to All SACs, dated 10/19/83, 
captioned "USE OF ALL WRITS ACTS TO OBTAIN RECORDS TO LOCATE FEDERAL 
FUGITIVES," provided sample forms designed to facilitate the use of 
this technique. / . 




Sensitive ../ 
PRINTED: 02/18/98: V 



'^^ 






■■■-.VVCi.- 



00^ 



■ MIIWTMIIIWIP ■ 





Sensitive 



Manual of Investigative Operations and Guidelines:^. 
Part II .- •.^^.^^;>^:\fMy^fe|i^i^g-^^:^4'i^ft''- ^'■JCW^^ii.^i'jn;^^ 







(16) Leads should be set forth to review police reports, 
and an inquiry of the Interstate Identification Index should be 
performed for criminal history data on the subject. 

(17) The cooperation of the subject's bondsmen may be 
sought if circumstances indicate that this procedure is advisable. 




(20) Consider obtaining return information concerning the 
fugitive from the Internal Revenue Service (IRS). See Part II, 
Section 19, of this manual. 

(21) Consider requesting the issuance of an Interpol 
International Wanted Notice if the fugitive is believed to be 
traveling abroad. (See Part I, Section 163-10, of this manual for 
procedures to request issuance of these notices.) 

(22) Placing of Fugitive Stops in State and Local ' 
Identification Bureaus: The office of origin in fugitive matters 
should disseminate copies of fugitive fingerprint cards to auxiliary 
offices requesting that the fingerprints be searched and/or filed in 
local and state identification bureaus. In order to ensure the full 



'jV,-:. - 
■V''-.'?- 



Sensitive 
PRINTED: 02/18/98 



si5 



i^iiif 









■ ■■■■:;j,'--v--';;Ky;v 





Sensitive 



Manual of Investigative Operations and Guidelines 

Part 11-' ■'■" J j'^':h'-:}!;U'/ ■-^fiM''^:'- ■-'■■' -^^^^^ ■■■'::.'--^-:.^'-^ ..PAGE, 21 .-; , 30. 

cooperation of state and local identification bureaus, the office of 

origin should disseminate only photographic or laminated copies of •;;■';;, • 

fingerprint cards to auxiliary offices to place fugitive stops with;/;' 

these bureaus. Request laminated copies of fingerprint cards from the . 

Criminal Justice Information Services JDivision, West Virginia '■>#;' 

Operations (Attention: Module D-2 AHTW) . | (See Part II, K-12.3i5 and' 

21-4 (3) of this manual.) ^: --iA' 

■■ ■ ■ "-.it . . 

■. . ■ .■•. , . ■. y' . 

(23) (See Part I, Section 88-7.5, of this manual! for 

access to information from the Federal Parent Locator Service (FPLS) , 

UFAP - Parental Kidnapping - Child Abduction Matters.) 4'' 



(25) See Part II, Section 10, of this manual, entitled 
"Records Available and Investigative Techniques, " which sets forth, 
either directly or by MIOG cross-reference, numerous investigative 
techniques that may be utilized in fugitive investigations. 




Jk:^ 






■•■■ ' :i- •rViSsiF)' 

-•.■'■■^'ir#* 

• -as 






m 



(2A) See Part II, Section 19, of this manual, entitled 
"Location Of Other Government, Industrial, and Organizational 
Records," which sets forth a multitude of federal, state, territorial 
and private industry records by location and field, off ices covering 
same that may be the basis for record checks and stops. 



,:?^. 



■■■■■■?S35 

•■■\*i*> 



.'..'■•.■ftWAt 
..i "..'.'.^'Kgi- 



Sens 1 1 1 v© ■?!>'';- ;;;;-'^v-^i.;M..:,3 



. -v^-.o.a:v;.a^vfa4:...C;^G^v- r'-- PRINTED:. 02/18/98|t;g^|:U,:-a, 






-■■■-' ■■■■^>:xm: 

^. 1 i:..'.vv- 

■■m 






iil 



^ r - .- • ■.„■■. ■V.'i^'iAt^ 



■(.■^w .■:■*■ 




' Sensitive/^; 






'f$'c^iWi^fi. 



Manual of investigative Operations and Guidelines ^' Jv||^ 

^■■. . ■.. -„..•., '■■■Ji^'-- '■'•r.y.,.:h.i}.;ji-t{-'^- •■■: ■ ■ •;.>• •, '...■. PAGE' il ~ ■ jl ■ -'^ ■••■:?■■ ■•^■■'■-WMf- 



.;:^^|i^fel|p^-i-^j^^^^^ 



■■fti," 



Sens i t ive v^^-^i-K^ffti^'^ V'^-:'' 



■ ■■ -V^-V'^ ♦*.■■■ 







WMm 



■■,".:-.V.'.i:-f'-i;vS^>SJ^" 



> .>«. . .y. . » . n. , -M i li"frtw,,v.-- v--^^■■-'^' v:^..-:^.- ^T^SiV^.iJJ!^^' 



OPCA-20 (12-3-96) 




V_i>.^' 




<R 



FEDERAL BUREAU OF INVESTIGATION 

FOIPA 
DELETED PAGE INFORMATION SHEET 



XXXXXX 

xxxxxx 

XXXXXX 






Section 552 



D (b)(1) 
(b)(2) 
n (b)(3) 



n (b)(7)(A) 
n (b)(7)(B) 

n (b)(7)(C) 

n (b)(7)(D) 



Section 552a 

n (d)(5) 

D (j)(2) 
O (k)(l) 
n (k)(2) 



n (b)(4) 

n (b)(5) 

n (b)(6) 



(b)(7)(Er 
n (b)(7)(F) 
n (b)(8) 
n (b)(9) 



a (k)(3) 

□ (lc)(4) 

a (k)(5) 

n (k)(6) 

n (k)(7) 



° itSlfLStSS^r'"' ^"^ ""^^ "'-°- •" *= -«- «f y™ revues, or *. ,„^Je«, „f ,o^ 

Pages contain inforaiation furnished by another Government agency(ies). You wUIbe advised bv the frt « 

to the releasability of this infonnation followbg our consultation JL t oZ ^^^s) ' 

- Zoi^nTX^T. " ' '"^ "'^"^ '"'="^^'^^" ""^ °°' ^-'^ -^^- ^- -"^« -'Vised as to the 

Pages were not considered for release as they are duplicative of 

Page(s) v^'ithheld for the following reason(s): 



IP The following number is to be used for reference 



regarding these pages: 



XXXXXX 

xxxxxx 

XXXXXX 



XXXXXXXXXXXXXXXX 
X Deleted Page(s) X 
X No Duplication Fee X 
X for this page X 

XXXXXXXXXXXXXXXX 



FBI/do; 



~ s««V,V«i>*W *«<'■'>"■ " 




Sensitive 



c 



Manual of Investigative Operations and Guidelines 

Part II 



PAGE 21 - 3A 




1^^ 



EFFECTIVE: (il/2%f90 



21-25 



IDENTIFICATION ORDERS, WANTED FLYERS, AND CHECK CIRCULARS 



EFFECTIVE: 02/16/89 



21-25.1 



Basis for Issuance 



(1) Identification orders (10) and wanted flyers may be 
issued by FBIHQ in our more important fugitive cases involving badly 
wanted fugitives who have committed or been charged with crimes of a 
more serious or violent nature having considerable public interest. 

(2) Check circulars may be issued by FBIHQ in cases of 
fugitives who are notorious fraudulent check passers and who are 
engaged in a continuing operation of passing checks. 

(3) These wanted notices are issued by FBIHQ in the above 
appropriate cases to aid the fugitive investigation through increased 



Sensitive 
PRINTED: 02/18/98 





Sensitive 



Manual o£ Investigative Operations and Guidelines 

Part II PAGE 21 - 35 

publicity and cooperation when all logical productive investigation 
has been conducted and the fugitive investigation is at a standstill, 
or when the earlier issuance is merited due to the magnitude of the 
critaes or notoriety b£ the fugitive involved. 

EFFECTIVE: 02/16/89 



21-25.2 Requesting Issuance 

(1) Inthe ..eyent„_that_the._issuance of an_ IP, wanted_f.lyer_ 



or check circular is desired and appropriate, the office of origin may 
request its issuance during any stage of the fugitive investigation by . 
self-explanatory Form FD-61. In addition, when submitting an FD-61 
each office should also submit a comprehensive nonprosecutive summary 
report setting forth significant investigation conducted to locate the 
fugitive as well as information relative to leads outstanding. 

(2) The original and one copy of the FD-61 should be 
submitted to FBIHQ by cover airtel marked to the attention of 
the I Fugitive/Government Reservation Crimes |Unit, Criminal 
Investigative Division, to ensure prompt receipt and consideration. 

(3) Since the purpose of a wanted flyer is to cause 
immediate nationwide circularization of the flyer, usually at the 
outset of the fugitive investigation, the office of origin may request 
the issuance of a wanted flyer, if desired and appropriate, by 
teletype or telephone confirmed by teletype. 

(A) An existing wanted flyer on file should be utilized 
as a guide in providing the necessary data needed and this data should 
be furnished in both the telephone call and teletype to FBIHQ. An 
FD-61 should subsequently be furnished to FBIHQ since the wanted flyer 
will be followed up by the issuance of an identification order. 

(5) Since an identification order is promptly issued by 
FBIHQ for the subject after the issuance of the wanted flyer, wanted 
flyers will only be issued in very extraordinary fugitive situations 
because of the duplication and cost. factors involved. 

(6) In regard to requests from the field for issuance of 
these wanted notices, they will be issued by FBIHQ only after close 
scrutiny. If additional information is needed by FBIHQ before 
rendering a determination the office of origin will be requested to 
submit additional details. 



Sensitive 
PRINTED: 02/18/98 

^■■iiiinMM^ 




Sensitive 



Manual of Investigative Operations and Guidelines 
Part II 



PAGE 21 - 36 



(7) In certain instances, FBIHQ based on its judgment, 
will direct the office of origin to submit an FD-61 for the issuance 
of an identification order or check circular or provide necessary data 
for the issuance of a wanted flyer. 



EFFECTIVE: 02/16/89 



21-25.3 



Procedures After Issuance 



c 






(1) After the issuance of the wanted flyer, 
identification order or check circular, the office of origin should 
modify its NCIC record on the subject to include the wanted flyer, 
identification order or check circular number in the "miscellaneous" 
field. 

(2) Upon issuance of an identification order or check 
circular, FBIHQ will prepare a letter to all offices enclosing five 
smooth finished copies of the subject's photograph to be utilized for 
press or news media purposes. 

(3) Upon the issuance of an identification order, wanted 
flyer, or check circular and the above letter by FBIHQ, the office of 
origin should, by cover airtel, promptly forward to FBIHQ and each 
office four copies of an LHM setting forth pertinent background and 
descriptive information concerning the fugitive. The airtel should be 
appropriately noted "Summary - Background Airtel," while the LHM 
should include separate headings as follows: Facts of Offense; 
Federal Process; Brief Personal History; Modus Operandi, and Other 
Interesting Facts; Identification Record; Facts as to Dangerousness 
and/or Suicidal Tendencies; and Detailed Physical Description. 

(4) Each office, upon receipt of the "Summary - 
Background Airtel," should carefully review it to determine if the 
facts suggest the basis of self-initiated investigation and if so, a 
case should be promptly opened and assigned. A case should not be 
opened unless this review results in specific leads. In all 
instances, this case should be closed within 90 days in the absence of 
generating specific leads. 

(5) Following the submission of the "Summary - Background 
Airtel," on a regular basis at intervals not to exceed 120 days, the 
office of origin should furnish FBIHQ a comprehensive summary airtel 
setting forth information as to the progress and direction of its 



Sensitive 
PRINTED: 02/18/98 



■M 




^ 




Sensitive 



Manual of Investigative Operations and Guidelines 

Part II PAGE 21 - 37 

fugitive inquiries. 

(6) To assist FBIHQin monitoring and evaluating the 
effectiveness of this program, the apprehending office should advise 
in its apprehension teletype to FBIHQ whether or not the particular 
wanted notice contributed to the fugitive's location and apprehension. 
If positive, state how the information was obtained and from whom. 

[(7) Upon receipt of an identification order, wanted flyer 
or check circular, each office will conduct driver's license and 
vehicle registration checks of all state licensing agencies covered by 

_thjB_.divisipn„usij5g_txue_name_an^ These c hecks 

are also to be conducted upon receipt of additional aliases and on 
true names and aliases of known associates that may subsequently be 
furnished to each field division. Dates and results of these checks 
are to be recorded in the appropriate fugitive file. | 



EFFECTIVE: 01/21/86 

21-25. A, Administrative Handling by Field Office of Identification 
Orders (lOs) , Wanted Flyers, and Check Circulars 

A list of numbers in succession is to be prepared in each 
field office. As each 10 is received, true name of subject is to be 
written opposite number on list which is identical with number on 10. 
Draw a line through number to indicate that 10 has been received. 
Same procedure is carried out for wanted flyers and check circulars. 

EFFECTIVE: 01/21/86 

21-25.4.1 Procedure When Received by Field Office 

(1) Check number against list. If any are missing, 
advise FBIHQ. 

(2) Check index for information on all subjects; 

(a) If no file exists, prepare index cards for each 
name and alias. 10, wanted flyer, and check circular numbers are to 
appear on all cards made. 

(b) Prepare a dead investigative file. 



Sensitive 
PRINTED: 02/18/98 



wmm 





Sensitive 



Hanual of Investigative Operations and Guidelines 

Part ri PAGE 21 - 38 



(3) Put five copies of 10, wanted flyer or check circular 
in investigative file and date stamp top one. 

('i) Put one copy on bulletin board. 

(5) Send one copy to each Agent having a need for same. 
All Agents will not receive them. 

(6) "Keep FBIHQ advised of number of lOs, wanted flyers, 
and check circulars required for investigative purposes. 



(7) Put one copy in appropriate 66 classification file. of 
outstanding lOs, wanted flyers, or check circulars. These files are 
only for IDs, wanted flyers, or check circulars which have not been 
discontinued. 



EFFECTIVE! 01/21/86 



21-25.4.2 Miscellaneous Instructions Regarding lOs, Check Circulars 
and Wanted Flyers 

(1) Agents may keep those lOs , check circulars, and 
wanted flyers which may be of value to them. 

(2) Use apprehension communications to keep 66 
administrative file current. 

(3) An outstanding list showing identity of all lOs, 
wanted flyers, and check circulars is published as of March 31 and 
September 30 of each year. List will contain sequence numbers of such 
items which have been discontinued since previous list. 



EFFECTIVE: 01/21/86 



Sensitive 
PRINTED: 02/18/98 

■■■II^I^HII^ 




Sensitive 



Manual of Investigative Operations and Guidelines 
Part II 



PAGE 21 - 39 



21-26 



TEN MOST WANTED FUGITIVES PROGRAM 



(1) Individuals selected as the Ten Most Wanted Fugitives 
are chosen by FBIHQ from existing 10 subjects. 

(2) Ten Most Wanted Fugitive cases, after being so 
designated, must be kept pending in all field offices until a complete 
review of the case has been made and all logical investigation has 
been conducted. Thereafter, all offices except origin may place such 
matters in closed status, if the fugitive has not been located by that 
time. 



"(3) While primary responsibility for direction of each 
case is with the office of origin, a:ll offices are expected to 
participate fully in the initiation of logical investigation, which 
should include full exploitation of various news media outlets 
throughout their territory, 

(4) During this investigation each office must initiate 
investigation suggested by characteristics, background, and habits of 
the fugitive, as well as on the geography, climate, employment, and 
recreation facilities unique to a particular office area. Fully 
exploit investigative techniques which are readily available, 
including informants, auto vehicle bureaus, other Government records, 
and general sources and avenues of employment, including spot-labor 
pools. 

I (5) On an annual basis, each subject in the Ten Most 
Wanted Fugitives Program will be examined to determine if the 
individual fits the criteria for the Ten Most Wanted Fugitives 
Program. The review will be conducted one year from the date placed 
on the Ten Most Wanted Fugitives List. When conducting the review, 
office of origin and local police agencies having an interest in the 
individual will be contacted for input concerning retention of the 
individual on the Ten Most Wanted Fugitives List.) 




EFFECTIVE: 02/19/85 



Sensitive 
PRINTED: 02/18/98 




Sensitive 



Manual of Investigative Operations and Guidelines 
Part II 



PAGE 21 - 40 



21-27 DISTRIBUTION OF WANTED NOTICES (IDENTIFICATION ORDERS, 
WANTED FLYERS, AND CHECK CIRCULARS) 

(1) When a wanted flyer is issued, 50 unfranked and 



unfolded copies will be sentlto 
Legal Attache will receive | five 



each office by| first-class mail. | Each 
copies. Upon receipt of these wanted 
flyers, each field office should immediately distribute them to major 
law enforcement agencies, news media representatives, including 
television, and to appropriate Agent personnel. File copies, of 
course, should be retained. 

(2) ln„most:situations jMhere_.a.wanted__no_tice_jiould_be 

appropriate, an 10, check circular or circular letter should be 
considered. 



EFFECTIVE: 02/19/85 



o 



21-27.1 



Field Mailing Lists 



(1) Field mailing lists previously used to distribute lOs 
and other wanted notices were centralized and automated at FBIHQ in 
1981. Wanted notices are now distributed outside the Bureau by FBIHQ 
as they are issued. lOs are issued and distributed in pairs depicting 
different subjects to conserve postage costs. 

(2) Although field mailing lists are centralized, 
automated, and maintained at FBIHQ, individual recipients are 
identifiable by the field office covering the recipient's address to 
facilitate corrections, additions, deletions, and possible special 
mailing uses within a particular division's territory. 

(3) Field mailing lists are organized and arranged into 
seven distinct groups of recipients as follows: 

01 - U.S. Post Offices, Branches, and Stations operated by 
classified U.S. Postal Service personnel. 

02 - Federal law enforcement and investigative agencies 
operated by the Federal Government. 

03 - State law enforcement agencies operated by state 
governments such as the state police, highway patrol, and 
identification bureaus. 



Sensitive 
PRINTED: 02/18/98 





Sensitive 



Manual of Investigative Operations and Guidelines 

Part II PAGE 21 - 41 

04 - City, county, and local law enforcement agencies such 
as police departments, sheriffs' departments, and tovm marshals. 

05 - Certain foreign law enforcement agencies at all 
levels which are operated by governments outside the United States and 
its territories. 

06 - All other recipients not included in one of the above 
categories and designated by an SAC to receive wanted notices. 

07 - U.S. Postal Inspectors and Examiners. 



(4) In order to ensure delivery of wanted notices to 
recipients, they are now addressed whenever possible to an official 
using only his/her title, such as Chief of Police, Sheriff, or 
Identification Officer, rather than his/her name. Experience has 
shown that wanted notices addressed to individuals by name are 
occasionally returned to the Bureau "undeliverable" because the person 
has retired, resigned, or is otherwise no longer associated with the 
agency. 

(5) When wanted notices are returned to the Bureau as 
"undeliverable," an attempt will be made to correct the recipient's 
address listed in the field mailing list from reference material at 
FBIHQ and/or contact with the appropriate field office. In the event 
a valid address for the recipient cannot be readily ascertained the 
record will be removed from the field mailing list. 

(6) Field offices should attempt to ensure that all U.S. 
Postal facilities and law enforcement agencies described in the above 
categories are included in their respective mailing list. Such 
verification checks may be accomplished while contacting the 
particular agency during the regular course of business. Additions, 
corrections, and deletions may be made by routing slip addressed to 

I the Bureau, Attention: | Fugitive/Government Reservation Crimes |Unit, 
Criminal Investigative Division. The title only of the official who 
is to receive wanted notices together with the agency's full address, 
including ZIP Code, and number of wanted notices required, should be 
clearly set forth. 

(7) Other recipients, as in category 06 described above, 
may be added to a field office's mailing list on SAC authority. 
Ensure such recipients both want and can use Bureau wanted notices. 
Additions, corrections, and deletions to this category of recipients 

^. may also be made by routing slip addressed to the Bureau, Attention: 
I I Fugitive/Government Reservation Crimes|Unit, Criminal Investigative 



Sensitive 
PRINTED: 02/18/98 



....L.^... 




Sensitive 



Manual of Investigative Operations and Guidelines 
Part II 



PAGE 21 - 42 



Division. The title only of the person (Security Officer, Manager, 
etc.) who is to receive the wanted notices together with the 
organization's full address, including ZIP Code, and the number of 
wanted notices required, should be clearly set forth. 



EFFECTIVE: 07/23/90 



21-28 FUGITIVE I SUBPROGRAM!- POLICY ON FUGITIVE APPREHENSION IN 
FBI AND DRUG ENFORCEMENT ADMINISTRATION (DEA) CASES AND 
U.S._ MARSHALS SERVICE (USMS) ..INVOLVEMENT. 



EFFECTIVE: 07/23/90 



( 






I 21-28.1 Background I (See MIOG, Fart I, 115-1.) | 

I j(l)|On 8/11/88, the Attorney General authorized the 

following policy, which went into effect on 9/22/88. This policy 
applies to fugitives in FBI and DEA cases and foreign fugitives and 
supersedes all prior interagency Memoranda of Understanding on 
fugitive apprehension responsibility in FBI and DEA cases, including 
the 1979 agreement between the FBI and the USMS and the 1982 agreement 
between the FBI and DEA. |This policy was further clarified by the 
Attorney General's Office on 12/11/91 wherein a definitive ruling was 
made that the FBI will maintain primary investigative jurisdiction 
regarding conspiracies to violate the Escape and Rescue Statutes 
(ERS) . 



(2) Since these investigations can be complex, involving 




lese matters should be 
Investigated under Bureau classification 90, Irregularities in Federal 
Penal Institutions (IFPI) . The purpose of this policy is to prevent 
escape and to ensure appropriate investigation in order to support 
prosecution of those involved in conspiracies to escape Federal 
custody or confinement.! 



Sensitive 
PRINTED: 02/18/98 




Sensitive 




•^ 



Manual of Inyestigajtive Operations and Guidelines 
Part II 



PAGE 21 - A3 



EFFECTIVE: 09/07/93 



21-28.2 



Arrest Warrants 



o 



(1) The FBI and DEA shall have apprehension 
responsibility on all arrest warrants resulting from their ovm 
investigations. 

(2) Notwithstanding paragraph (1), the DEA may delegate 
apprehensio n and admi nistrative resp onsibilit y (including Anit.iaj_NCIC_ 



entry)" to the USMS whenever the subject of a DEA arrest warrant is not 
apprehended within seven days after issuance of the arrest warrant, or 
it may elect to retain this responsibility in individual cases for 
investigative purposes. The delegation becomes effective upon 
notification of USMS by DEA. 

(3) In cases of joint FBI-DEA investigations and multiple 
agency task force investigations, it shall be the decision of the lead 
agency whether to have the investigating agencies maintain 
apprehension responsibility themselves or delegate apprehension 
responsibility to the USMS. 



EFFECTIVE: 07/23/90 



21-28.3 Post-Arraignment 

(1) The FBI, in an FBI case, shall have apprehension 
responsibility whenever there is a bond default violation prior to 
adjudication of guilt. 

(2) The USMS, in a DEA case, shall have apprehension 
responsibility whenever there is a bond default violation prior to 
adjudication of guilt. 



EFFECTIVE: 07/23/90 



Sensitive 
PRINTED: 02/18/98 



■MM 




Sensitive 



Manual of Investigative Operations and Guidelines 
Part II 



PAGE 21 - A4 



21-28.4 



Post-Conviction/Other Than Escapes 



(1) The USMS shall have apprehension responsibility 
whenever after adjudication of guilt there is a Federal probation, 
parole, or bond default or mandatory release violation, except as set 
forth below. 

(2) The USMS will promptly notify the original 
investigating agency whenever there is such a violation. 



EFFECTI VE; 07/23/90 



o 



21-28.5 



Escapes 



(1) The USMS shall have apprehension responsibility 
whenever there is a violation of the Federal JERS., However, any 
allegationCs) of conspiracy to escape will be investigated by the FBI 
under Bureau classification 90 (IFPl) . (See 21-28.6(4) .) j 

(2) The USMS will promptly notify the original 
investigating agency whenever there is an escape. 



EFFECTIVE: 09/07/93 




o:% 



21-28.6 Exceptions! (See MIOG, Part II, 21-28.8(6) .) | 

(1) Upon written notice to the USMS as provided in 
paragraph (3) below, the FBI will have exclusive apprehension 
responsibility in its own cases at any stage when a fugitive, or the 
organization of which he/she is a current member ,< is the subject of an 
existing FBI Foreign Counterintelligence, FBI Organized Crime, or FBI 
Terrorism investigation. (The term. Organized Crime, covers those 
organizations being investigated by the FBI as a "racketeering 
enterprise" pursuant to the Attorney General's Guidelines on 
Racketeering Enterprise Investigations and the criteria set forth in 
Part I, Section 92 of this manual.) 

(2) Upon written notice to the USMS as provided in 
paragraph (3) below, the FBI or DEA may assume apprehension 
responsibility in any case where the FBI or DEA is seeking the 



Sensitive 
PRINTED: 02/18/98 




:[^% 




Sensitive 



Manual of Investigative Operations and Guidelines 

Part II PAGE 21 - 45 

fugitive on an arrest warrant based on charges filed by it for an 
additional offense beyond the one for which the subject is a fugitive. 

(3) In those situations where the FBI or DEA elect to 
assume apprehension responsibility, agency Headquarters shall 
immediately notify USMS Headquarters. The assumption of apprehension 
responsibility becomes effective seven calendar days after receipt of 
notice by USMS Headquarters. During that seven-day period, the 
investigating agency and USMS shall fully coordinate their fugitive 
apprehension efforts. The USMS for good cause may request the 
investigating agency to consent to the continuation of USMS 
apprehension efforts, for. a. limited or..indef inite period of time. 



Should that consent be declined, the USMS may request the Associate 
Attorney General to approve a limited or indefinite continuation. 
Such a request will be made within the seven-day period. In making 
this decision, the Associate Attorney General will consider the 
relative interests of each agency and the need for swift apprehension 
of the fugitive. The Associate Attorney General shall make this 
decision within A8 hours of receiving a request. The fugitive 
investigation will continue to be coordinated by the agencies during 
the time the Associate Attorney General is considering the matter. 
||(SeeMIOG, Part II, 21-28.9(1) .) | 

(A) In the event of an escape, it is particularly 
important that fugitive apprehension efforts be closely coordinated 
during the seven-day period following] notice given as outlined 
in|paragraph (3). The investigating agency shall assume sole 
apprehension responsibility at the conclusion of the prescribed 
period. However, the USMS and the agency shall be responsible for 
maintaining an orderly transition, which would include capitalizing on 
leads developed by the USMS during its initial investigation of 
escape. JAny allegation(s) of conspiracy to escape should be 
investigated by the FBI as stated in the Escapes Section 
(21-28.5(1)). I 

(5) The investigating agency shall return apprehension 
responsibility to the USMS if the reason for the exception is no 
longer applicable. (For example, if the FBI is seeking an escapee, 
because it has an arrest warrant for him/her, and the arrest warrant 
is later withdrawn because the case is dismissed, apprehension 
responsibility for the escape would be returned to the USMS.) 



Sensitive 
PRINTED: 02/18/98 




Sensitive 




m 



Manual of Investigative Operations and Guidelines 
Part II 



PAGE 21 - A6 



EFFECTIVE: 09/07/93 



21-28.7 



Unlawful Flight Statute 







(1) The FBI shall have such jurisdiction in locating 
fugitives pursuant to the Unlawful Flight Statutes (Title 18, 
Sections 1073 and 107A) , but, in exercising it, the FBI will not seek 
an Unlawful Flight warrant when the USHS is already seeking the 
fugitive as an escapee, probation/parole, mandatory release, or bond 
defa ul t v iolat or. No r will the F BI s e ek a n Unlawfu l F lig ht warrant 



against any fugitive already sought by the USHS pursuant to the 
Federal Escape and Rescue Statutes. The above provisions shall not 
preclude the USHS from providing available information to state and 
local law enforcement agencies about fugitives being sought by their 
jurisdictions. The initiation of formal fugitive investigations 
involving state and local fugitives will be done through the Unlawful 
Flight process set forth above, except for special apprehension 
program (such as Fugitive Investigative Strike Teams and Warrant 
Apprehension Narcotics Teams) and other special situations approved 
by the Associate Attorney General.' 

(2) The FBI will notify the USHS of any state or local 
requests for Unlawful Flight assistance in situations described 
above. The FBI will also notify local or state authorities that the 
USMS is already seeking that person. In these situations, the USHS 
will notify the appropriate local or state authorities when a 
fugitive has been apprehended, so that a local detainer can be 
placed. 

(3) If state or local authorities request the assistance 
of the USMS in locating or apprehending a fugitive and it is 
determined that the fugitive is the subject of an FBI or DEA warrant, 
the USMS shall refer the requesting agency to the FBI or DEA for 
assistance and notify the FBI or DEA of the request by state or local 
authority. | 



EFFECTIVE: 09/20/89 



Sensitive 
PRINTED: 02/18/98 





Sensitive 



Manual of Investigative Operations and Guidelines 

Part II PAGE 21 - A7 

[21-28.8 Foreign Fugitives 

(1) The USMS shall have location and apprehension 
responsibility £or a fugitive sought in the United States by a 
foreign government, except as provided below. 

(2) The FBI shall have location and apprehension 
responsibility for such a foreign fugitive: (a) whenever the 
fugitive, or the organization of which he/she is a current member, is 
the .subject of an existing FBI Foreign Counterintelligence, FBI 
Organized Crime, or FBI Terrorism investigation; (b) whenever the FBI 

_is ,.seeking„the_.fugitiye_on_an _arrest._warrant for a_Fed_eral offense ;_;_ 

(c) whenever the fugitive is the subject of an FBI investigation which 
it is currently conducting at the request of the foreign government 
concerned; or (d) whenever a referral has been made exclusively to 
the FBI through one of its legal attaches. 

(3) The DEA shall have location and apprehension 
responsibility for such a foreign fugitive: (a) whenever the 
fugitive is the subject of a DEA investigation which it is currently 
conducting at the request of the foreign government concerned; or (b) 
whenever a referral has been made exclusively to the DEA through one 
of its country attaches. 

(4) INTERPOL-U.S. NATIONAL CENTRAL BUREAU (USNCB) shall, 
upon receiving from a foreign government a request for the location 
or apprehension of such a fugitive, refer such a request to the USMS, 
FBI or DEA in accordance with the provisions of paragraphs (1) 
through (3) above. However, nothing herein precludes referral of 
such requests instead, where appropriate, to the U.S. Immigration and 
Naturalization Service for action under the immigration laws or to 
state and local law enforcement authorities in accordance with 
INTERPOL'S internal procedures and practices. (This policy is 
applicable to Department of Justice agencies only. If a Department 
of the Treasury agency received an exclusive referral, it would, of 
course, handle the matter pursuant to Department of the Treasury or 
agency policy.) 

(5) Upon receiving a request from a foreign government 
for the location or apprehension of a fugitive, the FBI, DEA, USMS or 
the Office of International Affairs (OIA) , Criminal Division, shall 
notify INTERPOL-USNCB of this fact to determine the existence of any 
parallel request or investigation with respect to the fugitive. 

(6) Once a matter has been referred to the FBI, DEA, or 
USMS by INTERPOL-USNCB, the notice, coordination, and review 



Sensitive 
PRINTED: 02/18/98 




Sensitive 



Manual of Investigative Operations and Guidelines 
Part II 



PAGE: 21 



procedures set forth in 21-28.6, above, shall govern if either of the 
other two agencies concludes it should have fugitive apprehension 
responsibility under the provisions of this policy. j 



48 



EFFECTIVE: 09/20/89 



21-28.9 



Interagency Coordination 



G 



(1) In cases where the USMS is requested to provide 

ap prehe nsi on assist ance or t o s_e ek_the appj:^ehens^ on of a l^git iy? 

sought by a Federal agency other than the FBI or DEA, and it is 
determined by the USMS through an NCIC or other appropriate inquiry 
that the FBI or DEA has an existing warrant, the USMS will notify the 
requesting agency of the existing FBI or DEA warrant. If the 
requesting Federal agency continues to seek USMS assistance, the USMS 
will notify the FBI or DEA of the request for assistance by the other 
agency. The FBI or DEA will either defer the USMS the fugitive 
apprehension responsibility in the particular case or assert the need 
to continue its apprehension responsibilities in regard to the 
fugitive. The USMS shall defer in those instances to the FBI or DEA, 
unless the requesting agency declines to accept the deferral. In 
such instances, the requesting agency, the USMS, and the FBI or DEA 
shall confer at 'the headquarters level to resolve the issue. If a 
resolution is not reached between the involved agencies on the issue, 
it will be referred to the Associate Attorney General under the same 
provisions as set forth in Section 21-28.6(3) above. 

(2) The Director of the FBI, the Administrator of DEA, 
and the Director of the USMS shall each designate a representative to 
a working group charged with developing procedures to implement this 
policy. The Chief of Interpol (USNCB) may also designate a 
representative to attend any meetings concerned with implementation 
of policy set out in Section 21-28.8. 

(3) Nothing in this policy prevents an individual 
investigating agency from delegating its designated apprehension 
responsibility in a particular case or category of cases to the USMS, 
or prevents the USMS in turn from delegating its designated 
apprehension responsibility to the investigating agency. | 




% 



EFFECTIVE: 09/20/89 



Sensitive 
PRINTED: 02/18/98 




Q 




Sensitive 



Manual of Investigative Operations and Guidelines 

Part II PAGE 21 - 49 



21-29 ARREST, LOCATES, AND CRIMINAL SUMMONS STATISTICS | (See 
MIOG, Part I, 25-10, 76-1.8, 76-2,9, 76-3.13, 88-12, & 
115-7.) I 

(1) Statistics or fugitive apprehensions will no longer 
be scored as such. 

(2) In lieu of fugitive apprehensions, all arrests, 
locates, and criminal summons will be utilized for statistical 
purposes. 



(3) Arrests should be claimed only when Special Agents 
participate in the actual apprehension. Locates should be claimed in 
those instances where our investigative efforts or cooperative 
facilities result in the location of a suspect but Special Agents did 
not effect the arrest. Criminal summons should be claimed when a 
subject appears in response to a criminal summons. 

(4) Arrests, locates, and criminal summons statistics 
will only be recorded and credited through the| entryjof | Form| FD-515, 
Accomplishment Report, | into| the | Integrated Statistical Reporting and 
Analysis Application (ISRAA) by the office entitled to the statistic. | 

(5) In claiming all arrests and locates, the FD-515 must 
also reflect the subject's fugitive "A," "B," "C," or "D" priority. 
This priority is to be applied even where, technically, the subject 
may not be a fugitive such as a bank robber arrested in the act of the 
robbery. In claiming a criminal summons, there will be no "A," "B," 
"C," or "D" priority breakdown. 

(6) The FD-515 should be promptly submitted within 30 
days after the arrest, locate, or criminal summons. 

(7) Submission of the FD-515, concerning arrests, 
locates, and criminal summons, should not be delayed to report other 
types of statistical accomplishments covered by said form; however, 
more than one type of statistic can be claimed on. the same FD-515 if 
appropriate. 

(8) In the event the office submitting the FD-515 (and 
thereby claiming the statistic since this form does not provide for 
crediting statistics to an office other than the submitting office) is 
an auxiliary office, a copy of the form should be provided the office 
of origin for filing in its substantive case file. 



Sensitive 
PRINTED: 02/18/98 






.-. J.1 .^-.^^...^^-^--..^ 





Sensitive 



Manual of Investigative Operations and Guidelines 

Part II PAGE 21 - 50 

(9) It will be the responsibility of the office of origin 
to ensure there is no duplication of reporting statistics. 

(10) In all fugitive matters, including deserter cases, a 
ROUTINE teletype must still be appropriately submitted! to FBIHQ and 
the office of origin] to report the fugitive's arrest or location in 
addition to the FD-515. | (See MIOG, Part I, A2-12.) I 



EFFECTIVE: 11/01/93 



21-30 DISPOSITION OF ARRESTS 



The disposition of all arrests involving all fugitives 
should be promptly obtained during the course of the investigation. 
If appropriate, information obtained from these dispositions should be 
utilized for lead information. 



EFFECTIVE: 12/10/91 



1 21-31 DELETED I 

EFFECTIVE: 12/10/91 

1 2 1-3 1.1 deleted! 

EFFECTIVE: 12/10/91 

121-31.2 deleted! 



EFFECTIVE: 12/10/91 



Sensitive 
PRINTED: 02/18/98 




G 



Sensitive 



Manual of Investigative Operations and Guidelines 

Pa'^t II PAGE 22 - 1 

SECTION 22. FBI BOMB DATA CENTER 



122-1 FBI BOMB DATA CENTER 

For information on the Bomb Data Center Program, please refer 
to Part II, Section 13-16.9 of this manual. 



.EFFECTIVE: 09/2_2/87 
22-2 DELETED 
EFFECTIVE: 09/22/87 
22-3 deleted! 



EFFECTIVE: 09/22/87 




I 



Sensitive 
PRINTED: 02/18/98 



aa 




Q 




Sensitive 

Manual of Investigative Operations and Guidelines 

^"'^ II • PAGE 23 - 1 

SECTION 23. MISCELLANEOUS 



23-1 CRYPTONYMS (CODE NAMES) 

EFFECTIVE: 01/31/78 

23- 1.1 Use In Major Cas e Title 



The Criminal Investigative Division (CID) and the 
Intelligence Division (INTD) both currently use cryptonyms in major 
case titles for convenience or security reasons. 

Cryptonyms are generated by either FBIHQ or by field 
offices handling the investigation. In either event, the cryptonym 
(or code name) should be submitted on a UACB basis for searching 
through FBIHQ indices to determine if that particular word has been 
previously utilized or indexed. 

EFFECTIVE: 01/31/78 

23-2 THE FAIR CREDIT REPORTING ACT (FBI USE OF CREDIT 
INFORMATION) TITLE 15, USC, SECTION 1681 

The Fair Credit Reporting Act (FCRA) which became 
effective A/25/71, requires consumer reporting agencies (i.e., credit 
bureaus) to follow certain procedures designed to protect the 
confidentiality, accuracy, relevancy, and proper use of credit 
information. The following provisions of the Act are of interest to 
the FBI: 



EFFECTIVE: 01/31/78 



Sensitive 
PRINTED: 02/18/98 



■ l . .i..ii l. i rl » .f»Tl.imiiH..^i-.«i-. .■Tr-,-?T?T^gg^g^^q^ 





Sensitive 



Manual of Investigative Operations and Guidelines 

^^^^ ^^ PAGE 23 - 

23-2.1 Section 1681a. Definitions 

(1) Consumer Report - information communicated by a 
consumer reporting agency which relates to a consumer's credit 
worthiness, credit standing, credit capacity, character, general 
reputation, personal characteristics, or mode of living. 

(2) Investigative Consumer Report - a consumer report . 
that is based on personal interviews with neighbors, friends, 
associates, or acquaintances of the consumer. 



EFFECTIVE: 01/31/78 " ~~ 

23-2.2 Section 1681b. Permissible Purposes of Consumer Reports 

Consumer reports may be furnished under the following 
specified purposes which have relevance to our investigations: 

(1) By appropriate court order. 

(2) According to the written instructions of the consumer 
(e.g., waivers in Bureau applicant investigations); 

(3) Where the recipient intends to use the information in 
connection with an employment application; 

(4) Where the recipient has a legitimate business need 
for the information in connection with a business transaction 
involving the consumer (e.g.. Ascertaining Financial Ability cases). 

EFFECTIVE: 01/31/78 



23-2.3 Section 1681f. Disclosures to Government Agencies 

Notwithstanding the provisions of Section 1681b, consumer 
reporting agencies may furnish a governmental agency identifying 
information regarding a consumer limited to: 

(1) His name; 

(2) Address; 



Sensitive 
PRINTED: 02/18/98 



LJ..,'.lUl.g!! 





■;:« 



Sensitive 

Manual of Investigative Operations and Guidelines 

^^^^ ^^ PAGE 23 - 

(3) Former address; 

(A) Places of employment; 

(5) Former places of employment. 

EFFECTIVE: 01/31/78 

23-2.4 Section 1681g. Disclosure to Consumers 



(1) A consumer, upon his request to a consumer reporting 
agency may obtain: 

(a) The information contained in his credit file; 
and, 

(b) The identities of those receiving consumer 
reports concerning him for the 2-year period preceding his request 
where the reports were for emplojnnent purposes or the 6-month period 
preceding his request if the reports were furnished for any other 
purpose. 

(2) If, for any reason, an investigative consumer report 
is requested, the consumer reporting agency, under the provisions of 
Section 1681d, must notify the consumer. This notification must be 
made not later than 3 days following the request. After receiving 
notification, the consumer may request the person, etc., who requested 
the investigative consumer report "to provide him with complete 
disclosure of the nature and scope of the investigation requested not 
later than 5 days following receipt of the consumer's request. 

EFFECTIVE: 01/31/78 



Sensitive 
PRINTED: 02/18/98 



..V . ^..,^ . - 




Sensitive 



Manual of Investigative Operations and Guidelines 
Part II 



PAGE 23 
23-2.5 Section 1681e. Compliance Procedures 

(1) Consumer reporting agencies are obligated to develop 
procedures which are designed to insure that a person, etc., receiving 
consumer reports uses that information for one of the permissible 
purposes set forth under Section 1681b and for no other purpose. 

(2) To insure that the FBI, through inadvertence, does 
not improperly use credit data, all consumer reports received from a 
consumer reporting agency must be clearly identified when reported in 
any Bureau communication. 



(3) All personnel must insure that consumer reports are 
not used for any purpose not specifically permitted under Section 
1681b of the Act. Improper use of consumer reports could result in 
evidence being suppressed in a criminal proceeding against the 
consumer; civil litigation seeking to enjoin the FBI's continued use 
or possession of such information; and/or discovery of FBI files. ■ 

(A) Employees who make use of the following form 
communications should insure that any information, derived from a 
consumer reporting agency, is clearly identified in completing the 
form and that it was obtained and disseminated in a manner permissible 
under FCRA: 

(a) FD-125 (Record Request); 

(b) FrHl59 (Record of Information Furnished Other 
Agencies) . 

EFFECTIVE: 01/31/78 

23-2.6 Summary 

(1) In view of the limitations imposed by this law, 
information requested of consumer reporting agencies will be 
restricted to: 

(a) Identifying information (name, address, former 
addresses, place of employment, and former places of employment) which 
may be obtained in any case and 

(b) Consumer reports, which may be obtained for 
employment purposes of the applicant alone in applicant-type 



Sensitive 
PRINTED: 02/18/98 



^BBoxmBBBSSSS^XSSSSSSSB^SSSSB^BSBBi 




V>^ ^V -^ 







>ii^ 



Sensitive 



Manual of Investigative Operations and Guidelines 

^"•^ ^^ PAGE 23 

investigations and where the Bureau has a legitimate business need for 
the information such as Ascertaining Financial Ability cases. 

(2) When reporting information obtained from a consumer 
report, the source of the data should be clearly identified as a 
consumer reporting agency. Subsequent use of such information 
contained in Bureau files is prohibited except for the purposes 
authorized by FCRA. 

(3) Consumer reporting agency contract matters including 
whether a waiver need be signed by applicants in employment cases will 

J^gJlgg<^J-gd_on_a case^yj^case basis as such problems ar i s e . 



(4) In light of Che preceding disclosure requirements, 
requests for consumer reports and investigative consumer reports 
should be made only in exceptional cases, and should never be made if 
there is any likelihood that the consumer's knowledge that the FBI has 
requested such information would be detrimental to an investigation. 

EFFECTIVE: 01/31/78 i 

23-2.7 Penalties 
EFFECTIVE: 01/31/78 



23 2.8 Section 1681n, o, q, and r. Civil and Criminal Liability 
for Willful or Negligent Noncompliance 

(1) Negligent failure to comply with any requirement 
imposed by the FCRA renders the negligent consumer reporting agency or 
user of credit information liable to the consumer for actual damages 
suffered by the consumer as well as court costs and reasonable 
attorney's fees resulting from a successful action to enforce 
liability under the Act. 

(2) Willful noncompliance of the FCRA may result in the 
awarding of punitive damages in addition to actual damages, court 
costs and attorney's fees. 

(3) Any person who knowingly and willfully obtains credit 
information from a consumer reporting agency under false pretenses may 
be fined no more than $5,000 or imprisoned for not more than one year 



Sensitive 
PRINTED: 02/18/98 





Sensitive 

Manual of Investigative Operations and Guidelines 

^"^ ■"■^ PAGE 23 

or both. 

(Refer to Part 1, Section 62-5 of this manual for details relating to 
the Bureau's jurisdictional responsibilities under the criminal 
provisions of the Fair Credit Reporting Act.) 

EFFECTIVE: 09/26/90 

23-3 INVESTIGATIVE 



EFFECTIVE: 09/26/90 

23-3.1 Information Desired from Outside the Field Office 
Territory 

(1) Investigative information from another field office 
IS to be obtained by that office unless extraordinary haste requires 
direct communication. When the exigencies of a case, emergencies, or 
economy and common sense dictate, an employee, if authorized by 
his/her SAC, may enter the territory of another field office. The 
concurrence of the SAC of the entered office is to be obtained prior 
to the travel. 

(2) Information which should be obtained by direct 
communication even though the addressee is in another field office: 

(a) For disposition of arrests, use FD-10 to obtain 
incomplete information (for New York City, send two copies of FD-10 to 
the New York Division of Criminal Justice Services, Executive Park 
Tower, Stuyvesant Plaza. Albany, New York 12203-3764, rather than the 
New York City Police Department). Make notation on identification 
record or other pertinent serial in file that FD-10 has been sent. 
When FD-10 is returned, note pertinent information from form in file* 

I forward FD-10 to|Criminal Justice Information Services (CJIS) [Division 
in lieu of a disposition form (R-84) , provided it shows the final 
disposition or shows that the disposition data is unavailable. 

(b) Automobile registrations data 

(c) Driver's license information 
3 (d) Similar data 



Sensitive 
PRINTED: 02/18/98 



-^- -.l'...I...J L...-..IIL..ILUI.4L1- 




c 




Sensitive 



Manual of Investigative Operations and Guidelines 

^^^^ ^^ PAGE 23 - 

(e) Filing of detainers with some agency 

(f) Status of detainers 

(g) Government bonds - Use FD-123, concerning 
purchase or redemptions; specify information desired; send FD-123 in 
duplicate. 



j;FFECTIVE,:..i2/p2/_?4_ 



23 3.2 Prohibition Against Photographing Money, Securities and 
Checks 

Title 18, use, Section 474. Prohibits the photographing 
of any national bank currency, Federal Reserve notes, U.S. or foreign 
government securities or obligations, except by direction of some 
proper officer of the. United States. However, Part 404, Chapter 4, 
Title 31, of the Code of Federal Regulations grants authority to all 
banks and banking institutions to make film records of paper money, 
U.S. Government securities and checks, and to project such records on 
a screen provided the film records are maintained as confidential. 
This part states that no prints, enlargements, and other reproductions 
of such film records may be made except with the permission of the 
Secretary of the Treasury, the Treasurer of the U.S., the Commissioner 
of Public Debt, the Director of the Secret Service, or such officers 
as may be designated by them. 

EFFECTIVE: 09/26/90 

23-3.3 Deleted 

EFFECTIVE: 10/18/88 

23-4 LEGAT OPERATIONS 



s 
Sensitive 
PRINTED: 02/18/98 




Sensitive 

Manual of Investigative Operations and Guidelines 

^"^ " . PAGE 23 - 8 

EFFECTIVE: 10/18/88 

23-4.1 Definition of a Legal Attache (Legat) 

A Legat is an FBI liaison representative stationed in an 
American Embassy abroad who is responsible for liaison with foreign 
polxce and intelligence agencies in matters of interest between these 
agencies and FBIHQ. 




EFFECTIVE: 10/18/88 



23-4.2 Jurisdiction of Legal Attaches 

FBI Agents have no jurisdiction in foreign countries and 
Legats and border office Agents, even though invited or requested by 
foreign authorities to participate in and/or observe arrests and 
searches of subjects or transportation of prisoners may not do so. 

EFFECTIVE: 10/18/88 

23-4.3 Official Business in a Foreign Country 

Where official business requires more than two days in a 
foreign country authority must be obtained from FBIHQ. The letter 
requesting authority is to be sent UACB and should contain an estimate 
of time to be spent. 



EFFECTIVE: 10/18/88 



Sensitive 
PRINTED: 02/18/98 



HillliH 




Sensitive 



Manual of Investigative Operations and Guidelines 
Part II 



PAGE 23 



23-4.4 



Interviews in Foreign Countries' 



Persons interviewed by FBI Agents while in police custody 
in a foreign country must be given the usual warning of rights under 
Anierican Federal law provided there is no objection from the foreign 
police officer. If he/she objects, feeling our warning is not 
consistent with the law of his/her country and might work unfavorably 
on prosecution of the subject there, the officer should be requested 
to give the warning as required by the law of his/her country. Record 
the wording of this warning and the time and circumstances of its 
issuance. 



EFFECTIVE: 10/18/88 



o 



23-4.5 



Foreign Leads 



*^^ foreign countries should be submitted to 
FBIHQ for coverage through Legat or liaison with U.S. Department of 
State, Central Intelligence Agency and other established channels. 
Leads should be set out in LHM furnishing six copies of same to FBIHQ. 



EFFECTIVE: 10/18/88 



23-4.6 Countries/Areas Covered by Legats 

[Territorial allocation details are no longer maintained 
in the manuals. An up-to-date listing is available in the FOIMS 
Tables Application, "Territorial Allocation, Foreign Territorial 
Allocation" options. | « 




EFFECTIVE: 11/16/93 



Sensitive 
PRINTED: 02/18/98 




Sensitive 



Manual of Investigative Operations and Guidelines 
Part II 



PAGE 23 - 10 



23-4,7 



Canadian Border Leads 



t,n„.„-. Normally. Canadian leads are handled through Legat Ottawa; 
however offices along the Canadian border, through liaison with 
cooperative Canadian law enforcement agencies, handle Canadian leads 

m=tf^;r"? ," f'"/^"" "^^"^ '' ^"^ ^^^ """" ^"d in criminal 
Zllllll °^,^°T ^"^«"«^ «^-"Pt in deserter and selective service 
matters. Leads on security matters where time is of the essence or 
where previously approved by FBIHQ are handled with RCMP by border 
offices on a divisional headquarters level. 



EFFECTIVE: 03/23/92 



23-4.8 



Mexican Border Leads 




EFFECTIVE: 03/23/92 




ALLIHFORffliMIOHCOHTAIHSO 
HERE!SinJCLASSlFlE3£XG£PT 
WHERE SHOWN OTHERWISE 



CONFIDENTIAI] 

Sensitive 
PRINTED: 02/18/98 



CLASSIFIED BY'Si 

REASON 




DECUSS/Fy'ON;!^ 




Sensitive 



Manual of Investigative Operations and Guidelines 

Part II 

PAGE 23 

23-4.9 Leads for the Northern and Central Caribbean Areas - Mii 
and San Juan Divisions 



- 11 



Lami 



Leads for the Northern and Central Caribbean areas are 
normally covered by the Liaison Officers at the Miami and San Juan 
?i\rT: ^^^i^ift"" Officer. Miami, has regional responsibilities 
in the Bahamas, I Belize, (Bermuda. Cayman Islands, | Costa Rica, El 
Salvador, Guatemala, Honduras, | Jamaica, JNicaragua. |and the Turks and 
Caicos Islands. The Liaison Officer, San Juan Division, is 
responsible for maintaining liaison and the coverage of leads in the 
countries of Anguilla. Dominican Republic. Haiti. Montserrat, andlst. 
-CJLrisLqp_^e^JC£rmejiy_St^ms^ _A^ any time that le^d, a!e 
forwarded to the Liaison Officers at Miami and SaVju^n" DTv"n"roni7-a- 
copy of the communication is to be designated for the Office of 
Liaison and International Affairs (OLIA) . Attention: Foreign Liaison 






EFFECTIVE: 03/23/92 
23-5 DELETED 



EFFECTIVE: 03/23/92 



23-6 



TITLE XI, RIGHT TO FINANCIAL PRIVACY ACT OF 1978 (RFPA) 



EFFECTIVE: 03/08/79 



23-6.1 



Statute 



,/,^/, , ^^® ^^^^ ^^^ passed as Public Law 95-630, 
3/10/79 (T 12, use. Section 3401, et seq) . 



effective 




EFFECTIVE: 03/08/79 



23-6.2 Access to Financial Records 



Sensitive 
PRINTED: 02/18/98 



Msmmmi 





Sensitive 



Manual of Investigative Operations and Guidelines 
Part II 



PAGE 23 - 12 



EFFECTIVE: 03/08/79 



23-6.2.1 Intent 

An individual customer has the right to be notified in 
advance when the Federal Government is seeking his or her financial 
records from a financial institution in connection with a law 
enforcement inquiry and has the right to challenge that intended 
access. Exceptions to both customer notice and challenge provisions 
are available_in_special situations. _ For exceptions see 23-6.7.2 
23-6.9, and 23-6.10. 



EFFECTIVE: 03/08/79 

23-6.2.2 Methods Available to FBI (For further information see 
23-6.6) 

(1) RFPA of 1978 

(a) Customer authorization or waiver 

(b) Search warrant 

(c) Judicial subpoena 

(d) Formal written request to financial institution 

(2) Federal Grand Jury Subpoena - access exempt from RFPA 
(but new use restrictions) 

EFFECTIVE: 03/08/79 



Sensitive 
PRINTED: 02/18/98 



mi^^m^mfmmmm 




Sensitive 



■I 



Manual of Investigative Operations and Guidelines 
, Part II 

23-6.2.3 Methods Not Available to FBI 



PAGE 23 - 13 



(1) Administrative I subpoenas I and summons under|RFPA, 
except as provided in Title 12, USC, Sections 3A02 and 3405. 
Sections 3402 and 3405 of Title 12. U.S. Code, permit government 
officials to obtain bank records if relevant to a legitimate law 
enforcement inquiry. | 

(2) Informal access - not authorized by RFPA 



EFFECTIVE: 06/03/97 



23-6.3 



Definitions 







EFFECTIVE: 03/08/79 



23-6.3.1 



Financial Institution 



This includes all banking and banking-type institutions as 
well as companies issuing credit cards, even though not a bank-type 
institution, and consumer finance companies located in the United 
States, District of Columbia, Puerto Rico, Guam, American Samoa, and 
the Virgin Islands. 



EFFECTIVE: 03/08/79 



23-6.3.2 



Financial Record 



::l 



Any original, copy of or information "knowingly derived 
from" a record pertaining to present or past customer's relationship 
with a financial institution. Excluded are records or information not 
identifiable with an individual customer or those which reside in the 
account of a third party such as check endorsements or items deposited 
by third party and obtained from that person or corporation. There 
should be no conscious circumvention of RFPA. 



Sensitive 
PRINTED: 02/18/98 




Sensitive 



Manual of Investigative Operations and Guidelines 
Part II 



PAGE 23 - 16 



EFFECTIVE: 03/08/79 



23-6.6.1 Customer Authorization 

„- , Customers may authorize access to identified records up to 
90 days by signing a revocable statement specifying the recipient 
purpose for disclosure and that the customer is aware of his or her 
rights under RFPA. Certification of Compliance is required when the 
records are obtained. This would apply in applicant-type 
Jnyestigatio ns or where f in ancial_j;ecords of a cooperative witness are 
being sought. ~ ~ ~ - — - — — 



EFFECTIVE; 03/08/79 



23-6.6.2 Search Warrants 

A search warrant may be used under RFPA with notice to the 
customer of the search occurring within 90 days after execution. 
There is no change in the procedures to obtain a search warrant. 
Additional delays of up to 90 days may be granted by a court when it 
IS shown that notice would seriously jeopardize a continuing 
investigation (see 23-6.7.2). The institution may be prohibited from 
notifying the customer by court order issued when the delay is 
authorized. 



EFFECTIVE: 03/08/79 




23-6.6.3 Formal Written Request 

The FBI is authorized by T 28, CFR, Section 47.1, to use 
the written request provided for in RFPA. This is a new method of 
access and requires the cooperation of the financial institution. 
Required notice advises the customer his or her records are being 
sought and the nature of the inquiry which may include a statement to 
the effect that the customer is not the subject of the investigation. 
The customer has 10 days if notice is served and 14 days if notice is 
mailed to complete and file an affidavit detailing why the records are 
not relevant to a legitimate law enforcement inquiry. The customer 
must then serve a copy of the affidavit oh the Government authority 
and be prepared to present in court additional facts. If the customer 



Sensitive 
PRINTED: 02/18/98 




Sensitive 



Manual of Investigative Operations and Guidelines 
Part II 



PAGE 23 - 15 



order. Other recourse such as Obstruction of Justice is available. 
Judicial subpoenas require the financial institution to commence 
compiling the records upon service. 



EFFECTIVE: 03/08/79 



23-6.5 



G 



Certification of Compliance 



Before records may be obtained under any provision of the 
.AFPA,_^_^up.ervisory_offici_al .o.l thCLZBI . musj: subrait_t_o_ the_f inane ial_ 
institution a certificate stating that all appTicable provisions of 
the Act have been complied with. Good faith reliance by the employees 
and agents of the financial institution upon the Government 
certification of compliance absolves the institution of civil 
liability for any improper disclosure of records. This certification 
is not required when customer records are sought pursuant to a Federal 
Grand Jury subpoena. For the purpose of RFPA, "supervisory official" 
is defined and limited to (other than FCI activities) any Headquarters 
or field division supervisor (including Supervisory Senior Resident 
Agent) or officially designated relief supervisor acting for the 
supervisor or any official of higher rank. 



EFFECTIVE: 03/08/79 



23-6.6 



Methods of Access 



For access in cases of emergency see 23-6.9. If account 
identification information is being sought the notice and challenge 
provisions and restrictions on interagency transfers do not apply when 
only identification information about a customer is needed, i.e., 
name, address, type of account and account number. This data must be 
obtained through a written request. In addition to account 
information only, more specific inquiries such as the account number 
associated with a particular transaction or class of transactions may 
be obtained. Once the existence and identification of a customer 
account-is established, .then one of the access methods listed below 
must be used to obtain any additional information. For dissemination 
of information see MAOP, Part II, 9-10, and MIOG, Part II, 23-6.11. 




Sensitive 
PRINTED: 02/18/98 



waaM 



gHSffBHB 




Sensitive 



Manual of Investigative Operations and Guidelines 
Part II 



PAGE 23 - 14 



EFFECTIVE: 03/08/79 



I 23-6.3.3 Government Authority 

y^^ applies to all Federal agencies including FBI or any 
^ I officer, employee or agent thereof. 







EFFECTIVE: 03/08/79 



23-6.3.4 Customers Covered 

Any natural person or partnership of five or fewer 
individuals are covered. Not covered by RFPA are corporations 
associations, larger partnerships or other legal entities. 



EFFECTIVE: 03/08/79 



23-6.3.5 Law Enforcement Inquiry 

Any lawful investigation or official proceeding inquiring 
into a violation of, or failure to comply with any criminal or civil 
statute or a regulation, rule or order issued thereunder is considered 
as a law enforcement inquiry. 



EFFECTIVE: 03/08/79 



im 



l:-:^^^ 



I 23-6.4 



Responsibility of Financial Instituti 



ons 



RFPA prohibits financial institutions from providing 
financial records to the Government, unless access is authorized by 
one of the exceptions such as grand jury subpoenas or unless access is 
accomplished by one of four methods under procedures mandated. 
Notwithstanding these restrictions, financial institutions are 
permitted to notify Government authorities of possible violations of 
law reflected in their records. Financial institutions do not have to 
comply with formal written request or a customer authorization. In 
addition, there are no criminal penalties under RFPA to prevent an 
institution from notifying its customer in the absence of a court 



Sensitive 
PRINTED: 02/18/98 



■ iim1i'Wt>to&fc. 




Sensitive 



Manual of Investigative Operations and Guidelines 
Part II 



PAGE 23 - 17 



does no 
records 
period 
the cus 
14-day 
18-day 
any sup 
Notice 



t comply with the above within prescribed time limits, the 
may be made available. As a practical matter, a reasonable 
(possibly four days) should be allowed prior to access where 
tomer files challenge by mail on the last day of the 10- or 
period. In effect, the 10- or 14-day period becomes a 14- to 
period to be cautious. A written request may be executed by 
ervisory official, previously defined (see 23-6.5), of the FBI, 
to the customer may be delayed for period of up to 90 days. 



EFFECTIVE: 03/08/79 



G 



23-6.6.4 Judicial Subpoena 

^u -u Ju'iicial subpoenas are any court order to produce records, 
other than a grand jury subpoena, the most common of which is the 
trial subpoena directed at a party not involved in litigation. When 
used, a copy of the subpoena, together with mandatory customer notice 
IS served or mailed to the customer. The notice provisions for the 
judicial subpoena are the same as for the written request, above 



EFFECTIVE: 03/08/79 




23-6,6.5 Grand Jury Subpoena] (See MIOG, Part II, 23-6. 10.5.) | 

Such subpoenas are not covered by RFPA|with| respect to 

access and notification. |However. the RFPA does place] restrictions on 

the handling and use of customer financial records obtained by a grand 

jury. [Access to such records, or information abstracted for reporting 

or lead purposes, must be limited to authorized persons, i.e., those 

assisting an attorney for the government in a specific criminal 

investigation; and, when records are not in use, they must be placed 

in a subfile which is locked in a container with a combination lock 

(see MIOG Part II, 2-9.5 and 2-9.7). Grand jury-subpoenaed financial 

records should be appropriately marked as both grand jury material 

(see MIOG, Part II, 2-9.7(2)). and as subject to the RFPA (see MAOP, 

Part II, 9-10). Information extracted from financial records subject 

to the RFPA must be treated as grand jury material "unless such record 

has been used in the prosecution of a crime for which the grand jury 

'.fw^fs*? indictment or presentment . . . " (see MIOG, Part II, 2-9.5.1 
(.4; (a)) . 



Sensitive 
PRINTED: 02/18/98 




Sensitive 



Manual of Investigative Operations and Guidelines 
Part II 



PAGE 23 - 18 



EFFECTIVE: 07/12/95 



23-6.7 Customer Notice 



EFFECTIVE: 03/08/79 



23-6.7.1 



Contents of Notice 



The purpose of the investigation must be stated but 
without reference to specific title and section of the U. S. Code. 
Generic terms may be used to describe the offense such as: fraud, 
bribery, extortion, etc., similar to the character of cases we now 
use. Notice must state the name and business address of the 
supervisory official to be served with copies of customer challenge 
papers. The supervisory official is he or she who initiated the 
access process. 



EFFECTIVE: 03/08/79 



23-6.7.2 Delay of Notice 

(1) Delays of customer notice may be obtained for access 
sought through judicial subpoenas, formal written request , search 
warrants and subsequent interagency transfer. Delays of up to 90 days 
(or 180 days in case of a search warrant) may be applied for to a 
court where there is a reason to believe (lesser standard than 
probable cause) that notice would cause danger to life or physical 
safety, flight from prosecution, destruction of evidence, intimidation 
of a witness, or other serious jeopardy to an investigation or a 
trial. 




(2) To obtain a delay of notice, a sworn written 
statement must be presented to a judge or magistrate that one or more 
of above situations exist. Extensions of the delay of notice may be 
similarly obtained based on necessity. 

, ^^^ ^" addition to delaying the timing of the Government 
notification to the customer, the court order issued will prohibit the 



Sensitive 
PRINTED: 02/18/98 



^^^^^^^^^^ 




Sensitive 

Manual of Investigative Operations and Guidelines 

^"*- ^^ PAGE 23 - 19 

financial institution from disclosing to the customer that records 
pertaining to that customer are being sought. There is no such 
provision in the RFPA with respect to access through grand jury 
subpoenas to prohibit the financial institution from notifying the 
customer. 



EFFECTIVE: 03/08/79 

23-6.8 Customer Challenges 



(1) A customer may challenge a judicial subpoena or a 
formal written request in instances where notice was not delayed. 
Grand jury subpoenas, being generally excepted by RFPA and having no 
notice provisions, are not challengeable at the time of access. 
Within 10 or 14 days (more practically, 14 or 18 days, see 23-6.6.3), 
depending on the method of notice (served or mailed), the customer may 
file in U.S. District Court a motion to quash a judicial subpoena or 
an application to enjoin the Government from pursuing a formal written 
request. In support of the motion or application, the customer must 
file a sworn statement that he or she: 

(a) is the person whose records are being sought 
and, 

(b) has reason to believe the records sought are not 
relevant to the inquiry, or 

(c) That the RFPA has not been substantially 
complied with, or 

(d) any other legal reason for denying access. 

(2) The challenge does not shift the burden of proof to 
the customer, but does require more than only an allegation. The 
Government must then convince the judge or magistrate the records 
sought are relevant to a legitimate law enforcement inquiry. 
Relevance covers anything that might be. Used as evidence or that might 
logically lead to evidence. The Government may have to file a 
response, in camera if appropriate, and the court may require 
additional proceedings but all within seven days from the filing of 
the Government's response. Denial of customer challenge motions or 
applications are not appealable until after the trial or other 
proceeding. 



Sensitive 
PRINTED: 02/18/98 



■— ^"^■^--'■-^■- 




\ 




Sensitive 

Manual of Investigative Operations and Guidelines 

^"^ ^^ PAGE 23 - 20 

(3) If the Government fails to justify its attempted 
access, the subpoena is quashed or the formal written request 
enjoined. If the Government does support its burden, the subpoena 
will be enforced and the formal written request may be pursued with 
the financial institution. The financial institution is not compelled 
to comply with the formal written request. 

(4) If, after access following an unsuccessful challenge 
no prosecution or other proceeding is to be brought against the 
customer (always the case when customer is witness and not subject) 
customer must be so notified by the requesting Government agency. ' 

.,Close..coo.rdinati^on3etween_the„fi.eld_ofJice and the U.S. Attorney's 
Office will be required. " 



. . ^^^ ^y applicable statute of limitations Is suspended 
during the time the customer's motion or application is pending in 
court. * 

(6) In the case of judicial subpoenas, venue for the 
customer challenge is restricted to the court issuing the subpoena. 
When a formal written request is used, the customer may challenge in 
any one of three districts: 

(a) the District of Columbia, 

(b) the site of the financial institution 

(c) the site of the residence of the customer. 

EFFECTIVE: 03/08/79 



23-6.9 Emergency Access 

(1) In instances where notice and challenge delays could 
create imminent danger of physical Injury, serious property damage or 
flight from prosecution, access may be had Immediately by merely 
presenting the financial institution with the certificate of 
compliance. However, post notice to customer Is required as soon as 
possible. 

^ .,, . ^^^ Within five days after access, a supervisory official 
must file in court a signed sworn statement setting forth the grounds 
for the emergency access. 



Sensitive 
PRINTED: 02/18/98 




..":'..'. 



Sensitive 




Manual of Investigative Operations and Guidelines 
Part II 



PAGE 23 - 21 



EFFECTIVE:. 03/08/79 



23-6.10 Exceptions to RFPA 



EFFECTIVE: 03/08/79 







23-6.10.1 Financial Institutions 



The RFPA does not require custoier~notice~when~the"' 
institution in possession of such records is the subject of the 
investigation. However, the certificate of compliance is necessary. 
Customer records obtained under this exception may only be used or 
transferred in furtherance of that specific investigation. If 
evidence of another violation is developed, enough information (hot 
records) may be given the appropriate agency, including FBI, to 
identify the record and violation. Thereafter, the receiving agency 
may proceed as if independent of the initial inquiry. 



EFFECTIVE: 03/08/79 



23-6.10.2 Corporations or Other Legal Entities 

Investigations directed at corporations or other legal 
entities not protected by RFPA may be conducted in same fashion as 
23-6.10.1 above. 



EFFECTIVE: 03/08/79 



23-6.10.3 Not Identifiable with Customer 

Records can be disclosed by a financial institution if 
they or the information contained therein are not identified with or 
identifiable as being derived from the records of a particular 
customer. 



Sensitive 
PRINTED: 02/18/98 



•.■■.■ ..-I 'IB 




c 




^1 



Sensitive 

Manual of investigative Operations and Guidelines 

'^'' " PAGE 23 ~ 22 

EFFECTIVE: 03/08/79 

23-6.10.4 Parties in Interest 

The RFPA does not apply when the Government and the 
customer are litigants in a judicial or an administrative adjudicatory 
proceeding. ' 



_EFXEC Tiy E :_ 03 / 08/79 



23-6.10.5 Federal Grand Jury 

The RFPA does not affect the obtaining of customer 
financial records (see 23-6.6.5). No compliance certificate is 
required. 



EFFECTIVE: 03/08/79 

23-6.10.6 Foreign Counterintelligence 

See "Foreign Counterintelligence Manual" for instructions. 

EFFECTIVE: 03/08/79 

23-6.10.7 Telephone Company Toll Records 

These records are not covered by the provisions of RFPA. 

EFFECTIVE: 03/08/79 



Sensitive 
PRINTED: 02/18/98 




Sensitive 



G 



PAGE 23 - 23 



Manual of Investigative Operations and Guidelines 
Part II 

23-6.10.8 Other 

Other exemptions specifically excluded are: 

• ..•...• ^^^ Certain designated supervisory agencies of financial 
institutions. 

(2) Internal Revenue Service. 

(3) General Accounting Office. 

- — - — -^^^---~?^^^l'LXep^rt^refluired^f_Hnanc_U 

(5) Identifying account information only (see 23-6.6). 

(6) The administration of guaranty or loan insurance 
programs. Notification of potential violation indicated in the 
customer financial record may be given the appropriate investigative 
agency on the same basis as 23-6.10.1. 

EFFECTIVE: 03/08/79 



23-6.11 



Dissemination of Information (Refer to MAOP. Part II 
9-10.) ' 



EFFECTIVE: 03/08/79 



23-6.11.1 To Department of Justice 

Transfers between and among the components of the 
Department are not restricted by RFPA except that customer record 
obtained m an investigation targeted at the financial institution 
where there is no notice or challenge opportunity may not be used for 
a separate inquiry. Enough information about the separate inquiry may 
be given to another component in order that access may be sought 
independently, . ° 



EFFECTIVE: 03/08/79 



Sensitive 
PRINTED: 02/18/98 




Sensitive 



Manual of Investigative Operations and Guideli 

Part II 

23-6.11.2 To Other Departments 



nes 



PAGE 23 - 24 



Financial records obtained on or after 3/10/79 under RFPA 
may be transferred to another agency only if the transferring agency 
certifies in writing to the file that there is reason to believe the 
records are relevant to a legitimate law enforcement inquiry of the 
receiving agency. This may require a statement from the receiving 
agency. Post notice to the customer within 14 days of the transfer is 
aH" 2r * '^^^^^ °^ "°*''" " obtained as discussed above 



EFFECTlVEr 03/08/79 



23-6.12 



Penalties 






EFFECTIVE: 08/28/91 



23-6.12.1 Civil 

^y Federal agency or financial institution is liable to 
the customer for violation of RFPA as follows: 



involved, 



(1) $100.00 without regard to the volume of records 

(2) actual damage, 

(3) punitive damages, and 

(4) court costs and reasonable attorney's fees. 



EFFECTIVE: 08/28/91 




23-6.12.2 Disciplinary Action 

If a court determines that a violation may have 
willful or intentional, Office of Personnel Management (formerly Civil 
Service Commission) must determine if the Government employee is 
primarily responsible and subject to disciplinary action. 



been 



Sensitive 
PRINTED: 02/18/98