03-149Council File #
Green Sheet #
Presented By:
Referred To:
Committee:Date:
03 -1�19
204586
10
1 WHEREAS, the City of St. Paul, Police Department, is authorized to enter into the attached
2 multi-agency law enforcement agreement, which includes an indemnification clause, with the Fergus
3 Falls Police Department. The Fergus Falls Police Department will participate in the St. Paul Police
4 Department's Intemet Crimes Against Children Task Force. A copy of said agreement is to be kept
5 on file in the Office of Financial Services.
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
Requested by Department of:
Police
Adopted by Council: Date: �',Q, _ l a � a p
� c
By:
RESOLUTION
CITY OF SAINT PAUL, MINNESOTA
Secretary:
Approved by M�y� Date: ��
By: l.� ,�."� � I 3 l D3
-�
Form •oved by City Attorney:
By:
by Mayor
By:
./
q6 , TM NTIOFFICEICOUNCIL DATEINITIATED �
rolice 1/29/03 GREEN S EET No. 204586C
8 N INfi7AUDA INft1AVpAiE
Chief William Finney 292-3588 � OEPMiMQR MREROR 4 cana�
MUS7 BE ON COUNCIL AGENDA BY (DA7E) 03 �,�,�
Please process ASAP 2�an.nonr�v�i . �nrvc�wc
❑rtuxcw.sEavresouc_ �n+axcw�s¢xvinccrc
� � pwYOR(ORASSISfIWf) �RWf1i5
I�
TOTAL # OF SIGNATURE PAGES 1 (CLIP ALL LOCATIONS FOR SIGNATURE)
CTION REQUESTED
Signatures requested on the attached councIl resolution authorizing the St Paul Police Department
to enter into a multi-agency law enforcement agreement with the Fergus Falls Police Depariment for
participation in the St Paul Police Department's Intemet Crimes A�ainst Children Task Force (ICAC).
RECOMMENDA710N Approve (A) or ReJect (R) PERSONAL SERVICE CONTRACTS MUST ANSWER THE FOLLOWING GUESTIONS:
7. Has this persoNfirtn ever vuorked under a contract for this departmen�?
PLANNING COMMISSION YES NO
CIB COMMI7TEE 2. Has this perso�rtn ever 6een a city employee?
CIVIL SERVICE COMMISSION Y€S No
3 Does this perspNfircn possess a sltill not normaly possessed by any current cRy employee�
YES NO
4. Is �his perso�rm a targeted vendorJ
YES NO
Eaylain all yes ansvrers on separate sheet and attach to green sheH
INITIATING PROBLEM ISSUE, OPPORTUNITY (WHO, WHAT, WHEN, WHERE, WHY�
The ICAC Task Force's mission is to form a mulU jurisdictional operaUOn that invesfigates crimes
involving child pornography and e7cploitation of childten online; educates law enforcement on ��� E � V E �
invesfigaflve techniques and legal issues involving search warrants and seizura of evidence;
develops to adhere to the same standards that the task force has agreed to with the Office of
Juvenile 7ustice for Delinquency Prevention (OJJDP). This memorandum of understanding is a FE B 0� 2003
statement tLat the agencies understand and agree to those standards and that any equipment giv�en
to the assisting agency for task force work is to be returned to the task force upon termination og�+TY ����� �1/
the task force or their affiliaUon of the task force.
ADVANTAGESIFAPPROVED
Apprwal of the multi-agency law enforcement agreements assures that the task force is operating
a�..N�,.d
per OJJDP guidelines that set uniform operaflonal standazds for parlicipa5ng agencies a �,.: `���a
P ���:,,.
DISADVANTAGESIFAPPROVED .A � k;y ..� '
None. � n5.`'� �;� :x �
F�
DISADVANTAGES IF NOT APPROVED
The work of the task force would be substantially lrindered as work with other agencies is an
integral part of the original grant application.
TOTAL AMOUNT OF TRANSACTION S see the attached agreeatent COSTIREVENUE BUDGETED (CIRCIE ONE) YES NO
FUNDING SOVRCE Federal grant ACTIVYTY NUMBER 436-34056 -
FINANCIAL INFORMATION (EXPWM
fergus falls PD - ICAC a
b S - �`�`�
Minnesota Internet Crimes Against Children Task Force
Multi-Agency Law Enforcement Agreement
This Multi-Agency Law Enforcement Agreement, and amendments and suppiements
thereto, (hereinafter "AgreemenY') is between the City of Saint Paul, acting through its Police
Department (Grantee) and the City of Fergus Falls, acting through its Police Deparhnent, 417
South Court Street, Fergus Falls, MN 56537 (hereinafter "Undersigned Law Enforcement
Agency") both which aze empowered to enter into joint powers agreements pursuant to Minn.
Stat. § 471.59, Subd. 10 & 12, and is filxther empowered to enter into this Agreement by Minn.
Stat. § 626.76; and
WheCeas, the above subscribed parties have joined together in a muiti-agency task force
intended to investigate and prosecute crimes committed against children and the criminal
exploitation of children that is committed and/or facilitated by or through the use of computers,
and to disrupt and dismantle organizations engaging in such activity; and
Whereas, the undersigned agencies agree to utilize applicable state and federal laws to
prosecute criminal, civil, and forfeiture actions against identified violators, as appropriate; and
Whereas, the Grantee is the recipient of a federal grant disbursed by the Office of Juvenile Just
and Delinquency Prevention ("OJJDP") in Washington, D.C. to assist law enforcement in
investigating and combating the exploitation of children which occurs through the use of
computers by providing funding for equipment, training, and expenses, including travel and
overtime funding, which are incurred by law enforcement as a result of such investigations; and
Whereas, the OJJDP Internet Crimes Against Children ("ICAC") a Boazd of Directors has
been established representing each of the existing ICAC Task Forces to oversee the operation of
the grant and sub-grant recipients.
Now Therefore, the parties agree as follows:
The Undersigned Law Enforcement Agency approves, authorizes, and enters
into this Memorandum of Understanding with the purpose of
implementing a three-pronged approach to combat Internet Crimes Against
Children: prevention, education and enforcement; and
The Undersigned Law Enforcement Agency shall adhere to the OJJI?P
ICAC Task Force Program Standards (Attached and marked as Appendix
A), in addition to state and federal laws, when conducting undercover
operations relative to ICAC; and
03 -1�1q
The Undersigned Law t�g�ricy shaYt adh�re tne �vlizulesota --
ICAC Task Force Policy Statement (attached to this Agreement as E�chibit
B); and
All officers contributed by the Undersigned Law Enforcement Agency to the
Minnesota ICAC Task Force shall be licensed peace officers ar found by the
Minnesota Board of Peace Officer Standards and to have
comparable qualifications; and
When a contributed officer of the Undersigned Law Enforcement Agency
acts on the behalf of the Minnesota ICAC task Farce within the scope of
this Agreement, the officer's actions axe within the officer's line of duty and
course of employment to the same extent as if the officer had acted on
behalf of the officer's employing Agency; and
The Undersigned Law Enforcement Agency shall indemnify, save and hold
harmless the Grantee, its representatives and employees from any and all
claims or causes of action, including all reasonable attorney's fees incurred
by the Grantee, arising from the performance of this Agreement by the
Undersigned Law Enforcement Agency's officerlsl; and
All members of the Undersigned Law Enforcement Agency shall continue
to be employed by the same Law Enforcement Agency employer which they
were employed before joining the Minnesota ICAC Task Force and all
services, duties, acts or omissions performed by the member will be within
the course and duty of that employment, and therefore, are covered by the
Workers Compensation programs of that employer; will be paid by that
employer and entitled to that employer fringe benefits; and
The Undersigned Law Enforcement Agency shall submit all requests for
undercover ICAC related operations in writing to the Commander of the
Minnesota ICAC Task Force for presentation to the OJJDP ICAC Task
Force Soard of Directors; and
3
o� -��.q
► The Undersigned Law Enforcement Agency must first submit a written
request for funds and receive approval for the funds from the Grantee to
receive any funds from the Grantee; and
► The Undersigned Law Enforcement Agency must supply original receipts to
be reimbursed on pre-approved requests; and
► The Undersigned Law Enforcement Agency shall maintain accurate records
pertaining to prevention, education, and enforcement activities, to be
collected and forwarded monthly to the Minnesota ICAC Task Force
Commander or his designee for statistical reporting purposes; and
► The Undersigned Law Enforcement Agency shall participate fully in any
audits required by the OJJDP; and
► The Undersigned Law Enforcement Agency shall make a reasonable good
� faith attempt to be represented at any scheduled regional meetings in order
to share information and resources amongst the multiple entities; and
► The Undersigned Law Enforcement Agency shall be solely responsible for
forwarding information relative to investigative targets to the Child
Pornography Pointer System (CPPS) pursuant to the OJJDP guidelines; and
► The Undersigned Law Enforcement Agency shall provide the Minnesota
ICAC Task Force Commander in a timely manner all investigative
equipment acquired through grant funding as a result of this Agreement in
the event that: future federal funding is no longer available, the Agency
decides to dissolve its binding relationship with the Minnesota ICAC Task
Force and the Saint Paul Police Department, or the Agency breaches the
Agreement.
o� -t�.�
Terms of this agreement:
This agreement shall be effective upon signatures. Nothing in this agreement shall otherwise
limit the jurisdiction, powers, and responsibilities normally possessed by an employee as a
memberoftheAgency. �� � ,- � sE �( y
.
'.
,,,
William K. Finney,
Saint Paul Police D
of Police
Date
>ct��' % .v. 7� �U2� 7
Date
f vr�,-.�
A �-`-".�S �"u�lC
�•c
� �rc�uS Fcu
l
w .c� . �-�'irr� oG (�„L ��c Su<�"�•
�ti�\�G. „ `�" f y
Date
Date
'� L�' � 5
!J
O'� -1`�l°l
Appendix A
ICAC PROGRAM
OPERATIONAL
�_ ► 1
INVESTIGATIV� ST�NDARD�
ICAC Program OperationaNand Irrvestigative Standards
o � -►�tq
INDEX
Defmitions ...............................Pagel
Case Management .........................
A. Workspace and Equipment
B. Case Predication and Prioritization
C. Record Keeping
D. Undercover Investigations
E. Evidence Procedures
Pages 2 — 6
Page 2
Page 3
Page 4
Page 5
Page 6
Information Sharing . . . . . . . . . . . . . . . . . . . . . . . Page 7
Supervision .............................. Page8
Selection of ICAC Task Force Personnel ....... Page 9
Community Education and Crime Prevention
Activities . . . . . . . . . . . . . . . . . . . . . . . . . . . . Page 10
Media Relations and Releases . . . . . . . . . . . . . . . . Page 11
ICAC Program OperationaY'hnd Investigative
o�- i`tq
Definitions
As used herein, the followin� defuution shall apply:
"OJJDP" is the Office of Juvenile Justice and Delinquency Prevention.
"NCMEC" is the National Center for Missing and Exploited Children.
"CEOS" is the Child Exploitation and Obscenity Section of the United States Attomey's
Office, of the Department of 7ustice.
"TCAC" is the Internet Crimes Against Children program composed of Regional Task
Forces and Satellites.
"REGIONAL TASK FORCE" is defined as an ICAC law enforcement agency
designated by OJJDP to act as a Regional Task Force.
"SATELLITE" is defined as a law enforcement agency that was selected to receive an
OJJDP grant to establish a satellite program.
For the purposes of this program, crime is defined as any offense that involves the
exploitation of children facilitated by technology.
Investigative interest is established when there is reasonable suspicion that a screen name
or other potentially identifiable entity has committed a crime or that entity is engaged in a
sequence of activities that is likely to result in the commission of a crime.
Aproactive investigation is designed to identify, investigate and prosecute offenders,
which may or may not involve a specific target, and requires online interaction and a
significant degree of pre-operative planning.
A reactive investigation involves the investigation of a complaint of a crime.
Reasonable suspicion is established when sufficient facts exist to lead a law enforcement
officer to believe that an individual or organization is involved in a definable criminal
activity.
0 3 - �' \.�t
Case Management
►Workspace and Equipment
ICAC computers and softwaze shall be reserved for the exclusive use by
agency designated ICAC personnel. When possible, undercover computers,
sofiwaze, and online accounts shall be purchased covertly. No personally
owned equipment sha11 be used in ICAC investigations and all software shall
be properly acquired and licensed.
ICAC personnel shall not use ICAC computers, software or online accounts
for personal use.
Absent exigent or unforeseen circumstances, all ICAC online investigations
shall be conducted in government workspace as designated by the agency.
Exceptions must be approved in advance by an ICAC supervisor.
2
a�-��q
Case Management
►Case Predication and Prioritization
� Cases may be initiated by refenals from the CyberTipline, Intemet service
providers, or other law enfarcement agencies, and by information gathered
through subject interviews, documented public sources, direct observations of
suspicious behavior, public complaints, or by any other source acceptable
under agency policies.
. ICAC supervisors aze responsible for detennining investigative priorities and
selecting cases for investigation. Assuming the information is deemed
credible, that determination should begin with an assessment of victim risk
and then consider other factors such as jurisdiction and known offender
behavioral chazacteristics. The following prioritization scale shall be
considered:
� A child is at immediate risk of victimization
� A child is wlnerable to victimization by a known offender
� A known suspect is aggressively soliciting a child(ren)
� Manufacturers, distributors or possessors of images that appeaz to be
home photography with domiciled children
� Aggressive, high-volume child pornography manufacturers or
distributors who either are commercial distributors, repeat offenders, or
specialize in sadistic images
� Manufacturers, distributors and solicitors involved in high-volume
trafficking or belong to an organized child pornography rin� that
operates as a criminal conspiracy
� Distributors, solicitors and possessors of unages of child pomography
h) Any other form of child victimization.
3
oa _��g,
Case Management
� Record Keeping
� ICAC units shall be subject to existing agency incident reporting procedures
and case supervision systems. At a minimum, a unique identifier shall be
assigned to each ICAC case.
� Participating agencies will report program accomplishments using the ICAC
Monthly Performance Measures Report. This report is due to the ICAC
Coordinator on the 10`� of every month and does not replace the semi-annual
progress report required by the Office of Justice Program's Financial Guide.
0
o� -��lq
Case Management
� Undercover Investigations
� Cazefully managed undercover operations conducted by well-trained officers
aze among the most effective techniques available to law enforcement for
addressing ICAC offenses. Undercover operations, when executed and
documented properly, collect virtually unassailable evidence regarding a
suspecYs predilection to exploit children.
� Investigators will be supplied with appropriate training and receive a copy of
the ICAC Operational and Investigative Standards
� ICAC investigations shall be conducted in a manner consistent with the
principles of law and due process. See, for example, .Tacobson v. U.S., 503
U.S. 540 (1992); US. v. Archer, 486 F.2d (2° Cir.1973); U.S. v. Gamache
156 F. 3d 1(1 Cir. 1998); U.S. v. Poehlman 217 F. 3d 692 (9`" Cir. 2000).
ICAC investigators aze encouraged to work in conjunction with their local
prosecutors.
� The following minimum standazds apply to ICAC investigations:
� Only sworn, on-duty ICAC personnel shall conduct ICAC investigations
in an undercover capacity. Private citizens shall not be asked to seek out
investigative targets, nor shall they be authorized to act as police agents
in an online undercover capacity.
� ICAC personnel shall not, electronically upload, transmit, or fonvazd
pornographic or sexually explicit images.
� Other than photographs of law enforcement officers who have provided
their informed written consent, no actual human images shall be
uploaded, transmitted, or forwazded by ICAC personnel.
� During online dialogue, undercover officers should allow the
investigative tazget to set the tone, pace, and subject matter of the online
conversation. Image transfer shall be initiated by the target.
� Undercover online activity shall be recorded and documented. Any
departures from this policy due to unusual circumstances shall be
documented in the relevant case file and reviewed by an ICAC
supervisor.
5
o� -��.�
Case Management
� Evidence Procedures
. The storage, security, and destrucrion of investigative inforxnation shall be
consistent with agency policy. Access to these files should be restricted to
authorized personnel.
2. ICAC supervisors should ensure that qualified personnel conduct forensic
examinations of computers and related evidence.
a. Child pomography is contraband and should be maintained pursuant to
each agency's policies regarding such. Absent a court order specifically
ordering otherwise, evidence containing child pornography shall not be
released to any defendant or representative thereof.
b. When providing evidence containing child pornography to another law
enforcement agency, such evidence must be hand-delivered, digitally
protected or sent via a delivery service which tracks the shipment.
�
o� -�`�-`l
Information Sharing
l. Conventional boundaries aze virtually meaningless in the electronic world of the
Internet and the usual constraints of tune, place, and distance lose their relevance.
These factors increase the possibility of ICAC agencies targeting one another,
investigating the same subject, or inadvertently disrupting an ongoing investigation.
To foster coordination, collaboration, and communication, each ICAC agency must
contribute basic case information to a common database.
2. Each ICAC agency shall contribute case information on all active investigations
(local, interstate, reactive and proactive) to a common database as designated by the
ICAC Boazd of Directors. This information should be submitted at the earliest
practical opportunity-
3. If any common target is identified, the initiating ICAC agency is responsible for
contacting the other law enforcement agency tazgeting the suspect.
4.—Initiating ICAC agencies should also consider contacting other local, state, and
federal agencies which may be involved in similaz investigations.
7
o'� - �`�g.
Supervision
1. Each ICAC agency shall have supervisory systems and procedures, which shall
provide for observation, documentation, and periodic review of ICAC activity. Such
system should comply with the principles of quality case management and ensure that
ICAC activifies comply with both agency and ICAC Standazds.
2. ICAC agencies may submit any proposed operations to the Boazd for review. To
assist the Boazd in its review, the proposals shall be submitted to the Board
Coordinator at least 21 days in advance of the next regulazly scheduled meeting.
Proposals should be submitted using the following format and include the following
information:
a) goals and objectives of the operation;
b) personnel assigned and/or responsible for investigation;
c) duration of operation, i.e., projected start and stop dates;
d) offenses targeted for investigation;
e) investigative targets and limitation on government contact;
fl operation scenario and techniques (language for contact letters and
advertisements must be included with proposal);
g) liaison and/or case referral procedures with Federal law enforcement agencies
(include the names of Federal agents when known) and;
h) other relevant information
3. The Boazd, at its discretion, may suggest amendments to the original proposal
following consultation with the presenting agency. Notice of the results of the review
of investigative proposals from satellites will be communicated to the satellite
representatives by the Boazd Chair.
4. The ICAC submitting the proposal for review may seek the support of the Board.
E
01-1�1°�
Selection of ICAC Task Force Personnel
Managers and supervisors should evaluate prospective ICAC candidates for work history that
indicates prior invesrigative experience, court testimony skills, ability to handle sensitive
information prudendy, and a genuine interest in the protection of children.
0
o � ��t�
Community Education and Crime Prevention Activities
1. Prevention education activities are a critical component of the OJJDP ICAC Prograzn_
ICAC agencies should foster awareness and provide practical, relevant guidance to
children, pazents, educators, librarians, and other individuals concemed about child
safety issues.
2. Presentations to schooi staff, parents, and community groups are excellent ways to
promote awazeness. These presentations sha11 not depict idenfifiable victims, not
otherwise in the public domain; nor sha11 they use pomographic or sexually explicit
images. Presenters shall not discuss confidential investigative techniques.
10
C� � -��.°`
Media Relations and Releases
Media releases relating to prosecutions, crune alerts or other matters concerning ICAC
operations shall not include information regazding confidential investigative techniques and
should be coordinated (when applicable) with other Task Force participants, Federal law
enforcement agencies, and State and local agencies involved in the inves6gation consistent
with sound information management and media relations practices.
11
o�_ty�
Appendix B
Saint Paul Police ICAC Task Force
(Internet Crimes Against Children)
Policy Statement
Policy Purpose:
The purpose of this policy is to establish responsibilities and guidelines regarding the St. Paul
Police Departments response to reports of exploitation of children, and the possession and
distribution of child pornography using computers.
Policy Statement;
It shali be the policy of the St. Paul Police Department to adhere to strict guidelines with respect
to investigations of computer related child exploitation. The standards adopted pursuant to this
policy mirror those prescribed by Office of Juvenile Justice and Delinquency Preventions's
(OJJDP) Internet Crimes Against Children (ICAC) Task Forces, and ensure compliance with
those protocols accepted by the Federal Bureau of Investigations (FBI), U.S. Customs, and the
U.S. Postal Inspector's Office.
Definitions:
A Qroactive investieation is designed to identify, investigate and prosecute offenders, which may
or may not involve a specific target, and requires online interaction and a significant degree of
pre-operative planning.
A reactive investi¢ation involves the investigation and prosecution of a known tazget(s), and
where the need to proceed with the investigation is urgent. It also includes a response within the
community or area of jurisdiction to a specific complain brought to the departments attention by
another law enforcement agency, a reputable source of information such as the Cyber-Tipline at
the National Center for Missing & Exploited Children or a lazge Internet Service Provider. The
departsnent must also respond to complaints made by citizens, schools, libraries, or businesses
who believe illegal material has been transmitted or potentially dangerous situations, such as
child lure attempts have been communicated through the Intemet.
The term Intemet Crime� Against Children (ICAC) includes both proactive and reactive
investigative activities as outlined above.
An investigation is deemed to be urgent when there is a reasonable belief that the target presents
an imminent threat to the well being of another person.
12
Q3 -�y
Procedures:
Work space and Equipment
Intemet Crimes Against Children (ICAC) computers and software shall be reserved for the
exclusive use by department designated ICAC personnel. VJhen possible, undercover
computers, software, and online accounts shall be purchased covertly. No personally owned
equipment shall be used in ICAC investigations and all softwaze shall be properly acquired
and licensed.
� All ICAC online investigations shall be conducted in govemment work space as designated
by the department.
Care Predication and Prioritization
� Cases may be initiated by referrals from the CyberTipline, Internet Service Providers, or
other law enforcement agencies, and by information gathered through subject interviews,
documented public sources, direct observations or suspicious behavior, public complaints, or
by any other source acceptable under current department policy.
ICAC Supervisors aze responsible for determining investigative priorities and selecting cases
for investigation. Assuming the information is deemed credible, that determination should
begin with an assessment of victim risk and then consider other factors such as jurisdiction
and known offender behavioral chazacteristics. The following prioritization scale was
established by the ICAC Task Force Review Board and will apply to the assignment of cases
within the department:
l. A child is at immediate risk of victimization;
2. A child is vulnerable to victimization by a known offender;
3. Known suspect is aggressively soliciting a child(ren);
4. Traders of images that appear to be home photography with domiciled children;
5. Aggressive, high volume child pomography traders who either are commercial
distributors, repeat offenders, or specialized in sadistic images;
6. Traders and solicitors involved in high-volume trafficking or belong to an arganized
child pornography ring that operates as operates as a criminal conspiracy;
7. Traders in previously known images;
8. Traders in digitally altered images.
Record Keeping
ICAC investigative units shall be subject to the existing agency incident reporting procedure and
case supervision systems. Investigators wili obtain a case number at the outset of each case and
fully document their activities through the completion of initial ans supplemental reports.
Reports will be completed and reviewed by a supervisor in a tunely fashion. Investigation and
case management activities will occur in accordance with existing departrnental policies and
procedures. Closeout reports with indicate the manner in which a case has been resolved with
13
o � -��.�,
copies forwazded to the prosecutor's office and/or the law enforcement a�ency continuing the
investigation when applicable.
Undercover Investigations
Cazefully managed undercover operations conducted by well-trained o�cers aze among the most
effective techniques available to law enforcement for addressins ICAC offenses. Undercover
operations, when executed and documented properly, collect virtually unassailable evidence
regazding a suspect's predilection to sexually exploit children. However, these investigations
can trigger serious legal and ethical considerafions because of concern that inappropriate
govemment conduct may induce an othenvise innocent citizen into committing a crune.
All investigations shall be conducted in a manner consistent with the principles of
due process. Task Force investigators shall avoid unlawful inducement of any
individual not otherwise disposed to commit the offenses being investigated, and will
not engage in conduct that is shocking or offensive to notions of fundamental fairness
as described in applicable case law.
Officers should always be awaze that their actions, in addition to those of the
offender, may be at issue in deciding if charges aze brought, whether referrals to other
law enforcement agencies are acted upon, and in determining the guilt or innocence
of the offender at trial. Therefore, it is critical that this task force work closely with
local prosecutors when investigating ICAC offenses.
Accordingly, the following minimum standazds apply to undercover investigations by
the task force:
a) Only sworn on-duty ICAC Task Force personnel shall conduct ICAC
investigations in an undercover capacity. Private citizens shall not be asked to seek
out investigative targets nor sha11 they be authorized to act as police agents in an
online undercover capacity.
b) ICAC Task Force personnel shall not, under any circumstances, upload, transmit,
or forward pornographic or sexually explicit imaQes.
c) Other than photographs of taw enforcement officers who have provided their
informed written consent, no human images shall be uploaded, transmitted, or
forwarded by ICAC Task Force personnel.
d) Other than authorized above, images considered for uploading shall be approved
by the ICAC Task Force Project Director and re� iewed by a local prosecutor.
Images uploaded for investigative purposes shall be nonhuman and encrypted.
Sexually suggestive titles shall not be used.
e) During online dialoa e, undercover officers should allow the investigative tazget
to set the tone, pace, and subject matter of the online conversation. Image uploading
14
01-���,
shall be initiated by the tazget.
Evidence Procedures
All undercover online activity shall be recorded and documented. Any devia6ons from this
policy due to unusual circumstances, shall be documented in the relevant case file and reviewed
by the ICAC Task Force Commander.
The storage, security, and destruction of investigative informafion shall be consistent with
agency policy. At a minimum, information should be maintained in locked cabinets and
under the control of ICAC Task Force personnel. Access to these files should be restricted to
authorized personnel with a legitimate need to lmow.
� Task Force supervisors should ensure that forensic examinations of computers and related
evidence aze conducted by qualified personnel that have received specific training in
computer forensics.
Information Sharing
Conventional boundazies are virtually meaningless in the electronic world of the Internet and the
usual constraints of time, place, and distances lose their relevance. These factors increase the
possibility of ICAC Task Forces targeting one another, investigating the same subject, or
inadvertently disrupting an ongoing investigation. To foster coordination, collaboration, and
communication, OJJDP requires that each ICAC Task Force contribute basic case information to
a common database. Federal Guidelines have been established through the Department of
Justice's ICAC Task Force Inforxnation Sharing Working Group. The OJJDP Task Force
Review Boazd reviewed, modified, and adopted the below information sharing system and
procedures. The St. Paul Task Force will comply with these guidelines.
1. Task Force investigators shall contribute basic and case update information on all cases
(local, interstate, reactive and proactive) to the Child Pornography Pointer System (CPPS)
maintained by the FBI Innocent Images Task Force.
2. Basic case information shall include, but is not limited to:
a)
b)
c)
d)
e)
fl
g)
h)
i)
J)
Submitting Task Force
Person submitting information
Telephone number for verification purposes
Date of submission
Brief synopsis of investigation
Offender screen name(s)
Identifiers (URL, FTP, Newsgroup, IP Address)
True name of suspect (if known)
Other suspect information (if known)
Undercover officer screen name(s)
15
0 � -�y.9r
� �.
�
�
Case update information shall include, but is not limited to:
a) Submitting Task Force
b) Person submitting information
c) Telephone number for verification purposes
d) Date of submission
e) Date investigation initiated
fl Identiry of subject(s) including address, date of birth, social security number,
address (when available)
g) Criminai proceedings (e.g., arrest, indictrnent, seazch warrant, conviction, etc.)
h) Sentencing information (when available)
� 4. The ICAC Commander shall designate a primary and secondary staff contact for the
CPPS. Contact will be made by telephone and/or the information can be forwazded to
CPPS using the data form. CPPS staff will verify each caller's identity through a retum
telephone call to the investigator. Once dial-up access capabiliry is achieved, ICAC Task
Forces shall use a stand-alone computer to access CPPS
5. Each investigator shall query CPPS once they have established an investigative interest.
For the purposes of the ICAC Task Force Program, an investigative interest is established
when there is reasonable suspicion that a crime has occurred or there is a reason to
believe that a screen name or other potentially identifiable entity has engaged in a
sequence of activities that is likely to lead to the sexual exploitation of a child. Assuming
no other active investigations aze discovered and that reasonable suspicion is present to
initiate an investigation, the agency will submit case information to CPPS, including an
indication that there is no known related investigation underway. Each Task Force
should submit this information within 24 hours of initiating the case or as soon thereafter
as possible.
6. If any duplication is found, the initiating investigator is responsible for contacting the
other law enforcement agency. CPPS personnel are not responsible for notifying the
parties of duplication beyond alerting the initiating Task Force to the potential conflict.
Additionally, initiating investigators should also contact the U.S. Customs Cyber
Smugglin� Center (703-293-8005) to ensure there is no duplication with regard to their
ongoing investigations. Similarly, once an offender has been identified and associated
with a known address, contact should be made with the U.S. Postal Inspector responsible
for chi2d sexual exploitation offenses where the offender resides.
Supe,rvision
Existing departmental supervisory systems and procedures shall apply, with specific
emphasis on observation, documentation, and periodic evaluation of cases assigned to
16
p3 ,.��y
undercover investigators. Written directives wiIl refIect the principles of quality case
management and ensure that ICAC Task Force activities comply with both agency and
ICAC Task Force Standards.
2. At a m;n;mum, mana�ement or supervisory policies and practices shall include:
a) review of daily ICAC Task Force investigative reports;
b) periodic review of undercover session recordings;
c) direct participation in formulating ICAC Task Force investigative plans and
establishing investigative priorities;
d) development of work schedules includmg approval of specific overtime expenditures;
e) assessment of equipment and training needs; and,
fl review and approval of any ICAC Task Force fiscal matters.
Selectiou of ICAC Task Force Personnel
While existing agency personnel procedures apply, managers and supervisars should
eyaluate prospective ICAC Task Force candidates for wark history that indicates prior
investigative experience, court testimony skill, ability to handle sensitive information prudently,
and a genuine interest in the protection of children.
Task Force members should be computer literate, knowledgeable regazding child
exploitation issues, and be familiar with Federal and State stahxtory and case law pertaining to
ICAC investigations.
Prevention and Education Activities
Prevention education activities are a critical component of the St Paul Police ICAC Task
Force Program. Supervisors and investigators are expected to develop and lead prevention
programs to foster awareness and provide practical, refevant guidance to children, parents,
educators, librazians, and other individuals concerned about child safety issues. However, these
presentations shall not depict identifiable victims nor shall they use pornographic or sexually
explicit images. Presenters shall not discuss investigative techniques.
Media Relations and Releases
Copies of inedia releases related to this initiative will be forwarded through the ICAC
Unit Commander to the Public Information Office for dissemination. Copies of radio or video
segments and press clippings will be used to promoTe and sustain public support for ICAC
activities and circulated witYun the Review Board.
Media releases relating to prosecutions, crime alerts or other matters conceming ICAC
Task Force operations shall not include information regazding specific investigative techniques
and should be coordinated (when applicable) with other Task Force participants, Federal law
enforcement agencies, and State and local agencies involved in the investigation consistent with
sound information management and media relations practices. In each case, copies should be
provided to OJJDP in a timely manner.
17