Loading...
03-476QRIGi(��! Presented By: Referred To: RESOLUTION CTTY OF SAINT PAUL, NIIlVNESOTA Council File # Green Sheet # Committee:Date: 03 - �1�1 � 205020 (� 1 WHEREAS, the City of St. Paul, Police Department, is authorized to enter into the attached 2 mulri-agency law enforcement agreement with the Crow Wing County Sheriffs Department for 3 participation in the St. Paul Police DepartmenYs Internet Crimes Against Children Task Force. 4 A copy of said agreement is to be kept on file in the Office of Financial Services. 5 6 7 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 Adopted by Council: Date: 1 ao, Adoption Certified by Council Secretary: By: �� Approved by By: , o : Date: �- �,� � �c.'✓l�c.��., � � Mayof for Requested by Department of: r DEPAR7MENT/OFFICFJCOUNCIL DATE INITIATED �� � v roli� s�6�os GREEN SHEET No. 205020 CONTACT PERSON & PHONE INmAUDn7E - INmAUDaTE Chief William Finney 292-3588 1 oEP�a,.ExrwaE�roR 4 �,a� --� -/ � b MUST BE ON COUNCIL AGENDA BY (DATE) J _ M`� -� PleaseprocessASAP �arra�Jp� �c�. ❑RIANCWLSERVICESYIft �FWNOA�SERV/ACCTG �YOR(ORA595TANI� � �m�snnW(i(IS i�� TOTAL # OF SIGNATURE PAGES 1 (CLIP ALL LOCATIONS FOR SIGNATURE) CTION REqUESTED - Signatures zequested on the attached council tesolution authorizing the City of St. Paul, Police Department, to enter into a muki-agency law enforcement agreement cvith the Crow Wing County Sheriffs Departrnent for participation in the St Paul Police Department's Internet Crimes Against Cluldren Task Force (ICAC). RECOMMENDATION App�ove (A) or Rejec[ (R) PERSONAL SERVICE CONTRqGTS MUST ANSWER THE FOLLOWING pUESTIONS: 1. Has this perso�rtn ever worked unde� a contrecl for ihis department? PLANNING COMMISSION YES � NO CIB COMMITTEE 2. Has this personmrm ever been a city employee? CIVIL SERVICE COMMISSION vES No 3. Does this person/firm possess a skill not normally possessed by any current ary emD�oyee� YES NO 4. Is this personlfirm a targeted vendof? YES NO Explain all yes answers on separete sheet and attach to green sheet INITIATING PROBLEM ISSUE, OPPORTUNITY (WHO, WHAT, WHEN, WHERE, WHY) The ICAC Task Force's mission is to form a mulUyurisdictional operation that invesUgates crimes involving child pornography and e�cploitation of cluldren online; educates law enforcement on investigarive techniques and legal issues involving seazch warrants and seizure of evidence; develops to adhere to the same standards that the task force has agreed to with the Office of Juvenile 7ustice for Delinquency Prevention (OJJDP). This memorandum of understanding is a statement that the agencies understand and agree to those standards and that any equipment given to the assisting agency for task force work is to be returned to the task force upon termination of the task force or their affiliation of the task force. ADVANTAGESIFAPPROVED ' Approval of the mulri-agency law enforcement agreement assures that the task force is operating per 077DP guidelines that set uniform opetational standards for participating agencies DISADVANTAGESIFAPPROVED None. DISADVAN7AGESIFNO7APPROVED � The work of the task force would be substantially hindered as work with other agencies is an aT 0 J��1'OE /�l,s integrai part of the original grant application. TO7AL AM�UNT OF TRANSACTION $ None C0.STIREVENUE BUDGE7ED (C(RCLE ONE) YES NO FUNDINGSOURCE FC(IeI21 ,�LdIIt ACTIVI7YNUMBER 436-34056 °""^"°" ��a�c� ��r�21� FINANCIAL INFORMATION (EXPLAIN) p� �g� 9 q^q �oQ�j �i�ye 2 ,;'� � 1 r Crow Wing,� �ICAC ageement.cr.gs2003 b�-y�� Minnesota Intemet Crimes Aeainst Children Task Force Multi-Agency Law Enforcement Agreement This Multi-Agency Law Enforcement Agreement, and amendments and su��lements thereto, (hereinafter "AgreemenP') is between the City of Saint Paul 3CS1ZlQ tYl1011Hr 1SS POI1C2 Department (Grantee) and the Crow Wing County, actina throueh its Sheriffs D�p�rcment, 322 Laurel Street, Brainerd, MN 56401 (hereinafrer "lindersigned Law Enforcement Aeenc}�") both �vhich arz empowered to enter into joint powers aa eements pursuant to Minn. Sta_ §�71.59, Subd. 10 & 12, and is further empowered to enter into this Agreement b}' Minn. Sui. j 626.76; and R'hereas, the above subscribed parties have joined to�ether in a multi-aQency tast force intznded to investigate and prosecute crimes committed aeainst children and the cnminal exploitation of children that is committed and/or facilitated by or through the use o` computers, and to disrupt and dismantle organizations engaging in such activity; and Whereas, the undersigned agencies agree to utilize applicable state and federal la�as to prosecute criminal, civil, and forfeiture actions against identified violators, as apprepriate; and R'hereaS, the Grantee is the recipient of a federal grant disbursed by the Office oi Juvenile Just and Delinquency Prevention ("OJJDP") in Washington, D.C. to assist law enforcement in incestigating and combating the exploitation of children which occurs through the use of computers by providing funding for equipment, training and expenses, includino Vavel and o��ertime funding, which are incurred by law enforcement as a result of such investi?ations; and V1'hereas, the OJJDP Internet Crimes Against Children ('`ICAC") a Board of Dirzctors has been established representing each of the existing ICAC Task Forces to oversee the operation of the grant and sub-grant recipients. Now Therefore, the parties agree as follows: The Undersigned Law Enforcement Agency approves, authorizes. and enters into this Memorandum of Understanding with the purpose of implementing a three-pronged approach to combat Internet Crimes against Children: prevention, education and enforcement; and The Undersigned Law Enforcement Agenc} shall adhere to the OJJDP ICAC Task Force Program Standards (Attached and marked as Appendix A), in addition to state and federal laws, when conducting underco��er operations relative to ICAC; and o � -�l? � The lindersigned La�s Enforcement r�genc5 shall adhere to the Minnesota ICAC Task Force Policy Statement (attached to this Agreement as E�ibit B); and All officers contributed by the Undersigned Law Enforcement Agency to the Minnesota ICAC Task Force shall be licensed peace officers or found by the Minnesota Board of Peace Officer Standards and Training to have comparable qualifications; and When a contributed officer of the Undersigned Law Enforcement Agency acts on the behalf of the Minnesota ICAC task Force within the scope of this Agreement, the officer's actions are within the officer's line of duty and course of employment to the same extent as if the officer had acted on behalf of the officer's employing Agenc}�; and The Undersigned Law Enfarcemen# Ageney shall indemnify, -save at�d--l�o�d harmless the Grantee, its representatives and employees from any and all claims or causes of action, including all reasonable attorney's fees incurred by the Grantee, arising from the performance of this Agreement by the Undersigned Law Enforcement Agency's officer/sl; and All members of the Undersigned Law Enforcement Agency shall continue to be employed by the same Law Enforcement Agency employer which they were employed before joining the Minnesota ICAC Task Force and all services, duties, acts or omissions performed by the member will be within the course and duty of that employment, and therefore, are covered by the Workers Compensation programs of that employer; will be paid by that employer and entitled to that employer fringe benefits; and The Undersigned Law Enforcement Agency shall submit all requests for undercover ICAC related operations in �riting to the Commander of the Minnesota ICAC Task Force for presentation to the OJJDP ICAC Task Force Board of Directors; and o� - �� s� The UndersiQned Law Enforcement AQency must first submit a written request for funds and receive approval for the funds from the Grantee to receive any funds from the Grantee; and The Undersigned Law Enforcement Agency must supply original receipts to be reimbursed on pre-approved requests; and The Undersigned Law Enforcement Agency shall maintain accurate records pertaining to prevention, education, and enforcement activities, to be collected and forwarded monthly to the Minnesota ICAC Task Force Commander or his designee for statistical reporting purposes; and ► The Undersigned Law Enforcement Agency shall participate fully in any audits required by the OJJDP; and � The Undersigned Law Enforcement Agency shall make a reasonable good faith attempt to be represented at any scheduled regional meetings in order to share information and resources amongst the multiple entities; and ► The Undersigned Law Enforcement Agency shail be soleLy. responsible for_ forwarding information relative to investigative targets to the Child Pornography Pointer System (CPPS) pursuant to the 0J3DP guidelines; and ► The Undersigned Law Enforcement Agency shall provide the Minnesota ICAC Task Force Commander in a timely manner all investigative equipment acquired through grant funding as a result of this Agreement in the event that future federal funding is no longer available, the Agency decides to dissolve its binding relationship with the Minnesota ICAC Task Force and the Saint Paul Police Department, or the Agency breaches the Agreement. o�-�t�� Terms of this agreement: This aereement shall be effective upon sienatures. Nothing in this aareement shall othen�ise limit fhe jurisdiction, powers, and responsibilities normally possessed b} an employee as a member of the AsencS-. f-o �j-e ro�3i-e� t�� s,c�v�a,}�{2 � s e � ��. � ( v� . William K. Finnf Saint Paul Police of Police Date ` Aeencv have executed the Agreement on behalf of the Aaencv and itsjurisdictiona�overnment entitu as required bv applicable articles. laws bv-laws. resolutions. or ordinances. Dewayne Tautges, Roy A. Luukkonen, Couy�tY Auditor pproved as tq�ftrfm and execution by Donald � Ryan, County Attorney � ��- C � Date 4-5-03 Date 4-8 � Date Date � o� -y� ` Appendix A ICAC PROGRAM OPERATIONAL AND INVESTIGATIVE STANDARDS /CAC Program OperationaNand Investigatrve Standards o� -�.� �. INDEX Definitions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Page 1 Case Management . . . . . . . . . . . . . . . . . . . . . A. Workspace and Equipment B. Case Predication and Prioritization C. Record Keeping D. Undercover Investigations E. Evidence Procedures . . . . Pages 2 — 6 Page 2 Page 3 Page 4 Page 5 Page 6 Information Sharing . . . . . . . . . . . . . . . . . • • • • • • Page 7 Supervision . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Page 8 Selection of ICAC Task Force Personne] ....... Page 9 Community Education and Crime Prevention Activities . . . . . . . . . . . . . . . . . . . . . . . . . . . . Page 10 Media Relations and Releases . . . . . . . . . . . . . . . . Page 11 ICAC Program OperationaY�hnd /nvestigative Standards 03 -y?�. Definitions As used herein, the following definition shall apply: "OJJAP" is the Office of Juvenile Justice and Delinquency Prevention. "NCMEC" is the National Center for Missing and Exploited Children. "CEOS" is the Child Exploitation and Obscenity Section of the United States Attorney's Office, of the Department of Justice. "ICAC" is the Intemet Crimes Against Children program composed of Regional Task Forces and Satellites. "REGIONAL TASK FORCE" is defined as an ICAC law enforcement agency designated by OJJDP to act as a Regional Task Force. "SATELLITE" is defined as a law enforcement agency that was selected to receive an OJJDP grant to establish a satellite progzam. For the purposes of this program, crime is defined as any offense that involves the exploitation of children facilitated by technology. Investigative interest is established when there is reasonable suspicion that a screen name or other potentially identifiable entity has committed a crime or that entity is engaged in a sequence of activities that is likely to result in the commission of a crime. A proactii�e investigntion is designed to identify, investigate and prosecute offenders, which ma}� or may not involve a specific target, and requires online interaction and a significant degree of pre-operative planning. A reactive investigation involves the investigation of a complaint of a crime. Reasonable suspicion is established when sufficient facts exist to lead a law enforcement officer to believe that an individual or organization is involved in a definable criminal activity. �z -�l'� S. Case Management ►Workspace and Equipment ICAC computers and softwaze shall be reserved for the exclusive use by agency designated ICAC personnel. When possible, undercover computers, softwaze, and online accounts shall be purchased covertly. No personally owned equipment shall be used in ICAC investigations and all softwaze shall be properly acquired and licensed. ICAC personnel shall not use ICAC computers, software or online accounts for personal use. Absent exigent or unforeseen circumstances, all ICAC online investigations shall be conducted in government workspace as designated by the agency. Exceptions must be approved in advance by an ICAC supervisor. 2 pz _�t� S. Case Management ►Case Predication and Prioritization . Cases may be initiated by referrals from the CyberTipline, Internet service providers, or other law enforcement agencies, and by information gathered through subject interviews, documented public sources, direct observations of suspicious behavior, public complaints, or by any other source acceptable under agency policies. . ICAC supervisors are responsible for determining investigative priorities and selecting cases for investigation. Assuming the information is deemed credible, that determination should begin with an assessment of victim risk and then consider other factors such as jurisdiction and known offender behavioral characteristics. The following prioritization scale shall be considered: . A child is at immediate risk of victimization � A child is vulnerable to victimization by a known offender . A known suspect is aggressively soliciting a child(ren) . Manufacturers, distributors or possessors of images that appear to be home photography with domiciled children . Aggressive, high-volume child pornography manufacturers or distributors who either are commercial distributors, repeat offenders, or specialize in sadistic images . Manufacturers, distributors and solicitors involved in high-volume trafficking or belong to an organized child pornography ring that operates as a criminal conspiracy . Distributors, solicitors and possessors of images of child pornography h) Any other form of child victimization. 3 03 - �1��► Case Management Record Keeping ICAC units shall be subject to existing agency incident reporting procedures and case supervision systems. At a minimum, a unique identifier shall be assigned to each ICAC case. Participating agencies will report program accomplishments using the ICAC Monthly Performance Measures Report. This report is due to the ICAC Coordinator on the 10` of every month and does not replace the semi-annuai progress report required by the Office of Justice Program's Financial Guide. o� .y� c. Case Management � Undercover Investigafions . Carefully managed undercover operations conducted by well-trained officers are among the most effective techniques available to law enforcement for addressing ICAC offenses. Undercover operations, when executed and documented properly, collect virtually unassailable evidence regazding a suspect's predilection to exploit children. . Investigators will be supplied with appropriate training and receive a copy of the ICAC Operational and Investigative Standazds . ICAC investigations shall be conducted in a manner consistent with the principles of law and due process. See, for example, Jacobson v. U.S., 503 U.S. 540 (1992); U.S. v. Archer, 486 F.2d (2n Cir.1473); U.S. v. Gamache 156 F. 3d 1(1�` Cir. 1998); U.S. v. Poehlman 217 F. 3d 692 (9` Cir. 2000). ICAC investigators are encouraged to work in conjunction with their local prosecutors. . The following minimum standards apply to ICAC investigations: . Only sworn, on-duty ICAC personnel shall conduct ICAC investigations in an undercover capacity. Private citizens shall not be asked to seek out investigative targets, nor shall they be authorized to act as police agents in an online undercover capacity. . ICAC personnel shall not, electronically upload, transmit, or forward pornographic or sexually explicit images. . Other than photographs of law enforcement officers who have provided their informed written consent, no actual human images shall be uploaded, transmitted, or forwarded by 1CAC personnel. . During online dialogue, undercover officers should allow the investigative tazget to set the tone, pace, and subject matter of the online conversation. Image transfer shall be initiated by the taiget. . Undercover online activity shall be recorded and documeated. Any departures from this policy due to unusual circumstances shall be documented in the relevant case file and reviewed by an ICAC supen'isor. 5 0^� -y� � Case Management � Evidence Procedures_ � The storage, security, and destruction of investigative information shall be consistent with agency policy. Access to these files should be restricted to authorized personnel. 2. ICAC supervisors should ensure that qualified personnel conduct forensic examinations of computers and related evidence. a. Child pomography is contraband and should be maintained pursuant to each agency's policies regarding such. Absent a court order specifically ordering otherwise, evidence containing child pornography shall not be released to any defendant or representative thereof. b. When providing evidence containin� child pomography to another law enforcement agency, such evidence must be hand-delivered, digitally protected or sent via a delivery service which tracks the shipment. 6 Oi �R Iv Information Sharing I. Conventional boundaries are virtually meaningless in the electronic world of the Internet and the usual const�aints of time, place, and distance lose their relevance. These factors increase the possibility of ICAC agencies targeting one another, investigating the same subject, or inadvertently disrupting an ongoing investigation. To foster coordination, collaboration, and communication, each ICAC agency must contribute basic case information to a common database. 2. Each ICAC agency shall contribute case information on all active investigations (local, interstate, reactive and proactive) to a common database as designated by the ICAC Boazd of Directors. This information should be submitted at the earliest practical opportunity. 3. If any common tazget is identified, the initiating ICAC agency is responsible for contacting the other law enforcement agency targeting the suspect. �--Initiating ICAC agencies should also consider contacting other local, state, and federal agencies which may be involved in similar in��estigations. 7 n � -�t� � Supervision l. Each ICAC agency shall have supervisory systems and procedures, which sha11 provide for observation, documentation, and periodic review of ICAC activity. Such system should comply with the principles of quality case management and ensure that ICAC activities comply with both agency and ICAC Standazds. 2. ICAC agencies may submit any proposed operations to the Board for review. To assist the Board in its review, the proposals shall be submitted to the Board Coordinator at least 21 days in advance of the next regularly scheduled meeting. Proposals should be submitted using the following format and include the following information: a) goals and objectives of the operation; b) personnel assigned and/or responsible for investigation; c) duration of operation, i.e., projected start and stop dates; d) offenses targeted for investigation; e) investigative targets and limitation on government contact; � operation scenario and techniques (language for contact letters and advertisements must be included with proposal); g) liaison andlor case referral procedures with Federal law enforcement agencies (include the names of Federal agents when known) and; h) other relevant information 3. The Board, at its discretion, may suggest amendments to the original proposal following consultation with the presenting agency. Notice of the results of the review of investigative proposals from sateilites will be communicated to the satellite representatives by the Board Chair. 4. The ICAC submitting the proposal for review may seek the support of the Board. �3 o�_��� Selection of ICAC Task Force Personnel Managers and supervisors should evaluate prospective ICAC candidates for work history that indicates prior investigative experience, court testimony skills, ability to handle sensitive information prudently, and a genuine interest in the protection of children. 0 b � -`�'1 t� Community Education and Crime Prevention Activities l. Prevention education activities aze a critical component of the OJJDP ICAC Program. ICAC agencies should foster awazeness and provide practical, relevant guidance to children, pazents, educatois, librarians, and other individuals concemed about child safety issues. 2. Presentations to school staff, pazents, and community groups are excellent ways to promote awazeness. These presentations shall not depict identifiable victims, not otherwise in the public domain; nor shall they use pomographic or sexually explicit images. Presenters shall not discuss confidential investigative techniques. 10 6's - 4'14 Media Relations and Releases Media releases relating to prosecutions, crime alerts or other matters concerning ICAC operations shall not include information regarding co�dential investigative techniques and should be coordinated (when applicable) with other Task Force par[icipants, Federal law enforcement agencies, and State and local agencies involved in the investigation consistent with sound information management and media relations practices. 11 o� _ �.�� Appendix B Saint Paul Police ICAC Task Force (Internet Crimes Against Children) Policy Statement Policy Purpose: The purpose of this policy is to establish responsibilities and guidelines regarding the St. Paul Police Departments response to reports of exploitation of children, and the possession and distribution of child pornography using computers. Policy 5tatement: It shall be the policy of the St. Paul Police Department to adhere to strict guidelines with respect to investigations of computer related child exploitation. The standazds adopted pursuant to this policy mirror those prescribed by Office of Juvenile Justice and Delinquency Preventions's (OJ3DP) Intemet Crimes Against Children (ICAC) Task Forces, and ensure compliance with those protocols accepted by the Federal Bureau of Investigations (FBI), U,S. Customs, and the U.S. Postal Inspector's Office. De£nitions: A oroacti �e in�es?t ag tion is designed to identify, investigate and prosecute offenders, which may or may not involve a specific target, and requires online interaction and a significant degree of pre-operative planning. A reactive investi ation involves the investigation and prosecution of a kno�in target(s), and where the need to proceed with the investigation is urgent. It also includes a response within the community or area of jurisdiction to a specific complain brought to the departments attention by another law enforcement agency, a reputable source of information such as the Cyber-Tipline at the National Center for Dtissing & Exploited Children or a large Internet Sen ice Provider. The department must also respond to complaints made by citizens, schools, libraries, or businesses who believe illegal material has been transmitted or potentially dangerous situations, such as child lure attempts ha��e been communicated through the Internet. The term Internet Crimzs A ainst Children (ICAC) includes both proactive and reactive investigative activities as outlined above. An investigation is deemed to be urgent when there is a reasonable belief that the target presents an imminent threat to thz well being of another person. 12 O�r 1r Procedures: Work space and Equipment Intemet Crimes Against Children (ICAC) computers and softwaze shall be reserved for the exclusive use by department designated ICAC personnel. When possible, undercover computers, softwaze, and online accounts shall be purchased covertly. No personally owned equipment shall be used in ICAC investigations and all software shall be properly acquired and licensed. � All ICAC online investigations shall be conducted in government work space as designated by the depar[ment. Care Predication and Prioritization � Cases may be initiated by referrals from the CyberTipline, Internet Service Providers, or other law enforcement agencies, and by information gathered through subject interviews, documented public sources, direct observations or suspicious behavior, public complaints, or by any other source acceptable under current department policy. � ICAC Supervisors are responsible for determining investigative priorities and selecting cases for investigation. Assuming the information is deemed credible, that determination should begin with an assessment of victim risk and then consider other factors such as jurisdiction and known offender behavioral characteristics. The following prioritization scale was established by the ICAC Task Force Review Board and will apply to the assignment of cases within the deparcment: I. A child is at immediate risk of victimization; 2. A child is vulnerable to victimization by a known offender; 3. Known suspect is aggressively soliciting a child(ren}; 4. Traders of images that appear to be home photography with domiciled children; 5. Aggressive, high volume child pomography traders who either are commercial distributors, repeat offenders, or specialized in sadistic images; 6. Traders and solicitors involved in high-volume trafficking or belong to an organized child pornography ring that operates as operates as a criminal conspiracy; 7. Traders in previously l:nown ima�es; 8. Traders in digitally altered ima�es. Record Keeping ICAC investigative units shall be subject to the existing agency incident reporting procedure and case supervision systems. Investigators will obtain a case number at the outset of each case and fully document their activities through the completion of initial ans supplemental reports. Reports will be completed and reviewed by a supervisor in a timely fashion. Investigation and case management activities will occur in accordance with existing departmental policies and pracedures. Closeout reports with indicate the manner in which a case has been resolved with 13 d'3 -�t�4 copies forwarded to the prosecutor's office and/or the law enforcement agency continuing the investigation when applicable. Undercover Investigations Carefully managed undercover operations conducted by well-trained officers are among the most effective techniques available to law enforcement for addressing ICAC offenses. Undercover operations, when executed and documented properly, collect virtually unassailable evidence regazding a suspecY s predilection to sexually exploit children. However, these investigations can trigger serious legal and ethical considerations because of concem that inappropriate government conduct may induce an otherwise innocent citizen into committing a crime. All investigations shall be conducted in a manner consistent with the principles of due process. Task Force investigators shall avoid unlawful inducement of any individual not otherwise disposed to commit the offenses being investigated, and will not engage in conduct that is shocking or offensive to notions of fundamental fairness as described in applicable case law. Officers should always be awaze that their actions, in addition to those of the offender, may be at issue in deciding if charges are brought, whether referrals to other law enforcement agencies are acted upon, and in determining the guilt or innocence of the offender at trial. Therefore, it is critical that this task force work closely with local prosecutors when investigating ICAC offenses. Accordingly, the following minimum standards appiy to undercover investigations b}� the task force: a) Only sworn on-duty ICAC Task Force personnel shali conduct ICAC investigations in an undercover capacity. Private citizens shall not be asked to seek out investigative targets nor shall they be authorized to act as police agents in an online undercover capacity. b) ICAC Task Force personnel shall not, under any circumstances, upload, transmit, or forward pornographic or sexually explicit images. c) Other than photographs of law enforcement officers who have provided their infornled written consent, no human images shall be uploaded, transmitted, or forwarded by ICAC Task Force personnel. d) Other than authorized above, images considered for uploading shall be approved by the ICAC Task Force Project Director and reviewed by a local prosecutor. Images uploaded for investagative purposes shall be nonhuman and encrypted. Sexually suggestive titles shall not be used. e) During online dialogue, undercover officers should allow the investigative target to set the tone, pace, and subject matter of the online conversation. Image uploadin� 14 0'� -4�� shall be initiated by the target. Evidence Procedures All undercover online activity shall be recorded and documented. Any deviations from this policy due to unusual circumstances, shall be documented in the relevant case file and reviewed by the ICAC Task Force Commander. � The storage, security, and destruction of investigative information shall be consistent with agency policy. At a minimum, information should be maintained in locked cabinets and under the control of ICAC Task Force personnet. Access to these files should be restricted to authorized personnel with a legitimate need to know. . Task Force supervisors should ensure that forensic examinations of computers and related evidence are conducted by qualified personnel that ha��e received specific training in computer forensics. Information Shariag Conventional boundaries are virtually meaningless in the electronic world of the Intemet and the usual constraints of time, place, and distances lose their relevance. These factors increase the possibility of ICAC Task Forces targeting one another, im estigating the same subject, or inadvertently disrupting an ongoing investigation. To foster coordination, collaboration, and communication, OJJDP requires that each ICAC Task Force contribute basic case information to a common database. Federal Guidelines have been established through the Department of Justice's ICAC Task Force Information Sharing ��'orking Group. The OJJDP Task Force Review Board reviewed, modified, and adopted the belo« information sharing system and procedures. The St. Paul Task Force will comply «ith these guidelines. 1. Task Force investigators shall contribute basic and case update information on all cases (local, interstate, reactive and proactive) to the Child Pomography Pointer System (CPPS) maintained by the FBI Innocent Images Task Force. 2. Basic case information shall include, but is not limited to: a) b) c) d) e) � g) h) i) J) Submitting Task Force Person submitting information Telephone number for verification purposes Date of submission Brief synopsis of investigation Offender screen name(s) Identifiers (URL, FTP, Newsgroup, IP Address) True name of suspect (if known) Other suspect information (if known) Undercover officer screen name(s) 15 03-��� � 3. Case update information shall include, but is not limited to: � � a) Submitting Task Force b) Person submitting information c) Telephone number for verification purposes d) Date of submission e) Date investigation initiated fl Identity of subject(s) includina address, date of birth, social security number, address (when available) g) Criminal proceedings (e.g. arrzst, indictment, seazch wanant, conviction etc.) h) Sentencing information (when available) � 4. The ICAC Commander sha11 desi�nate a primazy and secondary staff contact for the CPPS. Contact will be made by telephone and/or the information can be forwarded to CPPS using the data form. CPPS staff �ti ill verify each caller's identity through a retum telephone call to the im�estigator. Once dial-up access capability is achieved, ICAC Task Forces shall use a stand-alone computer to access CPPS 5. Each investigator shall query CPPS once they have established an investigative interest. For the purposes of the ICAC Task Forcz Program, an investigative interest is established when there is reasonable suspicion that a crime has occurred or there is a reason to believe that a screen name or other potentially identifiable entity has engaged in a sequence of activities that is likely to lead to the sexual exploitation of a child. Assuming no other active investigations are disco� zred and that reasonable suspicion is present to initiate an investigation, the agency «ill submit case information to CPPS, including an indication that there is no known related investigation underway. Each Task Force should submit this information «ithin 2-k hours of initiating the case or as soon thereafrer as possible. 6. lf any duplication is found, the initiatine im�estigatoc is responsible foi contacting the other law enforcement agency. CPPS pzrsonnel are not responsible for notifying the parties of duplication be} ond alertine th: initiating Task Force to the potential conflict. Additionally, initiating investigators should also contact the U.S. Customs Cyber Smuggling Center (703-293-800�) to ensure there is no duplication with regard to their ongoing investigations. Similazly, once an offender has been identified and associated with a known address, contact should be made with the U.S. Postal Inspector responsible for child sexual exploitation offenses �ti here the offender resides. Supervision Existing departmental supervisory s}�stems and procedures shall apply, with specific emphasis on observation. documentation, and periodic evaluation of cases assigned to 16 o�-��� undercover investigators. Written directi��es ��ill reflect the principles of quality case management and ensure that ICAC Task Force activities comply with both agency and ICAC Task Force Standards. 2. At a minimum, management or supervisory policies and practices shall include: a) review of daily ICAC Task Force investigati�•e reports; b) periodic review of undercover session recordin�s; c) direct participation in formulating ICAC Task Force investigative plans and establishing investigative priorities; d) development of work schedules including approval of specific overtime expenditures; e) assessment of equipment and training needs; and, � review and approval of any ICAC Task Force fiscal matters. Selection of ICAC Task Force Personnel While existing agency personnel procedures apply, managers and supervisors should evaluate prospective ICAC Task Force candidates for �rork history that indicates prior investigative experience, court testimony skill, abilit}� to handle sensitive information prudentiy, and a genuine interest in the protection of children. Task Force members should be computer literate, knowledgeable regarding child exploitation issues, and be familiar with Federal and State statutory and case law pertaining to ICAC investigations. Prevention and Education Activities Prevention education activities are a critical component of the St Paul Police ICAC Task Force Program. Supervisors and investigators are expected to develop and lead prevention programs to foster awareness and provide practical, rele� ant guidance to children, parents, educators, librarians, and other individuals concerned about child safety issues. However, these presentations shall not depict identifiable victims nor shail they use pornographic or sexually explicit images. Presenters shall not discuss investigati� e techniques. Media Relations and Releases Copies of inedia releases related to this initiati� e will be forwarded through the ICAC Unit Commander to the Public Information Office for dissemination. Copies of radio or video segments and press clippings will be used to promote ar.d sustain public support for ICAC activities and circulated within the Re��ie�c Board. Media releases relating to prosecutions, crime alerts or other matters concerning ICAC Task Force operations shall not include information regarding specific investigative techniques and should be coordinated (when applicable) with other Task Force participants, Federal law enforcement agencies, and State and local agencies imolved in the investigation consistent with sound information management and media relations pra: tices. In each case, copies should be provided to OJJDP in a timely manner. 17