Loading...
05-1176Council File # RESOLUTION OF SAINT PAUL, NIINNESOTA Presented By: Referred To: Green Sheet # Committee:Date: OS-11 3028783 �z 1 RESOLVED, that the City of Saint Paul, Police Department, is authorized to enter into the attached 2 agreement with the Cass County Sheriffs Department for participafion in the Internet Crimes 3 Against Children Task Force. A copy of said agreement is to be kept on file in the Office of 4 Financial Services. 5 6 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 Requested by Department of: Adopted by Council: Date:�� �/ � a DOS Adoption By: � by ouncil Secretary: /I�� Sd r: D`ate: 1 �" Z ; Q:\FiscaMO&CR\ICACCassCtySherriff's.cr20os.xis By: Fdr� A •oved by City �ttorney: v By: l{y Mayor for �s!���� � Green Sheet Green Sheet , os- �i�� Green Sheet Green Sheet Green Sheet Green Sheet � DepartmenUoffice/council: Date Initia[ed: PD — POliceDepartment ,¢NO�-05 Green Sheet NO: 3028783 CorMad Person & Phone- Deuartrnent Sent To Person Initial/Date Chief John Harrington � 0 olice De a ent P li e De arimen[ 2665588 /�5jyn 1 0li eDe a ent De ardnentD'uec[or Must Be on Council Agenda by (Date): Number y • pnorn ' A o e �� For Routing 3 or's Office Ma or/Assistant O�der 4 ou cil Counctl 5 Clerk Ci Clerk 6 Gce De a ent oli De a ent Total # of Signature Pages _(Clip All Locations for Signature) Action Requested: Signatures requested on the attached council resoluUOn authorizing the City of Saint Paul, Police Department, to enter into the attached memorandum of understanding with the Cass County Sheriffs Department. Recommendations: Approve (A) or Rejed (R): Personal Service Contracts Must Mswer the Following Questions: Planning Commission 1. Has this person/firm ever worked under a contract for this department? CIB Committee Yes No Civil Service Commission 2. Has this person/firm ever been a city employee? Yes No 3. Does this personffirtn possess a skill not normally possessed by any cucrent cily employee? Yes No Explain all yes answers on separate sheet and attach to green sheet Initiating Problem, Issues, Opportunity (Who, What, When, Where, Why): The attached agreement will allow the Cass County Sheriff s Department to participate in the ICAC Task Force of the Saint Paul Police Department. The ICAC Task Force operates under a U.S. Deparhnent of Justice grant that targets exploitation of children online and crimes inwlving child pornography. (For more informa6on regazding tlus council resolution or agreement piease give Commander Neil Nelson a call at 651-266-5566.) AdvantaqeslfApproved: This agreement will assure that the task force is operating per Office of 7uvenile 7usrice and Delinquency Prevention (0J7DP) guidelines that set uniform operational standazds for participating agencies. DisadvanWgeslfApproved: � None. DisadvantageslfNOtApproved: The work of the ICAC Task Force will be substantially hindered as work with other agencies is an inte�al part of the original grant application. � ToWI Amount of CostiRevenue BudgMed: � Trensaction: q FundinA Source: Fedef8l Gfant Activiry Number. 34056 ��� Cj '7 L�oS Financial lnfortnation: � ��� ������� (Explain) . os- ��7� yiin.nes�ta Internei Cr�mes Against G�ld:e�i Task Force �a�iti-�gencv Las�� �uf�rcement �gre�:neni ThiS Multi-A�ency L2 W ErifoTCement A�'eement, and amendments and supplements thereto, (hereinafter "A�eement"} is between the �ity of Saint Paul, aeting through its �olice �eparYYment (Grantee) and Cass County, l�iinriesota, acting through ifs Sheriffs Deparmnent, 300 Ivlinnesota Ace, P.O. Box 1119, ZValker, N1N 5645� (hereinafter "Undersi�ed Law Enforcerient Agency") botU which are empowered to enter into joint powers agraements pursuant to vlinn. Stat. § 471.54, Subd. 10 & 12, and is further empowered to enter into this Agreement by Minn. $tat. § 626.76; and �heYe�s, the above subscribed parties have joined together in a multi-ageney task force intanded to investigate and prosecute erimes comtnitted against children and the crin'un�l exgloitation c�f ckuldren that is co�nmittad and/or facilitated by ar through the use of cQ�iputers, and to disrupe and dismarit.e organi�ations engaging in sueh activity; and �Vhereas, the undersigned agencies a�ee to utilize applicable state and federal laws to pros�;cute crimizial, eivii, and forfeituse aetions a�anst i�antified violators, as appropriate; and �here�5, the Grantee is the recipient of a fedexal grant (attached to this Agreement as Exhibit A) disbursed by the Office of 7uvenile Just and ➢elinquency Prevention ("07JDP") in WashingtQn, D.C, to assist law enforcement in investigating and eombating the exploitation of c;�ildren which oeeurs through the usa of eomputers by providing funding for equiprnent, �, ,,,a;� ,m,. , a ..�;.., a..,�. ,,;� urr�d �y lu.a tCniikuAS'� Siiu 'uXj°�ui1S'c'6� lilCiuuiAi� uaV2i a2'iu vV�'i �uuC i�.ui tTi� `vV17i'" 2Ti. iiiC enforc@;nent as a resnit of sueh investigations; and WI�erC�s, the OJJDP Internet Crimes A�ainst ChiYdren ("SCAC") a Board of Directors has been estabiished representing each of the existing ICAC Task Forces to oversee the operatian of the grant and sub-grant reeipi�nts. l�o�v ']Cberefore, the parties agree as follows: The Undersigned Law Enforce�nent Agency approves, authorizes, and enters ir_to this Memorandum of Understanding with the puxpose of iznpie�rienting a three-pron�ed approach to combat Internet Crimes Against Chilclren: pr�veStion, educatic�n and enfarcement; and The Undersi�ned Law Enfoxcement Agency shall adhere to the 4JJ➢P I�AC Task Force Prograzn Standards, in addition to state federallaws, when canducting undercover operations relative to ICAC; and .� 05-//7l0 3. The Un�lersigned Law Enforcement Agency shall adhere to fne Minnesota IvA� �'ask Fo�ce Policy Statement (attached to this Ag�eement as E�,ibit �); �a a. A_ll efficers contributed by the Undersigned Law Enforcement Agezicy to the Minnesota TCAC T'ask �'orce sha11 be licensed peace officers or fou�d by the Minnesota Board of �eace �f�icer Standards and Training to have conlparable qualifications; and s. When a contributeci officer of the Undersigned La�v �nforcament F�geney ��ts t�n the behalf �f the Minnesot� I�AC task �Qrce within the s:,c�pe of this Agreemer�t, the officer's aetions are within the offieer's line of duty and �ourse of employment to the same extent as if the officer had acted Q� behalf of the offieer's �mp�oying Agency; and 6. The Undersigned Law Enforcement Agency shall indemnify, save and hQld harznless the �rante�, its representatives and employees from any anci all elaims Qr eauses of aetion, including al1 reasonabla attor�ey's fees ineurr�d by tne C"irarat�e, ariaing frorn the perfQrmance of this Agreament by the Undersigned Law �,nforee�nent Ager�ey's officex/s/, a.r'�d �. All members of tk�e Undersigned Law Enforcement Agency sha11 continu� to be employed by the same Law Enforcement Agency em�aloyer which they were employed before joinin� the Minnesata IC�C '�ask Forez and all services, duties, acts or omissions performed by the mernber wi11 be within the coursa and dtzty of that employment, and therefore, ar� covered by the Workers Compensation programs of that employer; will l�e paid by that employer and entitletl tfl that employer fringe benefits; ar�d s. The Undersigned Law E,nforcexnent Agency s�all submit al1 requests for ur�d�tccver I��'`: related �peratzons ir. �vriting te the �ornr�ander of the Minr I� �C `Task �'or�e for presentation to the QJ7I)F I�AC Tasl� �'oxce �oard a��3izeetors; a��d 9. The Undersigned Law En�orcement Agency must first submit a written request far funds and reeeive approval for the funds from the �raritee tQ receive any funds from the Grantee; and 2 .� � o�-i��� io. The Undersigned La�u Enforcement Agency must supply original receipts to be reimbursed on pre-approved requests; and i i. The UndLrsigned Law Enforcement �gency shall maintair� accurate records pertaining to prevention, education, and enforcement activities, to be collected and forwzrded monthly to the Nlinnesota I�AC Task Force �ornmar.der or his designee far statistical reporti�g purposes; and iz. The Undersi;ned Law Enforcement Agency shall participate fully in any audits required by the 073➢P; and is. The Undersigned Law Enforcement Agency shall make a reasonable good faith attempt to be represented at any scheduled regional meetings in order to share information and resources amongst the multiple enti�ies; and i4. The Undersigned Law Bnforcement Agency shall be solely respansible for f�rwardine information relative to zuvesti�ative targets to the Child Pornography Pointer System (CPFS) pursuant to the 0J7DP guidelines; and is. The Undersid ed T,aw Enforcement Agency shall provide the Minnesota ICAC T'ask Force Commander in a t�mely manner all investigative equipment acquired through grant funding as a restllt of this Agreement zn the event that: future federal funding is no longer available, the Agency decides to dissolve its binding relationship with the Minnesota ICAC Task Ferce and the Saint Paui Police Department, or the Agency breaches the Agreement. Terz�s of this agree�2nt: Tbis a�'eenent sha:i be effective upen signa?ures. Nothing i�z this a�eement shall other,�;se limi± fne j���±s�etian, pow�rs, and res�onsibilities rormaily possessed by �n emplayee as a r�ernb�z of the 4ganey. City Attorney 7o1u1 M. Hanangton, Chief of Police Saint Paul Palice Department Director� Financial Services $V e"l�.d Z A enc A�encvi certifies that the aopropriate person(sl have �xecuted the A�reement on behaif of the A�enov and its iurisdictional govemment entity as reauined bv aUplicaole articles laws bV-laws resolutions, ox ordinances. �<�� ��%�/iv a" Date �at� `Q .S�_ �ate O��-6•c�' Date �� //7( Date , �j�'//7Cv Saint Paul Police ICAC Task Force (Intemet Crimes Against Children) Policy Statement Policy Purpose: The purpose of tkris policy is to establish responsibilities and guidelines regazding the St. Paul Police Departments response to reports of expioitation of clvldren, and the possession and distriburion of child pomography using computers. Policy Statement: It shall be the policy of the St. Pau1 Police Department to adhere to strict guidelines with respect to investigations of computer related child exploitation. The standards adopted pursuant to this policy mirror those prescribed by Office of 7uvenile Justice and Delinquency Preventions's (OJJDP) Internet Crimes Against Children (ICAC) Task Forces, and ensure compliance with those protocols accepted by the Federal Bureau of Investigations (FBI), U.S. Customs, and the U.S. Postal Inspector's Office. Definitions: A proactive investigation is designed to identify, investigate and prosecute offenders, which may or may not involve a specific target, and requires online interaction and a significant degree of pre-operative planning. A reactiue investieation involves the invesUgation and prosecution of a lrnown target(s), and where the need to proceed with the investigation is urgent. It also includes a response within the community or azea of jurisdiction to a specific complain brought to the departments attention by another law enforcement agency, a reputable source of information such as the Cyber-Tipline at the National Center for Missing & Exploited Children or a large Internet Sezvice Provider. The department must also respond to complaints made by citizens, schools, libraries, or businesses who believe illegal material has been transmitted or potentially dangerous situations, such as child lure attempts have been communicated through the Internet. The term Internet Crimes A�ainst Children (ICAC) includes both proactive and reactive investigative activities as outlined above. An investigation is deemed to be urgent when there is a reasonable belief that the target presents an imm;nent threat to the well being of another person. U � Procedures: Work space and Equipment Fnternet Crimes Against Children (ICAC) computers and softwaze shall be reserved for the exclusive use by department designated ICAC personnel. When possible, undercover computers, software, and online accounts shall be purchased covertly. No personally owned equipment shall be used in ICAC investigations and all software sha11 be properly acquired and licensed. All ICAC online investigations sha11 be conducted in government work space as designated by the deparnnent. Care Predication and Prioritization Cases may be nutiated by referrals from the CyberTipline, Internet 5ervice Providers, or other law enforcement agencies, and by information gathered through subject interviews, documented public sources, direct observations or suspicious behavior, public complaints, or by any other source acceptable under current department policy. ICAC Supervisors are responsible for determining investigative priorities and selecting cases for investigation. Assuming the information is deemed credible, that determination should begin with an assessment of victim risk and then consider other factors such as jurisdiction and known offender behavioral charactexistics. The following prioritizafion scale was established by the ICAC Task Force Review Board and will apply to the assignment of cases within the department: 1. A child is at immediate risk of victimization; 2 A child is vulnerable to victimization by a known offender; 3. Known suspect is aggcessively soliciting a child(ren); q._ Traders of images that appeaz to be home photography with domiciled children; 5 Aggressive, high volume child pornography traders who either are commercial distributors, xepeat offenders, or specialized in sadistic nnages; 6 Traders and solicitors involved in high-volume trafFicking or belong to an organized child pornography ring that operates as operates as a criminal conspiracy; �. TradeLS in previously known images; g, Traders in digitally altered images. Record Keeping ICAC investigative units shall be snbject to the existing agency incident reporting procedure and 05-��7� case supervision systems. Investigators will obtain a case number at the outset of each case and fully document their acrivities through the completion of initial ans supplemental reports. Reports will be completed and reviewed by a supervisor in a timely fashion. Investigation and case management activities will occur in accordance with e�cisting deparhnental policies and procedures. Closeout xeports with indicate the manner in wUich a case has been resolved with copies forwarded to the prosecutor's office and/or the law enforcement agency continuing the investigation when appiicable. Undercover Investigations Cazefully managed undercover operations conducted by well-trained officers aze among the most effective techniques available to law enforcement for addressing ICAC offenses. Undercover operations, when executed and docutx�ented properly, collect virhxally unassailable evidence regazding a suspect's predilection to sexually exploit children. However, these investigations can trigger serious legal and etlucal considerations because of concern that inappropriate government conduct may induce an otherwise innocent citizen into commiitting a crime. All investigations shall be conducted in a manner consistent with the principles of due process. Task Force investigators shall avoid unlauvfixl inducement of any individual not otherwise disposed to commit the offenses being investigated, and will not engage in conduct that is shocking or offensive to notions of fundamental fairness as described in applicable case law. Officers should always be awaze that their actions, in addifion to those of the offender, may be at issue in deciding if chazges ue bxought, whether refenals to other law enforcement agencies are acted upon, and in determining the guilt or innocence of the offender at triaL Therefore, it is critical that this task force work closely with local prosecutors when investigating ICAC offenses. Accordingly, the following minimum standards apply to undercover investigations by the task force: a) Only sworn on-duty ICAC Task Farc� personnel shall conduct ICAC investigations in an undercover capacity. Prlvate citizens shall not be asked to seek out investigative targets nor shall they be authorized to act as police agents in an online undercover capacity. b) ICAC Task Fozce personnel shall not, under any circumstances, upload, transmit, or forward pomographic or sexually explicit images. c) Other than photographs of law enforcement officers who have provided their informed written consent, no human images shall be uploaded, transmitted, or forwarded by ICAC Task Force personnel. OS - //7Cv d) Other than authorized above, unages considered for uploading shall be approved by the ICAC Task Force Project Director and reviewed by a local prosecutor. Images uploaded for investigative purposes shall be nonhuman and encrypted. Sexually suggestive tides shali not be used. e) During online dialogue, undercover officers should a11ow the investigative tazget to set the tone, pace, and subject matter of the online conversation. Image uploading shall be initiated by the target. Evidence Procedures All undercover online activity shall be recorded and documented. Any deviations from this policy due to unusual circumstances, shall be documented in the relevant case file and reviewed by the ICAC Task Force Commander. The starage, securiry, and destruction of investigative information shall be consistent with agency policy. At a minimum, information should be maintained in locked cabinets and under the control of ICAC Task Force personnel. Access to these files should be restricted to authorized personnel with a legitimate need to know. Task Force supervisors should ensure that forensic examinations of computers and related evidence aze conducted by qualified personnel that have received specific training in computer forensics. Information Sharing Conventional boundaries are vii4ually meaningless in the electronic world of the Internet and the usual constraints of time, place, and distances lose their relevance. These factors increase the possibility of ICAC Task Forces tazgeting one another, invesrigating the same subject, or inadvertently disrupting an ongoing invesfigation. To foster coordination, collaboration, and communication, OJJDP requires that each ICAC Task Force contribute basic case information to a common database. Federal Guidelines have been established through the Department of Justice's ICAC Task Force Information Sharing Warking Group. The OJJDP Task Force Review Boazd reviewed, modified, and adopted the below information sharing system and procedures. The St. Paul Task Force will comply with these guidelines. 1. Task Force investigators shall contribute basic and case update information on all cases (local, interstate, reactive and proactive) to the Case Deconfliction System maintained through the Law Enforcement Data Exchange (LEDX). 2. Basic case information shall include, but is not limited to: a) Submitting Task Force b) Person submitting informarion D�-//7(�, c) Telephone number for verification purposes d) Date of submission e) Brief synopsis of investigation fl Offender screen name(s) g) Identifiers (URL, FTP, Newsgroup, IP Address) h) True name of suspect (if l�own) i) Other suspect information (if known) j) Undercover officer sFreen name(s) � 1. Case update information shali inciude, but is not limited to: a) Submitting Task Force b) Person submitting informaUon c) Telephone number for verification purposes d) Date of submission e) Date investigation initiated fl Identity of subject(s) including address, date of birth, social security number, address (when available) g) Criminal proceedings (e.g., arrest, indictment, search warrant, conviction, etc.) h) Sentencing information (when available) Each investigator working with the ICAC task force will sign up for access to LEDX via their website. Information on how to gain access will be provided by the unit commander. 1. Each investigator shall query LEDX once they have established an anvestiga6ve interest. For the purposes of the ICAC Task Force Program, an investigative interest is established when there is reasonable suspicion that a crnne has occurred or there is a reason to believe that a screen name or other potentially identifiable entity has engaged in a sequence of activities that is likely Yo lead to the sexual exploitation of a child._Assuming no other active investigaUons are discovered and that reasonable suspicion is present to initiate an investigation, the agency will submit case information to LEDX. Each Task Force should submit this information within 24 hours of inifiating the case or as soon thereafter as possible. 2. If any duplication is found, the initiating investigator is responsible for contacting the other law enforcement agency. 3. Additionally, initiating investigators should aiso contact the U.S. Customs Cyber Smuggling Center (703-293-8005) to ensure there is no duplicarion with regard to their ongoing investigations. Similarly, once an offender has been identified and associated with a lrnown address, contact should be made with the U.S. Postal Inspector responsible for child sexual exploitation offenses whexe the offender resides. D�-//7� Supervision 1. Existing deparhnental supervisory systems and procedures shall apply, with specific emphasis on observation, documentation, and periodic evaluation of cases assigned to undercover investigators. Written d'uectives will reflect the principles of quality case management and ensure that ICAC Task Force activities comply with both agency and ICAC Task Force Standazds. 2. At a minimum, management or supervisory policies and practices shall include: a) review of daily ICAC Task Farce investigative reports; b) periodic review of undercover session recordings; c) d'uect participation in formulating ICAC Task Force investigative plans and establishing investigative priorities; d) development of work schedules including approval of specific overtime expenditures; e) assessment of equipment and training needs; and, fl review and approval of any ICAC Task Force fiscal matters. Selection of ICAC Task Force Personnel W1ule existing agency personnel procedures apply, managers and supervisors should evaluate prospective ICAC Task Force candidates for work history that indicates prior investigative experience, court testimony skill, ability to handle sensitive information prudently, and a genuine interest in the protection of children. Task Force members should be computer literate, knowledgeable regazding child exploitation issues, and be familiar wi��h Federal and State statutory and case law pertaining to ICAC investigations. Prevention and Education Activities Prevenrion education activities are a critical component of the St Pau1 Police ICAC Task Force Program. Supervisors and investigators are expected to develop and lead prevention programs to foster awazeness and provide practical, relevant guidance to children, parents, educators, librarians, and other individuals concerned about child safety issues. However, these presentations shall not depict identifiable victims nor shall they use pornographic or sexually explicit images. Presenters shall not discuss investigative techniques. Media Relations and Releases vs-���� Copies of inedia releases related to this initiative will be forwazded thtough the ICAC Unit Commander to the Public Information Office for dissemination. Copies of radio or video segments and press clippings will be used to promote and sustain public support for ICAC activities and circulated within the Review Board. Media releases relating to prosecutions, crime alerts or other matters conceming ICAC Task Force operations shall not include information regazding specific investigative techniques and should be coordinated (when appiicable) with other Task Force pazlicipants, Federal law enforcement agencies, and State and local agencies involved in the investigation consistent with sound information management and media relations practices. In each case, copies should be provided to 03JDP in a timely manner'. o� l��c� ICAC PROGRAM 0���'i_'TON�T _ . �- INVESTIGATIVE STANDARDS 05 // 7� ra m r+v li F'1lL'!1 .,. � ' Ir 'OZL�?1L10P_S . . . . . . . . . . . . . . . . . . . . . . . . . • • • • • • _ 8�� 1 C :SP M,a, . . . . . . . . . . . . . . . . . . . . . . . . . PaaPC 7 — F A. Jv orxspace and Equipmeni t age 2 B. Case Predication and Prioritization Page 3 C. Record Keeping Page 4 I�. Underccver Investigations Page 5 � E. Evidence Proced'ures Page 6 Lnfortr�ation Shar;ng . . . . . . . . . . . . . . . . . . . . . . . Page 7 Supervision . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Page 8 c�l��t;�n �fT�A_�' '1'ask Force Personnel_ . . . . . . . ?age 9 — -- Community Education and Crime Prevention Activities . . . . . . . . . . . . . . . . . . . . . . . . . . . . Page 10 M�.dia Relations and Releases . . . . . . . . . . . . . . . . Page 11 ICAC Program G�perationai and Imestigative Standards D S Date: ����n���3 � As used herein, the following defi�itior. shall appty; "033DP" is the Office of Juvenile Iustice and Delinquency Prevention. "NCMEC" is the Nafional Center for Missing and Exploited Children. "CEOS" is the Child Exploitation and Obscenity Section of the United States Attomey's Office, of the Departrnent of Justice. "ICAC" is the Internet Crimes Agains± Children prog�am composed of Regional Task Forces and Satellites. "REGIONt1L TASK �ORCE" is defined as an ICAC law enforcement agency -- ---- to T ----- — "SATELLITE" is de:v �s a law enforce�ent agency u a� was selecte3 to receive an OJJDP grant to establish a satellite program. For the purposes of this program, crime is defined as any offense that involves the exploitation of children facilitated by technology. fnvestigative interest is esta'oiished when `�riere is reasonabie suspicio� ihat a screen nazne or other potentially identifiable entity has committed a crune or that entity is engaged in a sequence of acfivities that is likely to result in the commission of a crune. A proaciive investigation is designed to identify, investigate and prosecute affenu�e:s, which may or �ay net inve�ve a specific ±a*get, and reqves on_iine interaction and a significant degree of pre-operative plauning. A reactive ir�vestigation involves the investigation of a complaint of a crime. t2easonad[e suspicion is es`aoiished when s,:f�c:ent facts exist io iead a:aw enforce�eat officez to be:ieve tiia: aa indiviclt:al cr orgariza�on is i^volvec in a dennable criminai activity. Program Operational and Investigative Standards -1- D� // 7Co Fffective Date: 3/08/02 �pac� and C�Se � i ef 1 A. Workspace and Equipment 1. ICAC computers a�d softwaze shal be :eserved fo: the exclusive use by agency designated ICAC personnel. When possible, undercover computers, soflwaze, and online accounts shatl be purchased covertly. No personally �,u�ed equipment skall be use3 in ICAC investigat�aas and all software shall be properly acquired and lice:�sed. 2. ICAC personnel sha11 not use ICAC computers, software ar online accounts for personal use_ __ _ _ _ `_ _ _ _ 3. Absent e�gent or unforeseen circumstances, all ICAC online invesfigations shall be conducted in government workspace as designated by the agency. Exceptions must be approved in advance by an ICAC supervisor. ICAC Program Operational and Investigative -2- D� -/17 t� 3/08/02 Date: aI�QIC3110II Case M ? of ? B. Case Predication and �rioritiza�on 1. Cases may be initiated by referrals from the CyberTipline, Internet service providers, or other law eniorcement agencies, and by information gathered through subject interviews, documented public sources, direct observations of suspicious behavior, public complaints, or by any other source acceptable under agency policies. --------- ------ ---- 2. ICAC supervisors aze responsible for determining investigative priorities and selecting cases Por investigation. Assnming the information is deemed credible, that determination should begin with a�assessment_of victixn risk and then consider_other factors_such_as_ - jurisdiction and known offender behauioral characterisrics. The following prioritization scale shall be considered: a) A child is at immediate risk of victimization b) A child is vulnerable to vicfimization by a known offender c) A lmown suspect is aggressively soliciting a child(ren) d) Manufacturers, distributors or possessors of images that appear to be home photography with domiciled children e) Aggressive, high-voluxne child pornography manufacturers or distributors who either are commercial distributors, repeat offendezs, or specialize in sadisfic images fl Manufacturers, distributors and solicitors involved in high- volume trafficking or belong to an organized ckuld pornography ring that operates as a criminal conspiracy g) Distributors, solicitors and possessors of images of child perno�aphy " h) Any othei' forxn of child victiinization. Program Operational and Investigative Standards -3- 05 //-Z� Date: 4 " 3/08/02 Record Keep Case ? of 1 C. Record I�eeping 1. ICAC units shall be subject to e�sting agency incident reporting procedures and case supervision systems. At a minimum, a unique identifier shall be assigned to each ICAC case. 2. Participating agencies will report �rogram accomplishments using the ICAC Monthly Performance Measures Report. This report is due to the ICAC Coordinator on the 10�` of every month and does not replace the semi-annu�i progress report required by the Office of 7ustice Program's Financial Guide. ICAC Program Operational and Zrrvestigatzve Standards ., _4- " ` D S- //7Cv D. Undercover Invesfigafions . l. Cazefully man�ged undercover operations conducted by well-tr�ained o�cers are among the most effective techniques available to law enforcement for addressing ICAC offenses. Undercover operarions, when executed and documented properly, collect virtually unassailable evidence regar�ing a saspec±'s p*edilection io exploit chi?dren. 2. Investigators will be supplied with appropriate training and receive a copy of the ICAC Operational and Investigative Standazds --- - 3. � �C�investigahons shal e con ucte m a manner consis en wi the principies of law and due process. See, for example, Jacobson v. U.S., 503 U.S. 540 (1992); U.S. v. Archer, 486 F.2d (2 Cir.1973); U.S. v. Gamache 156 F. 3d 1(l Cir. 1998); U.S. v. Poehlman 217 F. 3d 692 (9� Cir. 2000). ICAC investigators are encouraged fo work in conjunction with their local prosecutors. - 4. The following minimum standards apply to ICAC investigations: a) Only sworn, on-duty ICAC personnel shall conduct ICAC investigations in an undercover capacity. Private cifizens shall not be asked to seek out investigative targeis, nor shail they be authorized to act as police agents in an online undercover capacity. b) ICAC personnel shall not, electronically upload, transmit, or forwazd pornographic or sexually explicit unages. c) Other than photographs of law enforcement officezs who have provided tneir informed written consen�, no actuai human unages shall be uploaded, transmitted, or forwarded by ICAC personnel. d) During online dialogue, undercover officers should ailow i.he investigative tazget to set the tone, pace, and subject matter of Ehe online conversation. Image transfer shall be initiated by the target. ' ICAC Program Operational and Investigative -5- 05�-/l7(P e} undercover oniine activiry si3aii be recardeci and doe,unented. ,�ny depar�ares uo�'. 'uliS a611C� G�llB i0 II11Si:a; Ci2Ciii'i1S`uutCeS shall be documented in the relevant case file and revi�wed by an _ ICA� supervisor. Effective Date: 3/08/02 nce Procedures � Page 1 of Case Management E. Evidence Procedures 1. The storage, security, and destruction of investigative information shall be consistent with agency policy. Access to these files should be restricted to authorized pexsonnel. __ _ _ __ _ _ __ __ _ 2. ICAC supervisars should ensure_ that qualified personnel conduct forensic examinations of computers and related evidence. a. Child pomography is contraband and should be maintained pursuant to each agency's policies regarding such. Absent a court order specifically ordering otherwise, evidence containing child pornography shall not be released to any defendant or representative thereof. b. When providing evidence containing child pornography ±e another law enforcement agency, such evidence must be hand-delivered, digitally protected or sent via a delivery service which tracks the - shipment. � ICAC Program Operational and Ircvestigative Standards -o- 3/08/02 Date: 1 of 1 Information Shari 1. Conventional boundaries are vixtually meaningless in the electronic world of the Intemet and the usual constraints of time, place, and distauce lose their relevance. These factors increase the possibility of ICAC agencies targeting one another, investigating the same subject, or inadvertently disrupting an - ongoing investigatior�. To foster coordination, collaboration, and co�nunication, each ICAC agency must contsibnte basic case infar�ation to a common database. 2. Each ----- — ------ — as designated by the ICAC Boar o ixectc submitted at the earliest practical opportunity. 3. _ If any common target is_identified, the initiating ICAC agency is responsible for contacting the other law enforcement agency targeting the suspect. 4. Initiating ICAC agencies should also consider contacting other local, state, and federal agencies which may be involved in similar investigations. ICAC agency shall contribute case information on all active �tion (local: inter state, reacfive and proactive) to a common databa ICAC Program Operational and Investigative Standards -7- dS Each ICAC agency sha11 have supervisory systems and procedures, which shall pLOVide for observation, documentation, and periodic review of ICAC activity. Such system should comply witki the principles of quality case management and ensure that ICAC activities comply with both agency and ICAC Standards. 2. ICAC agencies x�ay subiait any proposed ope*ations to the Bo�rd for review. To assist the Board in its review, the proposals shall be submitted to the Board Coordinator at least 21 days in advance of the next regularly scheduled meeting. Proposals should be submitted using the following format and include the following information: _ _ _ , ------ --"-"------ -� goals an� o �ectrves o��e operahon; b) personnel assigned and/or responsible for investigation; c) duration of operation, i.e., projected start and stop dates; - d) offenses targeted far investigation; _ _ ---- �- � • � ' vesri ahve targets and limrtatron on gove_Tnment contac ; e) m g fl operation scenario and techniques (language for contact letters and advertisements must be included with proposal); g} liaison and/ox case referral procedures with Federal law enforcement agencies (include the names of Federal agents when known) and; h) other relevant information 3. The Boazd, at its discretion, may suggest amendments to the original proposal following consultation wifh the presenting agency. ivofice oi tue resuits of the review of investigative proposals from satellites will be communicated to the sateiiite represenraiives oy tne Boarn �hair. 4. The ICAC submitting the proposal for review may seek the support of 5he Board. ICAC Program Operational and Investigative Standards � D� //7l0 Effecuve Date: 3/08/02 { Page i of 1 Selection of �CAC Task lFQree Fersomnel Managers and supervisors shoutd evaluate prospective ICAC candidates for work history that indicates prior investigative experience, court testimony skills, ability to handle sensitive information prudently, and a genuine interest in the protection of children. " ICAC Program CS`perational and Investigative Standards -9- o�-ii�� l. Prevention education activifies are a critical camponent of the OJJDP ICAC ` Program. ICAC agencies should foster awareness and provide practical, relevant guidance to children, parents, educators, librarians, and other individuals concerned abont child safety issues. 2. Presentations to school sta£f, parents, and community gzoups aze excellent ways to promote awazeness. These presentations shall not depict identifiable victims, not otherwise in the public domain; nor shall they use pomographic or sexually explicit iznages. Presenters shall not discuss confidential investigative tecluuques. - ------- 3. -- I�Fo member of � IC�C - T`ask Force may en orse any produ�oi service without the express consent of an OJJDP Program Manager. While appearing at pubiic presentations, iCfi� memoers may indicate a preierence for a product or service, but to avoid an implicit endorsement, such ICAC members should indicafe adequate alternatives. fCAC Program Operational and Investigative Standards -10- � D� //7 Media releases relating to prosecutions, crime alerts or other matters concerning ICAC operations shall not include information regarding confidentia) investigative --- ----- --�- techriiques shou�ld be coo�lcr ivated app icaT�e wi h o er -- pazticipants, Federallaw enfarcement agencies, and 5tate and local agencies involved in tne investigation consistent with sound information management and media relations practices. ICAC Program Operational and Investigative Standards , n -11 -