Domestic Investigations and Operations Guide, FBI, 2008
Download original document:
Document text
Document text
This text is machine-read, and may contain errors. Check the original document to verify accuracy.
, . ALL INFOIUIATION CONTAn~D, HEREIN IS UNCLASSIFIED DATE 07-06-2009 BY UC 60322 LP/STP/SZ UNC~ASSIF'IED FO;R OFFICIAL USE ONLY Domestic Investigatiol1s a.nd Operations Guide FederaIBu<re~u of Investigation '(FBI) Decem.ber16,2008 .This.is a privileged document that cannot be released in whole or in part to persons or agencies outside the Federal ~ureau ofInv~stigation, nor can it be republished in whole or in part in any \'{ritten form not·containing this statement, including general use pamph)et~, without the approval ofthe Director of the federal Bureau of Investigation. UNCLASSIFIED FOR OFFICIAL USE ONLY c', UNCLASSIFIED - FOR OFFICIAL USE ONLY Domestic Investigations and Operations Guide GENERAL INFORMATION: Questions or comments pertaining to the DIOG can be directed to: The Deputy Director's Office or FBIHQ, Director's Office, Resource Planning Office (RPO), Division_[OO] Corporate Policy Office (CPO) Division Point of Contact: I bE> b 7C (NOTE: Documentis a new publication; no previous DIOG versions are available) PRIVILEGED INFORMATION: Any use of this document, iJ.lcludingdirect quotes or identifiable paraphrasing,will be marked with ,the following statement: This is a privileged document that cannot be released in whole or in part to persons or agencies outside the Federal Burea,u of Investigation, nor can it be republished in whole or in part in any written form not containing this statement, including general use pamphlets, without the approval of the Director of the Federal Bureau ofInvestigation. FOR OFFICIAL FBIINTERNAL USE ONLY-DO NOT I;>ISSEM~NATE FOR OFFICIAL USE ONLY ii UNCLASSIFIED-FOR OFFICIAL USE ONLY UNC~ASSIFIED - FOR OFFICIAL US~ ONLY Domestic Investigations and Operations Guide Table of Contents (U) Preamble 1. (U) Scope. and .Purpose.. ~."' 1. L 1,.2. 2. 2.2. 2.3. 2.4. 2.5. 2.6. 2.7'. 2.8. 2.9; 2.io. 1 · (U) Scope (U) 'Purpose : (U) General' Authorities and.Principles 2.1. 3. :.•....• ~...........•...................•...•.........•.......•........................................ xi 1 1 ~ ~ 2 (U) Scope of the Attorney General's Guidelines for Domestic FBI Operations 2 (U) General FBI Authorities under AGG-Dom .3 (U) FBI as an Intelligence Agency .3 (U) FBI Lead Investigative Authorities ; , .4 , 10 (U) Status as Internal Guidance (U) Departures from the AGG-Dom 10 (U) Departures from the DIOG : , 11 (U) Other FBI Activities Not Limited by AGG~Dom 11 '(D) Use of <:;las.sifie~JJ!v~stiga~iveTech!1ologie~" ,"',.."." '-.,." ,.,.., ,,,, ,, ,.. 1~ (U) Application of AGG-Dom and DIOG ; 12 (U) Core Values, Roles, and Responsibilities · 3.1. 3.2. 3.3. ;.. 13 (U) The FBI's Core Values : ~ (U) Deputy Director Roles and Responsibilities (U) Special Agent/hitelligence AnalystJTask Force Officer/FBI Contractor/Others Roles' and Responsibilities .3A. (D) Supervisor Roles ~nd Responsibilities 3.5. (U) Chief Division Counsel Roles and R~sponsibilities , 3.6. (U)'Office of the General Counsel Roles and Responsibilities : 3.7. (D) Corporate.policy Office Roles and Responsibilities ; ~ 3.8. (U) Office of Integrity and Compliance Roles anq Responsibilities 3.9. (U) Operational Program Manager Roles arid Responsibilities.., 3.10. (D) Division Comeliance Officer Roles and Respo~sibilities , 3.11. (U) FBI Headquarters Approval Levels 4. (D) Privacy and Civil Liberties t and Least Intrusive Methods 4.1-. 4-.2. 4.3. 4.4. 5. (U) Civil Liberties and Privacy (U) Protection of First Amendment Rights (U) Equal Protection under the Law , , .(U) Least Intrusive Ml'<thod.~ ; (U) .l\.ssessments 5.1, 5.2, 5.3. 5.4. 5.5. 5.6. ~ 13 . 1·4 14 15 18 18 19 19 .l9 20 20 2i : , : ~ : 21 24 :..30 34 39 (U) Overview , ; 39 (U) Purpose and Scope · 40 .(U) Civil Liberties and Prlvacy 43· (U) Authorized Purposes (AGG-Dam, Part ILA.2.-Authorized Activities) ,44 (UI/FOUO) Standards for Initiating· or Approving an Assessment , 45 (U)Duration, Approval, Notice, Documentation, File Review and Responsible Entity45 iii UNCLASSIFIED-FOR OFFICIALU~m ONLY UNCLASSIFIED - FOR OFFICIAL USE ONLY Domestic Investig~tions and Operations Guide (0) Sensitive Investigative Matter I A~ademic Nexus I Buckley Amendment .....•.......57 (UIIFOUO) Standards tor Initiating or Approving the Use oran Authorized, Investigative Method 58 5.9. (U) Authorized,lnvestigative Methods-in Assessments and Pr~dicated .Investigations.58 7I 5.10. (0) Investigative Methods Not Authorized During Assessments 5.11. (U/~OUO) F~I National Collection ~equirements 72 5.12. (Ul/FOUO) FBI Field Office Collection Requiremellts ; 73 : 73 5.13. (U) Retention and, Dissemination,of Privacy Act Records 5.14. (0) Assessment file Records.Management and Retentio~ :..74 5.7. 5.8. 6. (U) Prel~minl;lry Investigations .. 6.1.. (U) Overview : , 76· , , 76 76 ,..;..76 77 ,..78 78 78· · : (U) Purpose and.Scope (LJ) Civil Liberties a,nd Privacy ; (U) Legal Authority 6.5. (U) Predication 6.6. (UlIFOUO) Stand~rds for Initiating or Approving a Preiiminary Investigation (j,7. (V) Duration, Approval, Notic~, Documentation and Fiie Review , , 6.~. . (UlIEOVO) Standards for Initiating or Approving the Vs~ oran Authorized . . ·1 nvestigative Method : :.: , :, : : .6.9. (ll) Authorized Investigative Methods in Preliminary Investigations 6.l0. (D) Sensitive Investigative Matter I Academic Nexus I Buckley Amendment ., 6.11. (V) Program Specific Jnvestigative Requirements , 6.2. 6.3. 6.4. 7.- (U) Full Investigations ., , , (V) Overview ; (U) Purpose an~ Scope ;, , : ; (V) Civil Liberties and Privacy , (V) Legal Authority , : (D) PrediCation ; , ; (DIIFOUO) Stand.aids for Initiating or Approvi.ng a'FuJi Investigation (V) Duration, Approval, Notice, Documentation and Fil~ Review .(VIIFOUO) Standards for Initiating or Approving the Vse of an Authorized Investigative' Method 7,9. (U) Authorized Investigative Methods in Full Investigations 7.1 O. (U) Sensitive InvestigatlveJMatterl Academic Nexlls lBuckley Amendment 7.11. (D) Pro~ram SpecificInyestigative Requirements (U) Enterpris~ Inve.!!tigations 8.1. 8.2. 8.3. 8.4. 8.5. 8.6. , 9.1. , (U)·Ov.erview 83 84 ~ ,.., 85 85 85 86 87 88 : 88 90 90 92 93 : : 94 (D) Overview , : , : , : (U) Purpose, Scope and Definitions (U) Civil Liberties an~ Privacy : , (U) Legal Authority , .(U) Predication , ~ , (U) Duration, Approval, Notice, Documeritationand File Review 9.. (U) Foreign Intelligence; 81 85 7.1. 7.2. 7.3. 7.4. 7.5.. 7.6. 7.7. " 7.8. 8. 80 ; , 94 94 94 95 95 96 : 98 , 98 iv UNCLASSIFIED-FOR OFFICIAL USE ONLY UNCLASSIFIED - FOR OFFICIAL USE ONLY Domestic Investigations and Operations Guide 9.2. 9.3. . 9.4. 9.5. (U) Purpose and Scope , 99 (D) Civil Liberties and Privacy 99 (U) Legal Authority 100 . (UlIFODO) Duration, Approval, Notice, Documentation, File Review and FBIHQ Standards for Approving the Initiation of Positive Foreign InteiligenceInvestigationsl0l 9.6. (UlIFOVO).Standards for Initiating or Approving the Dse of an Authorized Investigative Method i : : 102 9.7. (D) Authorized Investigative Methods in Foreign Intelligence Assessments:and Predicated Investigations 102 9.8. (DIIFODO) Investigative Methods Not Authorized During Foreign Intelligence Investigations , 104 9.9. (V) Sensitive Investigative Matter 104 9.10. (V) Approval and Notification · 105, 9.11. (D) Retention of Information , 107 10. '(D) Sensitive Investigl;ltive Matter I Academic Nexus 10.1. (D) Overview 10;2. (D) Purpose, Scope and Definitions , 10.3.. (UIIFOUO) t'actorsto Cpnsider Wh~l1lnjti.li.tihg9r Appr;.bvinglln Inves!igativ~ Actiyity Involving.a Sensitive Investigative Matter : ~ 10.4. (D) Duration, Approval, Notice and Documentation ; 10.5. (UlIFOUO) Distinction Between Sensitive Investigative Matter and Sensitive Circumstance , i l0S 108 108 i 09 110 111 11. (U) Investigative Metho~s ~ 112 11.1. (l,J) Overview , 1·12 II.Ll.. (U) Least Intrusive Method 112 11.2.. (V) Authorized Investigative Met~ods in Assessments and Predicated Iiwestigationsl13 ,.. 113 11.2.1. (D) AuthQrized Investigative Methods in Assessments 11.2.2. (U) Authorized Investigative Methods in Preliminary Investigations 113 11.2.3. . (D) Authorized Investigative Methods in Full Investigations 114 1].2,lt (U) Particular Investigative Methods .. i ~ ll5 11.3. (V) Investigative Method: Mail Covers : .116 1-1.3.1. 'CD) Summary 116 ,11.3.2. (D) Legal Authority : 116 11.3.3. (D) Definition of Investigative Method ~ , 116 11.3.4. (U) Standard for Use and Approval Requirements for' Investigative M~thod ] 17 1'1.3.5. (V) Duration ofApproval 119 11.3.6; (D) Specific Proce9ures , : 119 11.3.7. (l) Compliance and Monitoring 119 11.4. (D) Investigative Method: Physjcal searches of persoriaI or teal property where a warrant or court order is not legally required because there is no reasonable expectation of privacy (e.g., trash covers) , ; 1~O 11.4.1. (D) Summary , : 120 .11.4.2. (V) Legal Authority " , 120 120 11.4.3. (U) Definition of Investigative Method v UNCLASSIFIED';FOR OFFICIAL T,J8E ONLY UNCLASSIFIED - FOR OFFICIAL USE ONLY Domestic Investigations and Ope~tions Guide 11.4.4. (U/IFOUO) Standards for Use and Approval Requirements for Investigative .. Method : , 121 11.5. (V) Investigative Method: Consensual Monitoring of Communications, including , consensual c:omputermonitoring , :.: : 122 . I 1.5.1. (U) Summary : 122 11'.5.2. (V) Legal Authority : 122 11.5.3. (U) Definition of Inv~stig?tiveMethod : ~ .l22 11.~.4. (D) Standards for Use and Approval Requirements for Investigative Method 123 11.5.5. (U) Duration of Approval , : .127 11.5.6. (UlIFOUO) Specific.Procedures 128 '1 1:5.7. (UI/FOUO) Compliance and Monitorlng : , 129 11.6. (U) Investigative Method: Use of closed-circuit television, direction finders, and other monitoring devices (Not needing a Court Order) , , 130 1~.6.I. (U) Summary , , 130 11.6.2. (U) Legal Auth6rity , 130 11.6.3. (U/IFOUO) 'Definition of Investigative Method , 130 11.6.4. (UlIFODO) Standards for Vse and Approval Requirements for Investigative • : : , 131 . Method ! 1,(,);5, (lJ)DurationofApproval , , 132 I 1.6.6. (UI/FOUO) Specific 'Procedures 132 11 . 6~7. (UlIFOUO) Compliance and Monitoring , 133 11.7. (U) Investigative Method: Polygraph 134 11.7.1. .(U)'Summary , 134 11.7.2. (U) Lega,l Authority : " ~ ,.. 134 1'1.7-.3. (V//FOUO) Definition of Investigative Method 134 11.7.4. (UI/FOUO) Standards for Vse and Approval Requirements for Investigative Method , 134 1'1'.7.5. (U) Durat.ion of Approval ·:134. 11.7.6. (U/IFOUO) Specific Procedures : 135 11.7.7. (U/IFOUO) Compliance and Monitoring 135 11.8. (D) Investigative ,Method: Undercover Operations 136 11 ;8:1. (U) Summary 136 11.8.2. (U) Legal Authority .: 136 11.8.3., (UlIFOUO) Definition ,of Investigative Method 136 (UlIFOUO) Distinction Between Sensitive,Circuinstanc~and Sensitive Investigative Matter: 137 11.8.4. (UlIFOUO) Standards for Use ami Approval Requirements for Investigative Method .137 11.8.5. (U) Duration of Approval 139 1.1.8.6. (U) Additional Guidance, : 139 11.8.7. (U//FOUO) Compliance and Monitoring, and Reporting Requirements 139 11.9: .(U) Investigative Method: Compulsory process as authorized by law, including grand jury subpoenas and other subpoenas, National Security· Letters : 140 11.9.1. (U) Federal Grand Jury Subpoena , , 140 11.9.2. (U) Ad.ministrative Subpoena : 152 1. ] .9.3. (U) National Security Letter : : 1S8 11.9.4. (U) Business Record Under FISA ; 165. . . vi, UNCLASSIFIED-FOR OFFICIAL USE ONLY UNCLASSIFIED - FOR OFFICIAL USE ONLY Domestic Investigations and Operations Guide 11.10. (D) Investigativ~ Method: Accessing stored wire and electronic communications and transa~tional records in confonnity with chapter] 21 of title 18, United States Code167 11.10.1. (U) Summary 167 11.10.2. (U) Legal Authority 168 l"l;] 0.3. (U) Definition ofInvestigative Method I68 ·11.10.4. (0) Approval Requirements for Investigative Method ; , I 79 11.10.5. (U) Duration of Approval 179 11. ~ 0.6. (U//FOUO) Specific Procedures : , 179 : 180 11.10.7: (U) Notice and Reporting Requirements 11.10.8. (U) Other Applicable Policies 180 (U) Stored Communications Quick Reference Guide 511/2008 180 11.11. (U) Investigatiye Method: Pen Registers and Trap and Trace devices in conformity with chapter 206 of Title 18, United States Code, and the Foreign Intelligence Surveil lance Act , , 181 ·11.l1.1. (U) Summary , 181 11.11.2. (l)"Legal Authority : 181 ILl 1.3. (U) Definition oflri.vestigative Method , 181 11.11.4. (U) Standards for Use and Approval Requirements for Investigative Method 181 11.11.5. (U)Duratioh,ofApproval ; · ·..: 184 1] .11.6. (UlIFOUO) Specific Procedures 184 ILl r.7. (U) Use and Dis~emination of Information Derived from Pen Register/Trap and Trace Authorized Pursuant to FISA , 185 11.11.8. (U) Notice and Reporting Requirements 186 11:11.9. (U) Special Circ~mstances : 186 11.12. (U) Investigative Method:' Electronic Surveillance under Title III and under FISA ..:193 , 193 11.12.1. (U) Summary ; : 11.12:2. (U) Legal Authority ; : 193 11.12.3. (0) Definition ofInvestigative Method 193 11.12.4. (0) Standards for Use'and ApprovaLRequirements for Investigative Method 19,3 11.12.5. (U) Duration ofApproval 1'96 11.12.6. (U) Specific Procedures : ; ,196 11.12.7. (U) Notice and Reporting R~qujrements ' , , 199 1'1.12.8. (U) Compliance and Monitoring ; 200 11.12.9. (U) Special Circumstances 200 11.12.10. (D) Other Applicable Policies : , 200 11.13. (U) investigative Method: Physical searches, including mail openings, requiring . judicial order or warrant 20 I 11.13.1. (U)Summary , : ; 201 11.13.2. (U) Legal Authority , .201 11.13.3. (U) Definitjon of Investigative Method , : 201 11.13.4. (U) Approval Requirements for Investigative Method 204 J L] 3.5. (U) Duration of Approval ; 204 1L 13.6. (u) Specific Procedures ; ' : 204 1Ll4. (U) Investigative Method: Acquisition of foreign intelligence information in conformity with Title VII of the Foreign Intelligence Surveillance Act..,.., 213 11.14.1. (U) Summary ..: : .213 vii UNCLASSIFIED-FOR OFFICIAL USE ONLY UNCLASSIFIED - FOR OFFICIAL USE ONLY Domestic Investigations a~d Operations Guide 11.14.2. (U) Legal Authority , , 11.14.3. (U)Definition of Il1vestigativeMethod , 11.14.4. (UlIFOVO) Standards for Vse and Approval Requirements for Investigative Method , 11.14.5. (V) Duration of Approval 11.14.6. OJ//FOVO) Specific Collection Procedures for Title VTT 213 213 213 213 2~3 12. (U) Assis~ance to Other Agencies ~ : 2l6 12.1. (U) Overview 216 12.2. (V) Purpose and Scope , 216 12.3. (VIIFOVO) Standards for Providing and Approving Investigative Assistance to Other Agencies , 217 12.4. (D) Documentation and'Record Retention 217 12.5. (V) Duration, Approval/and Notice for Investigative Assistance to Other Ag<mcies ..217 12:6. (U/IFOUO) Standards for Providing and Approving Technical Assistance to Foreign, State, Local and Tribal Agencies , 225 13. (U) Extraterritorial Provisions 13.1. (V) Overview , ; , 13.2~ '(U)-Purpose'and Scope 13.3. (U) Legal Attache Program : : : 227 227 221' 228 : ; 0' 14. (U) Retention and Sharing of Information \4.1. (U) Purpose and Scope ; 14.2. (U) The FBI's Records Retention Plan, and Documentation , , 14.3. (U) Information Sharing , 14.4. (U) Information Related to Criminal Matters A. (U) Coordinating with Prosecutors , B: (U) Criminal Matters Outside'FBI Jurisdiction C: (D) Reporting of Criininal Activity~ 14.5. (U) Information Reiated to National Security and Foreign 11ltelligence Matters (D) Department of Justice , , , (D) White House , ' ,~ 14.6. (U) Special Statutory Requirements ~ ; ;229 229 229 230 231 231 231 232 .232 232 233 235 15. (D) Intellige~ce Analysis and Planning 236 15.1, (U) Overview 236 15.2. (V) Purpose and Scope 236 237 15.3. (U) Civil Liberties and Privacy 15.4. (U) Legal Authority , 237 15.~. (UI/FODO) Standards for Initiating or Approving Intelligence Analysis and Planning238 15.6. (V//FOUO) Standards for Initiating or Approving the Use of an Authorized Investigative Method in IntelligenceAnalysis and Planning , 238 238 15.7. (U) Authorized Activities in Intelligence Analysis and Planning 16. (U) Undisclosed Participation (l;JDP) , 16.1. (D) Overview 16.2. (D) Purpose, Scope, and D~finitions , , viii UNCLASSIFIED.:FOR OFFICIAL USE ONLY 242 242 243 UNCLASSIFIED - FOR OFFICIAL USE ONLY Domestic Investigations and Operations Guide J6.3. .(U) Requirements for Approval 16.4. (U) Supervisory Approval Not Required 16.5. (UI/FOUO) Standards for Review and Approval 16.6. (U) Requests for Approval of Undisclosed Participation 16.7. (D) Duration i 6.8". (UIIFOUO) Sensitive Oversight Review Committee .245 248 249 .250 251 251 : < 17. (U) Otherwise Illegal Activity : ~ 17.1.. (D) Overview 17.2. (U) Purpose and Scope : 17.3.. (UIIFOUO) OIA in Undercover Activity 17.4. (UI/FOlJO).OIA for'a Confidential Human Source 17:5. (UIIFOUO) Approval ofOIA by a Special Agent in Charge 17~6. (UI/FOUO) Standards for Review and Approval ofOIA 17.7. (U//FOUQ) OIA not authorized 17.8. (U//FOUO) Emergency SitJ.\ations ; < ix . UNCLASSIFIED-FOR OFFICIAL USE ONLY ~ ~., , , 256 ,.256 256 256 257 257 258 258 258 UNCLASSIFIED - FOR-OFFICIAL USE ONLY , Domestic Investigations and Operations Guide List of Appendices Appendix A: The Attorney General's Gu~delines for 'Domestic FBI Operations A-I Appendix B: ,Executive Order 12333 B-l , , , Appendix C: Sensitive Operations Review Committee , C-I Appe~dixn: Superceded Documents. and NFIf, MIOG, and MAOP Sections D-I Appendix E: Key Words, Definitions, and Links lj:;.1 , , , Appendix F: Acronyms.•••.; F-l Appendix G: Investigations Manual.- (::Iassified Provisions, ,.•...., , G-l r x UNCLASSiFIEI)-FOR OFJfICL\L USE QNLY UNCLASSlFIED - FOR OFFICIAL USE ONLY Domestic Investigations and Operations Guide (U) Preamble December I,2008 (02 As the primary investigative agency of the federal government, the FBI has the authQrity and responsibility to investigate all violations of federal law that are not exclusively assigned to another federal agency. The FBI is'further vested by law and by Presidential directives with: the primary role in carrying outcriininal investigations and investigations of threats to the national security of the United States. This inCludes the lead domestic role in investigating international terrorist threats to the United States, and in conducting counterintelligence activities to I;ounter foreign entities' espionage an9 intelligence efforts directed against the United States. The FBI is· also vested with important functions in collecting foreign infelligence as a member agency of the Onited States Intelligence Community (USIC). (AGG-Dom, Intropuction) (U) While investigating crime, terrorism, and threats to the national security, and collecting foreign intelligence, the FBI must fully comply with all laws and regulations, including those designed to protect civil liberties and privacy. Through compliance, the FBI will continue to earn the support, confidence and respect of the people of the United States. (U)To assist tneFBIin,itsmission, theAttomey General signed The Attorney General ~s Guidelinesfor Domestic FBl Operations (AGG-Dom) on September 29, 2008. The primary purpose of the AGG-Dom and the'Domestic Investigations and Operations Guide (OlOG) is.to standardize policy so that criminal,national security, and foreign intelligenct: investigative activities are accomplished in a consistent manner, whenever possible (e.g., same approval, notification, and reporting requirements). In addition to-the 0I0G, each FBlHQ substantive Division has a policy implementation guide (PO) that supplements this document. Numerous FBI mal1uals, electronic communications, letterhead memoranda, and other policy documents are incorporated' into the OlOG and the substantive Division policy implementation guides, thus, c~msolidatingthe FBI's policy guidance. The FBIHQ Corporate Policy Office (CPO) plays an instrumental role in this endeavor. Specifically, the CPO maintains the most current version of the OlOG on its website. AsJederal statutes, executive orders, Attorney General guidelines, FBI , policies, or other relevant autho~ities change, CPO will electronically update the DIOG af!;er appropriate coordination and required apprqvals. (U) The changes implemented by the maG should better equip you to protect the people of the United States against crime and threats to the national security and to collect foreign intelligence. This is your document, and it requires your i,nput so that we can provide the best service to our nation. If you discover a need for change, please.forward your sugges~ion to FBIHQ CPO; ,(U) Thank you for your outstanding service! Robert S~ Mueller, III Director xi UNCLASSIFIED-FOR OFFICIAL USE ONLY UNCLASSIFIED - FOR OFFICIAL USE ONLY J)omestic Investigations and Operations Guide 1. (U) S~ope and Purpose , 1.1. (0) Scope (D) Tile DIOG applies to all investigative activities and intelligence collection activities conducted by the FBI within the United States or outside the territories of all countries. This . policy document does not apply to investigative and intelligence coll.ection activities ofthe.FBI in foreign countries; those are governed by The Attorney General's Guidelines for Extraterritorial FBI Operations. ' 1.2. (D) Purpose (U) The purpose of the DIQG is to standardize policy so that criminal, "national security, and foreign intelligence investigative activities are consistently and uniformly accomplished whenever possible (e\g" same approval, notification, and reporting requiremen(s). (U) This policy document also stresses the importance of oversight and self-regulation to .ensure that all investigative and intelligence collection activities are conducted within Constitutional and statutory parameters and that civil liberties and privacy are protected. (U)-Inaddition-to this policy ct.ocurrierit,eacIiFBIHQsubstantive Division·has a.' PG that supplements the DIOG. As a result, numerous FBI manuals, electronic communications, letterhead memoranda, and other policy documents are incorporated into the mOG and Division PGs, dius, consolidating F~I policy guidance. 1 UNCLASSIFIED-FOR OFFICIAL USE ONLY UNCLASSIFIED - FOR OFFICIAL USE ONLY Domestic Investigations and Operations Guide 4. (U) General Authorities and Principles , 2.1. (U) Scope of the Attorney General's Guidelines for Domestic FBlOperations (0) The Attornev General's Guidelines for Domestic FBI Operations (AGG-Dom) apply to investigative and iptelligence collection activities conducted by the F~T within the United States, in the United States territories, or outside the territories.of all countries. They do ~ot apply to investigative and 'intelligence collection·activities of the FBI in foreign countries, whjch will be governed by the Attorney General's Guidelinesfor Extraterritorial FBI Operations, when published. (Reference: AGG-Dom, Part LA.) (lJ) The AGG-Dom replaces the following six guidelines: • (U) The Attorney General's Guidelines on General Crimes, Racketeering Enterprise and Terrorism Enterprise Investigations (May 30, 2002) • (U) The Attorney General's Guidelinesfor FBINational Security Investigations and Foreign Intelligence Collection (October 31, 2003) • (U) The Attorney General 's Suppl~mentcll Guid¢lines for Collection, Rerention, and bissembiatfon ofForetgn I~telligence (November 29; 2006) • (U) The Attorney General Procedure for Reporting and Use ofInformation Concerning' Violations ofLaw and Authorization for Participation in Otherwise Illegal Activity in FBI 'Foreign Intelligence, Counterintelligence or International Terrorism Intelligence Investigations (August 8, 1988). • (U) The Attorney (leneral.'s Guidelinesjor Reporting on Civil Disorders and Demonstrations Involving a Federal Interest (April 5, 1976) • tU), The Attorney General's Procedures for Lawful. Warrantless Monitoring of Verbal Communications (May 30, 2002) [only portion applicable t9 FBI repealed]' (U) The Attorney General will be issuing a separate set of new guidelines for extraterritorial operations, the Attorney General's Guidelinesfor Extraterritorial FBI Operations. However, certain of the existing guidelines that are repealed by the AGG-Dom currently apply in part to extraterritorial operations, including the Attorney General's Guidelines for FBI National Secur.ity Investigations and Foreign Intelligence Collection, and the Attorney General Procedure for Reporting and Use ofInformation Concerning Violations ofLawahd Authorization for Participation in Otherwise Illegal Activity in FBI Foreign Intelligence, Coil11teril1telligence or Interflational Terrorism Intelligence Investigations. To ensure that there is no gap in the existence of guidelines for extraterritorial operatioI!s, these existing guidelines will remain in effect in their applicatioi1 to extraterritorial operations until ~he Attorney General's Guidelines for Extraterritorial FBI Operations are issued and take effect, notwithstanding the general repeal ofthese existing.guidelines by the AGG-Dom. (D) Also, the classified Attorney General Guidelines for Extraterritorial FBI Operation and Criminal Investigations (1993) will continue to apply. to FBI criminal investigations, pending the execution of the new guidelines for extraterritorial operations, as discus~ed 'above. Finally, for national security and foreign. intelligence investigations, FBI investigative activities will continue to be processed as set forth in the classified'Memorandum o(Understanding Concerning 2 UNCLASSIFIED-FOR OFFICiAL USE ONLY UNCLASSIFIED - FOR OFFICIAL USE ONLY DomesticInvestigations and Operations Guide Overseas and Domestic Activities.olthe Central Intelligence Agency and the Federal Bureau ot Investigation (2005). 2.2. . (U) (;eneral FBI Authorities under AGG-Dom (U) The AGG-Dom recognizes four broad, general FBI authorities. (AGG-Dom, Part I.B.) A. (U) Condu~t Investigations and Collect Intelligence and Evidence (U) The FBI is authorized to collect intelligence and to conduct investigations to detect, obtain information about, and prevent and protect against federal crimes and threats to the national security and to collect foreign intelligence, as provided in the DIOG (AGG-Dom, Part II). (V) By regulation, the Attorney General has directed the FBI to:inves~igateviolations of the laws of the United State~ and collect evidence in cases in which the Vnited States is or may be a party in interest, except in cases in which such responsibility is by statute or otherwise specifically assigned to another investigative agency. The FBI's authority to investigate and collect evidence involving criminal drug laws of the U.nited States is concurrent with such authority of the Drug Enforceplent.Admihistration (28 C.F.R.§ 0.85[a]). B.. (U) P!"()vi<l~.!nyestigative A.~sistap.ce (V) The FBI is authorized,to provide. investigative assistance to other federal, state, local, or tribal agencies, and foreign agencies as provided in Section 12 oftheOlOG (AGG-Dom, Part III). C. (V) Conduct Strategic Analysis and Planning (U) The FBI is authorized to conduct intelligence analysis and planning as provided in Section 15 ofthe OlOG (AGO-porn, Part IV). D. (V) Retain and Share Inf~rm~tion (U) The FBI is authorized to retain and share information obtained pursuant to the AGGDom, as provided in Section 14 of the OlOG (AGG-Dom, Part VI). 2.3; (U) FBI as an Intelligence Agency (U) The FBI is an intelligence agency as well as a law enforcement agency. Its basic functions accordingly extend beyond limited investigations of discrete matters, and include broader analytic and planning functions. The FBI's responsibilitics in this area derive from vilrious administrative and-statutory sources. See Executive Order 1,2333; 28 V.S.C. § 532 note (incorporating P.L. 108-458 §§ 2001-2003) and 534 note (incorporating P.L. 109-162 § U 07). (U)Part IV of the AGG-Dom authorizes the FBI to engage in intelligence analysis and planning, drawing on all lawful sources of information. The functions authorized underthat Part includes: (i) development of overviews and analyses concerning threats to and vulnerabilities of the United States and its intcrests; (ii) research and analysis to produce reports and assessments (see note below) concerning matters relevant to investigative activities or other authorized FBI activities; and (iii) the o'peration of intelligeqce systems that facilitate and support investigations through the compilation and analysis of data and information on an ongoing'basis. (D) Note: In the mOG, the word "assessment" has two distinct meanings. The AGG-Dom authorizes as an investigative activity an "assessment'; which require!! an authorized purpose as 3 UNCLASSIFiED-FOR OFFICIAL USE ONLY UNCLASSIFIED - FOR OFFICIAL USE ONLY Domestic Investigations and Operations Guide discussed in the DIOGSection 5. The;: United State~ In~elligence Community (USIC), however, also uses the word "assessment" to describe written intelligence products as discussed in th~ DIOG Section 15.7.8. 2.4. (U) FBI Lead Investigative Authorities A. (U) IntroductiQD (U/iFOUO) The FBI's primary inv~stigative authority is derived from the authority.ofthe Attorney General as provided in 28 U.S.C. §§ 509, 510, 533 .and 534. Within this authority, the Attorney General' may appoint officials to· detect crimes against the United States and to conduct such other investigations regarding official matters under the control of the Department of Justice (DOJ) and the Department of State'(DOS) a's may be directed by the Attorney General (28 U.S.C. § 533). The Attorney General has delegated a number of his statutory authorities and granted otherallthorities to the Director of the FBI (28 C.F.R. § 0.85[a]). Some ofthese authorities apply both inside and outside the United States. B. CU) Terrorism and ,Counterterrorism Investigations (U) The Attorney General 'has directed the FBI to exercise Lead Agency responsibility in investigatinKali crimes for whi~h' DOJ has primary or concurrent jurisdiction and which involve terrorist activities oractsinpreparation ofterrorfstactivities within the statutory jurisdiction of the United States. 'Within the United States, this includes the coilection, coordination, analysis, m~nagemeht and dissemination of intelligence and criminal information, as appropriate. If another federal agency identifies an individual who is engaged in terrorist activities or in acts in preparation Qfterrorist-activities, the other agency is required to promptly qotify the FBI. Terrorism, in this context, includes the unlawful use of force and ·violence against persons or property to intimidate oJ,: coerce a government, the civilian population, or any segment thereof, to further political or social objectives (28 C.F.R. §0.85[a]). - C. (U) ·"Federal Crimes of Terrorism" (U) P,ursuant to the delegation in 28 C.F.R. § 0.85(a), the FBI'exercises the Attorney General's lead investigatIve responsibility under 18 U.S:C. § 2332b(t) for all "federal crime~ of terrorism" as identified in that statute~ Many of these statutes grant the FBIextraterritorilii 'investigative responsibility. Check the cited statute for the full particulars concerning elements of the offense, jurisdiction, etc. Under 18U.S.G..§ 2332b(g)(5), the term "federal crime ofterroris!TI" means an offense that is: (i) calculated to influence or affect the conduct of government by intimidation or coercion or to retaliate against government conduct; and (ii) is a violation of fedex:al statute rdating to: I. (V) Destruction of aircraft or aircraft facilities (i8 U.S.C. § 32); 2. (U) Viole!1ce at international airports'(appqes to offenses occurring outside the United Statesiricertain situations) (18 U.S.C. § 37); 3. . \ (U) Arson within "special maritil1J.e and territorial jurisdiction of the United States" (SMTJ is defined in 18 U.S.C. § 7) (18 U.S.C. § 81); 4. (U) Prohibitions with respect to biological weapons (extraterritorial feder~1 jurisdiction if offense committed by or against a United States national) (18 U.S.C. § 175); 4 UNCLASSIFIED-FOR OFFICIAL USE ONLY UNCLASSIFIED- FOR OFFICIAL USE ONLY Domestic Investigations and' Operations Guide 5. (U) Possession of biological agents or toxins by restricted persons (18 U.S.C. § 1,75b); 6. (U) Variola virus (includes smallpox· and other derivatives of the variola major virus) (applies to offenses occurring outside the Uh!ted States in certain situations) (18 U.S:C. § 175c); 7. (U) Prohibited activities regarding chemical weapons (applies to offenses occurring outside the United States in certain situations) (18 U.S.C. § 229) (E.O. 13128 directs any possibleviblation of this statute be referred to the FBI); 8. ('V) Congressional, Cabinet, and Supreme Court assassination, kidnapping and assault (18 U.S.C. § 351 [a]-[d)) (18 y.S.C. § 351 [gj directs that the FBI shall investigate violations of this statute); 9: (V) Prohibited transactions involving nl!clear materials (applies t9 offenses occurring outside the l)nited State~ in certain situations) (18 U.S.C. § 831); 10. (U) Participation in nuclear and weapons of mass destruction threats.to the United States (extraterritorial federaljurisdicti,on) (18 V;S.C. § 832); 11. (V) Importation, exportation, shipping,:transport, transfer, receipt, or possession.o(plastic .explosives that do.i1citc6nmina detectionagent(l8U.S.C. §.842[m] ang [n]); 12. (U) Arson or bombing of govemme~t property risking or causing death (18 U.S.C" § 844[f][2] or [3]) (18 U.S.C., § 846[a] grants FBI and the Bureau.of Alcohol, TobaccQ, Firearms, and Explosives (ATF) concurrent authority to investigate VIolations of this statute); 13. (V) Arson or bombing of property used iii or affecting interstate or foreign· commerce (18 V.S.~,,§ 844[i)) (18 § 846[a] grantsEBJ and ATF concurrent authority to investigate violations of this statute); a.s.c. 14. (V) Killing or attempted killing during ~n attack on'a federai facility with a dangerous weapori (18 V.S.C. § 930[c]); 15. (U) Conspiracy within Vnited States jurisdiction to Q1urder, kidnap,or maim persons ,at any place outside the United States (18 U.S:C. § 956[a][I]); 16. (V) Using a computer for unauthorized access,.transmission, or retention of protected information (18 U.S.~'.:§,1036[a][I]) (18 V.S.t: § 1030[d][2] grants the FBI "primary authority" to investigate Secti<;m 1030[a][I] offens~s involving espionage, foreign counterintelligence, information protected 1!-gainst unauthorizeddis~lostire for reasons of national defense or foreign relations, or Restri9ted Data as'd~fined i.n'the Atomic Energy Act, except for offenses affecting United Btates Secret Service (VSSS) d~ties under 18 V:S.C. § 3056[a]); . 17. (V) Kl\owingly transmitting a program, information, code, or command and thereby intentionally causing damage, without authorization, to a protected computer (18 U.S.C. § 1030[a][5][A][i)); 18. (U) Killing or attempted killing of Officers or employees of the United Stat~s, including any member 9ftheunifonned services (18 U.S.C. § 1114); 5 UNCLASSIFIED-FOR OFFICIAL USE ONLY UNCLASSIFIED - FOR OFfiCIAL USE ONLY Domestic Investigatiol]s and Operations Guide 19, (U) Murder-or manslaughter offoreign officials, official guests, or internation~lly protected persons (applies to offenses occurring outside the United States In certain situations) (18 U.S:C. § 1116) (Attorney General may request_military assistance in the course of enforcement of this section); 20. (U) Hostage taking (applies to offenses occurring outside the United States in certain situations) (18 U.S.C. § 1203); 21. (D) Willfully injuring or committing any depredation against government property or contracts (18 U.S.C. § 13(1); 22. (U) Destruction of communication lines, stations, or systems (18 U.S.C. § 1362); 23. (U) pestruction or injury to bulIdings or property within special.maritime and territorial jurisdiction of the United States (18 U.S.C. § 1363); 24. (U) Destruction of $1 00,000 or more of an "ene~gy facility" property as defined ·i.n the statute (18 U;S.C. § 1366); 25. (U) Presidel1tial and Presidential staff assassination, kidnapping, and a~s~l,lIi: (18 U.S.C. § 1751[a], [b], [c], or[dJ) (extraterritorial jurisdiction) (Per 18U.S.C. §,1751[i], 1751 violations must beinves,tigated by the FBI; F}?l niay!"~qu.~~t ?ssistance fr(lm any f~~enl1 . [including military], state, or local agency notwithstanding any statute, rule, or regulation to the contrary); 26. (U) Terrorist attacks and other violence against railroad carriers and against mass transportation.systems on land, on water, or through the air (includes a school bus, charter, or sightseeing transportation; or any means of transport on land, water, or through the air) (I8 U.S.C.. § 1992); , 27. (U) Destruction of national defense materials, premises, or utilities'08 U.S.C. § 2155); 28. (D) Production of defective national defense materials, premises, or utilities (18 U.S.C. § 2156); 29. (U) Violence against maritime navigation·(18'U.S.C. § 2280); 30. (U) Violence against maritime fixe~ platforms (located on the continental shelf'ofthe United States or lo~ated internatioI).allyin certain situations) (18 U.S.C. § 2281); 31. (U) Certain homicides. and other violence against United States nationais occurring outside of the United States (18 U.S.C. ,§ 2332); 32. (U) Use of weapons oftpass destruction (againsta national of the United States while outside the United States; against certain persons or property within the United States; or oy a national of the United States outsidethe United States) (18 U.S.C. § 2332a) (WMD defined in 18 U.S.C. § 23;32a[c][2]); 33. (U) Acts of terrorism transcending national boundaries (includes murder,kidnapping, and other prohibited acts occurring inside and outsid~ the Uriited States under specified circumstances -including that tne victim is a member of a unifonn serv1ce; includes offenses committed in the United States territorial sea and, airsp~ce above and seabed below; includes offenses committed in special maritime and territorial jurisdiction of the United States as defined in 18. U.S.c. § 7) (18 U.S.C. § 2332b); 6 UNCLASSIFI.ED-FOR OFFICIAL USE ONLY UNCLASSIFIED - FOR OFFICIAL, USE ONLY Domestic Investigations and Operations Guide 34. (U) Bombings of places of public use, government facilities, public transportation systems and infrastructure facilities (applies to offenses oc~urring inside or outside the United States in certain situations; does hot apply to activities of armed forces during an armed' conflict) (18 U.S.C. § 2332f); 35. (U) Missile systems designed to destroy aircraft (applies to offenses occurring outside the United States in certain situations) (l8U.S.C. § 2332g); 36. (U) Radiological dispersal devices (applies to offenses occurring outside the United States iJ:l certain situations) (l8 U.S.C. § 2332h); 37. (U) Harboring or concealing terrorists (18 U.S.C. § 2339); 38. (U) Providing material support or resources to terrorists (18 U.S.C. § 2339A); 39. (U) Providing material support or resources to designated foreign terrorist organizations (extraterritori,al federal jurisdiction) (l8 U.S.C. § 2339B) ("The Attorney General shall conduct any investigation of a possible violation of this section, or of any license, order, or regulation issued pursuant to this section." 18 U.S.C. § 2339B[e][I]); 40. (U) Prohibitions against the financing of terrorism (applies to offenses occurring outside the ljnited States in certain situations including on board a vessel flyiqg the flag of.the United States or an aircraft registered under the laws ofthe DnitedStates) (lSD.S.C. , § 2339C) (Memorandum of Agreement between the Attorney General and the,Secretary of Homeland Security, dated May 13,2005: FBI leads all terrorist financing investigations and operations); 41. (U) Relating to military-type training from a foreign terrorist organization (extraterritorial jurisdiction) (18 U.S.C. § 2339D); 42. (U) Torture applies only to torture committed outsi,de the United States in certain situations; torture is defined in f8 U.S.C. § 2340'(18 U.S.C. §2340A); 43. (U) Prohibitions governing atomic weapons (applies to offenses occurring outside the United States'in certain situations) (42 U.S.C. § 2122) (FBI shall investigate alleged or suspected violations per 42 U.S.C. § 2271 [b]); 44. (U) Sabotage ofhuclear facilities or fuel (42 U.S.C. § 2284) (FBI shall investigate .alleged or suspected violations per 42, U.S.C. § 2271 [b]); 45. (U) Aircraft,piracy (applies to offenses oc~urring outside the United States in c~rtaln situations) (49 U.S.C. § 46502) (FBI shall investigate per 28 U.S.C. § 538); 46.·(U) Assault on a'flight crew with a dangerous weapon (applies to offenses occurring in the "special aircraft jurisdiction 6fthe United States" as defined in 49 U.S.C. § 46501'[2]); (second sentence of 49l!'S,C, '§ 46504) (FBI shall inv,estigate per 28 U.S.C. § 538); 47. (U) Placement of an explosive or incendiary device on an aircraft (49 U.S.C. § 46505[b] [3]) (FBI shall investigate per 28 U.S.C. § 538); 48. (U) Endangerment of human life on aircraft by means of weapons (49 U.S.C. §46505[c]) (FBI shall investigate per 28 U.S.C. § 538); 49. (U) Application of certain criminal'lawsto acts on.aircraft{ifhomicide or attempted homicid~ is involved) (applies to offenses occun:ing in the "special aircraft jurisdiction of 7 UNCLASSIFIED-FQR OFFICIAL USE ONLY UNCLASSIFIED - FOR OFFICIAL USE ONLY Domestic Investigations and Operations Guide the United States" as defined in 18 U.S.C. § 46501[2]); (49 U.S.C. § 46506) (FBI shaH investigate per 28 U.S.C.,§ 538); / 50. (V) Damage or destruction Qf interstate gas or hazardous liquid pipeline facility (49 U.S.C. § 60 123[b]); and 51. (U) Section 10 lOA of the Controlled Substances Import and. Export Act (relating to , narco-terrorism).· . D. (U) Additional offenses not defined as "Federal Crimes of Terrorism" (V) Title 18 U.S.C. § 2332b(f) expressly gra,nts the Attorney General primary inY~stigative authority for additional offenses not defined as "Federal Crimes of Terrorism." These offenses are (Note: nothing in this section of the DIOG may be construed to interfere with the USSS under 18 U.S.C. § 3056): .1. (V) Congressi~nal, Cabinet, and Supreme Court assaults (18 U;S.C. § 351 [e]) (18 U.S.C. § 351 [g]) directs that the FBI investig~te violations of this statute); . 2.(U) Vsing mail, telephone, telegrllph, or other instrument of interstate or foreign commerce t~ threaten to kill, injure, or intimidate any individual, or unlawfully to <!a.ma,ge. or de.~!rQY any lJuilding, veh~le,or ot!l~r real OJ:' pers()na.Lprope.rtypy JIl_~ans of fire or explosive (18 U.S.C. § 844[e]); (18 V.S.C. § 846[a] grants FBI and ATF 'concurrent authority to investigate violations of this statute); . , 3. (U) Damages or destroys by meaIJ.s of fire or eJ'plosive any building, vehicle, or other personal or real property, possessed, owned, or leased to the United States or any agency thereof, or any institution receivirig federal financial assistance (18 U.S.C.· § 844[fl [1]) '(18 V.S.C; § 846[aJ grants FBI and ATF concurrent authority to investigate. violations of this statute);' . 4. (V) Conspiracy within United States jurisdiction to damage or destroy property i'n a .foreigri country and bf;longing to a foreign country, or to any railroad, canal, bridge, airport, airfield, or other public utility~ pubiic conveyance, or public structure, or any religious, educational, or cultural property so sitl,lated (18 .S:C. § 956[b]); .u , . 5. (V) Destruction of$5,000 or more. of an "energy facility" property as defined in 18 U.S.C. § 1366(c) (1& V.S.C.§ 'l366[b]); and 6. (U) Willful trespass upon, injury to, destruction of, or interference with fortificatioJ;ls, harbor defenses, ot defensive sea areas (18 V.S.C. § 2.152). E. (U//FOUO) NSPD-46IHSPD-15, "U.S. Policy and Strategy in the War on Terror" (UI/FOUO) Annex II (Consolidation and Updating of Outdated Presidential Countert~rrorism Documents), dated January 10,2007, to National Security 'Presidential Directive (NSPDl 46/Homeland Security Presidential Directive (HSPD) 15, dated March 6,2006, establishes IFBllead responsibilities. as W~l1 as !bo,e of other fed....1 eo';';" io ...• <om" on To_oo " b2 b7E 8 UNCLASSIFIED-FOR OFFtCIAL USE ONLY UNCI"ASSIFIED - FOR OFFICIAL USE ONLY Domestic Investigations and Operations Guide I (UI/FOUO) Areas addressed in Annex III ... I JU-l:> ana Anne}( 11 thereto are classitied. . F. (U)Counterintelligence and Espionage Investigations (U//FOUO) A representative list offederal statutes applicable to counterintelligence and espionage investigations appears below. For additional information, refer to the Counterintelligence Program Implementation Guide and the.current list of espionage and counterintelligence authorities. 1. (U) E~pionage Investigations of Persons in United States Diplomatic Missions Abroad (U) Section 603 of the Intelligence Authorization Act of 1990 (p..L. 101-193) states that, subject to the authority of the Attorney General, "the FBI shall supervise the conduct of all investigations bfviolations of the espionage laws of the United States by persons employed by or assigned to'United States diplomatic missions abroad. All departments and .~gencies ()h~J1 proviQ~. appr()pri~te ~~sistapce to the F~ I in the conduct of ~uch' investigations.~'Consuit the Attorney General's extraterritorial gUldeiines and other applicable policy or agreements. 2. (U) Investigations of Unauthorized Disclosure of Classified Information to a Foreign Power or Agent ofaForeign Power . . (U) The National Security Act of 1947, as amended, establishes procedures for the coordination ofcounterintelJigence activities (50 U.S.C. § 402a). Part of that statute requires that, absent extraordinary circumstances as approved by the President in writing on a case-by-case basis, the head ofeach executive branch departrhent or agency must ensure that the F~I is "advised immediately of any information, regardless of its origin, which indicates that classified information is being, or may have been, disclosed in an unauthorized manner to a.foreign power or an agent of a foreign power." G. (U) Criminal Investigations (U//FOUO) In addi~ion to the statutes listed above and below, refer to the Criminal Investigative Division (CID) Program Implementation Guide (PG) for additional criminal jurisQiction information. . 1. (U) Investigations' of aircraft privacy and related violations (U) The FBI shall investigate any violation of 49:U.S.C. § 46314 (Entering aircraft or airport areas in violation of security ~equireqlents) or chapter 465 (Special aircraft jurisdiction ofthe United States) of Title 49, United States Code. (28 U.S.C. § 538) 2. (U) Violent crimes against foreign travelers (U) The Attorney General and Director of the FBI sh~1I assist state and local authorities in investigating and prosecuting a felony crime of violence in viplation of the law of any State in which the victim appears,~o have been selected because he or she is a traveler from a fOi'eignn~tion. (28 U.S.C. § 540A[b]) 9 UNCLASSIFIED-FOR OFfICIAL USE ONLY b2 b7F: UNCLASSIFIED - FOR OFFiCIAL USE ONLY Domestic Investigations ~nd Operations Guide 3. (U) Felonious killings of state and local law enforcement officers (28 U.S.C. ,§ 540); and 4. (D) lnvestigations'ofserial kiliings (28 U.S.C. § 540B)' . H. (D) Authority of an FBI Special Agent (U) An FBI Special Agent has the authority to: . I. (U) Investigate violations of the laws, incluqing.the criminal drug laws, ofthe'United States{2I'U:S.C. §'871; 28 U.S.C.§§ 533, 534 and 535; 28 G:F.R. § 0.85).. 2. (U) Collect evidence in cases in which the United States is or may be a party in interest (28 C.F.R. § 0.85 [aD as redelegated through exercise of the authority contained in 28 C.F.R. § O. i38 to direct. personnel i~ the FBI. 3. (D) Make arrests (18 U.S.C. §§ 3052 and 3062). 4. (U) Serve and execute,arrest warrants and seize property under warrant; issue and/or serve'admiriistrative subpoenas; serve subpoenas issued by other proper authority; and , make civil investigative demands (18 U.S.C. §§ 3052, 3107; 2 I U.S.C. § 876; 15 U.S.C. § 1312). ~' (m Carty firea11Ils (+8 U~S,C. § 3052), 6. (U) Administer oaths.to witnesses attending to 'testify or depose in the course of investigations of frauds on or attempts to defraud the United States or irregularities or misconduct of employees or agents of the United States (5 U.S.C. § 303). 7. (U) Seize property subject to seizure under the crimi,nal and civil forfeiture laws of the United States (e.g~, 18 U.S.C. §§ 981 and 982). 8. (U) Perform other duties imposed"by.law. 2.5. (U) Status as Internal Guidance (U)The AGG-Dom and this mOG are set forth solely for the purpose of internal DOl and fBI gu~dl:.m~e. They are not intended to, do not,and may no~ be relied upon to cr(':ate any right~~ substantive or p~ocedural, enforceable by law by any party' in any· matter, civil' or criminal, nor do they place any limitation on otherwise lawful investigative and litigative'prerogatives of the DOl and the FBI. (AGG-Dom, Part 1.0.2.) . 2.6. (U) Departures from the AGG-Do rn A. (UIIFOUO) D~parture from' the AGG-Dom in Advance of an Operation: A beparture from the AGG-Dam must be approved by the Director of the FBI', by the Deputy Director of the FBI, or by an Executive Assistant Director (EAD) designated by the Director. The Director bfthe FBI has designated the'EAD National Security Branch or the EAD.Criminal . Cyber Response and Services Branch to gr~nt departures from theAGG-Dom. Notice of the dep,arture must be provided to the General Counsel (GC).. 'B. (U//FOUO) Emergency Exception for a Departure from the AGG-Dom: If a departure from the AGG-Dom is necessary without such prior approval because of the immediacy or gravity of a threat to the safety of persons or property or to the national security, the Director, the Deputy Director, or a designated EAD, and t1)e GC must be notified by the'official granting the emergency departure as soon thereafter as practicable. The FBI must,provide timely written notice of departures from the AGG-Dom to the~DOJ Criminal Division or 10 UNCLASSIFIED-FOR OFFICIAL USE ONLY UNCLASSIFIED - FOR OFFICIAL USE ONLY Domestic Investigations and Operations Guide . National Security Division (N~D), as appropriate, and the Criminal Division or NSD must notify the Attorney Gener~l and the D~puty Attorney General. Notwithstanding this paragraph, all activities 'in all circumstances must be carried out if} a manner consistent with the Constitution and laws of the United States. (AGG-D6m, Part J.D.3.) C. (U/IFOUO) Records of Departures from the AGG-Dom: The Office ofihe General Counsel (OGq is responsible for maintaining records of all requests and approvals or denials of departures from the AGG-Dom. 2.7. (D) Departures from ,the DIOG A. {U/IFOUO) Departure from the DIOG in Advance of an Operation: Arequest for a "departure froin" 'any provision of the DIOG must pe submitted to the,appropri.ate substantive program Assistant Director (AD) and to the GC for approval prior to exercising a departure from the DIOG. Th~ AD may designate the Deputy Assistan! Dire<1tor (DAD), and the GC'may designate the Deputy General Counsel·for the National Security Law Branch (NSLB) ~r the Deputy General Counsel for the Investigative Law Branch (ILB) to approve. departures. N9twithstanding this paragraph, all activities'in all circumstances must be carried out in a manner consistent with the Constitutiol1 and laws of the United States. B. (U/!FOtJO)Emergency Exception for a Departure ftoitfthe DIOG:-Ifa-departureis necessary bec~use of the immediacy or gravity of a threat to, the safe~y of persons or property or to the national securIty, the appr~)Ving,authority may, arhislher.discretlon, authorize an emergency departure from the DIOG. As soon as practicable thereafter, the Special Agent in (:harge (SAC) orFBIHQ Section Chief must provide, in writing, notice to the appropriate AD and GC describing the circumstances and necessity for the departure. Notwithstanding t~is paragraph, all activities in all circumstances must be carried out ina manner consistent· with the Constitution and laws of the United States. C. (U//FOUO) Records,ofDepartures from the'DIOG: The OGC ·is responsible for , (inaint,aining records of all requests and approvals or denials of departures from the DIOG. 2.8. (U) Other FBI Activities Not Limited by AGG-Do~ (U)'The AGG-Dom apply to FBI investigative activities as provided herejn and do not limit other authorized activities of the FBI, such as the FBi's responsibilities to conduct background checks and Inquiries concerning applicants ~n4 employees under federal personnel security . progr~ms (e.g., background investigations), the FBI's maintenance and operation bfnational criminal records systems and preparation .of national crime statistics, and the forensic assistance and administration functions Of the FBI Laborato~. (AGG-Dom, Part I.D:4.) (TJ)TBI employees may incidentally obtain information relating to matters outside of the FBI's primary investigative responsibility. For example, inform,ation relating to violations of state or' local law or foreign law may be incidentally obtained in the course Qf investigating federal crimes or threats 'to the national security or in collecting foreign intelligence. The AGG-Dom does not bar.the acquisition of such information in the course of authorized i~vestigative activities, ~!)e retention of such information, or,its dissemination as appropriate to the responsible authorities in. other jurisdictions. (AGG-Dom, Part II) 11 UNdLASSIFIED-FOROFF~CIAL USE ONLY UNCLASSIFIED - FOR OFFICIAL USE ONLY DomestiC Investigations and Operations Guide 2.9. (U) Use of Classified Investigative Teclmologies (U) Inappropriate use of classified investigative technologies may risk the compromise of such technologies. Hence, in an investigation relating to activities in violation of federal criminal law, that does not concern a threatto the national security or foreign intelligence, the use of such technologies must be in conformity with the Procedures for the Use of Classified Investigative Technologies in Criminal Cases. (AGG-Dom, Part V.B.2) . 2.10. (D) Application of AGG-Dom and DIOG (UlIFOUO) The AGG-Dom and OlOG apply to all FBI domestic investigations and' operations conducted· by "FBI employees" such as, but not limited to, applicable support personnel, .intelligence analysts, special agents, task foice officers, detailees, FBI contractors, and confidential human sources'(CHS). All orthese "FBI employees" are bound by the AGG-Dom and 0I0G. In the 0I0G, the use of ''FBI employee" implies the use of all personn.el descriptions, ifnbt otherwise prohibited by law or policy. For example, if the 0I0G states the "FBI employee" is responsible for a particular i~vestigative activity, the supervisor has the flexibility to assign that responsibility to any person bound by the AGG-Dom and 0I0G(Le.,. agent, . intelligence analyst, task force officer), if not otherwise prohibited by law or policy. .(UlIFOUO)FBTHQ:Divisionf>olicyJmplementation·Guid~~c.annot be less restIictive than ~he 0100. Additionally, FBIHQ Division Policy Implementation Guides must comply with the policy contained in the orOG, unless approval for deviation from the DrOG is reviewed by the General Counsel and approved by.the FBI Deputy Director. . 12 UNCLASSIFIED-FOR OFFICIAL USE ONLY UNCLASSIFIED - FOR OFFICIAL USE "ONLY Domestic Investigations and Operations Gllide' 3. (U) Core Values, Roles, and Responsibilities 3.1. (U) The FBJ's Core Values (U) The FBI's values do not exhaust the many goals we wish to achieve, but they capsulate them as well as can be. done in a few words. The FBI's core values must be fully understood, practiced, shared, vigorously defended, and preserved. The values are: • (U) Rigorous obedience to the Constitution of the l,]nited States • (U) Respect for the digriity of all those we protect • (U) Compassion • (U) Fairness • (U) UncompromisiDg personal integrity and institutional integrity • Q (U) Accountability by accepting responsibility for our actions and decisions and their . consequences (lI) Lel!d~rship,l:>Y e?',ll.mpl~, botlt!perspnll.l ang pr()fessipnal (U) By observing these core values, we achieve a high level of excellence in performing the FBPs.national security and criminal investigative functions as well as the trust of the American people. Rigorous obedience to constitutional principles ensures that individually and institutionally our adherence to constitutional guarante~s is more important than the. outcome of any single interview, search for evidence, qr investigation. Respect for the dignity of all reminds us to wield law enforcement powers with restraint. Fairness an9 compassion.ensure that we trel,it everyone with the highest regard for constitutional, yivil, and human -rights. Personal and institutional integrity reinforce each other and are owed to our Nation in 'exchange for the sacred trust. and great authority conferred upon us. . (U) We who enforce the law 11).ust not merely obey it. We have an obligation to set a moral example that those whom we protect can follow. Because the.FBI's success in acc.omplishing its niission is directly related to the support and cooperation of those we protect, these core values are the fiber that holds together the vitality of our institution. (U) Compliance (U) All FBIpersonn.el must fully comply with all laws, niles, and regulations governing FBI investigations, operations, programs and activities, in~luding those set forth in' the AGG-Dom. We cannot and do notcountenance disregard for the law for the ,sake ofexpediency in anything we do.The FBI expects its personnel to ascertain the laws and regulations that govern the activities in which they engage, to acquire sufficient knowledge of those laws, rules, and, regulations to understand their requirements and to conform their professional aDd personal conduct accordingly. Under no circumstances will expediency justify disregard for the law.' Further, the FBI requires its employees to report to proper autl1ority.any known or suspected failures to adhere to the law, rules or regulations by themselves or others. Information for reporting such violations is available from the Office of Integritv and Complianc~ (OIC). 13 UNCLASSIFIED-FOR OFFICIAL USE ONLY UNCLASSIFIED - FQR OFFICIAL USE ONLY Domestic Investigations an~ Operations Guide FBI policy must be consistent with Constitutional, legal and regulatory requirements. Additionally, the FBI must provide sufficient training to affected personnel and ensure that appropriate oversight monitoring mechanisms are in place. -3.2. (U) Deputy Director Roles and Responsibilities (UIIFOUO) The Deputy Director is the proponent of.the DIOG, and he has oversight regarding compliance with the DIOG and subordinate implementing procedural directives and. divisional specific policy implementation guides (PG). The Deputy Director is also responsible for the development and the delivery of necessary training andthe'execution of the monitoring and auditing processes, The Deputy Director works through the Corporate Policy Office (CPO) to ensure that the DIOG is updated, as necessary, to 'comply with changes ih the law, rules, or regulations, but not later than one year from the effective date of this DIOG, and every three years thereafter. . 3.3. (U) Special AgentlIntelligence AitalystlTask Force OfficerlFBI Contractor/Others Roles an~.ResPQnsibilities (U/IFOUO) Agents, analysts, task force officers (TFO), FBI 'contractors a~d others bound by the AGG-Dom·~nd·DIOGmust:· A. (UlIFOUO) Ensqre compliance with the DIOG standards for initiating, conducting, and closing an investigative activity; collection, a9tivity; or use of an investigative method, as provided in the 0I0G; B. (U/IFOUO) Obtain training on the DIOG standards relevant to h!s/her position and perfonn activities consistent with those standards; C. (U//FOUO) ~nsure all investigative activity complies with the ConstJtution, federal law, executive orders, Presidential Directives, AGG~D9m, other Attorney General 'Guidelines, Treaties, Memoranda of AgreementJUnderstan.ding, this policy document, and any other applicable legal and poficy requirements (if an.agent, anl;llyst, TFO,. or other individual is unsure of the legality ofany action, he/she must consult with hislher supervisor and Ch~ef Division Counsel [CDC] or OGC); D. (U/IFOUO) Ensure that civil liberties and privacy are protected throughout the assessment or jnvestigative process; E. (U/IFOUO) Conduct no investigative activity solely on the basis of activities that are protected'by the First A~endment or so.lely on the basis of the race, ethnicity, national origin or religion ofthe subject; F. (UIIFOUO) Comply with the law, rules, or regulations, and report any non-compliance concern to the proper authority, as stated i~ the DIOG Section 3.1; and G. (U/IFOUO) Identify victims who have suffered direct physicai, emotional, or financial hann· as result of the commission of federal crimes, offer the FBI's assistance to victims of these crimes and provide victims' contact infonnation to the responsible FBI Victim Specialist, and keep them updated on the status of the investigation. The FBI's responsibility for assisting . . victims is continuous as long as there is ~n open investigation. 14 UNCLASSIFIED-FOR OFFICIAL USE ONLY UNCLASSIFIED - FOR OFFICIAL USE ONLY Domestic Investigations and Operations Guide 3.4. (U) Supervisor Roles and Responsibilities A. (U) Supervisor Defi~ed:Supervisorsin~lude, but are not limited to, Field Office and FBIHQ personnel jncluding: Supervisory Intelligence Analyst (SIA), Supervisory Special Agent (SSA), Supervisory Senior Resident Agent (SSRA), Unit Chief (UC), Assistant Special Agent in Charge (ASAC), Assistant Section Chief (ASC), Section Chief (SC), Special Agent in Charge (SAC), Deputy Assistant Director (DAD), Assi,stal1t Director (AP), Assistant Director in-Cha.rge (ADIC), and Ex~cutive Assistant Director (EAD). B. (U) Supervisor R~sponsibilities: 1. (U/IFOUO) Anyone in a supervisory role that approves/reviews investigative or collection activity must determine whether the standards for initiating, approving, conducting, and closing an investigative activity, collection activity or investigative method, as provided in theDIOG, are satisfied. 2. (UI/FOUO) Supervisors must monitor to ensure that all investigative activity, collection activity and the use of investigative methods comply with the Constitution, federal law, Executive Orders, Presidential Directives, AGG-Dom, other Attorney General Guidelines, Treaties, Memoranda- of AgreementlUnd~rstilnding;,thispolicydocufueht,-and,any'other applicable legal and.policy requirements. 3. (U/IFOUO) Supervisors must obtain training on the DIOG standards relevant to their position, and conform their decisions tothose stand~rds. Supervisors must also ensure that subordinates have recejved the required training on the DIOG standards and requirements relevant t9 their positions. all 4. (U//FOUO) All supervisors must ensure that civil liberties and privacy are throughout the investigative process. protec~ed 5. (U//FODO) If encountering a practice that does not comply with-the law, rules, or regulations, the supervisor must report that compliance concern to the proper authority .,and, when,necess,ary, take action to maintain compliance. ' 6. (UIIFOUO) Supervisors must not retaliate or take adverse action against_persons who raise compliance concerns. (See OlC non-retaliation policy in the CPO policy and guidance library) C. (U/IFOUO) Supervisory Delegation: Throughout the DIOG, any requirement imposed on a supervisor may-be performed by a designated Acting, Primary or Secondary Reli~f Supervisor, unless specified otherwise by federal statute, Executive Order, Presidential Directive, Attorney General Guidelines, FBI policy, or any other applicable regulation. All delegations must be 'made in writing and retained appropriately. .(UIIFOUO) A supervisor may delegate authority to a supervisor one level junior to himself or herself, unless specified otherWise (e.g., the SAC may delegate authority to the ASAC). This delegation must: (i) identify the task delegat~d; (ii) identify the supervisory position given approval authority; (iii) be in writing; and (iv) be retained appropriately. This delegation authority is not further delegable. Except as provided in the preceding paragraph, an SSA or SIA may not delegate authority. CUI/FOUO) Any supervisor can request that a supervisor at a higher level approve a particular activity, so long as the higher-level supervisor is in the original approval 15 UNCLASSIFIED-FOR OFFICIAL USE ONLY UNCLASSIFIED - FOR OFFICIAL USE ONLY Domesti~ Investigations and Operations Guide supervisor's "c~ain·of·command" (e.g., SSA approval is required to open a preliminary investigation;butthe SSA requests that hislher ASAC or SAC approve tile preliminary , investigation because he/she will be on TDY). Unlike delegations ofaut\1ority which require written documentation, higher supervisory approval than required by the AGG-:bom or DIOG does not require written authorization. D. (UI/FOUO) File Reyiews: Full-time supervisors or primary relief superVisors (relief supervisors require SAC approval) must conduct investigative file reviews with their subordinates, as discussed below. Investigative file reviews must be 'conducted with all agents, Resident Agents, TFOs, analysts, detailees, and FBl.contractors as appropriate. Investigative file reviews for probationary agents are recommended every 30 days but must be conducted at least every 60 days. 1. (U//FOUO) AssessmentJustificationlFile Reviews: Supervisors inust conduct 30-day justification,reviews for types 1 and 2 assessments and 90-day file reviews for types 3, 4 and'6 assessments, as' required in Section 5 of the DIOG. These justification/file reviews must: (i) evaluate the progress made toward the achievement of the authorized purpose and objective; (ii) ensure activities that occurred in.the prior 30/90 days were appropriat~; (iii) determine whether iUs reasqnably likely tlJat!nfQrtIlatign may be. Qbtain..eg t~.at i§ relevant to the authorized objective, thereby warranting an extension for another 30/90 'days;. (iv) determine whether adequate predication has been developed to'open and/or coritinuesto justify a predicated investigation; and (v) determine whether the assessment should be terminated.. a. (U//FOUO) 'J;ype 1 and 2 Assessments: Supervisory justification reviews must be conducted for each 30 day period. Following the end of the 30~day period, the agent, analyst, TFQ, detailee or FBI contractor and the supervisor have up to 10 calendar. qays to complete all aspects of the review and to appropriately document the.r~view, as specified in this section of the DIOG. b. (U//FOUO) Type 3,4 and 6 Assessments: Supervisory justification/file reviews .must be conducted for each 90 day period. Following the end.of each 90 day period, the l;lgent, analyst, TIO, detailee or FBI contractor and the supervisor have up to 30 days to complete all aspects of the review ard to appropriately dO'cument the review, as specified in this section of the DlOG..Investigative fiie reviews for probationary FBI employees are recommended· every 30 days but must be conducted at least every 60 days. 2. (U//FOUO) Predicated Investigations: Supervisory investigative file reviews must be conducted'for each 90 day period. Following ,the end of each 90 day period, the agent, analyst, TFO, detailee or FBI contractor and the supervisor have up'to 30 days to complete all aspects of the review and to appropriately document the review, as sp~cified in this section of the DlOG. Investigative filereviewsfor.probationary FBI employees are recommended every 36 day~ but must be conducted at least every 60 days. 3. (U//FOUO) General ;policy for JustificationlFile. Reviews: Ajustification/fi!e review mustbe: (i) in person or. by telephone when necessary (e.g., FBI employee is TDY); (ii) conducted in privat~; and (iii) noted in the Autorriated Case Support (ACS) Investigl;ltive Case Management Case Review or on the FD-71 or Guardian. Justification/file review documentation must be executed in duplicate, with the subordinate being permitted to 16 UNGLASSIFIED-FOR OFFICIAL USE ONLY UNCLASSIFIED - FOR QFFICIAL USE ONLY Domestic Investigations and Operations' Guide retain a'copy, and the originals retained by the supervisor in each subordinate's adm~nistrative folder until the next inspection. If the subordinate only has applicant cases assigned and is in compliance with FBI deadlines and regulations, the"'in-person conference may be waived. If the conference is waived, the. supervisor will make suitable comments concerning the subordinate's caseload, perfonnance, compliance with FBI deadlin~s and regulations, and record the fact that no conference was held. The results of thejustiflcationlfile reviews must be considered when.preparing inid-year progress . reviews, annual appraisals, and developmental worksheets, except this provision does not apply to TFOs, other agency detailees, or FBI Contractors. E. (UI/FOUO) Unaddressed Work for Assessments and Full Inv~stigatioils UI/FOUO b2 b7E (UI/FOUO~ .b2 b7E (U//FOUo) ---.;;......,... ~_ _ __'_I_:__----'-. . . b2 b7E i I .. I iUliFouo{ l...., b2 b7E 17 UNCLASSIFIED-FOR OFFICIAL USE ONLY UNCLASSIFIED - FOR OFFICIAL USE ONLY Domestic Investigations and Operations Guide (UlIFOUO) The FD-71 provides a mechanism to assign an Assessment to an appropriate Unaddressed Work File, if appropriate. In the FD-71, the Supervisor must select a .reason for assigning the matter to the Unaddr~ssed Work File, and' choose the. appropriate classification. Upon submitting the FD-71, a new Unaddressed Work File will be opened. 3.5. (U) Chi~fmvision Couns,el Roles and Responsibilities (tl//FOUO) The Chief Division Counsel (CDC) inust review all a~sessments and predicated investigations involving sensitive investigative matters as discussed in DIOG Section 10 as well as review the use of particular investigative'methods as discussed in Sections 5 and'U of the DIOG. The primary purpose of the CDC's review is to ensure the legality of the actions proposed. Review, in this context, includes a detennination that the investigative activity is: (i) not legally objectionable (Le., that it is not based solely oil the exercise of.First Amendment rights or on' the race, ethnicity, national origin or religion of the subject; and (ii) founded upon an authorized purpose and/or adequate factual predication and meets the standard specified in the DIOG. The c;DC should also include in his or her review'and recommendation, if appropriate, a detennination of the wisdom of the proposed action (e.g., the CDC may have no legal objection but may recommend denial because the value of the proposal is outweighed by the intrusion into [egitimate privacy interests); The CDC;s·detennination·that.an irivestigative.activity is:-(i) riot legally objectionable; and (ii) warranted from a mission standpoint is based on facts known at the time of the review and recommendation. Often these facts are not verified or othe'rwise corroborated until the investigative activity commences. As a result, the CDC may r~quire additional CDC reviews or provide guidance to supervisory personnel with regard to monitoring the results of the investigative activity to ensure that the authorized purpose and/or factual predication remains in tact after the facts are. developed. (V//FOUO) For investigative activities involving a sensitive investigative matter, the ~DC must, also independently.consider the factors articulated.in the DIOG a~d provide the approving , . authority wi~h a recommendation as to whether, in the CDC's judgment, the investigative activity should be approved. Activities found to be legally objectionable by the CDC may not pe approved unless and until the CDC's determination is countennanded by the FBI General Counselor a delegated designee. (V//FOUO) Throughout the DIOG, any requirement imposed on the CDC may be performed by an Associate Division Counsel (ADC), Legal Advisor, or designated Acting CDC. All CDC delegations must be made in writing and retained appropriately. .3.6. (U) Office of the General Counsel Roles and Respo~sibilities (Ui'/FOUO) In coordination with the DOl NSD, the OGC is responsible for conducting regular reviews of all aspects of FBI national security arid foreign intelligence activities. The primary purpose of the OGC's review is to ensure the leg~lity of the actions proposed. These reviews, conducted at FBI Field Offices and Headquarters' Units, broadly examine such activities for cOlhpliance with the AGG-Dom and other applicable. requirements. Review, in this context, includes a detennination that the investigative activity is: (i) not legally objectionable (Le., that it is not based solely on the exercise of First Amendment rights or on the race, ethnicity,national origin or relIgion of the subject; and (ii) founded upon an authorized purpose-and/or adequate factual predication and meets the standard specified in the'DIOG. The OGC should also include in its review ahd recoIl1mendation, if approprjate, a determination of the wisdom of the proposed 18 UNCLASSIFIED-FOR OFFICIAL USE ONLY UNCLASSIFIED - FOR OFFIC~AL USE ONLY Domestic Jnvestigations and Operations Guide action (e.g., the OGC may have no legal objection but may recommend denial because the value ofthe proposal is outweighed by the intrusion into legithnate privacy interests). The aGe's determination that an investigative activhy is: (i) not legally objectionable; and (ii) warranted from a mission standpoint is based on'facts known at the time of the review and recommendation. Often these facts are not verified or otherwise corrooorated until the investigative activity commences. As a result, the OGC may require additIonal OGC reviews or provide gl,lidaryce to supervisory personnel wIth regard to monitoring the results of the investigative activity to ensure that the authorized purpose and/or factual predication remains in tact after the facts are developed. . (U//FOUO) For those investigative activities involving a sensitive investigative matter requiring OGe review, the OOC must independently consider the factors articulated in the DIOG and provide the approving authority with a recommendation as to whether, in the OGC's judgment, the investigative activity should be approved. (U//FOUO) Throughout the DIOG, any requirement imposed on the General Counsel may be delegated and performed by a designated OGC attorney. All delegations must be made in-writing and retained appropriately; 3;7. (U) Corporat¢ Policy Offic'e' Roles a'ndRcsponsibilities (UI/FOUO) Subject to the guidance of the Deputy Director, the CPO has oversight of the implementation of the DIOG. In the process of implementing and analyzing the DIOG, the CPO should report any. apparent compliance risk areas directly to the OlC. Additionally, the CPO fill work directly with the OlC to ensure that the policies, training a11d monitoring are adequate to meet compliarice monitoring procedures. 3.8. (U) Office oflnteg'rity and Compliance Roles and Responsibilities (UI/FOUO) OIC is responsible for reviewing the DIOG, and working with each FBI Div.ision and the CPO, to identify compliance risk areas and ensure the adequacy of'policy statements, training and monitoring. When complia,nce risk areas are identified, the OlC works with the Divisio~s,Field Offices, and/or programs affected by the risk and develops programs to review the adequacy ofpolicy sta:temerits, training, and monitoring and mitigates those concerns appropriately. 3.9. (U) Operational Program Manager Roles and Responsibilities (UI/FOUO) FBIHQ Operation Program Managers must review notices and ac~ions received from FBI Field Offices pursuant to procedur~s containe4 in the applicable FBIHQ substantive Division's policy implementation guide. This responsibility includes notifyingthe,appropriate DOJ entity of FBI Field Office and FBIHQ investigative activities, witllin th.e time period specified by the AGG-Dom, when required. (U//FOUO) FBlHQ Operational Program Managers are responsible for identifying, prioritizing, imd analyzing potential compliance risks within their programs regarding implementation bfthe DIOG, and developing mitigation plans wl1ere warranted. (UI/FOUO) Operational Program Managers ,must proactively identify and take appropriate action to resolve. potential compliance concerns. In identifying possible compliance concerns, Progra~ Managers should consider the following indicators of possible compliance issues: 19' UNCLASSIFIED:.FOR OFFICIAL USKONLY I' UNCLASSIFIED - FOR OFFiCIAL USE ONLY Domestic Investigations and Operatio,ns Guid~ A. (U/IFOUO) Similar activities being handled differently from Squad-to-Squad / Unit-to-Unit / Field Office-to-Field Office; . B. (UJ/FOUO) Unusually qigh need for contact with Headquarters' Division for basi~ information on how to conduct an activity; C. (U//FOUO) Apparent confusion over how to conduct a certain activity; D. (UI/FOUO) Conflicting 'policy; E. (u/iFoUO) Non-existentlinaccurate/wrongly target,ed training; F. (U/IFOUO) Monitoring mechanisms that do not exist or do not test the right information (e.g. file reviews/program management); and " . G. (UlIFOUO) Ina,dequate audit for compliance. (U/IFOUO) Operational Program Manager~ may not retaliate or take adverse action against persons who raise compliance concerns. 3.10. (U) Division Compliance Officer Roles and Responsibilities (UlIFOUO) Each FBIHQ Division and "Field Offic;e must have a Division Compliance Officer ,(DGO)-who~willproactively identify potential-non-compliancerisk areas concerning the implementation of the DIOG and .report them to the proper authority anq the OlC. The DCO must always be aware that the focus of a compliance program is the identification and resolution ofa compliance problem and the process must not be punitive or retaliatory. 3.11. (U) FBI Headquarters Approval Levels (U/IFOUO) If a DIOG provision does not specifically provide, or prohibit, FBIHQ approval authority for conducting certain investigative activities or investigative methods, the below Field Office approval authorities equate-to the following FBIHQ personnel and approving officials when FBIHQ initiates, conducts, or closes an investigative activity or utilizes an investigative method: . • (U/IFOUO) Field Office Analyst or Special Agent (SA)::;:: FBIHQ Analyst, SA, or Supervisory Special Agent (SSA); • (UI/FOUO) Field Office Supervisory Intelligence Analysts (SIA) = FBIHQSIA; . • (U//FOUO) Chief Division Counsel (CDC) =FBIHQ Office of the General Counsel (OGC); • (U/IFOUO) Field Office SS.A = FBlHQ Uriit Chief (UC); and • (U//FOUO) Special Agent in. Charge (SAC) = FBIHQ Section <;hief (SC). 20 UNCLASSIFIED-FOR OFFICIAL USE ONLY · . " UNCLASSIFIED - FOR OFFICIAL USE ONLY Domestic Investigations and Operations Guide 4. (U) Privacy and Civil Liberties, and I;ieast Intrusive Methods 4.1. (U) Civil Liberties and Privacy A. (U) Overview (U}The FBI is responsible for protecting the American public, not only from crime and te.rrorism, but also from'incursions into their constitutional ,rights. Accordingly, all'AGODom investigative activities must be carried out with'full adherence to the Constitution, federal laws and the principles of civil liberty and privacy. (U) The FBI has a long-established commitment to protecting the civil liberties of Americans as it investigates threats to national security and publIc safety. As discussed below, compliance with the FBI's comprehensive-infrastructute of legal limitations, oversight and . self-regulation effectively ensures that this commitment is honored. Because our ~bility to achieve our mission requires that we have the trust and confidence of the American public, and because that trust and confidence can be significantly'shaken by our failure to respect the limits of our power, special care'must be taken by all employees to comply witl1 these limitations. "R (U) Purp'ose of Investigative ACtivity ({)) One of the most important-safeguards in the AGG-Dom~ne that is intended to ensure that FBI employees respect the constitutional rights of Americans-is the threshold requirement that all investigative activity be conducted for an authorized purpose. Under the AGG-Dom that authorized purpose must bean authorized national security, criminal, or foreign intelligence collection purpose. (U) Simply stating such a purpose is not sufficient, ho\\,ever,.to ensure compliance with this' safeguard. It is critical that the authorized purpose not be, or appear to be, arbitrary or contrived; that it be well-founded and well-documented; and that the infonnation sought·and the investigative method used to obtain it befocu~ed in scope, time, and manner to achieve the underlying purpose. Furthennore, there are constitutional provisions that set limits on what that purpose may be. It may not be solely to monitor the exercise of rights that are protected by the Constitution, and, equally important, the authorized purpose may not be based solely on race, et~nicity, national origin or religion. (U) It is important to understand how the "authorized purpose" requirement and these constitutional limitations relate to one another. For example, individuals or groups who communicate with each other or with member1? of the public in any form in pursuit of social .or political causes-such as opposing war or foreign policy, protesting government actions, promoting certain religious beliefs-have a fundamental constitutional right to do so. No investigative activity may be conducted for the sole. purpose of monitoring the exercise of these rights. If, however, there exists a weil-founded basis to conduct investigative activity for one of the authorized purposes listed above-and that basis is not solely the race, ethnicity, national origin or religion of the participants-FBI employees may assess or investigate these activities, subject'to other limitations in the AGG-Dom and the mOG. In this situation, the investigative activity would not be based solely on Constitutionallyprotected conduct or on race, ethnicity,nationality or religion. Fina]ly, alth9ugh investigative activity would be authorized in this situation, it is important that it be conducted in a manner 21 UNCLASSIFIED-FOR OFFICIAL USE ONLY UNCLASSIFiED - FOR OFFICIAL USE ONI:.Y Domestic Investigations and Operations Guide that does not materially interfere with the ability of the individuals or groups to engage in the exercise of Constitutlonatly-protected rights. C. (U) Oversi~ht and Self-Regulation (U) Provisions'ofthe AGG-Dom, other AGG, and oversight from DOJcomponents are designed to ensure the activities of the FBI are lawful, appropriate and ethical as well as effective in protecting the civil liberties and privacy of individuals in the United~States. DOJ and the·FBI's Inspection Division, OlC, and OGC, along with every FBI employee, share responsi~i1ityforensuring that the FBI meets these goa,ls. (~) In the criminal investigation arena, oversightofFBI- activities has traditionally come from prosecutors and district courts. Because many national security investigations do not 'resultin prosecutions, other oversight mechanisms are necessary. Various features of the AGG-Dom facilitate the DOJ NSD oversight functions in the national security and foreign -intelligence collection areas. Relevant requirements and provisioI'!s include: (i) required notification by the FBI to the DOJ NSD concerning a full investigation that involves foreign ·intelligence collection, a full investigation of a United States person in relation to a threat to the national security; or a national security investigation involving a "sensitive investigative . m~tfer;" (ii) an annual report. by the FBI to the D0J NSD concerning the FBI's foreign . intefligericecollect!on program,inClu.dinginformationref1ec~ingthe scop~'and nature of foreign intelligence collection activities in each FBI Field Office; (iii) access by the DOJ NSD to' information obtained by the FBI through national security or foreign intelligence activities; and (iv) general authority for the Assistant Attorney General for National Security to'obtain'r~portS from the FBI 90nceming these activities. (AGG-Dom, IntroA.C) (U) The DOJ NSD's Oversight Section and the FBI's QGe are.responsiOle for conducting regular reviews of all aspeetsofFBI national security and foreign intelligence activities. These reviews, conducted at PBI Field Offices andFBIHQ Divisions, broadly examine such activities for compliance witJ't'the AGG-Dom and other applicable requirements. (U) Further ex.amples of oversight mechanisms include the involvement of both FBI and pro~ecutorial personnel in the review of undercover operations involving sensitive circumstances; noti.ce requirements for investigations involving sensitive investigative matters; ~nd notice and oversight provisions for enterprise investigations, which involve. a broad examination of groups implicated in criminal and national security threats. These requirements and proceQures help to ensure that the rule oflaw is respected.in the FBI's activities andth~t public confidence is maintained in these activities. (AGG-Qom, Intro.4.C) (U) In addition to the above-mentioned oversight entities DOJhas in:place, the FBI is subject to a regime of oversight, legal' limitations, and self-regulation designed to ensure ~trict adherence to civi,l liberties. This regime is comprehensive and has many facets, including the following: 1. (U) The Foreign Intelligence:Surveillance Act of 1978, as amended, and Title III of the Omnibus and Streets Act of1968. These laws establish the processes for obtaining judicial approval of: electronic.surveillance and physical searches for the purposes of collecting foreign intelligence and electronic surveillance for the purpose of collecting evidence of crimes. 22 . UNCLASSIFIE:P-FOR OFFICIAL USE ONLY UNCLASSIFIED - FOR OFFICIAL USE ONLY Domestic Investigations and Operations Guide 2. (U) The WhistleblQwer Protection Acts of 1989 mid 1998: Thes_e laws protect whistleblowers from retaliation. 3. (U) The Freedom of Infonnation Act of 1966: The law provides the pUblic with access to FBI documents hot·covered by a specific statutOry exemption. 4. (U) The Privacy Act on 974: The purpose of the Privacy Act is to balance the government's need to maintain infonnation about United States citizens apd legal pennanent resident aliens with the rights of those individuals to be protected against 'unwarranted invasions of their privacy stemming from the government's collection, use, maintenance, and dissemination, of that information. The Privacy Act forbids the FBI and other federal agencies from collecting infonnatiqnabout how indivi~uals·ex.ercise their First Amendment rights, unless that collection is expressly authorized by statute or by the individual, or is pertinent to and within the scop~ of an authorized law enforcement activity (5 U.S.C. § 552a[e][7]). Except for collection of foreign intelligence, activities authorized by the AGG-Dom are authorized law enforcement activities or activities for which there is otherwise statt.Jtory authority for purposes of the Privacy Act. Foreign intelligence'collection is not an authorized law enforcement activity.. (U)C0l1.gressional Oversight is conducted by-various c'ommiitees of the· United States .. Congress, bilt primarily by the JiIdiciary and ·Intelligence Committees. These committees exerc'ise regular, vigorous oversightinto all aspects of the FBI's operations. To this end, the N~tional Security Act of 1947 requires the FBI to keep the .intelligence committees (for the Senate and House of Representatives) fully and cU!1"ently infonned of substantial intelligence activities. This oversight has significantly increased in breadth and intensity since the 1970's, and it provides important additional assurance that the FBI conducts its investigations according to the law and the Constitution. (U) The rBI's counterin~elligenceand counterterrorism operations are subjecUb significant self-regulation and oversight beyond that conducted by Congress. The Intelligence Oversight Board (1013), comprised of members from the President's Intelligence, Advisory Board (PIAB), also conducts oversight of the FBI. Among its other responsibilities, the lOB' reviews violations of The Constitution, national security law, E.O.. qr Presidential Decision Directive(PDD) by the FBI and the other intelligence agencies, and issues reports thereon.to the President and the Attorney General. (\J).Internal FBI safeguards include: (i) the OGC's Privacy and Civil Liberties Unit (PCLU), which reviews plans of any record system proposed within the FBI for compliance with the Privacy Act and related privacy' protection requirements and policies; '(ii) the,criminal and national'security undercover operations review.committees, compriseg of senior DOJ and FBI officials, which.review all proposed undercover operations that involve sensitive c . circumstances; iii the Sensitive 0 erations Review Committee S (iv) all FBI employees have an, obligation to report violatiops of the DIOG to their supervisor, other management offi.cials,or appropriate authorities; and (v) the FBI requirement for training oJ new FBI employees and periodicltraining for all FBI employees L-'""'--_---,_ _ ....... 23 UNCL~SSlFIED"FOR: OFFICIAL USE ON~y UNCLASSIFIED - FOR OFFICIAL USE ONLY Domestidnvestigations and Operations Guide to. maintlin currency on the latest guidelines, changes to laws and regulations, and judicial decisions related to constitutional rights and liberties. (D) The AGG-Dom and mOG set forth the standards and requirements under which an . investigative a«tivity may be initiated and are designed to provide FBI employees with a , framework that maintains the proper balance between the public's need for effective law . enforcement and protection of the national ~ec).lrity and the protec~i9n of civil liberties ~nd privacy. Among the provisions that specifically serve to protect civil liberties and privacy are the following: (i) the prohibition against initiating investigations based solely on the exercise of First Amendment rights .or other constitutionally protected activity; (ii) the ryquirement that FBI employees use the least intrusive method reasonable under the circumstances to achieve their investigative goals; a.nd (iii) the pr9hibition against engaging in ethnic and racial profiling. Further, in the context-of collecting foreign intelligence, the FBI is further ·required to operate openly and consensually with United States persons; to the extent practicable. 4.~. (U) Protection of First Amendment Rights (U) A fundamental principle of the Attorney General's guidelines for FBI investigations and operations since the. first guidelines were issued in 1976 has been that investigativ.e activity may not be based solelY. oil the exerCise of rights guaranteed-by the First Amendment to the United States Constitution. This principle carries through to the present day in the AGO-Dam. There is a corollary to this principle in the Privacy Act of 1974, 5 U.S.C. § 552a, which prohibits the retention of information describing how a person exercises rights under the First Amendment, unless there is a valid law enforcement purpose. (0) The First Amendment sta~es: (U) Congress shall make no law respecting an establishment of religion or prohibiting the free exercise thereof; or abridging the freedom ofspeech, or of the press; or ofthe right ofthe people to peaceably assemble, and to pet(tion the Go.vernmentfor redres.s ofgriel!ances. (U) Although the amendment appears literally to apply only to Congress, the Supreme Court made it clear long ago that it also appliesto activities of the Executive Branch, including law enforcement agencies. Therefore, for FBI purposes, it would be helpful to read the introduction to the first sentence as: "The FBI shall take no action respecting ..." In addition, the word "abridging" must be understood. ~'Abridging," as used here, means "diminishing." Thus, it is not necessary for a law enforcement action to destroy or totally undermine the exercise of First Amendment rights for it to be unconstitutional; significantly diminishing or lessening the ability of individuals to exercise these rights without an authorized investigative purpose is sufficient. (l) This is not to say that any diminishmeDt of First Amendment rights is i.m~onstitutional. The Supreme Court has never held that the exercise of these rights is absolute. In fact, the Court has syt forth realistic interpretations ofwhat level and kind of govemrpent activity actually violates a First AI!Iendment right. For example, taken to an extreme, one could argue that the mere possibility of an FBI agent being present at an open forum (or an qn-line presence) would diminish the right of free speech by, for example, an anti-war protestor because he/she would be afraid to speak freely., The Supreme Court, however, has n.ever found an "abridgement" ofFirst Amendment rights based on such a subjective fear. Rather, it requires an action that, from an 24 UNCLASSIFIED;.FOR OFFICIAL USE ONLY UNCLASSIFIED - FOR OFFICIAL USE ON~Y Domestic Investigations and Operations Guide objective perspective, truly diminishes-the speaker's message or his/her ability to deliver it (e.g., pulling the plug on the sound system). -for anotherexample, requiring protestors to use a certain parade route may diminish, in a practical sense, delivery of their message. The Court has made it clear, however, that for legitimate reasons (e.g., public safety), th~ government may impose reasonable limitations in terms of time; place and manner to the exercise of such rights----:-'as long as the ability to deliver the message remains. (U) While the l~nguage of the First Amendment prohibits action that would abridg~ the enumerated rights, the i.mplementation of that prohibItion in the AGG-Dom reflects the Supreme Court's opinions on the constitutionality of law enforcement action that may impact the exer<,:ise of First Amendment rights. As. stated above, the A9G-Dom prohibits investigative activity for the sole purpose of monitoring the exercise of First A~endment rights. The import of the distinction between this language and the actual text of the First Amendment language is twofold: (i) the line drawn bythe AGG-Dom prohibits even "monitoring" the exercise of First Amendmcnt rights (far short of abridging those rights) as the sole purpose of FBI activity; and (ii) the requirement of an authorized purpose for all in~estigative activity provides-additional protection for the exercise of Constitutionally protected rights. (U) The AGG-Dom classifies investigative activity that involves a religious or politic.al organiz?tiolJ. (or all ir:tdivigual p~oll1in~'lt in such~ll organizaj:iQIl) gr 11l11ember of the new~ media as a "sensitive investigative matter." That designation recognizes the sensitivity of conduct that traditionaliy involves the exercise of-First Amendment rights-Le., groups who associate for political or religious purposes, and the press~ The requireme:nts for opening and pursuing a "sensitive investigative matter" are s'et forth in Section 10 of this policy document. It should be clear, however, from the discussion below just how pervasive the exercise of First Amendment rights is in American life and that not all protected First Amendment activity will fall within the definition of a "sensitive investigative matter.." Therefore, it is essential that FBI employees recognize when investigative activity may have an impact on the exercise of these fundamental rights and be e~pecially sure that any such investigative activity has avalid law enforcement or national security purpose, even if it is not a "sensitive investigative matter" as defined the AGG-Dom and .the DIOG. ' in . (U) Finally; it is Important to note that United States persons (and organizations comprised of United States persons) do not forfeit their First Amendment rights simply because they als6 engage in criminal activity or in conduct that threatens national security. For example, an organization .suspected of engaging in acts of domestic terrorism may also pursue legitimate political goals and may al.so engage in lawful means to achieve those goals. The pursuit of these goals through constitutional}y-protected conduct doe~ not insulate them from legitimate investigative focus for unlawful'activities-but the goals ~mdthe pJ.lrsuit ofthe.if goals through lawful means remain protected from unconstitutional infringement. . (U) When allegations of First Amendment violations are brought to a court of law, it is usually in the form pf a civil suit in which a plaintiff has to prove some actual or potential harm. Presbyterian·Church.v. United States, 870 F.2d 518 (9th Cir. 1989). In a criminal trial, a defendant-rna) seek either or both of two remedies as part of a claim that his or her First Amendment rights were violated: suppression of evidence gathered in the alleged First Amendment violation, a Claim typically analyzed under the "reasonableness" clause of the Fourth Amendment, and dismissal oftbe indictment on the'basis of "outrageous government conduct" in violation of the Due Process Clause of the Fifth Amendment. 25 UNCLASSIFIED,.FOR OFFICIAL USE ONI.y UNCLASSJFIED - FOR OFFICIAL USE ONLY Domestic InveStigati9ns and Operations Guide (U) The scope of each of the primary First Am~ndment rights and their impact on FBI investigative activity are discussed below. The First Amendment's "establishment clause,"-the prohibition against the government estab1i~hing or sponsoring a specific religion-has little applicatioIJ to the FBI ang, therefore, is not discu~sed here. A. (U) Free Speech . (U) The exercise offree speech includes far more than simply speaking on a controversial topic in the town square. It iricludes such activities as carrying placards in a parade, sending letters to a newspaper editor, posting a web site on the Internet, wearing a tee'shirt with a politicai message, placing'a bumper sticker critical ofthe President on one's car, and publishing books or articles. The common thread in'these examples is conveying a public message or an idea through words or deeds. Law enforcement activity that diminishes a person's ability to communicate in any of these ways may interfere wjth his or her freedom of speech-and thus may not be undertaken by the FBI solely for that purpose. . CU) The line between constitutionally protected speech and advocacy ofviplence or of conduct that may lead to violence or other unlawful activity must be understood. Tn Brandenburg v. Ohio, 395 U.S. 444 (1.969), the Supreme Court established a two-part test to determine whether such speech is constitutionally protected: the government may not prohibit advocacy"offorce or violence except when stich-advocacy"(i)i'sintendedto 'incite imminent I~wless action, and (ii) is 'likely to do so. Therefore, even heated rhetoric or offensive provocation thatcould conceivably lead to a violent response in the future is usually'protected. Suppos~, for example, apolitically active group advocates on its web site taking unspecified "action" against persons or entities it views as the enemy, who thereafter suffer property damage and/or personal injury. Under the Branderiburg two-part test, the missing specificity and im~ine'nce in the message may provide it constitutional protection. Forthai'r~ason, law enforcement may take no action that, in yffect, blocks the message or. punishes its sponsors. CU) Despite the high standard for prohibiting free speech or punishing those who engage in it, the law does not preclude FBI ~mployees from observing and collecting any of the forms of protected speech and considering its content-as long as those activities are done foT. a valid law enforcement or national security purpose aM conducted in a mannel: that do~s not unduly infringe upon the ability 'of the speaker to deliver 'his or her message. To be an al!thorized purpose, it must be one that is authorized'by the AGG-Dom-Le., to further,an FBI assessment, predicated investigation, or other authorized function such as providing assistance to qther agencies. Furthermore, by following the "Standards for Initiating or Approving an Assessment or Predicated Investigation" as contained in the mOG, the FBI will ensure that there is a rational relationship between that authorized purpose and,the protectedspeech such that a reasonable per~on with knowledge ofthe circumstances could understand why the information is being ~ollected. (U) Returning to the example posed above, because the group's advocacy of action could be directly related by circumstance to property damage suffered by one of the group's known targets, collecting the speech-although lawfully protected-ean lawfully occur. Similarly, listening to the public talks by a religious leader, who is suspec;ted of raising fund_s for a terrorist organjzation, may yield clues as to his motivation, plan of action, and/or hidden messages to his followers. FBI employees sh~uld not, therefore, avoid collecting First 26 UNCLASSIFIED-FOR OFFICIAL USE. ONLY UNCLASSIFIED - FOR OmCIAL USE QNLY Domestic Investigations and Operations Guide Amendment protected speech if it is relevant to an authori?:ed AGG-Dom purpose-as long as they do so in a manner that does not inhibit the delivery of the message or the ability of the audience to hear it, and so long-as the method of collection is the-least intrusive means feasible to gather the relevant information. (0) In summary, during the course of lawful investigative activities, the FBI may lawfully collect, retain, and consider the content of coostitutionally protected speech, so long as: (i) the collection'is logically related to an authorized investigative purpose; (ii) the-collection does not actually infringe on the ability of the speaker to deliver his or her message; and (iii) the method of collection is the least intrusive alternative feasible. B. CD) Exercise of Religi~n" (U) Like the other First Amendment freedoms, the "free exercise of religion" clause is broader than commonly believed. First, it covers any form of worship of a deity---even forms that are commonly understood to b~ cults or fringe sects, as weI I as the right not to worship' any deity. Second, protected religious exercise also extends to dress or food that is required by religious edict, attendance at a facility used for religious practice (no matter now unlikely it appears to be intended for that purpose), observance of the "Sabbath, raising mqney for evangelical or lJlis~ionary purposes, and proseiytiziOg. Even in controlled environments like prisons, religious exerCise mtistbeperrriitted~subject to reasonable restrictions as to time, place, and manner. Another feature-ofthis First Amendment right is that it is a matter of heightened sensitivity to some Americans-especially to devout followers. For this reason, it is a matter that is more likely to provoke an adverse reaction, if the right is violatedregardless ofwhich religion is involved. Therefore, when essential investigative activity may impact this right, it must be conducted in a manner that avoids "the actual-and the appearance of-interference with religious practi<;e to the maximum extent possible. CD) While there must-be an authorized purpose for any investigative activity that could have an impact on religious practice, this does not mean religious practitioners or religious" facilities are completely free from being examIned as part of an assessment or predicated investigation. If such practitioners are involved in-or such faci Iities are used for-activities that are the proper subject of Fl;3I-authorized -investigative or intelligence collection activities, their religious affiliation does riot "immunize" them to any degree from these efforts. It is paramount, however, that the authorized purpose of such efforts be properly documented. It is also important that investigative activity directed at religious leaders or at conduct occurring within religious facilities be focused in time and manner so as not to infringe on legitimate religious practice by any individual but especially by those who appear unconnected to the activities under investigation. (D) Furthermore, FBI employees may take appropriate cognizance of the rqle religion may play:in the membership or motivation of a crimin~l or terrorism enterprise. If, for example, . affiliation with a certain religious institution or a specific religious sect is a known requirement for inclusion in a violent organization that is the subject of an investigation, then whether a person of interest is a member of that institution or sect,is a rationa~ and permissible consideratiQn. Similarly, if investigative experience and reliable intelligence reveal that members of a terrorist or criminal organization are known to cO!T1monly possess or exhibit a combination of religion-based characteristics or practices (e.g., group leaders state that acts of terrorism are based in religious doctrine), it is rational and lawful to consider - 27 UNCLASSIFIED-FOR OFFICIAL USE ONLY. UNCLASSIFIED - FOR OFFICIAL USE ONLY Domestic Investigations and Operations Guide' such a combination in gathering intelligence about the group-even if anyone of these, by itself, would constitute an impermissible cOl1sIderatlon. By contrast, solely because prior subjects of an. investigation of a particular group were members of a certain religion and they . claimed a religious motivation for their acts of crime or terrorism, other members' mere . affiliation with that religion, by itself, is not a basis to assess or investigate-absent a known and direct connection to the threat under assessment or investigation. Finally, the absence of a particular'religious affiliation can be used by analysts and investigators to eliminate certain·, individuais from further investigative.consideration in those scenarios where religious affiliation· is relevant. . . C.. (D) Freedom of the Press (D) Contrary to what many believe;this well-known First Amendment right is not owned by the news media; it is a right of the American people. The drafters of the Constitution believed that a free'press was essential to preserving democracy. Although th~ news media typically seeks to enforce this right, freedom of the press should.not be viewed as a comest betWeen law enforcement or national security, on the one hand, and the ~nterests of news media, on the other. (U) Freedom ofthepress includes su~h matters as rea~onable access to news-making'events, the making of documentaries; and the posting of"blogs;;' The news gathering function is the aspect of freedom ofthe press most likely to intersect with law enforcement and national security investigative activities. Within that category, the in.terest of the news media in protecting confidential source~ and the interest of agencies li~e the FBI in gaining access to these sources who may have evidence ofa crime or national security intelligence often clash. The s~minal case in·this an~a is Branzbtirg v. Hayes, 408 U.S. 665 (1977), in·which the Supreme Court held that freedom of the pres~ does not entitle a news reporter to refuse to divulgethe identity of his source to. a fedi:ral grandjury. The Court. reasoned that, as long as the purpose of law enforcement is not harassment or vindictiveness against the press, any harm to the news gathedng function qfthepress (by revealing'source identity) is outweighed by the need of t~e grand jury to gather evidence of crime.. (D) Partially in response to Branzburg, the Attorney General has, issued regulations that govern the issuance of subpoenas for reporter's testimony and telephone toll records, the arrest of a repqrter for a crime related to news gathering, and, the interview of a reporter as a suspect in a crime arising from the news gathering process. In addition, an investigation of a member of the news media in his official capacity, the use of a reporter as a source, aild posing as a member of the news media are'all sensitive circumstances in the AGG-Dom and . other applicable AG guidelines. .(U) These regulations are'not intended to insulate reporters and other news media from FBI assessments or predicated investigations. They are intended to ensure that investigatIve activity that seeks information from or otherwise.involves members of the news media: is appropriately authorized; is necessary for an important law enforcement br national'security objective; is the least intrusive mea~s to obtain the information or achieve the goals; and does not unduly infringe upon the news gathering aspect of the constitutional right to freedom of the press. 28 UNCLASSIFIED-FOR OFFICIAL USE ONLY / UNCLASSIFIED - FOR OFFICIAL USE ONLY Domestic Investigations and Operations Guide D. (D)-Freedom of Peaceful Assembly and to Petition the Government for Redress of Grievances . (D) Freedom ofpeaceful assembly, often called the right to freedom of association, present unique issues for law enforcement agencies, including the FBI. Individuals who gather wit.h others to protest government action, or to raiIy or demonstrate in favor of,'or in oppositi9n to, a.social cause sometimes present a threat to public sa(ety either!?y their numbers, by their actions, by the anticipated response to their message, or by creating an opportunity for' individuals or other groups with an unlawful purpose to infiltrate and compromise the legitimacy.ofthe group for their own ends. The right to peaceful assembly includes more than just public demonstrations-it includes, as well, the posting of group web ~ites on the Internet, recruiting others.to a cause, marketing a message, and fund raising. All are protected First Amendment activities if they an,: conducted in support of the organization or politiCal, religious or sociai cause. (D) The right to petition the government for redress ofgrievances is so linked to peaceful assembly and association that it is included in this discussion. A distinction between the two is. that an inpividual may exercise the right to petition the government by himself whereas ass~!TIbly nece~sarily iIJ,v()lves o~her~. The right to.petition thegovemmentincludes writing letters to Congress, carrying a placard outside city hall that delivers a political message, r~cruiting others to one's cause, and lobbying Congress or an executive agency f9r a particular result. eD) For the FBI, covert pres~nce or ac~ion within.associations, also called "undisclosed participation," has the greatest'potential to impact this Constitutional right. The Supreme Court addressed this issue as a result Of civil litigation arising from one of the many prot~sts against the Vietnam Wa.r. In Laird v, Tatum, 408 U.~. 1 (1972), the Courtfoundthat the mere existence of an investigative program.:..-consisting of covert physical surveillance' in· public areas, infiltra.tion 9fpublic assemblies by government operatives or sources, and the collection of news articles and other publicly available information-for the purpose of determining the existence and scope of a domestic threa~ to national security does not, by .itself, violate the First Amendment rights of the members of the assemblies. The subjective "chill" to the right to assembly, based on the suspected presence of government operatives, did not by itst::lf give rise to legal "standing" to ·arguc.thartheir constitutional rights had been abridged..Instead, the Court required a showing that the complained-of government action· would reasonably deter the exercise of that right. (U) Since Laird v. Tatum·was decided, the lower courts have exariIimjd.government activity on many occasions to determine whether it gave rise to a "subjective chill" or an "objective deterrent." The basic standing'requirement establish by Laird remains unchanged today. The lower courts,.however,.have often imposed a very low threshold of objective hannto survive dismissalofthe case. For example, plaintiffs who have shown a los~ of membership in an organization, loss offin;mcial support, loss to reputation and status in the community, and loss of~mployment by members have been granted standing to sue. (U) More significant for the FBItl1an the standing issue has been the lower courts? evaluation of il1vestigative actiVIty into First A~endment protected. associations since Laird. The courts have beld the'following investi.gative activities to be constitutionally permissible under First Am~iJ.dment analysis: .undercover participation in group activities; physic;al and video 29 UNCLASSIFIEj)-FOR OFFICIAL USE ONLY UNCLASSIFIED - FOR OFFICIAL USE ONLY Domestic Investigations and Operations Gujde surveillance in public areas; properly authorized electronic surveillance; recruitment and· operation of sources; collection of infonnation from government, public, and private sourccs (with consent); and the dissemination of information for a valid law enforcement purpose. However, these decisions were not. reached in the abstract. In every case in which the courts have found government acti,on to be proper, the government proved that it was conducted for an authorized law enforcement or nation~l security purpose and that it was conducted in substantial compliance whh controlling regulations: In addition, in approving,these techniques, the courts have often considered whether a less intrusive technique was available to the agency, and the courts have balanced the degree of intrusi()n or impact against the 'importance of the law enforcement or national security objective.. (U) By contrast, since Laird, the courts have found these techniques to qe legally objectionable: initiating an investigation solely on the basis of the groups' social or political agenda (even 'if the agenda made the group susceptible to subversive infiitration); sabotaging or neutralizing the group's legitimate social or political agenda; disparaging the group's reputation,or ~tanding; leading the group into criminal activity that otherwise probably would not have occurred; and undermining legitimate recruiting or funding efforts. In every such case, the court found the governmenf.s purpose either was not persuasive, was too remote, or wasfoo speculative to Justify the intrusion and the potential harm to the exercise of First . Amendment rights. (U) <;)nce again, the message is clear that investigative activity that involves assemblies or associations of United States persons exercising their First Amendment rights must have an authorized purpose under the AGG-Dorn-and one to which the information sought and the technique to. be employed are rationally related. Less intrusive techniques sh.ould always be explored first and those authorizing such activity (which, as discussed above, will almost always constitute a sensitive investigative matter) should ensure that the investigatjve activity ,is focused as narrowly as feasible and that the purpose is th9roughly documented. 4.3. (U) Equal Protection under the Law A. (U) Introduction (U) The Equal Protection Clause of the, United States Constitution provides in part that: "No, State shall make or enforce any law which shall ... deny to any person withi~ its jurisdiction the equal protection of the laws." The Supreme Court and the lower courts 'have made it clear that it applies as well to the official acts of United States government law enforcement agents. Specifically, government employees are prohibited from engaging in invidious 'discrimination against individuals on the basis of race, ethnicity, h.ational origin, or religious affiliation. This principle is further reflected and iJllplemented for federal law' enforcement in the. United States Department of Justice's Guidance Regarding the Use o(Race bv Federal . Law Enforcement Agencies (hereinafter "pOJ Guidance:'). (U) The DOJ Guidance states,that investigative and intelligence collection activities must not be based solely on race, ethnicity, national origin, or religious affiliation. Any such activities that are based 'solely on such considerations are invidious by definition, therefore, 1 See, e,g., Whren v. United States, 517 U.S. 806 (1996); see also Chavez v. IIIi~ois State Police, 251 F.3d 612 (7th Cir. 2001). ' 30 UNCLASSIFIED-FOR O~FICIAL USE QNLY UNCLASSIFIED - FOR OFFICIAL USE ONLY ,Domestic Investigations and Operations Guide unconstitutional. This standard applies to all investigative and collection activity, including collecting and retaining information, opening cases, disseminating inforrrtation, and indicting and prosecuting defendat).ts. It is particularly,applicable tq the retention and dissemination of personally i~enti:fying information about an individual-as further illustrated in the examples enumerated below. (U) The constitutjonal prohibition against invidious discJ;irriinati()n based on race, ethnicity, national origin or religion is.relevant to both the·national security and criminal investigative programs of the FBI. National security investigations often have ethnic aspects; members of a foreign terrorist organization may be primarily or exclusively from a particu(ar country or area o(the world. Similarly, ethnic heritage is frequently the common thread running through. violent gangs or other criminal organizations. It should be· noted that this is neither a new nor isolated phenomenon. Ethnic commonality among criminai and terrorist groups has been relatively. constant and widespread across many ethnicities throughout the history or"the FBI. B. (U) Policy Principles (U) To ensure. that assessment and investigative activities and' strategies consider racial, . ethnic, nationaL origin and r¢ligi9us fllctors propt<rly and·effectively·and to help assur~ the Arperican public that the FBI does not engage in invidious ,Hscri'Iriination, the followirig policy pririciples are established. 1. (U) The prohiQition against investigative activity based solely on race or ethnicity is not avoided by considering it in combination with other prohibited factors. For example, a . person of a certain race engaging in lawful public speech about his religious convictions is not a proper subject of investigative activity based sotely ~m anyone of these factors-or by the combination of all three. Before collecting and using this inform~tion, a well-founded and authorized investigative purpose must exist as to which any or all ofthese otherwise prohibited factors is relevant: 2. (U) When race or ethnicity is a relevant factor to consider, .it should not be the dOJI1inant or primary .factor. Adhererice to this standard will n9t only ensure that it is ,never the sole factor-it will also preclude undue and unsound reliance on race or ethnicity in investigaiive~nalysis. It reflects the recog~ition that there are tho\.!sands and, in soqie cases, millions oflaw abiding people in American society of the same race or ethnicity as those who are th~ subjects of FBI investigative activity, and it guards against the risk of sweeping some of them into the net of su~picion without a sound investigative basis. 3. (U) The FBI willnot collect or. use behavi()r or characteristics'common to particular racial.or ethnic community as investigative factors unless they bear clear and specific relevance to a matter under assessment or investigation. This policy is intended to prevent the potential that collecting ethnic characteristics or behavior will inadvertently lead to individual identification based solely on such matters, as well as to avoid the appearance that the FBI is engaged in ethnic or ra~ial profiling. 31 UNCLASSiFIED-FOR OFFICIAL USE ON;£.Y UNCLASSIFIED - FOR OFFICIAL USE ONLY Domestic investigations and, Operations Guide C. (U) Guidance on the Use of Race and Ethnic Identity in Assessments and Predicated Investigations (U) Considering the reality of common ethnicity or race .amqng many criminal and terrorist groups, some question how the prohibition against racial or ethnic profiliqg is to be effectively ,applied-al1d not violated-in FBI assessments and predicated investigations. The question arises generally in two contex!s: (i) with respect to an individuaLor a group of individuals; and (ii) with respect to ethnic'or racial communities as a ~hole. :I. (U) Individual Race or Ethnicity as a Factor (U) The DOl Guidance permits the consideration of ethnic anq racial identity information based on specific reporting-such as from an eyewitness. As a general rule, race or ' ethnicity as an identifying feature of a suspected perpetrator, subject, and in some cases, a, victim, is relevant if it is based on reliable evidence'.or information-not conjecture or stereotyped assurription~. In addition, the DOJGuidance permits consideration of race or ethnicity in other investigative or collection scenarios if it is relevant. Thyse examples . illustrate: a. (U) The race or. ethnicity of suspected members, associates,. or supporters of an ethnic-based gang or criminal enterprise may be collected and retained when gathering information about or investigating the organization. b. (U) E;thni~itymay be.considered in evaluating whether a subject is-or is not-a 'possible-associate of a criminal or terrorist group that is knowp. to be comprised of members of the same ethnic grouping-":'as long as it is not the dominant factor for focusing on a.particular person. It is axiomatic that there are many members of the same ethnic group who are not members of the group; and for that reason, there must be other information beyond race or ethnicity that links the individual to the terrorist , or criminal group or to the other members ofthe group. Otherwise, racial or ethnic identity would be the sole criterion, and that is impermissible. . 2. .(U) Community Race or Ethnicity as a Factor a. (U) Collecting .and analyzing.demographics. The DOJ guidance and FBI policy perinit the FBI to identify locations of concentrated ethnic. communities in the Field Office's domain, if these locations will reasonably aid the analysis of potential threats' and vulnerabilities, and, overall, assist domain awareness for the purpose of performing iritelligence analysis. If, for example, intelligence reporting reveals that members of certain terrorist organizations live and 9perate primarily within a certain concentrated community of the same ethnicity, the location of that community is clearly valuable-and properly collectible---data, Similarly, the· locations of ethnic- ' oriented businesses' arid other facilities m~y be collected if their locations will reasonably contribute to an awareness·ofthr~atsand. vulnerabilities, and intelligence collection opportunities. Also, members of some communities may be potential victims of civil rights crimes and, for this reason, community location may aid 32 UNCLASSIFIED-FOR OFFICIAL USE-ONLY UNCLASSIFIED - FOR OFFICIAL USE ONLY Domestic Investigations and Operations Guide enforc;ement of civil rights laws. Information about such communities should not be collected, however, unless the communities are sufficiently concentrated and established so as to provide a reasonable potential for intelligence collection that would support FBI mission programs (e.g., where identified terrorist subjects from certain countries may relocate to blend in and avoid detection). lethnic/racial demol!raohics.1 I b2 b7E c. (D) General ethnic/racial behavior. The authority to collect ethnic community location information does not extend to .the collection of cultural and behavioral informatiqn about an ethnic community that bears no· rational relationship to a valid investigative or analytical need. Every ethnic community in thy Nation that has been associated with a criminal or n~tional security threat has a dominant majority. of lawabiding citizens, resident aliens, and visitors who may share common ethnic behavior but who have no connection to crime or terrorism (as either subjects or victims). For this reason, a broad~brush cOllection of racial or ethnic characteristics or behavior Is not helpful to achieve any authorized FBI purpose and may create the appearance of improper racial or ethnic profiling. d. (D) Specific and relevant ethnic behavior. On the other hand, knowing the behavioral and life style characteristics of known individuals·who are criminals or who pose a threat to national security may logically aid in the detection and prevention of crime and threats to the national security within the community and beyond. Focused behavioral characteristics reasonably believed to be associated with a particular criminal or terrorist element of an ethnic community (not with the community as a whole) may be collected and retained. F.or example, if it is known through intelligence analysis or otherwise that individuals' associated with an ethnicbased terrorist or criminal group conduct their finances by certain methods, ttavelin.a certain manner, work in certain jobs, or come from a certain part of their home country thafhas established links to terrorism, those are relevant factors to consider when investigating the group or assessing whether it may have a presence within a, community. It is recognized that the "fit" between specific behavioral characteristics and it terrorist or critninalgroup'is unlikely to be perfect-that is, there will be members of the group -.yho do not exhibit the behavioral criteria as well as persons who exhibiphe behaviors who are not members of the group. Nevertheless, in order to maximize EBI mission relevance and to minimize the appearance of racial or 33 UNCLASSIFIED-FOR OFFICIAL USE ONLY , UNCLASSIFIED'; FOR OFFICIAL USE ONLY Domestic Investigations and Operations Guide ethnic profiling, the criteria used to identifymell1ber~ ofthj~ group within the larger ethnic ~ommunity to which they belong must be as focused and as narrow as intelligence reporting and other circumstances permit. If int~lligence reportin'g is insufficiently exa.ct so that it is reasonable to believe that the criteria will include an unreasonable numb.er of people who are not involved, then it would·be inappropriate to use the behaviors, standing;ilone, as the basis for FBI activity. (U) Exploitive ethnic behavior. A related category of information that can' be collected is behavioral and cultural information. about eth l1 ic or racial communities that is reasonably likely to be exploited by criminal or terrorist groups who hide within those communities.in order to engage in illicit activities undetected. For example, the existence ,of a cl;lltural tradition of collecting funds from members within the community tO'fund charitable causes in their·homeland at a certain time of the year (and how that is accomplished) would be relevant if intelligence reporting revealed that, unknown to many donors, the charitable causes were fronts for terrorist organizations or that terrorist supporters within the community intended to exploit the unwitting donors for their own purposes. 4.4. (lJ)Least Intri!~iv~;M~~hQt! A. (U) Overview (U) The AGG-Dom requires that the "least intrusive" .me~ns or method be considered and-if operationally sound and effective-used to obtain intelligence or evidence in lieu of a more intrusive method. This principle is also reflected in Executive Order 123"33, which governs the activities of the United States intelligence-i::ommunity. The concept of least intrusive method applies to the collection ohll intelligence and evidence. Regarding the collection offoreign intelligence that is not collected as part· of the fBI's traditional national security or criminal missjons, the'AGG-Dom provides that open and Qvert collection activity must be used with United States persons if feasible. (U) By emphasizing the !lse of the least intrusive means to obtain intelligence and evidence, FBI employees can effectively execute their duties whiie mitigatirig potential negative impacts on the privacy and civil liberties of all people encompassed within the investigation, ihclud.ing targets, witnesses, and victir.ns. This principle is not intended to discourage FBI employees from seeking relevant and necessary intelligence, information, or evidence, but rather is intended to encourage investigators to choose the 'least intrusivebut still effective-!Jleans from the available optionsJo obtain the:material. (U) This principle is embodied in statutes and DOJ policies on a variety of topics including electronic surv:eillance, the iIse of tracking devices, the temporary detention of suspects, and forfeiture. In addition, the concept ofleast intrusive method.can be found in case law as a factor to be considered in assessing thereasonableness of an investigative method in the face of a First Amendment or due process violation claim. See Clark v. Library of Congress, 750 F.2d 89,94 (D.<;:. Cir 1984); Alliance to End Repression v. City of Chicago, 627 F. Supp. 1044, 1055 (N.D. Ill. 1985), citing Elrod v. Bums, 427 U.S. 347,362-3 (1976). 34 UNCLASSIFIED-FOR OFFICIAL USE ONLY UNCLASSIFIED - FOR OFFICIAL USE ONLY Domestic Investigations and Operations Guide B. (D) General Approach to Least Intrusive Method Concept (U) Applying the concept of least intrusive method to an investigative or intelligence collection scenario is both a logical process and ~n exercise in judgment. It is logical in the sense that the FBI employee must first determine t~e relative intrusiveness of the method that would provide information: 1. (U) Relevant to the assessment or predicated investigation; 2. (U) Within the time frame required by the assessment or predicated investigation; '3. (LI) Consistent with operational security and the protection of sensitive sources and methods; and, 4. (U) In a mariner that provides confidence in.the accuracy of the information. (U) Determiqing the least iT!trusive method also reqlJires sound judgment because it is clear that the factors discussed above are'not fixed points on a checklist They require careful consideration based on a thorough understanding of investigative objectives and circumstances. C. (U) Determining Intrusiveness' (U) lil determining intrusiveness, the primary factor should' be the degree of procedural protection that established law and the AGG-Dom provide for the use of the method. Using this factor; search warrants, wiretaps, and undercover operations are very intrusive. 'By contrast, investigative methods with limited procedural requirements, such as checks of government aqd commercial data bases and communication with established sources, are less. intrusive. . (U) The following guidance isdesigried to assist FBI intrusiveness of different methods: p~rsonnel injudging,.the relative· 1. (U) Nature of the information sought: Investigative objectiv.es·generally dictate the type of illformation required and from whom. it shol.clld be collected. This subpart is not intl;ln.ded to. address the situation where the type of information needed and its location are,clear so that consideration of alternatives would be pointless. When the option exists, however, to seek information from any of a variety of places, it is less intrusive to seek informati<)D from less sensitive and less protected places. Similarly, obtaining information thilt is protected by;a statutory scheme (e.g., financial records)'or an evidentiary privilege (e.g., attorney/client communications) is more intrusive than obtaining information that is not so protected. In addition, if there exists a reasonable 'expectation ofprivacy under the Fourth Amendment (i.e., private communications), obtaining that information is more intrusive than obtaining information that is knowingly exposed to public view as to which there is no reasonable expectation of priva~y. 2. (U) Scope of the information sought: Collecting information regarding an isolated event-such as a certain phone number called on a specific date or a single fillancial transaction-is less intrusive or invasive of an individual's privacy than collecting a' complete communications or financial"profile." Similarly, a complete credit history is a more intrusive view into an individual's life than a few isolated cr~dit charges. In some cases, a cOtpplete financial and credit profile is exactly what the investigatiQn 35 UNCLASSIFIED-FOR OFFICIAL USE ONLY UNCLASSIFIED - FOR OFFICIAL USE ONLY Domestic Investigations and Operations Guide requires (for example, investigations of terrorist financing or money laundering). Ifso, FBI employees should not hesitate to use appropriate legal process to obtain such information if the predicate requirements are satisfied. It is also recognized that operatiop.al ~ecurity-such as source protection---'may dictate seeking a wider scope of information than is absolutely neces~ary for the purpose of protecting a specific target or source. When doing so, however, the concept 'of least intrusive alternative still applies. The I:BI may obtain·more data than strictly needed, but it should obtain no more data than is needed to accomplish the operational security goal. 3. (U) Scope of the use of the method: Using a method in a manner that captures a greater picture of an individual's or a group's activities is more intrusive than using the same method or a different one that is focused in time and locatio,n to a speCific objective. For example, iUs less intrusive to use a tracking device to verify point-topoint travel than it is to use the same device to track an individual's movements over a sustained period of time. Sustained tracking on public highways would be just as lawful btit more intrusive because it captures a greater portion of an individual's daily movements. Similarly, surveillance by closed circuit televisiof!. that checks a: discrete lQ.cation within a discrete time frame is less intrusive than 24/7 coverage of a wider area. For another .example, a computer intrusion device that captures only host computer 'identification information is faflcss 'iiltrusive than one that capttiresfile conteht. 4. (U}Source of the information'sought: It is less intrusive to obtain iqformation from existing government sources (such as state, local, tribal, international, or federal partners) or from publicly-available data-in commercial data bases, than to obtain the same inform~tion from a third party (usually through 'legal proce,ss) that has l,l,' confidential relationship with the subject-such as a financial or academic institution. Similarly, obtaining information from a reliable confidential source who-is lawfully in possession of the informat~on and lawfully entitled to disclose it (sl!ch as obtaining an address from an employee of a local utility company) is less-intrusive than"obtalning the information from an entity with a.confidential relationship with the subject. It is recognized "in this category that the accuracy and procedural reliability of the information sought is an important factor in choosing the source of the information. For example, even if the information is available from a confidentiill source, a grand jury subpoena, ·national'security .letter (NSL), ex parte order, or other process !!lay be required in order to ensure informational integrity. " 5. (U) The risk of public exposure: ~eeking information about an individual or gro'up , under circumstances that create a risk that the contact itself and the.inforniation sought will be exposed to the individuai's or group's detriment and/or embarrassment---' particularly if the method used carries no legal obligation to maintain silence-is more intrusive than information gathering that does not carry that risk. Interviews with employers, neighbors, and associates, for example, or the issuance ofgrand jury subpo'enasat a time when the investigation has not yet been pubIiciy exposed are more intrusive than methods that gather information covertly. Similarly, interviews of a subjectin a discrete location would be less intrusive than an interview at, for example, a place of employment or other. location where the subject is known. (U) There is a limit to the utility of this list of intrusiveness factors. Some factors may be "inapplicable in a given Investigation and, in many cases, the choice and scope of the 36 UNCLASSIFIED-FOR 'OFFICIAL USE ONLY UNCLASSIFIED - FQR OFFICIAL VSE ONLY pomestic Investigations and Operations Guide method will be dictated wholly by investigatiye objectiv~s and circumstances. The foregoing is not intended to provide a comprehensive checklist or even ~n overall continuum of intrusivene,ss. It is intended instead to identify the factors involved in a determination of intrusiveness and to attune FBI employees to select, within each applicable category, a less intrusive method if operational circumstances permit. In the end~ selecting the least intrusive method that will accomplish the objec~ive is. a matter of sound judgment. In exercising suchjudginent, however, consideration of these factors sh<;lUld ensure that the decision to proceed is well founded. D. (0) Standard for Balancing Intrusion and Investigative Requirements (U) Once an appropriate method and its deployment have been. determined, reviewing and approving authorities should balance the level of intrusiori against investigative requirements. This balancing test'is paitic\,llarly important when the information sought involves clearly established constitutional, statutory, or evidentiary rights or sensitive circumstances (such as oQtaining information from religious. or academic institutions or public fora where First Amendment rights are being exercised), but should be applied in all circur1).stances to ensure that the least intrusive alternativ~ feasible is being utilized. (U) Balancing the factors discussed above with the considerations discu~sed below will help determinewh'ether themethbdand the extent towhich'it'iritrud~sinto privacy or threatens civillibertie.s is proportionate to t~e significance of the case and .the information sought. (U) Considerations on the .investigative side of th.e balancing scale include the: 1. (U) Seriousness of the crime or national security tjlre~t; 2. (U) Strength I;lnd significance of the intelligence/information to b~ gained;,. 3. (U) Amount of information already known about the subject or group under investigation; and 4. (U).Requirements of operational security, including protection of sources and methods. (U) If, fot example, tp.e threat is remote, the individual's involvement is speculative, and the . probability of obtaining probative information is low, intrusive methods may not be justified, i.e., they may do more harm than good. At the other end of the scale, if the threat is significant and possibly imminent (e.g., a bomb threat), aggressive measures would be . appropriate regardless of intru.siveness. (U) In addition, with respect to the investigation of a group, if the terrorist or criminal nature of the group and its membership is well establisheci (e.g., al Qaeda, Ku Klux Klan, Colombo Family of La Cosa Nostra), there is less concern that pure First Amendment activity is at stake than there would be for a group whose true character is not yet known (e.g., an Islamic charity suspected of terrorist funding) or many of whose members appear ,to be solely exercising First Amendment rights (anti-war prote$tors suspected of being infiltrated by violent anarchists). This is not to suggest that Investigators should be less aggressive in determining thC# true nature of an unknown group, which may be engaged in terrorism or other violent crime. Indeed, a more aggressive and timely approach may be in order to determine whether the group is violent or to eliminate it as a threat. Nevertheless, when First Amendment rights are at stake, the cqoice and-use of investigative methods' 37 UNCLASSIFIED-FOR OFFICIAL USE ONLY uNCLASSIFIED - FOR OFFICIAL USE ONLY Domestic Investigations and Operations Guide should be focused in a manner that minimizes potential infringement of those rights. Finally, as the investigation progresses and the subject's or group's involvement becomes clear, more intrusive methods may be justified. Conversely, if reliable information emerges refuting the individual's involvement or the group's criminal or terrorism connections, the use of any investigative methods must be carefully ev.aluated. . (U) Another consideration.to be balanced is operational security. Is it likely that if a less intrusive but feasible method were selected, the subject would detect its. use and alter his activities-including his means of communication-to thwart the success of the operation. Operational security-particularly in national security investigations-should not be undervalued and may, by itself, justify covert tactics which;.under other circumstances, would not be the least intrusive. E. (U) Conclusion (U) The foregoing guidance is offered to assist FBI employees in navigating the often unclear course to select the least intrusive investigative method that"effectively accomplishes the operational objective at hand. In the final analysis, t~e choice of method and balancing ofthe impact on privacy and civil liberties with operational needs is a matter ofjudgment, baseq on training .and experience. Pursuant to the AGG-Dom, other applicable laws andpoliCies, and' this 'guidance; FBI employees may use any· lawful-method, allowed, even if intrusive, wh~re the intrusiveness is warranted by the threat to the national security or to potential victims of crime and/or the streng~h of the information indicating its existence. 38 UNCLASSIFIED-FOR OFFICIAL USE ONLY UNCLASSIFIED - FOR OFFICIAL USE ONLY Domestic Investigations and Operations Guide 5. (U) Assessments 5.1. (U) Overview (UIIFOUO) The Attorney General's GuidelinesjorDomestic FBI Operations (AQG-Dom) combine "threat assessments" under the former Attorney General's GUidelinesjor FBI National ~ Security Investigations and Fore[gn Intelligence Collection and the "prompt and extremely limited checking out of initial leads" under the former Attorney General's Guidelines on General Crimes, Racketeering Enterprise and Terrorism Enterprise Investigations into ~ new investigative category entitled "assessments." All assessments must either be openedJn an investi ative classification as an assessment file e. • laced in a'''---''''' e. . Guardian]), or placed b2 b7E (UIIFOUO) Note: In the DIOG, the word "assessment" has two distinct meanings.. The AGGDom authorizes as an investigative activity an "assessment" which requires an authorized purpose as discussed in this section of the DIOG. The USIC, however, also uses the word "assessment" to describe written intelligence products, as discussed in DIOG Section 15.7.B. ·(U)Assessments authorized undertheAGG-Dom do not require a particular factual-predIcation but do require an authorized purpose. Assessments may be carried out to detect, obtain information about, or prevent or protect against federal crimes or threats to the national security or to collect foreigri intelligence. (AGG-Dom, Part II and Part II.A) (UIIFOUO) Although "no particular fac.tual predication" is reguired, the basis of an assessment cannot be arbitrary or groundless specul~tion, nor can an assessment be. based. solely on the exercise of First Amendment protected activities or on the race, ethnicity, national' origin or religion of the subject. Although difficult to define, "no particular factual predication" is less than '~information or allegation" as required for the initiation of a preliminary investigation. For example, a~ assessment may be conducted when there is a basis to know: (i) whether more information or facts fire required to determine if there is a criminal or national security threat; and (li) there is a rational' and articulable relationship between the stated authorized purpose of the assessment on the one hand and the information sought and the proposed means to obtain that information on the other, Regardless of whether specific approval or specific documentation is required, an FBI employee should be able to explain the purpose of an assessment and the reason for the methods used to conduct the assessment. Those FIE employees who conduct assessments 'areresponsible for assuring that assessments are not pursued for frivolous or improper purposes and are not based sorely on First Amendment activity or on the race, ethniCity, national origin, or religion of the subject of the assessment. (AGG-Dom, Part II) (U//FOUb) An FBI.employee can search historical information already contained 'within: (i) FBI data systems; (ii) United States Intclli .erice Communi USIC s stem . -em 10 ee has access e. .. L-:-o-o:--~=_--:,_--:,_....,... _ _..¥;.(iii) any other United States Government database to which an FBI employee has access; and (iv) the FBI employee can also conduct open-source Internet searches without initiating an assessment (open-source Internet searches do not include any paid-for-service databases such as Lexis-Nexis and Choicepoint), as further discussed in Section 5.6.A.l aQd Section 15. The use of such paid-for-service databases requires the initiation. Qf an assessment or predicated investigation. This allows the FBI employee to possibly resolve a 39 UNCLASSIFIED-FOR OFFICIAL USE ONLY b2 b7):: UNCLASSIFIED - FOR OFFICIAL USE ONLY Domestic Investigations and Operations Guide matter without the need to conduct new investigative activity and'open an assessment. Additionally, through analysis of existing information, the FBI employee may produce products that include, but are not limited to. an Intelligence Assessment, Intelligence Bulletin and Ilf, 'while conducting analysis; the FBI employee finds a gap in intelligence that is relevant to an authorized FBi activity, the FBI employee can identify the gap for possible 1eVelOPlJlent of a "collection requirement." The applicable I I (or otherl _. las dire<:ted in the DI.PG) mu~t be used to document this analysis. See the Directorate of bltelligence COl) PO for file classification guidance. . I· . I . b2 biE _ 5,2. (U)Purpose and Scope' (U/IFOUO) The F~I cannot be content to wait for leads to com~ in through the actions of others; father, we must be vigilant in detecting criminal or national security threats to the full extent permitted by law, with an eye towards early intervention and preventIon of criminal or national security incidents before they occur. For example, to carry out its central mission of protecting the national security, the FBI must proactively collect information from available sources in order to identify threats aJ}~ activities and to inform appropriate intelligence analysis. Collection require~ to inform such analysis will appear as FBI National Collection Requirements and FBI Fieid-Office-Gollectfon-Requlrements; -Likewise, in theexercis~ ofits protective-functions; the FBI is not constrained to wait until information is received indicating that a particular event, activity or facility has drawn the attention of would-be perpetrators of terrorism, The proactive authority conveyed to the FBI is designed.for, and may be .used by, the FBI in the discharge of these responsibilities. The FBI may also conduct assessments as part of its special events maQagement responsibilities. (AGO-Dom, P.art II) (U) More broadly, detecting and interrupting criminal activities at their, early stages, ~nd· preventing crimes from occurring in the first place, is preferable to allowing criminal plots to come to fruition. Henge, ~ssessments may also:be undertaken proactively with such objectives as detecting criminal activities; obtaining information on indiv'iduals, groups, or organizations of possible investigative interest, either because they may be involved in criminal or national security-threatening activities or because they may be targeted 'for ~ttack or victimization in such activities;. and identifying and assessing individuals who may have value ~s confidential human sources. (AOG-Dom, Part.II): . (UlIFOUO)"As described in the below-scenarios, assessments may beus~d when an "allegation or information" or an "articulable factual basis" (the predicates for predicated investigations) concerning crimes or threats to the national 'security is obtained and the matter can be checked out or resolved through the relatively non-intrusive methods authorized in assessments (u§e qf least intrusive means). The checking of investigative leads in this manner can avoid the need 1'0 prqceed to more formal levels of investigative activity (pr~dicatedinvestigation), if the results of an assessment indicate that·further investigation is not warranted. (AGG-Dom, Part II) Hypothetical fact-pattern~ are discussed below: '. A. (UlIFOUO~ b2 b7E 40 UNCLASSIFIED-FOR OFFICIAL.USE ONLY UNCLASSIFIED - FOR OfFICIAL USE ONLY Domestic Investigations and Operations Guide (UlIFOUO)I Jrhe FBI employee can analyze historical information ~lready contained yitb iP : (i) FBI data systems; (ii) USIC systems to whIch FBi employees have . . ~;_(iii) any other United-States Government access (e.g database to whi9h an FBI employee has access; and (iv) can conduct open-source Internet searches without initiating an assessment. Open-source Internet searches do not include any paid-for-service databases such as Lexis-Nexis and-Choicepoint.L 1 I (UlfFouol I- B. (UifFOU0)1 (UI!FOUO~. I ..- t. b2 b7E (UlfFOUO)1 (U/fFouol 1 b2 b7E L I- l J~------------:------o:-----i\"'" I \ - 02 b7E ( (UIIFOUO)' -0 , 0 o· D . (U/fFouo)1 b2 b7E 41 UNCLA~SIFIED-FOR OFFICIAL US~ ONLY . ~ . . UNCLASSIFIED - FOR OFFICIAL USE ONLY Domestic Investigations and Operations Guide' b2 . b7E E. (U/IFOUOf (U!IFOUO} I J_~--'----_"';'--..-...-..LI] . ' -; (UiIFouoj . 1'" .... ,~, - --- -~ - .~ I ])2 b7E . (u/IFouoi I I [ F (U/IFOUO)I " " f b2 'b7E (U//FOUOj' \ I . 42 UNCLASSIFIED-FOR OFFICIAL USE ONLY UNCLASSIFIED - FOR OFFICIAL USE ONLY Domestic Investigati.ons and Operations Guide . I (UIIFOUO G. rullFOUO I I , b2 b7E 1 (UIIFOUOj...._ _i_~ I =====================================)'. "':CU":':"IIF=-O=--U-=-=O":;:j 'I .- - , I I H. (UIIFOUOj I(U/lFou6J . I b2 -p7E .. - \ I CUIIFOUO)\ . I. 1. J.. ._..,,--_:.- ~ (UilFouoj_ _ I _ --:---:-~===;:================:=::;-...........J 5.3. (U) Civil Liberties and Privacy (U) The.pursuit of legitimate goals·withoudnfringing upon the exercise of constitutional freedoms is a challenge that the FBI meets through the application of sound judgment and discretion. In order to ensure that civil liberties are not undermined by the conduct of assessments, every assessment under this subsection must have an authorized purpose and an identified objective. The purpose and objective bfthe assessment must-be documented and retained as described in this' section and in mOG Section 14. (U) Even when an .authorized purpose is present, an assessin~nt could create the appear~ncethat it is directed at or activated by constitutionally protected activity, race, ethnicity, national origin 43 UNCLASSIFIED-FOR OFFICIAL USE ONLY b2 b7E , I UNCLASSIFIED --FOR OFFICIAL USE ONLY Domestic Investigations and Operations Guide or religion-particularly under circumstances where the link to an authorized FBI mission is not readily apparent. In these situations, it is-vitally important that the authorized purpose and the underlying reasons for conducting the assessment and engaging in the propo~ed methods are well documented. (U) No investigative activity, including assessments, may be taken solely on the.basis of activities that are protected by the First Amendment or on-the race, ethnicity, national origin or religion of the sl.)bject. If an assessment touches on or is partially motivated by First Amendment activities,race, ethnicity, national origin or religion, it is particularly important to identifY and document the basis for the assessment with clarity. (U/IFOUO) Example: Individuals or groups who communicate with each other or with members of the public in any form in pursuit of social or political causes-such as opposing war or foreign policy, protesting government actions, promoting certain religious beliefs,championing particular local, national, or international causes, or a change in government through non-criininalmeans, and actively recruit others to join their causeshave a fundamental constitutional right to do so. An assessment may not be initiated based solely on the exercise qf these First Amendment rights. If, hOwever, a group exercising-its First Amendment rights ~lso t4reatens or advocates vi()lence or destruction of property, an assessment would be appropriate. (U) The AGG-Dom'require that the "least intrusive" means or method be considered and:..:-if operationally sound and effective-used>in lieu ofrrtore intrusive methods to obtain intelligence andlor evidence. This principle is also reflected in Executive Order 12333, which governs the activities of the USIC. Executive Order 12333 lays out the goals, directions, duties and responsibilities of the USIC. The concept of least intrusive means applies to the collection of all .intelligence and evidence, not just that collected by those aspects of the FBI that are part of the . intelligence complUnity. (U) By empha~izing the use of the least intrusive means to obtain intelligence and/or eviden~e, FBI employees can effectively execute their duties while mitigating the potential negative impact on the privacy and,civil ljb~rties and the d'amage to the reputation of all people encompassed within the investigation or assessment, including targets, witnesses, and vi9tims. T.his principle is hot intended to discourage FBI employees from seeking relevant and necessary intelligence, information, or evidence, but rather is intended to encourage FBI employees to choose the least intrusive-but still effective -means from_ the available options,to obtain the information. (AGG-Dom, Part LC.2) 5.4. (U) Authorized Purposes (AGG-Dom, Part II.A.2.-Authorized Activities) A. (U) Assessment Activities: During an assessment, the FBI may: 1. .(U) Seek information, proactively or in response to lnvestigative leads, relatirig.to activities constituting violations offederal criminal law or threats to the national security; 2. (U) Seek inforJT!ation, proactively or in response to investigative leads, relating to the involvelllent or roie of individuals, groups, or organizations relating to activities constituting violations offederal criminal law or threats to the national security; 44. UNCLASSIFIED-FOR OFfICIAL USE ONLY UNCLASSIFIED - FOR OFFICIAL USE ONLY Domestic Investigations and Operations Guid.e 3. (U) Identify and obtain information about potential targets of or vulnerabilities to criminal activities in violation of federall~w or threats to the national security; 4. (U) Obtain information to inform or facilitate i.ntelligence analysis and planning (AGG- Dom, Part'IV); 5. (U) Seek information to identify potential human sources, assess the suitability, . credibility, or value of individuals as human sources, validate human sources, or maintain the cover or credibility ofhum~n sources, who may 'be able 'to provide or obtain information relating to criminal activities in violation of federal law, threats to the national security, or matters of foreign intelligence interest; and 6. (U) Seek infoIinati9n, proactively or in response'to investigative leads, relating to matters of foreign intelligence interest responsive to 'foreign intelligence requirements. ' 5.5. (U//FOUO) Standards ,for Initiating'or Approving an Assessment (UIIFOUO) Before initiating or approving ail assessment, an FBI. employee or approving official must determine whether: A. (U/IFOUO) An authorized purpose and objective exists for the conduct ofthe assessment; B. (U/IFOUO) The assessment is based on factors otlier than the exercise·of'First Amendment activities or the.race, ethnicity, nati<,mal origin or religion of the subject; and C. (U/IFOUO)The assessment is an appropriate lise of persoqnel and financi~l resources. (U) Duration, Approval, Notice, Documentation,·File Review and,~esporisible Entity 5.6. (U//FOUO) FBIHQ and FBI Field Offices have the authority to conduct all assessment activities ,as authorized in Section 5.4. Field Office personnel and approving officials, C!s specifieci in the, DrOG Section 5.6.A.1-6"equate to the following FBlHQ personnel and approving officials when FBIHQ initiates, conducts, or closes an a~sessment: • (UI/FOUO) Fiel~ Office Analyst or Special Agent (SA) = FBIHQ Analyst, SA, or Supervisory Special Agent (SSA); .' (UI/FOUO) Field Office Supervisory Intelligence Analysts (SIA) = FBIHQ SIA; • (U//FOUO) Chief Division Counsel (CDC) = FBIHQ Office of the General Counsei (OGC); • (U//FOUO) Field Office SSA = FBIHQ Unit Chief (UC); an~ • (U/IFOUO) Special Agent in Charge (SAC) = FBIHQ Section Chief (SC). A. (UI/FODO) Duration, Approval, Notice, Documentation, File Review and Responsible Entity: An FBI employee must document on the FD-71 or in Guardian the use of or the request and approval for the use of authorized investigative methods·in type 1 and 2 assessments (see DrOG Section 5.6.A.I and 2, below). By exception, certain assessment type 1 and 2 situations may require the use of an electronic communication (EC) to document the use and approval ofparticuiar investigative methods. All type 3,4, and 6 (see DIOG Section 5.6.A.3.4. and 6, below) assessments and authorized investigative methods requiring 45 UNCLASSIFIED~FOR OFFICIAL USE ONLY UNCLASSIFIED - FOR OFFICIAL ,USE ONLY Domcst.ic Investigations and Operations Guide supervisory approval must use an EC to document the approval of the assessment and the r~quest and approval for the use of alJ. applicabie investi~ative method. (UI/FOUO) For type 5 assessment act'ivities, an FBI employee must follow the duration, approval, and other requiret:nents speCified in the FBI's. Confidential Human Source Policy. Manual (CHSPM), Confidential j'luman Source Validation Standards Manual (CHSVSM), . i the Use () FBI Con idential Hlllnan and The AUorne General's Guidelines Sources (AGG-CHS), as implemented i All type 5 assessment activities under this provision must be documented i unless otherwise directed i,n the Ol PG orother FBIHQ Divisio.n PGs. Ifthere is any inconsistency between the CHSPM or CHSVSM and the OlOG, the DIOG controls and aGC should be immediately notified ofthe conflict. b2 'b7E (U//FOUO) Listed below are the applicable duration, documentation, justiflcationlfiie review, approval level; and responsible entity for each type ofassessment, describ.ed in'DIOG ' Section 5.4 above. 1. (U//FOUO) Seek information, proactively or in response,to investigative leads, relating to activiti~ constituting violations of federal criminal law or threats to the natioIl~rsecurity· (e.~., the prompt checkin~ of leads on individuals or activity). (U//F0DO) Duration: There is no time requirem~ntfor this type of assessment, but it is anticipated that such assessments will be relatively short. These assessments require . recurring 30-day justification reviews by the SSA orSIA as discussed below. I (U//FOUQ) Documentation: Guardian wiH be used fori . , . . I b2 b7E;. ~ I he. electrOnIc .t..!,L-..Ll, aSQlscussea belOW, must be used to I L...:::_~"'1'":""_ _-'t'"....,.......:.-_----,~~ Guardian I . ! .. ·...JIFD-71 or L ... . (UI/FOUO) Approval: An FBI employee,may initiate an assessment under this subsection without supervisory approval~ . Ian FD-71 or Guar~ b2 b7E or Guardian. The initiation date for this type of assessment is the date the SSA or SIA assigns an FBI employee to conduct the assessment. (U//FOUO)'As soon as practicable following the determination that this type of assessment inv6lves a sensitive investigative marter, the matter mu~t be brought to the CDC for review and'to the SAC for approval to continue the assessment. The term I "sensitiye.investigative matter" is defined in Section 5~ 7 and Section 10J Ithe FD-71 or Guardian I •I L....,-,-..."..._...IlH~_ilgher supervisory approval, as described III Section 5.9, may be reqUIred before using one or more of the following investigativ~methods: physical surveiilance, certain interviews, and tasking of-confidential huma:n sources. In addition, as specified in the Division policy implementation guides (PG), there are agreements (e.g., Memoranda 46 UNCLASSIFIED-FOR OFFICIAL USE ONLY b2 .b7E ~UNCLASSIFlED - FOR OFFICIAL USE ONLY Domestic Investigations and Operations Guide of Agreements/Uriderstanding, Treati~s) that may require particular coordination pri 9r to the release/acquisition of federal, state, local, tribal, and foreign govemment infofrtiation. (UIIFOUO) Justification Review: If this type of assessment is not concluded within 30 days, the SSA or SIA must conduct recurring ;JO-day justification reviews in accordance with Section 3.4. Thisjtistification review must: a. (VI/FOUO) Evaluate the progress made toward achieving the authorized purpose and objective; b. (UIIFOUO) Ensure activities that occurred during the prior 30 days were appropriate; c. (U/IFOUO) Determine whether it is reasonably likely that information wmbe obtained that is relevantto the authorized objective, thereby warranting aJ.1 extension for another 30-days; d. (U/IFOU0) Determine whether adequate predication has been developed to justify opening a criminal, counterterrorism, counterintel!igence, cyber, or weapons of mass destruction predicated investigation; and' e. (UIIFOUO)Determine whether the assessment should be terminated., d: (UIIFOUOYThe FBI employee must-ensure·tha:t1· . -. , .. ~n the FD-71 Qr Guardian. The completed FD-71 or u~rdian requires supervisory approval before being uploaded. The FD,.71 or Guardian must also document supervisory approval for the use of any investigative method,that requires approval, such as: physical surveillance; certain interviews; or tasking of cOQfidential , human sources (see OlOG Section 5.9)~ In addition, as specified in the Division PG; there ~re agreements (e.g., Memoranda of Agreements/Understanding, Treaties) that may require particular coordination prior to ~herelease/acquisition of federal, state, local, I " . U j"ib'I'DP foreign ."""roment information.I L. . .'. - .~ ....; .b2 IWlthm the ap topl m& classification as described in Section 5.14. (UIIFOUO) Responsible Entity: This type Of assessment is conducted by the appropriate ,substantive Field'Office Squad. . . '1 (!!IIFOI mJL.-__- - - l [ · 1 =fI!:;(rr;O~II~Oj============;--1 J ,L I 47 UNCLA~SIFIED-FOR OFFICIAL USE ONLY ~. b7E '. UNCLASSIFIED - FOR OFFICIAL USE ONLY Domestic Investigations and Operations Guide access, he/she can also. review already existing data contained in any United States Government data system and search open source inform~tion on the illternetl· 'I I. . . I Open-source Internet searches do,not include any paid·;for., service databases such as Lexis-Nexis and' Choice oint· . , 1ft ese L....:-~--:---:-------:---~--;---:--.;....--;;---;-_-::-' database checks or open source Internet searches do not reveal' any derogatory .information, the FBI employee may te~jp.ate this activity without ~pening an assessment or documenting these activi~ies on an FD-71. (VIIFOVO)I b2 b7E I .. . --- , Iarid complete an t'V-/1 •. -~- . 2. (U/IFOVO) Seek information, proactively or in response to investigative leads, relating to the involvement or role of individuals, groups, or organizations in activities constituting violations of fe~eral criminal law or threats to the national security (e.g.,'the prof!lpt checking,of leads on groups or org~nizations). (VIIFOVO) Duration: There is no time requirement for this type of assessment, but it is anticipated that such assessmepts will be relatively short. These assessments require recurring 30-day justification reviews by the'SSA or SIA as discuss~d below. . I nT/IPOT rm . Documentation: Guardian I ,t IThe electronic FD-71,1 I -;:;:=:;;:Jr--r--:----:---Guardiarl,'--_ _--II . ..........;.,._---JlFu-n I or I (UIIFOUO) Approval: An FBI employe 'tiate an assessment under this . ection without su ervisory approval·~w;u;..wJ.!:.!.!i~2£L~~~~~~~~---... '--~:---;-:---::::-""""':--:-:__._ _ _:__"""""::_":""':"'--~-_-_ _:__-:--~-_:___::_::~ t e or Guardian. Th~, initiation date for this type of assessment is the d~te the SSA or SIA assign~ an FBI employee to conduct the assessment ' (UI/FOUO) As soon as practicable following the determination that this type of assessment involves a sensitive investigative matter, the matter must be brought to the . CDC for review and to the SAC for approval to continue the assessment. The term "sensitive investigative matter" is defined in Section 5.7 and Section 10. When completing the FD-71 or Guardian lead for an assessment involving a sensitive 48 UNCLASSIF:IED-FOR OFFICIAL USE ONLY b2· b7E UNCLASSIFIED - FOR OFFICIAL USE ONLY Domestic Investigations and Operations Guide I b2 b7E Higher supervisory approval, as described in Section 5.9 may be required before L...-u"'si""n-g-o"'ne or more of the following investigative methods: physical surveillance, certain interviews, and tasking of confidential human,sources. In addition, as specified in the Division PGs, there are agreements (e.g., Memoranda of AgreementslUnderstanding, Treaties) that may require particular coordination prior to the release/acquisition of federal, state, local, tribal and foreign government information. (U/IFOUO) Justification Review: If this type of assessment is not conclud~d within 30 days, the SSA or SIA must conduct recurring 30-day justification reviews in accordance with Section 3.4. This justification review must: a. _(U//FOUOYEvaluate the progress made toward achieving the authorized purpose and objective; b. (UI/F()UO) Ensure activities that occurreq during the prior 30 days were appropriate; c. (U/IFOUO) Determine whether it is reasonably likely that iilformation will be obtained that is relevant to the authorized objective, thereby warranting an extension for another 30-days; d: (UI/FOUO) DetermlJ;le whether adequate prediCation'has-beendevelopedto justify opening-a criminal, counterterrorism, counterintelligence, cyber, or weapons of mass . destruction predic~ted investigation; and e. (UI/FOUO) Determine whet~er the asse~sment should be terminated. (VI/FOUO) The FBl employee must ensure tha~ . l . in the FD-7IorGuardian. ;fhe completed FD-71 or duardian requires supervisory approval before being uploaded. The FD-71 or Gliardian must also document superVisory approval for the use 9f any investigative method that requires approval;such as:.physical surveillance; certain interviews; or tasking of confidential human ~ources (see Section 5.9). In addition, as specified in the Division pGs, there are agreements (e.g., Memoranda ofAgreementsIUnderstanding, Treaties) th~t may require particular coordination prior to the release/acquisition of federal, state,.local, tribal and for~ign government information. I _ .. I b2 b7E I .I '------- (U/IFOUO) Responsible Entity: This type of assessment is conducted by the appropr~ate substantive Field Office Squad. ~u:..u..L'IJ1.LL.ll ----l.l_-:-~ b2 . b7E 49 UNCLASSIFIED-FOR OFFICIAL USE ONLY UNCLASSIFIED - FOR OF¥ICIAL USE ONLY Domestic Investigations and Operations Guide /I" 'li O~ I b2 b7E I l1T'IJ,,,,~,,"'lTI'I/'r'l~' 1o..--_ _--:-- ...,....--_ _----.J 1 " 3.(U) Identify and,obtain information about potential targets ofor vulnerabilities to criminal activities in violation of federal law or threats to the national security. (U//FOUO) Assessments in this section may include activities designed to collect information for domain analysis that is focused on identifying targets of or vulnerabilities to criminal conduct or threats to the national security. FBIHQ·directed National Domain Assessments must be coordinated in a~vance with the FBlHQ DI, Domain Management Section (DMS):See theDlPG for details; . (U/IFOUO) This type of assessment l11ay not be used for the purpose of collecting positive foreign intelligence,'although such intelligence may ·be incidentaIly collected du~ing·this type ofassessrri.en~. Positive foreign intelligence can only be. collected pursuant to Section 5.6.A.6 and Section 9. " b2 b7E (U/IFOUO) Duration: An FBI ~mployee may initiate an assessment for this purpose only with prior SSA or SIA approval. The effective date of the assessment is the date the supervisor approves the EC. Such an assessment may continue for as long as necessary to achieve its purpose and Ql;>jective. When the objective jlas been met, a closing EC must be approved by the SSA or SIA and uploaded to the file. (U/IFOUO) Documentation: The approval to in~tiate this type of assessment and the rcq 'iwesti ative methods must be documented in an (U/Il:0UO) Approval: All assessments conducted.pursuant to this subsection must e approved in advance by an SSA or SIAand be" opened in either the appropriatel or other [as directed in the DI PG) or the appropriate substantive investigative classIfIcatIOn as an· assessment file with an opening EC.The title/case caption of the opening EC must contain the word'''Assessment,'' and the synopsis must identify the purpose and the objective of the assessment. If at the time of the opening; or at anytime tjlereafter, the assessment involves a sensitive investigative matter,the title/case caption must contain the words "Assessment"·and "Sensitive . Inyestigative Matter." (UIIFOUO) File Review: This type otassessment requires recurring 90-day file reviews ofthe assessment file and any sub-file by the SSA or SIA in accordance with Section 3.4. I. "I( I. .. 50 UNCLASSIFIED-FOR OFFICIAL USE ONLY I UNCLASSIFIED - FOR OFFICIAL. USE ONLY Domestic In~estigationsand Operations Guide Investigative file reviews for probationary FBI employees are re(;ommended every 30 days but must be conducted at least every 60 days. This file review must: a. (U//FOUO) Evaluate the progress made toward achieving the authorized purpose and objective; b. (U//FOUO) Determine whether it is reasonably likely that information will be .obtained that is relevant to the ,authorized objective, thereby warranting an extension· .for another 90 days (at least every 60 days for probation?ry FBI employees); c. (U//FOUO) Determine whether atlequate predication has been developed to justify opening a criminal, counterterrorism, counterintelligence, cyber, or weapons of mass destruction predicated invcstigation; and . d. (UI/FOUO) Determine whether the ~sessmentshould be terminated. (UI/FOUO) An SSA or SIA may approve an assessment under this subsection in accordance with the standards listed in the DIOG Section 5.5. However, if the assessment involves a sensitive investigative matter, then the initiation requires prior CDC review and SAC approyal. If a sensitive investigative matter arises after the initiation of an assessment, investigative activity must'cease'until'CDC-review and SAC approvaTis . acquired. The term "sensitive inv~stigative,matter" is defined in Section 5.7 and Section lQ. Higher supervisory approval, as described· in Section 5.9, may be required prior to use of the following investigative methods: physical surveillance, certain interviews, and tasking of confidential human sources. In addition, as specified in-the Division PGs, there are agreements (e.g., Memoranda of Agreeq1ents/Understanding, Treaties) th.at may require particular coorqination prior to the release/acquisition of federal, state, local, tribal and forc;:ign government information. (U//FOUO) Any collection underta~en in order to identify threats, vulnerabilities, or intell~gence gaps identified as a result of domain analysis or in response to an FBI National Collection Requirement or FBI Field Office Collection Requirement must' be ass:ss:",nHile ?fcording to the addressed in a separate sUbsta::':: ::::~:'::tj6: i~vestigative matter (e.gJ p: Additionally, any time an assessment begin'\; L U I % i c u ar m lvlual, a separate substantive. ' classification ass~ssment file or subfile, as appropriate, according to the investigative matter must be opened on the individual. (UI/FOUO) Responsible Entity: In general, the Field Intelligence Group (FIG) or FBIHQ DI ~ill mana e this e of assessm nt, regarrles: ofwhetber the 31'se s fnt is or otherJ......... ·1 as documented In an directed in the DI or a su stantlve Investigative classllcatlon file. This includes substantive assess:ents de~:'v:: f~omlanalYSiSproduced and documented i9 (or other as directed in the DIPG). Under the ml-a-n-ag-e-m-e-n"":'tof the FI6, substaiflve t'te rIce Squads can support the collection of information for this type of assessment. However, substantive Field Office Squads or FBIHQ Units will be responsible for initiating and managing particular kinds oftype 3 assessments. These assessments will be documented in the appropriate substantiv~ investigative classification file. ' sm r ... ... . 51 UNCLASSIFIED-FOR OFFICIAL USE ONLY b2 b7.~ UNCLASSIFIED - FOROFFIClAL USE ONLY Domestic Investigations and Operations Guide I (u//FOUO~ b2 b7E . I (UI/FOUO)I - I b2 b7E , I 1 (U/lFouQ1 b2 b7E - 4. (UIIFOUO) Obtain information to inform odacilitate intelligence analysis and planning. [AGG-Dom, Part'IY} (UI/FOUO)' Assessments'in this section may include activities designed to collect infonnation for domain analysis in order to respond to an FBI Natibmil Collection 'Requirement or FBI Field Office CollectIon Requirement created in response to FBI operational neegs or an intelligence gap identified.through strategic analvsis that was conducted as part of the FBI's national security or law"enforce~entresponsibilities, as discussed· in Sections 5.11 and 5.12. FBIHQ directed NatIonal Domain Assessments must be coordinated in advance with the FBIHQ DI, Domain Management Section (DMS). See the DLPG for d~tails. (U/IPOUO) This type of assessment may not be used for the purpose of collecting positive foreign'intelligence, althqugh such intelligence may be incidentally coOected during this type of assessment. Positive foreign intelligence can only be collected' pursuant to Section 5.~.A.6 and Section 9. (UI1P9UO) Duration: An FBI employee may initiate an ~ssessment for this purpose only with prior SSA or SIA approval. The ~ffective date of the assessment 'is .the date the supervisor approves the EC. Such an ass~ssment may ~ontinue for as long as necessary to achieve its purpose and objective. When the objective has.been met, a closing BC must be approved by the SSA or SIA and uploadeq. to the file. (UIIFOUO) Documentation: The approval to initiate this type'ofassessment and the request for approval to use applicable investigative methods must be documented'in an EC. This type of assessment may be documented jn ejt~er t~e appr~priate I '. . or other Jas dIrected III (he DI PG) or the appropriate substantive 'investigative classification as~essrhent file. k I .. . 52 UNCLASSIFIED-FOR OFFICIAL USE ONLY I . I b2 b7E UNCLASSIFIED - FOR OFFICIAL USE ONLY Domestic Investigations and Operations Guide b2 b7E (U/IFOUO) File Review: This type of assessment requires re~urring 90-day file reviews of the assessment fiie and any sub-file by the SSAor SIA in accordance with OlOG Section 3.4. Investigative file reviews for probationary FBI employees are recommended every 30 days but must be conducted at least every 60 days. This file review must: a. (U//FOUO) Evaluate the progress made toward achieving the aU,thorized purpose anc:i objective; b. (U/IFOUO) Deter'Inine whether it i~ reasonably likely that info~ation will pe .. "obtained thatis"relevantto the authorized objective, thereby warranting an extensiori for'another 90 days (at least every 60 daysfor probationary FBI 'employees); . c. (U//FOUO) Determine whether adequate predication,has been developed to justify opening a criminal, counterterrorism, counterintelligence, cyber, or weapons.of mass destructionpredica~ed investigation; and d. (UI/FOUO) Determine whether the assessment should be tenpinated. (U//FOUO) An SSA orSIA may approve an.assessment tinder this sUQsection in accordance' witli the standards listed in the mOG SectIon 5.5. However, if the assessment involves a sensitive investiga:tiv~ matter, then the initiation requires prior CDC review and SAC approval. If a sensitive' investigative .matter arises after the initiation of an assessment, investigative activi~y must cease until CDC review and SAC appn;>Val is acquired. The term "sensitive investigative matter?' is defined, in Section 5.7 andDiOG Section 10. Higher supervisory approval, as, described in Section 5.9, may be required . before using the following, inv.estig~tive methods: physical surveillance, certain interViews, and tasking of confidential hl,lman sources. In addition, as specified in the Division PGs,there are'agr~ements(e.g., Memoranda of Agreements/Understanding, Treaties) that.may require particular cO"ordination prior to the release/acquisition of fec:leral, state,.local, tribal and foreign government information. (UlIFOUO) Any collection undertak~n in order to identify threats, vulnerabilities, or intelligence gaps identif1ed as a result of domain analysis or in response to an FBI . National Collection Requirement or FBI Field Office Collecti9n Requirement must be addresse,din a separate substantive c1aSSitiC~iQn asseSfiment file a:[cording to the inv~stigative matter (e.g.,l " ~ _ Additionally, any time an assessment begins to focus on apa_rtlc41ar individual, a separate substantive classification assessment file or subfile, as,appropriate, according to the investigative matter must be opened on the individual. S3 UNCLASSIFIED-FOR OFFICIAL USE .ONLY b2 b7E UNCLASSIFIED - FOR OFFICIAL. USE ONLY Domestic Investigations and Operations Guide I (UI/FOUO) Responsible Entio/: The FIG or FBIHQ Dl will manage this tvpe of assessmen re ardless ofwhe e the assessment is'documented in ani (or other .' as directed in the DI PG) or a substantive investigative classi IcatlOn lie. This includes substantive assessments derived from apalysis produced (or other I . ' Ias directed in the and documented inl' DI PG). Under the management of the Frd, substantive Field Office Squads c;an support . the collection of information in this type of assessment (UI/Foumi .. I b2 b7E '1 b2 b7E , (UlIFOUOn I , \ b2 b7E (UlIFOU01I ., I bZ' b7E 5. ({)/IFOUQ) Seek inform~tion to identify pot~ntial human sources, assess the suitability, credibility, or value of particular individuals as human source~, validate human sources, or maintain the cover or credibility of human sources, who may be able to pro~ide or obtain information relating to criminal activities in violation of federal law, threats to the national security, or matters of foreign intelligence interest. (U//FOUO) Duration:AIl such activities must follow th~ polley requirements establish~d in the FBI's Confidential Human Source Policy Manual (CHSPM),. Confidential Human Source Validation Standards Manilal (CHSVSM), and The Attornev General's Gitidelines Regarding the Use o(FBI Confidential Human Sources (AGGCHS), and implemented inl I Ifthere'is any inconsistency between the CHSPM or 54 .UNCLASSIFIED-FOROFFICIAL USE ONLY b2 b7E UNCLASSIFIED - FOR OFFICIAL USE ONLY Domestic Investigations and Operations Guide CHSVSM and the DIOG, the DIOG controls and OGC should be immediately notified of the co~flict. (UI/POUO) Documentation:1 - Imust be used,to document all 'activities under this prov!sion, unless otherwise directed in the Dl PG or other FBIHQ Division PGs. . (UI/POUO) Approval: All approvals must fol!ow the policy requirements established in the FBI'~ CHSPM, CHSVSM, and the AGG-CHS, and as implemented inl ~ b2 'b7E (U/IFOUO) File Review: File reviews must be conducted in accordance with the FBI's CHSPM. (U//FOUO) Responsible Entity: A FIG or substantive squad m~y conduct and manage this type of assessment. 6. (UI/FOUO) Seek information, proactively or in response to investigative leads, relating to matters of foreign intelligence interest responsive to foreign intelligence requireme.nts. (U//FOUQ) Foreign Intelligence is "information relating to the capabilities, intentions, or activities of foreign governments or elements thereof, foreign organizations, or foreign persons, or intemationa.1 terrorists." The FBI defines a foreign intelligtmc~ reql!irement to bea collectionrequiremehtissuedby the United States Inte'Higence Community (USIC) and accepted by the FBI pi. The collection of foreign intelligence pursu~nt to this definition extends the sphere of the FBI's information-gathering activities beyond federal crimes and threats to the nationa,1 security, and permits the FBI to seek information regarding a broader range of matters relating to, foreign powers, organizations, or persons that may be of interest to the ,conduct of the United States' foreign affairs. (AGG-Dom, Introduction A.3) (UI/FQUO) Under this authorized purpose, an FBI employee may only collect information that relates to matters of positive foreign intelligence. (See 0 IOG Section 9 for a' description of'~positive foreign'intelligence.") An FBI employee. should prioritize collection ,against FBI National Collection Requirements before attempting to collect against a positive foreign intelligence requirement. The 01 PG furnishes guidance on the prioritization of collection: (UlIFOUO) Duration: An FBI employee may initiate an assessment for this purpose only with-prior Field Office SSAor SIA approval and FBIHQ Co.llection Management Section (CMS) approval. The effective date oftbe assessment is the date FBIHQ 'CMS approves the. assessment. Such an assessment may continue for as long as necessary to achieve its purpose and objectives. When the objective' has been met, a closing EC must be approved by the Field Office SSA or SIAand FBIHQ CMS and uploadedt6 the file. (U//FOUO) Documentation: This type ofassessment must use an EC to document the initiation approval of the. assessment and the request and approval for the use of applicable investigative methods. Fore~n intelligence collected rnlrs",o~lto this _or as otherwise subsection must be maintained in thelp~ determined by FBIHQ CMS. The or ~ further describes this process. ' CUI/FOUO) Approval: Assessments to collect on matters of "foreign intelligence interest" must be approved in advance by FBIHQ CMS in accordance with the standards 55 UNCLASSIFIED~FOR OFFICIAL VSE ONLY b2 b7E UNCLASSIFIED - FOR OFFICIAL USE ONLY Domestic Investigations and Operations Guide I listed in Section 5.5.1 b2 b7E lIn addition to the normal I,.re....... q IU""'lr:::'le~m~e:;:m:r·'r{(o~u~s::::e:-;trl:"::'hceTlle::a~s:+t":':m::;tr::u:::s:::iv-:::e:-:m=et;ih::::o~dj";t::o-;:g:::a';:ith::e::r::injformation during an assessment, when conducting this type of assessment the FBI employee must be' mindful ofthe additional requirement.to operate openly ~nd consensually.with a United States person, to the extent practicable. (U//FOUO) File Review: This type of assessment requires r~ctirring 90-day file reviews of the assessment file and any sub-file by the SSA or SIA in accordance with Section 3.4. Investigative file reviews for probationary FBI employ~es are recommended every 30 days but must be conducted at least every 60 days. This file review must: a. (U/IFOUO) Evaluate the progress made toward achieVing the authorized purpose and objective; b. (U//FOUO) Determine whether~it is reasonably likely that information-will be obtained that is relevanrto the authorized objective, thereby warranting· an extension for another 90 days (at least every 60 days for prob~t~onary FBI employees); c. (U//FODO) Determine whether adequate predication has been c)eveloped to justify opening a criminal, counterterrorism, counterintelligence, cyber, or weapons of mass destruction predicated investigation; and d. (UI/FODO)' Determine whether the assessment should be terminated: (V//FODO) Ifthe initiation of the assessment involves a·sensitiv.e investigative matter,·it must be reviewed by the CDC and app~oved by-the SAC, priot to seeking FBIHQ CMS a.uthorization. If a sensitive investigative matter arises after the initiation of an assessment, investigative activity must cease until CDC review and SAC ·approval is acquired and notice provided to FBIHQ CMS. Higher supervisory approval, as described in Section 5.9, may be required before using the following investigative methods: physical surVeilla.nce, certain interviews, arid tasking of confidential h4man.sources. In addition, as.specified inth~ Division POs, there are agreements (e.g., Memoranda of .. AgreeinentslUnderstanding, Treaties) that may require particular coordination prior to the release/acquisition of certain federal, state, local, tribal and foreign government information. (UliFOUO) Positive forei suant to this subsection must be maintained in or as otherwise determined by FBIHQ CMS. e ttt e case caption of the opening EC must contain. the word "Assessment," and the synopsis must identify the purpose a~d the objective of the assessment. Ifat the time of the opening, ot.at anytime thereafter, the assessment . involves a' sensitive investigative matter, the title/case caption must contain the words "Assessment" and "Sensitive Inyestigative Matter." the Dr PG further describes this process. 56 UNCLASSIFIED~FOR OFFICIAL USE ONLY .b2 b7E UNCLASSIFIED - FOR OFFIC~LUSE ONLY Domestic Investigations and Operations Guide (UIIFOUO) Responsible Entity: This type of assessment is managed by the FIG and FBlHQ D1. 5.7. (U) Sensitive Investigative Matter I Academic Nexus I Buckley Amendment A. (UlIFOUO) Sensitive Investigative Matter: An investigative matter involving the activities of a domestic public offici~1 or political candidate (involving corruption or a threat to the national.security), religious or political organization or individual prominent'in such an organization, or news media, or any other matter which, in the judgment of the offic.ial . authorIzing an investigation, should be brought to the attention of FBI Headquarters and other DOJ officials. (AGG-DolJl, Part VILN.) As a matter of FBI policy, ''judgment'' means that the decision of the authorizing'official is discretionary. DIOG Section 10 and the DIOG "classifiedAnnendix G define! I b2 b71? B. (UI/FOUO) Academic Nexus: I b2 b7E (UIIFOUO) The sensitivity related to an academic institution arises from the American tradition of "academic freedom" (e.g., an atmosphere in which students and faculty are free to express unorthodox ideas and views and to challenge conventional thought without fear of repercussion). Academic freedom does not mean, however, that academic institutions are off limits to FBI investigators in pursuit ofinformation or individuals of legitimate investigative interest. (UIIFOUO~ I' . !see .the DIOG classified AppendIx b2 h7E G.. C. (UlIFOUO) Buckley Amendment: A request for "academic records" must only be made pursuant to the provisions of the Buckley Amendment(Th~ Family Educational Rights and Privacy Act of 1974, 20 U.S.C. § 1232[g], as amended by Public Law 107-56 ["USA PATRIOT Act"]). An FBI employee is prohibited frOm receiving "academic records" that have not been properly requested pursuant to the Buckley Amendment. The definition of "academic records" is very broad and covers almost all records about a student other than public, student directory-type information published by the institution. The Buckley Amendment contains a penalty provision for those institutions that'im ro e . academic records to 1a (UIIFOUO) A Buckley Amendment request for academic records cannot be made during an assessment. In a predicated investigation, a request for academic records must be made pursuant to the Buckley Amendment.. 57 UNCLASSIFIED-FOR OFFICIAL USE' ONLY b2 b7E UNCLASSIFIE;D - FOR OFFICIAL USE ONLY Domestic Investigations and Operations Guide (V//FOUD) Standards for Initiating or Approving the Use oran Authorized Investigative Method 5.8. (U//FOUO) Prior tQ initiating or approving the use of an authorized investigative method, an FBI employee or approving official must determine whether: A. (U//FOUO) The use of the particular investigative method is likely to further an objective of the assessment; B. (U//FOUO) The investigative method selected is the least intrusive method, reasonable under the circumstances; C. (UI/POUO) The anticipated value of the assessment justifies the ilse ofthe,selected . investigative method or methods; D. (UI/FOUO) If the purpose of the assessment is to collect positive foreign intelligence, the investigative method complies with the AGG-Dom requirement tha~ the FBI operate openly and consensually with a United States person, to the extent practicable; and. E. (UI/FOUQ) The method is an appropriate usc ofpersoimel and financial resources. 5.9. (U) Authorized Investigative Methods in Assessments and Predicated Investi~a~iolls (U) The following investigative methods· may be used· in ~ssessments- and predicated investigations: A. (D) Obtain publicly available information. (AGG-Dom, Pat:t II.A.4.a and Part VIT.L.). 1'. (D) Scope: "Public!y available irtfonnation" is infonnation that is: a.. (D) Published or broadcast for public consumption; b. (U).AvaiIable on request to the public; c. (U) Accessible on-line or otherwise to the public; d~ (D) Avai lable to the public by subscription or purchase; e. (U) Made available at a meeting open to the public; f. (U) Obtai~ed by visiting any place or attending an event thafis open to the public;.or g. (U) Could'be seen or heard by any casual observer not involving unconsented . = intrusion into private places. (U/IFOUOll· 1 .. . J . 2. (UI/FOUO) Approval: Supervisory approval is not required for use of this method~ except as to information gathered at' a religious service. Notwithstanding any other policy, tasking a CHS or UCE to attend a religious service-during a predicated investigation, whether open to the public or'not, requires SSA approval. Tasking a·CHS to attend a religious service, whether open to the Ptlb\ic or not, during an assessm~nt requires SAC approval. . 58 UNCLASSIFIED-FOR OFFIC~ USKDNLY b2 b7E UNCLASSIFIED - FOR OFFI(:IAL USE ONLY Domestidnvestig~tions~nd Operations Guide 3. (U/fFOUO) Application: This investigative method may be used in assessrpents. national security investigations~ criminal investigations. foreign intelligence collection cases~ and for assistance to other agencies. 4. (U) UseIDissemination: The use or dissemination of information obtained by this method must comply with the AGG':J:)om and mOG Section 14. B. (U) Engage in observation or surveillance not requiring a co~rt order. Surveillance includes physical, photographic· and video surveillance where such' surveillance does not infringe on a reasonable expectation of privacy and trespass is not required to accomplish the surVeillance. (AGG~Dom, Part II.A.4.h) 1. (V) Scope a. (UifFOVO) Physical Surveillance Defined: Physical surveillance is the deliberate observation by an FBI employee of persons, places, or events, on either. a limited or continuous basis, .in a public or a-semi-public (e.g., commercial business open to the public) $etting. (V/fFOUO ,....;:..---r----'----- b2 p7E b. (UlIFOVO}SurveilIance E!1hancement.Devices: The use of mechanical devices operated by the user (e.g., binoculars; hand-held cameras; radiation. chemical or . biological detectors) is authorized in physical surveillance.provided that the device is not used to collect infonnatic)O in which a person has a reasonable expectation of privacy (e.g., equipment.such as a parabolic microphone or other listening device that would intercept a private conversation or thermal imaging a home i's not permitted). 2..(UlIFOVO) Approval: During an assessment, physical surveillance may be approved for a period of time not to exceedl . . ~s explained further below. . a. (U/IPOVO) St!lQdards for Initiating or Approving Physical Surveillance During an Assessment: During ,an assessment,jn addition to the standards contained in Sections 5.5 and 5.8, the FBI employee and supervisor must consider the follOWIng: 59 UNCLASSIFIED-FOR OFFICIAL USE ONLY 62 biE UNCLASSIFIED - FOR OFFICIAL USE ONLY DomesticJnvestigations and Operations Guide (UI/FOUO) Whether the physical surveillance is rationally related to the articulated pUrpose and objective of the assessment; I. ll. CUI/FOVO) Whether the physical surveillance is the least intrusive alternative . for acquiring needed information; iii. CUI/FODO) If the physical surveillance is for the purpose of determining a pattern of activity, whether there.is a logical nexus between the purpose of the assessment and the pattern of activity he or she is seeking to determine; and 'iv. (U//FOUO) If being conducted jn order to gather positive foreign intelligence, whether the surveillance is consistent with the requirement that the FBI employee operate openly and consensually with a United States person, to the extent practicable b. CU//FOUO)I ' I - - b2 b7E \ c. 'F b2 b7E d ~ l- It ~JlI .. GuardIan, or an EC requestmg ASAC approval. 60 UNCLASSIFIED-FOR OFFICML USE ONLY \;in an FD-71, .. --. I UNCLASSIFIED - FOR OFFICIAL USE ONLY Domestic I)1vestigations and Operations Guide e. (U//FOtJO) Physical Surveillance during Predicat~dJnvestigations:Physical surveillance undertaken during a, predicated investigation does not re uire supervisory approval 3. (U//FOUO)AppIication: This investigative method may be used in assessments, 'national 'security investigations, criminal investigations, foreign intelligence collection cases, and for assistance to other agencies when it is pot otherwise ptohibite~,by AGG-Dom, Part III.B.2-3. 4. (U) Use/Dissemination: The use or di~seminl:ltionof information obtained by this "method must comply with the AGG-Dom and mOG Section 14. C. (D) Access and examine FBI and other Department of Justice (QOJ) records, and obtain information from any FBI or other D'OJ personnel.-(AGG-Dom, Part II.AA.b.) 1. (U//FOUO) Scope: As part of an assessment or predicated iIivestig~tion, an.FBI employee may access and examine FBI and other DQl records and may obtain information from any FBI personnel or other DOl personnel. Access to certain F13I recorc:l.s may be restrictf:4 to l.i~signated EBIpersonnel because of the serisitiv-e nature.of the information in the record or the classification of the records. These include, but are not limited to: FBI records concerni~g human source identification; espionage investigations; code word; and other compartmented information. 2. (U//FODO) l\pproval: Supervisory approval is not required to use this method, except that ifthe use of records constitutes pattern-based data mining under the Feder~Lpata Mining Reporting Act of 2007, it must be reviewed' and approved according to paragraph 3.below. 3. (D//FOUO) Pattern-Based Data Mining: The vast maJority of data analysis performed during FBI assessments 'is bl,lsed on subjects or events and does not meet the definition of pattern-based data mining. Pattern-based data mining is the use of one or more data bases .to search for persons who fit a set of group characteristics or patterns of behavior (e.g., the known characteristics of a particular terrorist organization). Any such analysis baSed solely on racial, ethnte, national origin or religious characteristics is strictly prohibited. Sensitive Operations Review Committee (SORC) approval is required for any analytical search of FBI or other agency data bases that constitute pattern-based data mining, as defined above. Additionally, pursuant to the Federal Data Mining Reporting Act of2007, the FBI must report all agency initiatives that involve the use ofpattern~based data mining to Congress. 4. (U/IFOUO) Application: This investigative method may be used in assessments, national security investigations, criminal investigations, foreign intelligence collection cases, and fqr assistance to other agencies. ' 5. (0) Use/Dissemination: The use or dissemination of information obtained by this' method must comply with the AGG-Do!l1 and mOG Section 14. 61 UNCLASSIFIED-FOR OFFICIAL USE ONLY b2 b7E UNCLASSIFIED - FOR OFFICIAL USE ONLY Domestic Investigations and Operations Guide D. (U) Access and examine records maintained by~ and request information from~ other federal~ state~ ~ocal, or tribal, or foreign governmental entities or agencies. (AGG-Dom, Part II.AAc.) 1. (U//FOUO) Scope: As part of an assessment or pr~dicated investigation, an FBI employee may access 'and-examine records maintained by, and request information from, other federal, state, local, or tribal, or foreign governmental entities or agencies: When requesting information using this authority, care musfbe taken to ensure the entity concerned understands that it is not'compelled to provide 'such information or create a new record for the purpose of assisting the FBI. 2. (UlIFODO) Approval: Supervisory approval is not required to use this method for ','routine uses," unless. such approval is required by Memoranda of Understanding (MOU) Of other agreements for requesting such informatioI),. The FBI may request another federal age'ncy to disclose Privacy Act-protected records pursuant to the other agency's \'routine uses" (5 U.S.C. § 522a[b][3]) or through a written request for a law enforcement purpose (5 U.S.C. § 522a[b][7]). Such written requests (for a law enforcement purpose) pursuant to 5 U.S.C. § 522a(b)(7} may be mad€? by the Djrector or his designee, provid(;ld that such authority may not-be delegated :below the Section Chief level (28 C.F:R. § 16AO[c]; OMB Guidelines, 40 Fed. Reg. at 28,955). Requests for records or inf9rmatioh from a foreign government entity or agency must be appropriately c()ordinated through the applicable FBI Legat office, Office ofInternationaJ Operations (010), INTJ;:RPOL, relevant,substantive headquarters division, and/or DOl Office of .International Affairs, as necessary. Direct contact is authorized in certain circumstances, such as an imminent threat situation. If the analysis of records obtained .in this manner' constitutes pattern-based data mining tinder the Federal· Data Mining Reporting Act of 2007, it must be reviewed and approved according to Section.5.9.C.3, above., (U!/FODO)I I -\ _ . te (UIIFOUO) Records received from an outside entity and used during an asse'ssment must maintained as part of the app~opriate file(e'$~l _ I 3. (UlIFODO) Application: This investigative ~ethod may be used in assessments, national security investigations, criminal 'investigations, foreign intelligence collection cases, and for a~sistance to other agencies. 4. (U) UselDissemination: The use and/or dissemination of information obtained by this method must comply with the AGG-Dom and DlOG Section 14. E. (D) Use online services and resources (~hethcr non-profit or ~ommercial). (AGO-Dom, Part n.AA.d.) -I. (UIIFOUO) Scope: As part of an assessment or predicated investigation, an FBI eh1ploye~ may use any FBI-approved on-line service or resource that is available by subscription or purchase, including services available only to law enforcement entities. 62 \ UNCLASSIFIED-FOR OFFICIAL USE ONLY »2 b7E UNCLASSIFIED - FOR OFFICIAL USE ONLY Domestic Investigations and Operations Guide 2. (U//FOUO) Approval: Supervisory approval is not required to use this method, although subscribing to or purchasing any new service or resource must be done according to FBI contracting procedures: (UIIFOUO) Example: FBI-approved on-line services or resources include, but are not limited to: Google, Yahoo, or similar Internet search services; data brokers such as ChoicePoint, Westlaw, and Lexis-Nexis; and vehicle, casualty, and property insurance claims databases such as Claim-Search. 3. (U/IFOUO) Application: This investigative method'may be used in assessments, national security investigations, criminal investigations, foreign intelligence collection cases, and for assistance to other agencies. 4. (U) UselDissemination: The use. or dissemination of information obtained by this method must comply with the AGG-Dom and mOG Section 14. F. (U) Interview or request information from members of the public and private entities. (AGG-Dom, Part ILAA.f) 1. (UI/FOUO) Scope: An interview is the questioning of an individual (to include the . ,stibject) designed-to gatherinformation'frorrphe person beinginterviewedthads-accurate, pertinent to, and within the scope of an authorized assessment or predicated investigation. In the normal course of an interview, the FBI employee should divulge the employee's affiliation with the FBI and the true purpose of the interview. Information requested during an interview must be voluntarily provided. If the person who is being interviewed expresses a desire not to provide the information, the FBI employee may not state or imply in any way that the interviewee is compelled to provide information or that adverse consequences may follow if the interviewee does not provide the information.lfthe person being interviewed indicates he or she wishes to consult an attorney,Jhe jnterview toust immediately stop. 2. (UI/FOUO) Custodial Interviews: Within the United States, Miranda warnings are required to be given prior to custodial' interviews if the subject is significantly restricted in hislher freec;iom of action to a degree normally associated with a formal arrest. For more information refer to the CID and CTDPGs and The FBI Legal Handbook for Special Agents (LHBS,A), Section 7~3"'2. . 3. (UlIFOUO) Approval: With the exceptions discussed below, interviews do not require supervisory approval. a. (UIIFOUO) Contact With Represented Persons: (U//FOUO) CDC review is required before contact with represented persons. Such contact may implicate legal restrictioJ1s and affect the admissibility of resulting evidence. Hence, if an individual is known to be represented by counsel in a particular matter, the CDC will follow applicable law and DOJ procedure when reviewing the request to contact the represented individual in the absence of prior notice to counsel. The SAC, CDC, or their designees, and the United States Attorney or their designees must consult periodieaily on applicable law and DOJ procedure. The Field Office may raise the following issues with the United States Attorney's Office and request that it consult with the DOJ Professional Responsibility Advisory Office, when the issues include, but are not limited to, the inconsistent application of: 63 UNCLASSIFIED-FOR OFFICIAL USE ONLY UNCLASSIFIED - FOR OFFICIAL USE ONLY Domestic Investigations and Operations·Guide (i) state ethics rules; or (ii) rules for contacts with represented persons. (AGG-Dom, Part V.B.!) b. (U//FOUO) Members of the United States Congress and their Staffs: (U//FOUO) Generally, FBI employee~ may-take information received from congressional offices just I,lS they would take information from other. sources, and they may act upon it accordingly. (U//FOUO) However, prior CDC review, SAC and appropriate FBIHQ AD approval and prior .notice to the AD Office of Con!!ressional Affairs mCA'I ~rp. • • if an investi2:ator seeks tor . I b2 b7E ----If"Note: The FBIHQ substantive Division policy implementation guides may contain additional approval/notice requirements. L....;.. c. (U//FOUO) White House Personnei: (U//FOUO) CDCreview and SACapprovaLis requiredbefote injtiating contact with; White House personnel. Additionally, CDC review; SAC approval and appropriate FBIHQ Section.Chiefapproval must be obtained prior to conducting· an interview of a member of the White Bouse staff. Note: The FBIHQ substantive Division policy implementation guides may contain additional approval/notice requirements. . d. (U) FBIHQ Substantive Division Requirements: i. (U//F9UO) Counterintelligence Division: Interviews conducted during counterintelligence assessments and predicated investigations must comply with the requirements contained in the, Memorandum of Understanding Between the Department of State.and the FBI on Liaison for .. Counterintelligence Investigations. The.FBIHQ Counterintelligence Division PG contains interview'approval requirements. ii. CD//FOUO) Other FBIHQDivisions: Each FBIHQ Division may provide additional interview approval requirements in its policy implementation guide. 4. CU//FOUO) Requesting Information Without Revealing FBI Am'iation or the True Purpose of a Request:. a'I(U//Fo~o)r-1 ~-_-----:''''''''''---~_-:---'-----'~-~--J r ---:.....---~,...........:..~~ b(IIFOUOll c. H (UIIFOUO~ J . ~. J . 64 b2 b7E UNCLASSIFIED - FOR OFFICIAL USE ONLY Domestic Investigations ·llnd Operations,Guide .. I d. (UI/FOUO) b2 b7E e. (lJIIFOUOjL j .....:-:-_ I . (l),(UlIFOUO)IL.~ _ I i. (U/IFOUO ii.~::..:.:.:..::.~:.-.- Iii.'~~~~ iv. rJ _ I l. 'm77Ft1T1Tn-----..... I vii. (UI/FOUD)I (2) (U//FOUOj-.!:====== b2 b7·E I v. ,..;....._-...:.....:J..-_ _--,_ f. b2 b7E , IL-:::::::::::::::::::::;::::::;= (UI/FOUO I j b2 b7E b2 b7E g. (UIIFOUO) li2 l:J7E 65 UNC~ASSIFIED-FDR OFFICIAL USE ONLY UNCLASSIFIED - FOR OFFICIAL USE ONLY Domestic Investigations and Operations Gujde b2 b7E , (UI/FOUO)! 1 . b2 b7E (U)I~~ i. (VlIFOUOH'.-----------'--- ii. (VI/FOUO) r ==~==.:IJ . b2 b7E I 52 b7E iii. (UlIFOUQ)[ I b2 b7E iv. (UlIFOUO)I[==_~ _.,....-· ~ IL ~.......o--....._J b2 b7E 66 llNCLASSIFIED.FOR OFFICIAL USE ONLY • I UNCLASSIFIED - FOR OFFICIAL USE ONLY Domestic Investigations and Operations Guide_ ,b2 b7E v. IrllIJl/II b2 b7E vi. LUlIFOUOl -- b2 b7E " 67 UNCLASSIFIED-FOR OFFICIAL USE ONLY UNCLASSIFIED - FOR QFFICIAL USE ONLY Domestic Investigations and Operations Guide vii. (U//FOUOlI I b2 b7E viii.(U/IFOUO) I b2 b7E 5. (U/IFOUO) Application: This investigative method may be used in ,assessments, national security .investigations, criminal investigations, foreign intelligence collection cases, and for assistance to other agencies when it is not otherwise prohibited by AGO-Dom, Part 'III.B.2~3. 6. (D) UseJDissemination: The use or dissemination of information obtained by this method must comply with:the AOG-Dom and 0100 Section 14. G. (V) Accept information voluntarily provided by governmental or priVate entities. , (AGO-Dom, Part iI.AA.g.) S~op~: As part of an assessment or predicated investigation, an FBI employee may accept information voluntarily provided by'federal, state, local, or foreign governmental or,private entities to include individuals. Voluntarily provided information includes, 'but is not limited to, oral as well as documentary and physical evidence such as:. a computer hard drive or other electronic media that contains information, paper documents containing information, or physical objects (e.g., handgun or narcotics). 1. (U/IPOVO) . 68 UNCLASSIFIED-FOR ()FFICIAL USE ONLY UNCLASSIFIED"" FOR OFFICIAL USE ONLY Domestic Investigations and Operations Guide 2. (UlIPOUO) Approval: Supervisory approval is not required to accept voluntarily provided information. Personnel may not request nor knowingly accept Information where disclosure would be prohibited by federal. law. See, e.g., ,18 U.S:C. § 2702 (prohib(ting an entity providing electronic communications serviCes from divulging certain communications and other records, except in certain circumstances). i· 3. (UI/FODO) Application: This investigative method may be used in assessments, nation~l security investigations, cririlin~l investigations, foreign intelligence collection cases, and for assistance to other agencies when it is not otherwise prohibited by AGG-Dom, Part III.B.2-3. . . 4. (U) UselDissemination: The use or dissemination of information obtained by this method must comply with the AGG-Dom and mOG Section 14. H. (U) Use and recruit human sources in conformity with the Attorney General's Guidelines Regarding the Use of FBI Confidential Human Sources. (AGG-Dom, Part IJ.AA.e) 1. (U/IFOUO) The FJ;31 may use and recruit human sources in assessments and predicated 'investigations in conformity with. the AGG-Dom, AGG-CHS, the FBI CHSPM, and the FBI CHSVSM. In this context, "use" means obtaining information from, t<l.~.king, or otherwise operating such sources. '(AGG-Dom, ParfVII.V.) . 2. (U//FODO) A CHS can be "used" in support of an assessment and a predicated investigation or for the purpose of validating, vetting or determining the suitability of another CHS as part of an assessment. 3. (UlIFODO) Religious Service-Notwithstanding any other policy, tasking a CBS to attend a religious service, wh~ther or not open to the public, requires SSA approval in a predicated investigation and SAC approval in an assessment. . 4. (UlIPOUO) All investigative methodsshoulq be evaluated to ensure compliance with the admonition that the FBI should use the least"intrusive method practicable. That requirement should be particularly observed during an assessment when using a CHS because the use of a CHS during an· assessment may'be more intrusive than many other investigative methods. Use of a CHS in an ass.essment should take place only after considering whether there are effective, less intrusive means available to obtain the desired information.. The CHS must comply with all constitutional, statutory, and regulatory restrictions and limitations. In addition: a. (UI/FOUO) CHS use and direction must be limited in focus'and scope to what is nf.h", necessary to accomplish the authorized purpose and o' . or predicated investigation \ b. (D/IPODO) A CHS may be directed to seek information about an individual, group or organization only to the extent that such information is necessary to achieve the specific.objective of.the assessment. If such contact reveals information or facts about an individual, group or organization that meets the requirements of a predicated investigation, a predicated investigation may be opened, as appropriate. . . 69 UNCLASSIFIED-FOR OFFICIAL USE ONLY b2 b7E UNCLASSIFIED ~ FOR OFFICIAL USE ONLY Domestic Investigations and Operations Guide c. CU//FOUO 1 I b2 b7E b2 b7E e·,...ill!~.u.1.Ll..I- f. ===~_-':"""~ 1 FOUO) If there is any conflict between the'CHSPM or CHSVSMand.the DIOG, the DIOG cOl)trols and'OGCshou1dbe immediately notified ofthe conflict. 5. (UIIFOUO) Application: This investigative method may JJeused in assessments, national security investigations, criminal investigations, foreign intelligence colleGtion cases, and for assistance to other agencies when it is not otherwise prohibited by AGG-Dom, Part . rn.B.2. ,. (U) Note: When collecting positive foreign intelligence, the FBI must operate openly and consensually with a UnIted States person~ to the extent practicable. 6. (U) Use/Dissernination: The u~e or dissemination of infol1l1ation obtained by this method must comply with the AGG-Dam'and DrOG Section 14. 1. (D) Grand jury subpoenas for telephone or electronic mail subscriber.,information. (AGG-Dom, Part II.AA.i) 1. (UI/FODO)S~ope: During a type I or 2'assessment, an FBI employee may request'from an appropriate United States Attorney's Office (USAO) the issuance of a'Federal Grand JuI)' (FOJ) subpoena for the limiteq purpose of obtaining sub~criber information. A FGJ subpoena, under this provision, may not be requested for the purpose of collecting foreign intelligenc~. For more information regarding FG] subpoenas, see DIOG Section ill; (UI/FOUOj Note: The use of Federal Grand JuI)' Subpoenas; to incluc:Ie subpoenas for telephone or electronic. mail su.bscriber information, is not authorized in a type 3, 4, or 5 70 UNCLASSIFIED~FOR OFFICIAL 'USE ONLY UNCLASSIFIED - FOROFFICIAL USE ONLY Domestic Investig~tions and Operations Guide assessment or in a type 6 assessment or full investigation initiated for the purpose of collectipg positive foreign intelligence. 2. (U/iFoUO) Approval: In a type 1 or 2 assessment or predicated investigati9n, supervisory approval is not required prior to requesting a USAO to issue a FGJ subpoena for telephone or el~~tronic mail subscriber information. . . 3. (U) Electronic Communications Privacy Act (ECPA) (18 U.S.C. §§ 2701-2112): ECPA, 18 U.S.C. § 2703 .states "a provider of electronic communication service or remote computing service shall disclose to a governmental entity the: (i) Qame; (ii) address; (iii) local and long distance telephone connection records, or records of sessions, times and durations; (iv) length of service (including start date) and types ofservice utilized; (v) telephone or instrument number or other subscriber number or identity, includiIlg any te,mporarily assigned network address; and (vi) means and source of payment for such service (including any credit card- or bank account number), of a subscriber to.or customer of such service when the governmental entity uses ... a Federal Grand Jury [subpoena]' ..." (emphasis ~dded) 4. (U//FOUO) AppIic,atio Il : This i.r!v~stigative I!1etl1od m~y be I1sed in type 1 ~l1tl2 assessments, national security investigations, crimi~ai Investigations, and for assistance to other agencies if relevant to an already open type I or 2: assessment or predicated investigation. This method may notbe used to collect P9sitive foreign intelligence information. I 5. (U) UselDissemination:1 b2 b7E , IThe use or dissemination of information obtained by'this method 'must comply with the AGG-Dom, DJOG Section 14, and the Federal Rules of Criminal Procedure (FRPC) Rule 6. 5.10. (U) Investigative Methods Not Au.thorized During Assessments (U) The following, methods may not be used in an assessment: (U/IPOUO) Note: For usc of lawful investigative methods during the recruitment, assessment and validation of a CHS, refer to the AGG-CHS, CHSPM, and CHSVSM. A.. (U) Mail covers B. (U) Physical searches of personal or real property where a warrant or court order 'is not legally required because there is no reasonab!e expeCtation of privacy (e.g., trash covers) C. (D) Consensual monit~ring of communications. indud ing consensual computer monitoring D. (U)Use of c1?sed-circuit television.direction. finders. and other monitoring devices E. (U) Polvgraph examinations F. (U)Undercover operations 71 UNCLASSIFIED-fOR OFFICIAL USE ONLY UNCLASSIFIED. - FOR OFFICIAL USE ONLY Domest~c Investigations and Operations Guide' G. (UIIFOUO) Compulsory process. including grand jury subpoenas (except: subscriber information during type I and 2 assessments>. administrative and other subpoenas. and National Security Letters H. (U) Accessing stored wire and electronic communications and transactional records 1. (0) Use orpen reQisters and trap and trace devices J. (0) Electronic surv.eillance K. (U) Physical searches where there is a reasonable expectation of privacy L. (U) Acquisition of foreign intelligence information in conformity with Title VII of the Foreilm Ihtelligence Surveillance Act CFISA) . ", 5.11. (U//FOUO) FBI National Collection Requirements . (UfIFOUO) The FBIHQ 'OI establishes FBI National Collection Requirements after coordination with FBIHQ OGC, othe'r FBIHQ substantive Divisions, and Field Offices. An FB,I National .Collection Requirement describes information needed by the FBI to: (i) identify or obtain information about potential targets of, or vulnerabilities, to, federai criminal activities or threats to the national-security;or(ii) ·inform or facilitate intelligence-analysis and planning'pertinent to the FBI'$ law enforcement or national security missions. (T IIIJ::nr IO)! b2 b7E (OIIFOUO~L.....-_ _ (i) (UlIFOU01'Ir--...:..----.,---....:....-------:--------:'-4 -b2 b7E 72 UNCLASSIFIED-FOR OFFICIAL -PSE ONLY . UNCLASSIFIED - FOR OFFICIAL USE ONLY Domestic Investigations and Operations Guide b2 b7E : (UiIfOUO) Before any investigative activity is initiated in order to respond to an FB1Nationai Collection Requirement, an assessment must be initiated or already open. An assessment cannot . be opened solely based upon an FBI National Collection Requirement. An authorized purpc;>se (national security or criminal threat) must exist and an objective must be clearly articulated that identifies an authorized purpos~ .prior to opening an assessment. During an assessment, the FBI is authorized to collect against any FBI National Collection Requirement that is.relevant to the assessment because such requirements are issued for information necessary to identify potential threats or vulnerabilities (e.g., type 3 assessment) or to collect information necessary for in~elligence analysis (e.g., type 4 assessmentH I (OIIFOVO) I I b2 b7E I.".;..(U-IIF-O-U-O..:..L)I-'--"""":""""-------'-------'---~--.....I 5.12. (Ul/FOUO) FBI Field Office Collection.Requirements (UIIFOUO) An FBI Field Offic~ Collection Requirement 'describes information needed by the field to: (i) identifY or obtain information about potential targets of or vulnerabilities to federal criminal activities or threats to the national security; or (ii) inform or facilitate intelligence \ analysis and planning pertinent to the FBI's law enforcement or nation~l security missions. (U//FOUO) Before any investigative activity may be conducted to respond to, an FBI Field Office Collection Requirement,.an assessment must be initiated br.already open. An assessment cannot be opened solelv based upon an FBI Field Office C b2 b7E 1 ne .!d.L!3d ~.13. comams 'oetalle<l guidance regarding the Field Office Collection Requirerpents. (U) Retention and Dissemination of Privacy Act Records (UIIFOUO) The Privacy Act restricts the maintenance of records relating to the exercise of First Amen'dment rights by individuals who are United States persons. Such.records may be 73 UNCLASSIFIED-FOR OFFICIAL USE ONLY UNCLASSIFIED - FOR OFFICIAL USE ONLY Domestic Investigations and Operations Guide maintained if the information is pertinent to and within the scope of aqthorizcd law enforcement activities or for which there is otherwise statutory authority for the purposes ofthe Privacy Act (S U.S.C. § 522a[e][7]). Activities authorized by the AGG:-Dom are authorized law enforcement activities. Thus, information concerning the exercise of First Amendment rights by United States persons may be retained if it is pertinent to or relevant to the FBI's law enfor~em~nt or national security activity.. Relevancy mu·st be determined by the circumstances. If the information is not relevant to the law enforcement a~tivity being conducted, then it may not be retained: For more information see mOG Section 4. (AGO-Dom, Part I.e.S) (U//FODO) Even if information·obtained during an assessment does not warrant opening a predicated investigation, the FBI may retain personally identifying information for criminal and national security purposes. In this context, the information may eve·ntuaHy serve a variety of valid analytic purposes as pieces of the overall criminal or intelligence picture are developed to detect and disrupt criminal and terrorist activities. In addition, such information may assist FBI personnel in responding to questions that may subsequently arise as to the nature and extent of the assessment and its results, whether positive or negative: Furthermore, retention of such information about an individual collected in tpe course oran l!ssessment will alert other Divisions or Field Offices considering conducting an assessment:on the same individual tha~ the. p*rticular i!1divjdyal is nQt II ~rirhj!la.l or natiomll security threat. As such, retaining personally identifying information collected in the course of an. assessment wflf also serve to conserve . resources !l;!1d prevent the initiation of unnecessary assessments and other investigative activities. (D) Marking Closed Assessments That Contain Personal Informatio.n: Information obtained during an assessment that has insufficient value to justify further investigative activity may contain personal information. As a res4lt: (i) when records retained in an assessment.specifically identify an individual or-group whose possible involvement ih criminal or national securitythreatening activity was checked out through the assessment; and (ii) the assessment turns up no sufficient basis to justify further investigation of the. individual/or gro~p, then the records must be clearly annotated as follows: "It is noted that the individual or group identified during the assessment does not warrant further FBI investigation at this time. It is recommended that this assessment be closed." Extreme care should be taken when disseminating personally identifiable information collected during an assessment that does not ,lead to sufficient facts to open a predicated investigation. [fpersonal information from the assessment is disseminated outside the FBI according to authorized dissemination guidelines and procedures, it must be accompanied by the t:equired annotation that the assessment involving this individual or grOUp did not warrant further investigation by the FBI at the time the assessment was closed. I b2 b7E IMoreover, an FBI ~e:::m:::'p:::1)lr::(o~y~ee::-,"":'w:-::ml:":(o::-::1snl:":.la:::r::::-es::""!':m:"rt,0~rm~a:::t:!:10:-:n:-tl":jr::::om=-:s::u::c:;:h-::a:-c::tI":'07se:-::d'a:-::s::s':"es:-::s=,m:-:e::n::t£fi;;lle~,-::m::.lust ensure that the specific annotation (as discussed above) is included with the 'shared information. 5.14. (U) Asse~sment File Records Management a~d Retention (U//FOUO)I b2 b7E 74 UNCLASSIFIED-FOR OFFICIAL USE ONLY UNCLASSIFIED - FOR OFFICIAL USE ONLY Domestic Inv~stigations and Operations Gl;lide ,bZ' biE l-"""....................=~==~':':""I':=='::r-:r.:::t:'!:~-:::::;:n5":e:-::c:::o::r r::s:-:A;;-:d:r:m=::in:Tis=t=ra:;ti::::o::n"l(NWAiiRA~)' Records' The retention of L,r=e""'co""r=s..,.,m".::,....,.,u,.".ar=la=-=n::-,.."o~r~a~ny~su~c::-:c:::'es:-:s::-:o"::'r"!:m:"l':'onn=:"a::":t:!':lo:':n:"':t:':e-::chL n=-=o:Tlo=-g=y"':""::sy-=s7.te=m=-,-=m=us=t:Lb=e-:retained according to NARA regulations. . (VlfFQUQ Assessments that re uire rior u e • bZ b7E .' a:uringlne a-ssessment, they musfbe .I regulations. Ifadditional.objectives arise "- -.--_...-.-- ----. approved by the SsA Ot S1A, and IAssessment classification files must be retained according to NARA 75 UNCLASSIFIED-FOR' OFFICIAL USE ONLY UNCLASSIFIED - FOR OFFICIAL USE ONLY Domesti~ Investigations and Oper~tions Guide 6. (U) Preliminary Investigations 6.1. (U) Overview (U) The AGG-Dom authorizes a second level of investigative activity-predicated investigations. Preqicated investigations that concern federal crimes or threats to the national security are subdivided into preliminary investigations and full investigations. Preliminary investigations may be initiated on the basi.s of any "allegation or" information" indicative of possible.criminal activity or threats to the national security. 6.2. (U) Purpose and Scope (U//FOOO) Preliminary Investigations may be carried out to detect, obtain information about, or prevent or protect against federal crimes 'or threats to the national se~urity. However, a preliminary investigation c~nnot be initiated or used solely for the purpose of collecting against Positive Foreign Intelligence Requirements, or for conducting enterprise investigations. Intelligence responsive to Positive Foreign Intelligence Requirements, FBI National Collection· Requirements and FBI Field Office Collection Requirements may be collec~ed incidental to a preliminary ,investigationconceming another person, <?rganiz,ation,or entity. IfPositiveFoteign Intelligence Requirement, FBI National Collection Requirement or'FBl Field Office Collection Requirement infcirmation is incidentally coll~cted'in a preliminary iiwestigation, it should be forwarded to the FIG for evaluation and potential dissemination against collection requirements. (U) In prelilp.inary investigations, the immediate objectives include such matters as: "determining whether a federal crime has occurred or is'occurring, or if planning"of preparation for such a crime is taking place; identifYing, locating, and apprehending,the perpetrators; obtaining evidence needed for prosecution; or identifying threats to the national secl.1rity. , (U) The investig!ltion of threats to the nation!il security may constitute an exercise of the FBI's criminal Investigation·authority as well as its authority to inve~tigatethreat~to the national . security. As'with criminal investigations, detecting and solvirig crimes and arresting and prosecuting the perpetrators are likely objectives of investigation!? relating to threats to the national security. These investigations, however, serve important purposes outside the ambit of norinalcriminal investigatIons, by providing t.he basis for decisions concerning other measures needed to protectthe national' security. 6.3.. (U) Civil Liberties and Privacy (U) The pursuit of legitimate investigative goals Without infringing upon the exercise of constitutional freedoms is a challenge that the FBI meets through the application of sound judgment and discretion. In order to further ensure that civilli.berties are not undermined by the conduct of criminal and national security investigations, every preliminary investigation iJnder this subsection must haye an ident,ified authorized purpose and adequate predicatiqn. (0) No investigative activity, including preliminary investigations, may be taken solely on the basis of activitie.s that are protecte~ by the F}rst Amendment, or on the race, ethnicity, national origin or religion of the subject. Prelirrtinaryjnvestigations of individuals, groups or' organizations must focus on activities related to the threats and or crimes being investigated, not solely· on First Amendment activities or on the race, ethnicity, national origin or religion of the 76 UNCLASSIFIED,;,FOR OFFICIAL l.JSE ONLY UNCLASSIFIED - FOR OFFICIAL 'uSE ONLY Domestic Investigations and Operations Guide subject. In this contex.t, it is particularly important clearly to identify and d()cument the law enforcement or national security basis of the preliminary investigation. (U) Exampie: Individuals or groups who co~mtinicate with each other or . with members of th~ public in any form in pursuit of social or political causes-such as opposing war or foreigri poJicy, protesting government action;;, prolJ1oting .certain religious beiiefs, championing particular local, national, or international causes, or a change in government through noncriminal means, and activ~ly recruit others to join their causes-have a fundamental constitutional right to do so. A preliminary investigation may not be initiated based solely on the exercise of these First Amendment rights. (U) The AGG-nom present investigators with a number of authorized investigative methods' in the conduct of a preliminary investigation. Considering the effect on the privacy and civil liberties of individuals and the potential ~o damage the reputation of ind~viduals, soine of these investigative methods are more intrusive than others. The least intrusive method feasible is to be used, but the FBI must not hesitate to use any lawful method consistent with the AGG-Dom. A more intrusive method may 'be warranted in'light of the seriousness of a crimitlal or national securitY threat. (V) By emphasizing the use of the least intrusive means to 'obtain intelligence arid/or evidence, FBI employees can effectively execute the,r duties while mitigating the potential negative impact on the privacy and civil liberties of-all people encompassed within the investigation, including targets, witnesses, and vic.tims. This principle is not intended to discourl!ge FBI employees from' seeking relevant and necessary intelligence, information, or evidence, but rather is intended t9 encourage FBI employees to choose the least intrusive-but still effective means-from the available options to obtain the-material. 6.4. (D) Legal At,lthority A. (U) Criminal Investigations (U) The FBI has statutory authority to investigate-all fedeqtl crime not assigned exclusivelyt? another federal agency. (See.28 ~.S.C.:§ 533; 18 U.S.C. § 3052; 28 C.P.R. § 0.85 [1]) (U) The FBI also has .special investigative jurisdiction to investigate violations of state law in limited circumstances. Specifically,. the FBI has jurisdiction to investigate felony killings of state law enforcement officers (28 U.S.C. § 540), violent crimes against i!lterstate travelers (28 U.S.C. § 540A), and serial killers (28 U.~.C .. § 540~). Authority to investigate these matters is contingent on receiving a request by an appropriate state official. B. (U) Threats to the National Security (U) The FBI has authority to investigate threats to the national security pursuant to executive orders, Attorney Generaloauthorities~ and various statl,1tory sources. (See E.O. 12333; 50 U.S.C. §§ 401 et seq.; 50 U.S.C. §§ 1801 et seq.) (U) "Threats to the national security" are specifically defined to mean: iht~rnatiorial terrori~m; espionage and other intelligence activities, sabotage, and assassination, conducted by, for, or on behalf of foreign powers, organizations, or per~ons; foreign computer intrusion; and other !patters determined QY the Attorney General, consistent with Executive Order 12333 or any succe.ssor order. (AGG-Dom, Part VII.S) 77 UNCLASSIFIED-fOR OFFICIAL USE ONLY UNCLASSIFIED - FOR OFFICIAL USE.ONL ¥ Domestic Investigations and Operations Guide 6.5. (U)' Predication _ F , ';".'; . . .' (U) A preliminary investigation may be initiated on the basis of"infonnatio~ or an allegation" indicating the existence ofa circumstance described as follows: . A. 'CU) An activityconstituting a federal crime or a threat to the national security has or may have occu~red, is or maybe occurring, or will or may o~cur and the investigation may obtain information relating to the activity or the involvement or role of aQ individuai, group, or organization in.such activity. (AGG-Dam, Part II.B3) B. (U) An individual, group, otganizatjon, entity, information, property, or activity is or may be a target of attack, victimizatjon, acquisition, infiltration, or recruitment in connection with criminal activity in violation of federal law ora threat to the national security and the investigation may' obtain information·that would help to protect against such-activity or threat. (AGG-Dom! Part II.B.3) (UIIFO~l...- ---, ~I. (;) \ ( U I I F O U O l l l l bZ. b7E (H) (U/IFOUOll 6.6. . \ IL.--_---------:- (U//FOUO) Standards for Initiating or Approving'a Pre.liminary Investigation (U) Before initiating or approvirig the conduct of a preliminary investigation; an FBI or approving official must determine whether: employe~ A. (UlIFOUO) An authorized'purpose and adequate predication exist for initiating a preliminary investigation; B. (U/IFOUO) The preliminary. investigation is not based solely on the exercise bfFirst Amendment activities or on the race, ethnicity, national origin or religion of the subject; and C. (UI/FPBO) The preliminary investigation is an appropriate use of personnel arid financial resources. 6.7. . Documentation and File Review (D) Duration, Approval,.Notice, . , A. (UlIFOUO) Initiation: The purpose, of and predication for a prelimir~ary investigation must be documented-in the initiating Ee. The effective date of the prelim.inary investigation is the date the final approval authority (e.g., SSA or SAC) approves the Ee., 1. (UlIFOUO) The initiation of a preliminary investigatioribythe Field Office requires prior approval of the SSA. FBlHQ Division policy implementation guides may require written notification to the appropriate FBIHQ Uilit and Section. The initiation of a preliminary investigation does not require FBIHQ and DOJ notification unless th~ preliminary investigation involve;> a sensitive investigative matter as discussed' in paragraph 3, below. 78 UNCLASSIFIED-FOR OFFICIAL USE ONLY UNCLASSIFIED - FOR OFFICIAL USE ONLY Domestic Investigations and Operations Guide 2. (VI/FOUO) The initiation of a preliminary investigation by FBIHQr~quires prior . approval of the Unit Chiefwitli written notification to the applicable FIeld Of6ce. The initiation of a preliminary investigation does:not require DOJ notification unless the preliminary investigation Involv'es a sensitive investigative matter as discussed in ' paragraph 3, below. 3.. (UI/FUiJO) Sensitive InVestigative Matter: THe initiation Of <t preliminary investjgation involving a sensitive investigative Inatter: . a. (U/IFOUO) Initiated by a Field Office: requires CDC review, SAC approval, ,and written notification to the appropriate FBIHQ Unit Chi~f and·Section Chief. Ad<litionally, written notification must be made by the field Office to the United. States Attorney or by the appropriate.FBIHQ Section to the DOJ CrimInal Division orNSD as soon as practicable but in all events no later than 30 calendar da s after the initiation un I review an specifieq above. IS li2 b7E acquired and notice is furnished as b. (U/IFOUO) Initiated by FBIHQ: requires OGC review, Section Chief appro.val, and written notification to the United States Attorney and die approp,riate Field Office or the DO~ Criminal Division or NSD as soon as practicable but in all . events no later thim 30 calendar'days after the initiation of such an investigation. " , L-:::~-::-_~"""":""-:-'-_"""",:",",,,,,,,,=,~-:--.,.,IIt'nl1st cease until OGC r,eview and Section Chief approval is acquire'd and notice is furnished as specified above. ,(AGG-Dom, Part II.B.5.a) 4. (UI/FOUO) The Executive Assistant Director (BAD) for the National Security Branch must notify the Deputy Attorney G~neral if FBI Headquarters disapproves'~ Field Office's initiation of a preliminary investigation relating to, a threatto the national , security on the ground that the predication fot the investigation is ipsufficient, and the EAD for the 1'l"atio'nal Security Branch is responSible for establishing a syst~m tpilt will allow for the prompt retrieval of such denials. (AGG-Dom"Part n.B.5.d) . .. , " B. (U//FOUO) Extension: A preliminary investigation must be conCluded within ~ix months' of its initiation but:may be'~xtend~d for up to six months by the SAC. This extension authority may not be delegated by the SAC to the ASAC:Extensions of preliminary investigations beyond a year are, discouraged and may only be approved by the it ro 'riate . FBIHQ U'1it and Section for" ood cause." AGO-Dom. P .. ' (U/IFOUO) The following factors mlJst be us~d to determine if"good cause" exists to extend the preliminary investigation beyond one year: 79 UNCLASSIFIED-FO~ OfFICIAL USE ONLY b2 b7E UNCLASSIFIED - FOR OFFICIAL USE ONLY Domestic Investigations and Operations Guide • (U//FOUO) Whether logical investigative steps have yielded information that tends to inculpate or exculpate the subject; e (VI/FODO) The progress that has been made toward-determining whether a full investigation should be opened or the preliminary investigation should be closed; ~. (UI/FOUO) Whether, based on the planned course of investigation for the following six months, it is reasonably likely that information will be obtained that will lead to predication for a full investigation, thereby warranting an extension for another six months, or will lead to exculpatory information, thereby warranting closing the preliminary investigation; and • (U//FOUO) Whether adequate. predication has been developed to justify opening a full investigation or whether sufficient information has been developed'thatj4stify closing the preliminary investigation. C. (U/IFOUO) Closing: Wben closing a prelimina.ry investigation, the Field "Office" or FBIflQ will provide the reason for closing the.investigation. When closing a preliminary investigation, the SSA or Unit Chief must ensure that all pending investigative methods ,have \)een completed/terminated (e.g., mail covers.and pen register/trap and trace). 1. (U/IFOUO) Closing a·preliminary investigation inftfated bv a Fi.,.Jd approval from the SSA.I - " I .I 0Cfice reQPires . 2. (UI/FODO) Closing a preliminary investigation initiated by FBIHQ requires approval from the Unit Chief and notification to the appropriate Field Office~ 3, (UlIFOUO) Closing a preliminary investigation initiated by a. Field Office involving a sensitive investigative matter requires aporgval from the SAC I .' . I_ I -.J 4. (UlIFOUO)Closing a preliminary investigation.initiated by FBIHQ involving a sensitive investigative matter requires approval from the Section Chiefl I I .' ~.~ D. (UlIFOUO) Conversion: When converting a preliminary investigation to a-full investigation, see Section 7. for approval and notification requirements. E. (UlIFOUO) File Review: SuperVisory file reviews must be conducted at least once every 90 days in accordance with Section 3.4. File reviews for pr<;>bationary FBI employees must be conducted at least every 60 days. 6.8. (U//FOUO) Standards for. Initiating or Approving the Use of an Authorized " Investigative l\1ethod (UI/FODO) Prior to initiating or approving the use of an investigative method, an FBI employee or approving official must deterinine whether: A..(U/IFOUO) The use of the particular inyestigativ~ ~ethod is likely to further the purpose of the preliminary investigation; B. (UI/FOUO) The investigative method s_elected is the. least intrusive method, reasonable under the circumstances; and 80 UNCLASSIFIED~FOR OFFICIAL USE ONLY b2 b7E UNCLASSIFIED - FOR OFFICIAL USE ONLY Domestic Investigations and Operations Guide C. (UIIFOUO) The method to be used is an appropriate use of personnel and financial resources. 6.9., (D) Authorized Investigative Methods in Preliminary Investigatio..s A. (D) All ,lawful methods may be used in a preliminary investigation, except for mail opening, physical search requiring'a Federal Rules of Criminal Procedure (FCRP) Rule 41 search warrant or a FISA order, electronic surveillance requiring a j1.ldicial order or warrant, or Title VII'PISA requests. Authorized methods include, but are not limited to, those listed below, Some of the methods listed are subject to special restrictions or review or approval, requirements. (AGG-Dom, Part VA.A) B. (U//FOUO) A complete discussion of the investigativ~ methods, including approval requireme9ts, is contained in Sections 5 and 11. The use or dissemination of information obtained by the use of the below methods must comply-with the AGG-Dom and DIOG Section 14. 1. (U) Obtain publicly available information. 2., (U) Access and examine FBI and other DO) records, and obtain information from any. FBI or other DOJ personnel. 3: (tJ)Accessand examine records maintained by. and request information fro~, other federal. state. local. or tribal. or foreign'governmental entities'or agencies. 4. (U) Use online services and resources (whether non-profit or commercial). 5. (U) Use and recruit human sources in conformitv with the AGG-CHS. 6. (D) Interview or request information from members of the public and private entities. 7~ (U) ~ccept information voluntarily provided by governmental or private entities. 8. (U) Engage in observation or surveillance not requiring a court order. 9. (D) Grand )ury Subpoenas for telephone or electronic mail subscriber information (see . . also number 16, below). 10. (U) Mail covers. (AGG-Dom, Part V.A.2) n. (U) Physical searches of personal or real-property where a warrant or court order is not legally required because there is no reasonable expectation, of privacy (e.g., open fields, trash covers).. (AGG~Dom, Part V.A.3) t2. (D) Consensual monitorinl! of communications, including consensual computer monitoring, subject'to legal review by the CDC or the FBI OGe. When a sensitiv~ monitoring circumstance is involved;the-monitoring must be approved by the DOJ Criminal Division or; if the investigation concerns a threat to the national security, by the DO] NSp. (AGO-Dom, Part V.AA) Sensitive monitoring circumstances include: a. (D) Investigation ofa member of Congress, a federal judge, a member of the Executive Branch at Executive Level'IV or above, or a p~rson who has served in such capacity within the previous two years (Executive Level I through IV are defined in 5 U.S.C. §§ 5312-5315); b. (U) Investigation of the Governor, Lieutenant Governor, or Attorney General of any state or territory, or a judge or justice of the highest court of any state, or territory, 81 UNCLASSIFIED-FOR OFFICIAL USE ONLY ------------------,...-----------~ ~---- UNCLASSIFIED -FOR OFFICIAL USE ONLY Domestic Investigations and Operations Guide concerning an offense involving bribery, conflict of interest, or extortion related to the performance of official duties; c. (U) A party to the communication is in the custody of the Bureau of Prisons or the United States Marshal Service or is being or has been afforded protection in the Witness Security Program; or d. (D) The Attorney General, the Deputy Attorney General, or an Assistant Attorney General has requested that the FIH obtain prior'approval for the lise of consensual monitoring in a specific 'investigation. (AGG-Dom, Part VILA and 0) (U//FOUO) Note: ~ee classified appendix for additional information. (U//FOUO)fl b2 b7E .13. (U) Use of closed-circuit television. direction finders. and other monitoring devices, subject to legal review by the CDC or the FBI OGC. (The methods ddcribed in this paragraph usually do not require a court order or warrant unless they involve an intrusion into an area w~ere there is a reasonable expectation of privacy or n~m-consensual monitoring of communication~,butJegalreview is necessary to ensure compliance with all appli9able legal requirements.) (AGG-Dom, Pax:t.V.A.5) '14. (l}) Polygraph examinations. (AGG-bom,Part V.A.6) 15. (U) Uridercoveroperations. In investigations relating to activities in violation,offederal criminal law that do not concern threats to the national, security or foreign intelligence, undercover operations must be carried out in conformity with The Allorney·General's Guidelines on Federal Bureau o(Jnvestigation Undercover Operations. Investigations that are not ~ubject to the preceding sentence b~cause they concern tlu-eats to the national s~curity or-foreign intelligence undercover operations involving religious or political qrganizations must be reviewed and approved by FBJ.Headqu3.rters, with participation by the DOJ NSD in the review process. (AGG-Dom, Part V.A.7) 16. (U) Compulsory process as authorized by law. includinQ grand jury subpoenas and other subpoenas. National Security Letters (15 U.S.C. §§ 16~lu, 1681v; 18U.S.C. § 2709; 12 U;S.C. § 341 4[a](5] [A];" 50 U.S.C. § 436); and FISA orders for the production of tangible things. (50 U.S.C. §§ 1861-63). (AGG-Dom, Part V.A.8) 17. (U) Accessing stored wire and electronic communications and transactional records in conformity with chapter 121 of title "18, United States Code (18 U.S.C. §§ 2701-2712). (AGG-Dom, Part V.A.9) 18. (U) Use orpen registers and trap and trace devices irtconformity with chapter 206 oftitle 18, United States Code (18 U.S.C. §§ 3121-3127) or FISA (50 U.S.C. §§. 1841-'1846). (AGG-Dom; Part V.A. 10) 82 UNCLASSIFIED.FOR OFFICIAL USE ONtY UNCLASSIFIED - FOR OFFICIAL USE ONLY Domestic Investigations and Operations Guide 6.10. (U) Sensitive Investigative Matter / ~cademic Nexus / Buckley Amendment (UI/FOVO) The title/case caption of the opening or subsequent EC for a preliminary' investigation involving a sensitive investigative inatter must contain the words "Sensitive Tnvestigative'Matter." mOG Section 10 contains the required approva,l authority and factors for consideration when determining whether to initiate or approve a predicated investigatjon involving a sensitive investigative matter. A... (U/IFOUO) Sensitive Investigative Matter: An investigative matter involving the activities of a domestic public official or political candidate (lnvolvirig corruption or a threat to th~ national security), religious or political organization or individ,ual prominent in such an organization, or news media, or any other matter which, in the judgment ofthe official' authorizing an investigation, should be brought to the attention of FBI Headquarters and QtherDOJ offiqials. (AGG-Dom, Part VII.N.) As a matter, of FBI policy, 'judgment" means that the decision. ofthe authorizing official is discretionary. DIOGSectirm 10 • mOG classified Anoendix G define I ~. (UI/ROUO) 'b2 b7E; AcadcmkNexus:r b2 b7E ., (UI/FOUO) The sensitivity related to an academic institution arises from the American, tradition of "academic freedom" (e.g., an 'atmosph~re in which students and faculty are free to exprt:ssunorthodox ideas and views and to challenge conventional thoughtwithout fear'of repercussion). Academic freedom does not mean, however, tha~ ac~demic institutions are off limits to FBI investigators in purs4it of information or individuals of legitimate investigative interest. (U/IFOLJO)C==----------'----.,...-----,....,--.1, . ~l-s-ee....,.;.th:..e...D...I..,.O.,..,G...-c.,.la-s-.si"l'fi..,.e-;d-:A:-p-p-e-nd""';'j:""'x"";G::;".-,- ---...:....---:----:0---.....;. I ' b2 b7E C. (UlIFOUO) Buckley Amendment: Although not·a sensitive investigative matter, a request for "acad~mic records" must only be made,pursuant to the provisions of the Buckley Amendment (The Family Educational Rights and Privacy Act of 1974,20 U,S.C. § 1232[g], as amended by PublicLaw 107-56 ["USA PATRIOTAct"]). An FBI employee is'prohibited from receiving "academic records" that have not been properly requested pursuant to the J3uckley Amendment. The definition of "academiC! records" is very broad and covers almost all records about a student other than puq1ic, student directory-type information pU,blisheq by the institution. The Buckley Amendment contains a penalty provision for those institutions that improperly provide academic reco'ds to'law e"forecme"' '",,"oies I . I I" ' __ A Buckley Amendment request for academi~ records cannot be maqe during' an assessment. In a predicated investigation, a request for academic records 'must be made pursuant to the Buckley Amendment. 83 UNCLASSIFIED-FOR OFFICIAL 'USE ONLY b2 'b7E · \ . '" ·UNCLASSIFIED '- FOR OFFICIAL USE ONLY Domestic Investigations arid Operations Guide 6.11. (U) Program Sp.ecific Investigative Requirements (U/IFOUO) ~ecause of the. many investigativ.e programs within the FBI, a single universal requirement will not adequately address every program. To facilitate compliance within an existing program, the FBI employee should consult the relevant program policv guidance. 84 UNCLASSIFIED-FOR OFFICIAL USE ONLY . UNCLA~SWED'-.FOR OFFICIAL USE ONLY Domestic Investigations and Operations Guide 7. (U) Ful.l Investigations 7.1. (U) Overview (UlIFODO) The AGO-Dom authorizes a second level of investigative activity-pre~iicated investigations. Predicated investigations that concern federal crimes or threats to the national security are subdivided into. preliminary investigations.and full inv~stigations. Full' investigations may be initiated ifthere is an "articulable factuaJ basis" of possible criminal or national threat activity, as discussed in greater detail in Section 7.5, below. There are three types offull investigations; (i) single and multi-subject; (ii) enterprise; and (iii) positive foreign intelligence collection. . . . 7.2. (U) Purpose and Scope (U) Full investigations may be initiated to detect, obtain information about, or prevent or protect against federal crimes or threats to the national security or to collect foreign intelligence. . (V) The objective ofa full investiga~ion .includes: determining whether a federal crime is being planned, prepared for, occurring or occurred; identifying, locating, and apprehending the perpetrators; obtaining evidence for prosecution; identifying thre~ts to the national security; . investigatingim.ent~rprise (asdeflned in DIOGSection 8); or collectii1gpositiv~ foreign intelligence. (U) The inve~tigation of threats to the national securit)rcan be investigated und~r both the FBI's criminal investigation autlWrity and its authority to investigate threats to the national security. As with criminal investigations, detecting and solving cr~mes, gathering evidence and arresting and prosecuting the perpetrators are frequently the objectives of investigations relating to threats to the national security. These investigations also serve important purposes outside the ambit of normal criminal investigations, however, by providing the basis for decisions concerning .other measures needed to protect the national sec':lrity. ," I . (VIIFOVO)I I (UIIFOVO) A full investigation solely for the collection of positive foreign' intelligence extends the sphere oftlie FBI's information gathering activities beyond federal crimes and tqreats to the national security and permits the FBI to seek information regarding a broad~r.range of matters relating to foreign powers, organizations, qr persons that may be of interest to .the conduct of the United States' forc::ign affairs. (SeeDIOG Section 9) 7.~. (D) Civil Liberties and PJ:ivacy (U) The pursuit oflegitimate investigativ~ goals without infringing upon the exercise of constituiional freedoms is a c.hallenge that the FBI meets through the application of sound judgment and discretion. In order to further ensure that civil liberties are not undermined by the conduct of criminal and national security investigations, every full investigation under this subsection must have an identified authorized purpose and adequate predication. " 85 UNCLASSIFIED-FOR OFFICIAL USE ONLY b2 b7E UNCLASSIFIED,- FOR OFFICIAL USE ONLY Domestic Investigations and Operations Guide (U) No investigative activity. including full investigations. may be taken solely on the basis of activities that are protected by the First Amendment or on the race, cthnicity, national origin or religion of the subject. Full investigations of individuals, groups or organizations must focus on activities related to the threats or crimes being investigated, not solely on First Amendment activities o£'on the race. ethnicity, n~tional origin or religion of the subject. In this context. it is ,particularly important clearly to identify and document the law enforcement.or national security basis 'of the full investigation: (U) Example: Individuals or groups who communicate with each other or with members of the public in any form in pursuit of social or political causes-such as opposing 'war or foreign policy, protesting government actions, promotIng certain' religious beliefs, championing particular local, national, or international causes, or a change in government through noncriminal means, and actively recruit others to join their ca4ses-have a fundamental constitutional right to do so. A full investigation may not be initiated based,solely on the exercise of these First Amendment rights. ' (U) The AGG-Dom authorize all'lawful investigative methods in the conduct of a full investigation. Considering the effect-on-theprivaey"andCivi!:liberties'ofindividuals and-the' potential to damage the reputation of individuals, some of these investigative methods are more intrusive than others. The least.intrtlsive method f~asible is to be used, but the FBI must not hesitate to use any lawful method consistent wilh the AGG-Dom. A more intrusive method may be warrantedjn light of the seriousness of a criminal or national security threat or,the importance of a foreign Intelligence requirement. (U) By emphasizing tne use of the least intrusive means to obtain intelligence or evidence, FBI employees can effectively execute their duties while mitigating the potential negative impact 011. the privacy and civil liberties of all people eI1compassed withIn the investigation, including, targets,witnesses, and victims. This principle is not intended to discourage FBI employees from seeking relevant and necessary intelligence, information, or evidence, but rather is intended to encourage'FBI employees to choose the least intrusive-but'still effective means-from the available options to obtain the material. (U) Because the authority to collect positiv~ foreign intelligence enables the FBI to obtain 'information pertinent to the United States' conduct of its foreign affairs, eyen if that information is not related to criminal activity or threats'to the national security, the information gathered may concern lawful activities. The FBI must accordingly operate openly and consensually with a United States person to the extent practicable when collecting positive foreign intelligence that does not concern criminal activities or threats to the national seeurlty. 7.4. (D) Legal Authority A. (U) Criminal Investigations .(U), The FBI has statutory authority to investigate all federal' crime not assigned exclusively ·to another federal agency. (See 28 U.S.C. § 533; 18 U.S.C.. § 3052; 28 C.F.R. § 0.85 [1].) (U) The FBI also has special investigative jurisdiction to investigate violations of state law in . limited circumstances. Specifically, the FBI has jurisdiction to investigate felony killings of state law enforcement officers (28 U.S.C. § 540), violent crimes against interstate travelers 86 UNCLASSIFIED-FOR OFFICIAL USE ONLY UNCLASsiFIED - FOR OFFICIAL USE ONLY Domestic Investigations and Operations Guide (28 U.S.C. § 540A), and serial killers (28 U.S.C. § 540B). Authority to investigate these matters is contingent on receiving a request by an appropriate state official. B. (U) Threats to tbe National Security (U) The FBI has authority to investigate threats to the national security pursuant to executive orders, Attorney General authorities, and various statutory- sourct:;s. (See E.G. 12333; 50 U.S.C. §§ 401 et seq.; 50 U.S.C. §§ 1801 et seq.) (0) "Threats to the national security" are specifically defined to mean: international terrorism; espionage and other intelligence activities, sabotage, and assassination, conducted by, for, or on behalf of foreign powers, organizations, or persons; foreign computer intrusion; and other matters determined by the Attorney General, consistent with Executive Order 12333 or any successor order. (AGG-Dom, Part VILS) C. (U) Foreign Intelligence Collection (D) The FBI authority to collect foreign intelligence derives from a mixture of administrative and statutory sources. (See E.O. 12333; 50 U.S.C. §§ 401 et seq:; 50 U.S.C. §§ 1801 et seq.; 28 U.S.C. § 532 note (incorporates the Intelligence Reform and Terrorism Protection Act, P.L. 108-458 §§ 2001-2003). -CU) "ForeigriIhtelligenceWis defined as information relating to the capabilities, intentions, or activities of foreign governments or elements thereof, foreign- organizations or foreign persons, or international terrorists. (AGG-Dom, Part VILE) 7.5. (U) Predication (U) A full investigation may be initiated if. there is an "articulable factual basis" that reasonably indicates one of the following circumstances exists: A. (~) All activity constituting a'federal crime or a ~hreat to_ the natiQnal security· has or,may have occurred, is or may be occurring, or"will or may occur and the investigation may obtain information relating to the activity or the involvement or role of an individu'al, group, or organization in such actIvity. B. (U) An individual, group, organization, entity, information, property, or activity is or maybe a target ofattack, victimization, acquisition, infiltration, or recruitment in connection with criminai activity in violation of federal law or a threat to the national security and the investigationinay obtain information that would help to protect agaih~t such activity or threat. C. (U)The investigation may obtain foreign intelligence that is responsive to a Positive Foreign .Intelligence Requirement, as defined in DIOG Section 7.4.C. . (UlIFODO)I ro (ii) (~OU~ ------~==1 I ' CUI/FOUO! 87 UNCLASSIFIED-FOR OFFICIAL USE ONLY I b2 b7E UNCLASSIFIED - FOR OFFICIAL USE ONLY Domestic Investigations and Operations Guide (iii) (U/IFOUO) 1 ~=~~~- I 1"'-. b2 b7E - - - - 7.6. (U/IFOUO) Standards for Initiating or Approving a Full Investigation (UlIFOUO) Before initiating or approving the conduct of a full investigation, an FBI employee or approving official must determine whether: . A. (U//FOUO) An authorized purpose.and adequate predication exist for initiating a,full investigation; B. (UI/FOUO) The fuJ[ investigation is based on factors other than the exercise of Eirst Amendment activities or the race, ethnicity, national origin or religion of the subject; arid C. (UlIFOUO) The full investigation is an appropriate use ofpersonnel'and financial resources. 7.7; (U) Duration, ApprovaJ, Notice, Documentation and File Review . A. (U/IPOVO) Initiation: The purpose of and prediCati9n for a full· investigation must be documented in the initiating EC. The effective date of the full investigation is the date the . final approval authority (e.g., SSA or SAC) approves the EC. 1. (UlIFOUO) By a Fielq Office: The initiation of a full investigation for circum~tances describe(iiilSectioris7.5.A and 7~5:B"by a Fiela Office reqllires pdor approval of the SSA with written notification to the appropriate FBIHQ substantive Unit. The .initiation of a full investigation of a United States person relating to a threat to the national' security for circumstances described in Sections 7.5.A and 7.5.B requires the approval of the Field Office SSA with written notification to the appropriate FBIHQ substantive Unit. The FBIHQ substantive Unit must notify DOJ NSD as soon as practicable, but in all events within 30 calendar days after the initiation of the investigation. 2. (U/IFOUO) By FBIHQ: The initiation of a full investigation for circumstances described in Sections(7.5.A and 7.5.B by fBlHQ requires prior approval of the Unit Chiefwith written notification to th.e appropriate' Field Office. The initiation of a full investigation by FBIHQ of a United States person relating to a threat to the national security for circumstances described in Sections 7.5.A and 7.5.B requires the approval of the Unit Chief with writte,n notification to the appropriate-Pield Office and notice to DOJ NSD as soon as practicable but in all events within 30 days after initiation of the investigation. 3. (UI/FOUO) Sensitive Investigative Matter: The initiation of.a full investigation involving a senSItive investigative matter: a. (UI/FOlJO) By a Field Office: requires CDC review, SAC approval, and written notification to the appropriateFBIHQ substantive Unit Chief and SectiolJ Chief. Additionally, the Field Office must notify, in writing, the United States Attorney, if required. The appropriate FBIHQ Section must notify, in writing, the DOJ Crirriina:! Division or NSD as soon as practicable, but no later than 30 calendar days after the initiation of the investigation. The notice inust identify all known sensitive investigative matters involved inthe investigation (see classified appendix for additional notice requirements). If a sensitive investigative matter arises after the initiation of a full investigation, investigative a~tivity-must cease 88 UNCLASSIFIED-FOR OFFICIAL USE ONLY UNCLASSIFIED - FOR QFFICIAL USE ONLY Domest~c Investi~ationsandOperations Guide until CDC review and SAC approval are acquired .specified above. a~d notice is furnished as b. (U/IFOUO) By'FBIHQ: requires OGe review, Section Chief approval, and written notification to,the United States Attorn.ey and the appropriate Field Office or theDOJ Criminal Division or, NSD as soon as practicable, but no later than 30 calendar days after the initiation of such an investigation. The notice'must identify' ,aU known sensitive investigative matters 'involved in the investigation (see classified appendix for additional notice requirements). If a sensitive;investigative matter arises after the'initiation of a full investigation, investigative activity must cease until OOC review and Section Chief approval are acquired and notice is, furnished as specified above. (AGO-Pom, PartU.B.5.a) 4. CU//FOUO) The initia~ion of a full investigation in order to coliect positive foreign intelligence must be approved as provided in Section 9. Additionally, written notifi<,:ation toFBIHQ CMS andDOJ NSD is required as soon as practicable but no later than 30 calendar days after the initiation of the investigation. 5. (UlIFOUO) TheEAD for the National Security Branch must notify the Deputy Attorney.General if FBI Headquarters disapproves aField Office's 'initiation of a full investigation rela~ing-toathreatto the national'sec~rity<on-the<groundthatthe . predication forthe investigatio!l,is insufficient, and the EAD for the National Security Branc::h is responsible for.establishing a system that will allow for ~he prompt retrieval of such deniais.(AGG-DOI:n, Part H.BoS.d) B. (VI!FOUO) Closing: When closing the full investigation, the Field Office or FBIHQ will provide the reason for closing the investigation. When closing a full investigation, the SSA or Unit Chief must ensure that all pending investigative methods have been completed! terminated(e.g., mail cov.ers and pen. register/trap and trace). Although there is no duration requirement for a fuIUnves~igation, the investigation must be closed upon all investigative activity being ,exhausted. 1. (U//FOU9) Closing a full investigation iriitiated by a Field Office requires approval from the SSA. Notification to .the substantive FBIHQ Unit may be required by program policy. 2. (VI/FOUO) Closing a full investigation initiated by FBIHQ requires approval from the Unit Chi~f and notification t9 the appropriate Field Office. 3. CU//FOUO) Closing a, full investigation initiated by a Field Office involving a sensitive investigative matter requires approval from the SAC and,written notification tothe FBIHQ substantive Unit and Section. . 4. (UlIPOUO) Closing a full investigation jnitiated by F'BIHQ involving a sensitiv.e investigative matter requires approval from the Section Chief and written notification to ' the appropriate Field Office. 5. (U/IPQVO) Closing ~ full 'investigation for the purpose of positive foreign intelligence collection requires the approval of FBIHQ CMS. 89 UNCLASSIFIED-FOR OFFICIAL pSE ONLY UNCLASSIFIED - FOR OFFICIAL USE ONLY .Domestic Investigations and Operations Guide C. (U//FOUO) File Review: Supervisory file reviews must be conducted at least once every 90 days in accordance with Section 3.4. File reviews f6f probationary FBI employees must be conducted ~t least every 60 days. Do (UI/FOUO) Annual Letterhead Meinorandum: Annual letterhead memoranda re b2 the status of full investi ations are not re uir b7E 7.8. (U/IFOUO) Standards for Initiating or Approving the Use of an .AuthoriZed Investigative Method (U/IFOUO) Prior to initiating or approving the use of an investigative method, an FBLemployee or approving official must determi!1e whether: . A. (U/IFOUO) The use'ofthe particular investig~tive method is likely to further the purpose of the full investigation; B. (U/IFODO) The i~vestigativemethod selected is the least intrusive method, reasonable,under the circumstances; C. (VIIFOUO) If the full investigation is for collecting positive foreign intelligence, the FBI must~operate openly, and consensually wtthaUhit~d'Statesperson,t6 the exterttpracticable; and D. (UI/FOVO) The method to be used is an appropriate use ofp~rsonriel and firiancialresources. 7.9. (U) Authorized Investigative Methods in Full Investigations (U),Alllawful'methods may be us~d in a full investigation, unless the investigation is to collect foreign intelligence. The use or dissemination of information obtained by the use of these methods must comply with the AGG~Dom and mOG Section 14.. See foreign intelligence collection, Section 9 for more information regarding use of authorized investigative methods., A. (U) Obtain publicly availab~e infonnation. B. (U) Access and examine FBI and other DOl records. and obtain information from any FBI or other DO) personnel. . Co (V) Access and examine records maintained by. and request information from. other federal, state, local. or tribal. or foreign -governmental entities or agencies. . D. (U) Use online services and resources (whether non-profit or commercial). E. (V) Use and recruit human sources in conformity \vith the AGG-CHS. F. (V) Interview or request information froni members of the public and private entitie~. G. (U)-Accept information voluntarily provided by governmental or private entities. oR. (D) Engage in observation or surveillance not requiring a court order. I. (V) Grand Jury Subpoenas for telephone or electronic mail subscriber infor~ation (see also' 'pl below). J. (0) Mail covers. (AGO-Dom, Part V.A.2) 90 UNCLASSIFIED-FOR. OFFICIAL USE ONLY ...._-.: -. UNCLASSIFIED - FOR OFFICIAL USE ONLY Domestic Investigations and Operations Guide K. (D) Phvsical searches of personal or real property where a warrant or court· order is not legally required because there is no reasonable expectation of privacy (e.g., trash covers). (AGG-Dom, Part V.A.3) L. (U) Consensual monitoring of communications, including consensual computer monitoring, subject to legal review by the CDC or the FBI DGC. W~en a sensitiye monitoring circumstance is involved, the monitoring must be approved by the DOJ Criminal' Division or, if the investiga~ion concerns a threat to the national security, by theDOJ NSD. (AGO-born, Part V.A.4) (U) Sensitive monitoring circumstances include: 1. (U) Investigation of a member of Congress, a federal judge, a member of the Executive Branch at Executive Level IV or above, or it person who has served in such capacity within the previous two years (Executive Level I through'IV are defined in 5 U.S.C. §§ 5312-5315); . 2. (U) Investigation of the Governor, 'Lieutenant-Governor, or Attorney General of any state or territory, or a judge or justice of the highest court of any state or territory, concerning an offens~ involving brjb~ry, conflict of interest, 9r ex,tortioll !,elated to the'perf6r¢ance -Of official dtities; 3. (U) A party to the communication is in the custody of the Bureau of Prisons or the United States Marshal Service or is being or has been afforded protection in the Witness Security Program; or 4. (D) The Attorney General, the Deputy Attorney General, or an Assistant Attorney General has 'requested that the FBI obtain prior ~pproval for the use ofconsensual . monitoring il) a specific.investigation. (AGG-Dom, Part VII .kand 0) (Ol/FOUO) No~e: See classified appendix for additional information. (U//FOOO) Note: For those state, local and tribal governmentS that do not sanction or provide a law. enforc.ement exception availabl~ to the FBI for one-party consensual recording of communications with persons within their Jurisdiction, the 'SAC must approve the consensual monitoring of comrpunications as an OIA, as disclissed in S.ectiQn 17. Prior to the SAC. authorizing the OIA, one-party consent must pc.acquired. TheSA<;; may delegate this OIA approval authority to an A$AC or SSA. M. (D) Use of closed-circuit television. direction finders. and other monitoring devices, subject to legal review by the CDC or the FBI OGC. (The methods described in this paragraph us~ally do not require'a court order or wa.rr~nt unless they involve an intrusion ipto an area where there is a reasonable expectation of privacy or non-consensual monitoring of communications; but legal review is necessary to ensure corppJiance with all applicable legal requirements.) (AGG-Dam, Part V.A.5) N .. (U) Polygraph examinations. (AGG-Dom, Part V.A.6) O. (D) Undercover operations. In investigations relating to activities in violation of federal ·criminallaw that do not concern.threats to the national security or foreign intelligence, undercover operations must be ca.rried out in conformity with The Attornev General's Guidelines on Federal Bureau oflnvestigation Undercover Operations. Investigations that are not subj~ct to the preceding sentence because they concern threats to ~he national securitY 91 UNCLASSIFIED-FOR OFFICIAL USE ONLY UNCLASSIFIED - FOR OFFICIAL USE ONLY Domestic Investigations and Operations Guide or foreign intelligence undercover' operations involving religious or political organizations must be reviewed and approved by FBI He~dquarters,with participation by the bOJ NSD in the review process. (AGG-Dom, Part V.A.7) P. (U) Compulsory process as authorized by law. including grand jurvsubpoenas and other subpoenas. National Security Letters (15 U.S.C. §§ 1681u, 1681v; 18 U.S.C. § 2709; 12 U.S.C. § 3414[a][5][A]; 50 U.S.C. § 436), and FISA orders for the production of tangible things. (50 U.S.C. §§ 1861-63). (AGG-Dom, PartV.A.S) Q. (U) Accessing stored wire and electronic communications and transactional records in conformity with chapter 121.oftitle 18, United S.tates Cqde (18 U.S.C. §§ 2701-2712). (AGO-Dam, Part V.A.9) ·R. (U)Use of pen registers and trap and trace devices in conformity with chapt~r 206 of title 18; United States Code (l8U.S.C. §§ 3121-3l:?7) or FISA (50 U.S~C. §§ 1841-1846). (AGGDom, Part'V.A.IO) (U) The following investigative methods can only be used in full~nvestigations: S. (U) Electronic survei Ilance in conformity with chapter 119 of Title 18. United States Code (18 U~S;C. §§ 251Q-25~2), FISA, or Executive Order 12333 § 2.5. ~AGG-Dom, Part V.A.~ 1) T. (U) Physical searches, including mail openings, in conformity with Rule 41 otthe Federal Rules of Criminal Procedure, FISA, or Executive Order 12333 § 2.5. The classifie.d appendix to the pIOG, Appendix G, provides additional information regarding certain searches. (AGG-Dom, Part V.A.l2) U. (D) Acquisition of foreign intelligence information in conformity with Title Vll of FISA . . .(AGG-Dom, Part V.A.I)) 7.10. (U) Sensitive Il)vestigative Matter I Academic ~exus I Buckley Amendment (UI/FOUO) Thetitle/case caption of the opening or subsequent EC for a full investigation involving a sensitive investigative matter 1'!}ust contain the words "Sensitive Investigative Matter:." DIOG Section 10 contains the required approval authority and factors to be con~idered when determining,whether to conduct or to approve a predicated investigation involving a sensitive-investigative matter. The AGG-Dom defines sensitive investigative matter as follows: A. (U//FOUO) Sensitive Investigative Matter; An'investigative matter involving the activities of a domestic public <:>fficial or political c~ndidate.(involvillgcorrupti<:inor a threat to the national security), religious or.political organization or individual prominent in such an o'rganization, or news media, or any other matter which, in thejudgment ofthe official . authorizing an investigation, should.be br<;mght to' the.attep.tion of FBI Headquarters and other DOJ officials. (AGG·Dom, Part VII.N). As a matter of FBI policy, ''judgmen~'' means that the decision of the authorizing official is discretionary. DIOG Section 1Qand/or the DIOG classified Appendix Gdefine domestic public official,'political candidate, religious or political organization or individual prominent In such an organization, and news media. B. r"FOUO) Academic N e . , s : 1 1 92 UNCI"ASSIFIED-FOR OFFICIAL USE ONLY b2 b7E UNCLASSIFIED - FOR OFFICIAL USE ONLY Domestic Investigations and Operations Guide I (UI/FOUO) The sensitivity related to an academic institution arises from the American tradition of "academic freedom" (e.g., an atmosphere in which students and faculty are free to express unorthodox ideas and views and to challenge conventional thought without fear of repercussion). Academic freedom does not mean,.however, that academic institutions are off .limits to FBI inves~igators in pursuit of information: or individuals of legitimate investigative interest. (UI/FOUO) For matters not ~onsidered a sensitive investigative matterl'-see the 0I0G classified Appendix G. I .l .... C. (UIIFOUO) Buckley Amenqment: Although not a sensitive investigative matter, a request for "academic records" must only be made pursuant to the provisions of the Buckley Amendment (The Family Educational Rights and Privacy Act of 1974, 20 U.S.C. § 1232[g], as amended by Public Law 107-56 ["USA PATRIOT Act"]). An FBI employee is prohibited from receiving "academic records" that have not been properly requested pursuant to the Buckley Amendment. The definition of "academic records" is very broad and covers almost all. records about a student other than public, stugent directory-type informatio!1 published by the institution. The Buckley Amendment contains a penalty provisionofor those institutions that improperly provide academic records to law enforcement a enci -(UIIFOUO) A Buckley Amendment request for academic records cannot be made-during an assessment. In a predicated inv.estigation, a request for pursuant to the Buckley Amendment. ac~demic records must be made 7.11. (U) Program Specific Inv.estigative Requirements (U//FOUO) Because of the many investigative programs within the FBI, a single universal requirement will not adequately address every program. To facilitate compliance within an existing program, the FBI employee should consult the relevant program policy guidance. 93 UNCLASSIFIED-FOR OFFICIAL USE ONLY b2 b7E b2 b7E UNCLASSIFIED - FOR OFFICIAL USE ONLY Domestic Investigations and Operations Guide 8. (U) Enterprise Investigations 8.1. (U) Overview (U)Enterprise investigations may only be opened and operated as full investigations and are subject to the same requirements that apply to full investigations de~cribedin Section 7. Enterprise investigations focus on gro\lps or organizations that may be involved in the most serious criminal or natjonal security threats to the public, as described in Section 8.5 below. Enterprise investigations cannot be conducted as preliminary investigations or assessments, nor. may they be conducted for the sole purpose of collecting positive foreign intelligence. See Section 8.2, belo~, regarding preliminary investigations and assessments. 8:2. (U) Pllrpose, Scope and Definitions (D) The term "enterprise" 'includes any partnership, corporation, association, or other legal entity, and any union or group of individu~ls associated in fact, although not'a legal entity. The purpose of an enterprise investigation is to examine the structure, scope, ,and nature of the group or organization including: its relationship, if any,. to a foreign power; th~.identity and relationship of its members, employees, or other persons who may be acting in furtherance of its objectives; its finances and resources;.ifsgeographical diinensiqns;.itspast and,future·aetivities and goals; and its capacity for harm. (AGG-Dom, Part II.C.2) (UI/FODO) Although an enterprise investigation may not be conducted as a preliminary ,investigation, a preliminary investigation may be used to d.etermine whether a group'or' organization is a criminal or t~rrorist enterprise if the FBI has "information or an allegation" that an activity constituting a federal crime or a threat to the national security has or may have occurred, is or may be occurring, or will or may occur, and the investigation may 9btain information relating to the activity of the group or organizatio!l in such activity. An assessment may also be initiated to determine whether a group or organization is involved.in activities constituting violations offederal.criminal law or threats to the national security. 8.3. (U) Civil Liberties and Privacy (U) The pursuit of legitimate investigative goals without infringing upon the yxercise of constitutional freedoms is a challenge that the FBI meets through the application of sound judgment and discretion. In order to further ensure that civil liberties are not undermined by the conduct of crimin~1 and national security investigations, every full investigation, including an enterprise investigation underthis subsectipn, must have an identified,authorized purpose and adequate predic~tion. (D) No investigative activity, including enterprise investigations, may be taken solely on the basis of activities that are'protected by the First Amendment or on the rac~,ethnicity; national origin or religion of the subject. Enterprise investigations of groups and organIzations must focus on activities related to the threats or crimes being investigated, not solely on First Amendment activities or on the race, ethnicity,.national origin or religion of the members of the group or organization: In this context, it is particularly important clearly to identify and document the law enforcement or national security basis of the ~nterprise investigation. (U/IPOUO) Example: Groups who communicate with each other or with members of the public in any form in pursl.!-it of social or political causes- 94 UNCLASSIFiED-FOR OFFICIAL USE ONLY UNCLASSIFIED - FOR OFFICIAL USE ONLY ,Domestic Investigations and Operations Guide ,sJ.lch as opposing war or foreign policy, protestfng government actions, promoting certain religious beliefs, championing particular local; national; or international' ca.uses, 9r a change in government through non-criminal means, 'and actively recruit others to join their causes-have ',a fundamental constitutional right to do so. An enterprise inv~stigatiof!. may not b~ initiated . qased solely on the exercise of these First Amendment rights. (U) The AGO-Dom ~uthori~e all lawful investigative methods in the conduct of an enterprise investigation. Considering t~e effect on the privacy and,civi1liberties of individualirand the potential to damage the reputation of individuals, some of these investigative methods are more intrusive than others. The least intrusive method feasible is to be used, but the FBI must not hesitate to use any lawful method consistent with the AGG-Dorri. A more intrusive methoc,i may be'warranted in light of the,seriousness of ~ criminal or national security threat. (D) By emphasizing'the use of the le3.st intrusive means to obtain intelligence and/or evidence, FBI ell1ployees can effectively execute their duties while mitigating the potential negative impact on the privacy and civil·liberties oral! people encompassed within tJieinvestigation, including targets, witnesses, and victims. This principle is not intended to discoJ.lrage FBI employees from seeking relevant and necessary in~el1igence, information,or evidence, but radier is intended to encourage EBLemployeesto choose theJeastintrusive----::but stliLeffective meims~fromthe available options to obtain the material. 8.4. (D) Legal Authority (U) A full investigation of a group or organization may be initiated as an enterprise investigation ifthere is an art,iculable factual basis for the investigation that-reasonably indicates the group or organization may'have engaged"or may be engaged in, or qlay have or may be engaged in planning, or preparation or provision of support for: (AOG~pom, p~ II.C.I) A. (U) Apatteni of racketeering activity 3.s defined in 18U.S.C. § 1961 (5); B. (U) International terrorism, as defined in the AGO-Dam, Part VII.J, or other threat to the natIonal security; I . C. (0) Domestic terrorism as defined hi 18 U.S;c. § 2331 (5) involving a violation of federal criminal law; D. ,(U) Furthering political or social goals wholly or in part through activities that involve force or violence and a violation of fedenil criminal' law; or E. (U) An offense,described in 18 U.S.c;. § 2332~(g)(5)(B) or 18 U.S.C. § 43. 8.5. ,(U)PrediCation (U).An enterprise investigation is predicated when there is an articulable. factual basis for the investigation that reasonably indicates the group or organization may have engaged or may be engaged in,or may have or may'be engaged in, planning or preparation'or provision of support for the matters identified in Section 8.4, ~bove, (U) The, "articulable factual basis" for opening an enterprise investigation is met with the identification ofa group whose statements made in furtherance of its objectives, or its conduct, ,demonstrate it purpose of committing crimes or securing the commission of crimes by others. The group's activities and statements of its members may be considered in combination to 95 UNCLASSIFIED-FOR OFFICIALUSE ONLY UNCLASSIFIED - FOR OFFICIAL USE oNi., Y Domestic Investigations and Operations Guide comprise the "articulable factual basis," even ,if the statements alone or activities alone would not warrant sU,ch a getermination. (U//FOUO) Examples of situations in whi'ch an enterprise investigation rriay be opened: ,. (U//FOUO)I I I iii. 8.6. b2 b7E (UI/FOUO~ .ell) Duration, Approval, Notice, Documentation and File Review A. (U) Initiation: 1. (U//FOUO).Bya Field Office: The initi~tion of an enterprise investigation by an FBI Field Office requires the prior approval of the Field Office'SSA with written notification to ~he appropriate FBIHQ substantive Unit and DOl (as discussed in greater detail' below). FBlHQ Divisions may require specific facts to be included in this notification. . b2 b7E n erpnse mvestlgatIons mvo vmg sensjtive investigative matters require CDC review, SAC approval, and written notification to the appropriate FBIHQ substantive Unit and . D~ (U//FOUO) The responsible FBIHQ entity !TIust notify the DOl NSD or the Organized Crime and Racketeering Section (OCRS) of the initiation of an enterprise investigation; by a Field Office or by FBTI:{Q, as soon as practicable but no later than 30 dayirafter t!:te initiation of the investigation. The FBI Field Office must also notify any reievant USAO, except in,counterintelligen~e investigations. See the DOl NSD policy that governs notification to the USAO for counterintelligence investigations. 2. (U//FOUO) By FBIHQ: The initiation 9f an enterprise investigation by an FBIHQ Division requires the prior approval of the 'appropriate Section Chief with written notification to the apptopriate field Offices and DOl (as discussed in greater detail, below). Enterprise investigations involving sensitive investigative matters require OGC review, appropriate Assistant Director approval, and written notification to DOl. (UI/FOUO.) The responsible F~IHQ entity must provide notific~tion of an enterPrise investigation initiation to the appropriate DOl compqnent (N8D or OCRS) as soon as practicable, but'no later than 30 days after the initiation of the investigation. FBlHQ must notify any relevant USAO ofth~ initiation of all enterprise investigations, except in c0!JnterinteHige~ce investigations. 96 UNCLASSIFIED-FOR OFFICIAL USE ONLY ( UNCLASSIFIED - FOR OFFICIAL USE ONLY Domestic Investigations and Operations Guide (UIIFOUO) Note: For enterprise investigations that involve allegations that pertain to national security matters, the responsible 001 component for the purpose of notification and reports is the NSD. For enterprise investigations.relating to a pattern of racketeering activity that does not involve terrorism ~ffenses, see 18 U.S.C. § 2332b(g)(5)(B), the responsible 001 component is the Organized Crime and Racketeering Section of the Criminal Division. (AGG-Dom, Part Il.t.3) (D) The Assistant Attorney General for National Security or the Chief ofthe Organized Crime and Racketeering Section, as appropriate, may at any time request the FBI to provide a report on the status of an enterprise investigation and the FBI wilLprovide such reports as requested. (AGG-Dom, Part II C.3.d) B. (U/IFOUO) Closing: When closing the enterprise investigation, the Field Office or FBIHQ will provide the reason for closing the inv<;:stigation. When closing an enterprise investigation, the SSA or Unit Chief must ensure that alL pending investigative methods h.ave been completed/terminated (e.g., mail covers and pen register/trap and trace)~ Although there is. no duration requirement for an enterprise investigation, the investigation must be closed upon all investigative activity ~eing exhausted. . 1. (U/(FOUO) Closing an enterpris.e investigation initiated by a Field Office requires approval from the SSA with written notification to the appropriate FBIHQ substantive Unit. Unless advised contrary by the FBIHQ (UACB) substantive desk, the enterprise investigation can be. closed 30 days after the date of notification to FBIHQ. 2. (U/IFOUO) Closing an enterprise investigation initiated by FBIHQ requires approval from the Unit Chief and notification to the appropriate Field Office. 3. (U/IFOUO) Closing art enterprise investigation initiated by a Field Office involving a sensi.tive investigative matter requires approval from the SAC, with written notification to the appropriate FBIHQ substantive Unit. The enterprise investigation can be closed 30 days after the notification to FBIHQ, UACB. 4. (UIIFOUO) Closing an 'enterprise investigation iriitiated by FBIHQ involving. a sensitive investigative matter requires approval from the Section Chief, and written notification to the appropriate Field Office. C. (U/IFOUO)'File Review: (U/IFOUO) Supervisory file reviews must be conducted at least once every 90 days in accordance with Section 3.4. Fil~ reviews for probationary agents must be conducted atJeast once every 60 days. 97 UNCLASSIFIED - FOR OFFICIAL USE ONLY Domestic Investigations and Operations Guide 9. (U) Foreign Intelligence 9.1. (U) Overview CU) Foreign intelligence is "information relating to the capabilities, intentions, or activities of foreign governments or elements thereof, "foreign organi2iations; or foreign persons, or international terrorists." A "Foreign Intelligence Requirement" is a collection requirement issued under the authority of the DNI and accepted by the FBI' 01. Additionally, the President, a USIC .office design~ted by the President, the Attorney General, Deputy Attorney General, or other designated DOJofficial may levy a Foreign Intelligence Requirement on the FBI. Foreign intelligence collection by the fBI is based upon requirements.. (UIIFOU0) Foreign Intelligence Requirements issued by one of the· parties listed above arid a~cepted by the FBI DI will fall into one oftwo categories: (i) those that address national security issues that are within the FBI's core national security mission; and (ii) information relating to the capabilities, intentions, or activities of foreign governments or elements thereof, foreign organizations, foreign persons, or international terrorists which are not within the FBI's core national security mission. (U//FOUO) Requirements whic.h fa) Litlto the first·<;ategory may correspond to FBI National 'Collection Requirements as defined In SectionS.II. FBI National Collection Requirements wi[[ only be addressed in properly authorized assessments or incidental to predicated investigations. . (See the DI PG for specific requirements.) (UIIFOUO) Requirements which fall into the second category are known as Positive Foreign Intelligence Requirements and may only be addressed under the authorities described in this section. Assessments and full investigations intended to result in the collection of positive . foreign intelligence must be.based upon established requirements and approved by FBIHQ DJ-. Preliminary; investi ations for the sole u ose of collettin ositive forei n intelli ence are not b2 " authorized. b7;: ssessments an ull investigations initiated for the purpose ofpositive foreign mte 1gence co ection must be opened by FBIHQ CMS. For assessments, the authorized purpose and icle"ntified objective must be documented in the assessment file. \ (ll//FOUO) "The general gtiid~nce of the FBI's foreign intelligence collection activities by DNIauthorizeq requirements does not limit the FBI's authority to conduct investigations supportable on the basis of its other authoritie~to investigate federal crimes and threats to the national security-in areas in which the information sought also falls under tl1e definition of foreign intelligence." (AGG-Dom, Introduction A.3) Accordingly, the AGG-Dom authorizes the , collection 9f foreign intelligence incidental to predic.ated criminal, counterintelligence, counterterrorism, cybcr, and weapons of mass destruction investigations. (UIIFOUO) FBINational Collection Requirements which address national security issues that are within the FBI's core national security !J1ission wiII be worked under FBI substantive-case Classifications (e.g., 200, 105,315) as assessments. An assessment.cannot be opened solely !?asedupon an FBI National Col.Iection Requirement. An authorized purpose (national security or criminal threat) must exist and the opjective of the assessment must be clearly articulated when 98 UNCLASSIFIED-FOR OFFICIAL USE ONLY UNCLASSIFIED - FOR OFFICIAL USE ONLY Domestic Investigations and Operations Guide opening an authorized assessment The authorized purpose and identified objective for all assessments mustbe documented in the assessment file. (UIIFOUO) Example: (i) (UlIFOUO) b2 b7E b7A b2 b7E (UlIFOUO) b2 b7E (UIIFOUO) Note: FBIHQ DI provides specific guidance in its policy implementation guide regarding FBI National Collection Requirements, PBI Field Office Coliect.ion Requirements, and Positive For~ign Intelligence Requirements. 9.2. (D) Purpose and Scope (UIIFOUO) As stated above, foreign intelligence is "information relating to the capabilities, intentions, or activities of foreign governments or elements thereof, foreign organizations, or foreign persons, or internatiorial terrorists." The collection of.positive foreign intelligence extends the sphere of the FBI's information-gathering activities beyond federal crimes and threats to the national security and permits the FBI to seek information regarding a broader range. of matters relating to foreign powers, organizations, or persons that may be of interest to the conduct of the United States' foreign affairs. (AGG-Dom, Introduction A.3) 9.3. (U) Civil Liberties and Privacy (U) Because the authority to collect positive foreign intelligence enables the FBI to obtain information pertinent to the United States' conduct of its foreign affairs, even if that information 99 UNCLASSIFIED-FOR OFFICIAL USE ONLY UNCLASSIFIED - FOR OFFICIAL USE ONLY Domestic Investigations .and Operations Guide is not related t9 criminal activity or threats to the national security, the information so gathered may concern' lawful activities. Accordingly, the FBI must operate openly aild consensually with a United States person to the extent practicable when collecting positive. foreign intelligence. (AGG-Dom,IntroductionA.3) . (U) The pursuit of legitimate investigative goals without infringing upon the exercise of constitutional freedoms is a challenge that the FBI m~ets through the·application of sound judgment and discretion. In order to further ensure that civil liberties are not undermined, every assessment or full investigation involving the collection of positive foreign intellig~nce under this section must have an authorized purpose and an identified objec~ive. Additionally, the authorized purpose and objective of any assessment conducted must be documented and retained as prescribed in Sections 5 and H. (D) No investigative activity, including the collection of positive foreign intelligence, may be taken solely on the basis of activities that are. protected by the First Amendment or on tne race, ethnicity, national origin or religion ofthe subject. Collection of positive foreign intelligence requires: (i) an assessment relating to a matter of foreign intelligence interest responsive to a· Positive Foreign Intelligence Requirement;.or (ii) a full inyestigation th;it is predicated on a Positive Foreign Intelligence Requirement. (U) The~AGG~Dom presegtizwestigator,s with a number ofaIl~horized investigative met~odsin the conduct cif an assessment or full investigation-to collect positive forcign intelligence.. Considering the effect on the privacy and civil libertics of individuals and the potential to damage the reputation of individuals, some of these investigative.methods are more intrusive than others. The least intrusive method feasible is to be used, but the FBI must not hesitate to use any lawful method consistent.with the AGG-Dom. For further explanation of the least intrusive method refer to Section 4. (U) Moreover, when collecting positive foreign intelligence either as part of an ilssessment related to a matter offoreign.inteHigence interest or a~ part of a full investigation predicated on a PositlveForeign Intelligence Requirement, the FBI must operate openly and consensually with a United States person~ to the extent. practicable. (U) By emphasizing the use of the least intrusive mea,ns to collect positive foreign intelligence anel by ~mphasizing the need to operate openly and consensually with a United States person,to the extcnt practicable, FBI employees can' effectively execute theIr duties while mitigating the potential Ilcgative impact on the privacy and civil liberties of all people encountered as part of the collection. This principle is not intended to discourage> FBI employees from seeking relevant and necess~ry positive foreign intelligence or evidence, but ratheris·intended to ma~e sure FBI employees choose the least intrusive-but still effective-means from the available options to .obtain .the information. 9.4. (U) Legal Authority (U) The FBI's legal authority. t() collect positive foreign intelligence derives from a mixture of administrative and statutory sotirces.(SeeE.O. 12333; 50 U;S.C. §§ 40let seq.; 50 U.S.C. . §§ 1801 et seq.; 28 D.S,C. § 532 note [incorporates the Intelligeric:;e Reform: and Terrorism Protection Act, P.L. 108-458 §§ 2001-2003]). In collecting positive foreign intelligence, the FBI will be guided b>, Collection Requirements issued under the authority of the DNI, including the 100 UNCLASSIFIED-FOR OFFICIAL USE ONLY UNCLASSIF:IED - FOR OFFICIAL'USE ONLY Domestic Investigations and Operations Guide National Intelligence Priorities Framework and the National HUMINT Collection Directives, or any successOl: directives issues under the authority of the DNI and.accepted by FBIHQ DI. A. (U) Assessment Activities (U/IPOUO) As discussed in Section 5 of the DIOG,.the AGG-Dom authorize six types of assessments, one of which specifically applies to coll~ction of positive foreign intelligence as follows: "seeking information, proactively or 'it! response to investigative leads oo',matters of foreign intelligence interest responsive to foreign'intelligence,requirements." Positive Foreign Intelligence Requirements can be found on the D1's Collection Management Section website. Further instructions on the coilection of positive'foreign intelligence a.re contained in the Of PG. B. (U) Full Investigation Activities (U//FOUO) As discussed'ip Section 7 of the DIOG, theAGG-Dom cites three,pr~dication circumstances warranting a fuli investigation, one of which specifically applies to collection of positive foreign.intelligence: "The full inve,stigation may obtain foreign intelligence that is responsive to a foreign intelligence require~ent." CU//FOUO) Predicated positive foreign intelligence collection or!ginate~ when t.h~ Offic~ofthe DNI levies'aforeign-intelligepcecollection requirement-on toe' FBI and'the DI accepts,the requirement as one to which the FBi will endeavor to respond to as part of its Positive Foreign Intelligence Program. (UI/FODO) A full invystig~tion to co!Iect positive foreign intelligence is appropriate only when a DNI--authorized requirement exists for a particular issue and thatr~quirementhas been accepted by FBIHQ Dr. 9.5. (u//FObO) Duration, Approval, Notice,Doctimentation, File Review and FBIHQ Standards for Approving .the Initiati9il of Positive 'Foreign Intelligence' . Investigations A. (U/IFODO) Positive Foreign Intelligence Collection Authorities (U/IFOUO) The.FBIHQ CMS isrespons~ble{orpromulgating FBI policy and oversight of the Foreign Intelligence Collection Program (FICP). FBIHQ CMS will provide notice to the DOJ NSDupon the initia~ion of a positive foreign intelligence investigation. To ensure'that all positive foreign'intelligence collectiop. is focused on authorized Positive'Foreign intelligence Requirements, only FBIHQ eMS may approve the initiation of a positive foreign intelligence·assessment or full investi ation therwise .determined.by Dr). Ie ,offices must request, by BC, FBIHQ CMS approval o open suc assessments and full investigations. . B. CV//FOUO)-Standards-to be Co~sideredWhenIn'itiating an Assessment or Full Foreign Intelligenc,e Investigation to Collect Positive Foreign Intelligence (U/IFOUO) Before initiating or approving an·assess~ent or f411 iovestigation for the purpose of collecting positive foreign intelligence, the llPproying official must determine whether: 1. (U/IFOUO) An authorized'purpos~and objective exists for the conduct of the assessment or an authorized purpose and adequate predication exists for initiating a full investigation; 101 ;UNCLAsSIFIED.FOR OFFICIAL ,USE-ONLY b2 b7E UNCLASSIFIED - FOR OFFICIAL USE ONLY Domestic Investigations and Operations Guide 2. (UI/FOtJO) The assessment or fun investigation is not based solely on the exercise of First.Amendment activities or on th'e race, ethnicity, national origin or religion of the subject; and 3. (UI/FOUO) The assessment or futl investigation is an appropriate use Qfpersonnel and financial resources. 9.6. (U/IFOUO) Standards for Initiating or Approving the Use of an Authorized Investigative Method (UlIFOl)O) Before initiating or approving the use of an investigative method in an assessment or full investigation for the purpose of collecting positive foreign. intelligence, an FBI employee .or approving official must determine whether: A. (U//FOUO) The use of the particular investigative method is likely to further the purpose of th~ assessment or full investigation; B. (UIIFOUO) The investigative method selected is the least intrusive method, reasonable under. the cir~umstances and, if taken relative·to a United States person,.the method involves open . and consensual activities, to the e~tent pr/Jcticable; C. -. ~ - - (UI/FOUO).If open and consensual activity would likely be successful, then covert nonconsensual contact with a United States person may not be approved. . \ D. (U//FOUO) In the case of an assessment, the anticipated value of the assessment justifies the use of the selected investigative method or methods; and E. (U//FOUO) Theinvestig~tive method is an appropriate use of personnel and financial, resources. 9.7. (U) Authorized Investigative Methods in Foreign Intelligence Assessments and Predicated Investigations (U//FOUO) Prior to initiating or approving t~e use of a method, an FBI employee and approving official will apply the ~tandards as provided in Section 9.6. With the exceptions noted below, all lawful assessment methods may be use.d during positive foreign intelligence ass~ssments. With the exceptions noted below, all lawful methods may be used during a full investigation to collect positive foreign intelligence. If actions are to be taken with respei::t to a United States person, the method used must inclUde open ~nd consensual activities, to the extent practicable. A. (U) Assessments (see DIOG Section 5.9 for a complete description of the following methods that may be used in assessments): . 1. (U) Obtain publicly available information. 2. (U) Engage in observation or surveillance not reQuiring a court order. 3. (U) Access and examine EBI and other DOJ records. and obtain information from any FBI or other DOJ personnel: 4. (U) Access and examine records maintained by. and reQuest information from. other federal, state. local. or tribal. or foreign governmental entities or agencies. 5. (U) Use online services and resources (whether non-profit or commercial). 6. (U) Interview or reQuest information from ,members of the public and private entities. 102 UNCLASSIFIED-FOR OFFICIAL USE ONLY UNCLASSIFIED ~ FOR OFFICIAL USE ONLY Domestic Inv'estigations and Operations Guide 7. (U) Accept information voluntarilv provided by governmental or private entities. 8. (U) Use and recruit human sources in conformity with the AGG-CHS. (UIIFOUO) Note: The use of Federal Grand lury Subpoenas, to Include subpoenas for telephone or electronic mail subscriber information, is not authorized in a positive foreign intelligence assessme,nt. B. (U) Full Investigations: (D) In addition to the authorized methods listed in Section 9.7.A, above, the following lawful methods may also be used in full investigations opened for the purpose of collecting positive foreign int.elligence: . . 1. (U) Physical searches of personal or real property where a warrant or court order is not -legally required because there is no reasonable expectation of privacy (e.g., trash' covers). (AGG~Dom, Part V.A.3) 2. (U) Consensual monitoring of communications. includ ing. consensual computer monitoring. subject to legal review by the CDC' or the FBI OGC. Where a sensitive monitoring circum~Janc_e ,is inyolveg; tbemonitoring.must be approved. by the-DOJ Criminal Division or, if the investigation concerns a threat to the national security; by the 001 NSD. (AGG-Dom, Part Y.AA) (U//FOUO) Note: See the classified appendix.for additional information. (U/IPOUO) Note: For those state, local-and tribal governments that do not sanction br proyide a ,law enforcement exception available to tne FBI for one-party consent recording of communications with persons within'theirjurisdiction, the SAC must approve the consensual monitoring of' communications as an OIA. Prior to the SAC authorizing the OJA, one-party consent must be acquired. The SAC may delegate the OIA approval authority to an ASAC or SSA. . 3. (U) Use of closed-circuit television, direction finders. and other monitoring devices. subject to legal review by the CDC or the FBI OGe. (The methods,described in this paragraph' usually do not require court orders or warrants unless they involve an intrusion into an area where there-is a reasonable expectation of privacy or nonconsensual monitoring of communi9ations, but legal review is necessary to ensure compliance with ~ll applicable legal requirements.) (AGG-Dom, Part V.A.5) 4. (U) Polygraph examinations (AGG-Dom, Part V.A:6) 5. (U) Undercover operations. Undercover operations involving religious or political organizations conducted for the purpose of collecting positive foreign intelligence must be reviewed 'and approved by FBIHQ, with participation by the 001 NSD in the review process. (AGG-Dom, Part V.A.7) 6. C'J//FOUO) Use of pen-registers and trap and trace devices in c0l1formity with FISA (50 U.S.C. §§1841-1846), for non-United States persons only. (AGG-Dom, Pari V.A.lO) 7. (U) Electronic surveillance in conformity with EISA or E.O: 12333 § 2.5. (AGO-Dom, Part V.A.II) . 103 UNCLASSIFIED.FOR OFFICIAL USE ONLY· UNCLASSIFIED - FOR OFFICIAL- USE ONLY Doine..'~tic Investigations and Operations Guide 8. (UI/FODO) Physical searches. including mail open'ings. in conformity with FISA or E.O. 12333 § 2.5. The classified app<;ndix to the mOG provides additional information regarding certain searches. (AGO-Dam, Part V.A.12) 9. (U) Acquisition of positive foreign intelligence information in conformitv with Title . VII of FISA. (AGG-Dom, Part V.A.13) . , 10. (U//FOUO) Ohtaining a business records order pursuant to FISA, 50 U.S..C, §§ 1861-83, for records relating to a non-United States person only. 9;8. (U/IFOUO) Investigative Methods Not Authorized During Foreign Intelligence Investigations . (D/IPOUO) The following investigative methods are not permitted for the purpose of collecting positive foreign intelligence: A. (U/IPOUO) National Security Letters (15 U.S.C. §§ 1681u, 1681v; 18 U.S.C. § 2709; 12 U.S.C. § 341 [a][5][A]; 50 U.S.C: § 436); B. (U//FOUO) Obtaining a business records order pursuant to FISA, 50 U.s.C. §§1861-1863, fat recoras r~latillgJo ~ Un~~edStatespersoil; C. (Ui/FOUa) Use of pen registers'and trap and trace devices in conformity with FISA(50 U.~.C. §§ 1841-1846) on a United States person; D. (U//FOUO) Use of pen registers'and trap and trace devices' in confonnity with chapter 206 of 18 U.s.C. §§ 3121-3127; . E. (UlIPOUO) Mail covers; F. (UI/FOUO) Compulsory process as authorized by l~w,.including grand .jury subpoenas and other subgoenas (e.g., Administrative Sub'poena); and . G. (UlIFOUO) Accessing stored wire and electronic communications·and transactional records in conformity with chapter 121 of title I 8,. United States Code (18 U.S.C.§§ 2701-2712). . (AGG-Dom, Part V.A.9) 9.9. (U) Sensitive Investigative Matter (UI/FOUO) The title/e<ase caption of the opening or subsequent EC for a positive foreign intelligence assessment involving a sensitive investigative matter must. contain the words "Assessment" and "Sensitive Investigative Matter." The title/casecaption of the opening.or subsequent EC for a ftill investigation for the collection of positive foreign intelligeJ)ceinvolving a sensitive investigative matter must contain the words "Sensitive Investigative Matter." DIOG . Section 10 contains the required approval authorities and factors to be considered relative to an assessment or a predicated investigation involving a sensitive investiga~ive matter. The AGGDam defines sensitive investigative matter as follows: A. (U//FOUO) Sensitive Investigative Matter: An invest.igative matter involving the activities of a domestic public official or political candidate (involving corruption or a threat to the national security), religious or political organization or individual p'rominent in such an organization, or news media, or any other matter which: in the judgment of the official authorizing an investigation, should be brought to the attention of FBI Headquarters and' other DOr officials. (AGG-Dom, Part VII.N.) As a matter of FBI. policy, "judgment" means 104 'UNCLASSIFIED-FOR OJfFICIAL USE ONLY UNCLASSIFIED - FOR OFFICIAL USE ONLY Domestic Investigations and Operations Guide that the decision of the authorizing official is discretionary. orOG Section 10 and/oJ; th€l DIOG classified Appendix G define domestic public offiCial, political candidate, religious or political organization or individual prominent in such an organization, and news media. All positive foreign intelligence assessments or full investigations involving a sensitive investigative matter must be reviewed by the CDC, approved by the SAC, and approved by the appropriate FBIHQ DI Section Chief. (see mOG Section 9.10 below) B. (UlIFOUO) Academic J\T.nv.. ".' b2 b7E (V//FOUO) The sensitivity related to an academic institution adses from the American tradition of "academic freedom" (e.g., an atmosphere in which students and faculty are free to express unorthodox ideas and views and to challenge conventional thought without fear of repercussion). Academic freedom does not mean, however" that academic institutions are-off limits to FBI investigators in pursuit of information or individuals of legitimate investigative i l1Jerest. L-_...;... ........ see the DIOG classified Appendix G. 9.io. (U) Approval and Notification A. (U) Initiation (U//FOUO) The authorized purpose of an assessment or full investigation must be documented in the initiating EC. 1. (UI/FOUO) Approval to Initiate an Assessment to Collect Positive Foreign Intelligence: No assessment for the purpose of seeking information relating to matters of positive foreign intelligence interest responsive to a Positive Foreign Intelligence Requirement may be initiated wit~:!.h~o~ut~r~io~r~a~!!.:ro~vy'!a!!l..!ti~rollm!!..J::.L2..I.D.1.LJ,.~~~'='---, obtainin FBIH CMS a ase cap IOn 0 t e opening EC must contain the r ssessment, an the synopsis must identify the authorized purpose and the objective ofthe assessment. 2. CU//FOUO) Approval to Initiate a Full Investigation: FBIHQ CMS will direct the initiation of full investigations based on Positive Foreign Intelligence Requirements. 3. (U/IFOUO) Approval to Initiate an Assessment or Full Investigation Involving a Sensitive Investigative Matter: The initiation of either an assessment or full investigation to collect positive foreign.intelligence involving a sensitive investigative matter must have prior CDC review, SAC approval and the appropriate FBIHQDI Section Chief approvaL 105 -UNCLASSIFIED-FOR OFFICIAL USE ONLY b2 b7E UNCLASSIFIED -FOR OFFICIAL USE ONLY Domestic Investigations and Operations Guide B. (U) Notice 1. (U/IFOUO) Notification to DO] is not·required when an assessment to collect information relating.to a matter of foreign intelligence interest responsive to a positive foreign intelligence requirement is initiated. 2. (UI/FOUO) Notification to DOJ is required when a full investigation to collect infoITl!ation responsive to a foreign intelligence requirement is initiated. 'Notice must be f0I!Varded. from;FBIHQ eMS to the DOJ NSD as soon as.practicable out no later than 30 calendar days after the initiation of th.e investigation. (AGG-Dom, Part II.B.5) C. (U) Duration (U/IFOUO) A foreign intelligence assessment and full investigatiot} rpay continue for as long as necessary to achi~ve its purpose and objective if an assessment, or until the requirement is met in a full investigation. D. (I) File Review 1. (UI/FOUO)Assessments: Foreign.inteUigence assessments require recurring 90 day file reviews of the assessment file a!1d any sub-file by the SSNSIA. File.reviews for probationary agents must be conducted at least every 60-c:!ay~. Th~ fi!e revI~wmust: a. (tJliFOUO) Evaluate the progress made toward the achievement of the authorized purpose and objective; b. (UI/FOUO) Determine whether it is reasonably likely that information may be obtained that is relevant to the authorized objective, thereby warranting ~ continuation of the ass~ssment; c. (UlIFOUO)-Determine whether the Field Office has appropriate access and ability to collect positive foreign intelligence in response to a requirement that ha~ been accepted by FBIHQ 01; and . d. (UI/FOtJO) Determine whether the assessment should be terminated. 2. (U/IFOUO) Full Investigations: Supervisory file reviews must be ~onducted at least every 90 days in accordance with Section 3.4. File reviews for probationary agents must be conducted. at leastevery 60~days. . E. (U) Closing (U//FOUO) Upon its deterrpination or at the request of the field Office, oilly FBIHQCMS may close an assessment or. full investigation. F. (U) Anitual Letterhead Memorandum I. (UI/FOUO) Field Office Responsibility: All FIGs must submit an a!1Ilual-report on each posit.ive foreign intelligence full investigation that was open for any period oftime during the past calend~r year. This. report is due to FBIHQ eMS no later than January 30th of the calendar year following each year during which a full investigation is open and must consist of the following: .a. (UI/FOUO) The Positive Foreign Intelligence Requirement to which the investigation was responding; 106 UNCLASSIFIED-FOR OFFICIAL USE ONLY UNCLASSIFIED - FOR OFFICIAL USE ONLY Domestic Investigations and Operations Guide b. (U//FOUO) All methods of collection used; c. (UIIFODO) All sensitive matters encountered; d, (lJIIFOUO) A list of all IIR~ by number issued based on information collected , during the investigation; e. (UffFOUO) A summary of the positive foreign intelligence collect~d; and f. (UfIFOUO) The date the full. investigation was opened and, if applicable, the date closed. (UI/FOUO) These reports should be submitted by electronic communication. The EC . must be uploaded into ACS in a file number and in the applicable Foreign Intelligence Collection Program (FICP) case files as designated in the Dr PG. 2. (UIIPOVO) FBIHQ Responsibility: FBIHQ CMSmust compile dat~ from each Field Office regarding the scope and nature of the prior year's' positive foreign intelligence collection program. The FBIHQ CMS must submit an annual comprehensive report of. all' activity described above to. DOJ NSD no later than April 15t ofeach year. The report must include the following information: a. (UI/FQlJQ) The Positive Foreign.IntelligenceReqiIirement towhich"the. investigationwas responding; b. (UffFOUO) All sensitive matters; and c. (UIIFOUO) The date the full investigation was opened and closed (if applicable). 9.P: (D) Retention oflnformation (UIIFOUO)FBIHQ qvlS must maintain a database or records systems trat permits t,he prompt retrieval of the status of each positivI:: foreig!1 i!1telligence collection full investigation (open or closed), the dates of opening and closing, arid the basis for the full investigation. 107 UNCLASSIFIED-FOR OFFICIAL USE ONLY .. "" --. UNCLASSIFIED - FOR OFFICIAL USE ONLY Domestic Investigations and Operations Guide 10." (U) Sensitive Investigative Ma:tter / Academic Nexus 10.1. (U) Overvie..v (U) CertaIn-investigative matters should be brought'to the attention of FBI management and DOJ officials because of the possibility of public notoriety arid sensitivity. Accordingly, ~ssessments and predicated investigations 'involving""sensitive investigative matters" have special:approval an~ reporting req.uirements. ' . 10.2. (D)-Purpose, Scope"and Definiti9ns (UIIFOUO) A sensitive investigative matter is defined as an investigative matter involving the activities of a domestic public official or political candidate (involving corruption or a threat to the national security), religio~s or political organizatiQn or individual prominent in such an organization, or news media, or any other matter which, in the judgment of the official authorizing an investigation, should be brought to the attention of FBI Headquarters and other DOJ officials, (AGG-Dom, Part V\J.N.) As a matter of FBI policy, "judgment" means that the decision of the authorizing official is discretionary. Descriptions for each of the officials and entities contained in the sensitive investigative matter definition are a.s follows: . A. (UIIFOUQ)p'o!!1e~tic PublicOfficial-Adomesticpubilc 'official is an individual elected or appointed to a position of trust in a federal, state, local or tribal governmental entity or political subdivision thereof: A matter involving a domestic public official is a "sensitive investigative matter" if the assessment or predicat~d investigation involves corruption or a threat to the national security. B. (UIIFOUO)J>olitical candidate-A political candidate is an individual who is seeking election to, ,or nomination for election to, or who has authorized others to explore on'his ,or 'her behalf the possibility of elec~ion to, an office in a federal, state, local or tribal governmentaL entity or political subdivision thereof. A~ with domestic public offiCials, a matter involving a political candidate is a sensitive investigative matter if the assessment or predicated investigation involves ~orn.iption or a threat to the national security. C. CUIIFOUO) Political or2anization or individual prominent in such an organization--:..'" D. (UIIFOUO) Reli~i9us organization or jndi~jdtial prominent in such an organizatio~ 108 UNCLASSIFIED-FOR OFFICIAL 'USE ONLY b2 b7E UNCLASSIFIED - FOR OFFICIAL USE ONL};' Domesqc Investigations and Operations Guide E. (U//FOUO) Member ofthe media or a news or2:anization-l F. ,(U/iFoUO) Academic Nexus-I' b2 b7Ei (U//FOUO) The sensitivity related to an academic institution arises from the American tradition of "academic freedom" (e.g., an atmosphere in which students and faculty are free to express unorthodox ideas and views and to challenge conventional thought without fear of repercussion). Academic freedom does not mean, however, that academic institutions are off limits to FBI investigators in pursuit of information or individuals of legitimate investigativ~ interest. (u//FOuml . .... " - . . .. l-:se~e:-:t:;:h-:e-:ci':la:-:s:-:si'L:fi~e':id~a~pp::-e::n::drr.ix::-·.-·"""'---'------------- I I G. CUi/fOUO) Other Matters-Any matter tpat in thejudgment of the official authorizing' an investigation that should be brought to the attention ofFBIHQand Other Department-of Justice officials. As a matter of FBI policy, ''judgment'' means that the decision of the authorizing official ~s discretionary. 10.3. (U/IFOYO) Factors to Consider When Initiating or Approving an Investigative Activity Involving a SensItive Investigative Matter (UI/FODO) In addition to the standards for approving investigative activity in Sections 5; 6, 7 and 9, the follo.wipg factors should be considered by the: (i) FBI employe.e who seeks to initiate an assessment or predicated investigation involving a sen.sitive investigative matter; (ii) CDC or OGC when reviewing such matters; and (iii) approving official in determining ·whether the assessment or predicated investigation involving a sensitive investigative. matter should be authorized: A. (U//FOUO) Seriousness/severity of the. Violation/threat; B. (UlIFOUO) Significance of the information sought to the violation/threat; C. (U//FOVO) PrQbability that the proposed course of action will be successful; D. (UI/FODO) Ris!<'ofpublic exposure, and if there is stich a risk, the adverse impact or th~ perception of the adverse impact on civil liberties and public confidence; and .1::. (U//FOUO) Risk to the national security or the public welfare if the proposed course of action is not approved (i.e" risk.of doing nothing). .(UI/FOUO) In the context ofa seI1sitive investigative matter, particular car~ should be taken when.considering·whetherthe planned course ofa~tion is the least intrusive method feasible. 109 UNCLASSIFI~D~FOR OFFICIAL USE ONLY UNCLASSIFIED - FOR OFFICIAL USE ONLY Domestic Investigatio~s and Operations Guide 10.4. (U) Duration, Approval, Notice and Documentation (UIIFOUO) The following are required approval and notification levels for investigative activities involving sensitive investigative matters: A. (U1/FOUO) Initiated by a Field Office: . (ltlIFOUO) Assessment: An FBI employee may initiate assessment type one and f;wO activities, as descriped in Section S.6.A.I' and 2 (prompt checking of le~ds), w\thout prior supervisory approval: However, because assessments involving'sensitive inveStigative matters must be brought to the attention of FBI. Field Office management, CDC review and SAC approval to continue the assessment must be acquired as soon as practicable. For assessment types 3, 4 and 6 assessments (see DIDO Section 5.6.A.3. 4 and 6) involving a sensitive investigative matter, prior CDC review and SAC approval is required. For assessment types 3, 4, and 6, as described in Section 5.6.A.3. 4 and 6, if a sensitive investigative matter arises after the initiation of an assessment, investigative activity must cease Ul1ti~ CDC review and SAC approval is acquired. (U//FOUO) Assessments involving a sensitive investigative matter do nofrequire notification to DOJ or the United States Attorney. (AGG-Dom, Part II.B.5.a) All positive foreign . intelligence collectionassessinents, r¢gardless ofwhethertheyjnvolve-a sensitive investigative matter, require prior FBIHQ CMS approval. If a sensitive investigative matter arises after the initiation of a positive foreign intelligence collection assessment, n9tice must be provided to FBIHQ CMS. 0 (U/IPOUO) Predicated Investigation:- For all predicated investigations involving a sensitive investigative matter, prior CDC review and SAC approval is required, and the Field Office must provide written 'notification to the appropriate FBIHQ pnit Chief and, Section Chief. Additionally, the Field Office mu~ provide written notification to·the United'States Attorney, or the appropriate-EBIHQ Section must provige written notification to the DO] Criminal Pivisionor NSD, as soon as practicable, but no later than 30 calen . .. .on of the predicatedinvestjgatioo The notiCy must identifyl..,..-.,...,.:.'~-- r.------t-.... j(see classified appen IX or' ' , . I'------ -I - '----- (U/IPOVO) Ifa sen~itive investigative matter arises after the initiation-of a predicated investigation, investigative. activity must cease until CDC review and SAC approval is acqu~red and notice is furnished to the FBlHQ Unit and Section as specified.above. B. (O/IPOVO) Initiated by FBIHQ: (U/IPOUO}Assessment: For assessment types 3, 4 and.6, as described in Section 5.6.A.3. 4 and 6, involving a sensitive inv.estigative matter, OGC review and Section Chief approval is required. Wa sensitive investigative matter arises after the initiation of an assessment, investigative activity must cease until OGC review and Se~tion Chief approval is acquired. (O/IPODO) Assessments involving a sensitive investigative matter do not require notification to DOJ or the United States Attorney. (AGG-Dom, Part 1I.B.5.a) All positive foreign intelligence collection assessments, regardless of whether they involve a sensitive investigative matter, require prior FBIHQ CMS approval. If a sensitive inv~stigative m~tter .arises after the initiation of a positive foreign intelligence collection assessment, notice must be provided to FBIHQCMS. 110 UNCLASS!l"IED-FOR OFFICIAL USE ONLY b2 b7E UNCLASSIFIED:' FOR OFFICIAL USE ONLY Domestic Investigations and Operations Guide (UI/POUO) Predicated Investigation:· For predicated investigations involving a sensitive investigative matter, aGC review, Section Chief approval, and written notification to the United States Attorney, DOJ Criminal Pivision or DO] NSD is required, as soon as practicable, but no later than 30 calendar days after the initiation of such an investigation. The notice ~st identify! • ' j(see,classified appendix\ j b2 biE I (U/fFOUO) If a se~sitive investigative matter arises after the initiation of a predicated investigation, investigative activity must cease until odc review and Section Cliief approval is acquired and notice is furnished as specified above. 10.5. (UIIFOUO) Distinction Between Sensitive Investigative Matter and Sensitive Circumstan<:e . (UIIFOUO) The term "sensitive investigative matter" should not be confused with the term "sensitive ci,rcumstance" as that term is used in undercover operations. A "sensitive circumstance" relates to an under~over operation requiring FBIHQ approval. A comprehensive list of sensitive circumstances for criminal activities is contained in the Attorney General's Guidelines on FBI Undercover Operations and in Section 11 of the DIOG for national securi5 matters. The C r i m i ' . . . iew Comrp.itt~e (CUORe) andl '." . , . must review and approve undercover" .., . .ons at !nvo ve sensitive circumstances. The detaIled poUcy for undercover operations is described in DIOG Section 11.8, the Field Guide for Undercover and Sensitive Operations (FGUSO), and the FBIHQ substantiv~ Division program implementation guides. b2 b7E 10.6. (U/IFOUO) Sensitive Operations,Review Committee (UlIFOUOJ b5 111 , UNCLASSIFIED-FOR OFFICIAL USE ONLY ALL INFORMATION CONTAINED HEREIN IS UNCLASSIFIED DATE 07-08-2009 BY UC 60322 LP/STP/SZ UNCLASSIFIED - FOR OFFICIAL USE ONLY Domestic Investigations and Operatiops Guide 11. (U) Investigative Methods 11.1. (U) OverView (U/IFOUO) The conduct of assessments, predicated investigations and other activities authorized bythe AGG-Dom,may prese~t choices between the use of differentinvestigative methods (fonnerly investigative "techniques") that are each operationally sound and effectiv'e, but that are more or less intrusive, considering such factors as the effect on the privacy. and ciyi},liberties of individuals ~md the potential damage to reputation. The least intrusive method feasible is to be used in such situations. However, the choiCe of methods is a matter ofjudgment. The FBI is authorized to use any lawful method consistent with the AGG-Dom, even if'intrusive, where,the ~egree of intrusiveness is warranted in light of the seriousness ofa criminal or'national security threat or the strength of the infonnation indicating its existence, or in light of the importance of fOreign intelligence sought to the United States' interests. (AGG-Dom, Part I.C2.) (U) The availability of a particular investigative method in a particular case may depend upol). the level of investig~tive activity (assessment, preliminary investigation, full investigation, . assjstance to other agencies), H.l.1. ,(U) Least Intrusive MethOd (U) The AqG-Dom requires that the "least intrusive" means or method be considered an9-if operationally sound'and effective-useg to obtain intelligence or evidence in lieu oXmore intrusive meth9ds. This principle is also reflected in Executive Order 12333, which governs the activities of the Ul1ited States intelligencecoinmunity., The concept of least intrusive me~hod applies to the colle~tion of intelligence and evidence. (l))Selection oftheJeast intrusive means is a balancing test as to wl1ich FBI employees mustuse common sense and sound judgment to effectively execute their duties while -mitigating the poterttiiil negative impact on the privacy and civill1berties of all people encompassed within the assessment or predicated investigation, including targets, witnesses, and victims. This ,principle is not intended to discourage investigators from seeking relevant and necessary intelligence, inforination, or evidence, but rather is intended to encourage investigators to choose the least , intrusive-yet stilLeffective-means fn;>m the available options to'obtain the materiaL Additionally, FBI employees should operate openly and consensually with United States persons to the extent practical>le when collecting foreign intelligence.that does not concern criminal activittes or thre,ats to the na~ional.security. . (D) Section 4.4 describes the least intrusive methods con~ept and the standards to be applied by FBI employees. 112 UN~LASSIFIED-FOROFF~CIAL USE ONLY UNCLASSIFIED' - FOR OFFICIAL USE ONLY . Domestic Investigations and Operations Guide 11.2. (U) Authorized Investigative Methods in Assessments and Predicated Investigations CU) The below listed investigative methods may be used in assessments and predicated investigations. The use and/or di$semination of information obtained by the use of all authorized i~vestigative methods inust comply with the. AGG-Dom and DIDO Section 1'4. 11.2.1. (U) Authorized Investigative Meth?ds in Assessments (AGG-Dom, Part ILAA.) (UIIFOUO) Ail FBIemployee must document on the FD-71, or in Guardian, the use of or the' request and approval for the use of authorized investigative methods in type 1 and 2 assessments (see DIDG Section 5.6.A.I and 2). By exception, certain assessment type 1 and:2 situations may require the use of an EC t9 document the use and approval of certain inyestigative methods. All authorized investigative methods 'in type 3, 4, and 6 assessments,(see DIOG Section 5.6:A.3. 4 and 6) must use an EC to document the use of or the request and approval for the use of the applicable·investigative method. For a detailed description ofthe~e methods see DIOG Section 5·9· A. (U) Obtain publicly availabieinfonnation. B. (U)Access and examine FBI and other Department of Justice records. and obtain information . from any FBI or oth~r Department of Justice personnel. . C. (U) Access and examine records maintained by. and request information from. other federal. ... state. local. or tribal. Or foreign governmental entities or ~gencies. D. em Use online services 'and ~esources (whether non-profit or commercial). E. (D) Use and recruit human sources in conformity with the Attorney General's Guideli'nes Rega'rding the Use of FBICorifidentlal Human Sources. F. (U) Interview or request information from members ofthe public and private entities. G. (U) Accept information voluntarily provided by governmental or private entities. H. (U) Engage in observation and conduct physical surveillance not requiring a court order. L (UIIFOUO) Grand jury subpoenas'for telephone or electronic mail subscriber information . during type I and 2 assessments.. ' (UIIFOyO) Note: In assessments, supervisory approval i~ required prior to use of the following investigative methods: certain interviews, tasking ora' CHS; and physical surveillance not requir~ng a court order. During predicated investigations the supervisory approval.requirements for these investigative methods may not apply. 11.2.2.(U) Authorized Investigative Methods in,Preliminary investigations (AGG-Dom, Part V.A.I-IO) (D) In preliminary investigations the authqrized methods include the following: [AGG-Dom. Part 11.8. and Part V.A.] . A. (U) The investigative methods approved for assessments. B. (U) Mai I covers. 113 UNCLASSIFIED-FOR OFFICiAL USE ONLY UNCLASSIFIED - FOR OFFICIAL USE' ONLY Domestic Investigations and Operations Guide C. (U) Physical searches of personator real property where a warrantor court order is not legally required because there is no reasonable expectation of privacy (e.!!.. trash covers). D. (U) Consensual monitoring of"communications. including consensual computer monitoring. subject to legal review bv the CDC or the OGC. When a sensitive monitoring circumstance is involved, the monitoring'must be approved by the DOJ Criminai Divisi9n or, if the investigation concerns a threat to the national security or foreign intelligence, by the.DOJ National Security Division. . (UIIFOUO) Note: For additional information, see the classified appendix. . (U//FOUO) Note: For those state, local and tribal governments that do not sanction or provide a law enforcement. exception available to the FBI for one-party ~onsent recording of communications with persons within their jurisdiction, the SAC must approve the con~ensual monitoring of communications as an OIA. Prior to the SAt authorizing th~ QIA, one-party consent must be acquired. The SAC may delegate the,OIA approval authority to an ASAC or SSA. H. (U) Use of closed-circuit television. direction finders. and other monitoring devices. subject . to legal re~iew by the CDC or the OGC. (The methods described in this paragraph usually do not·require court orders·or warrants.urilesstheyinvolv.e an intrusioninto an area where th~re is a reasonable expectation of privacy or non-consensual monitoring of communicatiops, but legal review is ~ecessary ,to ensure compliance with all applicable legal requirements.) F. (U) Polygraph examinations. G. (0) Undercover operations. In investigations relating to activities in violation offederal criminal law that do not concem threa~ to the national secyrity or foreign intelligence, undercover operations must be carried out in conformity with the Attorney General's Guidelines on Federal Bureau of Investigation Undercover Operations. In investigations that concern ~hreats to the national security or foreign intelligence, undercover operations involving religious or political organizations must be reviewed and approved by FBI Headquarters, with participation by the DOJ National Security Division. in the review process. H. (U) Compulsory process as authorized.by law. inCluding grand jury subpoenas 'and other subpoenas, NationaLSecurity Letters (15 U.s.C. §§ l681u, 1681v;t8 U.S.C. § 2709; 12 U:S,C.·§ 3414[a][5][A]; 50 U,S.C. § 436, and FISA orders [50 U.S.C. §§ 1861-63]). 1. (U) Accessing stored wire and electronic communications and transactional records in conformity with chapted21 of title 18, United States Code (18 U,S.C. §§ 2701-2712). .1. (U) Use of pen registers and trap and trace devices in conformity with chapter 206 of title 18. United States Code (18 U.S.C. §§ 3121-3127) or FISA (50 U.S.C. §§ 1841-1846). 11.2.3. (U) Authorized Investigative Methods in Full Investigations (AGG-Dom, Part V.A.l1;.Q) (U) In fulllnvestigations, to include enterprise investigations, all investigative methods approved for as~essments and preliminary investigations may be .used. In addition, the three investigative methods Iisted.below may only be used'in full investigations: 114 UNCLASSIFIED-FOR OFFICIAL USE ONLY UNCLASSIFIED - FOR OFFICIAL USE ONLY Domestic Investigations and Operations Guide A. (U) Electronic surveillance in conformitJ' with chapter I 19 of title 18. United States Codc (18 U.S.C~ §§ 2510-2522), or the Forei gn Intelligencc Surveillance Act. or ExecutiveOrder 12333 § 2.5. B. (UIIFOUO) Physical searches. includin~ mail openings. in conformitv with Rule 41 of the Federal Rules ofCriniinal Procedure. the Poreign Intelligence Surveillance Act. or Executive Order' 2333 § 2.5. Note: For additional information regarding. certain searches, see the cla,ssifled appendix. C. (U) Acquisition offorei,,:n intelligence information in conformity with Title VIl ofthe FISA. (UIIFOUO) Note: Not all i~vestigative methods are authorized while collecting' foreign intelligence as part of a full investigation. See DIOG Section 9 for more inforJl?ation; U.2.4. (U) Particular Investigative Methods (UIIFOUO) All lawful investigative methods may be used in activities under the AGG-pom as authorized by the AGO-Dam. Authorized memods include, but are not limited to, those identified in the rest ofthis.section. In some instances they are subject to special restrictions or review or approval reqJ.liremenis. (AGG-Dom, Part VA.) lIS UNCLASSIFIED-FOR OFFICIAL USE ONLY UNCLASSIFmD • FOR OFFICIAL USE ONLY Domestic Investigations and Operations Guide 11.3. (U) Investigative Method: Mail Covers 11.3.1. (U) Summary (U) A mail cover may be ~ought only in a predic~ted investigation when there exists reasonable grounds to demonstrate that the mail cover is necessary to: (i) protect the national security; (ii) locate a fugitive; (iii) obtain cvidenc~ of the commission or attempted commission of a federal crime; or (iv) assist in the identification of property, proceeds or assets forfeitable because ofa violation of criminal law. 39 C.F.R. § 233.3(e)(2). (U//FODO)r b2 b7E .r (U)f b2 b7E .1 .. lAsa' ge.ner;il rul~, affiaJl cover 10 the APO/FPO system overseas may only be ordered by a mIlItary authority competent to order searches and seizuresfor law enforcement plirposes, usually a commanding officer. See DoD 4525.6-M, the DoD Postal ManuaL I (U!iFOUO) Appi icatioo: 11.3.2. ;----------F I (U) Legal Authority A. (U) Postal S.ervice Regulation 39 C.F.R. § 233.3 is the sole au~hority and procedure for initiating a mail cover and for processing, using and disclosing information obtained from a mail cover; 'B. (D) There is no Fourth Amendment protection for information on the outside of a piece of mail. See, e.g., U.S. v. Choate, 576 F.2d 165, 174 (9 th Cir., 1978); and D.S. v. Huie, 593 F.2d 14 (5 th Cir., 1979); and, ' . C. (U) AGG-Dom, Part V.A.2. 11.3.3. (U) Definition ofInvestigative Method (u) A mail cover is the non-consensual recording of any data appearing on the outside cover of any sealed or unsealeq mail matter to obtain information in order to: A. (D) Protect the national security; B. (U) Locate a fugitive; C. (U) Obtain evidence of commission or attempted commission of a federal crime; D. (U) Obtain evidence of a violation or attempted violation of a postal sta,t.ute; or E. (U) Assist in the identification of property, proceeds or assets forfeitable under law. 39 C.F.R. § 233.3(c) (1). 116 UNCLASSIFIED-FOR OFFICIAL USE ONLY b2 b7E UNCLASSIFIED - FOR OFFICIAL USE ONLY Domestic Investigations and Operations Guide (V) In this context, a "recording" means the transcription, photograph, photocopy, or other facsimile of the image ofthe outside cover, envelope, or wrappers of mailed matter. A warrant or court order is almost always required to obtain the contents of any class of mail, sealed or unsealed. \ 11.3.4. (D) Standard for Use and Approval Requirements for Investigative Method (l)) The standard to obtain Ii mail cover is,established by the Posta~ Service regulation:. The Chief Postal Inspector may order a maii cover "[w]hen a written request is received from aI1Y law enforcement agency in which the requesting authority specifies the reasonable grounds to demonstrate the mail cover is necessary'to: . • (V) Protect the national security; • (V) Loca,te a fugitive; • (V) Obtain info.rmation regarding the commission or attempted com,mission of a crime; or • (V) Assist in the identification of property, proceeds or assets forfeitable because of a violation of crirhinallaw." 29 C.F .R. § 233.3(e)(4). (V/F0U0)-National Security Mail.Cover: AnationaLse~urityIlla,ilcover request must be approved by the Director or designee, currently only the EAD of the National Security Branch. All requests for national security mail covers must be reviewed by the Field Office SSA according to th~ below-criteria. A national security mail cover sought "to protect the national security" includes protecting·the Vnited States from actual or threatened attack or other grave, hostile act; sabotage; international terrorism; or clandestine intelligence activities, including commercial [economic] espionage by foreign powers or their agents. o (l)//FOVO) After being approved by the SSA, the Field Office must.transmit the mail cover letter reguest by EC, with the draft letter as an attachmeht,to the National Security Law Branch (NSLB) for legal review and concurrence. Upon review and concurrence, the NSLB must transmit the letter request for signature approval to the BAD, National Security Branch~ or, in his or her absence, 'to the Director. (V//FOVO) Criminal 'Mail Cover: A criminal mail cover request may be'approved'by the Field Office SSA. The SSA may approve a request for a mail cover ifthere are reasonable grounds.to demonstrate that the mail cover is necessary to assist in efforts to: (i) locate a fugitive; (ii) obtain information regarding the commission or attempted commission of a federal crime; or (iii) to assist in the id~mtification of property, proceeds or assets forfeitable because of a violation'of criminal law. ' (V//FOUO) SSA review and or approval of a national security or criminal mail cover request: Approval of,any mail cov~r request or an extension is conditioned on the' following criteria being met: A.. (V//fOUO~ I , 117 UNCLASSIFIED-FOR OFFICIAL USE ONLY b2 b7E UNCLASSIFIED - FOR OFFICIAL USE ONLY Domestic Investigations and Operations Guide -- B. '(UI/FOUO)I hi b7E i c. I (U//FOUO)I b2 b7E D. (U//FOUO~ ,- b2 b7E E. - (U//FOUO~ F. I b2 b7E. . ] (U//FOl!°l I h2. b7E KNote: Under postal regulations, a mail cover must not include matter mailed. between the mail ,cover subject and the subje<:t's attomey,.unless the attorney is also a subject under the investigation.} - .. G. (U//FOuoj .. _.~ I . b7E -. I H. (U//FOUO)I I b2 I I. (U//FOUO)I b2 . b7E. I . b2 b7E -- (U) Emergency Requests: When time is of the essence, the Chief Postal Inspector, or .. designee, may act upon an oral requestto be cc;mfirmed QY the requesting authority, in writing,within three caiendar days. Information maybe released prior to receipt of the 118 UNCLASSIFIED-FOR OfliICIAL USE ONLY .'. UNCLASSIFIED - FOR OFFICIAL USE ONLY Domestic Investigations and Operatio~s Guide written request only when the releasing official is satisfied that ail emergel1cy situation exists. . 39 C.F.R. § 233.3(e)(3). (U) An "emergency situation" exists when the immediate release of infonnationis required to prevent the loss of evidence or when there is a potential for immediate physical hann to persons or,propel"t!'. 39 CJ{R. § 23~.3(c)(10): 11.3.:;. (U) Duration of Approval A. (U) National Security: A national security mail cover is limited to 120 days from the date the mail' cover is initiated. Extensions can only be authorized by the Chief Postal Inspector or his designee at the National-Headquarters of!he Office of the Chief Postal Inspector. 39 C.F.R. § 233.3(g)(6). B. (U) Criminal mail-cover~ except fugitives: A mail cover in a criminaJ case ;s limit~d to no more than 30 days, unless adequate justification is provided by the requesting authority. 39 C.F.R. § 233.3(g)(5). Renewals may be granted for additional 30-day periods under the sa!Jle conditions and procedures applicable to the original request. The requesting authority must provid~ a statement of the iiwestigative benefit of the mail cover and anti<?ipated benefits to bederivedJrom the extension. ' C. (U) Fugitives: No mail cover instituted to l.ocate a fugitive m~y reinain in force fodong~r than 129 continuous days unless personally approved for further extension by the Chief Postal Inspector or hislher designees at National Headquarters. 39 C.F.R. § 233.3(g)(6). D. (U) Exception for Indicfmen~s: Except for fugitive cases, no mail cover may,remain in force when an information has been filed or the subject has been indicted for the matter for which the mail cover has been requested. If the subject is under investigation for further criminal violations, or a-mail cover is required to assist in the identification of property, proceeds or assets forfeitable because of a violation of criminal law, a new mail cover order mustbe requested. 39 C.F.R.§ 233.3(g)(7). 11.3.6. (U) Speci(icProcedures (UI/FOUO) The Postal Regulation requires that physical storage of all reports issued ,pursuant to a mail cover request to be at the discretion of the Chief Postal Inspector. 39 C.F.R. § 233.3(h)(1). Accordingly, 'FBI employees:must conduct a timely review of mail cover document~ received 'from the USPS. A copy ,of the signed mail cover request and the signed transmittal letter must be maintained in the inv.estigative case file. I(U//Fouof 1;>2 ' 1.:........:...------'------',....-------:-------:----_ 11.3.7~ (U) Compliance and Monitoring (UlIFOUO) FBI employees must conduct a timely review of mail cover information received fromtqe USPS for any potential production of data beyond the scope of the requested mail cov.er ("overpro<iuction") and either destroy or return the overproduction't9 the assigned USPS represent~tive noting the reason for the return. 119 UNCLASSIFIED-FOR OFFICIAL USE ONLY JJ7E UNCLASSIFIED - FOR QFFICIAL USE ONLY Domestic Investigations and Operations Guide 11.4. (U) Investigative Method: Physical searches of personal or real property where a wa'rrant or court order is not legally required because there is no reasonable , expectation of privacy (e.g.J I 11.4.1. ~ot::.;o:::.:t::.:h.:::.erw~i~se.....,rohibitedby L....._ _"""T'" IILB.2.;3. L-"""'---- AGG-Dom, Part ""'--_~---~ (U) Legal Authority A. (U) AGG-Dom, Part V.A.3, B. (U) Fourth Amendment to the United States Constitution U.4.3. b7E (U) Summary (U//FQUO) Application: In predicated investigations; the FBI may'conduct physical searches of personal or real property where a warrant or court order is not Ie all uired because there is no reasonable ex ectation of rivac 11.4.2. b2 (U) D(lfinition of Investigative Method (U) The'Fourth Amendment to the United States Constittition prevents the -FBI from conducting unreasonable searches and seizures. It also generally requires a warrant be obtained if the search will intrude on a reasonable expectatiQn of privacy. To qualify as a "reasonable expec~tion of prPv~cy," the individual must have an actual subjective expectation of privacy and'society must be prepared to recognize that expectation as objectively reasonable. See Katz v. United States, 389 U.S. at 361. Ifan individual has a reasonable expectation of privacy, a warrant or order issued by ~ court of competent jurisdiction or an exception to ·the requir~ment for such a warrant or order is required before a search m'ay be conducted. Physical searches of personal or real property may be conducted without a search warrant or court order if there is no reasonable expectation of privacy in the property or area. As a general matter, the~e is no reasonable expectation of privacy in areas that are exposed to public view or that are otherwise available to the public. A reas'onable expectation of privacy may be terminated by an individual abandol?ing property, setting trash at the edge of the curtilage or beyqnd for collection, or when a private party reveals the. contents of a package. (U) Examples of Searches not Requiring' a Warrant because there is no Reasonable Expectation of Privacy: (i) VelJ,icle identification numbers or persqnalproperty that is exposed to public view and may be seen when looki~g througJ't the window of a car that is parked in an area that is open to and accessible by members of the public; (II) neither the examination of books and magazines in.a book store nor the purchase of such.items is a search or seizure under the Fourth Amendment. See Maryland v. Macon, 472 U..S. 463 (1985); and (iiD a deliberate ov.erflight in navigable air. space to 'photograph marijuana plants is not a searc~, despite the landowners,subjective expectation of privacy. See California v. Ciraolo, 476 U.S..207 (1986). (D) Whether an area is curtilage is determined by reference to four factOl;s: (i) proximity of the area in question to the home; (ii) whether the area is within an enclosure surrounding the home; (iii) nature of the use to which the area is put; and (iv) steps taken to protect the area from observation by passers-:-by. no UNCLASSIFIED-FOR OFFICIAL USE ONLY b2 b7E 'UNCLASSIFIED -FOR OFFICIAL USE ONLY Domestic Investigations and Operations Guide (U) An area is curtilage ifit "is so inti!llately tied to the home itself that it should be placed under the home's 'umbrella' of Fourth Amendment protection." 11.4.4. (UlIFOUO) Standards for Use and Approval Requirements for Investigative Method (UI/FOUO) No supervisory approval is required for the use of this method. However, ifthere is a doubt as to whether a person has a reasol1able expectation of privacy in the area to be searched, consult with the CDC or-FBI Office of the General Counsel to determine whether a search warrant is required. Use of this method'must be doqumented in the case file. 121 UNCLASSIFIED-FOR OFFICIAL USE ONLY UNCLASSIFIED - FOR OFFICIAL USE ONLY Domestic Investigations and Operations Guid~.11.5. (U) Investigative Method: Consensual Monitoring of Communications, including consensual computer monitoring 11.5.1. (U) Summary (U) Consensual monitoring of communications may be used in predicated investigations. Its use, including consensual computer monitoring, requires review by the CDC or the OGC:.(AGG. Dom, Part V.AA) (V//FOUO) Application: This investigative method may be used in national securitY investigations, criminal investigations and positive foreign intelligence collection cases, and for assistance to other agencies when it i~ not otherwise prohibited by AGG-Dom, Part III.B.2-3. This method cannot be used during an assessment CUI/FOUO) Note:-For those state, local and tribal governments that do not s;lnction or provide a law enforcement exception available to the FBI for one-party qmsensual recording of communications with persons within their jurisdiction; the SAC must approve the consensual monitoring of communications as an alA. J,'rior to the SAC autp.orizing the alA, one-party consent must be acquired. The SAC may delega~e the OIA approval ~uthorit' to an ASAC or SSA. 11.5.2.' (U) Legal Authority A. (U) The Fourth Amendment to the United States Constitution and case law interpreting die same; B. (U) 18 U.S.C. § 251 t(2)(b) & (c); C. (U) The Foreign Inteiligence Surveillance Act of 1978 (FISA), 50 U.S.C. §§ 1801 et seq., defines "electronic surveillance"'to include only those communications "in which a pers~m has a rea~~nable expectation of privacy and a warrant would be required for law enforcement purposes." 50 U.S.C. § 1801 (t). If a party to the communicatiot:I has cons~nted to monitoring, a Title III or FISA court order i~ not required to monitor those consensual communications; and D. (U) Computer Trespasser Exception - 18 U.S.C. § 2511 (2)(i). 11.5.3. (U) Definition of Investigative-Method (U) Consensual monitoring is: "monitoring of communications for which a court order or warrant is not legally-required'because of~he consent of a party to the communication." (AGGDom, Part VILA.) Consensual, monitoring includes the interception of the content of communications that typically fall into one of three general categories: A. (U) Cqnventional telephone communications or other means oftransmitting the human voice through c~l:>le, wire, radio frequency (RF), or other similar connections; B. (U)Oral communications, typically. intercepted through the use of devices that monitor and record oral conversations (e.g., where a body transmitter or recorder or a fixed location transmitter or recorder is used during a face-to-face communication in which a person would have a reasonable expectation of privacy but for the consent, of the other party); and 122 UNCLASSIFIED-FOR OFFICIAL USE ONLY UNCLASSIFIED - FOR OFFIClt\L USE ONLY Domestic Investigations and Operations Guide C. (l)) Communications transmitted between parties using computer protocols, such as e-mail, instant message, chat sessions, text messaging, peer~to-peer communications, or other "electronic communications," as that tenn is defined in 18 U.S.C. § 2510(12). (U) The consensual monitoring of cominu'1ications, hlcluding consensual computer monitoring, ,is subject to legal review by the CDC or. the OGC. (AGG-Dom, Part V.A.4) ,(U) The computer trespasser exception to the wiretap statute, ~ 8U~S.C. § 2511 (2)(i),.relies on the consent of the computer owner-operator and limits the monitoring·to only the '. communicatio,ns of the trespasser. The statute includes additio~al'limitations on the use of this provisi9n; 11.5.4. (U) Standards for Use and Approval Requirements for Inv~tigativeMethod A. (D) General Approval Requirements (U(IFOUO) Except a~ provided below in Section l·i .S.4.B, an SSA may approve the consensual monitoring of communications, including consensual computer monitoring of communications, if the infonnationlikely to be obtained is relevant to an ongoing investigation. SSA approv~1 is conditioned on the foHowing criteria being met and .documented using the ED-759: o 1. (U1/FODO) Reasons for M9nitoring: There is sufficient factual infonnation supporting the need for the monitoring and that the monitoring is related to the investigative purpose, including, if applicable, a citation ~o the principal criinimll statute involved; 2. (UI/FODO) Legal Review: Prior to the initiation of the consensual monitoring, the CDC or the OGC concurred that consensual monitoring under the facts of the investigation is legaL Whenever the monitoring circumstances change substantially, a new £D-759 must be executed and the CDC or,OGC must be recontacted to obtain a new concurrence. (AGG-Dam, Part V.A.4.) The following are examples of sUQstantial ch~nges in monitoring circumstances which require a new FD-759: a different consenting party, new interceptees, or a change in the location of a fixedmonitoting device.' . . 3. (U) Consent:' A party to the communication has consented to the monitoring and that consent has been documented according to the below-procedures. Consent may be express or implied. In consensual computer monitoring, for example, implied consent to monitor may exis~if.users are given notice through asigh-on banner that all users must actively acknowledge (by clicking through) or thro~gh other means of obvious notice of possible monitoring. Consent to monitor pursuant to the computer trespasser exception is'not provided by a party to the communication per se, but is instead, provided by the owner, operator, or systems administrator ofthe computer to, be monitored. 4. (UlIFOUO) Subject: The monitoring will not intentionally·jnclude a third-party who is not of il).terest:to the investigation, except for unavoidable or inadvertent overhears. 5. (U/IFOUO) Location of device: Appropriate safeguards exist to ensure that the consenting party remains a party to the communication throughout the course of monitoring. If a fixed-location monitoring device is being l,lsed, the consenting party 123 . UNCLASSIFIED-FOR OFFICIAL USE ONLY UNCLASSIFIED - FOR OFFICIAL USE ONLY Domestic Investigations and Operations Guide has been admonished alJdagrces to be present'during the duration of the monitoring and, if practicable, technical means are being used to activate monitoring only when the consenting party is present. ' 6. (UI/FOUO) Location of monitoring: If monitoring will occur outside a Field Office's tetritory,.notice h.as been provided to the SAC or ASAC of each Field Office where the ~onitoring is to occur, and that notice has been documented in the. case fi Ie. 7. (UI/FOUO) Duration: The.request states the length oftime needed for monitor.ing. Unless otherwise warranted, approval may be grantedJor the,duration ofthe: i!1vestigatiort subject to a substantial change of circumstances, as described in Section 11.5.4.t\.2, above. When a "sensitive monitoring circumstance" is involved, DOJ may limit its,approval to a shorter duration; B. (U/IFOUO) Exceptions Requiring Aaditional Approval I. (UliFODO) Party Located Outside the United States: '(U//FOUO] b2' 1?7E a·I:....(u....,//F~O_U_O_j:======_r l-:~~~:_-'-- .... I' . [ __ r b2 b7E ~ b. . (UI/FOUOl b2 b7E c. (UI/FOUO)I 'I , 1 I I -.l J r J J 124 UNCLASSIFIED-FOROFFICIAL USE ONLY 'r I I J b~ b7E UNCLASSIFIED - FOR OFFICIAL USE ONLY Domestic Investigations and Operations Guide 2. (U) Consent of More than One Party E.equired: (D.IIFOUO) For those states or tribes that do not sanction or provide a law enforcement exception available to the FBI for one-party consent recording of communications with pers.ons within their jurisdiction, the SAC must approveihe consensual monitorihg Of communications as ~n OIA. Prior to the SAC authorizing the OIA, one-party consent must be acquired. The SAC may delegate the OIA approval authority to a,n ASAC or SSA. 3. (U) Sensitive Monitoring Circumstance: (U) Requests to consensually monitor communications when a sensitive monitoriqg circumstance is involved must be ~pproved by the 001 Criminal Division, or if the . investigation concerns a threat to the national security or foreign intelligence collection, by the 001 NSD. (AGG-Dom, Part V.A.4) A "sensitive monitoring circumstance" is defined in the AGG-Dom, Part VII.O, to include the following: .a. (D) Investigatton ofa meIllber of Congress, a federal judge, a'member of the Executive Branch at Executive Level IV or above, or a person who has served in such capacity within the previous two years (Note: Executive Levels I through IV are.defined~in 5,U.S~C. §§5312~5315); . b.. (U) Investigation of the Governor, Lieutenant Governor, or Attorney General of any state or territory, or a judge or justice of the highest court of any state or territory, concerning an offense'involving bribery, conflict of interest, or extortion relll:ted to,the performance of official duties; c. (U) The Attorney General, the Deputy Attorney General, or an Assistant Attorney General has requested that the FBI obtain prior approval for the·use ofconsensual . ,monitoring in a specific investigation; d. (U) A party to the communication is in the custody of the Bureau of Prisons or the United States Marshal Service or is being or.h~s been afforded protection in the Witness Security Program I (Ui/FOUOt I I. I I I I I I I I. 1 J b2' bJE I I I r I r .. I I I l I (1) (U//FOUO (2) (U//FOUm I b2 b7E I· 125 UNCLASSIFIED~FOR OFFICIAL USE ONLY UNCLASSIFIED - FOR OFFICIAL USE ONLY Domestic Investigations and Operations Guide (3) CUlIFQUO)] I II-----;:::=======f~----(UI~FOU05r---L _ (4) (UIIFOUO~.=.=' (5) (6) ===J__ L p' (UlIFOUOjL-._ _ ,...- I-=.(U-:-:-IIF~O:-:-U-:-:O":-';:)I ==b:=========;C (8) (UlIFOUO)~ =r:; I (7) I \ (9) E S' ::::JL...---j--1.l.....--_ (UIIFOUOl r. I r I r, r .1 . r r 1 I ' ,r (1 I) (UiIFODO I I I (12) (l,JllFoub r r r 'I r (17) (UllFouO)f r (UlIFOUm I I . 1 - r r I 1 I J I 'I I I r (16) (UlIFOUO r I' r r (15) (UIIFOub r I 1 'I r t, 'I 1 I (14}<U!IFouml J I ' r (13) (UlIFOUO b2 b7E I I f I 'I . 1 . I DO) (u/tFduoi .r ~ _ I 1 1 I I .r 1 . I J 1 I J b2 b7E J;l2 b7E 126 UNCLASSIFIED-FOR OFFICIAL .uSE ONLY UNCLASSIFIED - FOR OFFICIAL USE ONLY Domestic Investigations and Op~rations Gu~de (UlIFOUO) Note: See classified App~ndix G for addit.ional infonnation regarding consensual monitoring. e. (UIIFOUO) Procedure for Obtaining DOJ Approval For a Sensitive Monitoring ~. stanceA - I , r r I ' r I I f.. ' I 'I, I " r- , I I J 1 r b2 .J biE I J I J . (UlIFOUO)Note'i-:;:;;:E:::n1:,::e.:...lr~e~n~t.:::.:1=~~~~:=.::=;;~=,..:.;:.:.;:~~--, I I Circumstances: b2 b7E -.J '" 1 (UI/Fouol (1) I " r I , rI I I (2) rr (3)- (T)IIFOUOll t· I, _ I' (UlIFOUo1 1 ~ '/ \. J ~ . J I I JI I r I I ·. 5 I I I I 11.5.5. (U) Duration ofApproval (1)/IFOllm Ii r r I ', 1 ? .I I - r i (UlIFOUOj'-_......~_-"-"-7I I ' 'I J ,J J I 1. J b2 b'iE 1 I (UlIFOUO)1 I J , . :J. J J \ ~ L- , r J -.1 ... J. ,J , 127 UNCLASSIFIED-FOR OFFICIAL USE ONLY J b2 b7E b2 b7E b2 b7E I I b2 b7E I I b2 b7E UNCLASSIFIED. FOR OFFICIAL USE ONLY Domestic Investigations and Operations Guide 11.5.6. b2 b7E (UlIFOUO) Specific Procedures CUI/FODO) The following procedures apply when obtaining consent A. ,(U/IFOUQ) Documel!.ti.ng consent! F J J , I J J I .J I J --- J . I I c. J - « J J J I r J I J J r I 1 I I J J I b2 b7E J J 1 J J J J IL r .. J J I b2 b7E I J I D . (UlIFOUO) Multiple communications:1 J .~ .. J r J I J .. .. J 1 I ... J (UI/FOUb~ Documenting review and approvaU I 1 I 1 . _J. ___ I I , I I ,I J r J. J. J I r I 1 -~- J J 1 .,. 'J J J I J ..1 .. 1 J B (UlIFOUO) Retention..nfJ:he consent formf '"I J I . J J I 1 I J I- -_._- J I I b2 b7E 1 J ,. .. J J J 'I I 1 r I I I' . I 1 J J I 1 r J I 1 I 1 r J b2 b7E I b2 b7E 128 UNCLASSIFIED-FOR OFFICIAL USE ONLY UNCLASSIFIED -FOR OFFICIAL USE ONLY Domestic Investigations and Operations Guide 11.5.7.. (UIIFOUO) Compliance and Monitoring (U/JFQUO) ELSUR.program personnel must conduct regularly scheduled reviews of the FD759s approved within the Field Office to detennine whether approval was obtained. prior to initiation-of consensual monitoting and to ensure that the monitoring occurred in compliance with the approvals. The ELSUR Program is also responsible for indexing all individuals or identifier.s of persons-iritercepted diIring consensual monitoring and cross-refereOl;;ing their names or identifiers to the approved FD-759 in the investigative case file. 129 UNCLASSIFIED-FOROFFICIAL USE ONLY UNCLASSIFIED - FOR OFFICIAL USE ONLY Domestic Investigations and Operations Guide 11.6. (U)Invcstigative Method: Use of closed-circuit television, direCtion finders, and other monitoring devices (Not needing a Court Order) (U) Note: Use bfthis method is subject to legal review by the CDC or OGC. 11.6.1. (U) Summary r· u/IFOuoir r I .I r .I r r' ' . I .1 . ... J ---- - -- .. I -'not . - .. 1 J 1 _- -." .- (U) Legal Authority , I . J' . . I J (UI/FOUO) Application:/ 11.6.2. I. J J J 1 r r J r r .r r r- I .1 r -' . e.prohlbited by AGG-Dom, Part 1II:B.2-3. . b2 l;>7E J I ,. 1 b2 b7E . A; (U) AGG·Dom, Part'V B. (U) Tracking devices use (I 8 U;S.C. §25lO[12] [Cn C. (0) -Rule 41 Federai- R~les of Criminal Procedure D. (U) Fourth Amendment to the United States Constitution 11.6.3. (UI/fOUO) Definition of rnvestigative Method A. (V//FOUO) ,Closed Circuit Television (CCTV): a fixed.;.location'video camera that [s typically concealed from view or that is p,lacedon or operated by ~ consenting party. B. (UIIFOUO) Electronic Trackinl! Devices:1 '. I . r I ( ' I r J. J J .1 . I I b2 .I b7E JElectronic tracking d~vices are specifically excluded from Title III requirements (18 U.S.C. § 251O[12J [CJ)..!n circumstances where a court order is required (pursuant to FRCP Rule 41 (eJf2J[I}), ajudge ()r magistrate may authoriZe the use of an elec~onic tracking device witl;1in the jurisdiction of the court and outside thatjurisdIction, if the device is il}stalled in that jurisdiction. (PRep Rule 41 b[4J; 18 U.S.C.§3117.) , . J. c. I (UlIF0UQ)[ b2 b7E i3Q UNCLASSIFIED-FOR OFFICIAL USE ONLY UNCLASSIFIED - FOR OFFICIAL USE ONLY, Domestic Investigations and Operations Guide eU//FOVO) b2 b7E JAn example would be using thermal-imaging to detect heat emanating from .L.-w~it~h':"'"in-a""h:-o-m"'e to make inferences about the use of high-powered marijuana-growing lamps inside the home (Kyllo v. United States, 533 U.S.,27 (2001». (V) Whether an area is curtilage is determined by reference to four factors: (i) proximity of the area in question to the home; (ii) whether the area is within an enclosure surrounding the home; (iii) nature of the use to which the area is put; and (iv) steps taken to protect the 'area . from,observation by pa,s~tlr.s-l?y. 11.6.4. (U//FOUQ). Standards for Use and Approval·Requirements for Investigative Method (UI/FOUO) When a video camera is physically operated as a hand-held video and is being used in an area in which no one has a reasonable expect~tion of privacy, its use is equivalent to using a still camera and does not require supervisory approval. (UI/FOUO) For those situations that require SSA approval for the use of CCTV, tracking 'devices, and other monitoring devices, SSA approval, which ('hould be documented using the FD-759, may ~e granted ifthe following criteria have been met: A. (VI/FOUO) Legal review and concurrence from the CDC orOGC that a court order is not required for installation' or use of the device because there has been lawful consent, no reasonable expectation of privacy exists,or no physical trespass necessary to install the device. Note: Whenever circumstances change in either installation or monitoring, 'a new legai review should be obtained to determine whether a separate authorization is necessary. B (U//FOUO) lise of the method is.reasonably likely to achieve inv C (U//FOUO)I .. b2 b7E b2 D. (UI/FOUO) b7E I b2 b7E 1. (U//FOUO)L I I b2 b7E 2. (UI/FOUOI I_...,....--:---~ 131 UNCLASSIFIED-;FOR OFFICIAL USE ONLY '- UNCLASSIFIED - FOROFFICIAL USE ONLY Domestic Investigatio~s and Operations Guide 3. 4. eLL..., ==J===========~ L(U-:-/ F- -O-U":"'" Oj;: : : = = : !: ~1. . .,.~=F===.===~--~ ~ (UlIFOUO~L.....- . b2 b7E --'--"""';J-.......... b2 b7E I 11.6.5. (U) Duration of Approval (UI/FOUO~ I J 1' I I J' r 1 r I I 11.6.6. r I I r I ,r ,I . I r I I I b7E J I J 1 I I I I I I I I J I J J I l /L.--'-------,--,----r1r----,~-------.....---r (UI/FOUO~ I '. J I · 1 : 1 2~-----..,..-- ~ J'--?,,-"'--:-.,..--cL.....---- 3. (UIIFGU0.c::; [uu , 132 UNCLASSIFIED-FOR OFFICIAL USE ONLY . , , b2 b7E I ~ (U/lFoyol b2 I , I I .I I 'I I I '1 J I I I J J I " I ,_ .r I b2 b7E J J E (UI/FOUO) I 2. b2 1 I b7E J;>7E I J b2 , r ., I I I .. 1. J I' D · (UlIFOUO)1 I r J C· (UlIFOUOl b7E J (U/IFOUO) Specific Procedures (UlIFOUO) To use the method, the case age~t must: A · (U//FOUOj I b2 I . 1 I B · (UliFOUO)1 I, I I , I b2 b7E b2 b7E b2 b7E UNCLASSIFIED - FOR OFFICIAL USE ONLY Domestic Investigations and ,Operations Guide I:~/IFQlJOjL.....-_--:----'['----_-"'-1~ ~---r---_.....I .......,;...._.....1. 11.6.7. b2 b7E (U/IFOUO) Compliance and Monitoring. . CUI/FODO Authorizatio cuments regarding the use of the CCTV, electronic tracking devices . must be documemed in the substantive investigative ELSUR file e available for compliance and mqnitoring review. .. 133 UNCLASSIFIED-FOR OFFICIAL USE ONLY b2 b7E UNCLASSIFIED - FOR OfFICIAL USE ONLY Domestic Investigations and Operations Guide 11.7. (p) Investigative Method: Polygraph 11.7.1. (U) Summary (U/IPOUO) A Heation ..---------"?-----------..., b2 b?E y AGO-Dom, Part III.B.2-3. 11.7.2. (U) Legal A~thority (D) AOO-Dom, Part V.A.6. 11.7.3~ (U//FOUO) Definition of Investigative Method (U/IPOUO) The polygraph.is used to: (i)-aid in determining whether a person has pertinent· knowledge of a particular matter under investigation or inquiry; (ii) aid in determining the truthfulness of statements made or information furnished by a subject, victim, witness, CHS, or an individual making allegations; (iii) obtain information leading to the location of evidence, individuals or sites of offense; and (iv) assist in verifying the accuracy and thoroughness of inforritation fumishcd-by'applicants andempioyees; r/~OU01 (.1 r Lt;J' ] b2 b7E (U/IFOUO) Note: This policy does not limit other authorized activities of the FBI, such as the FBI's responsibilities to conduct background checks and inquiries concerning applicants ~nd employees under federal personnel security programs. 1~.7.4. (U/IFOUO) Standards for Use and Approval RequirementS for Investigative Method (UlIFOUO) An SSA may approve the use of a polygraph if: A. (U//FOtJO)/-_--:-~--...J...---iz------:r_-L-.---___, B. .cU/IFOVO --L C; (UlIFOUO)L11.7.5. L- (U) Duration of Approval (UlIFOUO)\ r I .r J - b2 b7E ..,.----------' 1 b2 b7E I r 134 UNCLASSIFIED-FOR OfFICIAL USE ONI,..Y UNCLASSIFIED - FOR OFFICIAL USE ON~Y Domestic Investigations and' Operations Guide 11.7.6. (UIIFOUO) Specific Procedures (UIIFOUO) A,n.EC must be prepared requesting SSAapproval for the polygraph. If an AUSA is assigned to the case; an FBI employee must confer with the USAO to discuss anY'prosecutorial issues' prior to the administration 0 f a polygraph. 11.7.7. CUI/FOUO) Compliance·alld Monitoring (UIIFOUO) Except for polygraphs administered as part ofa backgro~nd check or as part of a' federal'personnel security program, all polygraphs must be conducted unaer and documented'to a substantive case file. 135 UNCLASSIFIED-FOR OFFICIAL USE ONLY (. UNCLASSIFIED - FOR OFFICIAL USE ONLY Domestic Investigations and Operations Guide 11;8. (U) Investigative Method: Undercover Operations 11.8.1. (U) Su~mury (UI/FOUO~ r ,I I I I I r I I I 1 I I I r r I I b2 b7E I I (U/IFOUO) Undercover operatJons must be conducted in conformity with The Attornev General 's'Guidelines on Federal Bureau oflnvesligation Undercover Operations (AGG-UGO) in. investigations relating to activities in violation of federal criminal law that do not concern threats to the national security or foreign intelligence. In investigations that concern threats to the national security or foreign,jntelligence, undercover operations involving religious or political organIzations must be reviewed and approved by FBi Headquarters, with participat~oIl by th~ NSltin thereview process. (AGG-Deri1, PartV.A.7) Other undercover operatioils!nvolving threats to thenational,security or foreign intelligence are reviewed'and approved pursuarit to FBI policy as descri,bed herein. . . .~ (VI/FOUO) Application:I.;.,--_--;: [ 11.8.2. I S iL-~= I :J ~_I -----1.....-1 .(U) Legal AuthoritY A, (U) AGG-Dom, Part V.A.7 B. (U) AGG~UCO 11.8.3. (U/IFOUO) Deflnitiorioflnvestigativel\1ethod A. (UlIF0UO) An "undercover activity" is any investigative activity involving the use of an assumed identity by an undercover employee for a'n official pl.\rpose, investigative activity, or function. An "undercover employee" 'is an employee of the FBI, another federal, state, or local law enforcement agency, another entity ofthe United States Intelligence.Cominunity, or, another foreign intelligence agency working under.the ,direction and control of the FBI whose relationship with the FBI is concealed'from third parties by the maintenance of a cover or alias identitY for an official purpose, investigative activity, or function. B. (UIIFOUO).An "ungercover operation" is an operation that involves a series of related "undercover activities" over a period oftime by an "undercover employee." A serie~ of related undercover activitIes consists of more than five separate substantive contacts by an undercover employee with the individuals under investigation. In investigations relating to activities in violation offederal criminal law tha~ do not concern threats to the national security or foreign Intelligence, undercover activity involving sensitive circumstances, which are listed in the AGG-UCO and the FGUSO, constitutes·an undercover operation regardless of the humber of contacts involved. A substantive conta~t is a communicatiQn, whether by 136 UNCLASSIFIED-FOR OFFICIAL USE ONLY b2 b7E ," UNCLASSIFIED - FOR OFfICIAL USE ONLY Domestic Investigations and Operations Guide oral, written, wire, or electronic means, that includes information ofinvestigative interest. Mere incidental' contact (e.g., a conversation that establishes an agreed time and location f9r another meeting) is nota substantive contact within the meaning of this policy. . (U/IFOUO) Distinction Between Sensitive Circumstance and Sensitive Investigative Matter: (U/1F0UO) The term "sensitive investigative matter" as used in the AGG-Dom should not be confused with .the term "sensitive Circumstance;' as that tenn is used in undercover operations or ELSUR matters. The term sensitive circumsfunce relates to a circumstance that arises in an undercover operation that requires the VCO to obtain FBIBQ approval. A comprehensive list of sensitive circumstances for criminal activities is contained in the AGG-UCO and for national security matters in Section 28 of the NFJPM. The Criminal Undercover Operations Review Committee (CUORC) and the national security Undercover Review Committee (UCRC) must review and approve undercover operatioQs that involve sens~t!ve circumstances. The detailed policy for undercover operations is described in this section of the mOG, the Field Guide for Undercover and Sensitive Operations (FGUSO), and the FBlf£Q substantive Division program implementation gl1ides. 11.8.4. (D/IFODO) Standards for Dse and Approval R~quirementsfor Investigative Method A. (UIIFOUO) An official considering appn)Val or authorization of a proposed undercover application must weigh the risks and benefits of the operation, giving careful·consideration to the foIIowing: 1. (U//FOUO)'The risks of personaI.injury to. individuals, p~operty damage, financial loss to per~ons or business, damage to reputation, or'other harm to persons; 2. (UI/FOUO) The risk ofcivil liability or other loss to the govefQment; 3. (UIIFOUO) The risk of invasion of privacy or interference with privileged or confidential relationships and any potential constitutional concerns or other legal concerns; 4. (UlIFOUO) The risk that indIviduals engaged in undercover operations may become involved in illegal conduct; 5. (UIIFOUO) The suitability of government participation in the type of activity that is expected to occur during the operation. (AGO-UCa, Part IVA.) B. (UIIFOUP) The following approval and auth~ri~ati6n requirements apply to undercover operations relating to activities in violation of federal crimimil law that do not concern threats to the national security or foreign intelligence: 1. (UIIFOUO) An "undercover activity" in which an undercover employee plans to meet with a subject requires the approval of the SSA. 2. (UI/FOUO) An "undercover operation" must be approved by the SAC (or an ASAC with delegated approval authority). The CDC must review all undercover operations before approval and provide advice to the SAC regarding predication of subjects, entrapment issues, and whether the proposal meets the requirements of the AGG-UCO or other pOJ and l'~Bl policy·guidance. 137 UNCLASSIFIED-FOR OFFICIAL USE ONLY UNCLASSIFIED - FOR OFFICIAL USE ONLY Domestic Investigations.and Operations Guide 3. (U/IFOUO) In addition to SAC approval, authorization from the respon~ibl~ FBJHQ Assistant Director or Executive Assistant Director must be obtained if the undercover' operation involves a sensitive circumstance or certaIn fiscal circumstances, as those terms are defined in the AGG-UCO or other FBI guidance. 4. (UIIFOUO) Undercover operations that involve a sensitive circumstance (Group I undercover operations) require review by the CUORC as pari of the authorization process: This requirement applies to both new and' renewal proposals. 5. (UIIFOUO) Unqcrcover operations that do not involve a sensitive circumstance' (Group II undercover operations) require notice to the appropriate FBIHQ substantive Unit and.to the Undercover and .Sensitive Operations Unit following SAC approval, A renewal that would extend the operadon beyond'one year requires authorization from the responsible Assistant Director. 6. (UI/fOUO) All Innocent Images National Initiative (lINI) un,dercover operations deemed Group I and Group II operations require initiation and renewal approvals from FBIHQ, Cyber Division.. Group J IINI undercover operations will also be reviewed by the . CUORC. 7. (UI/FOUO) Requirements for.interimapprovall:l!1<:1em_erg~ncY·i,lpprovaLforundercover. operations are contained in the FGUSO. C. (UlIFOUO) The following approval requirements apply to undercover operations that c~ncern threats to the national security-or foreign· intelligence: 1. (UIIFOUO) An "undercover operation" must be approved by the SAC (or an ASAC with delegated approval authority): The CDC must review all undercover operations before approval and provide advice to the SAC regarding predicati9n of subjects, entrapment issues, and whether the proposal meets the reql;lirements or-Section 28 ofthe NFl PM, or itssuccesso~, or ot~er DOl and policy guidance. ' Fm '2. (UI/FOUO) hi addition to SAC approval, authorization from the responsible FBIHQ Assistant Director or Executive Assistant Director must be obtained if the undercover operation involves a sensitive circumstance, as defined in Section 28 of the-NFl PM, orits successor. . 3. (UIIFOl,JO) Und~rcover operations that involve a sensitive cir~umstance must be reviewed and authorized by the responsible Assistant Director (Group I operations). Review by the UCRC must precede such authorization. If the matter involyes religious or poli~ical organizations, the review must incluqe participation by a represe!1tative of the DOJ NSD. CAGG-Dom, Section V; Section 28 of the NFIPM,or its successor) , 4. CUIIFOUO) Undercover operations that do not involve a sensitive circumstance (Group II undercover operations) must be forwarded to the appropriate substantive Unit at FBIHQ for review on a UACB basis prior to initiation of the operation. A renewal that would extend the operation beyond .12 months requires authorization from the responsible Deputy Assistant Director or Assistant Director. . 5. CUIIFOUO) Requirements for interim'approval and emergency approval fo.r undercover operations are ~ontained in Section 28 of the NFIPM, or its successor. UN~LASSIFIED-FOR 138 OFFICIAL USE ONLY UNCLASSIFIED - FOR OFFICIAL USE ONLY Domestic Investigatior,s and Operation~ Guide 11.8.5. (U) Duration of Approval (UI/POUO)! 11.8.6. b2 b7E (U) Additi~nar Guidance A. (U//FOVO) b2 b7E b2 b7E c. (U//FOuO)I J 11.8.7. b2 b7E ' (U//FOUO) Compliance and Monitoring, and Reporting !lequirements I(U/jOUO) All UCOs must provide an.' . . . '". to-approPfiat1L'_ _...:.· _/ r .I summary uSing.theD 139 UNCLASSIFIED-FOR OFFICIAL USE ONLY b2 b7E UNCLASSIFIED - FOR OFFICIAL USE ONLY Domestic Investigations and Operations Guide 11.9. (U) Investigative Method: Compulsory process as authorized by law, including grand jury subp'oenas and other subpoenas, Nationai Security Letters 15 U.S.C. §§ 1681u, I68Iv; 18 U.S.C. § 2709; 12 U.S.C. § 3414(a)(5)(A); 50 U.S.C. § 436, and FISA orders (50 U.S.C. §§ 1861-63). (U)Summary (U/IFOUOj b2 b7E . CUI/FOUO) Anniication:\ b2 b7E I When collecting positive foreign inte1Iigence, if the . subject is a non-United States person, a request for business records pursuant to 50 U.S.C. §§ 1861-63 is'lawfui. . , 11.9.1. (D) Federal Grand Jury Subpoen.a A. (U) Legal Authorities (U) A Federal Grand Jury is an. independent panel charged with determining whether there is probable cause to believe one or more persons committed a particular federal offense within the venue of the district court, If the FOJ believes probable cause exists, it will vote a "true bill" and the person will be indicted. An FGJ indictment is the most typical way persons are charged with felonies in federal court. A FOJ can collect evidence through the use of an FOJ subpoena, which is governed by Rule 6 of the FRCP. FRCP 6(e) controls the release of information obtained by the prosecutor as part ofthe FOJ proceeding. PRCP 6(e) allows federaJ prosecutors to share valuable foreign intelligence, counterintelligence, and terrorismre{ated threat information, and it is the DOl',s policy that such information sho!1ld be shared tothe.fullest extent permissible by law and in a manner consistent with the tule. The Attorney General has issued revised Guidelines for the Disclos~re and Use of Gra.nd Jury Information und~r Rule 6(e)(3)(D) (hereinafter "FGJ-Quidelines"). A memorandum issued by the Deputy Attornev General on May 15. 2008, provides amplifying guidance. 140 UNCLASSIFIED-FOR OFFICIAL USE ONLY UNCLASSIFIED"': FOR OFFICIAL USE ONLY Domestic Investigations and Operations Guide B. (UIIFOUO) Definition of Metbod (U/IFOUO) FGJ subpoenas are demands for documents~ records, testimony of witnesses, or any other evidence deemed relevant by a sitting grand,jury. The FBI can request the issuance of an FGJ subpoena in coordination with the resoonsible United States h. 's ()ffil'f' in ail criminal investigative matters I . b2 b7E "",",:,~--:-:......._ _~-..,.~-=-=--~---,,.----,,.-~IFGJ subpoenas are limited to use prior to the indictment of the individual to whom the subpoena relates. . C. {U) Approval Requirements \ (U) TherearenocFin·supervisorycapproval requireI11ents,:ol,lt allFGJ sub"poenastriusfbe issued by the United States Attorney's Office that is handlihg th'e as·sessment.6r investigation to which the subpoenaed materials or witnesses are relevant. D. (U) Duration of Approval (U) FGI subpoenas-include a "return .date," which is the date on which the subpqenaed rtutterials or testimony is due to the grandjury. E. .(U) Specific P,r.ocedures (U) FGJ subpoenas are governed by Rule 6(e) of the Federal Rules for Criminal Procedure and can orily be obtained in coordination with the responsible United States Attorney's Office or the appropriate. DOJ Divisio~. (U) Note: 28 C.F.R. § 50.10 requires the apptovarofthe Attorney General before a trial or FGJ subpoena may be issu,ed toa.third party to obtain the telephone toll records of a member of the news media, Specific justification is required. Coordination with the Assistant United States Attorney handling the grand jury presentation or trial is necessary. Before proposing such.a subpoena, an agent should review 28 C.F.R. § 50.10. F. (D) Notice and Reporting'Requirements (D! There are no FBI notice or reporting reqtlirements for FGJ subpoenas. G. (U) Grand Jury Proceedings-Generally 1. (0) Procedural Issues and Handling ofFGJ Materials 141 UNCLASSIFIED-FOR OFFICIAL USE ONLY UNCLASSIFIED - FOR OFFICIAL USE ONLY Domestic Investiga#onsand Operations Guide '(U) The FGJ makes its detennination whether-to return a "true bill of indictment" bllsed, on evidence presented by the prosecuting attorney in an ex parte proceeding. The grand jury operates under the direction and guidance of the-United States District Court. GenenHly, only witnesses for the prosecutiol} testify before the grand jury. (U) Only the United States Attorney or an assistant, otherDOJ attorneys prosecuting the matter, the witness under examination, an interpreter (as needed), and the stenographer or operator of a r~cording device may be present while the grand jury is in ,session. 'No judge is'present during the presentation of evidence although ~he court will sometime nile on evidentiary issues'anc\ will provide initial instructions to the FGJ. No person other thari -the grand jurors may be present while the grand jury is deliberating or voting. 2. (D) Restrictions on Disclosure (U) As a general rule, no one other than a grand jury witness may disclose-matters occurring before the grandjury. Government agents, even if called as witnesses, may not disclose. matters occurring before the grand jury. ' 3. (!J) lj:xceptionsPermitting Disclosure a. (D) Disclosures by the government without the court's-permission. The government~ through its attorney, may disclose grand jury matters under the following conditions: i. (U),Under Rule 6(e)(3)(A), the government may disclose a grand jury matter to the following persons andJn the following sitliationsprovided'the government does not disclose the grand jury's deliberations or any grand juror's vote and the go.vemment provides the court that impaneled the grand.jury with the names of all persons to whom disclosure was made and <;:ertifiesthat the government has advised the receiving 'party of the obligation of secrecy under this rule. (U) Persons eligible to,receive material under this subsection are: 1) an attorney for the governl11ent for'use in performing that attorney's duty; 2) any government personnel, including state, .local, Indian tribe, or foreign govern~ent person~el that an attorney fOf the government considers necessary to assist'in performing-that attorney's duty to enforce federal law; and 3) a person authorized under 18 U.S.C. § 3322. (D) Note: FBI OGe attorp.eys an~ CDCs are not "attorney,s for tJ1e government." Under this Rule, FRCP 1 defines "attorney for the government" as "the Attorney General, an authorized assistant of the Attorney General, a Uni.ted States Attorney, [and] an authorized assistant ofthe UriitedStates Attorney." it (D) An attorney fC;>f the goverrunent may disclose any grand jury matter to another Federal Grand Jury. 142 UNCLASSIFIEJ)-FOR OFFICIAL USE ONLY UNCLASS:QlIED - FOR OF.FICIAL USE ONLY Domestic Investigations and Operations Guide iii. (U) An attorney for-the government may disclose any grand jury matter involving foreign intelligence, counterintelligence, or foreign intelligence information to any federal law enforcement, intelligence, protective, immigration, national defense, or national security official to assist the official receiving the information in the performance of that official's duties.,The government attorney must file; under seal, with the court that impaneled the grand jury, a notice that such information was disclosed and the agencies or departments that received the information. As used in Rule 6(e), for~ign intelligence infomation is information that relates to the ability of the United States to protect agafnst actual or potential attack or grave hostile acts by a foreign power or its agents; sabotage or iriternat~onal terrorism by a foreign power or its agents or clandestine intelligence activities by an intelligence service or netWork of a foreign power or its agents, or information with respect to a foreign power or fo'reign territory th~t relates to the national defense or security of the United States or the United States conduct offoreign affairs. iv. (U) An attorney for the goveinment may disclose ~ny grand jury matt~r . involvi~g, either inthe Unit~d'States'orelse:where;athreat ofattackor.other grave hostile acts of a foreign power or its agent, a ,threat of dQmestic or international sabotage, or clandestine intelligence gatl1ering activities by an intelligence service or network of a foreign power or by its agent to any appropriate federal, state, local, Indian tribal, or foreign government official for the purpose ofpreventing or responding to such threat or activities. The government attorney must file, under seal, with the court that impaneled the grand jury, a p.otice that such information was disclosed and the'agencies or departments that received the information. b. (U) Disclosures by the government requiring the Court's permission. The gov~rhment, through its attorney, may disclose grand jury matters under the following coriditions only with permission of the court. Petitions to make these disclosures are-generally, but not'always, filed with the court that impaneled the grand jury. Unless the hearing on the government's petition i~ to be ex parte, the petition must be served on all parties to the proceedings and the parties must be afforded a reasonabl~ period of time to respond. i. (U) An attorney for the,government may petition for disclosure to a foreign court or prosecutor for llse in an official criminal investigation. 'ii. (D) An attorney for the government may petition for disClosure to a'state, local, Indian tribal, or foreign government official, ifthe government attorney can show that the matter may disclose a violation of state, Indian tribal, or foreign criminal law, and the purpose ofthe disclosure is to enforce that law. iii. (U) An attorney for the government may petition for disclosure to an appropriat~ military official if the government attorney'can show the matter 143 UNCLASSIFIED-FOR OFFICIAL USE ONLY ( . . UNCLASSIFIED - FOR OFFICIAL USE ONLY Domestic Investigati~ns and Operations Guide may disclose a violation of military criminal law under the Uniform Code of . Military Justice, and the purpose of the disclosure is to enforce that law. c. (U/IFOUO) FBI's Conduit Rule (UIIFOUO) Only the federarprosecutor is ~uthorized to make an initial disclosure of Rule 6(e)(3)(D) foreign intelligence informatiqn. As a practical matter, such . - disclosures are ordinarily accomplished through th~ FBI, which may have existing information-sharing mechanisms with authorized receiving officials.. Ifthe prosecutor intends to share information directly with another. official, consultation with the FBI is required to ensure that disclosures wili be consistent with the existing policy of intelligence community agencies and·to ensure appropriate handling of sensitive or classified information. .I I I I (lJ/IFOUO) If, incases ~,f emerge.ncy, the prosecutor must disclose information before consulting with the FBI, the.prosecutor must notify the FBI as soon as practicable. d. (U) Other Limitations (U) Rule 6(e)(3)(D) does not eliQlinate certain other infom1ation protection requirements, such as restrictions on disclosures oftax returns, on certain finilnCial information under the Right to Financial Privacy Act, and on classified information,. to name. only a few examples. Specific statutes may impose additional burdens of disclosures. e. (U) Disclosure (U) An FBI employee may become a "Receiving Official," the person to whom grandjury.information has been:disclosed, if the FBI r~ceives grandjliry information developed during' investigations conducted by other agencies. A Receiving Officialis any feclerat state, local, Indian tribal, or foreign government official receiving grand jury information, disclosed by an attorney for the government, under any provision of Rule 6(e)(3)(D). A Receiving Official may only use die disclosed matet:ial as.necessary in the conduct of his/her official duties. The Receiving.Official ordinarily must consult with the. federal prosecutor before disseminating the infol"!"ation publicly, including.in open court proceedings. I. II. CUJIFOUO) Receiving Officials may only use grand jury information in a manner consistent with the FGJ-Guidelines and any additional conditions placed on the use or handling ofgrand jury ·information by the attorney for the . government. 144 UNCI,ASST1?TRn:.l?on n14'VTI"'T.4. T TTl::.'T.' ri"'TT " b2 b7E UNCLASSIFIED - FOR OFFICIAL USE ONLY Domestic Investigations and'Operations Guide iii. (U//FOUO) if dissemination is necessary to the performance of his or her official duties, a Receiving Official may disseminate Rule 6(e)(3)(D) information outside of that offiCial's agency to other government officials. iv. (D) A Receiving Official, other than a foreign government official; must- consult with the attorney for the government before disseminating Rule 6(e)(3)(D) . information publiciy (fncfuding through its use in a court proceeding' that is open to or acce~sible to the public), unless prior disse~ination is necessary to prevent harm to Hfe or property. In such instances, the Receiving Official shall notify. the attorney for the government of the dissemination as soon as practicable. v. (D) A foreign government Receiving Official must obtain the prior consent from the disclosing official where possible, or if the disclosing is unavaUable, from the agency that disseminated the information to that foreign official before dissemination of the iI)formation to a third government or publicly. Public dissemination includes using the information in a court proceeding.that is open to or accessible by the public; vi. (D) A Receiving Officia] shall handle Rule 6(e)(3)(D) information in a ~anner consistent with its sensitivity and shall take appropriate measures to restric~ access to this information to individuals who require access for the performance of official duties. vii. (U) A Receiving Official shall.immediatelyreport to tlie disclosing attorney for the government: any unauthorized dissemination of Rule 6(e)(3)(D) information; or any loss, compromise, or. suspected compromise of R~le 6(e)(3)(D) information. f. (U) Violations i. (U) A Receiving Official who knowingly violates Rule 6(e)(3)(D) by using the disclosed information outside the conduct .of his or her official duties, or by failing to adhere to any iimitations on the dissemination of such information, may be subject to contempt of court proceedings and. to restriction on future receipt of Rule 6(e)(3)(D) information. n. (U) A state; local, Indian tribal, or foreign government official who receives Rule 6(e)(3)(D) information, and who knowingly violates these guidelines, may be subject to contempt of court proceedings. "iii. (U) An attorney forthe government who knowingly violates Rule 6(e)(3)(D) may be sub~ect t6 contempt of court proceedings.. 145 UNCLASSIFIED-FOR OFFICIAL USE ONLY UNCLASSIFIED -'FOR OFFICIAL USE ONLY Domestic Investigations and Operations Guide g. (U) Limitation on Unauthorized Disclosures. (U) Rule 6(e)(3)(D)(i) provides that Receiving Officials may use disclosed information only to conduct their "official duties subject to any limitation on the unauthorized disclosure of such information." This "limitlition on unauthorized disClosures" is understood to encompass applicable statutory, regulatory, and guideline restrictions regarding cl.assification, priv.acy, or other information protection, as well as any additional restrictions imposed by the federal prosecutor. (UlIFOUO) Note: The FGJ-Guidelines do not require that the Receivi.ng Official notify the federal prosecutor of subsequent disclosures, except for consultation for public disclosures and consent for certain disclosures by foreign officials. The Receiving Official is bound by whatever restrict~ons govern his or her use and disclosure of the information as part of his official duties. (Memo dated 5/15108. Guidelines for the Disclosureand Use of FOJ Information under Rule 6[e)[3)[DD. h. (UIIFOUO) pJI!!!at,o,ll of Use i. (UIIFOUO) Because of the restrictions involved in handling information that is obtained by the use of a grand jU subpoena, whenever possible, alternatives to the grand jury subpoena, such as _ . . . . I Ishould be considered as an alternative method of obtaining evidence. e I ii. (U) A grand jury subpoena may only be used for purposes of gathering information that is relevant to the grand jury' ~ investigation. Grand jury secrecy continues indefinitely, regardless of whether there is an indictment, unless the material becomes a matter of public record, such as by being introduced at trial. iii. (U) Rule 6(e)(3)(D) does not require notice to the court of subsequent dissemination of the information by Receiving Officials. iv. (U//FOUO) Disclosure ~f grand jury material cannot be made within the FBI for .unrelated investigations unless a. government attorney has determined that such disclosure to a particular investigator is needed to assist that attorney in a specific criminal investigation. The ability of government attorneys to freely share grand jury material with other government attorneys for related or unrelated criminal investigations does not extend to investigators without c~e specific authorization from the government attorney and notice to the court. Therefore, grand jury material must be restricted when placed into a general system of records that is freely accessible to FBI· employees and others with . access (e.g., ACS). v. (UI/FOUO) If a government attorney aut~orizes the disclosure.of grand jury material in the possession of the FBI for use in an unrelated federal criminal 146 UNCLASSIFIED-FOR OFFICIAL USE ONLY b2 b7E UNCLASSIFIED - FOR OFFICIAL USE ONLY Domestic Investigations and Operations Guide matter, such approval should be documented in the grand jury subflle ofboth the initiated case file and the subsequent case file. That documentation will be in addition to any necessary supplementation to the government attorney's . FRCP Rule 6(e) disclosure letter and/or to the internal disclosure list. vi. (UI/FOUO) The USAO should be consulted immediately for precautionary . instructions if grandjury material will have application to civil law enforcement functions (e',g., civii RICO or civil forfeiture). There are very Iimite<texceptions that allow government attorneys to u~e grand jury mat€?rial or information in civil matters (e.g., civil penalty proceedings concerning banking law violations). These exceptions do not automatically apply to ~nvestigative personnel. Therefore, any similar use of grand jury infonnation by the FBI must be approved in advance by the government attorney. vii. (UlIFODO) Disclosure cannot be made without a colirt order for use in noncriminal investigations, such as backgroundinvestigations or name checks. viii. (U/IFODO) Government personnel who are preparing a response to a Free90m of Information ActorPrivacy Act request·may properlY'ac~ess grandjury ... material under,the Rule because they are considered to be,assisting the grand jury attorney by ensuring against any improper di.sclosure. i. (D) Matters Occurring Before the Grand Jury i. (D)-Core Grand Jury Material: There caq. be no dissemination of matters occurring-before the grand jury unless such dissemination comes within one of the exceptions discussed above. Therds no uniform legal definition of what constitutes matters occurring before the grand jury except for what is generally referred to as "core" grandjufy material. "C.ore grand jury material" includes the following: (i) names oftargets and witnesses; '(ii) gr~nd jury testimony; (iii) grand jury subpoenas; (iv) documents with references to grand jury testimony (including summaries and analyses); (v) documents that clearly r~ve!ll the intentions or direction of the grand jury investigati()n; and (vi) other material tl1at reveals the strategy, direction, testimony, or other proceeding's of a grand jury. ii. (U) Documents Created Independent of Grand Jury but Obtained by Grand Jury Subpoena: Rule 6(e) generally prohibits disclosing "matters occurring before the grand jury." The rule, however, does not define that phrase. The issue of whether pre-existing documents fall within that proJ1ibition has never.been settled conclusively' by the Supreme Court, although many lower courts have discussed it at length, Courts generally agree that this prohibiti9ndoes not cover all infonnation developed in the course of a grand jury investigation; rather, the secrecy rule applies only to information that would reveal the existence, $!rategy or direction of the grand j!lry investigation, the nature of the evidence prod~ced ~efore the grandjury, the views expressed by 147 UNCLASSIFIED-FOR OFFiCIAL USE ONLY UNCLASSIFIED - FOR OFFICIAL USE ONLY Domestic Investigations and Operations Guide members of the grandjury, or anythi!lg else that actually occurre,d before the grand jury. In addition, courts,have frequently held that Rule 6(e) does not protect documents subpoenaed from tpe govenlment that are sought by third .parties only for the information contained within the document rather than to determine the direction or strategy of the grand jury investigation. Due to developing law on this issue, FBI personnel should consult with the AUSA responsible to determine now to b~st handle these documents. iii. (UIIFOUO) Data Extracted from Records Obtained by Grand Jury Subpoena: Information extracted from business records that was obtained by grand jury subpoena is often used to fa~ilitate investigations. Some of that type of data is, by statute or case,law, subject to "the Rule." In other cases, determination of whether data must be considered subject to "the Rule" depends on the case law and local practice in the federal district. Information extracted from grand jury subpoenaed financial records subject to the Right to Financial Privacy Act of 1978 (12 U.S,.C. § 3420) must be treated as grand jury material "unless such record has been used in the prosecution of a crirnefor which"the grand jury issued an indictment or presentment...." With the approval.of the USAO, inflmnatioIl,from subpoenaed telephone rec9rdS'ruay be disclosed for use in unrelated federal criminal investigations in those districts where such material is 'not considered'a "matter occurring before a grand jury." If the USAO approves generally of this procedure, such'information may be used in unrelated criminal investigations without authorization from a government attorney in each instance. j. (U) Federal Grand Jury Physical Evidence and Statements of Witnesses' i. (U) Physical evidence prOVided' to the'governrn~nt in response to a grandjury subpoena is'subject to the secrecy rule regardless of whether such evidence is presented to the.grandJury. Physical evidence provided voluntarily or obtained by means otherthan grand jury process (su<::h as by a search warrant) is not a grand jury matter regardless .ofwhether such evidence was previously pr is ' thereafter presented:to the' grand jury. ii.(U) Statements ofwitnesses obtained as a result of grand jury process. including. grand jury subpoena, such as a sta~ementgiven in lieu of grand jury testimony, ,are matters occurring before the grand jury irrespective of whether such witnesses testified before the grand jury or are not required,to testify. Voluntary statements of witnesses made outside of the grand jury context (not pursuant to any grand jury process'iricluding a ,grand jury subpoena), including statements made'outside the'grandjury by a witness who is being prepared for grand jury testimony, are not grand jury matters irrespective of whether the witness previously testified or will thereafter testify before the gra.nd jury. iii. (U) Rule 6(~)(3)(B) requires a federal prosecutor who discloses grand jury material to government investigators and other persons supporting the grand 148 UNCLA~SIFIED-FOR OFFICIAL USE ONLY UNCLASSIFIED - FOR OFFICIAL USE ONLY Domestic Investigations and Operations Guide jury investigation to promptly provide the. court that impaneled the grand jury the names of the persons to whom such disclosure has been made and to certify that helshe has advised such persons of their obligation of secrecy under the Rule. In order to document the certification required bythe Rule, government attorneys often execute and deliver to the court a form, normally referred to as a "Certific?tion" or "Rule 6(e) letter." A copy of this document should be maintained with the grand jury material held in the FBI's custody. iv. (U/IFOUO) Document;ltion ofInternal Disclosures of Grand Jury Material: Grand jury material should b~ kept in such as fashion as to maintain the integrity ofthe evidence. Upon taking custody of grand jury material, the FBI employee should categorize it in a manner to identify .its production source and how it was obtained, to include the identity of a'custodian of record for documentary evidence. Practical considerations often require agents assisting government attorneys to seek assistance in the same investigation from others within the FBI. In many districts, support personnel and supervisors of case ~gents need,IlQl be (Qutinely included in the Jistprovided'tMlie court. In lieu of a Rule 6(e) letter from the USAO containing an exhaustive list of names of FBI personnel, an FBI record of additional internal disclosures must be maintained by the case agent in order to establish accountability~ Use ofthis "internal certification" procedure should be authorized by the appropriate USAO. The internal form.should record the date of disclosure a~ well as the identity and posit.ion of the recipient. Such internal disclosures may be made only in support of the sarne'investigation in whi~h.a federal pros~cutor has previously issued a R.ule 6(e) letter. In addition, the internal record should reflect that all recipients of grand jury ll1aterials were advised of the secrecy requirements of Rule 6(e): Whenever practicable, recipients should be listed on tb.is internal certification pri9r to disclosure. Local Rule 6(e) customs should govern the internal certification process used. . v. {U/fFOUO) Storage of Grand Jury Maferial: The FBI cannot make or allow unauthorized disclosure of grand jury material. Material arid records obtained pursuant to the grand jury process are frequently stored in FBI space. FBI personnel should report ~my unauthorized disclosure to the appropriate government at,torney.who, in tum, must notify the court. In order to protect against unauthorized disclosure, grand jury material must be secured in the fql!owing manner: 1. (UlIFOUO) The cover, envelope, 9rcontainer containing grand jury . materials must be marked with the w~rning: "GRAND JURY MATERIAL DISSEMINATE ONLY PURSUANT TO RULE 6(e)." Nb Grand Jury stamp or mark should be affixed to the original material. Agents, analysts and other authoriz~d parties shouid work from copies of grand jury material whenever possible to ensure the original material retains its integrity. 149 UNC.I .A~smr1?l\_1i'{\D n'C''C'T.t"'1T • T TT"'~ ~_.- _. UNCLASSIFIED - FOR OFFICIAL USE ONI.Y Domestic Investigations and Operations Guide 2. (U//FOUO) Access to grand jury material must be limited to authorized persons (e.g., those assisting an attorney for the government in a specific criminal investigation). All necessary precautions should be taken to protect grand jury material, to include maintaining the material in a secure lqcation, when nof in use. The material must be appropriately segregated, secured, and safeguarded. Absent chain-of-custody considerations, grand jury material may be maintained in the IA section of the fiie. GrandjuI'Y. material· need not be kept in an' evidence or bulky exhibit room and may be entrusted to a support servi~estechnician (SST) or evideIwe control technician (ECT). Should,grandjury material be.en!ered into a computer da,tabase?the data must be marked with the 6(e) warning and maintained within the system in a restricted manner. . 3. (UI/FOUO) Registered mail or other trac,eable courier (such as Federal Express) approved by the Chief Security Officer (CSO) must be used to mail or transmit to other Field Offices any documents containing grand jury material. Couriers and other personnel employed in these services will not be ~ware of the contents of the material transmitted because of the wrapping procedures'specified below,imd therefore, then do rio~ require it background investigation for this purpose. The names ofpersons who transport the material need riotbe placed on a disclosure Jist, but·the receiving office inust provide the case agent in the originating office with the names of personnel in the receiving office to whom 4isclosure is made. 4. (UIIFODO) Grand jury material tb.at is to be mailed or transmitted by traceable courier outside a facility must be enclosed in opaque inner imd outer covers. The inner cover'must be a sealed wrapper or envelope that contains the addresses of the sender and the addressee, who must be authorized to have access to the grandjury material. The inner cqver must be conspicuously.marked "Grand Jury Information To Be Opened By Addressee Only." The outer cover must be sealed, addressed, return addressed, and bear no indication that the envelope contains grand jury material. When the size, weight, ()r nature of the grand jury material precludes the use of envelopes or standard packaging, the ma,terial used for packaging or covering must be of sufficient strength and durability to protect the infoimatJon from una.uthorized disclosure or accidental exposure. 5. (UIIFOUO) lfthe government attorney determines that the sensitivity of, or threats to, grand jury material necessitates a more secure transmission m~thod, the material m~y be transmitted by an express mail service . approved for the transmission of national security information or be hand carried by the assigned government attorney or his or'her designated representative. 6. (U//FOUO) Grand jury material containing classified national security information· must be handled, processed, and stored,according to 28 C.F.R. 150 UNCLASSIFIED-FOR OFFiCIAL USE ONLY UNCLASSIFIED - FOR OFFICIAL USE ONLY Domestic Investigations and Operations Gui4e Part 17. Grand jury material containing other types of sensitive information, such as federal tax return information, witness security information, and other types of highly sensitive information that have mor~ stdngent security requirements than that usually required for grand jury ~aterial must be stored and protected pursuant to the security regulations governing such ,information and any special security instructions provided by the organization that originated the information. 7. (UI/FOUO) Original documents that are obtained through the grand jury process should be returned to the attorney for the go'vernment or, wi~h the government attorney's permission, to the owner ~f there is no indictmen.t or the prosecution has concluded. k. (U)Requests for Subpoenas in Fugitive Investigations (UI/FOUO) It is generally a misuse ofthe grand jury to use the grand jury as an investigative aid in the search for a fugitive. Therefore, with the exceptions discussed below, grand jury subpoenas for testimony or recordnelated,to thefugitive's whereabouts may not be requested hi FBI fugitive investigations. I. (U//FOUO) Grand jury process may be used to locate a fugitive if the grand jury is interest~d in h~aring the fugitive's testimony. Thus, if the grand jury seeks the testimony of the fugitive in an investigation that the grand jury is indicting, the grand jury may subpoeria other witnesses and records in a~ effort to locate the fugitive witness. However, interest in the fugitive's testimony'must not be a: pretext. The sol,e motive for inquiring into the fugitive~s location must be the potential value offugitive's testimony to the grand jury's investigation. A ,subpoena' for the fugitive witness must be approved, by the grand jury before seeking to subpoena witnesses or record,s to locate the fugitive. Furt4er, it is'not ' propeno seek to obtaill grand jury testimony from any witness, in~luding a ' 'fugitive, concerning an already-returned indictment. Thus, it would not be proper to seek to locate a fugitive for the purpose of having the fugitive testify about matters for wliich ar:t indictment has a,lready been returned, unless there are additional'unindicted defendants to be discovere~ or additional criminal acts to be investigated through the testimony ofthe'fugitive. Current.po~icy on "target" witnesses must be observed. Grand jUlY. subpoeIJas for witne~ses and records aimed at locating a fugitive witness who is a target of the grand jury investigation should be sought only where a target subpoena for the fugitive has already been approved by the responsible Assistant Attorney General. ii. (U1/FOtJO) Use of the grand jury to learn the present location of a fugitive is also proper when the present loca~ion is an element of the offense under inyestigation. On adequate facts, the presentlocation of a fugitive might tend to establish that another personcis harboring the fugitive, or has committed misprision, or is an accessory after the fact in the prescnt concealmellt of the fugitive. However, this justification would likely b~cviewed as a subterfuge if the suspected harborer or 151 UNCLASSIFIED-FOR OFF~CIAL USE ONLY UNCLASSIFIED - FOR OFFICIAL USE ONLY Domestic Investigations and Operations Guide the person potentially guilty of misprision or as an accessory were given immunity in the grand jury in orper to compel his/her testimony about the location of the fugitive. With regard to escaped federal prisoner and bond default matters, the present location of a fugitive is not relevant evidence in a grand jury investigation"because these offenses address the circumstances of a prior depart4re from a known location. The fugitive's present location is not a .relevant .factor as it is in harboring or as it may be in a misprision investigation. Inasmuch as uqlawful flight to avoid prosecution cases are, a rule, not prosecuted and cannot be prosecuted without written authorization from the Attorney General or an Assistant Attorney General, any effort to use the grand jl.lry in the investigation of such cases must be preceded by consultation with the DOJ and by written authorizatiQn to prosecute from the Assistant Attorney General in charge of the Criminal Division. as 11.9.2. (U) Administrative Subpoena A. (U) Summary (D) The Attorney General of the United States is vested with the authority to issue a~hllini§trllUve suJJpoenasunder two provisions oft!leDhited:StatesCode thatliave·relevance to FBI criminal investigations, 21 U.S.C. § 876 and 18 U:S.C. § 3486. The FBI has no inherent authority to issue administrative subpoenas but relies on, delegated authority from the AttorneY' GeneraL The use of adminisg-ative subpoenas is limited t() three categories of investigations-<lrug program investigations, child sexual exploitation and abuse investigations, and he~lth-care fraud investigations-and may not be used for any other purpose. The ~elegated a~thority varies depending on the federal violatio~ being investigated. The type of information that can be obtained using.an administrative subpoena is also limited by law or by policy of the Attorney General. . (UI/FOUO) Note: Within the fBI, the authority to issue administrative subpoenas is limited to those positions holding.the delegated authority from the Attorney General; that authoritY may-riot be redelel!ated.l b2 b7E B. (U) Legal Authority and'Delegation I. (U) Investigations involving the sale, transfer, manufacture-or importation of unlawful drugs (D) Authority: 21 U.S:C. § 876 arid DO]. Regulation at 28 C.F.R. App to Pt. 0, Subpt. R §~ . (U) May be issued to:, Any individual or business· holding records relevant to the-drug investigation. . (U) Records to be obtained: Any records relevant to the investigation. CD//FOUO) Delegated authority to issue: By DOJ regulation, the Attorney General's delegation Includes SACs, ASACs; SSRAs and "those FBI Special Agent Squad 152 -UNCLASSIFIED-FQR OFFICIAL USE ONLY UNCLA~SIFIED • FOR OFFICIAL USE ONLY Domestic Investigations and Operations Guide Supervisors who have manageme!1t responsibilities over Organized CrimelDrug Program investigatio:.:n::S~·" -'"';"" l (UI/FOUO] b2 . b7E . =c::;: . [.. I· \ . , ~ght to Pioancia! Privacy Act limitatioos described in paragr<iph' D ofthis section apply.If ~ddressed toa provider of"electronic (UIIFOUO) Limitaiioot b2 b7E communiCation service"'bY li"rei1!ote computing service/; provisions hi the Electronic ., Communication Privacy Act (ECPA) govern, as discussed in paragraph 0 of this section. 2, (U) Investigations involving the sexual exploitati9n or abuse of children (U) Authority: 18 U.S.C. § 3486(a) and Attorney General Order 2718-2004. (U) May be issued to:, A "provider of an electronic communicatiQn service" or a "remote cOmput~r service" (both tenns 'defined ·in Section 1L9.2.D.2.b, ·below) and only for the 'production of basic subscriber or clistomer infonnation. The subpoena may require production as soon as possible but iIi no event less than 24 hours after service of the subpoena. . , (U) Records to be obtained;1 . , b2 b7E JUl/FOUO) Delegated authority to issue:! b2 b7E .. (U(/FOUO) LImitations:. By law, these administratIve subpoenas may only be Issued In cases that involve a violation ofl8 U.S.C. §§ 1201, 224 1(c), 2242, 2243, 2251, 2251A, 2252, 2252A, 2260, 2421, 2422, or 2423. in which the victim has not attained the age of 18 years. Under the Attorney General's delegation, an administrative subpoena in these investigations may be issued-only to "proyiders'of electronic communication services" or to "remote computing services';'to obtain the infonnation listed above. These 153 UNCLASSrnTRn.1fOD ()~~Tl"'T A T 'TTC'T.' ri.",YY " UNCLASSIFIED - FOR OFFICIAL USE ONLY Domestic Investigations and Operations'Guide administrative subpoenas may not be issued to any other person or enti other information, includiri the content of communication or to· obtain an b2, b7E 3. .(U) Investigations involving 'Federal Health Care Fraud Offenses (0) Authority: 18 U.S.C. § 3486(a) (0) Records to be obtained: Records relevant to an.ip.vestigation relating to a "federal hea,lth care offense." Federal health care offense is defined in 18 U.S.C. § 24 (U) May be issued to: Any public or private entity or individual with records relevant to the federal·health care offense. (Note: These are referred to in guidance issued by the Attorney'General as "investigative demands:") (UI/FOUO) D~legated authority to iSsue: There is no delegation to the FBI. Delegated to ,personnel within "DOl's Crimil1al Division and to United States Attorneys, who may redele~ate the authority to Assistant United States Attorneys. (0) Limitations: The Right to Financial Privacy Act (RFPA) limitations described in paragraph D of this section apply. The provisions in ECPA govern, as. discussed in' paragraphD 6ftl1is secti6ii,ifthe fequest fof fecordsis adoressedt6 a "provjder of electroniC cpmmunicationservice" or a "remote'computing service.;' The subpoena may not require,the prod~ction of records at a lace more than 500 miles fr subpoena is.served. b2 b7E CU) RestrictionoiI inqividual health care hlformation: Pursuant to 18 U.S.C. § 3486, health information about an individual acquired through ,an authorized investigative demand.maynot be used in, or disclose.q to any person for use in, any administrative, civjl, or criminal action agajnst that inOividual unless the action or investigation arises froni and is directly related to receipt of health care, payment for health care, or action 'involving a fraudulent claim related to. health care. I (UllFouojl r C. (U) Approval Requirements (U//FOUQ) Use of-an administrative subpoena-requires SSA approval. The SSA may issue the administrative ~ubpoena if the authority· has been so delegated. Further review and approval may be required depending on the deiegation. Review by the CDC is appropriate if legal questions arise in preparing and 'issuing the subpoena. (UIIFOUO) Note: An individual designated by proper authority to serve in. an "acting" ~tatus in one of the positions with delegated autnority may sign and issue an administrative subpoena. The "acting" -status should be documented in an appropriate Field Office administrative·file and hoted in the case file. For example, if the ASAC with auth9rity to sign is away onleave or temporary duty and another individual has been designated by the SAC to serve as' "acting" ASAC, that individual has authority to issue the administrative subpoena. 154 UNCLASSIFIED-FOR OFFICIAL USE ONLY b2 b7E UNCLASSIFIED - FOR OFFICIAL USE ONLY Domestic Investigations and Operations Guide Arelief supervisor is not considered to be in an "acting" sta~s for purposes of issuing an administrative subpoena. D. (U) Limitations on Use of Administrative Subpoenas 1. (0) Financial Privacy Limitations a. (U) Obtaining records from a financial institution. "Financial records" are those records that pertain to a customer's relationship with a financial institution. The term "financial institution" is broadly defined as a bank, savings bank, card. issuer, industrial ~oan company, trust company, savings association, building and loan or homestead association, credit union, or consumer finance institution, located in any state, territory, 9r the District of Columbia. See 12 U.S.C. § 3401. [Note: Tpe scope of the RFPA's.definition of-financial institution for this purpose, which limi~s the restrictions·the RFPA places on federal law enforcement in using an administrative subpoena, is ~arrower than the definition qf financial institution that is used in connection with NSLs. For that purpose, the RFPA refers to the broader defivition found in the Bank Secrecy Act (BSA). Among the entities included in the BSA definition are money transmitting businesses, cat dealers, travel agencies, and persons involved in real estate closings. See 12 U.S.C. § 3414(d) and 31 U.S.C. §5312.(a)(2)and(c)(1).]. When seeking financial records-from a .financial institution,.the FIn must send a certificate of compliance required by 12 U.S.C. § 3403 to the financial ipstitution.The certificate must indicate, among other things, that notice has been provided by the FBI to the individual customer whose financial records are to be obtained. The content of the notice is set out in 12 U.S.C. § 3405. A ,court order may be obtained that allows for delayed notice pursuant to 12- U$.C. § 3409. Notice is not required if the administrative subpoena is issued to obtain the financi~ll records of a corporation or for records not pertaining to a customer. Notice is also not required.if the administrative subpoena seeks orily basic account information, defined as name, address, type of account, and accoun~ number. See 12· U:S.C. § 3413(g). b. (U) Obtaining records from a Credit Bureau. A credit bureau or consumer reporting agency may-only provide name, address, former addresses, place of employment and former place of employment in response to an administrative subpoen~. 15 U.S.C. § 1681 f. A credit bureau or consumer reporting agency may not release financial information in a credit report or consumer. report, or the names ang locations of financial institutions at which the consumer has accounts pursuant to an administrative suBpoena. A court order, a grand jury subpoena, or, in an appropriate case, a national security letter may be used to obtain this information. IS U.S.C. § 168 i b. Notice of disclosure will be provided by the credit bureau or consumer reporting agency to the' consumer if the consumer requests this ' information. 2. (U) Electronic Communication Privacy Act a. (U) Use of an Administrative Subpoena. The ability t,9 gather subscriber information and the content of electronic communications using an administrative subpoena is governed by ECPA. In cases involving the sexual exploitatioI:\'or abuse of children, only basic subscriber or customeriJiformation may be obtained with an 155 UNCLASSIFIED-FOR OFFICIAL USE ONLY ·UNCLASSIFIED -FOR OFFICIAL USE ONLY Domestic Investigations and Operations Guide .administrative subpoena under the terms ofthe Attorney General's delegation, as described above. No content information may be ob~ined. In drug and health care fraud investigations, an administrative subpoena may be used to obtain basic subscriber or customer information and certain stored communications, under limited circumstances, from entities that provide electroniC communication services to the p~blic. - two b, (U) Definition.s. ECPA applies to types of entities that provide electronic communications to the public~ The term "provider _of el.ectronic communication services" is defined in 18 U.S.C. § 251 O(fS) as "any service that provides the user thereof the ability to send or receive wire or electronic communications." The term "remote computing services" is defined in-I8 U.S.C. § 2711(12) as the "provision to the'public of computer storage 9r1processing services by means of an electronic communication system." . I c. (U) Subscriber information.1 b2 b'7E d.. (U) Records or other information pertainin to a subscriber. e. (U) Content. Content is the actual substance of files stored in an account,_ including the subject line of an e-mail. (1) (U) Unopened e-mail held in storage for] 80 days or less may not be obtained using an administrative subpoena. A search·warrant is required. (2) (U) Unopened e-mail that has been held in electronic storage for more than 180 days may be obtained with an administrative subpoena-. (In the Nin.th Circuit, the opened e-mail-and un-opened e-mail must have been in storage for 180 days before it can be obtained with an administrative subpoena. See Theofel v. Farey-Jones, 359 FJd 1066.) The government must provide notice to the subscriber or ~ustoiner prior to obtaining such content. A limited exception to the notice requirement is provided in 18 U.S.C. §2705. . (3) (U) E-mail that has been opened and the content of other electronically stored files held in storage by an entity that provides storage services to the public (Le., a remote computing service, as defined in 18 U.S.C. § 2711), may be obtained using an administrative subpoena with notice to the customer or subscriber, unless notice.is delayed in accordance wit!l18 U.S.C. § 2705. 156. l1NC'T .A~~Tl<'nH\_""OD ouurl"'r .... TTC'P ''''''''TT'' 'b2 b7E .. " :: UNCLASSIFIED - FOR OFFICIAL USE ONLY Domestic Investigations and Operations Guide (4) (U) E-mail that has been opened and the content of other electronically stored 'files held in storage by an entity that does not provide electroriic communica,tion services to the public, such as that on the ~nternal network of a business, may be obtained uSing an administrative subpoena. Notice to the indiv.idual is not required because this demand is not restricted by ECPA. , 3. (UI/FOUO) Members of the Media a (U/IFOUO) An administrative subpoena directed to provider of-electronic communication services or any other entity seeking to obtain local and long distance connection records, or records of session times of calls, made by a member of the news media may only be issued with the specific approval of the Attorney General. Requests for this approval should be reviewed by the CDC and coordinated with,an Assistant United States Attorney (AUSA). The request must provide justification for issuance of the subpoena consistent with the Dep~rtment of Justice policies set forth in 28 C.F.R. § 50.10. Guidance' on'this policy may be obtained from the Investigative Law Unit and/()r the Privacy and Civil Liberties Unit, OGC. E. (U/IFOUO) CompliancelMonitoring . 1. .(U) Limits oil-use.1 _., - --- '- .. . . b2 b7E 2. ruiIFOUQ) Ov~rnrod~ctionJ I b2 b7E 3. (U/IFOUO) FactorS for compiiance. The following factors should be considered to ensure compliance with applicable laws and regulations that govern the FBI's use of administrative subpoenas: a. (U//FOUO) The administrative subpoena must relate to a type of investigation for which the sUQpoena is authorized; b. (UlIFOUO) The administnitive subpoena must be d~rccted to a recipient to whom an administrative subpoena is authorized; . c. (U//FOUO) The administrative subpoena may request only records that are authorized under the pertinent law; 157 UNCLASSIFIED-FOR OFFIC~AL USE ONLY llNCLASSIFIED - FOR OFFICIAL USE ONL¥ Domestic Investigations and Operations Guide d. (U/IFOUO) The administrative subpoena must be approved by an authorized official; e. (U/IFOUO) The administrative subpoena rrlUst be uploaded into the Aut,omated Gase Support (Ae'S) system to the Subpoena ("SBP") subtile of the substantive case tile for record purposes; f. (U/IFOUO) The return of service information must be completed on the back of the original administrative subpoena; g. (U//FOUO) The original administrative subpoena and completed return of service must be maintained in a "SBP" st!bfile of the substantive investigation; and h. (U//FOUO) The records provided in response to the,administrative subpoena must be reviewed to ensure that the FBI is authorized to collect the rec9rds provided. If an over-production has occurred, ~teps must be taken to correct the error. U.9.3. (U),National SecuritY Letter A. (V) Legal Authority (0) 15 U.S.C. §§ 1681u, 1681v; 18 U.S.C. § 2709; ~(U)12:U;S.C. §3414(a)(5) (A); ~OV:S.C § 436; (V) AGG-Dom, Part V (V) A National Security Letter (NSL) maybe used only to request: 1. (U) Financial Records: The Right to Financial Privacy Act'(RFPA), 12 U.S ,C. § 3414(a)(5); 2. (V) Identity of Financial Institutions: Fair Credit Reporting Act (FCRA), ISD.S.C. § 1681u(a); . , 3. (0) Consumer Identifying Information: FCRA, 15 U.S.C. § 1681u(b); 4. (U) Identity of FinancialJnstitutions an9, Consumer Identifying Information: FCRA, 15 V.S.C. §§ 1681u(a) & (b); 5. (U) Full Credit Reports in International Terrorism Investigations: FCRA, 15 U.S.C. § 1681v; and 6. (U) Telephone Subscriber Information, Toll Billing Records, Electronic Communicatjon Subscriber Information, and Electronic Communication Transa~tional Records: ElectronicCommunicationsPrivacv Act (ECPA), 18 U.S.C. §2709. B. (U) Definition ofMe~hod (U) A National Security Letter is an administrative demand for documents' or records that can be made by the FBI during a predicated investigation relevant to a threat to the national security.'Sample NSLs are available. C. (U//FOUO) Approval Requirements (UIIFOUO) A request for an NSL has two parts. One is the NSL i~self, and one is the EC approving the issuance ofthe NSL. The authority to sign NSLs has been delegated to the 158 UNCLASSIFIED-FOROFFIqAL ySE ONLY UNCLASSIFIED - FOR OFFICIAL U~E ONLY Dom~stic Investigations and Operations Guide Deputy Director, Executive Assistant Director and Assi~tant EAP for the National Security Branch; Assistant Directors and all DADs for CT/CD/Cyber; General Counsel; Deputy General Counsel for the National Security Law Branch;Assistant Directors in Charge in NY, DC, and LA; and all SACs. (UlIFOUO) In addition to being signed by a the statutorily-required approver, every NSL must be reviewed and approved by a: CDC, ADC or attorney ac~ing in that capacity, or an NSLB attorney U b2 b7E (UI/FOUO)I . I b2 b7E (UlIFOUO~ , , b2 b7E (UI/FOUO~ b2 b'7E (U//FOUO)I 'I - -----:....._ _~------'--159 UNCLASSIFIED-FOR OFFICIAL USE ONLY b2 b7E UNCLASSIFIED - FOR OFFICIAL USE ONLY Domestic Investigations and Operations Guide -~,_~_~I ""---_1 (U//FOUO) b2 b7E Jl.:-.-,-' D. CD) Duration of Approval 1 E. b2 b7E ---:.- Specific Procedures I~(U_/IF..;..O_U_O-:)I;:::=======:::;::===::::::==========;l 1·. . . (UlIFOU021 I' . (U/IFouo)1 '\ I' , . b2 b7E 02 b7E b2 b7E IICUIIFOU02f. b2 b7E • (UI/Fouo)1 ]~------:-~~~~....;.......... b2 b7E • (UllFouoj I ' .' • (UIIFOUO~ b2 blE I, ro//Fouof b2 b7E 160 UNCLASSIFIED-FOR OFFICIAL USE ONLY UNCLASSIFIED - FOR OFFICIAL USE ONLY Domestic Investigations and Operations Guide I b2 b7E (UIIFOlIO) I I b2 b7E I '. 1. (UIIFOUO),.-c_o_v_er_E_C (UI/Fouo1· .....,......_---.,..--,-- --,----,---:--_---, I b2 bJ.E a. (UlIFOUO~ I r. r b. (U//FOlJ0 1 f I c. (U//Fouoj J I ] d. (Ui/Fouoj I e. (U//FOUO i. I(UI/FOUO~L.-----'--------~~-----:.....?I (U//FOUO~......;..._:...._ j. ---:- I 161 UNCLASSIFIED-FOR OFFICIAL iJSE ONLY ____J b2 b7E; UNCLASSIFIED - FOR OFFICIAL USE ONLY Dom,estic Investigations and Operations Guid,e b2 b7E b2 biE 2. (D) Copy of NSL (UlIFOUO) A copy of the signed NSL must be retained in the investigative case file and uploaded under the. appropriate NSL document type in ACS. Docum~nted proof of . service ofNSI,. letters must be maintained in the case file. 3. (UI/FODO) Second Generation Information (UI/FODOj ., b2 b7E 4. (UI/FODO) EmergencY Circumstances (UlIFOUO) ECPA protects subscriber or transactional' information regarding communications from disclosure by providers of telephone or other electronic communication services. Genenilly, an NSL, grand jury subpoena, or other forms,of legal process must be used to compel the communication service provider.to disclose subscriber qr transaCtional information. In emergency circumstances, however, if the provider in good faith believes that a delay in disclosure could pose a danger of death or serious bodily injury, the provider may voluntarily disclose information tothe FBI. As a matter of FBI policy, when there is a danger of death or serious bodily injury that does not permit the proper processing of an NSL, if approved by ~m ASAC, a letter to the provider citing 18 U.S:C. § 2702 maybe used to request emergency disclosure. If time dqes not permit the.issuance of an emergency letter citing 18 U.S.C. '§2702, an.oral request to the provider may be made, but the oral request must be followed-up with a letter as described herein. (UlIFODO)1 I~~~--------:.....-~ 162 UNCLASSIFI.ED-FOR OVFICIAL USE ONLY .b2 b7E UNCLASSIFIED - J?OR OFFICIAL USE ONLY ~Domestic Investigations and Operations Guide b2 . b7E (UlIFOuo)1 b2 b7E (UlIFOUO~ I b2 b7E ,- F. (UI/FOUO) Notice and Reporting Requirements '(U/IFOUO) The National Security Law Branch at FBlHQ is required to rep'ort information ,ab£>ut NSL usage to Congress. Theda~ neces$!1ry for Col1 gressional reporting is __ :automaticafIy recorded ifthe NSL is created in the NSL Sllbsyste,m (FISAMS). If the NSL created outside the system, the EC must include all information necessary for NSLB accurately to report NSL statistics. The EC must break down the number of targeted phone numbers/e-mail accounts/financial account~ that are addressed to, each and every NSL recipient. Therefore, if there are three targets, ten accounts, and six recipients of an NSL, the EC mu~t state how many. accounts are the subject of the NSL as to Recipient 1, Recipient 2, etc. It is not sufficient to only indicate that there are ten accounts ,and six recipie~ts. is (U//FODO) In addition, the F~I must report the UnjtedStates person status of the subject of all NSL requests (as opposed to the target of the investigation to which the'NSL is relevant), other than those seeking subscriber information. While the subject is ofteg the target of-the investigation, thai is, not always the case. The EC must reflect the United States person status, of the subject of the request - the person whose information the FBI is seeking. If the NSL is seeking information about more than one person, the' EC must reflect the United States person status of each of those persons. (See the form ECs, which make clear that the United States person status applies to the target ,of the request for information.) (U/IFOUO) Finally, to ensure acc4rate reporting, the EC must accurateJy state'the type of information that is being soug!:tt. NSLs for toll billing records or transactional records will include subscriber information. The EC need only state that the request'is for toll pilling , records or, transactional records, lind the reporting paragraph should state ,that toll billing or transactional records are being sought for x number of accounts, and, if multiple recipients, froineach of recipients #1, #2, etc. . G. (U/IFOUO) Receipt of NSL Information I (UIIFOUOJL-------------'----J b2 ,b7E 163 UNCLASSIFIED-FOR OFFICIAL USE ONLY UNCLASSIFIED - FOR OFFICIAL USE ONLY Domestic Investigations and Operations Guide b2 b7E I (U//FOUO[ I b2 67E (U//FQYQ~ -- -_. " . ... . - -- ~ - --- b2 b7E .. ". (U//FOUd~ I. b2 b7E H. (U//FOUO) Dissemination of NSL material (U//FOUO) Subject to certain 'statutory limitations, information obtained through the u~e of an NSL may be disseminated according to generaLdisseminatjolJ standards in the AGG-Dom. ECPA (telephone and electronic communications records) and theRFPA (financial records) permit dissemination if consistent with the AGG-Dom and ifthe information is clearly relevant to the respolJsibilities of the recipient agency. FCRA, 15 U.S.C. §. 1681 U , permits dissemination to other federal agencies as may be necessary for the approval or conduct of a foreign counterintelligence investigation.FCRA imposes no special rules for dissemination of fu II credit reports. . I (U//FOUO~ I the matenal received in return.!, !the NSLs themselves are not cia""jfiprl nnr j" b2 b7E 164 TJNf'T .ASlSlTIi'TlfO_1U\D n14'li'ri'r'A T TT~T.' riMr " UNCLASSIFIED - FOR OFFICIAL USE ONLY l)omestic Investigations and Operations Guide b2 b7E I. (U) Payment for NSL-Derived Information (UlIFOUO) Because there is no legal obligation.for the FBI to compensate recipients of NSLs issued pursuant to ECPA, 18 U.S.C. § 2709 (toll billing records information, subscriber, electronic communication transactional records) or FCRA, 15 U.S.C:. § 1681 v, (full credit reports in international terrorism cases), there should not be payment in connection with those NSLs. See EC, 319X-HQ-A 1487720-0GC. serial 222, for'a form letter to be sent in response to demands for payment for these types ofNSLs. , (U) Compensation is iegaUy required for NSLs served to obtain financial information pursuant to RFPA, 12 U.S.C. § 3414(a)(5), and credi~ information pursuant to FGRA, 15 U.S.C. § 1681u. Under 12 C.F.R.§ 1.19.3, Appendix A, a fe~ schedule has been adopted under which photocopying is reimbursable at $.25 per page and searching is reimbursable at $11 per hour (or clerical staff. Regulations governing'a payment schedule for FCRA, 15 U.S.C. § 1681 u, NSLs has not been promulgated. 11.9.4. (D) J;Jusiness Record Under FISA A (U) )j~ga. Authority (D) 50 U.S.C. §§ 1861-63 B. (U) Definition of Method (1) A FISA order fo~ business records is an order for a third party to produce documents, records and other tangible information rel~vant to' a predicated national security investigation. FISABusiness Record Orders I11ay not be tised to obtain information during a positive foreign intelligence case if the material sought relates to a United States person. There is no "FISA-deriyed" impediment to the use of !iocuments obtained pursuant to such orders. C. (U//FOUm Annroval Rcaui b2 b7E D. (U) Duratiop of Approval (D) Duration is established by the court order. 'E. (U) ~otice and Reporting Requirements (U) There are, no special notice or reporting requirements. 165 UNCLASSiFIED-FOR OFFICIAL USE ONL ¥ UNCLASSIFIED - FOR OFFICIAL USE oNtY Domestic Investigations and Operations Guide F. (D) Compliance Requirements (D) The case agent-who receives production of documents pursuant to a FISA business records 'order mustdo the following: 1. (D/lFODO) Handle the production as required by the Standard Minimization Procedures Ado ted for Business Record Orders 2. (U) Whether or not required by paragraph 1, prior to uploading the documents or data receive<j. into PBI databases, review the docllmentS produced to determine whether they are respons~ve to the order.. a. (D/IFOUO) If the producing party has mistakenly provided'material thafis 'entirely non-responsive{e.g., the producing party inverted numbers'olJ an account . ,and produced entirely irrelevant and non-responsive material), the case agent must sequester the material and discuss with the CDC or NSLB the appropriate way to return the unr:esponsive.material to the' producing party and'obtain the responsive material. . ~. CU/1FOUG) If the producing partY'has produ;ced responslv.e materIal and material that is beyond the parameters of the order issued by the FISC (e.g., the FISC ordered production of one month's records and the pat1)'produced records for 6 weeks),.the case agent must determine whether the material produced that is outside the parameters of the FISC prder is subj~ct to statutory protection (e.g., recordsShat are subject to the Right to Financial Privacy Act, the Buckley Amendments, the Elec;tronic Communications Privacy Act; Fair Credit Reporting Act). i. (U/IFOUO) Ifthe overproduced material is subject to statutory protection, then the overproduced material mustbe treated like overproductic;m is treated in the contl!xt.of a natiomil security letter. ii. CUI/FOUO) If the overproduced'materhil is not subject to statutory protection, then i~ may be uploaded. Indetennining whether to upload the .overproduced materi~l, the case agent should consider the extent to which the overproduction includes non-public.informatiori regarding United States persons who are not the subject ofa national. security inVestigation; the sensitivity of the information contained within the overproduction;, and the qurdensomene~s of separating the overprod!lced material from the responsive material. -. 166 UNCLASSIFIED-FOR OFFICIAL USE ONLY b2 b7E UNCLASSIFIED -FOR OFFICIAL USE ONLY Domestic Investigations and Operations Guide 11.10. (U) InvestigativeM~thod: Accessing stored wire and electronic communications and transactional records i~ conformity with chapter 121 oftitJe 18, United States Code 11.10.1. (U) Summary (UIIFOUO) FBI employees may acquire the contents Qf stored wire or electronic communications and associated transactional records-including basic sllbscriber iilforrmition~s,provided in 18 U.S.C. §§ 2701-2712. Requests for voluntary disclosure under the,emergency authority of 18 U.S.C. § 2702 require prior approval from the Field Office ASAC or FBIHQ Section Chief when appropriate. (UIIFOUO) Application: This investigative method may be used during national security investigations and criminal investigations as authorized by statute. This method may not be used for assistance to other agencies, unless re.levant to an already open predicated investigatiop. This method cannot be used to collect positive foreign intelligence. Additionally, this method cannot be used during an assesslllent A. (U) Stored Data: The Electronic Communications Privacy Act (ECPA}-18U.S.C. '§§ 270 1-2712-governs the disclosure of two broad categories of information: (i) the contents ofwite orelectroniccommunicationsheldin'·'electronic storage" by providers Of "electronic communication service" or contents held by those who 'provide "remote computirig service" to the public; and (ii) records or other information pertaining to a subscriber to, or customer of such services. The category of "records qf other information" can be subdivided further into subscriber records (listed in 18 U.S.C. § 2703[cJpj) and stored traffic data or other records. (U) Records covered by ECPA'include all records that are related to the subscriber, including buddy lists, "friend" lists (MySpace), and virtual property qwne~ (Second Life). These other sorts of records are not subscriber records and caimot be obtained by a,subpoena under 18 U.S.C. § 2703(c)(2) or anNSL under 18 U.~.C. §2709. B. (U) Legal Process: The legal process for obtaining disclosure will vary depending on the type of information sought and whether the information is being vpluntarily provided under 18 U.S.C. § 2702 (e.g., with consent or when emergency circumstance~ require disclosure) or the provider is being compelled to provide the information un:der 18 U.S.C. § 2703, as 'outlined below. C. (U) Contents held in "electronic ston~.ge" by a provider of "electronic communication service" for 180 days or less can only, be obtained with a search warrant based on probable cause. Accordingly, such records may only be obtained during a fuq investigation.' (U) Contents held by tp,ose who provide "remote computing service" to the public and contents held in "electronic storage'" (or more than 180 days by an "electronic communication service" provider can be obtained with: a warrant; 'a subpoena; or an order issuec! by a c04rt tinder 18 U.S.C. § 2703(d) when prior notice has been 'provided to the customer or subscriber (unless the court has authorized delayed notice). (U) Title 18 United States Code Section 2705 establishes the standard to delay notice for .an initial period of up to 90 days. Records or other infonnation pertaining to a subscriber to or 167 UNCLASSIFIED-FOR OFFICIAL USE ONLY UNCLASSIFIED· FOR OFFICIAL USE ONLY Domestic Investigations and Operation~ Guide customer of such services, including basic subscriber information can be obtained with a search warrant or an ]8 U.S.C. § 2703(d) order without notice. D. (0) BasiC subscriber infonnation, as described in 18 U.S.C. § 2703(c)(2), can be compelled by a grand jury or administrative subpoena without notice. E: (U) Preservation ofStored Data; Jhe government is authorized under 18 U.S.C. § 2703(f) to direct a provider to preserve records or"other information (stored records or , communications) in its possession for 90 days (which maybe extended for an additional 90days) pending issuance of applicable legal proc~ss for disclosure. To make a preservation request, the FBI must believe that the records will subsequently be sought by appropriate legal process. . F. (0) Cost reimbursement: Title 18 United States Code Section 2706 requires the government to reimburse for costs incurred in providing the contents of communications, records, or other information obtained under 18 U.S.C. §§ 2702, 2703, or 2704, except tQat reimbursement is not required for records or other information maintained oy a communications common carrier that relate to telephone toll records and telephone listings obtained under 18 U.S.C. §,2703. In essence, the government does not have to reimburse for the cost of producing records that the provider maintains in the ordinary course of its ,business., ll.tO.2,. (U) Legal Authority (U) 18 U.S.t..§§ 2701-2712 (U) AGG-Dom, Part Y.9 (U) ECPA-,18 U.S.C. §§ 2701-2712- creates statutory privacy rights for the contents of commqnicati,ons in "electronic,sto~age'" and records ,or other information pertaining to a subscriber to or customer of an "electronic communication service" and a "remote computing service." TJ1e statutory protections protect the·privacy of an individual's electronic data contained in a networked account-that may otherwise fall outside the scope of the protections afforded by the Fourth Amendment-when such account or its service is owned'or managed by a third-party, provider. (0) E~PA generally: (i) prohibits, access to the contents of wire or electronic communications while in "electronic storage" unless authorized (i8 U.S.C. § 2701); (ii) prohibits a provider of servi(;e to the public from disclosingth~ contents of wire or, electronic communications while ,held in "electronic storage,"'and divulging to the government any information pertaining to a subscriber to or customer of such set;\'ice unless authorized (18 U.S.C.. § 2702); and (iii) authorizes the ,go:vernment to compel disclosure from a provider of stored contents of a wire or electronic' communication and records or otherinformatiol), pertaining to a subscriber to or cqstomer (18 U.S.C. § 2703). ECPA provides for reimbursement of costs incurred in providing. the information acquired. . lL10.3. (U) Definition ofInvestigative Metbo~ A..(U) Definitions: (U) Electronic Storage: is "any temporlifY, intermediate storage of a'wire ()r electronic communication incidental to the electronic transmission thereof," or "any storage of such communication by an electronic communication service for purposes of backup protection of 168 UNCLASSIFIED-FOR OFFICIAL USE ONLY UNCLASSIFIED· FOR OFFICIAL USE ONLY Domestic.Investigations and Opcr.ations Guide ~u"h \fommunication." ]8 U.S.C. § 2510(17). In short. "electronic storagcll refers only to temporary storage, made in the course of transmission, by a provider of an electronic communication service. (U) Remote Computing Service (RCS): is the "provision to the public of computer storage ' or processing services by me'!-ns of an electronic communications system." 18 U.S.C. § 27] I(2). In essence, a remote computing service is an off-site computer that stqres or processes data-for a customer. (U) Electronic Communications System: is "any wire. radio, electromagnetic; photooptical or photoelectronic facilities for the transmission of wire or electronic-communications, and any computer faqiIities or related electronic equipment for the electronic storage·of1!l,1c~ communications." 18 U.S.C. § 2510(14). (D) Electronic Communication Service (ECS): is "any service that provides to users thereof the ability to send or receive wire or electronic communications." 18 U.S.C. § 2510(15). For example, telephone companies and electronic mail companies generally act as providers of electronic comf!lunication services. (D) E.CPA authorities can be divided into two categories: (i) compelleddisclosure-legl).l compeLproviders to disclose~thecontents~of.stC5redwireor.electroniccommunications (including .e-mail and voice mail-opened and unopened) and other information such as ac~ountrecords and' basic. subscriber information; and· (ii) voluntary disclosure of such informati()n from service providers; Each of these authorities is discussed ,below. pr()c~ss to B..(D) Compelled Disclosure: 1". (D) Title i 8 United States Code Section 2703 lists. five types of legal process that the .government can use to compel a provider to disclose certain kinds of information. The five mechanisms, in descending order of required threshold showing are as follows: • (U) Search warrarlt; • (U) 18 U.S.C. § 2703(d) court order with prior notice to the subscriber or customer; • (U) 18 U.S.C. § 2703(~) court order without prior notice to the subscriber or customer; • CD) Subpoena with prior notice to t.he subscriber or customer; and • ({) Subpoena without prior notice to the subscriber or customer b2 b7E 169 UNCLASSIFIED-FOR OFFICIAL USE ONLY UNCLASSIFiED - FOR OFFICIAL USE ONLY Domestic Investigations and Operations Guide \. . I b2 b7E 2. (UIIFOUO) Notice-Orders Not to Disclose the Existence of a Warrant, Subpoena, or Court Order: FBI employees may obtain a court order directing network service providers not to disclose the existence of compelled process ifthe government has no legal duty to notify the customer or subscriber'ofthe process. If ail. 18 U.S.C. § 2703(d) order or 18 U.S.C. § 2703(a) warrant is being used, a request for a non-disclosure order can be inclu~ed in the application an~ proposed order or warrant. If a subpoena is being used to obtain the informati9n, a separate application to a court for a non-disclosure. order must be made. 3. (U) Legal Standard: A court may order an electronic communications service provider or remote computing service noUo disclose the existence of-a warrant, subpoena, or court order for such period as the court deems appropriate. The court must enter such an order if it determines that there is reason to believe that notification of the existence of the warrant, subpoena, or court order will result in: • (U) Endangering the life or physical safety of an individual; • (U) Flight from prosecutiol1; • (U) bestructio ll of or tampering with evidence; • (0) Intimidation of potential witnesses; or • (U) 'Otherwise seriously jeopardizing an investigation or unduly delaying a trial. 18 V.S.C. § 2705(b). , . 4. (V) Search Warrant: Investigators can obtain die full conteQts of a network account with a search warrant. ECP A does not require the government to notify the customer or subscriber when it obtains information from a provider using a search warrant. Warrants issued under 18 V.S.C. § 2703 must complY with either FRCP Rule 41 or al'). equivalentstafe warrant. However, all warrants issued pursuant to 18 U.S.C. § 2703 do not require personal service; those warrants issued by a federal-court have nationwide jurisdiction (see below); and the warrants may only be served on an electronic communication seryice or a remote computing service. FRCP Rule 41 also poses the additional requirement on these warrants that a copy of the warrant be left with the provider, and a return and inventory be made. (U) Vnd~r 18 U.S.C. § 2703(a), with a search warrant issuec;l based on probable cause pursuant to FRCP Rule 41 or an equivalent state warrant, the government may obtain: a. (U) "The contents .of a wire or electroni.c communication, that is in electronic storage in an electronic cpmmunications system for one hundred and eighty days or less," and b. (V),Everything that can be obtained using a 18 U.S.C. § 2703(d) court order with notice. . (U) In other words. every record and all of the stored contents ofan account-including opened imd unopened e-mail/voice mail~ can be compelled by a search warrant ba,sed on probable cause pursuant to FRCP Rule 41. Moreover, because the warrant is issued 170 UNCLASSIFIED-FOROFFICIAL USE ONLY UNCLASSIFIED - FOR OFFICIAL USE ONLY DomesticInvestigations and Operations Guide by a neutral magistrate based on probal;>le cause, obtaining a search warrant effectively ins~lates the process from'challenge under the Fourth Amendment, (U) Nationwide.Scope: Search warrants under 18 U.S.C. § 270~(a) may be issued by a federal "court withjurisdictio~ over the offense under' investigation," and may·be executed outside the district of the issuing court for material responsive.to the warrant. State courts may also issue warrants und~r 18 U.S:C. § 2703(a), but the statute does not give these warrants effect outside the issuing court's territorial jurfsdiction. As with a typical FRCP Rule 41 warrant, investigators must draft an affidavit and a proposed warrant that complies with FRCP Rule 41. (U) Service of Process: Title 18 United States Code Section 2703(a) search warrants are obtained just like any other FRCP Rule 41 search warrant but are typically served on the provider and compel the provider to find and produce the information described in the warrant. ECPA expressly states that'the presence of an officer is not required for service or ex~cutioh of a search warrant issued pursuant to lSU.S.C. §2703(a). 5. (U) Court Order with Prior Notice to the Subscriber or Customer: Investigators c~nlol:ltain everythingin·a I!~tw<?rk account except for unopened e~maH or voice-mail stored with a provider for 180 days or·less using a i8U:S.C.§2703(d) court order with' prior notice to t~e subscI:iber unless they have obtained authority for delayed notice pursuant to 18 U:S.C. §. 2705. ECPA distinguishes between the contents of communications that are in "Electronic storage" (e.g., unopened e-mail) for less than 180 days, and those that·have been in "Electronic storage" for longer or that are no longer .in "Electronic storage" (e.g., opened e-mail). (U) ,FBI .employees who .obtain a court order under 18 U.S.C. § 2703(d),.andeither 'give prior notic y to the·subscriber or comply with the delayed notice provisions of 18 U.S.C. § 2705(a), may obtain: a. (U) "The contents of a wire or electronic communication that has been in electronic storage in an electronic communications system for more than one ,hundred arid eighty days." 18 U.S.C. § 2703(a). b. (U) "The .contents Qf any wire or electronic communication" held by a provider of remote computing.service "on behalf of ... asub~criberor customer of such remote computing service," 18.U.S.t. §§ 2703(b)(l)(B)(ii), 2703 (b)(2); and c. (U) everything that can be obtained using a 18·U.S.C. § 2703(d) court order without notice. . b2 . b7E b2 b7E 171 UNCLASSIFIED-FOR OFFICIAL U~E ONLY UNCLASSIFIED - FOR OFFICIAL USE ONLY Domestic Investigations and Operations Guide .I_---".-~~----'-----';"-----=---:-:~ b2 b7E (U) Legal Standard: To order delayed notice, the court must find that "there is reason to believe that notification ofthe·exislence ofthe court order may. ; . endanger[] the life or physical safety 0 f an individual; [lead to] flight from prosecution; [lead to] destruction of or tampering with evidence; [l~ad to] intimidation of potential witnesses; or ... otherwise seriously jeopardiz[e]an investigation or unduly deiay[] a;ti'ial." 18 U.S.C.§§ 2705(a)(I)(A) an,d 2705(a)(2). The applicant must satisfy this standard anew each time an extension of the delayed notice is soiJght. (U) Nationwide Scope: Federal court orders under 18 U.S.C. § 2703(d) have effect outside the district of the issuing court. Title 18 United States Code Section 2703(d) orders may compel providers to disclose information even if the information is stored outside.the district of the issuing court. See 18 U.S.C: § 2703(d) ("any court thaUs court of competent jurisdiction" may issue a 18 V.S.C. § 2703[d] order);· 18 U.$.C. § 2711(3) (court of competent jurisdiction'includes any federal court having jurisdiction over the offense being investigated without geographic limitation). a ('() Tttie 18trnited States Code Section 2703(0) orders may also be issued by state" courts. See 18 U.S.C. §§ 2711(3); 3 I27(2)(B). Title 18 United States Code Section 2703(d) orders issued by state courts, however, do not have effect outside the jurisc:\iction of the issuing state. See 18 U.S.C. §§ 2711 (3); 6. (D) Court Order with9ut Prior Notice to the Subscriber or Customer: FBi employees need"an 18 U.S.C. § 2703(d) court order to obtain most account logs and most transactional records. (0) A. court order under 18 D.S.C.§ 2703(d) may ~ompel disciosure of: a. (U) All "record(s) or other information pertaining to a subscriber to or customer of such service (not inCluding the contents ofcommunications [held by providers of electronic communication"s service and remote computing serVice]), II and b. "(D) Basic subscriberinfon:nation·thlit can be obtained using a subpoena witho·ut notice. l8.u.S.C. § 2703(c)(1): b2 b7E I~~~~J (UIIFOU01I c. _(U) Cell site.and Sector information: Cell site and sector information is considered '!a record or other infoqnation pertaining to a subscriber') and therefore, production of historical and prospective cell site and sector· information may be compelled by a court order under 18 U.S.C. § 2703(d). Requests made' pursuantto 18 U.S.C. § 2703(d)'for disclosUre of prospective cell site and sector 172 UNCLASSIFIED-FOR OFFICIAL USE ONLY b2 b7E UNCLASSIFIED· FOR OFFICIAL USE ONLY DO!I1estic Investigations ;lnd Ope.-ations Guide infonnation-which is delivered to law enforcement under Communications Assistance for Law Enforcement Ac[ (CALEA) at the beginning and cnd of calls- must be combined with an application for pen register/trap and trace device. Some judicial districts will require a showing of probable cause before authorizing the disclosure of prospective cell'site and sector information. d. I : b2 b7E - (UI/FOUO] 1 " 02 b7E I (Uj b2 b7·E (Uf b2 b7E 17) TTNe'T .~~~Tl?T1i'n_1UlD "];'];'TnT:' T TTC'T.' nll.TT '7 UNCLASSIFIED - FOR OFFICIAL USE ONLY l)omestic Investigations and Operations Guide (U) Legal Standard: A court order under 18 U.S.C. § 2703(d) is known as an "articulable facts" court order or simply a "d" order. "This section imposes an intermediate standard to protect on-line transactional records. It is a standard higher than a subpoena, but not a probl!.ble cause warrant. The intent of raising the standard for access to transactioQal data,is to guard against "fishing expeditions" by law enforcement." (See H.R. Rep. No. 102-827, at 31 (1994), reprinted in 1994 D.S.<;.C.A.N.3489.) (U) The FBI must state sufficient specific andarticulable facts for the'courtto find that there are reasonable grounds to believe that the contents pf a wire or electronic communication, or the records or other information sou h are relevant and material to an ongoing criniimH investigation '. b2 b7E 7. (D) Subpoena with Prior Notice to the Subscriber or Customer: Investigators can subpoena,opened e-mail from a provider inhey either give prior notice to the subscriber or-comply with the delayed notice provisions .of 18 D.S.C. § 2705(a}-which requires l!. written certification oy the SACor ASACtliarthere is reason to'beJieve that notification 'ofthe existence of the subpoena may have an adverse result. (D) FBI employees who obtain a subpoena and either give prior notice to the subscriber or comply with the delayed notice provisions of 18 U.S.C. § 2705(a),may obtain: . a. (D) "The contents of any wire or electronic communication" held by a provider of remote computing service'''o,n behalf of ... a supscriber or 'customer of such remote computing service." 18D.S.C. §2703(b)(1)(B)(i), § 2703(b)(2); b. (D) "The contents of a wire or electronic communication that has been in electronic storage in an electronic communications'system for more than one hundred and eighty days." 18 U.S.C. § 2703(a); and c. (D) Basic ~ubscriber information listed, in 18 U.S.C. § 2703(c)(2). L--,,----r====~::::;::::::=====================11 h2 b7E (D) Notice:1 b2 b7E (D) Legal standards for delaying notice. The supervisory officfal must certify in writing that "there.is reason to believe that notification of the existence of the court order may ... endanger[] the life or physical safety of an individual; [lead to] flight 174 UNCLASSIFIED-FOR-OFFICIAL USE ONLY ·. r UNCLASSIFIED - FOR OFFICIAL USE ONLY Domestic Investigations and Operations Guide from prosecution; [lead to] destruction of or tampering with evidence; [lead to] intimidation of potential witnesses; or ... otherwise seriously jeopardiz[e] an investigation or undu1Y delay[] a trial." 18 U.S.C. §§ 2705(a)(l)(A), 2705(a)(2). Importantly, this standard must be satisfied anew every time an extension of the ~eJayed notice is sought. 8. (D) Subpoena without Prior Notice to the Subscriber or Customer: Investigators can subpoena basic subscriber information listed in 18 U.S~C. §'2703(c)(2). o (D) The government may use an administrativ~ subpoena authorized by a· federal or state statute or a. federal or state grand jury or trial subpoena to compel a provider to disCl9Se basic subscribednformationlisted in 18 U.S.C. § 2703(c)(2): -"name; address; local and long distance telephone connectiotl records, or records of session times ap.d durations; length of service (including start date}and types of ~erviCe used; telephone' or instrument number <;Ir other subscriber number or identity,. including any te~porarily assigned network addre~s; and means and source of payment for such service (including any credit card'or bank account number)(.]" (U < --~ b2 b7E See,PATRIQT Act § 210, 1.15 Stat. 272, 28:3 (2001). (U) Legal-Standard: The legal threshold for issuing <!- subpoena is low. In United States v. Morton Salt Co., 338 U.S. 632, 642-43'(1950), the Court articulated the deferetltial standard for judicial review of administrative enforcelJ).ent actions is a fourfactor evaluation of "good faith" issuance requiring that: (i) the investigation is conducted pursuant to a legitim'ate purpose; (ii) t!le information requested under the subpoena is relevant to that purpose; (iii) the agency does not already pave the information it is seeking wit~.the subpoena; and (iv) the agency has followed the necessary administrative steps 'in issuing the subpoena. (U//FOUO) In the event that a federal grand jury subpoena is used, however, appropriate protections against. disclosure must be followed in comoliance with FRCP . Rule 6(e).1 I Where the telephone billing'records being sought are those of a member otthe news me<;lia, approval of the Attorney General is required. (See OlOG Section 11.9. 1.E) \75 'UNCLA~SIFIED-FOR OFFICIAL USE ON~Y - b2 b'7E UNCLASSIFIED - FOR OFFICIAL USE ONLY Domestic Investigations.and Operations Guide C. (U) Voluntary Disclosure I~~~~~~~ 1. (V) Service NOT Available to tbe Public: Providers .of services not available "to the public" are not prohibited from disclosure under ECPA, and. so the provi~er may freely disclose both contents and other records relating to stored cOITmiunications. Andersen Consulting v. UOP, 991 F. Supp. 1041 (N.D. Ill. 1998) (giving hired consulting firm employees access to VOP's e~mail system is hot equivalent to providing e-mail to the public). Only providers of services to the public are prohibited from disclosing stored contents and records, unless statutorily authorized. 2. (U) SerVices That ARE Available to the rublic: lfthe services offered by the provider are available to the public, then ECPA precludes both the disclosure of contents to any third party, including the government, and the disclosure of other records to any governmental entity unless a statutory exception applies. The statl;ltory exceptions permit disclosure by a provider to the pu.blic,rfll?~sen.9~ Wh~l1 theneed~ of public safety and service providers outweigh privacy fnterests. .. (U) If the provider is autborized to disclose the information to the government under 18 U.S.C. § 2702 and is willing to do so voluntarily, law enforcement does not need to obtain a legal order to compel the disclosure. (U) If a provider voluntarily discloses under the statute, there is·no follow~up legal process required or available. If the provider,on the other hand, eitqer may not or will not disclose the information; FBI employees must rely on compelled disclosure . provis~ons and obtain the appropriate legal orders. i. (U) Voluntary disclosure of Sto~ed Contents (V) ECPA authorizes the voluntary disclosure of stored contents when: (a) (V) The disclosure is with the consent (express or implied) of the originator, ~ddressee, intended recipient, or the subscriber in the case of opened"e-mail, 18 V.S:C. § 2702(b)(3); . (b) (U) The disclosure "may be necessarily incident to the rendition oft!:le service or to the protection ofthe rightS or prop~rty of the provider of that service," J 8 U.S.C. § 2702(b)(S); (c) (U) The provider "in good faith, believes that an emergency involving danger of death or serious phY$ical injury to any person requires disclosure without delay of information relating to the emergency," I?, U,S.G~ § 2702(b)(8); (d) (U) To the National Center for Missing and Exploited Children, in connection with a report submitted thereto under Section 227 ofthe Victims of Child Abuse Act of 1990. (42 U.S.C. § 13032 and 18 U.S.C. § 2702[b][6]); or (e) (D) The contents are inadvertently obtained by the service provider and appear to pertain to the commission of a crime. Such disclosures can only' be made to a law enforcement agency. 18 U.S.C: § 2702(b)(7) 176 UNCLASSIFIED-FOR OFFICIAL USE ONLY b2 b7~ UNCLASSIFIED - FOR OFFI(::IAL USE ONLY Domestic Investigations and' Operations Guide (U) Voluntary disclosure ofNon-co~tent CustOlJlcr Records ii. (U) ECPA provides for the volun~ry disclosure of non-content customer records by a provider to a governmental entity when: , (a) (U) The disclosure is with the consent (express or implied) of the customer or subscriber or 1~ U.S.C; § 2702(c)(2) ; (b) (U) The disclosure "may be necessarily hicident to the rendition ofthe service or to the protection of the rights or property of the provider ofthat service," 18 U.S.C. § 2702(c)(3); (c) (U) The provider "in good faith, believes that an emergepcy involving danger of death or serious physical injury to any person requires disclosure without delay of information relating to the emergency," 18 U.S.C. § 2702(c)(4); or (U1/FOUO) Note: an emergency disclosure under this statutory, exception is justified when the circumstances demand immediate action on the part of the government to prevent death or'serious bodily injury, and does not depend on the immediacy of-the risk of danger itself. For example, an e-mail that di~cusses a planned terrorist attack but natthe timing for the attack wo~ld constitute an emergency that threatens life or limb, 'even though'the timing of the attack is unknown. It is the need for immediate action to prevent the serious harm threatened,by,tnese circumstances rather than the immediacy of the threat itself that is the reason Congress authorl?:ed voluntary disclosur.es under this exception. H.Rpt. No. 107-497 p 1'3-14 (June 11, 2002) accompanying H.R. 3482, The Cyber Security.Erihancement Act of2002, which passed as part of the comprehensive Homel~nd Security Act, See P.L. i'07-296§ 225. Cd) (U) To the National Center for Missing and Exploited Children, in connection with a report submitted thereto under Section 227 of the Victims ofChiid Abuse Act of 1990. (42 U.S.C. § 13032 and 18 U.S.C. § 2702[c][S]) iii. (u) a Pres.rv.tio of Evidence nud.riS U.s.C. § 2703(1): .\ b2 ,b7E (U) A governmental entity is authorized to direct providers to.preserv'c stored records-and communications pursuantto 18 U.S.C. S 2703(f).1 b2 b7E L.-_,......-~-:-~_---:-:-_--:_::-I\ Once a preserVation request is made, ECPA requires that the provider must retain the records for 90 days, renewable for another 90-day p'eriod upon a government request. See 18 U.S.C. § 2703 (f)(2). (U) Specifically, 18 U.S.C. § 2703(f)(l) states: (a) (U) A provider of wire or~electronic communication service or a remote computing service, upon the request of a governmental entity. must take all 177 UNCLASSIFIED-FOR OFFICIAL USE ONLY UNCLASSIFIE~ - FOROFFICIAL USE.ONLY Domestic Investigations and Operations Guide necessary steps to preserve records arid other evidence in its possession pending the issuance of a court order or other pr()gess. (breD) There is no legally prescribed format for 18 U.S.C. § 2703(f) requests. b2 b7E (U) FBI'employees who send IS U.S.C. § 2703(f) letters to netw()rk service providers should be aware of two limitations. First, the authority to direct providers to preserve records and other evidence is not prospective. That is, 18 U.S.C. § 2703(f) letters can ord~r a provider to preserve records that have already been created but cannot order providers to preserve records riot yet made. If FBI employees want providers to record information aQout future electronic communiCations, they must comply with the electroniC surveillance statutes. Asecond limitation onS U.S.C. § 2703(f) is that some providers may be unable to comply effectively with 18 U.S.C. § 2703(f) requests b2 b?E' (U) Video Tape Rental or Sales Records iv. (U) Title 1.S United States Code Seqtion'2710 makes.the unauthorized disclosure of records by any person engaged in the rental, sale, or delivery of prerecorded video cassette tapes or similar audiovisual materials unlawful and provides an exclusionary rule to prohibit personally identifiable.inforrnatiqri otherwiseobtairied from being admissible as evidence in any court'proceeding. Personally identifiable.information is defined as "information that identifi.es a pers9nas having requested or obtained specific video material or services ...." (a) (U) The disclosure to law enf()rcement of "personally identifiable informatio~" is permitted only when the law enforcement agency: (1) (U) Has ,the written consent of the customer; (2) (U) Obtains a warrant issued under the FRCP or equivalent state warrant; or (3) (U) A grand jury subpoena; b;2 (b b7E (U) This type of infoffilation was specifically not included in the definition of "personally identifiable information" to allow law enforcement t6 obtain information about indiyiduals during routine investigations such as ' . neighborhood investigations. 178 UNCLASSIFIED-FOR OFFICIAL USE ONLY ·UNCLASSIFIED - FOR OFFICIAL USE ONLY Domestic Investigations and Operations Guide (U/IFOUO) The disclosure of "personally identifiable information" in a national security case may be compelled through use of the above legal processes or pursuant to a business records order issued under 50 U.S.C. § 1861. 11.10.4. (U) Approval Requirements for Investigative Method A. (U) Voluntary Emergency Disclosure (UI/FOUO) ECPA protects subscriber and transactional information regarding' communications from disclosure by providers of telephone or other ,electronic communication services. Generally, an NSL, grand jury subpoena, or other form of legal . . service , oraVI'd'er to d'Ise Iose sueh process must beused to compe1the eommumcatlon informationJ b2 b7E . (V1/FOUOj b2 b7E '. (UIIPOUO)! \ l~'=========================~ .b2 b7E (UlIFOUOH b2 b7E . 11.10.5. (U) Duration of Approval (0) As authorized by statute (e,g., for as long as the emergency necessitating usage exists and only in those circumstan~es when it is impracticable to obtain legal process) and applicable court order or warrant. 11.10.6. (UIIFOUO) Specific.Proc"edures A. (UIIFOVO) Filing requirements: l----~----------------. b2 b7.E I"'----~...;"".,.-..------'-~___ 179 UNCLASSIFIED-FOR OFFICIAL USE ONLY ---J ~ UNCLASSIFIED - FOR OFFICIAL USE ONLY Domestic Investigations and Operations Guide b2 b7E I , I B (U//FOUO) Contact with Providers:l b2 b7E I ~ . C. (U) Cost Reimbursement: (U) Policy and procedures regarding cost reimQursement are described in the following: (U) Consistent payment procedures b2 b7E .\ .\ (\J) 5/25/2005 Cost Reimbursement Guidance (18 U.S;C. § 2706 - ECPA) 11.10.7. (U) Notice and Repor~ing Requ,irements A. (U) Voluntary disclosures: Ti~le 18 United States Code Section 2702(d),requires the Attorney General to report annually to Congress information pertaining to the receipt of voluntary disclosures of the contents of stored wire or electronic communications in an emergency under 18 U.S.C. §'2702(b)(8), specifically: . 1. (U), The nUIl1ber of ~ccounts from which DOJ received voluntary disclosures under subsection (b)(8); and 2. (U) Summary of the basis for disclosure in those instances where .the investigation pertaining to those disclosures was closed without the filing of criminal charg~s. B. (U)-RoleslResponsibilities: OGC/lLB is assigned the administrative responsibility to, by Decemb(lr 31' of each year: L (U) Tabulate the number of voluntary disclos,ures of stored contents received under the authority of 18 U.S.C. § 2702(b)(8) for the calenqar year; 2. (U) Prepare the report summarizing the basis for disclosure in those installces where the investigation. Ptlrtaining to tho~e discl()su~es was closed without the filing of criminal charges; and 3. (U) Submit the report to OGC for review and submission to DOJ according to the statutory requirement for annual report by the Attorney General. 11.10.8. (U) Other Applicable'Policies ( \ b2 b7E 180 UN:CLASSIVIED-FOR OFFICIAL USE ,ONLY '--- UNCLASSIFIED - FOR OFFICIAL USE ONLY Domestic Investigations and Operations Guide 11.11. (U) Investigative Method: Pen Registers and Trap and Trace devices in conformity with chapter 206 of Title 18, United States Code, and the Foreign Intelligence Surveillance Act 0 11.11.1. (U) ~ummary (U) Pen register and'trap and trace (PRITf) devices enable the prospective collection' o(noncontent traffic information associated with wire and electronic communications, such as: the phone numbers dialed from °or to a particular telephone, including .electronic communications; messages sent from or to a particular telephone; or the Internet provider (IP) address of communications on the Internet and other computer networks. (U/IFOUO) Application: The PRITT may be used in preliminary and fulrnational security and crimin~l investigations. This method ml1-Y not-be used for: (i) targeting a United States person when providing assistance to other agencies, unless there is already an open FBI preliminary or full investigation relate~ to the request for as~istance or the pr~dicate exists t9 open a preliminary or full investigation; (ii) targeting a United States person when collecting against a foreign ' intelligence requirement; or (iii) during an assessment. 11.11.2. (U) Legal Authority (U) 18 U.S.C. §§ 312 I -et seq. and 50 U.S.C. §§ 1842 et'seq, regulate the use of PRrIT devices. PRITT orders can collect IP addresses, port numbers and the. "To" and "From" information from e-mail;.they cannot intercept the co~tent of a communication, such·as words·in the "subject line"or the body of an e-mail. 11.11.3. (U) Definition of Investigative Method (U) A pen register device records or decodes dialing, routing addressing or signaling information transmitted by an instrument or facility from which a wire or electronic communication is transmitted, provided that such information must not include the contents of any communication. 18 U.S.C. § 3127(3). (0) A trap and trace device captures the incoming electronic or other impulses that identify the originating number or other dialing, routing, address~ng or signaling information reasonably likely to identify the source of a wire or electronic communication, provided that such information does !Jot include the contents of any communication. 18 U.S.C. § 3127(4). 11.11.4. (U),gtandards for Use and Approval Requirements for Investigative MethQd A. (U) Pen Registerlfrap and Trace unde~ FISA: Applications for authority to i.!se a pRfIT device can be made to the FIS<:: in national security investigations. 1. (U) Legal Standard: Applications to the FISC are to be under oath anq must include: a. (U) The identity of the federal officer making the application; and b. (U) A certification by the applicant that the information likely·to be obtained is . foreign intelligence information not concerning a United States person or, if concerning a UniteqStates persQn, is information that is relevant to an ongoIng investigation to protect the United States against intem~tional terrorism or clandestine intelligence activities; and thilt such investigation, if of a United States '_ 181 UNCLASSIFIED-FOR OFFICIAL USE ONLY lJ1.\fC~ASSIFIED'- FOR OFFICIAL USE ONLY Domestic Investigations and Operations' Guide person, is not conducted solely upon tlJe basis of activities protected by the First Amendment to the Constitution. 2. Procedures: Re uests for initiation or renewal ofFISA PRITT must be made b2 b7E EISAMSw route the request t6 appropriate parties for their, review and approval of the request Routing a paper copy for ' sIgnatures is not required. '---~--------:----~-::-","",,:,---:---:-""';--:----~~'" ,I , 3~ ,I (U) Emergency Authority-FISA: 50 U.S.C. § 1843 (UIIFOUO) Under the provisions ofFISA, the Attorney General may grant Emergency Authority (EA) f<;>r PRITT. Requests for Emergency Authority must be referred to the appropriate'FBlHQ Division. (UlI.FOUO)\ b2 b7E a. ,(D) The Attorney General may authorize the installation and use of a PRITT upora determination that an, emergency exists and that the factual basis exists for a court order. The FISC must be informed at the time of the autl),orization and an appli~ation for a court order must be made to the court no more than seven (7) days after the authorization. Emergency-authorized PRm use must terminate when the information sought is obtained, when the FISC denies the application, or seven (7) days after the Attorney General authorization is given. b. (U) If the FISC denies the application after an emergency PRITT device has been installed, no information collected as,a result may be used in any manner, except with the approval of the Attorney General upon a showing that the information indicates a threat of death or serious bodily harm to any person. (U) Notwithstanding the foregoing, the President, acting through the Attorney General, may authorize the use of a PRlIT, without a court order, for a period not to exceed 15 calendar days, following a qeclaration of war by Congr~ss. ....-----:-.....,;.-..., If an emer enc situation arises aft ular business hours 1-.==::::=~ 1....---, ":'-_-l.. ---,~at any time 9uring an emergency. B. (U) Crim'inal Pen Registerrrrap and Trace tinder 18 U.S.C.§§ 3121 et seq.: Appli<?ations forthe installation' and use of a PRffT device may be made to a "court of competent 182 UNCLAS~IFIED-FOR OFFICiAL USE ONLY b2 b7E UNCLASSIFIED - FOR OFFICIAL USE ONLY Domestic I~vestigations and Operations Guide jurisdiction"--'-i.e., "any district court of the United States (including a magistrate judg~ of such a court) or any United States court of appeals having jurisdiction over the offense being investigated, or any court of general criminaljurisdiction of a State authorized by the law of that State to enter orders authorizing tl).e use of a pen register or trap and trace device." 18 U.S.C. § 3127(2). 1. (U) Legal Standard: Applications for authorization to install and use a PRIIT device must include: a. (U) The identity of the attomey for the govemment or the state law. enforcement or investigative officer making the application and the identity ofthe law enforcement agency, conducting the investigation; and b. (U) A certification by the applicant that the information likely to be obtained is relevant to an ongoing criminal investigation being conducted by that agency. .2. (UI/FOUO) 'Procedures: An SSA must approve a request for initiation or renewal of PRITT use prior to submission of the request to anattomey. for the govemment.Before approving such a request, the ~SA should consider of the following: a..(U//FOUO).Theuseofresources based on theilwestigativ~p~rposes~t'f9rth~ \ b. .(U//FOUO) Whether there is sufficient factual basis for the certification to be made in the app~icat!on (i.e., is the information likely to be obtained relevant to an ongoing criminal investigation); c. CU//FOUO) Whether the customer or subscriber has consented to the use of a PRJTT, see 18 U.S.C. § 3121 (b)(3); or d. (U//FOUO) Whether the use of a pRfIT i1' the least intrusive method feasible under the circumstances. (U//FOtJO).A copy of the approving EC must be maintained in the investigative case file and/or sub file and in the ELSBR Admin~strative Sub:f;ile to the corresponding case file, , t (U//F0UO) A PRrIT order is executable anywhere within the United States and, upon service, the order applies to any person or entity providing wire'or electronic communication service in the United States.whose assistance may facilitate the execution of the order. Whenever such an order is s~rved on any person. or ~ntity not specifically named in the order,'upon request of such person or entity, the attomey for the government or law enforcement or investigative officer that is serving the order must p!'ovidc written or electronic certification that the order applies to the person or entity being served. . 3. (U) Emergency Authority-Criminal: (U) The Attomey General, the Deputy Attorney General, the.Associate Attorney Gen~rai, any Assistant Attorney General, any acting Assistant Attomey General, or any Depilty Assistant Attomey General may specially designate any investigative or law enforcement officer to determine whether an emergency situation that requIres the installation and use ofa·PRfIT device before art order authori~ing such installation and use can, with due diligence, be obtained. " (U) An emergency situation as defined in this section involves: .183 UNCLASSIFIED-FOR OFFICIAL USE ONLY UNCLASSIFIED - FOR OFFIqAL USE ONLY Domestic Investigations and Operations Guide a. (U) Immediate danger of death or serious bodily injury: to any person; 'b. (U) Conspiratori~1 activities charact~ri~tic of organized crime; c. (U) An immediate threat to a national security interest; or d. (0) An ongoing attack on a protected computer (as defined in 18 U:S.C. § r030) that constitutes a crime punishable by a tenn of imprisonment greater than ?ne year. (U) If the DOl authorizes the emergency installatioJ? of a PRITT, the government has 48 hours after the installll;tion t6 apply for a court order according to 18 U.S.C. § 3123. It is a violation oflaw to fail to apply for a court order within this 4& hour period. Use of the PRITT shall immediatelY tenninate when the infonnation sought is obtained, when the .application for a court order is denied, or if no court order has been obtained 48 hours after the installation of the PRffTqevice. (U//FOUO) As with'requesting authorization for an emergency Title IIIJ b2 b7E!. , lance that approval has, been obtain'ed, the DOJ attorney will adyis~ the AUSAthat the emergency use has been approved and that the law enforcement agency may proceed with the installation and us~ orthe PRffT. The DOJ attorney will send a verification memorandum, signed by the authorizing official, to the AUSA. The AljSA will include an authorization memorandum with the application for the cquit order appr9ving the emergency use. '--:--:--:....,....~:--~~....,....----:-:-:---:-:,-~~:-:-:::....,....~ (VIIFOUO) Iran emergency situation arises after regular business hours.1 b2 b7E IDuring regular business 110urs,II."-,_ _---' J 11.11.5. (U) Duration of Approval (U) National Security: The use of-a PRITT device maY-be au~horized by the FISC for a period. of time not to exceed 90 days in cases targeting a United States person. Extensions maybe granted (or periods not to ~xceeq. 90 days uponre-:appiication to the' court. In casestargetihg a non-Uni~ed States'person; an order or extension may be for a period of time not to exceed one. year. a (W) Crim.inal: The installation arid use of a.pRITT device may be authorize by court order under 18 U.S.C. § 3123 fot a period not to exceed sixty days, which may be extended for additional sixtY-day periods. ' 11.11.6.. (UIIFOUO) Specific Procedures A. (UIIFOUO) Prior to installing and using a PRITT qevice (whether issued in a criminal or national security matter), the case agent should: .I. (UlIFOUO! ,I,. I. , 184 UNCLASSIFIED-FOR OFFICIAL 'USE' ONLY 'b2 b7E UNCLASSIFIED -FOR OFFiCIAL USE ONLY Domestic Investigations and Operations Guide b2 b7E 2. 3. L-:-:--~=~========================j--:b2 (U//FOuoj I b7E; -:(U:://F:-:O:-:-U:-:-Ol;::========:::::::=========~====- I~=-=-=--:-r=================~ 4. (UlIPOVO)1 b2 b7E b2 b7E L_-........-=================;--~b2 b7E 5. (UlIPOVOj. 11.11.7. (U) Use and Dissemination oflnformation Derived from Pen Registerrrrap and Trace Authorized 'Pursuant to FISA (U) 50 U.S.C. § 1845 A. (U) No information acquired from a PRtrT device installed and used pursuant to FISA may be used or disclosed by fede~al officers or employees except for lawful purposes. B. (V) No information acquired pursuant to a FISA authorized PR/TI may be disclosed for law enforcement pUrposes unless such disclosure is accompanied by a statement that such information, or any infonriation derived therefrom, may only be used in a criminal proceeding with the advance authorization of the Attorney General. C. (D) Whenever the United~ States intends to enter into evidence or otherw.ise use or disclose in any trial, hearing, or other proceeding in or before any court, department" officer, agency, regulatory body, or other authority of the United States against an aggrieved person,any information obtained or derived from the use of ~ PRtrT device acquired pursuant to FISA, the United States must, before the trial" hearing, or other proceeding or at a reasonable-time' before an effort to so disclose or so use that information or submit it into evidence, notify the aggrieved persQn, and the court or other authority iii which the information.is to be disclosed or used, that the United States intends to so disclose or so use such information. (U) Note: 50 U~S.C. § 180 I(k) defines aggrieved person as: '''a person who is the target <;If an electronic surveillance or any other person whOse communJcations or activities were subject to electronic surveillance." 185 UN<;:LA,SSIFIED-FOR OFFICIAL USE ONLY UNCLASSIFIED - FOR OFFICIAL USE ONLY Domestic Investigations.and Operations Guide 11.11.8. (P) Notice and Reporting Requirements . A. (U) Annual Report for·Criminal.Pen Registerrrrap and Trace: The Attorney GeneraLis requIred to make an annual report to Congress on the number ofcri~inal PRJrr orders applied for by DOl law enforcemen~ agencies. 18 U.S.C. § 3126. The report is to include the following infoi:mation: 1. (U) The period of interc~ptionsauthorized by the order, and the number.arid duration of any extensions; 2. (U) The offense specified in the order or application, or extension; 3. (U) The number of investigations involved; , 4. (U) The number.and nature of the facilities affected; and 5. (U) The identity, including the district, Of the applying agency making the application' and the person authorizing the order. (UllfOlJ9) PQJ, Gritnil1.al'I)ivision, Office ofE,nfor<;emc;:n.t Qp~r.lltions require)) tlJatth~ F131 . provide .quarterly reports on pen.register usage. To satisfy DOJ data requirements and standardize and sim ii field re cirtin Court-ordered en re ister usage must be reported to FBIHQ within five workdays of the expiration date of an original order or extensions, or denial of an application for ail order. ,For all criminal PRJrr orders or extensions issued on or after January 1, 2009J ] I. ." lT1)ese reporting requirements, do not apply to PRITT authorized pursuant to consent or under the provisions ofFISA. B. (U) Semi-Annual Report fQrNational Security.Pen Register$ and Trap and Trace: The Attorney General must infonn the House Pennanent Select Committee Ql1Intelligence, Senate Select Committee on Intelligence, Committe~ of the :JudiCiary of the House Representatives, and Committee.ofthe Judiciaryofthe Senate concerning all uses ofPRJTT devices pursuant to 50 U.S.C. § "1846. This-report is coordinated through DOJ NSD. A semi. annual report must be submitted that contains the following information: 1. (U) The total number: of applications made for orders approving the use of PRfIT devices; 2. (U) The total number of such'orders either granteq, modified, or denied; and 3. (U) The total number of PRITT devjces whose installatio~ and use was authorized by the Attorney General on an emergency basis and the total number ofsubsequent orders ' approving or denying the i!"!stallation and use of such PMT devices. 11.11.9, llJ) Special Circumstances A.· (U/IFOUO) Avoiding Collection and Investigative Use of "Content" in tbe Operation of r~n Regist~rs and Trap and Trace Devices 1. (t,JIIFQUO) Overview: Telecommunication' netwoJ;'ks provide users the abilityto engage in extended dialing and/or signaling;, (also known as "post cut-through dialed digits" or PCTDt», which in some circumstances are simply call-routing information and, in others, are call content. For example, .PCTDD.occur when a party places a calling card, creqit card, or collect call by first dialing a long-distance carrier access number and then, after the initIal call is "cut through," dials the telephol)e number ofthe'destination party. In 186 UNCLASSIFIF.n.Fon Oli'li'T£"'T AT TTl:'l:' ,nlloTY ~7 b2 b7E UNCLASSIFIED - FOR OFFICIAL USE ONLY Domestic Investigations and Operations Guide other instances, PCTDD may represent call content, such as when a party calls an automated banking service and enters an account number, calls a pharmacy's automated prescription refill s<;:rvice and enters prescription information, or enters a call~back number when.prompted by a voice mail service. S.ee United States-Telecom Al:l:n v Federal Communications Commission 227 F.3d 450 462 (Dr. r.ir.200m! I b2 b7E (U//FOUO) The definition of both a pen register device and a trap and trace device provides that the inforination collected by these devices "shall not include the contents of any communication." 18 U.S.C. § 3127. In ad~ition, 18 U.S.C. § 3121(c) makes explicit . the requirement to "use technology reasonably available" that restricts the collection of information "so as not to include the cohtents of any wire or electt:onic communications." "Content" includes any information concerning the substance, purpose, or meaning of a communication. 18 U.S.C. § 2510(8). When tlw pen register definition is read. in wrij!l.nctioll Wi~ the limitation provision, however, it suggests thll.t although a PRrIT device may not be used fQr the eXpress plirpose"of collectingconterit, the incidental collection of content may occur'despite the use of "reasonably available" technology to m~nimize, to the extent feasible, any possible over collection of cOllteht while stili . allowing the device to collect all ofthe dialing and ~ignaling informati9n authorized. DOJ Policy: In addition to this statutory obligation, DOJ has issued a directive to all DOJ agencies requiring that no affirmative investigative use may be made of PCTDD 'incidentally collected that constitutes c~mtent, except in cases of emergency-,-to prevent an immediate danger Of death, serious physical injury, or harm to the national security. .(V//Fouml I b2 b7E 2. (UlIFOUO) Collection: I .. I ". a.. (U/IFOUO) b2 b7E I b2 b7E 187 UNCLASSIFIED-FOR-OFFICIAL USE ONLY UNCLASSIFIED.;; FOR. OFFICIAL USE ONLY Domestfc Investigations and Operations Guide b2 b7E 3. (UI/FOUO) Use ofPCTDD: I I I ~~ '",ilIJLEOUOlI b2 b7E b2 b7E I i. (U//FOUO)/ I ~ b2 b7E b2 b7E b2 b7E iii. ...----.... b2 b7E 188 UNCLASSIFIED':FOR OFFICIAL USE ONLY UNCLAS~IFIED --FOR OFFICIAL USE ONLY Domestic Investigations and Operations Guide iv; (U//FOUO) b2 b7E b2 b7E b2 b7E ii.. 0 b2 b7E 4. (UI/FOUO) What constitutes PCTD» content: In applying the above, the term "content" is interpreted to'mean,"any information concerning the substance, purpose, or meaning of a communication" as defined in 1'8 U.S.C. § 2510. Questions concerning whether specific PCTDD are content as opposed to dialing, routing or signaling information should be addressed. to the CDC or OGC for ~oordination with DO] as necessary. b2 b7E B. (UI/FOUO) Use of cell site simulators/digftal analyzers/wireless intercept tracking technology. A PRITT order or consent is requir~d for the FBI t6 use equipment· to capture a~y "signaling information":--including the Mobile Station Identification Number (MSIN) and ElectroriicSerial Number (ESN) or odier registration-typedata-emitted from a wireless phone into the public airspace-even though this can be accomplished without the assistance of the service. provider. Because 18 "u.S.C. § 3127 defines PRITT devices in terms of recording, decoding or capturing dialing? routing, addressing, or signaling 189 UNCLASSIFIED-FOR OFFICIAL USE ONLY UNCLASSIFIED,,: FOROFFICIAL USE ONLY Domestic IJ:tvestigations and Operations Guide information, the government's use of its own device to capture such signaling data. whether passively monitoring or actively interrogating-constitutes the use of a "pen register" ,deviCe ,and requires an order or statutory exception to avoid violating the statute. The following discusses how wireless intercept tracking technology (WITI) is used: L (U/IFOUO) To Locate a Known Phone: •. II -I . •• ~ __ L ~ b. . a. (1)//FOUO) Auth,ority: A standard PR/1To'rder is adequate to authorize the use of this technology to determine the location of a known targeted phone"provided that the language authorizes PBI employees to install or cause to be installed and use a pen register device, without geographical 'limitation, at any time of day or night within (X) days from the d~t~ the order is signed, to record or decode dialing, routing, addressing, or signaling information transmitted by the "Subject Telephone." The application and order should generally also request authority to compel disclosure, of cell site Jocation data on an ongoing basis 'under 18'U.S.C, § 2703(d)-or probable cause, if such is required by the particular district court-as such information may ,assist in determining the general location of the targeted phone ' .. P _. b2 'b7E I c. tI TlIFOUO)J , b2 J b7E UUnder Kyllo v. United States: 533 U:S. 27 (2001), the u~e 9f equipm~nt not III general, public use to acquire data that is tiot otherwise detectable that emanates frorn a nriYate nremise implicates the Fourth AmendmenLj' I ~. l"ummJW . 190 UNCLASSIFIED-FOR OFFICIAL USE ONLY b2 b7E .. . . . - , ~,- I I UNCLASSIFIED - FOR OFFICIAL USE ONLY Domestic Investigations and Operations f":' •• :",~ b2 b7E 2. (UlIFOUO) To Identify an Unknown Target Phone Number: (UlIFOUO) Authoritv:r b2 b'i'E (UI/FOUO)\ b2 b7E a. (UllFouo)1 [ I b. (UIIFQUO)r b2 b7E b2 b7E 19l UNCLASSIFIED_FOR OFFICIAL USE ONLY ., UNCLASSIFIED - FOR OFFICIAL USE- ONLY Domestic Investigations and Operations Guide b2 b7E C. (U) PRITT Order Language: The language in the order should state that "the pen register will be implemented unobtrusively and with minImum interference with the servic.es accorded to customers of such service." 192 'UNCLASSIFIED-FOR OFFICIAL USE ONLY UNCLASSIFIED - FOR OFFICIAL USE ON".Y Domestic Investigations and Operations Guide 11.12. (U) Investigative Method; Electronic Surveillance under Title III llnd under FISA . 11.12.1. (U) Summary (UI/FOUO) Electronic Surveillance (ELSUR) is a valuable investigative method. It is, a~so, a very intrusive means of acquiring information reievantto the effective'executi~nof the PBl"s, law enforce(nent, n!1tional security and intelligence missions. To ensure that due consideration is given to the"'competing interests between law enforcement and the effect on privacy and civil liberties, this section contains various administrative and management controls beyond those imposed by statute and'DOI guidelines. Unless otherwise noted, it is the responsibility of the· case agent and hislher supervisor to ensure compliance with these instructions. ELSUR is only authorized'as an investigative method in the conduct of full investigations. ELSDR requires: (i) administrat.ive or judicii'll authorization prior to its us~; (ii) contact with the Field Office ELSUR Technician to coordin~te all necess~ry recordkeeping; and (iii) consultation with,the Technical Advisor (TA) or a designated ITA to determine feasibility, applicability, and use of the ' appropriate equipment. (U/IPODO) Application:\ ,b2 b7E 11.12.2. (U) Legal Authority (D) ELSUR is authorized by chapter 119, 18 U.~.C. §§-2510-2522 (Title III of the Omnibus and Safe Streets Act of 1968); 50 U.S.C. §§ 1801-1811 (FISA); and E.O. 12333 § 2.5. 11.12.3. (D) De~nition of Investig~tiyeMethod (D) ELSDR is.the non-consensual electronic collection of information (usually com!l1unicatiohs) under Circumstances in which the parties have a reasonable expectation of privacy and court orders or warrants·aie required. 1-1.12.4. (U) Standards for Use and Approval Requirements ,for Investigative Method A. '(U//FOUO) FISA 1~ (D/IPOUO) PBiHQ and Field Office requests for'FISC ELSUR orders must use the FISAReguest Form. 'field Office requests for FISA orders are submitted and tracked through FlSAMS. The FISA request forms, in a question and answer format, have been designed to ensure thatall information needed for the preparation of a FISC application is provided to F~IHQ and to the DOJ. 2. (U) A Certification by the Director of the FBI or 9ne of nine other individuals aqthorized by Congress or the President to provide such certifications that the information being sought i.s foreign intelligence 'information; that a significant purpose of the electronic-surveillance is to obtain foreign intelligence information; that such 193 UNCLASSIFIED-FOR OFFICIAL USE ONLY UNCLASSIFIED - FOR OFFICiAL USE ONLY Domestic Jnvestigations and Operations Guide information cannot reasonably be obtained by nonnal investigative techniques; that the information sought is '!foreign intelligence information" as defined by. FISA; and includes a statement explaining the certifier's basis for the certification. (D) Note: Title 50 of the United States Code Section 1804 specifies the Assistant to the President for National Security Affairs; E.O. [2139 as amended by £.0.13383 specifies the Director of the J:BJ, Deputy J;)irector of the FBI~ the Director of N~tionaJ Intelligence, the Principal Deputy Director ofNatiqnal Intelligence, the Director of the _ Central Intelligence Agency; the Secretary of State; the Deputy Secretary-ofStaie, the Secretary of Defense, and th.e Deputy Secretary ofOefense as appropriate officials to make certifications required by FISA. 3. (U) EI)1ergency FISA Authority (50-U.S.C. § 1805[t]) (U) The Attorney General, on request from the Director·ofthe FBI or hislher designee, may authorize an emergency FISA for electronic surveillance when it is reasonably determined that an emergency situation exists that precludes advance FISC'review and approval and that a factual predication for the issuance of a FISA Order exists. A FISC judge must be informed by DOJ at the time of the emergency authorization anq an application must be-submitted to that judge as soon as is practicable but not more than . seven(7}days after the emergency authority"has-been approved by the Attorney" General. If a court order is denied after an emergency.surVeillance /:las been initiated, n9 inforniation gathered as a result of the surveillance may be used as evidence or disclosed in any trial or other proceeding, and no infonnation concerning any United .....States person acquired from such surveillance may be used or disclosed in any manner, except with the approval of the Attorney General if the information indicates a t~reatof death or serious bodily harm to any person. (U/IFOUO) For an emer enc FISA for electro . b2 b7E B. (U) Title III (UIIFOUO) An SAC (or designee) has the authority to approve requests for "nqn-sensitive" Title III orders. An Acting SAC may approve such requests in the absence of the SAC. The authority to approve Title III applications may not be delegated lower than the ASAC level. The SAC, with the recommendation of the CDC, must determine whether the request involves sensitive circumstances. (UIIFOUO) lra Title III involves one of the seven "sensitive circumstances," it must be approved by FBIHQ. (UIIFOUO) The foUowing five sensitive circumstances require the approval of a Deputy Assistalft Director (DAD) or higher from the Criminal Investigative Division (CID), Counterintelligence Division (CD), or Counterterrorism-Divisi9n (CTD), as appropriate: 1. (tJlIFOUO) Significant privilege issues,or First Amendment concerns (e.g., attorneyclient privilege or other privileged- conversations or interception of news media representatives); 194 UNCLASSIFIED-FOR OFFICIAL USE ONLY UNCLASSIFIED - FOR OFFICIAL USE ONLY Domestic Investigations and Operations Guide 2. (UI/FOUO) Significal1t privacycQncerns (e.g., interceptions of conversations in a bedroom or bathroom); 3. (UlIFOUO) Applications based on "relaxed specificity" (Le., "roving" interception) under 18 U.S.C. § 2518(11)(a) aild (b);" 4. (U//FOUO) Applications concerning Domestic Terrorism, Internati9nal Terrorism, or -Espionage investigations; or 5. (U/IFOlJO) Any situation dee~.ed appropriate by the-AD ofcm or OGC. (UlIFOUO) The following two sensitive circum::;tances require the approval of the Director, .'_ the Acting Director, Deputy Director, or the EAD for the Criminal Cyber Response and Services Branch, or the EAD for the National Security Branch, Qf the respective Assistant Director for·Cotmterterrorism Of Counterintelligence: 6. (U/IFOUO) "Emergency" Title III interceptions (Le., interceptions conducted prior to judicial approval under 18 U.S.C. § 2518[7]); or 7. (U/IFOUO) The interception of communications of members of Congress, federal judges, high-level federal.officials, high-level state executives, or members of a state judiciary or legi~lature is anticip,!tecl, .. (V//FOUO) All requests for electronic surveillance that involve one of the above "sensitive circumstances" must be reviewed by the OGC prior to approval. (UI/FOUO) With the prior approval of the Attorney General, or Attorney General's designee, the United States Attorney or the Strike Force Attorney must apply to ~ federal judge for a court order authorizing the interception of communications relating to one or more of the offenses listed in Title III (18 U.S.C. § 2$16). Judicial oversight continues into the operational phase of the electronic surveillan~e-installation, monitoring, transcribing and -handling of recording media. ' (UIIFOUO) An extension order may be sought to continue monitoring beyond the initial 30day period without a lapse in time. When a break in coverage has occurred, a renewal order may be sought to continue monitoring the same interceptees or facilities identified in the original 'authorization. The affidavit and application in support of an extension or renewal must comply with all of the Title III requirements, including·approval of the Att9rney General or designee. Except as explained below, extensions that occur within 30 days of the original Title III order do not require review by the SAC or designee. After a lapse of more than 30 days, the SAC-or designee must review and request renewed electronic surveillance. (UIIFOUO) There may be situations or unusual circumstances that require the FBI to adopt an already existing Title III froin ano~her federal law enforcement agency. This'will be approved on a case-by-case basis, only in exceptional circumstances. (UI/FOUO) Before the FBI begins or adopts the administration ofa Ti~le III, tpe Field Office must obtain SAC or designee approval. Thereafter, e~tensions and renewals within 30 days do not require SAC or designee approval. (UlIFOUO) Emergency Title III interceptions (e.g., interceptions conducted prior to judicial approval under 18 U.S.C. § 2518[7]) - [Hyperlink to Memo dated May 22. 2008 Standard arid Process Authorization] . . 195 . UNCLASSIFIED·FOR OFFICIAL USE ONLY UNCLASSIFIED- FOR OFFICIAL USE ONLY l)omestic Investigations and Operations Guide b2 q7E situation arises after re ular business houis T- --,. ---J~~~egular business hour~~L-_ _-' may be reached (UIIFOiJO) Disoute Resolution for both FISA and Title III Aoolications b2 b7E (UlIFOUO)\, 11.12.5. (U) Duration of Approval A. (U)FISA (U/IFOUO) FISC orders for ELSUR surveillance are provided for the period oftime specified in the or<ler that will not exceed: 90 days for United States persons; 120 days for han-United States persons; and one year for a foreign power, as defined in 50 U.S.C. § 1801(~) (D(2) or (3). For United States persons, renewals ofFISA Orders may be requested,for the ~ame period of-time originally allthorized 'baseci ~pona contiQuec! showing 'ofprobable cause. For non-United States persons, renewals 9an be for a period notto exceed one year. All renewal requests should be submitted to DOJNSb by the requesting Field Office atJeast 45 days prior to the expiration of the exist~ng order. These requests are to be submitteq using t~e FlSA Request Form process in FISAMS. B. (U) Title III (Uj Title III ELSUR orders are for a period not ~o excee~ 30 'days, with subsequent 30 day ex~epsions as authorized by the court. ~ , ' 11.12.6. (D) Specific Procedures A. (U) FISA (U/IFOUO~,--",,-- _ b2 b7E I. (UI/FOUO) FISA Verification of Accuracy Procedures (UI/Foud b2 b7E a. (U/IFouoj b2 b7E i. (U/IFOUO)! J ~' ,\ -196 UNCLASSIFIED~FOR OFFICIAL USE' ONLY b2 b7E UNCLASSIFIED - FOR OFFICIAL USE ONLY Domesticlnvestiga~ionsand Operations Guide ii. {UI/FOUO)l I------,.;. b2 b7E -~~ iii. (VIIFOUoi bZ b7E b. (UIIFOUOj b2 b7-E I· 2. (UlIFOUO) FISA Electronic Surveillance Administrative Sub-file ...(VIIFOUOl b2 b7E a.. (UIIFOUOj I b2 b7E . L--:. ~~ __I b2 b7E b2 b7E b2 b7E b. (UllFouoj b2 b7E 197 UNCLASSIFIED.FOR OFFICIAL USE ONLY UNCLASSIFIED - FOR OFFICIAL USE ONLY Domestic Inve.!!tigations and Operations Guide b2 b7E I c. (Ui/FOUOj b2 b7E d. (UlIFOVOj b2 b7E .(UlIFOUQf b2 b7E B. (V Title III I. (U//fOUO) The requirements in 18 V.S.C. § 2518 must be followed meticulously in the preparation of a Title III application. In addition, the following points must be covered; a. (UlIFOVO) Probable cause must be current; b. (ViIFOVO) There must be a factual basis for concluding.that normal investigative procedures 'have been rried and failed'or a demonstration why these procedures appear to be unlikely to succeed or would be too dangerous if tried ("boilerplate" statem.ents in this respect are unacceptable); c. CUI/FOVD) If the subscriber of the telephone on which coverage is sought is not one of the principals, attempts t.o identify the subscriber,inust be made; d. CUI/FOVQ) Minimization will be o~cur, as statutorily required, if the coverage involves a public telephone booth, a r~stllurant table, or the like; e. " CUI/FOUO) The facilit or remises to be covered is'described full I b2 b7E f.. (UlIFOUD) At least 10 days prior to submitting the Title III request to.DOl OEO, the Field Office must forward an electronic communication to FBIHQI I b2 b7E 198 UNCLASSIFIED-FOR OFFICIAL USE ONLY UNCLASSIFIED. FOR OFFICiAL USE ONLY Domestic Investigations and Operations Guide 2. (UlIFOUQ)1 b2 biE 3. (VIIFODOy For details on when, how, and where to conduct pre-Title IIIELSUR searches, refer to CID PG. IL 1F7I"':;'i0:rU; : O, )~.c;-:,a:-se: -:a;,:;g:;:en:-t-:-s:-;m_u::,:st:-:U;-:,s=---eth_9=-;:;~~_~__~~-:-~ " .~ .,....1 4· (.,.U1 ""'=_,"", T7 _, _ b2 b7E 5..(OIlFOUO) For additional guidance, see ELSUR Manual. 11.12.7. (U) Notice and Reporting'Requirements A. .FISA «() (UIIFOUO~ b2 b7E B: '(U) Title lIT 1. CU/IFOUO) The anticipated interception of conversations related to a "Sensitive InvestigativeMatt~r" as defined in the AGG-Dom, Part VH.N, requires.notice to the appropriate FBIHQ Unit Chie( and Section Chief, and DOl'Criminal Division. 2.. iUlIFOUO)1 199 UNCLASSIFIED.FOR OFFICI4L USE ONLY . ' - - "-- ,-----~ UNCLASSIFIED - FOR OFJTICIAL USE ONLY Domestic Investigations and Operations Guide b2 b7E 3. (U/IFOUO)\ I 4.l--(IU-//~FO-U-JO"""fj~------------------""--' I b2 b7E 5. (U//FOUO) Upon completion of a Title III ELSUR activity, ,the Form,2 r~port is required to he submitted per 18 V.~.C. § 25 L9. For details on the completion and . submission of the Form 2 report, see the cm PG. 11.12.8. (U) Compliance and Monitoring A. (U)FISA (U//FOUO)\I- b2 --.;..._...,.- _ B. (U) Title III (UI/FOUO) Upon completion ~fTitle III ELSUR activIty, the Form 2 r~portis required to be submitted per 18 U.S:C. § 2519. For details on the completion and submission of the Form 2 . report, seethe cm PG. 1~.12.9. (U) SpedlllCircumstances (V)FISA ..-;,~ (V) Under 50 V.S.C. § .1802, the President, through the Attorney General, may authorize electronic surveillance under·FISA without a court order for periods of up to one year, if the Attorney General cet:l:ifies in writing under oath that the surveillance will be. solely directed at acquiring communications that are transmitted by means that are exclusively between or among foreign powers and· there is no substantial likelihood of the surveillance ~cquiring the contents of communications to which United States Persons are parties. 11.12.10. (U) Other'Applicable Policies A. (U) FISA 1. (UI/FOUO) CO Policy Guide 2. (UlIFOUO) CTD Policy Guide 3. (UI(FOUO) Investigat!ve Law Unit Library 4. (U/IFOUO) Foreign intelligence Surveillance Act (FISA) Unit B. (UlIFOUO) OTD PG 1. (U//FOUO) Title III 2. (UI/FOUO) Memo dated May 22, 2008 Standard and Process Authorization 3. (UI/FOUO) ELSUR Manual 4. (U/IFOUO)CID PG 5. (UI/FOUO) oro PG 200 UNCLASSIFIED-FOR OFFICIAL USE ONLY b7E UNCLASSIFIED .. FOR OFFICIAL USE ONLY .Domestic Investigations and Qperation~ Guide' 11.13. (U) Investigative Method: Physical searches, including mail openings, requiring judiciai order or warrant ' . (U) AGG-Dom, Part V.A.12. 11.13.1. (U) Summary (D) The Fo~rt~ Amendment to the United States Constitution governs all searches and seizures by government agents. The Fourth Amendment, contains two clauses. The first establishes the prohibition against unreasonable searc/;1es and seizures. The second provides that no warrant (authorizing a search or seizure) will be issued unless based on probable cause. An unlawful search does no~ preclude a prosecution. The rem~dy to the defendant for an unlawful search IS suppression of the evidence resulting from the illegal seizure. (U//FOUQ) Annlication:1 b2 b7E (U) A search is i;\ government invasion of a person's privacy. To qualify as reasonable expectation of privacy, the indiv'idual must have an actual subjective expectation of privacy and society must be prepared.to recognize that expectation as objectively reasonable. See Katz v. United States, 389 U.S. at 361. The ability to conduct a physical search in an area or situation where an iTldividual has a reaspnable expectation of privacy requires a warr~nt,or order issued by a court of competent jurisdiction or an exception to the requirement for such a warrant or-order. The warrant or order must be based on probable cause. The United States Suprem~ Court defines probable cause to search as a "fair probability that contraband or evidence <;>fa crime will be found in a particular place." Illinois v. Gates, 462 U.S. 213, 238 (1983). A government agent may conduct a search without a wl!-r'rant based on an individual's voluntary consent. A search based on exigent circumstances may also be conducted withou~ a warrant, 'but the requirement for probable cause remains. ' 11.13.2. (D) Legal Authority (U) Searches conducted by the FBI must be in conformity with FRCP\Rule 41: FISA, 50-U.S.C. §§ 1821-1829; or E.O. -12333 § 2.5. . ,11.13.3. (U) Definition oflnvestigative M~thod (U) A physical search constitutes any physical-intrusion within the United States into premises or property (including examination of the iriterior of property by technical means) that is intended to result in the sei~ure, reproduction, inspection,.ar alteration of information, material,or property, under circumstances in which a person has a reasonable expectation of privacy. - . (U) A physical search requiring a warrant does n'Ot include: (i) electronic surveillance as defined in FISAor Title. III; or (ii) the acquisition by the United States Government offoreign intelligence information from international foreign communications, or foreign intelligence 201 UNCLASSIFIED-FOR OFFICIAL 'USE ONLY UNCLASSIFiED - FOR OFFICIAL USE ONLY Domestic Investigations ~nd. Operations Gui~~ activities conducted according to otherwise applicable federal law involving a foreign electronic c.ommunications systell1, using a means other than electronic surv.eillance as defined in FISA. A. (U) Requirement for Reasonableness. By the terms of the FQu:rth Amendment a search. must be reasonable.at its incention and reason~hle in it" . . I . L ~. . '(U) Reasonable.Expectation· of P;ivacy•. The right of-privacy is a personal right, not a property concept. It safeguards whatever an individual reasonably expects to be private. The pr9tection.notmally includes p~rsons, resIdences, vehicles, other personal property, private conversations, private papers and records. The Supreme Court has determined that there is nQ reasonable expectatiop of privacy in certain areas or information. As a result, government intrusions into those areas do not constitute a search and, thus, do' not have to meet the requirements of the Fourth Amendment. These areas include: (i) open fields; (ii) prison cells; (iii) pubiicaccess areas; and (iv) vehicle ideptification numbers. The Supreme Court has also determined that certain governmental practices do not involve an intrusion into a reasonable expectation of-privacy apd, therefore, do not amount to a·search. These practices include: '(i) a~rial'sur:veiUahce conducted'from navigable.airspace;'(ii)fieldtest'ofsuspected controlled substance; and (iii) odor detection. A reasonable expectation of privacy maybe terminated by an individual taking.st<;ps to va IUritarily relinquish the expectation of privacy, such as abandoning property or setting trash at the edge of the curtilage or beyond for cQllection. C. (U) Issuance of search warrant 1. (U) Under FRCPRl.\le 41, upon the requ~st of a federal 'law enforcement officer or an . attorney for the govefIlment, a search warrant may .be issued by: a. (U) a federal m.agistrate judge, or if-none is'reasonably available, ajudge of a state court ofrecord within the·federal.district, for a search of property or for a persori'within the district; b. .(U) a federal magistrate jUdge for a search of property or for a person either within or'outside the ~istrict if the property or person is within the district when the warrant is soughtbut might move outside the district before the warrant is exec,:uted; c. (U) a federal magistrate judge in any·district in which activities related to the terrorism may' have occurred, for a search ofprop~rty:or for aperson within or outsid~ 'the district, in an investigatIon of domestic terrorism ot international terrorism (as defined hil8 U.S.C. § 2331);·and d. (U) a magistrate wit~ authority in the district to issue. a warrant to install a tracking device. The warrant may authorize use of the device to track the movement of a person or property located'within the district, outside, or both. 2. (0) Physical searches related to a national security purpose may be authorized by the FISC. (50 U.S.C. §§1821-'1829) 202 UNCLASSIFIED.:FOR OFFICIAL USE ONLY b2 b7E UNCLASSIFIED - FOR OFFICIAL USE ONLY Domestic Investigations and Operations Guide D: (U) Property Or Persons That May be Seized wit~ a Warrant. (U) A warrant may be issued to search for and seize any: (i) property that constitutes evidence of the commission of a criminal offense; (ii) contraba!ld,lhe fruits of crime, or things otherwise criminally possessed; or (iii) property designed or intended for use or that is 9r has been used as the means of committing a criminal offense. In addition to a conventional search conducted following iss1.!ance ofa warrant, exampfes,ofsearch warrants'include: 1. (U) Anticipatory Warrants (U) As the name suggests, an anticipatory warrant differs from other search wammts in that it is not supported by probable cause to believe that contraband exists at the premises to be searched at the time the warrant is issued. Instea~, an anticipatory s~arch warrant is validly issued where t!Jere is probable cause to believe that a crime has been or is being committed, and that evidence 'of such crime will be found at the described location at the time of the search, but only after certain specified events transpire. These conditions precedent to the execution of an anti,?ipatory warrant, sometimes referred to as "triggering events," are integral to its validity. Because probable cause for an anticipatory warrant is contingent on the occurrence of certain expected or "triggering" events, typi~ally.Jh.e ft11Mredeliyery:, ~ale, orl'urcha~e 9f contrabag9, th~ judge making.the probable ~ause determination must take into 'account the likeirhood iliat the triggering event will occur on schedule and as predicted. Should these triggering ,events'fail to materia.lize, the anticipatory warrant is void. 2. (U) Sneak and peek search warrants (U) A sneak and peek search warr,ant allows law enforcement'agents to surreptitiously enter a location such as a building, an apartment, garage, storage shed, etc., for the purpose of looking for and documenting evidence of criminal activity. The purpose'of this type of warrant is to search for and seize property (either tangible or intangible) without immediately providing notice of tile search and a return on the warrant to the . owner of the property searched or seized. See FRCP 41(f)(3). A sneak and peek warrant !S used to gather additional evidence of criminal activity. without prematurely exposing an on-going investigation, The evidence discovered during a sneak and peek search may be used to support a request for a conventional search warrant. ' 3. (U) Mail Op,enings (U) Mail in United States postal cl)annels may be searched only pursuant to court order, or presidential authorization. Unit~d States Postal Service regulations governing such activities must be 'followed. A search of items that are being handled by individual courier~, or commercial courier companies, under circumstances in which there is a reasonable expectation of privacy, or have been sealed for deposit into postal channels, and that are discovered within properties or premises being searched, must be carried out according to unconsented FISA or PRCP Rule 41 physical search procedures. 4. (U) Compelled Disclosure ofthe'Contents ofStQred Wire or Electr~)Dic Communications a (U) Contents in "electronic storage" (e.g., unopened e-mail/voice mail) require search warrant. See 18 U.S.C. § 2703(a). A distinction is made between the contents of communications t~at are in electronic storage (e~g., unopened e-ma.i!) for less than 180 203 UNC~ASSIFIED-FOR OFFICIAL USE ONLY UNCLASSIFffiD - FOR OFFICIAL USE ONLY Domestic Investigations and Operations Guide days andthose in "electronic storage" for longer than 180 days, or those that are no longer in "electronic storage" (e.g:, open~d e-mail). In enacting the ECPA, Congress concluded that customers may not retain a "reasonable expectation of privacy" in information sent to network providers. However, the contents of an e-mail message that is unopened should nonetheless be protected by Fourth Amendment standards, similar to the contents ofa regularly mailed letter. On the other hand, if the contents ofan unopened message are kept beyond six months or stored on behalf of the customer after the'.e-mail has been' received or opehc;d, it should be treated the same as a business record in'the hands of a third party, such as an accountant or att0rtley. In that case, the government ll'!ay subpoena the records from the third party-without running afoul of eitherthe Fourth or fifth Amendment. If a search warrant is used, it may be served on the provider without notice to the customer or sl,lbscriber. . 11.13.4. (U) Approval Requirements fodnvestigative Met~od A. (U//FOUO) Search warrants issued under authority ofFRCP Rule 41: A warrant to search is issued by a federal magistrate (or a state court judge if a federal magistrate is not reasonably available). Coordination with the USAO or DOl is required to 9btain the warrant. B. -(U//FqUO)FISA: In national security investigations, Fi~ldOffi_ce r~911~~~ forHSA . _. authoriied.physical searches must be submitted to .FBIHQ using .the FBI FISA Request Form. Field Office requests for FISA approval are tracked through FISAMS. This form should be completed by the case agent. C. (U//FOUO) Sensitive Investigative Matter: Notice to the appropriate FBIHQ substantive Unit Chief and Section Chief is required if the matter under investigation is a sensitive investigative matter. Notice to DOJ is also required, as described in DIod Section 10. 11.13.5. (U)'Duration of APproval (U) T~e (juration for the execution of a warrant is established, by the ,court order or warrant. 11.13.6. (U) Specific Procedures A. (U) Obtaining a Warrant under FRCP Rule 41 (U) Probable Cause. After receiving an affidavit or other information, a magistrate judge or ajqdge of a state court of record must-issue the warrant if there is probable cause to search for a~d seize a person or property under FRCP Rule 41(c). Probable cause exists where "the facts ahd circumstances within the FBI employee'~ knowledge, and which they had reasonably trustworthy information are sufficient in themselves to warrant a person of reasonable caution in the belief that..." a crime ~as been ods being committed,and ~hat seizable property can be found at the place qr on the person to be searched; Probable cause is a reason~ble beliefgrounded on facts: In judging whether a reasortabJe belief exists, the test is whether.such a belief would be engendered-in a prudent person with the officer'nraining and ,experience. To establish probable c~use, the affiant must demonstrate a basis for knowledge and beliefthat-the facts are true and thatthere is probable cause to believe the items listed in th~ affidavit will be found at the, place to be searched. of 1. (U) Requesting a Warrant in t~e Pre.sence of a Judge. a. (U) Warrant on an Affidavit: When a federal law enforcement officer or an attorney for the government presents an affidavit in support ofa warrant, the 204 UNCLASS~FIED-FOR OFFICIAL USE ONLY UNCLASSIFIED - FOR OFFICIAL USE ONLY I)omestic Investigations and Operations Guide judge may require the affiant to appear personally and may examine under oath the affiant and any witness the affiant produces. b. (U) Warrant on Sworn Testimony: The judge may wholly or partially dispense witl:i a written affidavit and base a warrant on sworn testimony if doing so is reasonable under the circumstances. c. CU) Recording Testimony; Testimony taken in support'of a warrant must be , recorded by a co.urt reporter or by a ~uitable recording device,and the judge must file the transcript or recording with the clerk, along with any affidavit. 0 2.. CU) Requesting a Warrant by Telephonic or Other Meansa. (U) In General: A magistrate judge may issue a warrant baseg on information communicated by telephon~ or other appropriate means, including facsimile transmission. b. (U) Recording Testimony: Upon-learning that an applicant is requesting a warrant, a magistrate judge must: (i) place underoath the applicant and any person on whose testimony the application is based; and (ii) make a verbati'm record of the conversation with a suitable recoroing device, if available, or by a couftrepoIter,or'inwriting. c. (U) Certifying Testimony: The magistrate judge must have-any recording or court reporter's notes transcribed, certify the transcription's accuracy, alld file a copy of the record and the transcription with the clerk. Any written verbatim recor4 must be signed by the magistrate judge and filed with t~e clerk. d. (U) Suppression Limited: Absent a finding of bad faith, evidence obtained from a warrant issued under FRCP Rule 41 (d)(3)(A) is not subject to suppression on the ground that issuing the warrant in that manner was unreasonable under the circumstances. 3. (U).Issuing the Warrant -(U) In general, th~ magistrate judge or a judge of a state court of record must issue the warrant to an officer authorized to execu'te it. The warrant must identifythe person or property to be searched, identify any person or property to qe seized, and designate the magistrate judge to whom it must be returned. The warrant must command the officer to:(i) execute the warrant within a specjfied time no longer than 10 days;'(ii) execute the warrant during the daytime, uniess the judge for good cause expressly authorizes execution at another time; and (iii) re~m the warrant to the magistrate judge designated in the warrant. 4. (U) Warrant by Telephonic or Oth,er Means (U) If a magistrate judge decides to proceeq under FRCP Rule 4 I (d)(3)(A), the following additional procedures apply: a. (0} Preparing a Proposed Duplicate Original Warrant: The applicant must prepare a "proposed duplicate original warrant" and must read or otherwise transmit thecontents,of that document verbatim to the magistrate judge. 205 UN:CLASSIFIED-FOR OFFICIAL USE ONLY UNCLASSIFIED - FOR OFFICIAL USE ONLY Domestic Investigations and Operations Guide b. (D) 'Preparing an Original Warrant: The magistrate judge must enter the contents of the proposed duplicate original warrant into an original warrant. c. (U) Modifications: The· magistrate judge may direct the applicant to modify the proposed duplicate original warrant. In that case, the judge must also modify the original warrant. d. (U) Signing the Original Warrant and the Duplicate Original Warrant: Upon determining to issue the warr~nt, the m~gistrate judge must immediately sign the original warrant, enter on its face the exact time it is issued, and direct the applicant to'sign the judge's name on the duplicate original warrant. 5. (U) Executing and Returning the Warrant a. (U)Noting the Time: The officer executing tl)e warrant must enter on its face the exact date and time it is executed. b. (D) Inve~tory: An officer present during the execu~ion of the warrant must ,prepare and .verify an inventory of any property seized. The officer must do so in the presence.of another officet.and,the,petson from whom,-or from whose premises, the property was taken. If either one is not present, the officer must prepare and verify the inyentory in the presence of at least one other credible person. c. (D) ReceIpt; The officer executing the warrant must: (i) give a copy ofthe warrant and a receipt for the.property ~ken to the person from whom, or from whose premises, the property was taken; or (ii) leave a copy of the warrant and receipt at the place where.the officer took the property. Q. (D) Return: The officer executing the warrant must promptly return it - together With a copy ofthe inventory - to the magistrll~e judge designated on the warrant. The judge must, on request, give a copy the inventory to the person from whom, or from whose premises, the property was.taken and to the applicant for the warrant. of 6. (U) Fonvarding Papers to the Clerk . (0) The magistrate judge to whom the warrant is returned must attach to the warrant a c,opy ofthe return, the inventory, and all other related papers and must deliver them to the clerk in the district where the property was seized. (FRCP Rule 41) 7. (0) Warrant for a Tracking Device a. (0) Noting the time: The officer executing a tracking device warrant must enter on it the exact date and time the device was .installed and the period during which it was used. b. (D) Return: Within 10 calendar days after the use of the tracking device has ended, the officer executing the warrant inust return it to the judge designated in the warrant. c, (D) Service: Within 10 calendar days after use of the tracking device has ended, the.officer executing the warrant mustserve a copy ,of the warrant on the person who was tracked. 'Service may be accomplished by delivering a copy to the person 206 UNC.I.ASSTlfTlf.n_..l?oJ) {\ll'l<'Trr AT TT~F Ol\,TT v UNCLASSIFIED - FOR OFFICIAL USE ONLY Domestic Investigations arid Operations Guide who, or whose property was tracked; or by leaving a copy at the person's residence or usual place of abode with an individual of suitable age and discretion whp resides at that location and by mailing a copy to the person's last known address. Upon request of the ,government, the judge may delay notice as provided in FRCP Rule 41 (f)(3). 8. (U) I)elayed Notice (U) Upcm,the government's request, a magistratejudge-or if autho~ized.byFRCP Rule. 41 (b), a judge of a state court of record-may d~lay any notice required by FRep Rule 41 if the delay is authorized by statute. B.. (U) Obtaining a FISA Warrant (D) Applications for court-authorized physical ~earchpursuant to FISA must be made by a federal officer in writing upon oath or affirmation and with the specific approval of the Attorney General. (See 50 U.S.C. § 1823) Each application must include: 1. (D) Theidentity of-the federal'officer making the application; 2. (D) The authority conferred on the Attorney General by the President and the apprqval of the Attorney General to make the applicatiqri; 3. (U) The identity, if known, or description of the target of the physical search and a detailed ~escription pf the premises .or property to be searched· and o~ the information, material, or property tO'be seized, reproduced, or altered; 4. (U) A statement of the facts and'circumstances relied upon and submitted by the applicant that there is probable cause to believe that: a. (U) The target is a foreign power or an agent of a foreign power, provided that no United States person may be considered a foreign power or an agent of a foreign power solely on the basis of activities 'protected by the First Amendment to the Constitution of the United States; aQd b; (U) Each of the facilities or places at which theFISA order is,directed ~s being used by a foreign power or an agent of a foreign power. 5. (U) "In determining whether or not probable cause exists for purposes of an order under ;;0 l).S.C. § 1823(a)(3), a judge may consid~r past activities,of. the·target, as well as factS and circumstances relating to current or future activities of the target." 50 U.S.C. S1805(b). As it relates to United States citizens or. aliens lawfully admitte~ for permanent residence, "agent of a foreign power" means any person who: a. (U) Knowingly engages in clandestine, intelligence-gathering activities for or on behalf of a foreign power, whose activitiesinv:olve or may involve a violation of the'criminal statutes of the United States; . b. (U) Pursuant to the direction of an intelligence service or network of a foreign power, knowingly engages in any other clandestine intelligence activities for or on behalf of such foreign power, whose activities involve or are about to involve a violation oftl1e criminal statutes of the United States; 207 UNCLASSIFIED-FOR OFFICIAL USE ONLY UNCLASSIFIED - FOR OFFICIAL USE ONLY Domestic Investigations and Operations Guide c. (D) Knowingly engages in sabotage OJ; international terrorism, or activities that are·in preparation therefore, for or on behalf of a foreign power; d. (D)'Knowit'1gly enters the United States under a false or fraudulent identity for or on behalf of a foreign power or, while in the United States, knowingly assumes a false or fraudulent identity for or on behalf of a foreign power; or e.. (U) Knowingly aids or abets,any person in the conduct of activities' described in , subparagraph"'a,' 'b,' or 'c,' above or knowingly conspires with any person to engage in activities described in subparagraph 'a,' 'b,' or 'c:' above. 50 U.S:C. § 1801(Q) (2). (D) For purposes of the above statute, 50 U.S.C. § 1801(a)(l) defines "foreign power" to include "a group engaged in international terrorism or activities in' preparation therefore," 50 U.S.C. § '1801(a) (4), as well as, among.otp,er things, "a foreign government or any component thereof, whether or not recognized by the United States." Title 50 ofthe United States Code S,ectio'n 1801(c) defines "int~rnational terrorism" a$ a'ctivities that: (a) (U) Involve·violent acts or acts dangerous to human life thatare a violation of the crimiiiallaws ofthe.United.Statesor'ofanyState,Qr tl1at would. be a criminal violation if committed within the jurisdiCtion of the Urtited States or' any State; (b) (U) Appear to be intended(1) (U) To'intiniidatyor coerce a ciyilian population; (2) (U) To influence the polic:y of a government by intimidation or coer.cion; or (3), (U)To affect thy conduct of a government by assassination or kidnapping; aild (c) (D) Occur totally outside the U,nited States, or transcend national'poundaries inteims of.the means by which they are accomplished, the'persons they appear intendt:d to coerce or intimidate, or the locale in: which their perpetrators operate or seek asylum by the applicant to justify the belief that: (i) the target ~s a foreign power or agent of a foreign pow~r; (ii) the premises or property to be,se~rched contains foreign int~Jligence information; and (iii) the premises' or property t9 be searched is owned, useq, possessed by, or is' in trapsit to or from a foreign. power or·an agent of a foreign,power. 6. (D) A st~tement of the proposed minilllization procedures that have been approved by the Attorney General; 7. (D) A detailed descriptioIJ, 9f the nature of the foreign intelligence informatiqn sought and ·the manner in which the physical search will be conducted; .8. (D) A Certification by.the Director of-the FBI or one of nine other individuals authorized by Congress or the President to provide such certifications that the information being _ sought is fOJ:"eign intelligence information; that a significant purpose ofthe search is to . obtain foreign. intelligence information; th~t such information cannot reasonablY'be 208· ·UNCLASSIFIED-FOR OFFICIAL USE ONLY UNCLASSIFIED - FOR OFFICIAL USE ONLY Domestic Investigations and Operations Guide obtained by normal investigative techniques; that the information sought is "foreign iQteUigence information" as defined by FISA; and'inCludes a statement explaining,the certifier's basis for the certification. (U) Note: Title 50 of the United States Code Section 1804 specifies the Assistant to the President for National Security Affairs; E.O. 12949, as amended speCifies the Director of the FBI, I?eputy Director of the FBI, the Director of National Intelligence, the Principal' , Deputy Director ofNational Intelligence, the Director of the Central'Intelligence;Agency, the Secretary of State, the Deputy Secretary of State, the Secretary of Defense, and the D~puty Secretary of Defense as appropriate officials to make certifications required by FISA. 9. (U) Where the physical search may involve the residence of a United States pers~:in, the Attorney General must state what investigative techniques have previously been used to obtain the foreign intelligence information concerned and the'degree to which thl?se techniques resulted in acquiring such information; . i o. (U) A statement ofthe facts <;oncerning all previous applications before the FISA court that have been madejnvoLvinganyoftlte.pc;:r~gns, premises, or property specified in the application and the actions taken on each previous application; 11.(U) The Attorney General may require any other affidavit or certification from any other officer in connection with an application; and 12. (U) The Court may require the applicant to furnish such other information as may'be necessary to make the detenninations required to issue an Order. C. (U) Length of Period of Authorization for FI~C Orders 1. (U) Generally, a,FISC Order approving,an'unconsented physical search will specify the period of time during which physical searches are approved and provide that the ,government will be permitted' the pel,'iod of time necessary to achieve the purpose, or for 90 days, whichever is less, except that authority may be: a. (U) For no more than' one year for "Foreign Power" targets (establishments); or b. (U) For no more than 120 days for an agent of a foreign power, with renewals for !lp'to one year for non-United States persons. 2. (U) An extension of physical sear~h authority may be granted on the same 'basis as the original order upon a separate application for an ~xtensioil and upon new findings made in ~he same manner as the original order. 3. (U) Emergency FISA Authority a. (U) The Attorney General may authorize an emergency physical search under FISA when he reasonably makes a determination that'an emergency situation exists that precludes advance FISA court review and approval, and there exists a factual predication for the issuance of a FISA Court Order. In such instances, a FISC judge must be informed by the Attorney General or his designee at the time of the authorization and an application according to FISA requir~ments is submitted to the judge as soon as is practicable but not more than seven (7) days after the emergency authority has been approved by the Attorney General. 209 UNCLASSiFIED-FOR OFFICIAL USE ONLY UNCLASSIFIED - FOR OFFICIAL USE ONLY Domes~c.Investigationsand Operations Guide b. (D) If a court order is denied after an emergency authorization has been initiated, no infonmitio!l gathered as a result of the search may be used in any manner except if with the approval of the Attorney General, the information indicates a tht:eat of death or serious· bodily harm to any persoI). c. (U/IPOUO) For an einer ene h sical search. b2 b7E' 4. ({j) Special.Circumstances (U) The President through the Attorney General may also authorize a physical search under FISA without a court order for periods of up to one year, .jfthe Attorney General certifies that the search will be solely directed at premises, information, material, or property that is used exclusively by or under the open and exclusive control of a foreign power; there is no substantial likelihood that the physical search w.ill involve the. premises, information, material, or property of a United States person; and there are minimjzation procedures that have.been reported to the court ahd Congress. The FBI'~ involvement in such approvals is usually in furtherance of activities pursued according to E.O. 12333. Copies of such certification~~re t()bt:: tr<!I}sIjlittcd t(? tl!e FISA Court (see 50 U.S.C. § 1822[aJ). . (U) Information concerning United States persons acquired through unconsented physical searches may o.nly be used according to minimiza~ion procedures. See: 50 U.S.C. . §§ 1824(d)(4) and 1825(a). 5. (D) Required Notice (U) If an authorized search involves the premises of a United States.person, and the Attorney General determines that there is no national security interest in continuing the secrecy. of the sel;lrch, the AttoI1ley General mu~i provide notice to the United States person that the premises was searched and the identification o'f any property seized, altered; or reprod~ced during the search. . 6. (U/IFOUO)'FI~A Verification of Accuracy Proc~dures '1 (UlIPOUOJ b2 b7E a. CD/IPOUO) Each case file for 'Yhic~ an application'is prepared for' submission to the FISC will incluge a sub-fileito be labeled ']This sub-file' is to contain copies of the supportive documentation relied upon when making the ~tions to the! [ L..........Jfile is to incluqe: . . I b2 b7E ,I i. 2 I(UIIFOUOj b2 b7E . ii. (UlIFOUO)I~ '/ 210 UNCLASSIFIED-FOR OFFICIAL USE ONLY I. b2 b7E UNCLASSIFIED - FOR OFFICIAL USE ONLY Domestic Investigations and Operations Guide iii. (U//FOUQ)J b2 b7E b2 b7E 7. CU//FOOO) FISA Physical Search Administrativ~Sub-file CUI/FOUO) Each'case file for which an application is. or has been prepared for I submission to the:FI ill include a sub-file to be labeledlL.,.-,:":""""_·",,,:,,:,,,"~_-:--_ .. This sub-file is to contain copies of all application~ to and 'or ers issued by the FISC for the conduct of physical searches in the investigative case. . .: I::::~:; 1. ... m ••• . ••• • .~.~~E ~~E .~ 8. CUI/FOUO) FISA Review Board for FISA Renewals (U//FOUO~ b2 b7E I b? b7E a. (UlIFOUOl b2 b7E b. (UitFOUO)1 b2 b7E c. (UI/FOUO~ I b2 b7E . 211 UNCLASSIFIED-FOR OFFICIAL USE ONLY UNCLASSIFIED - FOR OFFICIAL USE ONLY Domestic Investigations and Operations Guide b2 b7E d. (UlIFOUO) Annealinl! the Decision ~f.th., .... . Rno~<f.r I b2 b7E (UlIFOUO] . I r- b2 b7E .' 212 UNCLASSIFIED-FOR OFFICIAL USE ONLY UNCLASSIFIED - FOR OFFICIAL USE ONLY Domestic Investigations and Operations Guide 11.14. (U) Investigative Method: Acquisition offoreign intelligence information in conformity with Title VII of t)le Foreign lrihilligcnce Surveillance Act 11.14.10 (U) Summary (U) Titles I and lII'oftheFISA (codified as 50 U.S~C. §§ 1801, et seq.) provide the standard, .traditional methods'of collection against agents of foreign powers (including United Stites an~ noil-United States persons) and foreign power establishments inside the United States. Title VII ofFISA, "Additional Procedures·Regarding Certain Persons Outside the United States," provides means for collections ofindividuals outside th.e United States. 11.14.2. (U) Legal Authority (U) FISA Amendments Act of 2008 (122 Stat 2436) . (U) AGG-Dom, Part V.A.!3 11.14.3. (U) Definition oflnvestigativeMethod' (U) Title VILis·to be used for conducting.FISAs on certain persons located out~ide the United .. . . . . _. States '11.14.4. (U/IFOUO) Standards for Use and Approval Requireme~tsfor Investigative Method (DI/FOU 0) See requirements under DIOG Sections 1-1.I 2 and 11.13 and requirements specified above. 11.14.5. (U) puration of Approval (UlIFOUO) See requiremen~s under DIOG Sections 11.12 and 11.13 .11.14.6. (U/IFOUO) Spec.ifIc CollectioriProcedures for Title VII (U)Therelevant procedures (or collections) under Title VII are: A. (U) Section 702· "Procedures for Targeting Certain Persons Outside the United States Other than United Sta~es Persons" (UlIFOUO) Under Section 702, the Government has the authority to target non-United States , persons who are located outside the United States if the collection is effected with the assistance ofa United States provider and if the collection occurs inside the United States, This section does not require a traditional FISA request. Rather, under this section the Attorney General and the Director of National Intelligence are required to file yearly determinations (filed as "Certifications") with the FISC that authorize the targeting of persons reasonably believed to be located outside the United States to acquire foreign intelligence information. The Certific.~tions are accompanied by, in the case of the FBI, an affidavit signed by the FBI Director. In addition, the FBI is required to file "Targeting Procedures" designed to ensure that the acquisition is limited to persons reasonably believed to be 10cCited outside the Unitec.i States apd "to prevent the intention~l acq4isition of any communicatio~s.as to which the sender and all intended recipients are known at the time of tbe acquisition to locateciin the United States." Finally, the FBI is also required to follow minimization.procedures. be 213 UNCLASSIFIED':FOR OFFICIAL USE ONLY UNCLASSIFIED,.; FOR OFFICIAL USE ONLY Domestic Investigations and Operations Guide B. (U) Section 70~'· "Certain Acquisitions Inside the United States Targeting United States Persons Outside th~ United States" (UI/FOUO) Under Section 703, the Government has the authority to target United States persons who are located outside the United States ifthe collect"ion is effected with the assistance ofa United S~tes provider and if the collection occurs inside the United States. This section only authorizes ,electronic surveillance or the ,acquisition of stored electronic cominunfcations or stored electronic data that'requires a court ,order. Under this section, the FBI submit a FISA request and obtain a FISC order and secondary orders, as n~eded. The.process is the same as the curient FISA process. Refer to the FISA Unit's website for further information. This section allows for emergency authorization and the FBI's Standarci Minimization Procedures apply to the collection. Finally, under the statute, the surveillance must cease immediately if the target ent.ers the United States. If the FBI wishes to surveil the United States person while he or ~he is in the United States, the FBI must obtain a separate court order under Title I (electronic surveillance) andlor Title 1Il,(physical search) ofFISA in order to surveil that United States person while tp.e person is located in the 'United States. will C. (U),Section704.., "Other Acquisitions,TargetingUnited States Persons Outside the UJlit~d S~ates" (UI/FOUO) Under Section 704, the Government has the authority to target Uriited States persons who are located outside the United States ifthe collection occurs outside the United States (i.e., without the assistance of a United States' provider). The statute requires thatthe FISA court issue an order finding probable cause to \:>elieve that the United States person target is an agent of ~forelgn power and reasonably believed to be located outside the United States '\mdercircumstances in which th~ targeted United Stiltes person has a,reasonable expectation of-privacy and a warrant would be required if the acquisitiQn were con.ducted iii the United States for law enforcement p~rposes." Under this section; the FBI will submit a FISArequest and obtain a FISC order bu~ wi!! not obtain secondary orders. The'process for obtaining these orders kthe same as the currentFISA request process. Refer to the FJSA Unit's intranet website for further information. This section allo~s for emergency, authorization and the FBI's Standard Minimization Procedures apply to the collection. Finally, surveillance authorized under this section must cease if the United States person enters the, United States,but may be re-started if the person is again reasonably believed to be outside the United States during the, authorized period of surveilla.nce. However, if there is a need to surveil the target while the target is located inside the United States, a separate C9urt order must be obtained. (VI/FOUO) Generally, the FBI.requires the assistance of other ~SIC agencies to implement thi~ type of surveillance: Specific proce4l.ires for requesting that another USICagency implement the surveillance for the FBI, if necessary, are classified and·delineated in FBI Corporate Policy 121 N. D. (D) SectioJl 705 - "Joint Applications'and Concurrent Authorizations" (U/IFOUO) Section 705(a), "joint applications," allows for the FISC to, upon request ofthe FBI, authorize iljoint application for targeting a United States ,person under both Sections 703 and 704 (inside and'outsid~ the United States simultaneously). 214 UNCLASSIFIED-F()R OFFICIAL USE ONLY UNCLASSIFIED - FOR OFFICIAL USE ONLY . Domestic Investigations and Operation~ Guide (U//FOUO) Section 705(b), "concurrent authorizations," states that if an order has been obtained under Section 105 (electronic surveillance under Title I ofFISA) or 304 (physical search under Title III of FTSA), the Attorney General may authorize the targeting of a' United States'person while such person is reasonably believed,tobe located outside the United States. Th~ Attorney General has this authority under E.O. 12333 § 2.5. In other words, if a United States person target of a "regular" FISA travels outside the United'States during the authorized period of the surveillance, the Attorney General, under Section 705(b) ~d E.O. 12333 § 2.5, can concurrently authoriZe surveillance to continue while the person is overseas obvi~ting the need to obtain a separate order under Sections 703 or 704. To effectuate this authority, the, Attorney qeneral's "Approval page" on'all FBI United States person FISAs contains standard language authorizing surveillance abroad, if needed. (U//F.OU01 b2 b7E 215 UNCLASSIFIED-FOR OFFICIAL USE ONLY UNCLASSIFIED - FOR OFFICIAL USE ONLY Domestic Investi~ations and Operations Guide 12. (U) Assistance to Other Agencies 12.1. (U) Overview (V/IPOVO) Part II of the AGG-Dom authorizes the fBI to conduct invesJigations in order to detect or obtain infonnation about, and preve~t and protect against, federal crillJ.~s and tilf~ats to. the nationa\ security and to collect foreign intelligence. Part III of the AGG-Dom, Assistance to OtherAgencjes, authorizes the FBI to provide investigative assistance'to other federal, state, local or tribal, or foreign agencies'when the investigation has those same objectives or when the investigative assistance is legally authorized for other purposes. Accordingly, FBI employees may proviqe assistance even if it is not for one of the purposes identified as grounds for an FBI investigation or assessment, if providing the assistance is othe'rwise authorized by law. For example, investigative assistance is .legally authorized in certain contexts to state or local agencies in the investigation of crimes under state or local law, as provided in 28 V.S.C.. §§ 540":-felonious killing of state and local law enforcement officer; 540A-violent crime against ,travelers; 540B-serial killings, and,to foreign agencies in the investigation of foreign law v!olations pursuant to international agreements. The FBI may use appropriate Ill.wful methods in,any authorized illVestigative'assistanceactivity; 12.2. (U) Purpose and Scope (U) The AGG-Dom pennitS: FBI personnel to provide investigative assistance to: A. (U) Authorized intelligence activities of other USlC agencies; B. (U)Any federal agency in the investigation offedCral crimes, threats to the national security, foreign intelligence collection, or any other purpose that may be lawfuUy auth~rized; C. (U) Assist the President in determining whether to use the armed forces pursuant to 10 D.S.C. , §§ 331-33;when DOJ-authorized as described in Section 125:B.l.c, below; D. (U) Coilectinfonnation necessary to facilitate public demonstrations in order· to prote~t the exercise of First Amendment dghts and ensure public health and safety, when DOlauthorized and within the restrictions described in Section 12.5.B.1.d,' below; E. (D) State or local agencies in the investigation of crimes ul1der state or local law where authorized'by fedc:;rallaw (e.g., 28 U.S.C.§§ 540-felonious killing of state and local law enforcement officer; 540A-violent crime against travelers; 5'40B-serial killings); F. (U) State, local, or tribal agencies in the investigation of matters that may involve federal crimes or threats to national security, Of for such other purposes as may be legally authorized; and G. (D) Foreign agencies in the investigations of foreign law violations pursuant to international agreements, and as otherwise set forth below, consistent with'the interests of the United States (including national security interests) and with due consideration of the effect on any United States person. (V) The FBI is further authorized to provide technical and scientific assistance to all duly constituted law enforcement agencies, other .organizational units of the Department ofJustice, and other federal agencies. 28 C.F.R. § O.85(g). The FBI's authority and procedures for providi~g technical assistance is further set forth iIi Section 12.6 below. 216 UNCLASSIFIED-FOR OFFICIAL USE ONLY . UNCLASSIFIED - FOR OFFICIAL USE ONLY Domestic I~vestigations and Operations Guide ('0) Authorizeq investigative assistance,by the FBI to other ageQ.cies includes participation in joint operations and activities with such agencies. (AGG-Dom, Part lIl.E.\) The procedures for providing investigative assistance, together with the approval'and notification requirements, are provided below. 12.3. (U/IFOUO) Standards for Providing and Approving Investigative Assistance to Other Agencies (U/IPOUO) The determination of whether to provi~e FBI assistance to other agencies-is both statutory and discretionary and must be based on consideration of the following factors: A. (U/IPOUO) Assistance is within the scope authorized by the AGG-Dom; B. (U//fOUO) Assistance is not based solely on the exercise of First Amendment activities or on the race,-ethhicity, national origin or religion of the subject;.and C. (UI/FOUO) As~istance is an appropriate use of personnel and"financial resources. 12.4. . (U) Documentation, Record Retention and Dissemin~tion A. (U) Docum~~tati9n (UI/FOUO) When providing assistance to a domestiQ"or forclgn agency; the required doc!lmentation in an appropriate case file includes: (i) the name arid type of agency; (ii) the investigative methods used; (iii) the opening and closing dates of the reauest· anci (.iv) notifications required for the investigative activitv.! b2 b7E B.(U) Records Retenti9n"for Assistance Furnished to Another Agency (U/IFOUO) A dat~base of records created with thel' lis maintained to permit the prompt retrieval of the status of ~he assistance activity (opened or closed), the dates of opeJ.lihg and closing, and the basis for the assistance activity. (AGG-Dom, Part UI.E.3) b2 b7E C. (U) Dissemination of Information I (U/IPOUO) For unclassified information, thd . should be used to document the . dissemination of information to: (i). United States Intelligence Community Agencies; (ii) United States Federal Agencies; (iii) State, Local, or Tribal AgenCies; and (iv)Foreign Agencies. Dissemination to Foreign Agencies must be in accordancewith.the fBI Foreign Dissemin.ation Manual, dated"May 23, 2008. Classified information must be disseminated pursuant to applicable federal law, Presidential directive, Attorney General policy and FBI policy. " 12.5. (U) Duration, Approval and Notice for Investigative Assistance to Other Agencies (U/!I:0UO) Investigative assistance th~t may be furnished to other agencies is described below by agericy type. Dissemination of information to"other agencies must be consistent with Director 217 UNCLASSIFIED-FOR OFfICIAL USE ONLY b2 b7E UNCLASSIFIED -,FOR OFFICIAL USE ONLY Domestic Investigations and Operations Guide ofNational Intelligence directiv.es, the AGO-Dam, DrOG Section 14, FBI Poreign Dissemination Manual, and'any applicable MOUIMOA, law, treaty or other policy. (UIIFOVO) Sensitive Investigativ,e Matter: Any assistance to other agencies inyolving a sensitive investigative matter requires CDC review, SAC approval, and notification to the l1Ppropriate FBIHQ substantive Unit Chief and Section Chief. (If a~sistance is to a foreign agency, notification to the Office ofIntemational Operations (010) Unit Chief and Section Chief is also r.equired.) Additionally, FBIHQ must provide notice to the DOJ Criminal Division or NSD as soon as practicable, but not later than 30' calendar days after the initiation of anY' assistance involving a sensitive investigative matter (see classified appendix for additional notice requirements), A. (V) United States Intelligence Community Agencies 1. (V) Authority '(V(IPOVO) The FBI may provide investigative assistance (including operational support) to authqrized intelligence activities of other VSIC agencies. (AGG·Doril, Part lILA)· Investigative assistance must be in compliance with interagency memoranda of understanding/agreement, if applicable. For,example,ospeCific approval and notification requirements exist for CIA domestic activities. 2. (V) Approval CV/IFODO) Prior SSA approval is required for providing assistance to th~ USIC when the assistance uses investigative methods beyond those authorized in assessments. Assistance to other agencies using an investigative method authorized.only for predicated investigations requires supervisory approval at the same level required for the respective investigative method ifused in an FBI investigation. Specifically, higher supervisory approval and notification requirements may exist for conducting a joint operation (e.g., investigative operations with the Department of-Defense [DoD], Department of Homeland Security), a sensitive investigative Illatter, and using particular investigative methods as noted· in Sections 10 and 11, and the Division policy guides. Assistance for investigative methods beyond those authorized in assessments must be dQcumented in the FD-999. Approval for- use of specific technologies is set'forth in Section 12.6 below and theOTD Manual. B. (U) U~ited States Federal Agencies 1. (D) Authorities a. (UIIPOUO) The FBI may provide assistance to any other federal agency in the investigation of federal crimes or threats to the national 'security or in the coilection of positive foreign intelligence. (Pursuant to Section 9, collection of positive foreign intelligence requires prior approval from FBIHQ CMS.) The FBI may provide investigative assistance to any federal agency for any other purpose that may be legally autl1orized, including investigative assistan<:e !o the Secret Service in support of its protective responsibilities. (AGO-Dam, Part III.BJ) See mOG Section 12.6 below for guidance in providing technical assistance to federal agencies, 218 UNCLASSIFIED-FOR OFFICIAL ,USE-ONLY UNCLASSIFIED - FOR OFFICIAL USE ONLY Domestic Investigations and Operations Guide b. (UIIFOUO) The 'FBI' must follow MOUlMQA with other federal agencies where applicable. Specific approval and notification requirements exist for CIA and DoD . domestic' activities. c. (U) Actu~1 or Threatened Domestic Civil Disorders I. (U) At the direction of the Attorney,General, the Deputy Attorney General, or the Assistant Attorney General for the Criminal Division, the FBI shalPcoIlect information relating to actual or threatened civil disorders to assist theJ~resident in determining (pursuant to the authority of the President under 10 U.S:C. §§ 331-33) whether use of the arm~d forces or militia is required anc;! how a decision to commit troops should be implemented. The information sought shall concern such matters as: (AGG-pom, Part III:B.2) (a) (Q) The size of.the actual or threatened disorder, both in number of people involved or affected and in a geograp)Jic'area; , (b) UJ) The potential for violence; (c) (U) The P9tential for e~pansion ofthl? djsord~r in lighLef community condit1ons and underlying causes of the disorder; (d) (0) The relationship 9fthe actual or threatened disorder to the enforcement of federal law or court orders and the likelihood that state or local authorities will assistih,ehforcing those laws or orders; arid (e) (U) The extent of state or local resources available to handle the disorder. ii. (U) Civil disorder investigatiqns will be authorized only for a period of 30 days, but the authorization maybe renewed for subsequent 30 day periods. iii. (D) The onlY investigative methods that maybe used during a Civil disorder investigation are: (a) (U) Obtain publicly available information; (b) (0) Access and examine FBI and other DOJ records, and obtain information from any FBI or other DOJ personnel; (c) (U) Access and examine records maintained by, and request'information from, ,other federal, state,Jocal, pr.tribal, or foreign governmental entities'or agc;:ncies; (d) (0) Use online services, and resources ~whether nonprofit or commercial); (e) (0)Interview members of the public and private entities; and (UlIFOUO)Note: S,uch interviews may only be cQnducted if the FBI employee identifies himself or herself as an FBI employee and accurately discloses the purpose ofthe interview. (f) (D) Accept information voluntarily ,provided by governmental or private entities. 219 UNCLASsiFIED-FOR OFFICIAL US~ ONLY UNCLASSIFIED - FOR OFFICIAL USE .ONLY Domestic Investigations and Operations Guide (U) Other methods may be used only i(authori~ed by the Attorney G~neral, . the Deputy Attorney General, or the Assistant Attorney General for the Crim ina! Division. d. (U) Public Health and Safety Authorities in Relation to Demonstrations i. (U) At the dIrection of the Attorney GeneraL the-Deputy Attorney General, or the Assistant Attorney General for the Criminal Division, the FBI shall' collect information relating to demonstration activities.that are likely tp require the federal government to take actibnto facilitate the activities and provide public health and safety measures with respect to those activities. The information sought 'in such an investigation shall be that needed to facilitate an adequate federal response to ensure public health and safety and to protect t{1e exercise of First Amendment rights, such as: (a) (U) The time; plage,and type of activities planned. (b) (D) The number ofper~ons expecteq to participate. (c) (U)'The expected means and routes of travel for participants and expected thne Of arrival. (d) ,(U) Any plansforJodging or housing of partlclpants in connection with the demonstration. ii. (U) The only i~vestigative methods that may be used in an investigation,under this paragraph are: . (a) (U) Obtain: publicly available information; (b) (U)Access and 'examine FBI and other DOJ records, and.obtain information from any- FBI or other DOl personnel; (c) (U)Access and ex;amim.: records maintained by, and requ~st information from, other federal, state, local, or tribal, or foreign governmental entities or agenc.ies; (d) (U) Use online s~rvices and resources (whether nonprofit or yommercial); (e) (U) Interview of members of the public and private entities; and (UIIPOUO) Note: Such interviews m,ay only be conducted if.'the'FBI employee identifies himself or herself as an,FBI employee and· accurately diselo'ses the purpose of the interview. (f) (U) Aece~fiiliformation voluntarily provided by governmental or private . entities. > (U) Other methods may be used only if authorized by the Attorney General; the Deputy Attorney General, or the Assistant Attorney General for the Criminal Division. 2. (0) Approval . (UI/FODO) I'rior· SSA approval is required for assistance to another feqeral agency when the assistanct;: uses investigative m~thods beyond those authorized in assessments. 220 UNCLASSIFIED-FOR OFFICIAL USE ONLY UNCLASSIFIED - FOR: OFFICIAL USE ONLY Domestic Investigations and Operations Guide Assistan~e to other agencies using an investigative method authorized only for predicated investigations requires supervisory approval at the same level required for the respective investigative method if used in an FBI investigation, as provided in Section I I. . Specifically, higher supervisory approval and notification requirements may exist for conducting ajoint operatiop, a sensitive investigative matter, and using particular investigative methods, as noted in Sections 10 andU and in ~heOivision policy guides. Assistance for ,investigative methods beyond those authorized in assessments must be documented in the·FD-999. Approval for use of specific technologies is set forth in Section 12.6, below and the'OTD Manual. C. (U) State, Local, or Tribal Agencies I. (U) Authorities a. (U) The FBI may provide investigative assistance to state, local, or tribal agencies in the investigation of matters that may involve federal crimes or threats to the n.atiorial security, or for other legally authorized purposes. Legally authorized purposes include, but are not limited-to, a specific federal statutory grant of authority such as that provided by 28 U.S.C. §§ 540-felonious killing of state and local law enforcemel1t officer; 540A-violent crime against travelers; ~4013-seIilll killings~ (A9G-pom, PaffIlLC) The FBI is further authorized to provide other material, scientific and technical assistance to state, local, and tribal agencies. (See 28 C.F.R. § 0.85[g] and DIOG Section 12.6,.below.) b. (UIIFOUO) The' FBI rIu-!st follow applicable MOU/MOA andlor treaties when it provides assistance to state, local, and tribal agencies. c. (U(IFOUO) As a federal agency, the FBI's authority to investigate criminal offenses derives from federal statutes and is generally limited to violations offedera.llaw. See 18 U.S.C. § 3052, 28 U.S.C. § 533 (1) and 2~ C.F.R. § 0.85. With limited exceptions, such as those cited in Section 12.2.~., above, the F~I does not have any federal authority to investigate state crimes. FB1'empJoyees can assist in th.e investigation of other criminal matters with state and, local authorities only if there is a reasonable basis to believe that the investigation will prevent, detect or lead to evidence of II violation of federal law or a threat to the national.securitv J b2 b7E d. (UI/FOUO] IL_----"-------------~~~221 UNCLASSIFIED-FOR OFFICIAL USE ONLY b2 b7E. UNCLASSIFIED - FOR OFFICIAL USE ONLY Domestic Investigations and Operations Guide b2 b7E e. (UlIFOUO~ b2 b7E f. (Ui/FOUOj b2 pIE g (Ui/FOUOl b2 'b7E h. (U/IFOU01 b2 b7E ~ ~ It' - 0) Wh~n credible. information .is received by an FBI employee concerning serious criminal activity not within the FBI's investigative jurisdiction, the FBI employee must promptly transmit themformation or refer the complainant to a law enforcement agency having jurisdiction,. except when disclosure would jeopardize an ongoinginvestigation, endanger the saf~ty of an individual, disclose the identity of a human source, interfere with a human source's cooperation, or r~veallegally privileged information. Iffull-disclosure is not made for any ofthe reasons· indicated, then,.w~enever feasible, the FBI employee must make:: at least limited disclos'ure t9 a law enforcement agency or ageJlci~s having jurisdiction, andfuil disc10suremust be made as Soon as the need for restricting the information is nO'longer present. Where 222 UNCLASSIFIED~FOR OFFICIAL USE·ONLY --c----__ -- -- ~--~"""'!""""------"!""'------;-- UNCLASSIFIED - FOR OFFICIAL USE ONLY Domestic Investigations and Operations Guide disclosure is not made to the appropriate law enforcement agencies within 180 days, the FBI employee/Field Office must notifY the appropriate substantive Unit at FBI Headquarters in writing concerning the facts and circumstances concerning the criminal activity. FBI Headquarters is required to make periodic reports to the Deputy Attorney General on such non-disclosure and incomplete disclosures. (AGG-Darn, Part VLC.2) 2. (U) Approval . . (U//FODO) Prior SSA approval is required'for assistance to state, local, or trioal agencies when the assistance uses investigative methods beyond those authorized, in assessments. As~istance to other agencies usitlg an investigative method authorized only for predicated investigations requires supervisory approval at the same level required for the respective investigative method ifused in an FBI investigation. Specifically, higher supervisory approval and notification requirements may'exist for conducting ajoint operation, a 'sensitive investigative matter, and using particular investigative methods, as noted in Sections 10 and 11. and in the Division policy guides. Assistance for investigative methods beyond those authorized in asse~sments niust be documented in the FD-999. Approval for use of specific technologies is setforth in Section 12.6, below and the otE> Manual. 0; (0) Foreign Agencies The 1. (UI/FOUO) General: foundation'or'the FBI's international program is the Legat Each Legat is the Director's,personal representative in the foreign countries in which he/she resides or has regional responsibilities. The Legat's job is'to respond to the FBI's domestic and foreign· investigative needs. The Legat can accomplish this because he or she has' developed partnerships and' fostered cooperation with 'his·or her foreign counterparts on every level and is familiar with investigative rules, protocols, and practices that differ from country to country. This is the Legat's primary responsibility. A;; such, foreign agency requests.for assistance will likely come to the FBI through the Legat. If, however, foreign agency requests for assistance bypass the Legat, the: FBi employee mJ,lst notify the Legatand 010, as discussed in greater detail below. 2. (D) Authorities .a. (U//FOUO) At the request of foreign law enfor~ement, intelligerice, or security agencies, the FBI may conduct investigations or provide assistance to investigations by such agencies, consistent with the interests of the United States (including national security interests) and with due consideration of the effect on any United States person. (AGG-Dom, Part m.D.I) Th~ FBI must follow applicable MOUs, MOAs; Mutual L~gal Assistance Treaties (MLAT) and other treaties when it provides assistance to foreign governments. I. . CUI/FOUOl b2 b7E 223 UNCLASSIFIED-FOR OFFICIAL USE ONLY UNCLASSIFIED - FOR OFFICIAL USE ONLY Domestic Investigations and Operations Guide ~ ii. - .cUl/FOUO~ -I b. (UlIFOUO)r b2 b7E I b2 b7E , c. (U/IFOUO) The FBI may not provide assistance to foreign law enforcement; intelligence, or security officers conducting investigations within the United States unless such officers have provided prior written notification to the Attorney General of their status as an agent of a foreign government"as required by 18 U.S.C. §951. (AGG-Dom, Part III.D.2) The lJotific'ation required by 18l].S.C.' § 951 is not applicable to diplomats, consular officers or, attaches. d. (UlIFOUO) Upon the request ofa foreign government agency, the FBI may conduct backgrQund ,inCj\liries cOI'lc~rnilJg i.ndivich.lal§-whose con~en1 is. c!Q~um.eIlte~.(AGQborn, Part in.D.3) ~, e. (UlIFOUO) The AGG-Dom, Part III.D.4 authorizes the FBI to provide other material and technical assistance to foreign governments to the extent not otherwise prohibited by law. AG Order 2954-2008 authorizes the FBI to provide technical assistance to foreign governments, as referenced below in Section 12.6. 3. (U) Approval . a. (UI/FOUO) Prior SSA approval is required for all assistance'to foreign agencies. All assistance must be docuIllented in the FD-999 and that approval should be documented in the file b (UlIFOUOJ b2 b7E c.' (UlIFOUOJ b2 b7E d. (Ui/FOUQl b2 b7E b2 b7E 224 UNCLASSIFIED':FOR OFFICIAL USE ONLY UNCLASSIFIEJ) - FOR OFFICIAL USE ONLY Domestic Investigations and Operations Guide b2 b7E ii. (UIIFOUO] I 4. (U) Notice a. (UlIFOUO)f b2 b7E b.' (0) The FBI must notify"the DOJ NSD concerning investigation or assistance where both: (i) FBIHQs approval for the activity is required (e.g., FBIHQ approval required to use a particular investigative. method); and (ii) the activity 'relates to a threat to the United States national security. T~e FBIHQ Division ,approving the use of the investigative-method must notifY DOJ NSD as soon as practicable, but no later than 30 calendar days after FBIHQ approval (see classified appendix f o r i . .~ (AGG-Dom, Part III.D.l) . 5. (U) Dissemination I I .' b2 b7E (UlIFOUO) All dissemination ofFBI infonnation.to foreign agencies must be conducted according to the FBI Foreign Dissemination Manual; dated May 23, 2008 12.6. (UlIFOUO) Standards for Provi.ding and .Approving Technical Assistance to Foreign, State, Local and Tribal Agencies A. (U) Authority '1. (UlIFOUO)r b2 b7E 225 UNCLASSIFIED-FOR OFFICIAL 'USE ONJ;.Y b2 b7E b2 b7E e... (UiIFOU01 I. f. (U/IFouoj ,I, b~ . I g. W//FOUOf I b7E b2 b7~ I 02 b7E 2. (U//FOUOj b2 -b7E b2 b7E B. (U) Approval (UI/FOUO) All technical assistance must be approved by.the Director or his designated senior executive FBI official,as provided in the OTD manual. Ali technical assistance must ,be documented in an FBI assessment file, predicated investigation me, a domestic poJi~e' cooperation file, a foreign police cooperation file, or oth~r investigative/technical assistance <;ontrol,fiIe, Additionally, all.technical assistance must be documented.in the·FD-999 or its successor. 226 UNCLASSIFIED-FOR OFFICIAL. USE ONLY UNCLASSIFIED - FOR OFFICIAL USE ONLY Domestic Investigations and Operations Guide 13. (D) Extraterr.itori31 Provisions 13.1. (U) Overview (UlIF0UO) The,F~I may conduct investigations abroad, participate, with foreign officials in investigations abroad"or otherwise conduct activities outside the United States. The guidelines for conducting investigative activities outside of the United States are currently contained in: (i) The Attorney General's Guidelinesfor Extraterritorial FBI Operations and Criminal Investigations; (ii) The Attorney General's Guidelinesfor FBI National Security Investigations and Foreign Intelligence Collection; and (iii) The Attorney General Guidelines on the Development and Operation ofFBI Criminal1nformants and Cooperative Witnesses in Extraterritorial Jurisdictions (collectively, the E~traterritorial Guidelines). The Attorney General's Guidelinesfor Extraterritorial FBI Operations are curre~tly being drafted, as discussed in mOG Section 1, and will supercede, the above listed guidelines, or applicable provi~ions thereof. . z: 13.2. (U) Purpose and Scope (UlIFOUO) As a general rule, the Extraterritorial Guidelines apply when FBI personnel or confi~ential hlupan sources are active! . en a edin investi .alive activioutside theborde'rs Of ,tlie'United States. " b2 b7E A. (UlIFOUOI B. I I I . ..I' (u/iFouo1 'c. (u/lF,ouoj b2 b7E b2 b7E b2 b7'E I b2 b7E D. (UI/FOUO) b2 b7E E. (UI/FOUO) b2 q7E F. (U//FOUO G. V//FOU b2 b7E H. b2 b7E b2 b7E b2 b7E 227 UNCLASSIFIED-FOR OFFICIAL USE ONLY UNCLASSIFIED -~ FOR OFFICIAL USE ONLY Domestic Investigations and Operations Guide (UIIFOUO) FBI personnel planning to engage in any of the investigative activities eJescribed in th~ subsection above must obtain the conclirrence of the appropriate Legat and must comply with the remaining procedural requirement of the Extraterritorial. Guidelines. For additional information consult the Extraterritorial Section ofthe Odc website. 13.3. (U) Legal Attl;lche·Program (U/lFOUO)The foupdation of the FBI's international program f~ the-Legat. Each Legat is the Director's personal representative in the foreign countries in which htl/she resides or has regional responsibilities. The Legat's job is to respond to the FBI's domestic and extraterritorial investigative IJeeds. Legats can accomplish this mission qecause they· have developed partnerships and fostered cooperation "{ith their foreign counterparts on every level and are familiar with.local investigative rules, protocols, and practices which differ from country to country. For additional information consult the FBIHQ 010 website. 228 UNC.I .A'.~~Jli'Jli'n_J!'i\D OUPT""T~ T n "..... ~.;..- _. UNCLASSIFIED - FOR OFFICIAL USE ONLY Domestic Investigations and Operations Guide 14. (U) Retention and Sharing of Information 14.1. (U) Purpose and SC(We (UIIFOUO) Every FBI component is responsible for the creation and maintenance of authentic, reliable, and trustworthy records. Without complete and accessible records,.the FBI cannot -conciuct investigations, gathe~ and analyze intelligence, assist with the prosecution of criminals, . or-perform any of its critical missions effectively., (UIIFOUO) The FBI is committed to ensuring that its records managemeht program accomplishes the following goals: A. (UlIFOUO) Facilitates the documentation of official decisions, policies, activ'ities, and transactions; B. (UIIFOUO) Facilitates the timely retrieval. of needed information; C. (UIIFOUO) Ensures continuity of FBI business; D. (UlIF0UO) Controls the creation and growth of FBI records; E. (UlIFOUO) Reduces operating costs by managing records and by disposing of unneeded records in a timely manner; acco~ding to FBI business needs F. (UIIFOUO) Improves efficiency·and productivity through effective records storage and retrieval methods; " with applicable laws and regulations; G. (UIIFOUO) Ensures compliance H. (UIIFOUO) Safeguards the FBI's mission-critical information; 1. (UlIFOUO) Preserves the FBI's corporate memory and history; and . J. (UliFOUO) Implements records management technologies to support all of the goals listed above. 14.2. (U) The FBI's Recor.ds RetentiQn Plan, and Document;ltion (UlIFOUO) The FBI must retainxe~ords relliting to inves.tigative activities according to a records retention plan approved by the NARA. (AGG-Dom, Part V1.A.I) (UIIFOUO) The FBI's disposition authorities provide speciJic instructions about the length of time that records must be maintained. In some instances, records may be destroyed'after a prescribed period of time has elapsed. Other records are neve~ destroyed and are transferred to NARA a certain numb~r of years after a: case was closed. . A. (UlIFOUO) The FBI must m~intain a database or records system that permits, with respect to each predicated inve,st!gation; the prompt retrieval of the status of the investigation (open or closed), the dates of opening and closing, and the basis for the. investigation. (AGG-Dom, Part VI.A.2) . . (UIIFOUO) 'The FBI has updated its official File Classifica~ion System to cover records related to all investigative and intelligence collection'activities, including assessments. Records are maintained in the FBI's Central Records System or other designated systems of records, that provide the required maintenance and retrieval func~ionality. 229 UNCI,.ASSIFIED-fOR OFFICIAL USE-ON~y UNCLASSIFIED - FOR OFFICIAL USE ONLY Domestic Investigations and Operations Guide B. (U/IFOUO) Assessments m!lst also adhere to the standards as set forth in the Records Management Division Disposition Plan and Retention Plan. All records, including assessments, may be destroyed or expunged earlier than the destruction schedule through proper authority. (U//FOUO) All Bureau records are maintained for their full retention periods, except under certain circumstances under which they maybe either destroyed earlier or retained.longer. Reco~ds may be retalned for a longer period than their disposition authority specifjes,.ifthey are subject to a litigation freeze. Court orders may direct that certain records be eXRunged from a case file, or (more rarely) that the entire case file be expunged. Underc.ertain circumstances, individuals may. also request that certain records be expunged. Expungement of records may mean the physical removal and destruction of some or all of the record or, depending on the court order and the governingstatute or program, it may mean the removal, sealing; and secure storage of records away from the remaining file. In most instances, only certain documents, not the entire file, are subject to expungement. 14.3. (U) Information Sharing CUI/FOUO) The FBI 2008 National Information Sharing Strategy (NISS) provide~~he common vision, goals, and framework needed t6 gtiiOe iilformation-shli'ring. initiatives with our federal, state, local, and tribal agency partners; foreign government counterparts, and private sector stakeholders. The FBI NlSS addresses the cultural and technological changes required to move the FBI to "a responsibility to provide" culture. This will be accomplished by using the best practices and technology §'tandards of both communities as we support the intelligence and law enforcement communith;s in collection, dis~eminatiqn, analysis, coUaboration;and operational efforts. A. CV) Permissive Sharing CU//FODO) Consistent with the Privacy Act and any other applicable laws and memoranda of understanding or agreement with other·agenciesconcerning the dissemination of infonnation, the FBI may disseminate information obtained or produced through activities . under the AGG-Dom: l. (UI/FOUO) Within the FBI and to all other components of the Department of Justice if the recipients have need of the infonnation in the perfonnance of their official·duties. 2. (U/IFOUO) To other federal agencies if disclosure is compatible with the purpose for which the infonnation was collected and it is related to their re~ponsibilities. lp relation to other USIC agencies, the determination whether the information is related to the recipient responsibilities may be left to the recipient. 3. (UI/FOUO) To state, local, or Indian tribal agencies directly engaged in the criminal justice process where access is directly related to a law enforcement function of the recipient agency. 4. (UlIFOUO) To congressional committees as authorized by the DOl Office of Legislative Affairs. 5. (U//FOUO) To foreign agencies ifthe FBI detennines that the information is related to their responsibilities; the dissemination is consistent with the interests of the United 230 UNCLASSIFIED-FOR OFFICIAL 'USE ONLY UNCLASSIFIED - FOR OFFICIAL USE ONLY Domestic Investigations and Operations Guide States (including national security interests); arid where the purpose of the disclosure is compatible with the purpose for which the information was collected. 6. (U/IFOUO) If the information is publicly available, does not identify United States persons, or is disseminated with the consent ofthe person whom it concerns. 7. (U/IFODO) I[the disseminatioQ is necessary to protect.the safety or security of persons or property, to protect against or prevent a crime or ~mminent threat to the national ~ecurlty, or to bbtain information for the conduct,of an authorized FBI investigation. 8..(U/IFOUO) If dissemination' of the information is otherWise permitted by the Privacy Act (5 U.S.C.§ 552a) (AGG-Dom, Part VIRl) (U/IFOUO) All FBIinformation sharing activities under this sect~on shall be.acc~rding to Corporate Policy Directive 120, "FBI Sharing Activities with Other Government Agencies," 95D "Protecting Privacy in.the Information Sharing Envirqnment," and any amendments thereto and applicable succeeding policy directiyes. B. (U) Required Sharing (VI/FOUO) The FBI must share and disseminate information as required by statutes, treaties, Executive Orders,.P,resid~nti3.1 9irectives;J\~;itionaI Security CQuncil directives, Hpmeland Security Counc1J directives, ONI directives, Attorney General-approved pOlicies, and MOUs or MOAs; as cortsistent with the Privacy Act. 14.4. (D) Information Related to Criminal Matters A. (U) c'Qordinating with Prosecutors (UI/FOUO) In aQ investigation relating to possible criminal activity in violation offederal law, the FBI employee conducting the investigation must maintain periodic writtep. or oral contact with the appropriate federal prosecutor, ~s circumstances warrant and as requested by the prosecutor. When, during such an investigatiqn, a matter appears arguably to warrant prosecution, the FBI employee ,must present the relevant facts to the appropriate feder~l prosecutor. Informat,ion on investigations that have been closed must be available on request to a United States Attorney or his or her. designee or an appropriate Department of JJ.1stice official. (AOG-Dom, Part VI.C) .B. (U) Criminal Mat~ers O~tside FBI Jurisdiction (U//FOUO) When credible information is received by an FBI employeeconceming serious criminal activity not within the FBI's investigative jtJrisdiction; the FBI employee must promptly transPlit the information or refer the complainant to a·law enforcement agency having jurisdiction, except where disclosure W9uld jeopardize an oqgoing .investigation, ,endanger the safety Of an individual, disclose the identity of a CHS, interfere with the cooperation of a CHS, or reveal legally privileged information. If full disclosure is not made for the reasons indicated, then, whenever feasible, the FBI employee must make at least limited disclosure to a law enforcement agency or agenci~s having jurisdiction, and full disclosure must be made as soon as the need for restricting disclosure is no longer present. Where full disclosure is not made to the appropriate law enforcement agencies within 180 days, the FBI employee/Field Office must promptly notify-FBIHQ in 'writing of the facts and circumstances concerning the criminal activity. The FBI must make periodic reports.to the 231 UNCLASSIFIED-FOR OFFICIAL USE ONLY UNCLASSIFIED - FOR OFFICIAL USE ONLY Domestic Investigations and Operations Guide Deputy Attorney General on such non-disclosures and incomplete disclosures, in a form suitable to protect the identity of a CHS. (AGG-Dom, Part VI.C) C. (U) Reporting of Criminal Activity (UifFOUO) When it appears that an FBI employee has engaged in criminal activity in the course of an investigation under ~he AGG-Dom, the PBI must notify the USAOor an appropriate DOl Division. When it.appears that a CHS has engaged in criminal activity in the course of an investigation under the AGG-Dom, the FBI must.proceed as provided in the AGG-CHS. When information concerning possible criminal activity by any other person appears in the course of an investigation under the AGG-Dom, the FBI must initiate an investigation ofthe criminal activity if warranted. (AGG-Dom, Pari VLC.3) (UI/FOUO) The reporting requirements under tpis paragraph h::lating to criminal activity by an FBl employee or a CHS do not apply to otherwise ill~gal activity that is authorized. in conformity with the AGG-Dom or other Attorney General guidelines or to mihor traffic offenses. (AGG-Dom, Part Vl.C.3) 14.5. (U) Information Related to National Security and Foreign Intel\igence Matters (UifFOUO) All informatio!1 sharing with a foreign governmellt relateq to classified national security and foreign intelligerice must adhere totheFBI-ForeigriDissemiiJati6nManual effective OS/23/2008 and effective policies governing MOUs. ' . (UlIFOUO)The gener'al' principle reflected in current law and policy is that there is a responsibility to provide jhformationas consistently apd fully as possible to agencies with relevant responsibilities to protect the United S~ateS'and its people from terrorism-and other threats to the national security, except as li~ited by specific constraints on such sharing. The FBI's responsibility in this area includes carrying, out the requirements ofthe MOU Between the Intelligence Community, Federal Law Enf9rcement Agencies, and the Department of Homeland. Security Concerning Information ~haring (March 4, 2003), or any successor memorandum. of understanding or·agreet:nent. Specific requirements also exist for internal.coordination and consultaliol) with other pOJ c9Inponents, and for sharing national s'ecurity and fore~gn intelligence information with White Iiouse agencies, as provided in the ~nsuing paragraphs. (AGG-Dom, Part VI:D) . (U) Dep~rtrhent of Justice A. (UIIFOUO) The DOJNSD n:tust have access to all information obtained by the FBI through act~vities relating to threats to the national security or foreign intelligence. The Director of the FBI and the Assistant Attorney General for Nat.ional·Security must consult. concerning these activitie~ whenever requested·by either of them, and.the FBI must provide such reports and infqrmation cbhcerning these activities as the Assistant Attorney General for National Security may request. In addition to any reports or·information the Assistant Attorney General for National Security may specially request under this subparagraph, the'FBI,must provi~e annual reports to the NSD concerning its foreign intelligence c()lIection program, including information concerning the scope and nature offoreign intelligence collection activities in each FBI Field Office. (AGG-Dom, P~rt VI.D. J) B. (U//FOUO) The FBI must keep the NSD apprised of all information obtained through activities under the AGG-Dom that is nec~ssary to the ability o~ the United .States to 'investigate or protect against threats to the national security, that includes regular 232 UNCLASSIFIED-FOR OFFICIAL iJSE QNLY UNCLASSIFIED - FOR OFFICIAL USE ONLY Domestic Investigations and Operations· Guide consultations between t~e FBI and the NSD to exchange advice and information relevant to addressing such threats through criminal prosecution or other means. (AGO-Dam, Part Vl.D.l) C. (U//FOUO) Except for counterintelligence investigations, a relevant USAO must have access to and must receive information from the FBI relating to t~rcats to the national security, and may engage in consultations with the FBI relating to such threats, to the same cx,tent as the NSD. The relevant USAO must receive such access and infonnation frorothe EBI,FieId: Offices. (AGG-Do~, Part VLD.l) D. (UIIFODO) In a counterintelligence investigation - e.g., an investigation relating to a matter described in Part VII.S.2 of the AGG-Dom - the FBI's providing information to and consultation with a relevant USAO is subject to authorization by the NSD. IJ;1. consl;lltation with the Executive Office for United States Attorneys and the FBI, the NSD must establish policies setting forth circumstances in which the FBI will consult with.the NSD prior to informing a r~levant USAO about such an investigation. The policies established by the NSD mqst (among other things) provide that: 1. (UI/FOUO) The NSp wjll, within 30 days, authorize the FBI to share with the VSAO informatio~ relating to certain espionage it!vestigations, as defined by the.policies, unless such ihformationiswithheld-because of substantial national security considerations; and 2. (UI/FOUO) T,he FBI may consult freely with the USAO concerning investigations within the scope of this subparagraph during an emergency, so long as the NSD" is notified of such consultation as soon as practicable after the consultation. ·(AGG-Dom, Part VI.D. I) E. (UIIFOUO) Information shared with a USAO pursuant to mOG subparagraph 14.5 (National Security) must be disclosed only to the United States Attorney or any AUSA designated by the United States Attorney as points of contact to receive such information. The United States Attorney and designated AUSA must have an appropriate security ciearance and must receive training in the handling of classified information and information derived from FISA, including training concerning the secure handling and storage of such information and training concerning requirements and limitations relating to the use, retention, and dissemination of such informl).tion. (AGG-Dom, Part VI.D. I) F. (UIIFOUO) The disclosure and sharing of infonnation by the FBI under this paragraph is subject to any limitations required in orders issued by the FISC, controls impos~d by the origina~ors of sensitive material, and restrictions established by the Attorney General or,the Deputy Attorney General in particular cases. The disclosure arid sharing of information by the FBl'underthis paragraph that may disclose the identity ofa eHS is governed by the relevant provisions of the AGG-CBS. (AGG-Dom, Part VI.D.l) (U) Whit~ House (U1/FOUO) In order to carry, out their responsibilities, the President, the Vice President, the Assistant ~o the President for National Security Affalrs~ the Assistant to the President for Homeland Security Affairs, the National Security Council (NSC) and its staff; the Homeland Security Council (HSC) and its staff, and other White House officials and offices require information from all federal agendes, including foreign intelligence, and information relating to international terrorism and other threats to the national security. The FBI accordingly may 233 UNCLASSIFIED-FOR OFFICIAL USE ONLY UNCLASSIFIED - FOR OFFICIAL USE ONLY Domestic Investigations and Operations Guide dissem~natc to the White House foreign intelligence and national security information obtained through acti.vities under the AGG-Dam, subject to the following standards and procedures. A. (UIIFOUO) White House must request such information through the NSC staff or HSC staff including, but not limited to, the NSC Legal and Intelligence Oirectorates and Office of Combating Terrorism, or through the President's lntelligence Advisory Board or the Counsel to the President. (AGG.Dom, Part VI.D.2.a) (Ui/FOUO)Ifthe WhiteHouse sends a request for such infoJinationto the FBI without first sending the request through the entities described above, the request must be returned to the White House for resubmission. B.(U/IFOUO) Compromising information concerning domestic officials or political organizations, or information concerning.activities of United States persons intended to affect the political processjn the United States, may be disseminated to the White House only with the approval of the Attorney General, based on a determination that such dissemination is needed for foreign intelligence purposes, for the purpo~e of-protecting against international terrorism or other threats to the national security, or for the_condu~t of foreign affairs. However, such approval i~ not J~qu.irecl fgr di§~emin.atJQn:tothe WhiteHouse of information concerning efforts 0'£ foreign intelljgence services to penetrate the White :House, or concerning contacts by White Bouse personnel with foreign intelligence service personnel. (AGO-Dom, Part VI.D.2.b) . C. (U/IFOUO) Examples of types of information that are suitable for dissemination to the White House on a routine·basis include, but are not limited to (AGG-Dom, Part VI.D.2.c): 1.. (U//FOUO) Information concerning international terrorism; 2. (UI/FOUO) Information concerning activities offoreign intelligen<?e services in the United States; 3". (U//FOUO) Infol1l)ation ind'icative of immine.nt hQstilities involving any foreign power; 4. (U//FOUO) Information concerning potential cyber threats to the United States-or its allies; . 5. (U/IPOUO) Information indicative ofpoliyy positions adopted by foreign officials, . governments, or powers, or their reactions to United States foreign policy initiatives; 6. (U//FOUO) Information relating to possible changes in leadership positions offoreign governments, parties, factions, or powers; . 7. "(U/IFOUO) Information concerning foreign economic or foreign political matters that might have national security ramifications; and 8. (U//FaUO) Information set forth in regularly published na,tionaJ intelligence requirements. D. (UI/FOUO) Communications by the FBI to the White House that reiate to a national security matter.and concern a litigatior; issue for a specific pending case must be made known to the Offige of the Attorney General, the Office .ofthe Deputy Attorney General, or the Office of the Associate Attorney General. White House policy may limit or prescribe the White House personnel who may request information concerning such issues from the FBI. (AGG-Dom Part VI.D.2.d) 234 UNCLASSIFIED-FOR OFFICIAL USE ONLY UNCLASSIFIED - FOR OFFICIAL USE ONLY Domestic Investigations and Operations G,!~de -~- ~ E.· (U1/FODO) The limitations on dis,semination of information by the FBI to the White House under the AGG-Dom do not apply to dissemination to the White House of information acquired in the course of an FB.! investigation requested by the White House inLo the background of a potential employee or appointee, 'or responses to requests from the White House under E.O. 10450 relating to se~urity requirements for government employment, (AGG-Doin, Part VI.D.2.e) . 14.6. (U) Special Sta.tutory Requirements A. (U) Dissemination of information acquired under the FlSA is, to the extent provicied.in that Act, subject to minimization procedures and other requirements specified in that Act. (AGODam, Part Vl.D.3.a) B. (U) Information obtained through the use ofNSLs under 15 U.S.C. § 1681v (NSLs to obtain full credit reports)'may be diss~minated in conformity with the general standards of AGGDom, Part VI, and maG Section Il.9.3.G. Information,obtained through the use ofNSLs under other statutes may be,disseminated in conformity with the general standards of the AGG-Dom, Part VI, subject to any applicable limitations hi. their governing statutory provisions (see maG .Section 11.9.3.G): 12 U.S.C. § 3414(a)(5)(B); 15 U.S.C. § 1681u(f); 18 U.S.C. § 2709(d); 50 U.S.C. § 436(e). (AGG-Dom, Part VI.D.3'.b) 235 UNCLASSIFIED-FOR OFFICIAL USE ONLY UNCLASSIFIED - FOR OFFICIAL USE ONLY Domestic Investigations and Operations Guide 15. (D) Intelligence Analysis and Planning 15.1. (D) Overview . (UI/FOUO) The AGG-Dom provide specific guidance and authorization for intelligence analysis and planning. This authority enables the FBI to identify and understand trends, causes, and potential indicia of criminal activity and other threats to the Uqited States that would;not be . apparent from the investigation of discrete matters alone. By meaQs of intelligence analysis and planning, the FBI can more effectively discover criminal threats, threats to the national security, and other matte.rs of nationaL intelligence interest, and can provide the critical support needed for the effective discharge of its investigative responsibilities and other authorized activities. (AGGDom, Part IV) (UI/FOUO) In carrying out its intelligence fun.ctions under Part IV of the AGG-Dom, the FBI is authorized to collect information using aU assessment investigative methods authorized in Part II of the AGG-Dom as described in the"DlOG Section 5J . b2 b7E Investigative activities under the AGG-Dom and other legally authorized activities through which the FBI acquires information, data, or intelligence may properly ·be utilized, structured, and prioritized to support and effectuate the FBI's intelligence mission. (AGG-Dom, Part II.A.3.d and Part IV, Intra.) (U//FOUO) Note: In the DlOG,'the word "assessment" has two distinct meanings. The AGGDom authorizes as an investigative activity an "assessment," which requires an aut40rized purpose as discussed in Section 5. The USIC, however, also uses the word "assessment" to describe written intelligence products, as discussed in Section IS.7.B. 15.2. (U) Purpose and Scope A. (U//FOQO) Functions Authorized: The AGG-Dom authorizes the FBI to engage in intelligence analysis and planning to facilitate and support investigative activities and other authorized activities. The functions authorlzed;include: 1. (U//FOUO) Deve.1opment of overviews and analyses concerning threats to and vulnerabilities of the United States and its interests, such as domain management as related to the FBI's responsibilities; 2. (U//FOUO) Research and analysis to produce repo~s and assessments (analytical products) concerning matters derived from or relevant to investigative activities or other authorized FBI activities; and 3..(U//FOUO) The operation ofintelligerice and information systems that facilitate and support investigations and analysis through the compilation and analysis of data and information on an ongoing basis. (AGG-Dom; Introduction B) B. (UI1F9UO) Integration ofIntelligence Activities: In order to protect against national security ahd criminal threats through intelligence-driven operations, the FBI should integrate intelligence activities into all investigative efforts by: 236 UNCLASSIFIED-FOR OFFICIAL USE ONLY UNCLASSIFIED - FOR OFFICIAL USE ONLY Domestic Investigations and Operations Guide 1. (U/IFOUO) Systetnatically assessing p;¢icular geographic areas or sectors to identify potcntial threats, vulnerabilities, gaps, and collection opportunities in response to FBI collection requirements that support the broad range of FBI responsibilities; 2. (UI/FOUO) Pro-actively directing resources to collect against potential threats and other -matters of interest to the nation and the FBI, and developing new collection capabilities where needed; 3. (UIIFOUO) Continuously validating collection capabilities to ensure information integrity;· 4. (UI/FOUO) Deliberately gathering Information in response to articulated prior.ity intelligence requirements using all avaiiable collection resources, then expeditiously preparing the collected inforrriation-for arialysis and dissemination and prorrtptly disseminating it to "appropriate partners at the local, state, .national and foreign level; and 5. (UIIFOUO) Purposefully evaluating the Implications. of collected information on current and emerging threat isslles. C. (U/IFOU'O) Analysis and Planning 'not Requiring the Initiation of an AGG-Dom Part II Assessment, (~ee DIOG Section 5):1 b2 b'7E As. part of-such analysis, an F~I employee can analyze historical informatio,n already contained within: ei) FBI data systems; (ii) USIC systems to which the FBI employee has . . . . (iii) any other United States'Government data access (e.g.,I- . system to' which the FBI employee has access~ and (iv) the FBI' employee can also conduct open-source Internet searches. Open-source Internet searches do not include anv oaid-for~ service databases such as Lexis-Nexis and Choiceoointl b2 b7E t b2 b7E 15.3. (U) Civil Liberties and Privacy (U) The'PBI mllst collect intelligence critical-to the FBI's apility to carry out its intelligence ana law enforcement mission. WHile conducting intelligence analysis and planning, the FBI will conductits activities in compliance with the Constitution, federal laws, the..AGG-Dom and other· relevant authorities in order to protect civil,liberties and privacy. 15.4. (U) Legal Authority (U) The FBI is an intelligence agency as well as a law enforcementagency. Accordingly, its basi9functions extend,beyond limited investigations of discrete matters, and include broader analytic an~ planning functions. The FBI's respon~ibilities in this area d€:rive from various administrative and statutory sources. See, e.g., E.O. 12333 § 1,7(g);' 28·U.S.C. §§ 532 note (incorporating P.L. 108-458 §§ 2001-2003) and·534 note (incorporating P.L. I09-!62 § 1107). (U/IFOUO) Th~ scope of authorized activities unaer Part II bfthe AGG-Domis not limited to "investigation" in a narrow sense, such as solving particular cases or obtaining evidence for use 237 UNCLASSIFIEl)-FOR OFFICiAL USE ONLY UNCLASSIFIED - FOR OFFICIAL USE ONLY Domestic Investigations and Operations Guide ...;.. in particular criminal prose~1.!tions. Ratner, the investig~tive activities authorized under the AGO-Dom may be properly used to provide crilical information needed for broader analytic and intelligence purposes to facilitate the solution and prevention of crim~, protect the national security, and further foreign intelligence obje~tives. These purposes include use of the information in intelligence analysis and p{anning under AGG-Dom. Part IV, and dissemination of the information to other law enforcement,USIC, and White House agencies under AGG-Dom, Part VI. Accordingly, inforr'nation obtained at all stages of investigative activity is to-be retained -and disseminated, for these purposes as provided, in the AGG-Dom, or in FBI policy consistent with the AGO-Dam, regardless of whether it furthers investigative objectives in a narrower or . more immediate sense. (AGG-Dom, Part II) 1;;.5. (U//FOUO) Standards for Ini~iating or Approving Intelligence Analysis an,d ' Plannin~ (U/IFOUO) If an FBI employee wishes to engage in Intelligence Analysis and Planning tliat requires the collection 9r examination of informati~m not available: (i) through an open-source Internet s~arch; (ii) in the FBI's existing files; (iii) in the USIC data systems to which the FBI employee has access; or (iv) in any 9ther United States Govemm~nt data system to which the FBI employee has acces; an assessment must be initiate.d. An FBI employee or. approving official. must de~erfninetnat: A. (UI/FOtIO) An authorize~ purpose and object,ive exists for'the conduct of an assessment (e.g., information is needed in order to conduct appropriate intelligence analysis arid planning); B. (U//FOUO) The assessment is based on factors other'than the exercise of First Amendment activitIes or on the race, ethnicity, national origin or religion of the subject; and C. (UI/FOVO) The assessment is an appropriate use of personnel and 'financial resourCl:;s. 15.6. (U/IF<;>UO) Standards for Initiating or Approving the Use of an Authorized Investigative Method in Intelligence Analysis and Planning. \ A. (U/IFOUO),The use of the particular investigative method is likely to further an objective of the assessment; B. (U//FOUO) The investigative methodselecteQ. is the least intruSive method, reasonable und~r the Circumstances; C. (U//FOUO) If the assessment relates to positive foreign intelligence, the FBI must operate openly and consensually with United States persons, to the extent practic,able. D; (U/LFOUO) The anticipated value of the assessment justifies the use of the selected investigative method or methods; and E. (U//FOUO) The investigative methqd is an appropriate use ofpersonnel and financial resources. 15.7•.(U) Authorized.Activities in Intelligence Analysis and Planning ,(U) The FBI may engage in intelligence analysis and planning to facilitate or support investigative activities authorized by the AGG-Dom or other legally authorized activities. Activities the FBI may carry·outas part ofIntelligence Analysis and Planning include: 238 UNCLASSIFIED-FOR OFFICIAL USE ONLY UNCLASSIFIED - FOR OFFICIAL USE ONLY Domestic Investigations and Operations Guide A. (U1IFOUO) Strategic Intelligence Analysis (u/iFoUO) The FBI is authorized to develop overviews and analyses ofthreats to and vulnerabilities ofthe United States and its interests in areas related to the FBI's responsibilities, including domestic and international criminal threats and activities; domestic ,and international activities, circumstances, and developments affecting the national security. FBI overviews and analyses may encompass present, emergent, and potentia,l threats and vulnerabilities"their contexts anc~ causes, and identification and analysis 'of means of responding to them. (AGO-Dam, Part IV) I. (U//fOUO) Domain Management by Field Offices (UIIFOUO) As part of Strategic Analysis Planning activities, the FBI !Uay coUect information in order to.improve or facilitate "domain awareness" and may engage 'in "domain management." "Domain management" is the systematic process by which the FBI develops cross-programmatic domain awareness and leverages its knpwledge t6 enhance its abil.ity to: (i) proactively identify threats, vulnerabilities, and intelligence gaps; (ii) discover,new opportunities.for needed intelligence collection and prosecution; and (iii) set tripwires to provide agvance warning o(national security and criminal threats. Effective domairimimagement enables the FBI to ioentiry significant threats,. detect vulnerabilities within its local and national domain, identify new sources and threat indicatprs, and recognize new trends so that resources can be appropriately allocated at the local level in accordance With national priorities. (UI/FOUO) Through a properly authorized assessment, domain management is . undertaken at the local and national ievels. All National Domain Assessments are initiated.and coordinated by the DI. Examples of dohiain management 'activities include, but are not limited to: J . . census crime statisti~s, 'cas~ information, domain entities, trend analysis, source development, and placement of tripwires. Further guidance regarding domain management and examples of intelligence ., products are contained in thel I b2 b7E J (UI/FOUO) The Field Office "domain" is the territory and issues for which a Field Office exercises responsibility, also known as the Field Office's area-of-responsibifity (AOR). Domain a\yareness is the: (D strategic ulJderstanding of national security and criminal threats. and vulnerabilities; (ii) FBI's positioning tocoll~ct against these threats' and vulnerabilities; and (iii) the existence of intelligence gaps related to the domain. (O//Foum All information collected for domain manaQ'ement must be documented in an las .directed in thef I b2 b7E t Additionallv. at any time tha~ . . I a separate SUl?stantlve classification assessment file or I '--~:-;--:-'-~~~~...--""'" subtile, according to the investigative matter, must be opened on the individual. .. .Iregarding, but FBIHQ DI provides specific guidance in its\ not limited to: the initiation, opening, coordination and purpose for Field Office and National Domain Assessments. 239 .UNCLASSIFIED-FOR OFFICIAL USE ONi.y b2 b7E UNCLASS:WIED - FOR OFFICIAL USE ONLY Domestic InVeStigations and Operations Guide 2. (UlIFOUO) Collection Management (U//FOUO) Collection Management is a formal business process through which Intelligence InformatiOn Needs and Intelligence Gaps (e.g., unknowns) are expressed as Intelligence Collection Requirements (questions or statements requesting information) and prioritized in a comprehensive, dynamic Intelligence Collection Plan. Results are m9nitored, and collectors are ~e-tasked as required. B. (U) Written IJi~elligence Products (UlIFOUO) the FBI is authorized to condl,lct research, analyze iriformation, and prepare reports and'intelligence assessments (analytical products) concerning matters relevant to authorized FBI ac.tivities, such·as: (i) reports and intelligence assessments (analytical product) concerning types of criminals or criminal activities; (ii) organized crime groups, terrorism, espionage, or other threats to the national security; (ili) foreign intelligen~e matters; or (iv) the scope and nature of criminal activity. in particular geographic are;ts or sectors of the economy. (AGG-Dom, Part IV) (UI/FOUO) United StateS Person Infonnation.: Reports,.Intelligence Assessments, and other FJ31 intelJigence.products should not containUliited.Statespersoilinformation Including the names.of United States c9rporations, if the pertinent intelligence can be conv~yed without including identifying inform~tion. (U//FOUO) FBI intelligence products, both· raw and finished, serve a wide range of· .audiences from national-level policy and decision-makers, inteHigence agencies, and state, local and triball~w. enforcement agencies. . (VI/FOUO) Intelligence products prepared pursuant to this Section include, but are not . limited to: Domain Management, Special Events Management Threat Assessments, Intelligence Assessments, Intelligence Bulletins, Intelligence Information Reports~ WMD Scientific and Technical Assessments, and Regional Filild Office As~essments. C. (U) Intelligence Systems (UlIFODO) The FBI is l!uthorized to operate intelligence, identification, tracking, and information systems in support of authorized investigative activities, or for such other or additional purposes as may be legally authorized, such as intelligence and tracking systems relating to terrorists,.gangs, or organized crime g~oups. (AGG-Dom Part IV) (UIIFOUOl b2 b7E 240 UNCLASSIFIED-FOR OFFICML USE ONLY UNCLASSIFIED - FOR OFFICIAL USE ONLY. Domestic Investigations and Operations Gl,Iide (UI/FOUO) When developing a new database, the FBI OGC Privacy and Civil Liberties Uriit must be consulted to determine if a Privacy Impact Asses~ment (PIA) must be prepared. D. ~l I. . (UIIFOUOj b2 b7E b2 b.7E (UlIFOuo)1 b2 ):>7E 241 UNCLASSIFIED-FOR OFFICIAL USE ONLY , Jr.'!'. '. UNCLASSIFIED -'FOR OFFICIAL USE ONLY Domestic Investigations and Operations Guide 16. (U) Undisclosed Participation (UDP) 16.1. (D) Overview CU/IPOUO) Undisclosed participation (UDP) takes place when anyone acting on behalf ofthe FBI, including but not limited to an,FBI employee or confidential human source (CHS), becomes a member or participates in the activity of an organization on behalf of the U.S. Government without disclosing FBI affiliation to an appropriate official of the organization. A. (U) Authorities. The FBI derives its authority to engage in UDP in organizations as part. of its investigative and intelligence collection missions from two primary sources. (U) First, Executive Order (E.O.) 12333 br9ad1y establishes policy for the United' St~tes Intelligence Community (USIC). Executive Order 12333 requires the adoption of procedures for undisclosed participation in organizations on behalf of elements of the USIC within the United States. Specifically, the Order provides ".•. [n]o one acting on behalf ofthe Intelligence Community may join or otherwise participate in any organi~ation in the United States on 'behalf of the, any element of the Intelligence Community without first disclosing such,person's intelligence affiliation to appropriate officials of the organization, except in accordance with'procedure's establish-ed by the'headofthe-IntelligenceCommunity element concerned ' ... Sucn particip~tion shall be authorized only iiit is essentia.1 to achieving lawful purposes as determined by the Intelligence Community element head,or designee." (B.O. 12333, Section 2.9, Up.disclosed Participationin Organizati.ons Within the United States). The Order also provides, at Section 2.2, that "[n]othing in [E.O. 12333] shlill be construed to apply to or interfere with any authorized civil or'criminallaw enforcement resp<msibility of any department or agencr." (U) 'Second, in addition to 'its role as member of the USIC, the FBI is also the primary criminal investigative agency of the federal government with authority and responsibility toinvestigate all violations of federal law that are not exclusively assigned to another federal agency. This includes the investigation ofcri111es involving interriational terrorism and espionage: As a criminal investigative agency, the FBI has the authority to engage in UDP as part of a predicated investigation or an assessment. (U/rFOUO) The FBI's UDP policy is designed to incorporate the. FBI's responsibilities as both a member of the USIC and as the primary criminal investigative agency of the federal government and, therefore, applies to alUnvestigative .and information collection activities of the FBI. It is intended to provide uniformity and clarity so that FBI employ~es have one set of standards to govern all UDP; As is the case throughout the DIOG, however, somewhat different constraints exist ifthe purpose of the activity is the collection of positive foreign intelligence that falls outside the FBI's law enforcement authority. Those constraints are reflected where applicable below. .B. (U/IFOUO) Mitil!ation of Ri~k.lr-----";""-~--------_---:'_-"""'~---' b2 b7E 242 UNCLASSIFIED-FOR OFFICIAL USE ONLY UNCLASSIFIED - FOR OFFICIAL USE ONLY Domestic Investigations and 'Operations Guide b2 b7E (U//FouoJ! . b2 b7E 16.2. (U) Purpose, Scope, and Definitions A. (UlIFOUOj b2 b7E B (UlIFOUOl b2 b7E C.. (UlIFOUO)\ b2 b7E 243 UNCLASSIFIED-FOR OFFICIAL. USE ONLY UNCLASSIFIED - FOR OFFICIAL .uSE ONL'y Domestic Investigations and Operations Guide 1. (UI/FO'UO] b2 b7E 2. (U/lFouoj b2 b7E I' 3. (UlIFOUOJ b2 b7E - 4~ (UlIFOUOj b2 b7E D (U/IFOUO~ b2 b7E '. b2 b7E E (UI!FOUO~ F.. (UI/FOU01, b2 b7E G (UlIFOUO)1 b2 b7E .. 244 UNCLASSIFIED-FOR OFFICIAL USE ONLY UNCLASSIFIED - FOR OFFICIAL USE ONLY Domestic Investigations and Operations Guide b2 b7E ~ " 2. (UlIFOUOJ b2 b7E b2 b7E 3. "(UlIFOUOj (UlIFOUOj b2 b7E (UlIFOUOJ b2 b7E 1. (VIIFouml 16.3. b2 b7E (U) Requirements for Approval A. (UIIFOUOj b2 b7E 245 UNCLASSIFIED-FOR OFFICIAL USE ONLY UNCLASSIFIED. FOR OFFICIAL USE ONLY Domestic Investigations and Operations Guide 1. (UIIFOUOj b2 b7E 2 . (UIIFOUO)I . . b2 b7E 3 (UI/FOUO)\ b2 b7E . _. -- ~ -- .. . ~ ... B. (UlIFOtiO) Specific Requirements for General Undisclosed Participation (Non-sensitive ...... _ UDP): 1. (UIIFOUOj I a b2 b7E (UIIFOUO~ b2 b7E .. b. (UI/FOUOf b2 b7E 2. (UlIFOUO'f ,. b2 b7E r ( UI/FOUO~ a (Ui/FOUOl b2 b:iE J b2' b7E 246 UNCLASSIFIED-FOR OFFICIAL USE ONLY UNCLASSIFIED - FOR OFFICIAL USE ONLY Domestic Investigations and Operations c;:,.;tl" b. (UlIFODOJ! b2 b7E c. (Ui/FODOj. b2 bS b7E' . , d. (UlIFOUQ)/ . - b2 bS b7E ., ~"""''''''l''''""-------------~---:--,~, ~~E ] j C (Ui/FOUOj 1. (U/lFouol 1- .. a. (UlIFOUQl . b. (UI/FODO] b~ bS b7E c. (UlIFOUO)1 b2 b7E 247 UNCLAS~IFIED":FOR OFFICIAL USE ,ONLY b2 b7E UNCLASSIFIED ~ FOR OFFICIAL USE ONLY Domestic Investigations and Operations Guide 2. b2 b7E (UIIFOUO~ b2 b 7E \ (UIIFOVO)/ b2 bS b7E 3. (UlIFOVO)1 b2 b7E" "r (UlIFOUOf I a. (UIIFOV01 b2 b7E "b2 b7E b: (UlIFOUO~ ." ." . b2 " bS b7E " a. (UlIFOUO)\" b2 bS b7E (U) Supervisory Approval Not Required (UlIFOUOj 16.4. IC:=_-=========:;:===~ A.~~~"-,, b2 b7E b2 b7E b2 b7E 248 UNCLA~SIFIED-FOR OFFICIAL USE ONLY UNCLASSIFIED - FOR OFFICIAL USE ONLY Domestic Investigations and Operations Guide b2 b7E c: (II. 1M! )I II b2 b7E (UIIFOUO~ D b2 b7E' E (UIIEouoi b2 b7E 16.5. (UlIFOU9) Standards for Review and A 02 A.. (UllFouoi b7E I 1. (UIIFouoi b2 b7E r b2 . b7E 2. (OIIFOI rml . r~~=~~=::::::::==========r, 3. {UlIFOUO'i b2 b7E r b2 . 4. (UilFouo{ b7E 1 5. (UlIFOUOj B. b2 b7E I (U/!Fl-O-U-O-;:;~'=;::=:====================::::;- b2 b7E 1. (UlIFOUQ)f r b2 b7E . . 2. (UIIFOUO~L_~",---- ·1 -'--_-----I 249 UNCLASSIFIED-FOR OFFICIAL USE ONLY 02 b7E UNCLASSIFIED - FOR OFFICIAL USE ONLY Domestic Investigations and Operations Guide C. CUIIFOUO b2 b7E b2 b7E b2 b7E .. 166 (U) Reques tS' f,or A pprova 0 fUd' n ISCIosedPrt"· f a Icmalon . , A . (U//Fo.J1.Qj' b2 b?E b2 , b7E B. ,(U//FOuoJf ,b2 b7,E 1. CUI/FOUO~ . 2'" CU/IPOVO) j , b2 b7E " 3, (UiIPOUO)1 b2 b7E "\ 4. (UlIPOOO)I' b2 b7E ' 5. .(U/lFOUO~ . b2 , 250' UNCLASSIFIED-FOR OFFICIAL USE ONLY b/E UNCLASSIFIED - FOR OFFICIAL USE ONLY Domestic Investigations and Operations Guide b2 b7E 6. (lJ//FOUOt I c. (U//FOUO~ 16.7. (u) " b2 b/E Duration I rU//FOUO{ b2 b7E • 16.8. (U/IFOUO~ b2 b5 b IE I b2 I, A. (U//FOU01 bS b7E I 1. (U//Fouml .1 1 I b2 b5 b7E b2 .b5 b7E 2. (UIIFOUOJ-------,.....-----...:....---------.i .':J b2 I b5 b7E ({JllFouml ' I. . 1 B. (lJ//Fouml ' b2 bS b7E _ 251 UNCLASSIFIED-FOR OFFICIAL USE ONLY UNCLASSIFIED - FOR OFFICIAL USE ONLY Domestic Investigations and Operations Guide 16.9: '(U/IFOUQ) UDP EXAMPLES b2 b7E A . (VI/Fouml b2 b5 b7E (lJIFouml I I B (UI/FOU01 ' .. ~ --- b2 b7E ~-"' -, (u//FOUQ)I I b2 b5 b7E I c. (U//FOUO)I b2 b7E 252 . UNCLASSIFIED-FOR.. OFFICIAL USE ONLY UNCLASSIFIED - FOR OFFICIAL USE ONLY .. Domestic InvestiQ'ations and Onerations Guide I fTTIIFOUO,1 b2 b5 b7E . D• ITT/IPOTT"n I . -- (~/IFOUO~ E· I b2 b7E - - b2 b5 b7E .~. I. (U/lFouoi .- (U//Fouml b2 b7E I b2 b5 b7E . F· 1 (U//FOUO~ b2 b7E 253 UNCLASSIFIED-FOR OFFICIAL USE ONLY UNCLASSIFIED - FOR OFFICIAL USE ONLY Domestic Investigations and Operations Guide 1 (u/IFOUO)I b2 b5 b7E (ul/Fouml G. b2 b7E ~-- I . . I. ~. I (UIIFOUQ) I H. (U//FOUQ) -'. - b2 b5 b7E b2 b7E I J ,1 (uIIFOUO~ (u/IFoubj b2 b5 b7E b2 b7E I I (llllFoUmi \ 254 UNCLASSIFIED-FOR OFFICIAL USE ONLY b2 b5 b7E UNCLASS~IED;. FOR QFFICIAL USE ONLY Domestic Investigations and Operations Guide (UI/FOUO~L....- 1. I ----'- -----J ----.,..-------:---_~- (UI/FOUO)I K. b2 b7E -;- ....;......l I ~(U~//F=-=O-=-:u-=-:O)-;::I ====~==========~=========------,------:-I (u//FOUO~ b2 b5 b7E 'b2 b7E I b2 b5 b7E 255 UNCLASSIFIED-FOR OFFICIAL USE' ONLY . UNCLASSIFIED - FOR OFFICIAL USE ONLY Domestic Investigations and Operations Guide 17. (U) Otherwise lliegal Activity. 17.1. (D) Overview (U/IFOUO) Otherwise Illegal Activity (OlA) is conduct in the course of duties by an·FBI employee (to. include a UCE) or CHS which constitutes a crime und~r local, state, or federal law if engaged.in by a person acting without authorization. Under limited circumstances,.OIA can be authorized for an FBI employee or CHS to. obtain information or eviden<;:e necessary for the . b2 success of an investigation under the following circumstances: (i) when that information or b7E .evidence is not reasonabl available without participation in. the OIA; 1......;~_......._--:-_ _~"":"""":'_-:-"7.":"""":""-:--_--:----:-:---::::---:-:-~~"""':<"':=:"':"'-:-----_.....,..---,J0r (iii) when necessary to prevent serious' bodily injury or death. Certain typesofOIA are not aut orjzed such as participation in an act of violence, except in self-defense, or participation in conduct that . would constItute an unlawful investigative technique such an illegal wiretap. p.2. (U) Purpose and Scope (U/IFOUQ}The.use afOIA.may be ~pproved in the course of undercover activities or ope.rations that involve an FBI employee or ,that involve 'use of ll. CHS. "When approved, 'OIAshould be . limited or minimized in scope to only th.at which is reasonably necessary und~r the circumstances 'ill.cludlng the duration anp geographic area to which approval applies, if appropriate. 17.3.. CU//FOUO) OIA in Undercover Activity A. (UI/FOUO) General. The ilse ofthe undercover method IS discussed in the mOG Section .11.8. OIA is often proposed as part of an .undercoyer scenario or in making the il1itial . undercove.r contacts before the operation is approved. Specific approval for OlA must be obtained in the context of these undercover activities or operations in addition to general approval ofthe s.cenario qrthe operation. B. (U/IFOUO) O~ by an FBI empl9yee in·anundercover operation relating to activity in vioiation of federal criminal law that does not concern a threat to the national security or foreign ,intelligence: must be appr9ved in conformity with the AGG-UCO. Appr9val of O~A in conformity with the AGG-UCO is sufficie.nt and satisfies any approval requirement that would otherwise apply ~nder the AGG-Doril. Additional discussion is provided in the' Field Guide for FBI Undercover and Sensitive Operations. An SAC may approve !he OIA ' describe.d in' subsection 17.5. ,I. (UlIFOUO) When a·UCE provides goods and service (reasonably unavailable to the subject except as provided by the United States government) that facilitate a felony, or its equiyalent under federal, state, or I()cal law, it is a sensitive circumstance. In these sensitive circumstances, additioriai authoriz~tion 'by an Assistant Director is required after review by the Criminal Undercover Operations Review Committee (CUORC). 2. (U//FOUO) Participation in otherwise illegal activity that involves a significant risk of yiolence or physical injury requires authorizati<m by the Director, Deputy Director, or designated Execiltive Assistant Director after review'by'the eUORC. C. (U/IFQUO) OIA by an FBI employe~ in an undercover opera~ion relating to a threat to the national security or foreign intelligence collection must conform to the AGG-Dom~ 256 llNCLASSIFIED-FOR OFFICIAL USE ONLY UNCLASSIFIED - FOR OFFICIAL USE ONLY Domestic Inyestigations and Operations Guide The DOJ NSD is the approying component for OIA that requires approval beyond that authorized for SAC approval described in mOG subsection 17.5, below. However, as authorized by the Assistant Attorney General for NSD, officials in other DOJ components may approvepIA in such investigations. 17.4. (U/IFOUO) OIA for a Confidential Human Source (UIIFOUO) OIA by a CHS must be approved in conformity with the AGG-CHS and the FBI' CHSPM.. 17.5. (UlIFOUO) Approval of0!A by a Special Agent in Charge (U/IFOUO) An SAC may authorize the following OIA for an fBI employee when consistent with other requirements of this section, the AGG-UCO, and other FBI· policy: , A. (UIIFOUO) Otherwise illegal activity that would not b~ a felony under federal, state, 10cal, or tribal law; • B. (UIIFOUO) Consensual monitoring of communications, even if a crime under state, local, or tIiballaw; . CUIIFOUO) Note: Other approvals for the consensual monitoring may apply sucliasthat . required when the consensual monitoring involves a sensitiv~ monitoring circumstance. See mOG Section I 1.5.4. (UIIFOUO) Note: For those. state, local and tribal governments that do not sanction or provide a law enforcement exception available to the FBI for (:me-party consent recording of communications with persons within their jurisdiction, the SAC must approve the consensuai monitoring of communications as an OIA. Prior to the SAC authorizing the QIA, one-party consent must be acq~ired. The SAC may delegate the OIA approval ~uthority to an ASAC or SSA. C. (UIIFOUO) The controlled purchase, receipt, delivery, or sale of drugs, stolen property, or other contraband; D. (UIIFOVO) The payment of bribes; (UIIFOUO) Note: the payment of bribes and the amount of such bribes in a public corruption matter may be limited by other FBI policy; see the CID PG. E. (UIIPOUO) The making'offalse representations in concealment of personal identity or the true ownership of a proprietary; and F. (UIIFOUO) Conducting a money laundering transaction Qr transactions involving an aggre~ate amount not exceeding $1 million. (UIIFOUO) Exception: An SAC may not-authorize a!1 activity that may constitute material support to terrqrisni, a violation of export control laws, or a violation of laws that·concerri. proliferation of weapons of mass destruction. In such an investigation, an SAC may authorize an activity that may.otherwise violate prohibitions of m~terial support to terrorism only according to standards established by the Director of the FBI and agreed to by the Assistant Attorney General for National Security. (AGG-Dom, Part V.C.3) 257 UNCLASSIFIED-FOR OFFICIAL 'USKONLY .1 UNCLASSIFIED - FOR OFFICIAL USE OJ'lLY Domestic Investigations and Operations Guide 17.6. (U/IFOUO) Standards for Review and Approval of OIA .(UIIFOUO) No official may recommend ~r approve participation by an FBI employee in OIA unless the participation is justified: A. (U/IFOUO) To obtain information or evidence necessary for the success of the investigation and not reasonably avai1ab~e without participation in the otherwise illegal activity; . B. :(UIIFOU 0) lor I b2 b7E C. (UIIFOUO) To prevent de~th or serious bodily injury. 17.7. (U/IFOUO) OIA not authorized (UIIFOUO) The following activiti~s may not be authorized for an FBI empioyee: A. (UI/FOUO) Directing or participating'in acts of"iolence; (Ul/FOUO) Note: Self-defense and defense of others. FBI employees are authorized to' engage in any lawful'useor force,. including the use of force in self-defense or defense of others in the lawful discharge oftheir duties. . B: (UI/FOUO) Activities·whoseauthorization·is prohibited.by law, i!}cl!1ding unla,wful investigative methods, such as illegal, non-consensual, electronic surveillance or illegal searches. (UIIFOUO) Note: Subparagraph B includes activities that would violat~ protected constitutional or federal statutory rights in the. abs~nce of a court order or warrant such as illegal wiretaps and searches~ 17.8. (U/IFOUO) Emergency Situations (UIIFOUO) Without prior approval, an FBI employee may engage in OIA that could be authorized under this section only if necessary to meet an immediate threat to the safety of persons or property Qr to t!:le national security, or to prevent the compromise of an investigation or the loss of!l significant investigative opportunity. In such a case, prior to engaging in the OIA, every effort should be made by the'FBI employee to consult with the SAC, and by the SAC to consult with the USAO or appropriate DOJ Division where the authorization of that offi«e or Division would be required unless the circumstances pr~clude such consultation. Cases in which OIA occur pursuant to this paragraph without the authorization required must be reported as soon as possible to the SAC, and by the SAC to FBIHQ and to the USAO or appropriate DOJ Division. 258 UNCLASSIFIED-FOR OFFICIAL USE ONLY