TSCM 101 Online Training Course

From: Norbert Zaenglein <sem..._at_countersurveillance.info>
Date: Fri, 21 May 2010 07:55:59 -0700 (PDT)

>From - Sat Mar 02 00:57:27 2024
Received: by 10.42.110.15 with SMTP id n15mr13339569icp.11.1355243082564;
        Tue, 11 Dec 2012 08:24:42 -0800 (PST)
X-BeenThere: tscm-l2006_at_googlegroups.com
Received: by 10.50.190.233 with SMTP id gt9ls544541igc.36.gmail; Tue, 11 Dec
 2012 08:24:37 -0800 (PST)
Received: by 10.50.72.193 with SMTP id f1mr10044974igv.0.1355243077389;
        Tue, 11 Dec 2012 08:24:37 -0800 (PST)
Received: by 10.50.192.167 with SMTP id hh7msigc;
        Mon, 10 Dec 2012 16:05:18 -0800 (PST)
Received: by 10.43.81.196 with SMTP id zz4mr11273086icb.14.1355184318087;
        Mon, 10 Dec 2012 16:05:18 -0800 (PST)
Received: by 10.43.81.196 with SMTP id zz4mr11273084icb.14.1355184318029;
        Mon, 10 Dec 2012 16:05:18 -0800 (PST)
Return-Path: <jm..._at_tscm.com>
Received: from smtpauth03.mfg.siteprotect.com (smtpauth03.mfg.siteprotect.com. [64.26.60.137])
        by gmr-mx.google.com with ESMTP id d5si533304iga.1.2012.12.10.16.05.17;
        Mon, 10 Dec 2012 16:05:17 -0800 (PST)
Received-SPF: neutral (google.com: 64.26.60.137 is neither permitted nor denied by best guess record for domain of jm..._at_tscm.com) client-ip=64.26.60.137;
Authentication-Results: gmr-mx.google.com; spf=neutral (google.com: 64.26.60.137 is neither permitted nor denied by best guess record for domain of jm..._at_tscm.com) smtp.mail=jm..._at_tscm.com
Received: from Waiting-For-A-Blue-Bird.local (unknown [71.174.25.246])
        (Authenticated sender: jm..._at_tscm.com)
        by smtpauth03.mfg.siteprotect.com (Postfix) with ESMTPA id 46195FF8A
        for <tscm-..._at_googlegroups.com>; Mon, 10 Dec 2012 18:05:17 -0600 (CST)
Message-ID: <50C678BA.5060004_at_tscm.com>
Date: Mon, 10 Dec 2012 19:05:14 -0500
From: "James M. Atkinson" <jm..._at_tscm.com>
Reply-To: jm..._at_tscm.com
Organization: Granite Island Group
User-Agent: Thunderbird 3.0a1pre (Macintosh/2008022015)
MIME-Version: 1.0
To: TSCM-L Mailingin List <tscm-..._at_googlegroups.com>
Subject: DOJ Policy Guide
Content-Type: text/plain; charset=windows-1252; format=flowed
Content-Transfer-Encoding: 8bit
X-CTCH-Spam: Unknown
X-CTCH-RefID: str=0001.0A020206.50C678BD.0122,ss=1,re=0.000,fgs=0

http://www.justice.gov/usao/eousa/foia_reading_room/usam/title9/60mcrm.htm

9-60.202

Illegal Electronic Eavesdropping�Prosecution Policy

The criminal prohibitions against illegal electronic eavesdropping
contained in Title III are part of the same act which permits federal
law enforcement officers to engage in court-authorized electronic
surveillance. Congress viewed the criminal sanctions and the court
authorization provisions as two sides of the same coin. The retention of
the government's authorization to engage in court-authorized electronic
surveillance may depend on its vigorous enforcement of the sanctions
against illegal electronic eavesdropping. Accordingly, it is the
Department's policy to vigorously enforce these criminal prohibitions.

The Department's overall prosecutive policy under 18 U.S.C. � 2511 is to
focus primarily on persons who engage or procure illegal electronic
surveillance as part of the practice of their profession or as incident
to their business activities. Less emphasis should be placed on the
prosecution of persons who, in the course of transitory situations,
intercept communications on their own without the assistance of a
professional wiretapper or eavesdropper. This does not mean that such
persons are never to be prosecuted, but simply that this type of
prosecution is not a major thrust of the Department's enforcement program.

Most illegal interceptions fall into one of five categories: (1)
domestic relations, (2) industrial espionage, (3) political espionage,
(4) law enforcement, and (5) intra-business. The largest number of
interceptions, more than 75 percent, are in the domestic relations
category. It is the Department's policy to vigorously investigate and
prosecute illegal interceptions of communications which fall within the
industrial and political espionage, law enforcement, and intra-business
categories. Generally such violations will have interstate ramifications
which will make federal prosecution preferable to state prosecution.
Nevertheless, in cases where the federal interest is slight, it may be
appropriate to defer to state prosecution.

Illegal interceptions arising from domestic relations disputes generally
present less of a federal interest and, therefore, local prosecution is
more appropriate. However, this does not mean that federal prosecutors
should abdicate responsibility for prosecuting such interceptions.
Indeed, in view of the preponderance of this kind of interception, no
enforcement program can be effective without the initiation of some
prosecutions for deterrence purposes. United States Attorneys should
develop effective liaison with local prosecutors in order to convince
them to shoulder their share of the burden.

Within the category of domestic relations violations, primary attention
should be given to those instances in which a professional is involved,
such as a private detective, attorney, moonlighting telephone company
employee, and supplier of electronic surveillance devices. United States
Attorneys should feel free to pursue these cases or refer them to local
prosecutors; however, no professional should escape prosecution when a
prosecutable case exists.

Domestic relations violations which do not involve a professional
interceptor are the lowest priority cases for federal prosecution.
Although local prosecution is normally preferable, when local
prosecutors are unwilling to pursue the case, resort to federal
prosecution may be appropriate. Nevertheless, violations of this type
will sometimes prove to be of insufficient magnitude to warrant either
federal or state prosecution. In such cases, other measures may prove
sufficient, for example, a civil suit for damages (18 U.S.C. � 2520),
suppression of evidence (18 U.S.C. � 2515), or forfeiture of the
wiretapping or eavesdropping paraphernalia (18 U.S.C. � 2513).

Disturbed persons often suspect that they are the victims of illegal
interceptions. Consequently, a complaint which is based solely on
suspicious noises heard on the telephone normally does not merit further
investigation if the initial line check fails to produce independent
evidence of a tap.

9-60.203

State Laws

Title III does not preempt the authority of the states to legislate
concerning the interception of communications. The protection of privacy
is as much a matter for local concern as protection of persons and
property. Accordingly, the efforts of federal law enforcement personnel
should supplement, not supplant, local action.

United States Attorneys should review the applicable statutes in their
states. When there is no statute or when the existing statutes are
inadequate, United States Attorneys should work through their
federal-state law enforcement committees to obtain the enactment of
appropriate legislation. When suitable state legislation exists but is
not sufficiently used by local prosecutors, United States Attorneys
should make efforts to stimulate local enforcement.

9-60.262

Prosecutive Policy�18 U.S.C. � 2512

Flagrant violators of 18 U.S.C. � 2512 should be prosecuted vigorously,
especially violators who possess such devices in order to engage in
electronic surveillance as a business.

Less culpable first offenders and those who violate the statute because
of ignorance of the law may be appropriate subjects for more lenient
disposition. In some cases a warning may be sufficient. Nevertheless, in
all cases except, perhaps, for minor advertising violations, the United
States Attorney's Office should require that the prohibited device
either be surrendered voluntarily to the FBI or forfeited pursuant to 18
U.S.C. � 2513.

--
James M. Atkinson. President and Sr. Engineer
"Leonardo da Vinci of Bug Sweeps and Spy Hunting"
http://www.linkedin.com/profile/view?id=15178662

Granite Island Group http://www.tscm.com/
(978) 546-3803 jm..._at_tscm.com
(978) 381-9111


Received on Sat Mar 02 2024 - 00:57:27 CST

This archive was generated by hypermail 2.3.0 : Sat Mar 02 2024 - 01:11:46 CST