Section 9. Search Warrants, Evidence and Chain of Custody

9.4.9 Search Warrants, Evidence and Chain of Custody

Manual Transmittal

Purpose

(1) This transmits revised IRM 9.4.9, Investigative Techniques, Search Warrants, Evidence, and Chain of Custody.

Material Changes

(1) Subsection 9.4.9.3.5.3(2) is revised to include the requirement to trace firearms that are recovered in the course of criminal investigations and taken into federal custody.

Effect on Other Documents

This IRM supersedes IRM 9.4.9 dated February 11, 2013. This IRM also incorporates procedure(s) implemented by the President of the United States’ guidance memorandum dated January 16, 2013, [Subject: “Tracing of Firearms in Connection with Criminal Investigations”]; Attorney General’s guidance memorandum dated February 25, 2013, [Subject: “January 16, 2013 Presidential Memorandum: Tracing of Firearms in Connection with Criminal Investigations”] and CCU Case Detail Results 2013-40286 dated March 1, 2013.

Audience

Effective Date

Patricia J. Haynes for Richard Weber
Chief, Criminal Investigation

9.4.9.1 (10-05-2007)

Overview

  1. This section discusses agency policy and procedural requirements for use of search warrants by Criminal Investigation (CI) special agents. It includes guidelines regarding the execution of the search warrant and the seizure of evidence, computers, and contraband. Further, it sets forth the proper procedures for maintaining the chain of custody and transferring evidence to the forensic lab.
  2. Special agents should be aware that not every investigation requires the execution of a search warrant. Form 6884, Voluntary Consent to a Search of Person, Premises or Conveyance, (see Document Manager), is an effective tool for obtaining investigative evidence. Special agents should discuss with their Supervisory Special Agent (SSA) the benefits and risks of confronting the individual in possession of the evidence sought as opposed to executing a search warrant.
9.4.9.2 (02-11-2013)

General Search Warrant Procedures

  1. A numbered subject criminal investigation (SCI) is required when CI is the affiant for a search warrant.
  2. A CI affiant search warrant required for the installation, maintenance, monitoring or removal of an electronic tracking device or global positioning system is authorized during a primary investigation (PI) (see IRM 9.4.6, Surveillance and Non-Consensual Monitoring, for additional guidance).
  3. The Criminal Investigation Management Information System (CIMIS) must be updated to reflect search warrant activity for CI affiant and non-CI affiant search warrants.
  4. Special agents need either a numbered PI or SCI to participate in the execution of non-CI affiant search warrants (see IRM 9.9.4, Criminal Investigation Management Information System Data Fields, for additional information).
  5. Search warrants for tax and tax-related offenses will be utilized with restraint and only in significant tax investigations. All other investigative tools (i.e., mail covers, surveillance, informants, trash pulls) should be considered before deciding that a search warrant is the least intrusive means to acquire the evidence. The significance of a tax investigation can be evaluated by considering the following:

Note:

In this context, tax-related investigations are those that must be authorized by the Department of Justice (DOJ), Tax Division. Typically, these investigations involve violations of Title 18 USC §286, §287, and §371.

9.4.9.3 (02-09-2005)

Search Warrant Process

  1. A search warrant can be an effective investigative tool once it has been determined that crucial evidence of a particular crime exists, is likely to be found at a specific location, and cannot be obtained by any other means. There are five major steps to the process:
  1. preparing the search warrant application
  2. planning the enforcement action
  3. obtaining approval
  4. executing the search warrant and preserving the evidence
  5. adhering to the applicable post operation procedures

Note:

The Supreme Court, in Groh v. Ramirez, 124 S. Ct. 1284 (February 24, 2004), ruled a search warrant that failed to describe the persons or things to be seized was invalid on its face, notwithstanding that the requisite particularized description was provided in the unincorporated search warrant application. The court also ruled that the Federal agent who had prepared the search warrant and supervised its execution was not entitled to qualified immunity from liability. This decision, along with the Ninth Circuit’s recent decision in United States v. Bridges, 344 F.3d 1010 (9th Cir. 2003), clearly highlights the need for a warrant to contain on its face or in an incorporated and attached search warrant application, sufficient information to instruct both the executing officer and the occupant of the place to be searched of the nature of the alleged violation(s) and the description of the items to be seized.

9.4.9.3.1 (10-05-2007)

Preparing the Search Warrant Documents

  1. A search warrant consists of a set of documents, each with a specified legal purpose. These documents are:
  1. Application for Search Warrant
  2. Affidavit
  3. Search Warrant
  4. Search Warrant Attachment "A" description of "Location to be searched"
  5. Search Warrant Attachment "B" description of "Items to be seized"
  6. Search Warrant Return
9.4.9.3.1.1 (10-05-2007)
Application and Affidavit for Search Warrant
  1. The Affidavit for Search Warrant, (see Document Manager), is a standard form signed and sworn by the special agent that summarizes the specifics of the search warrant. The application addresses the particulars of the person, property, or premises to be searched; the title and employing agency of the special agent; the judicial district where the person or property exists; a description of the items to be seized; and the nature of the alleged criminal violations. This section of the form is generally prepared by the attorney for the government assigned to the investigation.
  2. In order to obtain a search warrant, the special agent must convince internal and external approving officials, and ultimately a Federal Judge Magistrate (magistrate), that there is probable cause to believe that:
  1. A crime has been committed.
  2. Items sought may be seized by virtue of their connection to the crime.
  3. Items sought are on the premises to be searched.
9.4.9.3.1.2 (10-05-2007)
Affidavit
  1. The affidavit sets forth, in a logical fashion, all the existing evidence to establish probable cause that a crime was committed, that evidence of the crime exists, and that the evidence is located at a particular location.
  2. A suggested format for the affidavit includes the following sections:
  1. affiant's training, experience, and expertise
  2. detailed account of the criminal statutes that are alleged to have been violated and evidence to show probable cause that the statutes have been violated
  3. financial evidence
  4. description of the place to be searched and nexus between the location to be searched and the subject of the investigation
  5. conclusions which tie evidence to the violations, the subject, the location and the time period
  1. The special agent and CIS will develop probable cause for evidence contained in computers and for each component of the computer. The special agent must articulate a factual basis to believe that the computer was used for the creation and/or storage of evidentiary records and, if necessary, explain in the affidavit why an on-site search is not reasonable. He/she will then request permission to seize the computer and search it later.
  2. In contemplating the seizure of computers, special agents must be aware of the possibility that protected material may be stored in the computer. A positive statement must be included in the search warrant that no work product material exists on the computer. If protected material exists on the computer, state how the material is going to remain protected. Magistrates can authorize a segregation plan; address the possibility of e-mail on the computer; indicate the e-mail status in the search warrant affidavit and the search warrant itself; identify in the search warrant whose e-mail is going to be read; and determine whether such e-mail is subject to a search (see 18 USC §2703).
  3. The special agent will consult with CT Counsel and/or the attorney for the government on computer issues during the investigation. Computer and Telecommunications Coordinators (CTCs) at the local US Attorney or Assistant US Attorney's (AUSA) office who have received special training in the computer crimes subject area are available at: Tax Division, DOJ: Senior Trial Attorney, (202) 514-2832 and Fax (202) 514-3081 and/or Computer Crime and Intellectual Property Section, DOJ at (202) 514-1026 and fax (202) 514-6113.
9.4.9.3.1.3 (10-05-2007)
The Description of Items to be Seized
  1. Under the particularity requirement of the Fourth Amendment, the courts consistently hold that the items to be seized must have a nexus to the underlying criminal offenses alleged in the affidavit. Evidence that is seized and found to exceed the scope of the search warrant will be suppressed and declared inadmissible at trial.
  2. When preparing the list of items to be seized, the special agent must be specific as to the nature, type, and time frame of items and records to be seized. Use of "catch-all" phrases, such as " any and all records" , will be avoided as they imply an overly broad and non-specific search methodology.
  3. There is an exception to the particularity requirement known as the permeated with fraud theory. If a business is so "permeated with fraud" that there are no records in existence which are devoid of evidence of the underlying criminal offenses, then all the records of the business may be seized. In these instances, the affidavit will specifically state that the business is "permeated with fraud" and describe in sufficient detail why all the records represent evidence of the alleged offenses.
  4. The CIS will provide the proper language to be included describing computer hardware, software, and peripherals to be seized.
  1. The search warrant must describe with particularity the hardware components of the computer and the software and data stored within the computer.
9.4.9.3.1.4 (03-17-2011)
The Search Warrant Return
  1. A magistrate judge will review the Application for Search Warrant, along with the affidavit, items to be seized, and a description of the premises to be searched, and will determine if there is probable cause that a crime was committed, that evidence of the crime exists, and that the evidence is located at the particular location specified. If the judge decides that probable cause does exist, he/she will sign the search warrant, authorizing the search of the location specified, for the items specified.
  2. Federal Rules of Criminal Procedure, Rule 41 (e)(2), directs the officer to:
9.4.9.3.2 (02-11-2013)

Planning the Enforcement Action

  1. Any enforcement action, and particularly a CI affiant search warrant, involves extensive preplanning and background work to ensure a safe and efficient operation. For this reason, an SSA may designate a special agent, other than the affiant, to coordinate the enforcement planning aspects of the search warrant.
  2. Support staff will be used to assist in the planning and preparation of enforcement actions; however, due to the unforeseen risks, support staff must not be present at the site where a search warrant is executed.
  3. The participation of a Tax Fraud Investigative Assistant (TFIA) is permitted only in IRS affiant search warrants and must be approved by the SAC. The role of the TFIA must be clearly defined in the Plan of Action and Risk Assessment Guide. A TFIA is not allowed, under any circumstances, to enter a search location or physically be waiting in the area of a search location until the premises have been secured. A TFIA must remain at the staging area until the search site has been declared safe by the CI Team Leader. The CI Team Leader on-site has the authority to request the removal of the TFIA if there are any safety concerns or operational issues that arise at any point during the executive of the search warrant.
  4. The following planning documents will be completed for every CI affiant search warrant and can also be found in Document Manager:
9.4.9.3.2.1 (02-11-2013)
Enforcement Action Review Form
  1. In all circumstances where CI is involved in a search warrant that is being executed or served, the EARF is required to establish the basis for the action and to document the SAC’s approval of the enforcement action or involvement in the enforcement action.
  2. Only one EARF need be prepared for multiple related sites and/or multiple related enforcement actions on the same investigation/same day.
  3. The narrative to support CI’s involvement must be articulated in the appropriate sections of the form, following the criteria established in subsection 9.4.9.2. When one form is prepared for multiple sites, the narrative will contain justification for CI's participation in each site, along with the discussion of intrusiveness for tax investigations. Do not indicate that the reviewer should refer to the affidavit for information. In any enforcement operation, the SAC has the ultimate authority to approve and commit any available sources (except where Director, Field Operations approval is required for sensitive cases).
9.4.9.3.2.2 (08-02-2010)
Risk Assessment Guide
  1. Completion of the Risk Assessment Guide (RAG) is required for all CI search warrants except those which are served on accounts of a Federally insured bank or financial institution, another Federal agency, or search warrants served via fax or mail. In addition, when CI is the affiant, completion of the RAG is not required for search warrants executed on safe deposit boxes, stock accounts, electronic accounts, and other non-physical locations.
  2. One Risk Assessment Guide will be prepared for each search warrant site.
  3. A Risk Assessment Guide is not required in investigations where CI is assisting other Federal, state, or local agencies; however, at the discretion of the SAC, a Risk Assessment Guide may be warranted.
  4. Special agents may fully participate in every aspect of an enforcement action involving medium or low risk CI search warrants.
  5. If a determination is made that entry into a premises or structure presents a high risk situation, special agents will not engage in the entry. Other means, such as the use of specially trained entry teams from other local, state, or Federal agencies will be considered. In these situations, once entry is made and the location is secured, special agents will then be permitted to enter and complete the search.
9.4.9.3.2.2.1 (02-09-2005)
Criteria of a Low Risk Situation
  1. Low risk situations are those in which it is unlikely that the risk factor/enforcement action could result in a non-permanent physical injury to the special agent or others.
9.4.9.3.2.2.2 (02-09-2005)
Criteria of a Medium Risk Situation
  1. Medium risk situations are those in which it is possible that the risk factor/enforcement action could result in a non-permanent physical injury to the special agent or others. Special agents have the requisite training to deal with these situations and, as such, are authorized to make entry. An example of a medium risk situation is the presence of a firearm, absent other knowledge of intent or criminal history, at a location.
9.4.9.3.2.2.3 (02-09-2005)
Criteria of a High Risk Situation
  1. High risk situations are those in which it is probable that the risk factor/enforcement action could result in death or serious physical injury to the special agent or others. As stated above, CI special agents will not participate in the entry of a location, in high-risk situations. Those circumstances which create a high risk situation include the following:
9.4.9.3.2.3 (02-09-2005)
Search Warrant Checklist
  1. The Search Warrant Checklist (see Document Manager) will be prepared for all CI search warrants. Only one Search Warrant Checklist should be prepared for multiple related sites on the same investigation/same day.
  2. A Search Warrant Checklist is not required in investigations where a CI special agent is assisting other Federal, state, or local agencies.
9.4.9.3.2.4 (10-05-2007)
Search Warrant Plan
  1. A Search Warrant Plan, (see Document Manager), will be prepared for all CI search warrants. One search warrant plan will be prepared for each search warrant site.
  2. This plan is not required in investigations where a CI special agent is assisting other Federal, state, or local agencies; however, it is recommended that the operational plan of the other law enforcement entity be made a part of the EARF, along with the special agent’s articulation of the need for CI involvement.
9.4.9.3.2.4.1 (02-09-2005)
Executing Searches of Attorney's Offices
  1. The DOJ policy places additional procedures on situations pertaining to the search of the premises of any attorney who is engaged in the practice of law on behalf of clients. The policy is detailed in the United States Attorney's Manual, Title 9, §13.420.
  2. Searches of attorney's offices involve extensive cooperation between CI, CT Counsel, DOJ, and the local US Attorney for the government to ensure compliance with this policy. Additional resources outside the local area may be required that will call for coordination by the SSA.
  3. The policy establishes the use of a "privilege team" consisting of special agents and attorneys who are not directly involved in the underlying investigation. The purpose of the privilege team is to prevent exposing the investigating special agents and prosecuting attorney(s) for the government to privileged material not covered by an exception. Supervisory Special Agent involvement is critical in the early stages to ensure adequate resources. A predetermined set of instructions is given to the privilege team and documented in the search warrant to prevent and limit the exposure to privileged communications, and to ensure that the privilege team does not disclose any information, unless authorized by a privilege attorney, to the investigating special agent(s) and attorney(s) for the government. The privilege team conducts the search and reviews all attorney material that may be privileged. It then determines what materials can be provided to the investigating special agent(s) and prosecuting attorney(s) for the government.
9.4.9.3.2.4.2 (10-05-2007)
Searching and Seizing Computers
  1. The search and seizure of computers is a highly technical and evolving area of search warrant law. The CIS will provide important information with regard to planning the enforcement operation so as to preserve and prevent the destruction of the computerized records and equipment. The lead CIS will coordinate the resources of a CIS team for the search warrant. When the search warrant is executed, the CIS and his/her team will have primary decision making authority and overall responsibility for all computer search and seizure issues (see subsection 9.4.9.6).
9.4.9.3.3 (10-05-2007)

The Approval Process - Criminal Investigation Affiant Search Warrants

  1. A numbered SCI, related to the subject of the search warrant, is required when CI is the affiant for a search warrant (see subsection 9.4.9.2).
  2. The special agent will forward to his/her SSA the following completed documents:

Note:

Refer to subsection 9.4.9.3.3.3 if the subject is one which requires DOJ, Tax Division approval of Title 26 and tax-related Title 18 search warrants. These search warrants will require an additional level of review.

9.4.9.3.3.1 (02-09-2005)
Criminal Tax Review
  1. Criminal Tax Counsel will review all CI search warrants for legal sufficiency and probable cause. In Title 26 and tax-related Title 18 money laundering investigations, CT Counsel will also evaluate the intrusiveness issue. Subsequent to his/her review, CT Counsel will provide written advice to the SAC for his/her consideration in the search warrant approval process.
9.4.9.3.3.2 (10-05-2007)
Director, Field Operations Concurrence
  1. The SAC is required to obtain written concurrence from the respective Director, Field Operations, for the execution of a search warrant in a sensitive investigation (as defined in IRM 9.4.1 (see Approving a Subject Criminal Investigation)).
  2. The SAC will obtain written concurrence from the respective Director, Field Operations, when a search warrant which targets an individual requiring DOJ, Tax Division approval is being considered (see subsection 9.4.9.3.3.3 below). Criminal Tax Counsel review is required prior to forwarding the search warrant to the Director, Field Operations for concurrence.
9.4.9.3.3.3 (03-17-2011)
Department of Justice, Tax Division Approval
  1. Pursuant to DOJ, Tax Division, Directive No. 52, the local United States Attorneys Office can approve most Title 26 and tax-related Title 18 search warrants. However, DOJ, Tax Division retains exclusive authority to approve Title 26 and tax-related Title 18 search warrants directed at offices, structures, or premises owned, controlled, or under the dominion of a subject of an investigation who is:

Note:

A simultaneous referral to the local US Attorneys Office can facilitate the process.

9.4.9.3.4 (02-11-2013)

The Approval Process - Non-Criminal Investigation Affiant Search Warrants

  1. Special agents can assist other agencies in the execution of a search warrant, including interviewing subject(s) and related individuals during the execution of the search warrant, with an approved PI (see IRM 9.4.1, General, Primary and Subject Investigations). However, CI cannot interview third party and/or subjects after the execution of another agency's search warrant without a numbered SCI.
  2. The special agent will forward to his/her SSA the following completed documents:
9.4.9.3.5 (10-05-2007)

Executing Search Warrant Procedures – Criminal Investigation Affiant Search Warrants

  1. The SAC will be notified prior to changes in the approved date and time of the execution of the search warrant.
  2. All GS-1811 employees and their managers taking an active, participating role should wear a ballistic vest. The final judgment on whether a ballistic vest must be worn, or whether an exception will be granted, rests with the SSA of the enforcement operation or the search warrant team leader when a SSA is not present (see IRM 9.1.4, General, Primary and Subject Investigations).
  3. Special agents should review 18 USC §3109 to make a valid entrance. If the door is broken upon entry, the government may be required to pay to repair the damage.
  4. Upon entry, the premises must be secured and the search warrant will be read to whoever is in control of the premises.
  5. Assigned special agents will photograph and/or video each site location to identify the condition of the premises upon entry and to assist in identifying the location of evidence seized. Next, the premises will be sketched and rooms labeled.
  6. The volume of records normally seized in a financial search warrant requires a detailed inventory. The CI search warrant computer inventory should be utilized.
  7. Document Manager contains the necessary evidence labels, chain of custody forms, and evidence tracking documents. All evidence that is within the scope of the search warrant will be affixed with the IRS, Criminal Investigation evidence tag.
  8. When a computer is at the site during the execution of a search warrant the following must be considered:
9.4.9.3.5.1 (02-09-2005)
Chain of Custody
  1. Chain of custody is the preservation by successive custodians of the evidence of a crime or any relevant writing in its original condition. Documents or other physical objects may be the instruments used to commit a crime and are generally admissible as such. However, the trial judge must be satisfied that the writing or other physical object is in the same condition as when the crime was committed.
  2. In financial investigations, it may be months or years between the time the evidence is obtained and judicial proceedings. During this time, the documents or other physical objects may have been transferred between two or more special agents or several different special agents may have accessed the original evidence. In order for documents or other physical objects to be admissible as evidence, it is necessary to prove the items are in the same condition as when they were seized, since failure to maintain the evidence in its original condition could jeopardize admissibility.
  3. The custody and storage of seized computers requires additional precautions. The investigating special agent along with the CIS are both responsible to see that the following is maintained in relation to computers:
9.4.9.3.5.2 (02-09-2005)
Identification of Evidence
  1. The witness through whom the instrument is to be introduced into evidence must be able to identify it as being in the same condition as when it was recovered.
  1. Special agents must, therefore, promptly identify and preserve, in its original condition, all evidentiary material that may be offered into evidence. This would particularly apply to records, recordings, videotapes, documents, and other paraphernalia.
  2. Evidence custodians must document and track the transfers of original evidence to establish the chain of custody from initial discovery to the time of judicial proceedings. If original evidence requires examination and analysis by a forensic examiner, the laboratory personnel must maintain their own internal chain of custody procedures. The evidence custodian is only responsible for tracking the original evidence to and from the forensic examiner or laboratory.
  3. Access to original evidence should be kept to a minimum in order to preserve the evidence in its original condition.
  4. Preferably, original evidence should be handled only twice (i.e., when it is gathered and when it is copied). The special agent may then use the copy of the item of evidence while preserving the original from being lost, stolen, or altered.
  1. A special agent who seizes documents or other evidence must immediately identify them by completing all the required information on the evidence tag, including the identity of the person(s) who witnessed the discovery of the evidence. The special agent should then affix a completed IRS CI Evidence Tag to an evidence container (envelope, bag, box, carton, plastic bag, etc.) or the evidence itself. This is the normal procedure for items found during a search warrant. This will allow the official evidence custodian to later testify that this is the same evidence that was seized and is in the same condition as it was at the time of seizure.
  2. If circumstances indicate the marking of original evidence may render the evidence subject to attack on the grounds it has been defaced or is not in the same condition as when seized, the special agent may make a photostat or other copy of the original evidence for markings, comparisons, or for use as an exhibit to his/her report. The special agent should then return the original evidence to its storage container.
9.4.9.3.5.3 (03-27-2013)
Seizing Contraband, Weapons, Currency, and Other Items
  1. Contraband is any property that is unlawful to possess. Narcotics, stolen property, and other contraband should be photographed, seized, and recorded on a separate inventory. When possible, an appropriate Federal or local law enforcement agency should be called to the search warrant scene to take custody of the contraband.
  2. Weapons are not necessarily contraband. When found at search warrant sites, weapons should be cleared and secured. All firearms recovered in the course of the criminal investigation and taken into Federal custody should be traced through the Bureau of Alcohol, Tobacco, Firearms and Explosives (ATF’s) electronic firearms trace submission system (eTrace) at the earliest time practicable. If weapons are legally owned, they should be returned to the rightful owner at an appropriate time after the execution of the search warrant (see IRM 9.7.12, Evidence Seizures, for additional guidance relating to tracing of firearms in connection with criminal investigations).
  3. Currency seized for forfeiture or as evidence falls within prescribed the procedures of IRM 9.7.6, Custody and Storage of Seized Assets. Special agents should review the IRM section for the proper procedures for the handling of currency at search warrant sites. The field office AFC must be notified when currency is seized to ensure the proper storage/deposit of the funds.
  4. Evidence not covered within the scope of the search warrant can only be seized by obtaining a new search warrant or from obtaining the consent of the owner of the property. Form 6884, Voluntary Consent to Search of Person, Premises or Conveyances, (see Document Manager), should be included in the search warrant kit for such instances. Proper planning will foresee outbuildings, garages, vehicles, etc. that will require a separate search warrant.
  5. For computer and/or electronic evidence such as computer hard drives, floppy disks, and computer compact discs (CDs), the evidence will be transferred to the CIS agent. Audio and videotapes should be transferred to the technical equipment agent. These technical personnel have the expertise and specialized training in the proper custody and analysis of such evidence. After processing, he/she can either maintain the original evidence or transfer it to the investigating special agent/evidence custodian along with the working copies that have been processed.
  6. Exit photographs and/or video should be taken to document the condition of the premises at the conclusion of the search. A copy of the search warrant and inventory (not the affidavit) will be left at the premises or with a person in control of the premises. The site will be secured before the team leader leaves the premises.
9.4.9.3.6 (03-17-2011)

Post Operation Search Warrant Procedures

  1. Following the execution of the search warrant, the special agent, pursuant to Fed. R. Crim. P. R 41, will return the search warrant, with an inventory of the items seized, to the issuing magistrate. This return must be done promptly.
  2. The special agent (team leader) will also prepare the Post Enforcement Operation Summary Form, (Exhibit 9.4.9-3), for each search warrant site, as soon as possible. This form is mandatory for all CI search warrants, not just tax, or tax-related search warrants.
  3. Criminal Tax Counsel will be provided with a copy of the inventory to conduct a post search warrant inventory review for all search warrants obtained in Title 26 and tax-related Title 18 investigations. Criminal Tax Counsel will not conduct an inventory review for search warrants obtained in pure money laundering investigations.
  4. A copy of the inventory will be given to the local AFC to ensure that required items are identified and properly inventoried on the Asset Forfeiture Tracking and Retrieval System (AFTRAK).
9.4.9.3.6.1 (02-09-2005)
Preserving the Chain of Custody
  1. In order to preserve, in its original condition, all evidentiary material that may be offered into evidence, seized material such as records, recordings, videotapes, document, and other physical objects should be tracked so the custody and control of the evidence can be documented at all times.
  2. Evidence Tag Log forms will be used to record and track the transfer of evidence. Such forms will also be used jointly with Form 13437, National Forensic Laboratory Request for Service, to record the chain of custody transfer of evidence to a forensic examiner or laboratory. This form was designed for use when any evidence is transferred from one custodian to another. It also enables a custodian to keep track of and retain multiple chain-of-custody forms. For example, use of the form will show a change in an investigating special agent/custodian, transfer of evidence to a forensic examiner or laboratory for analysis, or a temporary transfer of evidence to an AUSA for presentation in a judicial proceeding.
  3. The Evidence Access Control Log form is designed to record and document all access to controlled areas where evidence is stored. The form is formatted to record access to the storage location or a specific evidence storage container such as a wire cage, file cabinet, envelope, box, etc. The official evidence custodian is required to record an access entry no more than one time per day. Everyone else is required to record an access entry for each and every instance when they enter the controlled access area. The "notes" section for each access entry, except those for the official evidence custodian, is used to record specific information about the purpose for entering the controlled access area, identify what evidence was accessed, and specify the reason for accessing the evidence. The form is kept with the evidence at the secured storage location.
9.4.9.3.6.2 (02-09-2005)
Transfer of Evidence
  1. The investigating special agent may request laboratory examination of certain items of evidence. In selecting evidence to be sent to an examiner or laboratory for examination, it may be necessary to remove a selected item from its storage container.
  1. A clearly marked, clean, first generation photocopy of all evidence submitted to the laboratory should be retained in the storage container as a substitute record of items removed and as a record of the condition of these items when they were sent for laboratory analysis. In some instances, ink chemistry and/or latent print examinations will adversely affect the original appearance of the evidence.
  2. The transfer of items for forensic examination or analysis should be recorded on the Evidence Tag form. The form must accompany the evidence along with Form 13437. A copy of both forms should be placed in the evidence storage container(s) along with the copy(s) of removed documents/evidence.
  3. Descriptions of evidence submitted to the examiner or laboratory should be sufficient so that items which are similar in appearance can be distinguished.
  4. "Questioned" and "known/acknowledged " items of evidence should be packaged in separate sealed containers. There are instances where it may not be clear to the examiner or laboratory employees whether normal course of business records are being submitted as "known" or "questioned" items of evidence. "Known" items of evidence can be returned to the investigating special agent after examination while "questioned" items of evidence require further analysis.
  5. Package rolled ink or electronically scanned fingerprint cards in a separate envelope.
  6. Write on the evidence tag and/or storage container prior to putting any evidence in the container. This will prevent accidental impressions on the evidence.
  7. Do not place laboratory request forms, descriptions of evidence, and any chain of custody forms inside of sealed containers holding "questioned" or " known/acknowledged" evidence. Attach the forms to the outside of evidence container so the evidence container seal is in tact until it is time for processing the evidence.
9.4.9.4 (03-17-2011)

Uniform Policy for Search Warrant File Maintenance

  1. In all instances where a CI special agent is an affiant, the following documents will be maintained electronically by the originating group:
  1. Signed Affidavit for Search Warrant
  2. Signed Search Warrants with all attachments
  3. Ex Parte Orders (Order for tax disclosure in non-tax cases)
  4. CT Counsel's pre and post review documents
  5. Enforcement Action Review Form
  6. Risk Assessment Guide for each search warrant site
  7. Search Warrant Checklist
  8. Search Warrant Pre-Operational Plan
  9. Post Enforcement Operation Summary
  10. Signed Search Warrant return, including an inventory of the items seized from each search warrant location
9.4.9.5 (10-05-2007)

Search Warrants and Less Intrusive Methods for Obtaining Stored Wire and Electronic Communications

  1. Title 18 USC §2701 et. seq., specifies how governmental entities may obtain access to stored electronic communications, transactional records, and subscriber records.
9.4.9.5.1 (10-05-2007)

Stored Electronic Communication/Transactional Information/Subscriber Information

  1. Stored electronic communications (defined in 18 USC §2510) includes those electronic messages temporarily stored by an electronic communications service provider prior to delivery to the intended recipient or stored as a backup. The term also includes information stored with a "remote computing service" . The term includes display data stored in digital-display pagers and cell phones, stored electronic mail, stored computer-to-computer transmissions, stored telex transmissions, stored facsimile data, and private video transmissions.
  2. The statute applies only to data stored with an electronic communications service provider. The real-time interception of transmissions to tone-and-voice-pagers is governed by the wiretap statute. (A tone-and-voice-pager enables callers to transmit short voice messages to a subscriber's pager). The acquisition of transmissions to or from display pagers and facsimile transceivers during the transmission(s) requires the approval of the Deputy Commissioner, IRS; an affidavit; an application (which must be approved by the DOJ); and a court order obtained in accordance with 18 USC §2516 and 18 USC §2518 (see IRM 9.4.6, Surveillance and Non-Consensual Monitoring).
9.4.9.5.2 (10-05-2007)

Disclosure of Stored Communications

  1. Title 18 USC §2702 prohibits disclosure of electronic communications by providers of electronic communication services or remote computing services unless one or more of the following conditions is met:
  1. the information is given to its intended recipient or addressee
  2. the information is given to the government pursuant to a court order, search warrant, or subpoena
  3. the subscriber/customer gives consent
  4. the disclosure is to a facility used to forward the communication
  5. the disclosure is incident to testing equipment or quality of service
  6. the information was obtained inadvertently and specifically refers to a crime
9.4.9.5.3 (10-05-2007)

Judicial Process for Obtaining Stored Electronic Communications, Transactional Information, and Subscriber Information

  1. Title 18 USC §2703 articulates the steps that the government must take to compel providers to disclose the contents of stored wire or electronic communications (including e-mail and voice mail) and other information such as account records and basic subscriber information.
  2. Title 18 USC §2703 offers five mechanisms that a " government entity" can use to compel a provider to disclose certain kinds of information. The five mechanisms, in ascending order of required threshold showing, are as follows:
  1. subpoena
  2. subpoena with prior notice to the subscriber or customer
  3. 18 USC §2703(d) court order
  4. 18 USC §2703(d) court order with prior notice to the subscriber or customer
  5. search warrant
9.4.9.5.3.1 (10-05-2007)
Subpoena
  1. Investigators can subpoena basic subscriber information. The ECPA permits the government to compel two kinds of information using a subpoena. First, the government may compel the disclosure of the basic subscriber information (discussed above) listed in 18 USC §2703(c)(2):
  1. name
  2. address
  3. local and long distance telephone connection records, or records of session times and durations
  4. length of service (including start date) and types of service utilized
  5. telephone or instrument number or other subscriber number or identity, including any temporarily assigned network address
  6. means and source of payment for such service (including any credit card or bank account number)
9.4.9.5.3.2 (02-11-2013)
Subpoena With Prior Notice to the Subscriber or Customer
  1. Investigators can subpoena opened e-mail from a provider if they comply with the notice provisions of 18 USC §2703(b)(1)(B) and 18 USC §2705. This notice is not the notice required under 26 USC §7609(a)(3)(A), third-party recordkeepers. In general, internet service providers are not third-party recordkeepers.
  2. Agents who obtain a subpoena, and either give prior notice to the subscriber or comply with the delayed notice provisions of 18 USC §2705(a), may obtain:
  1. everything that can be obtained using a subpoena without notice
  2. "the contents of any wire or electronic communication" held by a provider of remote computing service "on behalf of . . . a subscriber or customer of such remote computing service." - 18 USC §2703(b)(1)(B)(i), 18 USC §2703(b)(2); and
  3. "the contents of a wire or electronic communication that has been in electronic storage in an electronic communications system for more than one hundred and eighty days." - 18 USC §2703(a)
9.4.9.5.3.3 (02-11-2013)
Title 18 USC 2703(d) Order
  1. Special agents need a 18 USC §2703(d) court order to obtain most account logs and most transactional records.
  2. Special agents who obtain a court order under 18 USC §2703(d) may obtain:
  1. Anything that can be obtained using a subpoena without notice.
  2. All "record[s] or other information pertaining to a subscriber to or customer of such service (not including the contents of communications [held by providers of electronic communications service and remote computing service])." See 18 USC §2703(c)(1).
  3. A court order authorized by 18 USC §2703(d) may be issued by any Federal magistrate, district court or equivalent state court judge. See 18 USC §2703(d), 2711(3). To obtain such an order, known as an " articulable facts" court order or simply a "d" order.
9.4.9.5.3.4 (02-11-2013)
Title 18 USC §2703(d) Order with Prior Notice to the Subscriber or Customer
  1. Investigators can obtain everything in an account except for unopened e-mail or voice mail stored with a provider for 180 days or less using a 18 USC §2703(d) court order that complies with the notice provisions of 18 USC §2705.
  2. Agents who obtain a court order under 18 USC §2703(d), and either give prior notice to the subscriber or else comply with the delayed notice provisions of 18 USC §2705(a), may obtain:
  1. Everything that can be obtained using a 18 USC §2703(d) court order without notice.
  2. "The contents of any wire or electronic communication" held by a provider of remote computing service "on behalf of . . . a subscriber or customer of such remote computing service" - 18 USC §2703(b)(1)(B)(ii), 18 USC §2703(b)(2).
  3. "The contents of a wire or electronic communication that has been in electronic storage in an electronic communications system for more than one hundred and eighty days." - 18 USC §2703(a). As a practical matter, this means that the government can obtain the full contents of a subscriber's account except unopened e-mail and voice mail (which has been in "electronic storage" 180 days or less) using a 18 USC §2703(d) order that complies with the prior notice provisions of 18 USC §2703(b)(1)(B).
9.4.9.5.3.5 (02-11-2013)
Search Warrant
  1. Investigators can obtain the full contents of an account with a search warrant. The ECPA does not require the government to notify the customer or subscriber when it obtains information from a provider using a search warrant.
  2. Special agents who obtain a search warrant under Rule 41 of the Federal Rules of Criminal Procedure (Fed. R. Crim. P. R41) or an equivalent state warrant may obtain:
  1. everything that can be obtained using a 18 USC §2703(d) court order with notice
  2. "the contents of a wire or electronic communication, that is in electronic storage in an electronic communications system for one hundred and eighty days or less." - 18 USC §2703(a)
  1. The Preservation Letter requires providers of wire or electronic communication services or remote computing services to retain records for a period of 90-days. This initial 90-day period can be extended for an additional 90-day period upon a renewed request by the governmental entity.
  2. The authority to direct providers to preserve records and other evidence is not prospective. That is, 18 USC §2703(f) letters can order a provider to preserve records that have already been created, but cannot order providers to preserve records not yet made. If agents want providers to record information about future electronic communications, they must comply with the electronic surveillance statutes discussed in IRM 9.4.6, Surveillance and Non-Consensual Monitoring.
9.4.9.5.4 (02-11-2013)

Approval/Authorization for Stored Electronic Communications, Transactional Information, and Subscriber Information

  1. The investigating special agent should consult with the local CIS and Criminal Tax attorney about access to stored electronic or wire communications to determine the proper method of obtaining the desired information. The use of court orders and search warrants to obtain stored electronic information, transactional information, or subscriber information requires approval by the SAC on Form 9809, Request for Stored Electronic Communication/Transactional Information/Subscriber Information. After SAC approval, the Form 9809 must be forwarded electronically to Special Investigative Techniques and Electronic Crimes for filing. The SAC must seek the endorsement of the United States Attorney to apply for a court order to obtain stored electronic communications. Local procedures must be followed to obtain the court order. If preparation of an affidavit is necessary, the local Criminal Tax attorneys opinion regarding the affidavit’s legal sufficiency and form should be obtained. The SAC approval is not required when a subpoena is used for obtaining the information.
9.4.9.5.5 (02-11-2013)

Closing Reports for Stored Electronic Communications/Transactional Information/Subscriber Information

  1. In situations where a court order or search warrant was used, a memorandum will be submitted to Special Investigative Techniques and a copy to Electronic Crimes. The memorandum is due 15 working days after receipt of the information by the field office. The memorandum should contain information identifying the investigation name and number, the allegations involved, the reason the information was acquired, and a description of the information obtained.
9.4.9.6 (10-05-2007)

Computer Searches and Seizures

  1. The search and seizure of data contained in computers, computer networks, and other electronic storage mediums (such as "e-mail" ) present special circumstances for consideration to insure the legality of the search and seizure. Special agents should possess a working knowledge of the fundamental rules of evidence, that are applicable to the execution of computer search warrants. This subsection covers the following topics:
9.4.9.6.1 (10-05-2007)

Computer Evidence

  1. Special agents must use the least intrusive means possible to obtain evidence. Electronic information can be obtained by consent, subpoena, or search warrant.
  2. Consent searches must be voluntarily given and may be limited in scope. Seek consent from the target, employer, or other party with authority established by law.
  3. Always consider the use of a subpoena for computer information not under the control of the target. Subpoena computer records as they exist at the time of service of the subpoena. Direct the recipient to make and safeguard a copy of the requested information, even if they intend to contest the subpoena. Subpoena targets for passwords and encryption keys. A grant of act production immunity may be required.
  4. When deciding whether to search and/or seize one or more computers, there are several issues to consider. Confront the issues early in the investigation if possible. Coordinate procedures relating to pre-search, search, and post search activities with the special agent/computer investigative specialist.
9.4.9.6.2 (10-05-2007)

Applicable Law

  1. Several laws and regulations govern obtaining evidence from electronic sources. These statutes impose restrictions and obligations on the special agent and any operator of public computer services. Review the following before attempting to obtain evidence from electronic sources:
  1. First Amendment to the Constitution
  2. Fourth Amendment to the Constitution
  3. Wiretap Act, 18 USC §2510-2521
  4. Electronic Communications Privacy Act of 1986, 18 USC
    §2701–2711
  5. Privacy Protection Act, 42 USC §2000aa
  6. Fed. R. Crim. P. R41
  7. Federal Rules of Evidence, Sections 901, 1001, and 1002
  8. IRM 9.4.9, Search Warrants, Evidence, and Chain of Custody
9.4.9.6.3 (10-05-2007)

Additional Information

  1. Obtain additional information to secure evidence from computers and other electronic media from the following sources:
  1. Internet Investigation Guidelines written by CI
  2. Computer Investigative Specialist
  3. Federal Guidelines for Searching and Seizing Computers published by the DOJ
  4. Internet Investigation Guidelines published by the DOJ
  5. Division Counsel/Associate Chief Counsel (Criminal Tax)
  6. Computer and Telecommunications Coordinators at the local US Attorney's Office or Assistant US Attorneys that have received special training in the computer crimes subject area
  7. Tax Division, DOJ: Senior Trial Attorney
  8. Computer Crime and Intellectual Property Section, DOJ
9.4.9.7 (10-05-2007)

Probable Cause and Preparation of Search Warrant

  1. When it is anticipated that a computer is on site, the following issues should be considered when obtaining a search warrant. It is recommended that the special agent and special agent/computer investigative specialist discuss the following pre-search considerations:
  1. The best evidence is a paper document or paper computer print out.
  2. Obtain information about the subject'(s) use of computers before the search.
  3. Determine the role of the computer in the offense.
  4. Develop probable cause for evidence contained in computers.
  5. Develop probable cause for each component of the computer.
  6. Participate with the special agent/computer investigative specialist in technical interviews that include computer issues.
  7. Consult Counsel and/or the US Attorney's office on computer issues during the investigation.
  8. The warrant must describe with particularity the places to be searched and the items to be seized. Describe the hardware components of the computer and the software and data domiciled within the computer.
  9. Focus the search warrant affidavit on the evidence sought from the computer. The agent must articulate a factual basis to believe that the computer was used for the creation and/or storage of evidentiary records.
  10. Explain in the affidavit why an on-site search is not reasonable and seek permission to seize the computer and search it later, if applicable.
  11. Investigate the possibility of protected material on the computer. Include a positive statement in the warrant that no "work product material" exists on the computer.
  12. If protected material exists on the computer, state how the protection is not going to be violated. Magistrates can authorize a segregation plan.
  13. Investigate the possibility of e-mail on the computer. Indicate the e-mail status in the search warrant affidavit and the search warrant. Identify in the warrant whose e-mail is going to be read, and if it is subject to search (see 18 USC §2703).
  14. Obtain a "no-knock warrant" if destruction of stored computer data is a concern.
9.4.9.8 (10-05-2007)

The Approach and Search

  1. Consider the following search issues during the execution of the warrant when a computer is on site:
  1. Preserve the chain of custody and integrity of the evidence.
  2. Pre-programmed destructive software can alter and delete data.
  3. Determine where the information is being seized from: a local personal computer, a network computer, or a computer located outside the United States.
  4. Generally, do not seize electronic evidence located outside the United States.
  5. If applicable, work as directed by the Magistrate's segregation plan.
  6. Thoroughly document and photograph the area. Photograph the components of the computers and the cable connections.
  7. Obtain express authority to remove the computer from the site to conduct the search (if not previously granted.)
  8. Consult attorneys after encountering issues such as Privacy Protection Act material.
9.4.9.9 (10-05-2007)

Custody and Storage of Seized Property

  1. Consider the following search issues after the execution of the warrant in relation to computers:
  1. maintain the chain of custody
  2. maintain the integrity of the evidence
  3. follow court ordered segregation plans
  4. document examinations of the computer
  5. return seized items as quickly as possible (if applicable)
  6. obtain a receipt for returned items
Exhibit 9.4.9-1

Sample 18 USC §2703(f) "Preservation Letter"

There is currently no description available for this image. For help with this image, please call the IRS.gov Helpdesk at 1-800-876-1715.

There is currently no description available for this image. For help with this image, please call the IRS.gov Helpdesk at 1-800-876-1715.

Exhibit 9.4.9-2

Risk Assessment Guide

There is currently no description available for this image. For help with this image, please call the IRS.gov Helpdesk at 1-800-876-1715.

There is currently no description available for this image. For help with this image, please call the IRS.gov Helpdesk at 1-800-876-1715.

Exhibit 9.4.9-3

Post Enforcement Operations Summary Form

There is currently no description available for this image. For help with this image, please call the IRS.gov Helpdesk at 1-800-876-1715.

There is currently no description available for this image. For help with this image, please call the IRS.gov Helpdesk at 1-800-876-1715.