Special Investigations
CRIMINAL INVESTIGATIONS, COUNTERINTELLIGENCE,
AND PROTECTIVE SERVICE MATTERS
This volume implements AFPD 71-1, Criminal Investigations and Counterintelligence; DoD Directive 5200.24, Interception of Wire and Oral Communications for Law Enforcement Purposes, April 3, 1978, with Changes 1 through 3; DoD Directive 5210.48, DoD Polygraph Program, December 24, 1984; DoD Directive 5240.5, DoD Technical Surveillance Countermeasures (TSCM) Survey Program, May 23, 1984; and DoD 5240.1-R, Procedures Governing the Activities of DoD Intelligence Components that Affect United States Persons, December 1982. This instruction requires the collection and maintenance of information protected by the Privacy Act of 1974. The authority to collect and maintain this information exists in Title 10, United States Code (U.S.C.), Section 8013. Systems of Records Notice F124 AF C, Criminal Records, also applies. This instruction does not confer upon an individual any rights or privileges that applicable law does not require. See attachment 1 for definitions of terms used in this instruction.
SUMMARY OF CHANGES
Chapter 1 contains significant general investigative and administrative procedures in criminal investigations. Chapter 2 contains procedures for collecting information on non-Department of Defense (DoD) US persons. Chapter 3 contains procedures for counterintelligence (CI) matters. Chapter 4 contains procedures for using the special investigative techniques of forensic hypnosis, polygraph testing, technical surveillance, and technical surveillance countermeasures. It sets up basic procedures for indexing criminal investigations in the Defense Clearance and Investigations Index, investigating drug offenses by persons not subject to the Uniform Code of Military Justice (UCMJ), forming joint drug enforcement teams to combat drug abuse, obtaining personal financial data in criminal investigations, and handling the theft of arms, ammunition, and explosive material. It authorizes an AFOSI source program. It establishes counterintelligence reporting requirements.
Paragraph
Chapter 1--Criminal Investigations
Investigating Criminal Allegations 1.1
Using AFOSI Reports of Investigation (ROI) 1.2
Using the Defense Clearance and Investigations Index (DCII) 1.3
Determining AFOSI and Air Force Security Police (AFSP) Spheres of Influence 1.4
Sexual Misconduct 1.5
Investigating Drugs 1.6
Setting Up Joint Drug Enforcement Teams (JDET) 1.7
Investigating Criminal Matters With the Department of Justice 1.8
Investigating Fraud Offenses 1.9
Obtaining Information From Financial Institutions 1.10
Providing Investigative Support to the Army and Air Force Exchange Service (AFFES) 1.11
Using Counterintelligence and Investigative Contingency Funds (C-Funds) 1.12
Operating the Source Program 1.13
Training Special Agents 1.14
Chapter 2--Acquiring Information About Non-DoD US Persons
US Person Defined 2.1
Authorized Activities 2.2
Prohibited Activities 2.3
Factors To Consider When Acquiring Information 2.4
Operational Guidance 2.5
Operations Related to Civil Disturbances 2.6
Reporting Violations 2.7
Chapter 3--Counterintelligence
Counterintelligence Investigations, Operations, Collections, and Activities 3.1
Counterintelligence Awareness and Briefing Program 3.2
Chapter 4--Specialized Investigative Services
Forensic Hypnosis 4.1
Polygraph Testing 4.2
Requesting Technical Surveillance 4.3
Technical Surveillance Countermeasures (TSCM) 4.4
Page
Attachments
1. Glossary of Terms 13
2. AFOSI and Security Police Investigative Matrix 16
CRIMINAL INVESTIGATIONS
1.2. Using AFOSI Reports of Investigation (ROI). Installation commanders, or designees, must:
1.2.1. Reproduce sufficient copies of ROIs to fulfill their local notification and up-channeling responsibilities.
1.2.2. Ensure that local notifications and up-channeling of information not occur in espionage investigations or other sensitive matters such as undercover operations. NOTE: AFOSI is responsible for notifications in these matters.
1.2.3. Provide ROIs only to authorized persons whose official duties require access.
1.2.4. Prepare extracts or summaries and use them instead of ROIs for court-martial or military administrative boards, civilian disciplinary action and boards, or an officer conducting an investigation according to Article 32, UCMJ.
1.2.5. Check extracts and summaries to ensure that they do not include information that could disclose or compromise a confidential source or a sensitive investigative technique or procedure.
1.2.6. Maintain classified ROIs according to AFI 31-401, Information Security Program Management, and keep "For Official Use Only" ROIs in locked file cabinets.
1.2.7. Destroy "For Official Use Only" ROIs in the same manner as classified ROIs when the need for them has passed.
1.2.8. Notify the local accounting and finance office for recoupment actions if appropriate.
1.2.9. Report promptly to AFOSI all actions that you have taken as a result of an investigation.
1.2.10. Report promptly to AFOSI all disposition instructions for seized evidence.
1.2.11. Ensure that public affairs officials coordinate with AFOSI prior to releasing any information to the public about an investigation.
1.2.12. Send all Freedom of Information Act and Privacy Act requests for AFOSI ROIs to the AFOSI Office of Information Release at AFOSI/DIR, 226 Duncan Avenue, Suite 2100, Bolling AFB DC 20332-0001.
1.2.13. Release ROIs only to military and civilian defense attorneys during the adjudicative process of judicial or administrative actions unless AFOSI prohibits it. NOTE: A defense attorney may disclose information from an ROI to a client only to the extent necessary to help the client assist in his or her own defense.
1.3. Using the Defense Clearance and Investigations Index (DCII). AFOSI indexes incidentals and subjects in the DCII according to DoD Instruction 5505.7, Titling and Indexing of Subjects of Criminal Investigations in the Department of Defense, May 14, 1992, when:
1.4. Determining AFOSI and Air Force Security Police (AFSP) Spheres of Influence:
1.4.1. AFOSI investigates those crimes that AFOSI's AFMD specifies.
1.4.2. AFSP may investigate crimes that the investigative matrix in attachment 2 specifies and to which the installation's AFOSI commander and chief of security police agree.
1.5. Sexual Misconduct. An allegation involving only adult private consensual sexual misconduct is evaluated by an action authority according to DoD Instruction 5505.8, Investigations of Sexual Misconduct by the Defense Criminal Investigative Organizations and Other DoD Law Enforcement Organizations, February 28, 1994. Such an allegation is normally disposed of by an action authority without the investigative services of AFOSI or AFSP. The installation AFOSI commander may not initiate an investigation solely for an allegation of sexual misconduct without a request from an action authority unless approved by the Commander or Vice Commander, AFOSI, except when the allegation involves one or more of the following:
1.6. Investigating Drugs. According to the Manual for Courts-Martial (MCM), AFOSI investigates drug offenses that members of the Armed Forces commit.
1.6.1. According to DoD Inspector General Criminal Investigations Policy Memorandum Number 5, Criminal Drug Investigative Activities, 10 October 1987, AFOSI investigates drug offenses that certain persons not subject to the UCMJ commit.
1.7. Setting Up Joint Drug Enforcement Teams (JDET). AFOSI and AFSP form JDETs when necessary to combat drug abuse.
1.7.1. AFOSI and AFSP should define their operational and administrative tasks in memorandums of agreement.
1.8. Investigating Criminal Matters With the Department of Justice. AFOSI complies with DoD Directive 5525.7, Implementation of the Memorandum of Understanding Between the Department of Justice and the Department of Defense Relating to the Investigation and Prosecution of Certain Crimes, January 22, 1985, in investigating and potentially prosecuting crimes over which the Air Force does not have jurisdiction.
1.9. Investigating Fraud Offenses. AFOSI complies with DoD Instruction 5505.2, Criminal Investigations of Fraud Offenses, July 16, 1990, to investigate major fraud offenses involving DoD programs and personnel and to present them for prosecution.
1.10. Obtaining Information From Financial Institu-tions. AFOSI obtains personal financial data on subjects of criminal investigations according to DoD Directive 5400.12, Obtaining Information From Financial Institutions, February 6, 1980, with Changes 1 and 2.
1.10.1. AFOSI submits the RCS DD-COMP[A]1538, Right to Financial Privacy Act of 1978 Annual Report, to the Secretary of the Air Force, Inspector General, Criminal Investigations and Counterintelligence Directorate (SAF/IGV), by 1 February annually.
1.11. Providing Investigative Support to the Army and Air Force Exchange Service (AAFES). AFOSI is the executive agency for the coordination of criminal investigative support to AAFES.
1.11.1. AFOSI exchanges information with the US Army Criminal Investigations Command (USACIDC) in cases involving concurrent or conflicting responsibilities.
1.11.2. AFOSI conducts criminal investigations at HQ AAFES, oversea AAFES headquarters , AAFES facilities on Air Force installations, and off-base facilities that primarily serve Air Force personnel or installations. AFOSI may refer some criminal allegations to the security police according to attachment 2.
1.11.3. AFOSI must not investigate an individual or activity under Army control without the concurrence of the local USACIDC commander.
1.12. Using Counterintelligence and Investigative Contingency Funds (C-Funds). AFOSI uses C-Funds for any requirement that contributes to counterintelligence and investigative missions or aids in acquiring counterintelligence or criminal investigative information. Title 10, United States Code, Chapter 3, Section 127(a), provides the authority to spend these funds.
1.12.1. Within AFOSI, the:
1.14. Training Special Agents. The Commander, AFOSI, oversees the operation of the US Air Force Special Investigations Academy where all special agents receive training.
ACQUIRING INFORMATION ABOUT NON-DoD US PERSONS
2.2. Authorized Activities. Air Force commanders may gather information that is essential to accomplishing assigned missions, including information about activities threatening DoD personnel and installations, including vessels, aircraft, communications equipment, and supplies. These types of activities warrant information-gathering:
2.2.1. Subverting the loyalty, discipline, or morale of Air Force or DoD personnel by actively encouraging violation of law, disobedience of lawful order or directive, or disruption of DoD activities.
2.2.2. Stealing arms, ammunition, or equipment, or destroying or sabotaging facilities, equipment, or records belonging to US Air Force or DoD units or installations.
2.2.3. Jeopardizing the security of US Air Force and other DoD elements or operations or compromising classified defense information by unauthorized disclosure or by espionage.
2.2.4. Illegally demonstrating on active or reserve Air Force installations.
2.2.5. Threatening Air Force or DoD personnel in connection with their official duties or other persons whom the Air Force has authority to protect.
2.2.6. Endangering facilities that have classified defense contracts or that have received official designation as key defense facilities.
2.2.7. Committing crimes that the Air Force investigates or prosecutes.
2.3. Prohibited Activities. Restrict the collection of information on US persons not affiliated with DoD to that information essential to accomplish assigned Air Force missions. The Air Force prohibits the following activities:
2.3.1. Collecting information about a US person solely because that person lawfully disagrees with US Government policy.
2.3.2. Using physical or electronic surveillance on Federal, state, or local officials, or on candidates for such offices.
2.3.3. Using electronic surveillance on any person except as the law authorizes.
2.3.4. Assigning, without specific prior approval by the SECAF, Air Force personnel to attend public or private meetings, demonstrations, or other similar activities to acquire information that this instruction authorizes.
2.3.4.1. Commanders must send each request to SAF/IG. SAF/IG reviews each request and processes it for SECAF approval when a threat to Air Force Resources exists. EXCEPTION: A local commander or higher authority may forgo obtaining SECAF approval when the threat is direct and immediate and insufficient time exists to seek prior approval. The commander must send SAF/IG a report explaining the details and circumstances of each incident.
2.3.5. Maintaining computerized databanks on US persons who are not affiliated with DoD. The Deputy Under Secretary of Defense for Security Policy (DUSD[SP]) provides the approval for exceptions.
2.3.5.1. Commanders must send each request for an exception to SAF/IG, which processes it and, in turn, sends it to DUSD(SP) for approval, if appropriate.
2.4. Factors To Consider When Acquiring Information. Commanders shall consider the political factors outside the United States in reaching a decision to collect and maintain information to protect Air Force and DoD personnel and property. Relevant factors include the:
2.7. Reporting Violations. Report all suspected violations of this instruction to the Inspector General for the area in which the violation occurred.
COUNTERINTELLIGENCE
3.2. Counterintelligence Awareness and Briefing Program:
3.2.1. AFOSI is the installation-level training agency for Counterintelligence Awareness briefings.
3.2.2. Air Force commanders ensure that their personnel receive briefing on the counterintelligence threat that foreign intelligence services (FIS) pose and on the requirements of this instruction.
3.2.2.1. Air Force commanders seek to instill in their personnel a high level of awareness of the threat to classified, sensitive, and proprietary information from foreign sources as well as from inadvertent or deliberate disclosures by cleared personnel.
3.2.2.2. Military personnel must receive recurring awareness briefings upon permanent change of station or at least every 3 years.
3.2.2.3. Civilian employees must receive recurring briefings at least every 3 years.
3.2.3. The Air Education and Training Command (AETC) provides military members with their initial awareness briefing during basic training or precommissioning programs.
3.2.4. Air Force commanders ensure that military personnel entering the Air Force directly through means other than AETC and civilian personnel receive the briefing during their initial assignment.
3.2.5. Other defense components acquiring military and civilian personnel must brief them according to DoD Directive 5240.6, Counterintelligence Awareness and Briefing Program, February 26, 1986.
3.2.6. Trainers tailor the briefing for the audience and include:
SPECIALIZED INVESTIGATIVE SERVICES
4.2. Polygraph Testing:
4.2.1. Requesting US Air Force Polygraph Tests. Air Force organizations with responsibility for security, law enforcement, or the administration of criminal justice and DoD Components that receive investigative support from the Department of the Air Force may request US Air Force polygraph tests using this procedure:
4.2.1.1. Submit requests by message or letter to the nearest AFOSI unit.
4.2.1.2. The AFOSI unit sends the request to the AFOSI Investigative Operations Center, Polygraph Office (IOC/PLG), for approval. Include:
4.3. Requesting Technical Surveillance:
4.3.1. Requesting Nonconsensual Interceptions of Wire, Oral, or Electronic Communications. To request a nonconsensual interception of wire, oral, or electronic communication in the United States, AFOSI prepares a Request for Authorization in accordance with DoD Directive 5200.24 and sends it to the Secretary of the Air Force, General Counsel (SAF/GC).
4.3.1.1. For interceptions that will occur in the United States, SAF/GC sends the Request for Authorization through the Deputy Assistant Secretary of Defense, Counterintelligence, Security Countermeasures (DASD [CI/SCM]), to the Department of Defense, General Counsel (DoD/GC), for approval to seek a court order.
4.3.1.2. The official making the request coordinates with an attorney from the Department of Justice or the US Attorney's office to prepare the documents needed to get a court order as shown in 18 U.S.C. 2518. The Department of Justice attorney sends these documents to the Attorney General or to the designated Assistant Attorney General for approval, as shown in 18 U.S.C. 2516.
4.3.1.3. The attorney from the Department of Justice, with a military lawyer from the SJA's office, formally applies for a court order once the Attorney General or appropriate designee has approved the request.
4.3.1.4. If the interception will occur on a military installation, the installation commander signs an AF Form 1176, Authority To Search and Seize, after seeking the advice of the installation SJA to ensure that all legal requirements are met.
4.3.2. Requesting Nonconsensual Interceptions of Wire, Oral, or Electronic Communications Abroad. To request approval for nonconsensual interceptions of wire, oral, or electronic communications abroad, AFOSI initiates and processes the request following procedures outlined in paragraph 4.3.1. Then:
4.3.2.1. If the target of the interception is subject to the UCMJ, and if DoD/GC approves the request, AFOSI formally applies to a qualifying military judge for a court order using the rules in 18 U.S.C. 2518(1). The military judge processes the request in accordance with DoD Directive 5200.24.
4.3.2.2. If the target of the interception is a person who is not subject to the UCMJ, DoD/GC decides whether to approve the request and what further approval the request needs.
4.3.2.3. The SAF/GC determines if a situation warrants an emergency approval for the nonconsensual interception. If yes, the SAF/GC must handle the approvals according to DoD Directive 5200.24.
4.3.3. Requesting Consensual Interceptions of Wire, Oral, or Electronic Communications. To request approval for consensual interceptions of wire, oral, or electronic communications, AFOSI sends a request prepared in accordance with DoD Directive 5200.24, to SAF/GC, which returns a written approval or disapproval.
4.3.3.1. The Commander of AFOSI approves emergency requests for consensual interceptions in accordance with DoD Directive 5200.24 when before written approval can not be obtained from SAF/GC.
4.3.3.1.1. AFOSI makes a written record of all emergency requests, including justification for the emergency action, and forwards it to SAF/GC within 72 hours of the emergency approval.
4.3.4. Requesting Pen Registers and Trap-and-Trace Devices. To request approval for the use of nonconsensual pen registers and trap-and-trace devices, AFOSI prepares a request in accordance with DoD Directive 5200.24 and sends it to SAF/GC for approval to seek a court order.
4.3.4.1. In emergency situations, the Commander, AFOSI, approves seeking the court order.
4.3.4.1.1. AFOSI makes a written record of each emergency request, including a justification for the emergency action, and forward it to SAF/GC within 72 hours of the emergency approval.
4.3.4.2. Within the United States, and after the approval to seek the court order, AFOSI agents request the local Assistant US Attorney to apply to the appropriate court, in accordance with 18 U.S.C. 3122, for an order authorizing the nonconsensual pen register or trap-and-trace operation.
4.3.4.3. Abroad, in cases in which the target of the operation is a person subject to the UCMJ or the trace is to involve a military installation, a judge advocate may apply for a court order to a military judge that The Judge Advocate General of one of the Armed Forces specifically designates.
4.3.4.3.1. The judge advocate makes a written application under oath for the court order or extension of a court order in accordance with DoD Directive 5200.24.
4.3.4.3.2. If applicable legal requirements are met the military judge enters an ex parte order authorizing the installation and use of a pen register or a trap and trace device according to DoD Directive 5200.24.
4.3.4.4. To conduct consensual trap-and-trace operations on a military installation, the requesting AFOSI office submits a request to the installation commander, who decides whether to approve the operation after coordinating with the servicing staff judge advocate.
4.3.4.5. For consensual trap-and-trace operations on military installations abroad, the operation must comply with any applicable SOFA and foreign law.
4.3.5. Waiving Interception Policies. The Secretary of Defense approves all waivers to policy regarding interception of oral, wire, or electronic communication. HQ USAF/JA or a designee coordinates all waivers and sends them through the Secretary of the Air Force, Administrative Assistant (SAF/AA), and SAF/GC to the Secretary of Defense.
4.4. Technical Surveillance Countermeasures (TSCM):
4.4.1. Requesting TSCM Services. Air Force or DoD entities or contractors responsible for a secure or proprietary area where classified information is discussed on routine basis are authorized to submit written requests for a TSCM survey to the servicing AFOSI detachment. CAUTION: Do not telephone AFOSI when requesting a TSCM survey. Include:
4.4.10.2. The OPR must program for the required resources. Failure to do so results in delay or denial of TSCM services.
4.4.11. Distributing TSCM Information. The Air Force TSCM Program Manager approves all reports and information that AFOSI generates and distributes under the TSCM Program. Recipients of those reports or information may not distribute them further except as noted here:
4.4.11.1. If the TSCM survey report identifies a condition that requires corrective action by another organization such as the telephone company or civil engineers, the facility security manager gives them an unclassified extract from the report. Extracts must not divulge AFOSI association or the significance of the problem with regard to technical security.
4.4.11.2. Recipients of information regarding suspect or actual technical surveillance devices and TSCM methods or equipment release this information only if the Air Force TSCM Program Manager has specifically approved the release.
Action Authority--Usually an installation commander or higher authority primarily responsible for taking judicial or administrative action in an AFOSI investigation.
C-Funds--Emergency and Extraordinary (E&E) Expense Funds are used to further the counterintelligence and investigative missions of the Air Force. This subdivision of operation and maintenance (O&M) funds is allocated to AFOSI, through SAF/IG, by the Secretary of the Air Force (SECAF) under a legal limitation to reimburse investigators for authorized expenses that they have incurred in the performance of their assigned duties.
Credible Information:
Defense Clearance and Investigations Index--A computerized, central index of investigations for all DoD investigative activities that the Defense Investigative Service (DIS) manages. The eight contributors to the index are:
Incidentals--Any person or entity associated with a matter under investigation and whose identity may be of subsequent value for law enforcement or security purposes.
Indexing--The recording of information so that an orderly retrieval process can identify and access a particular file or investigation.
Interception--According to 18 U.S.C. 2510(4), the aural acquisition of the contents of any wire or oral communication through use of any electronic, mechanical, or other device. The term "contents," when used with respect to any wire, oral, or electronic communication, includes any information concerning the substance, purport, or meaning of that communication.
Items of Security Interest--Items noted during the course of a TSCM survey that have a bearing on the overall security of the facility but are not serious enough to be considered security vulnerabilities. Examples of such items are:
Oral Communication--Any oral communication uttered by a person exhibiting an expectation that such communication is not subject to interception under circumstances justifying such expectation, but such term does not include any electronic communication. (18 U.S.C. 2510[2]).
Pen Register--A device that records or decodes the numbers dialed or otherwise transmitted on the telephone line to which such device is attached. This term does not include any device that a provider or customer of a wire or electronic communication service uses. The term can refer to any device that a provider or customer of a wire communication service uses for cost accounting or other like purposes. (18 U.S.C. 3127[3]).
Proprietary Area--An area where:
Report of Investigation--The official written record of an AFOSI investigation. The record copy of all investigations is maintained at AFOSI/DIR, 226 Duncan Avenue, Suite 2100, Bolling AFB DC 20332-0001, and destroyed according to AFMAN 37-139, Records Disposition--Standards (formerly AFR 4-20, Volume 2).
Security Vulnerability--A deficiency in the physical or technical security safeguards of an area that could permit access to the area by uncleared or unauthorized personnel or facilitate a covert surveillance or the installation of a technical surveillance device.
Sexual Misconduct--A sexual act or acts (heterosexual or homosexual) in violation of Title 10, U.S.C., Chapter 47, UCMJ, Sections 801-940, that occur between consenting adults, in private, on or off a military installation. It does not include any sexual act or acts that involve allegations of force, coercion or intimidation; abuse of position or rank; fraternization; persons under the age of 16; or conduct that relates directly to applicable security standards for access to classified information.
Sexual Orientation--An abstract sexual preference for persons of a particular sex, as distinct from a propensity or intent to engage in sexual acts.
Subject--A person, corporation, other legal entity, or organization about which credible information exists that would cause a reasonable person to suspect that party to have committed a criminal offense or would make the party the object of a criminal investigation.
Summary--A condensed version of a report of investigation that succinctly discusses the allegation and results of the investigation. It may include copies of statements. A judicial or administrative proceeding may use a summary.
Technical Security--Security measures taken to prevent the installation of technical surveillance devices and the exploitation of security vulnerabilities.
Technical Surveillance--All activities associated with installing and operating equipment for the audio, optical, or electronic recording or monitoring of people, places, things, data, or any wire, oral, or electronic communication. Technical surveillance does not include use of viewing equipment (such as binoculars, night vision devices, or telephoto lens-photographic camera combinations used for viewing only) while doing a physical surveillance.
Technical Surveillance Device--A device installed to covertly monitor or record activities in a target area.
Technical Surveillance Penetration--A deliberate, unauthorized, covert placement of a device, or the covert employment of a technique, that allows the monitoring of activities within an area for the purpose of gaining information.
Titling--Placing the name of a person, corporation, other legal entity, organization, or occurrence in the subject block of an investigative report. Titling is an operational rather than a legal decision. Final responsibility for the decision to title an individual or entity rests with AFOSI. Titling and indexing do not, in and of themselves, imply any degree of guilt or innocence.
Trap-and-Trace Device--A device that identifies the originating number of an instrument or device that transmitted a wire or electronic communication. (18 U.S.C. 3127[4]).
TSCM Program Manager--The individual that the Secretary of the Air Force or designee appoints to manage all facets of the Air Force TSCM Program. The TSCM Program Manager has approval authority for all activities conducted according to this instruction. Except where otherwise noted, the TSCM Program Manager may delegate approval authority.
TSCM Survey--A TSCM survey is a service that highly specialized Special Agents of AFOSI or similar DoD agencies provide to detect the presence of technical surveillance devices and hazards and to identify technical security vulnerabilities and items of security interest. A TSCM survey provides a command with a professional evaluation of the facility's technical security status. It normally consists of a thorough visual, electronic, and physical examination.
United States--For this instruction, the 50 states of the United States, the District of Columbia, the Commonwealth of Puerto Rico, and any territory or possession of the United States.
US Person--For this instruction, US citizens, aliens admitted to the United States for permanent residence, corporations incorporated in the United States, and unincorporated associations organized in the United States and substantially composed of US citizens or aliens admitted for permanent residence.
User--Any person or entity who uses an electronic communication service and whom the provider of the service has authorized.
Wire Communication--Any aural transfer made in whole or in part through the use of wire, cable, or other like connection between the point of origin and the point of reception (including the use of such connection in a switching station). The term includes any electronic storage of such communication but does not include the radio portion of a cordless telephone communication that takes place between the cordless telephone handset and the base unit. (18 U.S.C. 2510[1]).
Table A2.1. AFOSI and Security Police Investigative Matrix. | |||
R |
|
|
|
U |
|
|
|
L |
|
|
Air Force Security Police |
E | If case category is | AFOSI about: | about: |
1 | Assault | aggravated assault involving serious bodily harm or requiring extensive investigation; and serious child abuse or serious neglect that involves infliction of serious bodily harm. | simple assaults excluding serious child abuse or serious neglect. |
2 | Bad Checks | cases involving ring-type* activity, numerous utterances at various installations, or high-dollar accumulation. | cases as necessary to support command. |
3 | Black Market | large black-market transfers, ring-type activity, and those activities involving coordination with host-country investigative agencies. | localized cases involving low-value items. Notify AFOSI when subject has TOP SECRET clearance or sensitive access. |
4 | Bribery | all. | none. |
5 | Counterfeiting |
|
|
6 | Customs Violations | major violations, those requiring coordination with Federal agencies outside the local area, or ring-type activities. | localized investigations resulting from security police customs inspections. |
7 | Death Investigations--Murder, voluntary and involuntary manslaughter, suicide, and death by unknown causes | all except deaths in vehicle accidents, natural deaths, and deaths without criminal intent. | all vehicle accidents not involving hit-and-run, and all deaths not involving criminal intent or intent to commit suicide. |
8 | Drug Abuse |
|
localized investigations involving use or possession. (Conduct field tests on security police cases. Participate with AFOSI in joint operations involving dealers.) |
9 | Forgery | major forgery cases involving the US Treasury or other Federal agency. | localized forgery matters not involving US Federal agencies. |
10 | Fraudulent Enlistment, Appointment, or Discharge | all. | none. |
11 | House Breaking | cases involving ring-type activity or aggravated assault. | localized cases. |
12 | Impersonation--Assuming a false identity | all except minor localized incidents. | Localized incidents in which the only goal was to impress others and that did not involve pecuniary gain or the US mail as a transmittal vehicle. |
13 | Intimidation--Extortion, kidnapping, attempted bombings, hijackings, and terrorist acts | all, unless deferred. | Bomb threats and localized threats to injure or extort money or favors from others in which no overt act actually occurred. |
14 | Improper Use or Diversion of Government Property | major cases and those involving manipulation or falsification of records. | minor localized incidents. |
15 | Larceny By Fraud--Manipulation or falsification of records, receipts, inventories, and so on to cover thefts | all. | none. |
16 | Larceny of Government Property |
|
localized investigations, including low-value thefts of AA&EM unless you suspect fraud or terrorist activity. |
17 | Larceny of Private Property | major cases involving high-value or ring-type activity. | localized incidents involving low-dollar value thefts. |
18 | Misconduct--Attempted suicides, bigamy, and so forth | bigamy, attempted suicides, and ring-type activity. | localized investigations of suicidal gestures or misconduct. |
19 | Perjury--False official statements. | cases involving leads to other locations or requiring the submission of evidence to the FBI or other Federal crime laboratory. | other localized incidents. |
20 | Postal Violations | all. | none. |
21 | Procurement, Disposal, and Pay-and-Allowance Matters |
|
pay-and-allowance matters involving low-dollar value loss, as necessary to support command. |
22 | Property Destruction--Arson, bombing, intentional damage to US Air Force aircraft or aircraft equipment, and intentional damage to Government or private property | aggravated arson, intentional damage to US Air Force aircraft or Priority A, B, or C resources, and intentional damage to high-value Government or private property. | other localized incidents. |
23 | Robbery--Armed and unarmed | robberies involving serious bodily harm, ring-type activity, appropriated and nonappropriated fund activities, and on-base private financial institutions. | localized cases of unarmed robbery involving low-dollar amounts. |
24 | Security Violations | cases that the command specifically requests. | cases to support command responsibilities according to AFI 31-401. |
25 | Sex Offenses--Rape, carnal knowledge, sodomy, indecent exposure, sexual misconduct, voyeurism, and child molestation | rape, sodomy, carnal knowledge, child molestation, or cases involving serious bodily harm. | localized investigations, including carnal knowledge, indecent exposure, sexual misconduct, and voyeurism on a case-by-case basis. (Notify AFOSI if suspect has TOP SECRET clearance or sensitive access.) |
26 | Terrorist Acts--Bombings, hijackings, kidnapping, and thefts of weapons, explosives, and so on | all. | none. |
27 | Environmental Crimes | all. | none. |