TITLE 20: CORRECTIONS, CRIMINAL JUSTICE, AND LAW ENFORCEMENT
CHAPTER II: DEPARTMENT OF STATE POLICE
PART 1295 CERTIFICATION AND TRAINING OF ELECTRONIC CRIMINAL SURVEILLANCE OFFICERS
SECTION 1295.50 RECORDING AND MINIMIZATION STANDARDS
Section 1295.50 Recording and Minimization Standards
Electronic Criminal Surveillance Officers shall comply with the minimization standards required by the Act and this Part:
a) Minimization requires that the intercepting officer must use his/her judgement and background knowledge of the criminal investigation and its participants, together with facts and circumstances that develop in the overheard conversations, to refrain from intercepting nonpertinent, innocent, or privileged conversations as they take place.
b) Judgements concerning minimization decisions shall be based on the knowledge possessed by the interception officer at the time of the decision. Examples of factors to be considered are as follows:
1) The nature and scope of the criminal activity being investigated.
2) The use of ambiguous, guarded, coded, or foreign language.
3) The location of the telephone or facility.
4) The expectation of the intercepted conversation containing statements relating to criminal conduct.
5) The likelihood of the interception containing privileged communications.
c) Officers authorized to supervise the interception of private oral communications shall, if possible, ascertain the identities and phone numbers of targeted conspirators, spouses, attorneys, clergymen, and physicians. Such available information shall be disseminated to all officers charged with responsibility for intercepting the referenced communications in order to assist in identifying potentially privileged communications.
d) Minimization shall be a simultaneous process involving the cessation of audio interception, monitoring and recording, and the registering of such information. All such transactions shall be documented on the Intercept Log.
e) Spot monitoring of apparently privileged and nonpertinent conversations shall be permitted in order to ensure that such conversations do not lose their privileged and innocent character. This process shall be used to safeguard against instances where conspirators assume the identities of privileged parties to initiate nonpertinent conversations to mask criminal communications. All such spot monitoring shall be reflected on the Intercept Log.
(Source: Amended at 25 Ill. Reg. 15626, effective November 21, 2001)