Skip navigation

Confidential Informants and Information, IACP, 2008

Download original document:
Brief thumbnail
This text is machine-read, and may contain errors. Check the original document to verify accuracy.
IACP National Law Enforcement Policy Center

Confidential Informants and Information
Concepts and Issues Paper
Originally Published: June 1990
Revised: December 2003, October 2008
I. INTRODUCTION
A. Purpose of Document
This paper was designed to accompany the Model Policy on
Confidential Informants established by the IACP National Law
Enforcement Policy Center. This paper provides essential background material and supporting documentation to provide
greater understanding of the developmental philosophy and
implementation requirements for the model policy. This material
will be of value to law enforcement executives in their efforts to
tailor the model to the requirements and circumstances of their
communities and their law enforcement agencies.
B. Background
Undercover tactics, including the use of confidential informants, are best viewed as a “necessary evil.”1 Confidential informants can provide investigators with specific information that is
not available from other sources. At the same time, informants
are often criminals. They can render a law enforcement investigation useless, destroy an agency’s credibility, and endanger officers’ lives if not properly managed.

II. Types of Information Sources
Although the focus of this document is on confidential informants (CIs), law enforcement administrators and investigators
should be reminded of the other information sources available to
them. In addition to official agency records (offense reports, fingerprint records, criminal history reports, crime analysis reports,
and the like), there are many resources that should not be overlooked. While certain precautions should be taken, most of these
sources do not involve the same risks, problems, and costs associated with CIs.
A. General Sources
Valuable information may be obtained from other investigators and officers in one’s own or nearby law enforcement agency,
other criminal justice officials, the department of motor vehicles,
utility companies, banks, credit reporting agencies, and many
others. Perhaps one of the best general sources of information
and intelligence is the beat officer.

B. Citizen Sources
Victims, witnesses, and concerned citizens, including
Neighborhood Watch members, comprise this category.
Generally, these people are credible, and their information is useful. Citizen sources, however, are not without potential problems.
A preexisting relationship with the suspect may damage the
source’s credibility. It may also give rise to actions and statements
motivated by a desire for revenge or retribution.
In addition, citizens who are “frustrated cops” may present
problems. Some may imagine themselves unofficial extensions of
the law enforcement agency, or they may have vigilante attitudes
or motives. While their information cannot be disregarded, caution should be used before it is acted upon. Investigators will
need to determine the source’s credibility and verify the information provided by testimony from others, from documentation,
and from other investigative measures. A distinction must be
drawn between anonymous tips from the public and those in
which individuals identify themselves or provide information
that has “predictive value” that can be authenticated by police
officers.
This issue most often comes into play when officers need reasonable suspicion or probable cause to conduct a “stop and frisk”
or seek a search or arrest warrant, respectively. Therefore, this
issue is addressed in the Model Policy and Concepts and Issues
Paper on Arrests published by the IACP National Law
Enforcement Policy Center.
As a general principle, law enforcement agencies should
encourage and support citizens reporting potentially useful
information in a suspected crime. Further, citizens and citizen
groups may be cultivated as information sources by providing
them with instructive material on the relative importance of various types of information and the overall need for detail.
Recognizing that citizens may place themselves at risk of retribution by providing information, caution and anonymity should be
encouraged, and their confidentiality should be closely guarded.
C. Street Sources
In general, these are persons who come into frequent contact
with law enforcement officers because of their occupations, activities, or place of residence. They include bar, restaurant, and hotel
employees; prostitutes and pimps; newspaper vendors; cab drivers; and employees of late-night establishments, such as gas sta-

A publication of the IACP National Law Enforcement Policy Center
515 N. Washington St., Alexandria, VA 22314-2357
This document is the result of work performed by the IACP National Law Enforcement Policy Center. The views and opinions expressed in this document are sanctioned by the
center’s advisory board and do not necessarily represent the official position or policies of the International Association of Chiefs of Police.

tions and convenience stores.
Street sources may accept money for information, but may be
more interested in developing relationships with officers that will
allow them to function with minimal law enforcement intervention. In addition to yielding information about crime and criminals, these sources may suggest persons who could be used as
confidential informants.
Street sources can be valuable, but like confidential informants, they can pose dangers. They might deceive or mislead,
entrap, or provide seemingly valuable information that takes
many hours to prove or disprove. Their information must be
investigated and corroborated.

A. Lying
CIs may exaggerate or fabricate the criminal acts of targets.
Some may report truthfully, but may lie about having used illegal methods to obtain the information. Their motives may range
from wanting to receive high marks from officers to fancying
themselves as “super sleuths.”
B. Double-dealing
CIs can make deals with targets as easily as they can with the
police, using both sides to their advantage. They may not be
faithful to either side, yet remain trusted by both. CIs might provide criminal associates with information about the identity of
undercover agents, including what cars they drive, hours they
work, their tactics, and agency procedures. Further, they may be
plants who continue their criminal activities and monitor police
operations while eliminating competitors. Money may be the
motive for addicts, gamblers, and alcoholics to get involved in
double-dealing. Other CIs may do so to help cover their informant activities or ingratiate themselves with criminal associates.

D. Confidential informants
A confidential informant can be defined as an individual,
who, in an arrangement with law enforcement authorities, agrees
to serve in a clandestine capacity to gather information for those
authorities on suspected criminal activity or known criminal
operatives in exchange for compensation or consideration.
Even when CIs are not criminals, their requisite association
with criminals demands utmost caution in using and rewarding
them. The risks of using CIs should not be minimized, as experience has shown there are numerous risks in their use. To be of
value as a CI, a person should have one or more of the following
characteristics:
1. Knows, has been associated with, or has intimate
knowledge of one or more active criminals.
2. Is associated with, or has intimate knowledge of, persons practicing a crime specialty such as bank robbery,
drug sales, or perpetrating crimes in a specific geographic area.
3. Has an occupation or residence that lends itself to gathering information about criminals and their plans to
commit crimes.
4. Has status in the criminal justice system, that is, is on
pretrial release or bail; probation or parole; convicted
pending sentencing; incarcerated; or other status. In
many instances, this provides the person with requisite
“credentials” showing that he or she can be trusted by
persons engaged in criminal activity.
5. In addition, the CI should meet three criteria before performing work for the law enforcement agency. He or
she should:
• Be willing to work under the direction of an investigator and to perform certain lawful acts as directed.
(The investigator assigned primary responsibility
for the informant is generally referred to as the handler.)
• Be willing to exchange information for monetary or
other lawful consideration.
• Be a private citizen and not a member of a law
enforcement agency.

C. Rip-offs
The CI is in a position to arrange rip-offs of large flash rolls.
They have been known to sell government property used in
investigations or to pledge it as collateral for loans. They may sell
the same information to two different agencies, causing them to
unwittingly conduct simultaneous investigations. A major violator arrested by one agency may sell information to another
agency about a relatively minor operation and receive a lenient
sentence for doing so.
D. Blackmail
Officers who get too close to informants may begin to sympathize with their problems and bend the rules. Eventually, the CI
may obtain incriminating information concerning the officer,
who then loses control and, in effect, is directed by the CI.
Developing a good understanding of an individual CI and his
or her motivation for becoming a source can greatly help to avoid
some of the risks involved in the CI’s use. One must ask: what is
motivating this individual to become a CI?

III. What Motivates Informants?
It is often said that law enforcement must retain the “upper
hand” in dealing with informants, but accomplishing this is not a
simple matter of exerting authority. Further, a written agreement,
while necessary, may hardly be considered binding by an informant who has strong incentives to see that others—including law
enforcement—are exploited.
Understanding what motivates the CI can be the key to retaining control over his or her activities. Before enlisting the services
of a CI, the investigator must determine not only who the individual is, but also why he or she wants to become an informant.
Further, these perceived motives must be monitored over time. A
change of motivation may alert investigators to potential problems in the way the CI is operating or may signal the CI’s desire
to end the relationship with the agency.
There is considerable agreement among law enforcement professionals on the reasons individuals become informants. Among
the most significant motivators are the following:
1. Money. One caution here is that when information is
scarce, the CI may become “creative” to maintain the

II. Risks Associated with Informants
Investigators must treat CIs courteously, develop a trustbased relationship, offer encouragement and praise, and make it
clear that the agency has high expectations of them. Successfully
directing and monitoring CIs also requires that officers never
place their full trust or safety in informants’ hands. Officers must
have an acute awareness of potential problems such as those
described below.
2

flow of funds.
2. Revenge, spite, or retaliation. This can be based on perceived mistreatment by associates, jealousy, and interpersonal conflicts.
3. Elimination of competition. This is accomplished through
diversion of suspicion.
4. Fear. A motivator that may include fear of current or former associates or fear of public safety officials, resulting
in the desire for protection from law enforcement.
5. Self-aggrandizement. Some CIs seek to enhance their
image or sense of self-importance. There will be obvious
difficulties in ensuring that such persons keep their
identities confidential.
6. Prosecutorial or judicial leniency. Serious problems can
occur when an investigator makes promises of leniency
that the agency is not authorized to keep.
7. Repentance. Some agencies choose to avoid persons who
seemingly attempt to make amends for past wrongdoing because they doubt their sincerity or perceive them
as emotionally unstable.
Finally, it is important that the investigator accept whatever
the CI’s motivations and either work within that context, or
choose not to contract with the individual.

When an arrangement is established to use and cultivate a source
for a protracted period in return for monetary or other consideration, a confidential informant relationship exists and steps must
be taken to determine the individual’s long-term suitability for
such an arrangement.
The model policy provides a list of potential informational
items that should be considered when completing an initial CI
suitability report, including the individual’s relationship with the
target and the potential to gain useful information, probable
motivation of the person, his or her prior criminal history, and
whether the potential CI or his or her family or relatives would
be at risk if the individual were to serve as a CI. Assessments
tools such as these can be valuable, but only if officers take them
seriously and provide sufficient information to make informed
decisions. This is not always the case. Experience has shown that
written initial suitability assessments do not consistently address
specific risk assessment factors. To be of value, suitability statements must detail the specific benefits of using a confidential
source despite identified risk factors. Written comprehensive
suitability assessments are not only valuable for screening and
management by the initial handler but they can also be of value
to other officers who may want to use the informant. The suitability reports are also essential in determining the nature and
scope of monitoring that is required of a particular source.
The model policy also recommends that each CI’s suitability
should be reviewed annually, at a minimum, and that all officerCI contacts should be documented and included in the CI file.
The use of continuing suitability reports and documentation of
contacts with CIs help determine whether the risk of using a
source has changed since the initial evaluation. Moreover, any
information that would negatively affect a CI’s suitability during
the course of his or her use should be forwarded to the chief of
detectives or other designated source for information and appropriate action. Regular review of informant files by supervisory
officers and their periodic participation at CI debriefings are
valuable checks on the worth of CIs and the manner in which
they are being managed by officer-handlers.
In addition to routine suitability assessments of CIs, there are
several categories of informants that require special evaluation
and approval. These include the following four categories of
individuals.

IV. Informant Screening
The law enforcement agency can reduce the risks associated
with using CIs by developing sound informant screening and
management procedures. The model policy recommends that
before an officer may use an informant, the officer must complete
an Initial Suitability Report pertaining to the potential CI and
submit it to the appropriate investigative authority in the department for review and approval. This report provides a relatively
thorough review of the potential CI’s risks and benefits to the
department.
One of the most significant problems that can confront an officer and his or her supervisor is selection of an unsuitable informant. Close initial screening of potential informants and continued supervision and evaluation can prevent or mitigate inappropriate selection. The model policy suggests the use of both initial
and continuing suitability reports as one means to this end.
The initial suitability report should be completed and the individual approved by the departmental authority before he or she
is used as an informant. The objective of the initial suitability
report is twofold. First, it is designed to develop essential preliminary information on a potential informant to create a profile
for the master file. Second, the report is intended to provide
answers to certain basic questions that will provide a sufficient
basis to intelligently judge an individual’s utility and suitability
as an informant. Determination of suitability can only be
achieved if reporting officers are diligent in providing sufficient
information and making informed judgments about the risks and
benefits associated with each individual.
Officers may occasionally use street sources without going
through this process and may even provide these sources with
some nominal compensation or reward for assistance or information. This type of source is normally not a confidential informant in the true sense of the term or in the context of this discussion. It is generally not necessary for officers to complete suitability reports for such street sources unless and until the relationship evolves into a more permanent arrangement of expected information in exchange for compensation or consideration.

V. Special Informant Categories
A. Juvenile Informants
Juveniles are perhaps the most problematic of informants,
requiring a great deal of deliberation prior to their use and supervision if they become CIs. When it becomes necessary to obtain
information about activities involving juveniles, the difficulties
and dangers involved in informant use are multiplied.
Juvenile gangs or peer groups tend to be difficult for law
enforcement to penetrate. Juveniles are not necessarily eager to
communicate with adults in general and particularly with law
enforcement. Even if they do not fear physical retaliation, they
face being ostracized by their peers.
Juveniles who volunteer information or who, during normal
interrogation, provide information to the police are not the primary concern. While they may place themselves in precarious or
even dangerous situations by providing such information, it is
the traditional form of confidential informant that can and has
been the most troublesome and controversial.
3

One option that has been employed in the past is to place
young (or young-looking) police officers, often fresh from their
basic recruit training, in high schools and other juvenile groups
in undercover roles. However, this technique is limited by the
small number of suitable officers available, the need for such officers in other duties, and, of course, the difficulty of successfully
“planting” a stranger in a segment of society that is difficult to
penetrate by outsiders. Therefore, not surprisingly, some officers
attempt to recruit informants from among the juvenile population itself.
Juveniles, like adult informants may be of several types.
Perhaps most common is a juvenile who has been apprehended
for an offense and who offers, or accepts an offer, to act as an
informant in exchange for prosecutorial consideration.
The use of a juvenile informant presents several special risks.
First and foremost is the physical risk to the juvenile. Any police
informant runs some degree of risk of exposure, the exact degree
of danger depending upon many factors, such as the type of
crime and the experience of the informant. With juvenile informants, such risks may be greatly magnified. A juvenile is often
more vulnerable to detection and retaliation than an adult informant. The danger is directly proportional to (1) the seriousness of
the criminal activity and (2) the relative youth of the informant.
For example, a street-wise 17-year-old recruited to inform about
unlawful tobacco use in a high school is probably going to be in
less physical danger than a 12-year-old elementary school student sent to inform upon drug dealers. However, even an apparently minor case may involve considerable physical risk to a
juvenile informant.
A secondary risk is the possibility that a juvenile informant
will compromise an investigation. A juvenile may be less steadfast in motivation, less able to avoid detection, and less able to
withstand pressure once suspected by the persons upon whom
he or she has been sent to inform. Identification of the informant
by the suspects not only poses a severe risk to the safety of the
informant, but also ends that informant’s usefulness and can
result in the collapse of the entire police investigation.
Finally, there is the risk to the officer and the department from
public outcry and even civil liability if the use of the juvenile
informant results in his or her injury or death. Unfortunately,
there have been a number of instances nationwide in which this
precise situation occurred.
Perhaps the best-known case in which a juvenile police informant came to harm involved a 17-year-old named Chad
MacDonald. In 1998, police in California arrested MacDonald on
drug charges. He agreed to act as an informant for police, wearing a recording device during at least one drug buy and providing police with other information about local drug trafficking. A
short time later he was found dead in an alley, apparently tortured and strangled. His girlfriend was found raped and shot to
death in a canyon. MacDonald’s death was believed to have been
the result of his association with the police as an informant, and
the family brought a civil action against the jurisdictions
involved. The incident resulted in the passage of California legislation severely limiting the use of juveniles as informants.
Known as “Chad’s Law” the California code prohibits the use
of persons twelve years old or younger as informants. It also prohibits the use of persons under the age of 18 unless a court order
is obtained, with the exception of their use in enforcement of
statutes prohibiting the purchase of alcohol or tobacco by juveniles. The incidence of civil suits and court decisions unfavorable
to law enforcement is increasing. In addition, many law enforce-

ment agencies are promulgating departmental policies governing
use of juvenile informants.
Considering the significance of these issues, officers have an
unavoidable responsibility to make sound judgments. Even wellintentioned officers with zeal to pursue criminal activity may
take chances with the well-being of youths that the officer is not
fully aware of and that the department might not sanction if so
advised. This is often the case when officers strike informal deals
with youthful suspects who are looking for a way to avoid prosecution. Such deals may also be a proposition that a parent may
feel compelled to accept to protect the youth (and possibly the
parents) from the social stigma of an arrest and potential juvenile
prosecution. In other cases, some parents or guardians may not
be adequately informed to understand the risks inherent in informant operations. Therefore, their authorization to use their child
in such capacities cannot always be relied upon by police as the
basis for informed consent. Parental permission, even when
required by policy, practice, or law, does not always provide
police officers with sufficient justification, and should not be
used as the sole condition, for using juveniles as informants.
Some police departments have chosen to ban the use of juveniles as informants entirely, while others subject such decisions to
more rigid command scrutiny or have no clear policy on this
issue. The model policy takes the position that unless an officer is
guided by state or federal law, or departmental policy, he or she
must be able to clearly define a compelling public interest that
will be served before a youth may even be considered for such a
role. Furthermore, that justification should be reviewed and an
approval obtained by the department’s chief executive or his or
her designee. For example, a compelling public interest might be
demonstrated in situations where failure to enlist a juvenile as a
confidential informant would result or be reasonably likely to
result in loss of life; serious injury; or have such serious consequences to persons, property ,or public safety as to demand such
action.
B. Individuals Obligated by Legal Privilege of Confidentiality
The most common examples of persons in these occupational
classes are members of the news media, clergy, attorneys, and
medical doctors. However, state laws vary on the classes of occupations afforded privileges of confidentiality. Such privileges
may extend in various ways to licensed mental health counselors,
clinical social workers, and alcohol and drug abuse counselors,
among others. In these and other realms, gray areas may exist.
This is particularly the case with regard to various types of pastoral counselors and school guidance counselors.
Additionally, there are a number of federal and state regulations that require physicians, clinicians, and others who are normally afforded confidentiality to report certain acts (for example,
child abuse) or the discretion to report certain conditions (for
example, reporting a positive HIV test result to a parent or legal
guardian). Federal regulations and state laws also govern confidentiality of medical information and mandate disclosure and
reporting under certain circumstances. [45 Code of Federal
Regulations § 164.512(a-b)]
As such, a decision to accept or solicit information from
sources such as these can be a complicated legal matter and inclusion of persons in these classes should be weighed by competent
legal authority.
C. Government Officials
This category of individuals includes persons in high-level
4

• Are the crimes or those participating in them violent or
likely to become violent? Clearly, certain types of
crimes, and certain types of perpetrators, pose a greater
threat to an informant.
• To what extent does the criminal enterprise pose a
threat to the community? Certain criminal enterprises
have been in existence throughout history and,
although they must be combated, temporary interference may not justify risking an informant’s life.
• How urgent is the specific case? Is the particular criminal enterprise against which action is being considered
one that must be terminated immediately (for example,
a proposed imminent terrorist attack)? Or is it one that
can be allowed to continue for a time in order to develop further leads as to perpetrators and related enterprises without endangering the safety of the community, (for example, a petty theft ring)?
• What is the likelihood of death or injury to citizens,
police, or others if information about the criminal enterprise is not obtained quickly?
• Perhaps the most important inquiry about the criminal
enterprise in question is this: Is the enterprise of such a
nature that it may be combated by means other than the
use of informants? Some types of criminal activity can
only be thwarted through information obtained from
the inside, but other situations may lend themselves to
the use of other methods, for example, external electronic surveillance. Thus, the degree of necessity of the
use of informants should be a major consideration in the
decision as to whether or not informants should be
used.

and sensitive local, state, and federal governmental positions or
their associates who have access to privileged information.
Persons in these types of positions are more likely to come forward with information than to be recruited as confidential informants. They are generally referred to as whistleblowers. Police
dealings with these individuals generally require a great deal of
caution and inquiry as to the person’s background and potential
motives. There is a general image of whistleblowers as champions of the common good and protectors of the public interest,
driven by self sacrifice or moral indignation. However, whistleblowers are often driven by lesser motives. They may have an ax
to grind against one or more people within the government or
the governmental entity as a whole. Police agencies and their
employees, as part of the same governmental structure, must also
be wary of whistleblowers who may simply be using police
authority to further political motivations and agendas.
Persons in these positions may also be reaching out to police
authorities because of a real or imagined inability to deal with
problems internally and see the police (or sometimes the press) as
the only alternative. At the same time, the issues that concern
them may not rise to the level of criminal offenses. In many cases,
they are ethical matters or allegations concerning breaches of
administrative or civil law. Matters relating to patronage, cronyism, trading of influence, conflicts of interest, and the like are not
within the investigative responsibilities of local law enforcement.
Bribery, graft, embezzlement, and kickbacks, while criminal
offenses, are normally investigated by state or federal regulatory
authorities or by the Federal Bureau of Investigation.
Allegations brought forward by governmental employees
should be referred to the local prosecutor and subsequently to the
state attorney general through the chief of police for action rather
than being investigated by local police agencies.

B. The Risk to the Informant
• What are the extent, imminence, and severity of the risk
to the informant if his or her undercover role is discovered? Would discovery result in serious injury or death,
or have some lesser result? For example, would discovery merely cause the informant to be excluded from further participation in the activity? Or would the informant be subject to physical abuse, including possible
torture and murder?
• What is the informant being asked to do? For example,
is the informant only being asked to observe passively
and report, or is the informant being asked to take an
active role, for example, wearing a recording device or
transmitter? The more active the role, the greater the
threat of discovery and its related consequences.
• What safeguards are in place to prevent the informant’s
role from being discovered? Is knowledge of the operation and of the informant’s identity properly restricted
in the department to those with a need and a right to
know? If there are written records of the informant’s
identity, are these properly restricted from unnecessary
access or circulation? Are statements to the media properly circumscribed to avoid revelation of the possibility
that information has been or will be received from the
inside?
• Have secure methods of communication with the informant been established? One of the most common causes of discovery by criminals is observation of contact
between an informant and police.
• If the informant is to be left inside after providing infor-

D. Wards of the Corrections Authority
This includes persons who are in the custody of local or state
departments of corrections or under their supervision in the community through probation, parole, supervised release, or other
programs. It may also include persons who are current or former
participants in the federal witness security program.
Persons serving sentences have been used in many cases to
gather information on targeted individuals in local jails and correctional institutions. While their credibility is often questioned
in court proceedings, they can, and often do, provide information
that can benefit investigations whether or not their testimony is
required in open court. The motives of these individuals must
always be considered as they invariably offer to serve as confidential sources in return for reduced sentences or similar
rewards. As such, their use is dependent on approval of the correctional authority as well as the office of the prosecutor or state’s
attorney.

VI. Final Determination on Informant Use
When all the available information on a potential CI has been
assembled, a determination must be made concerning the costs
and benefits of that person’s usage. The following are additional
issues that should be considered when making this decision.
A. The Criminal Enterprise to be Targeted
• How serious are the crimes involved? Are they misdemeanors or felonies? If felonies, what type?
5

reluctant to seek written consent, fearing a refusal or
hesitancy to create a paper trail that may have later
adverse results. However, an undocumented consent is
open to later denial, with subsequent repercussions in
the event of a civil suit.

mation, is the information that was provided being protected from revelation to unnecessary persons? Further,
if action is taken based upon that information, is there a
plausible alternative basis for that action that will conceal from the criminals the fact that there has been a
leak?
• Will police be able to extract the informant from danger
in the event of discovery? Do the police have the capability to determine that the informant is suspected or
discovered? If so, what plans are in place to extract the
informant before being harmed?

E. Value of the Operation if Successful
• What will be the gain to the community if the informant’s efforts are successful? How important is it to
society that the criminal activity be thwarted?
• Will the benefits justify the risks taken by the informant
and the possibility of harm or death? Departments
should consider very carefully the moral implications of
their decision when making their risk-benefit analysis
of the situation.

C. The Nature of the Informant
One of the most critical issues in determining whether or not
to use an informant is the type and nature of the informant to be
used. For example:
• How old is the informant? The younger the informant,
the greater his or her vulnerability, the greater the risk
of failure, and, sadly, the greater the culpability of the
police if the informant comes to harm.
• Regardless of age, is the informant mature and intelligent enough to understand the risks involved? No
informant should be sent into harm’s way without a full
understanding of the dangers associated with the mission.
• What is the informant’s level of experience and ability,
that is, is this informant sufficiently acquainted with the
criminal enterprise and those engaging in it to deal with
contingencies that may arise while cooperating with
police? For example, will this informant be able to conceal his or her actual status from criminal associates?
Will he or she be quick-witted enough to deflect suspicion if it arises? And, in a worst-case scenario, will the
informant be able to resist physical duress until he or
she can be extracted from danger?
• Is the informant offering services to the police voluntarily, or is the informant under some form of compulsion?
As noted earlier, some individuals volunteer information, and even offer to act as informants on a continuing
basis. Others act as informants in the hope of avoiding
prosecution or reducing punishment. Police must judge
not only the type but also the level of motivation of the
informant. A weakly motivated informant is highly vulnerable, with possibly catastrophic consequences both
to the informant and to the investigation.

F. Consequences of Failure
What will be the consequences of failure of the operation to
the informant? To the department? If the use of an informant
results in death or injury, the department will at the very least
become the focus of widespread media and community criticism,
and civil action is likely. Further, not only this operation but
other, future operations may be compromised.
G. Balance of Risks and Benefits
Is the degree of risk worth the potential benefit? This question
must be carefully considered, and the answer weighed with cool
professional judgment. Anyone who sends an informant into
danger bears a heavy burden of responsibility. Therefore, no
effort must be spared to create and enforce policies that provide
an acceptable balance between the needs and risks involved.

VI. Managing the Informant
Informant management is discussed throughout this document with respect to completion of suitability reports, informant
vetting, establishment of confidential informant files, and supervisory oversight. In addition, there are several principles of handling informants and directing their activities that should be
mentioned as they are common problem areas in dealing with
informants.
With the priority status currently given to drug-related
crimes, the use of confidential informants will continue to be an
important investigative resource. If the practice is accepted as a
necessary evil, then it is incumbent on law enforcement agencies
to institute the necessary controls, protect and support its investigators, and understand the legal limitations involved in using
informants. Even these generally accepted rules can be problematic in terms of implementation. For example, when using informants in drug investigations, it is often very difficult for police to
completely prohibit all levels of criminal involvement by informants. The informant agreement provided in the model policy
explicitly states that unlawful behavior perpetrated by confidential sources is prohibited. The willingness of police and prosecutors to turn a blind eye to certain forms or levels of criminality in
order to gain criminal intelligence from informants or use them
in controlled buys or other capacities is an issue that has been
widely debated. It is an issue that all law enforcement agencies
must address directly if they are to employ informants in drug or
other investigations.
Prosecutors face analogous situations when determining
whether the costs of mitigating sentences for offenders is worth

D. Consent
• In the case of juveniles, are parents or guardians aware
of the proposed activity, and do they consent to it? Some
parents will not consent, and such a refusal may require
termination of any consideration of the use of that juvenile. Police should note that, even where parents have
consented, if the juvenile is harmed, the parents may
later claim that they did not understand the full implications of the consent. This contention is virtually universal in instances where a lawsuit is filed.
• Does the informant consent to undertake the risks?
There are two issues of great importance here: (1) have
the risks been adequately described, and (2) is the informant mature and intelligent enough to understand the
risks described?
• Have these consents been documented? Officers may be
6

the benefits of information they are willing to provide towards
the arrest and prosecution of other criminal offenders. The difference is that prosecutor’s have the legal authority to make such
decisions while law enforcement does not.

closely with the public safety role of the officer and come to view
him- or herself as an authority figure. The officer may also
become too familiar with and involved in an informant’s personal life.
The model policy recognizes that the cooperative agreement
between police and informants can sometime blur the line of
authority between handlers and CIs who are working toward a
common objective or in a shared mission. Increased informality
can breed casualness and a relaxation of the formal bounds that
must exist between the police and the CI. In this environment, an
informal social relationship may be established in which officers
feel comfortable in conveying information that goes beyond that
which is necessary for the job at hand. CIs might use such information to compromise their handler or other officers.
As such, the model policy admonishes officers to not reveal
confidential or sensitive information about police operations,
plans, or activities unless it is absolutely necessary for the operational purposes of the informant. In order to maintain defined
roles, officers are also cautioned not to establish social relationships or become personally involved with a CI beyond that
which is required in the performance of duty. Finally, when meeting with informants, officers should be required to do so with
another officer present whenever it is reasonably possible.
There is another side to this issue as well. Police departments
have an overriding interest in the mental health and safety of
their investigators. An alert, well-trained supervisor may recognize problems with a CI’s behavior that the investigator does not.
The supervisor may determine that an investigator is identifying
too closely with the CI or a criminal lifestyle or is under excessive
stress because of an association with a CI. The potential for corruption is inherent in any law enforcement activity conducted in
secret and the risks associated with uncontrolled officer-CI relationships have repeatedly proven to be dangerous. The department must also protect itself against the possibility that officers
may explain corrupt activities by claiming their criminal associates were informants.
Supervision of handlers and proper reporting of all contacts
with CIs are essential in each of the foregoing contexts. The exigencies of police work often set the stage for officers to make
informal deals with offenders or suspects in order to gain rapid
access to information that they feel is crucial to an investigation.
Officers may not want to complete the more lengthy process of
gaining approval for such actions that might result in the loss of
the opportunity immediately presented. Such police relationships are commonplace. But such informal relationships, if maintained for protracted periods, carry risks for officers and their
department if not ultimately reported to and vetted by a supervisor.

A. Who “Owns” the Informant?
Investigators may be reluctant to establish or to fully update
department files on informants they use. They may fear that
potential informants will not participate if they know records of
their activities will be on file. They may not believe departmental
security procedures will be effective in protecting informants’
identities and may fear that incompetent or corrupt law enforcement personnel will gain access to their informants’ names.2
Another concern is that a supervisor or another investigator will
destroy a trust relationship built with a considerable investment
of effort and time.
The IACP model policy, however, is based on the view that the
department, rather than the individual investigator, must ultimately control use of informants. CIs are assets of the police
agency, not the individual police handler. As the discussions on
CI characteristics and motives suggest, CIs present significant
risks to the integrity of investigations and to officer safety. The
department as a whole has an interest in seeing that important CI
information is available to all personnel with a need and right to
know. The agency is also responsible for ensuring that buy
money is used appropriately and accounted for properly.3
B. Fishing Expeditions
CIs should not normally be used to gather information on persons without a reasonable basis to believe that the person is
involved in criminal activity. Investigations that are not based on
reasonable suspicion are a poor use of confidential informants
who should be used in targeted criminality. They are also largely
unfocused, give CIs undue discretion, and can promote an entrepreneurial cop-like self-image among informants and informant
freelancing that may result in creating rather than preventing
crime or arresting perpetrators.
C. Political Information
The emphasis in the use of CIs must be on criminal investigations. Attempts to gather information on individuals for purely
partisan reasons are unacceptable. These actions are specifically
prohibited in the model policy due to significant historical precedent. Dossiers have been kept on important people in the political arena or others deemed “enemies” by federal, state, and local
politicians through the investigative and intelligence resources of
police agencies. Such activities were perhaps most common during the upheaval of the 1960s and 1970s, when leaders and participants of reform and political activists’ movements were the
targets of investigations intended to discredit them and their
causes, often through leaks to the press, intimidation, and other
means. While these types of activities are far less common today,
periods of heightened domestic and political unrest, either
nationally or locally, can create the same type of pressure-filled
environment as they have in the past.

VII. Legal Use of Informant Information
It is essential that law enforcement officers understand how
the concept of probable cause may be developed for lawful
arrests and searches involving the use of CIs. While hearsay is
admissible to establish probable cause, the legal determination of
probable cause requires detailed knowledge of the objective
information and the source of the information.
In Aguilar v. Texas, 378 U.S. 108 (1964), the U.S. Supreme Court
created a two-part test for establishing reliability in a case where
information received from a confidential informant was the basis
for probable cause for a warrant. This required (1) establishing
the credibility of the informant and (2) establishing the reliability

D. Defining and Maintaining Proper CI-Handler Roles
A common concern in dealings with CIs in general and the
handler in particular is maintenance of professional distance
between the CI and the officer. When dealing with a CI on a routine basis it is not uncommon for either one or both to develop
informal, personal relationships. The CI may begin to identify too
7

of the informant’s information. The informant’s credibility might
be evidenced by his track record of providing information that
led to a certain number of arrests and convictions. For a CI with
no track record, credibility might be established by the CI’s having admitted to a crime. Establishing the reliability of the CI’s
information could be accomplished by stating the CI had direct
knowledge of the facts.
Later, Illinois v. Gates, 462 U.S. 213 (1983), which expressly
overruled the Aguilar test, established the “totality of the circumstances” test to determine whether probable cause exists. In this
case, an anonymous letter was considered adequate to establish
probable cause. The letter contained no information that established the CI’s credibility; rather, credibility was inferred from
the level of detail the letter provided. Gates eliminated the
requirement that both parts of the Aguilar test—reliability and
basis of knowledge—be met for an affidavit based on a CI’s
hearsay. Currently, while a clear demonstration of the CI’s reliability will reduce the need to show the CI’s basis of knowledge, a
detailed basis of knowledge might conversely obviate the need to
demonstrate past reliability. Thus, under Gates, courts will look to
the strength of corroboration to satisfy probable cause in the
absence of a showing of the CI’s veracity or basis of knowledge.
In the vast majority of cases that involve CI’s, every effort is
made to keep them out of the courtroom. However, when the CI
must appear as a witness, the handler, that is, the CIs primary
law enforcement contact, will need to ensure the CI is well prepared. Accurate department records are essential in preparing
the CI for intense questioning in court. Questions must be anticipated about the CI’s background, details of the CI’s relationship
with the defendant, specifics about the department’s relationship
and transactions with the CI, and, in drug cases, a host of additional questions regarding drug transactions and their documentation.
Law enforcement officers and prosecutors adamantly object to
disclosure of the CI’s identity at trial, but this position is not
always upheld. Disclosure will depend on the circumstances of
each case. The courts will attempt to strike a balance between the
need to protect both the CI and the law enforcement agency’s
need for informants and the defendant’s Sixth Amendment right
to confront witnesses. When the court determines the CI’s identity is essential to a finding of probable cause, his or her identity
must be disclosed or the evidence suppressed. When ordered to
produce a CI in a hearing or trial for questioning by defense
counsel, the law enforcement agency and prosecutor’s office
must weigh the ramifications of disclosure of the CI’s identity
against the damage of terminating the charges and case. The following are some of the circumstances in which a court may rule
that a CI’s identity be disclosed:
• The sole government participation in the offense was
that of the CI.
• The CI witnessed a drug transaction or participated in
negotiations related to the transaction.
• The CI was an active participant in events leading up to
the offense.
Law enforcement agencies should consider using CIs in ways
that will not call for court disclosure of identity. In drug cases, for
example, these include the following:
• Using the CI only for introductions and having the
undercover officer develop the relationship with the target and execute the transaction.
• If the CI must be present, instructing the CI to leave as
soon as possible after negotiations or transactions begin.

• Making the CI’s testimony cumulative. If the target can
be persuaded to bring a friend, the CI’s testimony might
be cumulative to what others present would say, and his
or her identity may not need to be revealed.
• Prohibiting CI involvement in the planning functions of
an operation beyond providing information.
In determining the usefulness of a CI’s testimony to the
defense, some jurisdictions conduct in-camera hearings, where
the trial judge questions the CI in private about the nature of the
CI’s possible testimony.
In general, officers need not reveal a CI’s identity on applications for arrest or search warrants, particularly when the “totality of the circumstances” attests to the presence of probable cause.
Short of that, the judicial authority should be petitioned to seal
the document from public record. Where documents, such as
arrest reports are available to the public, they should scrupulously avoid providing details of a CI’s involvement in the arrest.
However, in this and all other legal matters, the agency should
consult counsel well versed in applicable federal and state law.
As another means of protecting confidential sources, it should
be impressed upon officers that upon leaving employment with
the department, they have an obligation to maintain the confidentiality of CIs.

VIII. Pitfalls in Using CIs
There are essentially three types of pitfalls that can negate the
possible benefits of using confidential informants. The first type
concerns an agency’s readiness to use CIs to full advantage. The
second concerns the supervisor’s readiness to direct, control, and
evaluate CI-related activities. The third type concerns the investigator and whether he or she is prepared to assume the responsibilities of control officer.
A. Agency Pitfalls
After an agency decides to use CIs, the agency can fall into
five major traps. The first is a failure to issue written directives
that set forth policies and procedures. Agencies can avoid this
pitfall by developing sound informant-control procedures based
on those set forth in the model policy.
The second pitfall is a failure to define roles and responsibilities of all persons in the chain of command, from the chief executive officer (CEO) to the investigator. The model policy addresses the need for clearly defined roles in several key areas: 4
• Access to informant files shall be restricted to the CEO,
the commander of criminal investigations, or their
designees.
• The commander of criminal investigations should be
responsible for developing and maintaining master
informant files and an indexing system.
• The commander of criminal investigations should
approve all requests from sworn personnel to review an
individual’s informant file.
• An authorized supervisor must approve any officer’s
use of a CI.
• Whenever possible, an officer shall be accompanied by
another officer when meeting with a CI.
Some investigators can be expected to disagree with the last
item requiring accompaniment to CI meetings. Ideally, the officer
who recruited the informant should be the designated control
officer and should be responsible for directing and monitoring
the CI. Whether that officer should work with the CI alone, or
8

should do so as part of a two-officer team, has been a subject of
debate.
Those who favor the one-officer approach cite these advantages: CIs who are particularly sensitive about confidentiality
may be more likely to cooperate; the potential for personality
conflicts is reduced; and more information or cooperation may be
forthcoming. The model policy, while it acknowledges that
exceptions may be necessary, reflects the more significant advantages of the two-officer approach: a more objective relationship
with the CI can be maintained; setups are more easily avoided;
and a better assessment of CI performance results. Two-officer
meetings are essential when the CI and control officer are of the
opposite sex, when the CI is a juvenile, and when the CI presents
other exceptional risks (for example, is suspected of trying to set
up the control officer; is emotionally unstable; is a substance
abuser; is on probation or parole; or has a reputation for perjury,
bribery, or related offenses). Agencies that permit an officer to
meet with a CI alone should require a contact report immediately following each meeting.
The third agency pitfall is a failure to orient and train its personnel in techniques for working with CIs. The model policy
does not specifically address the issue of personnel training for
managing CIs, but it should be considered implicit in the document’s general policy statement.
Too frequently, officers pay insufficient attention to giving CIs
a good cover, use risky procedures to communicate with them,
fail to evaluate whether the CI can do what is asked, and fail to
take security and confidentiality measures that help ensure the
long-term value of the CI. Investigators do not come with an
innate ability to manage informants effectively without training.
Failure to provide officer training may jeopardize investigative
efforts and officer safety, as well as negate the time, effort, and
resources invested in developing the CI. Training should include
a thorough briefing on agency policies, procedures, and required
documentation and explicit instruction on recruiting CIs, directing and monitoring CI activities, interviewing and debriefing
informants, preparing informants for court, evaluating CI performance, and other relevant topics.5
The fourth and fifth agency pitfalls are failures to orient and
train CIs in what is expected of them (including an explicit set of
“dos and don’ts”) and failure to execute a written agreement.
These pitfalls are addressed in the model policy, which includes
a sample informant agreement. The investigator should thoroughly review each provision of the agreement with the CI, placing particular emphasis on the following points:
• Informants have no law enforcement powers and are
not permitted to carry weapons while performing activities as informants.
• Informants will be arrested if found engaging in any
illegal activity and will receive no special legal considerations.
• Informants will not take, and the department will not
condone, any actions that may be considered entrapment.
There are obvious risks to the agency’s credibility, officer safety, the integrity of individual cases, and liability concerns when
CIs misrepresent themselves as officers or commit crimes. The
first point, that CIs are not law enforcement employees, should
be reinforced by several specific items in the informant agreement. For example, in the sample agreement accompanying the
model policy, the CI affirms his or her status as an independent
contractor and acknowledges that as such he or she is not entitled

to Workers’ or Unemployment Compensation. The agreement
also prohibits the CI from using the agency as an employment or
credit reference without prior approval.
Entrapment is a frequently used defense in drug cases.
Entrapment occurs when the government plans the offense and
induces someone to commit it—someone who would not have
otherwise done so except for the government’s persuasion, fraud,
or trickery. If a CI entraps or appears to entrap a defendant, the
court may throw out all or part of the case. Further, to prove that
entrapment did not occur, the CI may have to testify, thereby
revealing his or her identity.
Certain illegal actions on the part of an informant may raise
the defense of “outrageous conduct,” which is related to entrapment. The defense may assert that the government’s conduct was
so outrageous or shocking to fundamental fairness that due
process would bar a conviction. For example, the CI may become
over-involved in the criminal activity of the target. In one case, a
CI persuaded the defendant to purchase her narcotics by using
sexual intimacy. The model policy and sample informant agreement list the main items that should be covered in informant
agreements. Of course, additional requirements can be added to
meet the special needs of a particular investigation or informant.
In addition, a more explicit list of “dos and don’ts” should be prepared and reviewed with the CI, and can be incorporated by reference in the agreement. Finally, training for Cls should address
the CI’s specific objectives, compensation procedures, communication with and reports to the control officer, cover stories, security, legal constraints, and other topics.
B. Supervisory Pitfalls
Pitfalls in four main areas could cause problems for supervisors. These include
1. Poor selection of an informant or poor selection of an
informant to work with a given investigator;
2. Failure to provide adequate direction and control
regarding investigator-CI interactions;
3. Failure to take reasonable precautions in cases involving “special CIs”; or
4. Failure to periodically evaluate activities and results.
Avoiding the first two pitfalls on informant selection and control entails (1) ensuring that supervisors receive the training
needed to execute their responsibilities effectively and (2) establishing procedures that require a supervisor to provide initial
approval before an officer uses an individual as a CI.
“Special CIs” include those of the opposite sex of the investigator, juveniles, and CIs who are in or out of custody pending a
prosecutorial or judicial outcome. Precautions regarding opposite-sex CIs are implicit in the model policy’s prohibitions against
knowingly maintaining social relationships or becoming personally involved with CIs. Similarly, a series of special permissions
will be required before probationers and parolees can be used.
Some states prohibit use of these individuals as CIs. (For additional discussion on this topic, please refer to section V. A. above.)
Supervisors should be trained in these requirements and should
be responsible for ensuring that their investigators are compliant.
The fourth pitfall for supervisors concerns a failure to periodically evaluate activities and results. The model policy recommends, at a minimum, annual reevaluations of CI performance
and suitability. Other reporting requirements should be established by individual agencies, such as weekly supervisor/investigator briefings, quarterly reports, or semiannual inspections.
Departments should ensure that their existing reporting require9

ments and inspection policies are adequate to cover the sensitive
area of managing CIs, and that adjustments are made as necessary.6

do not include the informant’s name or photograph. They do
include details about the CI’s appearance, age, marital status,
special skills, current place of employment and residence, and
other details.
Before a potential CI is approached, the supervisor should
provide authorization, which should entail a determination that
the candidate is not working for another investigator and has not
been deemed unreliable. A CI file should be opened only after the
officer has conducted a background investigation and an authorized supervisor has approved the CI.

B. Investigator Pitfalls
In general, pitfalls for investigators tend to fall into five categories:
1. Failure to maintain a professional relationship with the
CI.
2. Gullibility, failure to fully question the CI about his or
her activities and not seeking corroboration from other
sources.
3. Making promises that the agency cannot keep regarding
large money payments or favorable prosecutorial or
judicial outcomes.
4. Lack of sufficient attention to handling money and
property, especially controlled substances.
5. Failure to adequately document CI activities.
Problems in the first three areas were discussed earlier and
underscore the critical need for professional training and sound,
written informant control procedures. The fourth area is
addressed in separate model policies on managing confidential
funds and on evidence processing. The management of informant funds is an issue of particular importance that is addressed
in detail in the IACP Model Policy on Confidential Funds. To
address the fifth area—documenting CI activities—the model
policy on confidential informants includes considerable detail on
establishing an informant file system, as discussed below.

B. Using Unreliable Informants
Some CIs may be extremely reliable (for example, they always
follow procedures, keep appointments, handle money responsibly), but seldom produce information that is relevant or sufficiently accurate. Others may be considered unreliable (for example, they endanger an officer or engage in criminal activity), but
deliver consistently accurate information or have unusual access
to an important target. Thus, in certain exceptional situations, it
may be productive to use a CI who has been deemed unreliable.
The decision to use an unreliable CI should be made only by the
CEO or designee after determining that the potential outcome is
worth the extraordinary risks involved.
C. Securing CI files
Tight security of CI files is imperative for officer and CI safety
and to ensure the integrity of the entire informant management
system. As stated in the model policy, CI files should be maintained in a secured area within the criminal investigations section. Access should be restricted to the CEO, commander of criminal investigations, or their designees. A written request from
other sworn personnel should be approved by the commander of
criminal investigations before access to an individual informant’s
file is permitted. Of course, informant files should be closed to
the public. Other precautions may include the following:
• Keeping the files in locked cabinets segregated from any
other files and under the control of a supervisor.
• Requiring that all files removed from the storage area be
viewed in the same location and be returned as soon as
possible
• Screening requests for access to CI files based on a need
to know.
• Requiring that records are kept of all access to CI files
• Auditing the files (for example, semi-annually) to
ensure they are maintained properly and that security
procedures are being followed.

IX. CI Information and Its Management
The model policy summarizes the four uses for an informant
file system.
1. Provides a source of background information about the
informant.
2. Provides a complete history of the information received
from the informant.
3. Enables review and evaluation by the appropriate
supervisor of information given by the informant.
4. Minimizes incidents that could be used to question the
integrity of investigators or the reliability of the CI.
A. Key Elements of an Informant File System
Master informant files should be established—one on confidential informants and one on unreliable informants—and an
indexing system should be developed and maintained. These
files should be established under the direction of the commander
of criminal investigations. Within the master files, a separate
folder should be maintained on each CI used by officers. Each of
these individual files should be coded with an assigned informant control number.
Essentially, the master files on confidential informants are the
operational or “working files.” Included in each CI’s file are the
signed informant agreement, briefs of information provided, and
indications of the information’s reliability. These individual files
also contain the informant’s name and other identifiers (for
example, fingerprints, photograph, criminal history record). The
CI’s status as active or inactive should be clearly indicated. If a CI
is determined unreliable, that CI’s folder should be placed in the
master file on unreliable informants. For the indexing system, a
summary should be prepared to correspond to each CI file. These
summaries are coded with the informant’s control number, but

X. Conclusion
One expert on managing informants has observed that “all the
intelligence analysis in the world cannot overcome the value of a
highly placed informant,” and that the informant is the “bread
and butter of the ‘working cop.’” At the same time, he notes that
“once having dealt with an informant, most law enforcement
officers do not want to put themselves through that punishment
again ... they will get you into trouble if you are not watching.”7
The nature of this trouble may include officer corruption; agency
liability; mental and physical harm to officers, including death;
loss of agency credibility; unfavorable court decisions; and wasted time, effort, and money. CIs should not be used unless (1) all
other information sources have been thoroughly explored and
found lacking; (2) the potential gains clearly outweigh the certain
10

risks involved; and (3) the agency has developed and is committed to following sound, written policies and procedures to govern their use and control.

Endnotes
1
Gary T. Marx, Undercover: Police Surveillance in America, The Twentieth Century Fund,
University of California Press, 1988, p. xix.
2
Brown, P. 252.
3
This issue is addressed in a separate IACP Model Policy on Managing Confidential Funds.
4
Depending on their size and needs, some departments may wish to include more extensive designations of roles and responsibilities within their written procedures; or they may
find it beneficial to develop a detailed roles and responsibilities matrix. For more information,
see U. S. Department of Justice, Bureau of Justice Assistance, Managing Confidential Informants,
by Hugh Nugent; Frank J. Leahy Jr; and Edward F. Connors, for the Institute for Law and
Justice (1991).
5
See Managing Confidential Informants, Institute for Law and Justice, 1991, for a complete
discussion of training topics and a model training curriculum.
6
See, for example, Managing Confidential Informants.
7
“The Organized Crime Informant,” a speech by Frederick T. Martens, pp. 1, 2, and 23.

This project was supported by Grant No. 2006-DG-BX-K004 awarded by the
Bureau of Justice Assistance, Office of Justice Programs, U.S. Department of Justice.
The Assistant Attorney General, Office of Justice Programs, coordinates the activities of the following program offices and bureaus: the Bureau of Justice Assistance,
the Bureau of Justice Statistics, National Institute of Justice, Office of Juvenile Justice
and Delinquency Prevention, and the Office of Victims of Crime. Points of view or
opinions in this document are those of the author and do not represent the official
position or policies of the United States Department of Justice or the IACP.

Every effort has been made by the IACP National Law Enforcement Policy
Center staff and advisory board to ensure that this model policy incorporates the
most current information and contemporary professional judgment on this issue.
However, law enforcement administrators should be cautioned that no “model”
policy can meet all the needs of any given law enforcement agency. Each law
enforcement agency operates in a unique environment of federal court rulings, state
laws, local ordinances, regulations, judicial and administrative decisions and collective bargaining agreements that must be considered. In addition, the formulation
of specific agency policies must take into account local political and community
perspectives and customs, prerogatives and demands; often divergent law enforcement strategies and philosophies; and the impact of varied agency resource capabilities among other factors.

© Copyright 2008. International Association of Chiefs of Police, Alexandria,
Virginia U.S.A. All rights reserved under both international and Pan-American
copyright conventions. No reproduction of any part of this material may be made
without prior written consent of the copyright holder.

11