Reader Ad Slot
Reader Ad Slot placeholder
If you would like to support SpookStack without paying out of pocket, please consider allowing advertising cookies. It helps cover hosting costs and keeps the archive free to browse. You can change this choice at any time.
Surreptitious Entries Black Bag Jobs — Part 24
Page 25
25 / 167
Memorandum to Mr. W, R. Wannall
Re: Surreptitious Entries
66-8160
2. Where surreptitious entry is effected for micro-
phone installation, is the entry limited to the installation or are
documents searched for, examined or photographed?
3. While in the past microphone surveillance was used
only in kidnaping and extortion cases, Mr. Buckley suggested that
recent information (probably in the news media, although he did not
say) indicates that surreptitious entry and microphone surveillance
have been used in organized crime matters, He requested he be fur-
nished information relating to the use of these techniques in the
criminal area,
Mr. Buckley requested representatives of the General
and Special Investigative Divisions meet with him to discuss the above
three matter of the General Investigative
Division the Special Investiga-
tive Division were advised of this request,
ACTION:
For information, The General and Special Investigative
Divisions should make arrangements to meet with Mr, Buckley in
accordance with the above,
Mr
Reveal the original PDF page, then click a word to highlight the OCR text.
Community corrections
No user corrections yet.
Comments
No comments on this document yet.
Bottom Reader Ad Slot
Bottom Reader Ad Slot placeholder
If you would like to support SpookStack without paying out of pocket, please consider allowing advertising cookies. It helps cover hosting costs and keeps the archive free to browse. You can change this choice at any time.
Continue Exploring
Agency Collection
Explore This Archive Cluster
Broad Topic Hub
Topic Hub
letter
bureau
Related subtopics
Subtopic
Subtopic
Subtopic
Subtopic
Subtopic
Subtopic