g. Places and persons involved in black-market activity.
h. Availability and desirability of military property on the local market.
i. Identification of problem areas involving military personnel.
j. Organized gambling.
k. Organized prostitution.
l. Illegal currency transactions.
m. Areas in which the military aid the civilian community and vice versa.
11. Source File. This file is maintained by the source control officer. It
holds the identities of all sources developed by unit personnel. Confidential
or registered sources should especially be included. Access to the file should
be limited to those having a need to know.
A well maintained file provides
It aids in determining source availability and
reliability. It also helps them. The file also gives information as to what
areas have been covered by a source.
Also, the file helps to define those
areas in which sources should be developed.
12. Sources and the Law. The MCM states: "the identity of persons (sources)
supplying information to public officials engaged in the discovery of crime is
privileged.... the communications of these sources imparting the information
are also privileged to the extent necessary to prevent disclosure of the
source's identity." However, during trial, the privilege is no longer
applicable with respect to a source.
Courts have compelled investigators to
disclose the identities of confidential sources.
This has occurred in those
cases where the source's identity is necessary to the accused's defense. It
has also occurred when the case involves possible entrapment, or when the
source is a co-defendant. Whether the necessity exists to identify the source
will depend upon the particular circumstances of each case.
charged and the possible defenses will be taken into consideration.
considered will be the-possible significance of the source's testimony, and
other relevant factors.