Electronic Surveillance in Drug Related Cases

 

Samuel A. Guiberson

Drug Law Report, March-April 1983


 

Even the most casual observer of drug importation, trafficking, and sale cases becomes aware of the increasing application of electronic surveillance in the investigation of these types of offenses.  Electronic surveillance--be it tracking, tapping, bugging or consensual recording, is being applied in more investigations related to drug offenses than had been customary in previous years.  Not only have the measures utilized become more technologically sophisticated, but there is also greater integration of a wider variety of electronic surveillance resources in individual operations.

To effectively litigate the issues raised by electronic surveillance in this era of all-pervasive interception capabilities, defense attorneys will have to anticipate the whole range of potential surveillance techniques which may have been deployed against the accused.

Rather than use the law as the framework for this survey of the electronic surveillance methods available to government agencies engaged in narcotics interdiction and investigation, the relationship existing between the surveillance and its objective will establish our hierarchy for analysis.  The surveillance methods examined here are set out in their full range:  from the most passive and remote interception to the most active and immediate kind of contact with a targeted subject.  Within this framework, all surveillance devices and practices can be organized without being limited by the status of the law governing their use or misuse.


High Tech Surveillance:the Militarization of Drug Enforcement

The most significant factor contributing to the increasing integration of highly sophisticated surveillance is the U.S. government's more aggressive interpretation of its drug enforcement mission.  The Reagan Administration interprets that mission as synonymous with national defense and, in so doing, justifies the utilization of highly advanced technologies heretofore reserved for national defense and foreign intelligence gathering.

Indicative of this trend toward the militarization of drug enforcement is President Reagan's Executive Order of December 4, 1981, permitting the military to assist domestic law enforcement agencies with information and equipment.  N.Y. Times, Jan 30, 1983, at A1, col. 5.  Executive Order No. 12,333 effectively permits the National Security Administration to lend its electronic intelligence processing and analysis capabilities to local law enforcement, and to the current combine of federal law enforcement agencies charged with responsibility for narcotics enforcement.

What does this policy mean in terms of the kinds of electronic surveillance resources which have become available at, literally, the highest levels?  Military radar intercept capabilities such as AWACS have become available to fly drug interdiction missions, and the Coast Guard and Naval airborne and coastal radar systems can be viewed as part of the drug surveillance network.

It is not outside the realm of possibility that orbital intelligence gathering resources are being applied to these efforts, and that the intelligence community is contributing what it can from the interception of international and, perhaps, domestic communications using such screening criteria as telephone and cable traffic sources, destinations, language descriptors, and other indicia which are targeted as suspicious.

Recently published reports describing the role of the National Security Administration as a provider of international electronic surveillance information to drug enforcement agencies pose some fresh discovery issues that defense counsel should present for review by the courts.  See J. Bamford, The Puzzle Palace (1982).  Broad-based overtures to obtain discovery of these sources may narrow their use until appropriate legal standards have begun to evolve.


Wiretapping

Moving earthward from the overhearing high overhead, where transmission of conversation by microwave may be seized, and the overseeing higher eyes which surveil the locations of aircraft and vessels at sea, we arrive at the more tangible seizure of communications traveling by wire or cable.

Wiretapping refers to the interception of wire communications, most frequently telephone communications.  Title 18 U.S.C. section 2510(1) defines a "wire communication" as "any communication made in whole or in part through the use of facilities for the transmission of communications by the aid of wire, cable, or other like connections between the point of origin and the point of reception; furnished or operated by any person engaged as a common carrier in providing or operating of such facilities, for transmission of interstate or foreign communications."  Data transmission, time-shared computer communications, and other non-aural communications are very much within the scope of this definition.

The basis for federal regulation of wiretapping originates in the Commerce Clause of the U.S. Constitution.  Title III of the Omnibus Crime Control and Safe Streets Act of 1968 is the primary federal legislation governing electronic surveillance and eavesdropping.  One of the goals of Title III was to "define on a uniform basis the circumstances and conditions under which the interception of wire and oral communications may be authorized."  States were authorized to enact similar legislation which could be more restrictive but not more permissive than Title III.  At present, some twenty-eight states and the District of Columbia have enacted such legislation.

Because eavesdropping involves such an extensive invasion of privacy, Congress included in Title III a number of procedural and substantive provisions to assure that the power to eavesdrop is not abused.  An eavesdropping application must comply with a number of restrictions which do not apply to the ordinary search warrant affidavit.  The present dilemma for the defense advocate is that the procedural requirements of the statute have been so permissively construed by the courts; that the threshold of technical performance necessary for compliance has become more of an invitation to the use of the extreme investigative measures of wiretapping, than an impediment.

The courts have only required "substantial compliance" in the identification of the person or persons whose conversations are to be intercepted.  In U.S. v. Kahn, 415 U.S. 143 (1972), the Supreme Court reversed the Seventh Circuit.  Kahn involved a wiretap order which authorized the interception of bookmaking-related conversations "of Irving Kahn and others as yet unknown," over Kahn’s home telephones.  The Seventh Circuit interpreted the order as restricting the government to intercept only conversations to which Kahn was a party, thereby precluding the use of Minnie Kahn's phone calls.  The Supreme Court, in reversing the Seventh Circuit, stated that the application and warrant need not "identify" someone for whom the authorities did not have probable cause. Id. at 155.

In U.S. v. Donovan, 429 U.S. 413 (1977), the Supreme Court dealt with the issue of whether the application must identify every person for whom the authorities do have probable cause.  In an opinion by Justice Powell, the Court stated that Title III requires the government to name all individuals it has probable cause to believe are involved in the crime under investigation.  The Court indicated, however, that failure to "identify" such individuals would not require suppression of the intercepted conversations.

Additional cases have reaffirmed that "substantial compliance" is all that is necessary to comply with this specific provision of Title III.  See U.S. v. Kilgore, 518 F.2d 496 (5th Cir. 1975); U.S. v. Doolitttle, 507 F.2d 1368 (5th Cir.), aff'd en banc, 517 F.2d 500 (1975) (per curiam), cert. denied, 430 U.S. 905 (1977).

The Supreme Court in U.S. v. Chavez, 416 U.S. 562 (1974), stated the rule regarding identification of the officer authorizing the application.  Only the U.S. Attorney General or an Assistant Attorney General may authorize a federal agent to apply to a judge for a wiretap order to comply with 18 U.S.C. section 2516(1).  As a result, misidentification of the authorizing official as an Assistant Attorney General did not render the interceptions in Chavez unlawful.

A wiretap application must show probable cause in three different contexts:  (1) that an individual has or is about to commit one of several enumerated offenses; (2) that particular communications relating to the charged offense will be obtained through the interception; and (3) that the premises where interception will be made are being used in connection with the charged offense.  18 U.S.C sections 2510-20.  Examples of poorly drafted warrants can be found in People v. Koutnik, 353 N.Y.S.2d 197 (1st Dept 1974), aff'd, 378 N.Y.S. 2d 360, 340 N.E. 2d 727 (1975); and People v. Brown, 364 N.Y.S. 2d 364 (Sup.Ct., N.Y./county 1975).

Also required by statute is a showing that "normal investigative procedures have been tried and reasonably appear unlikely to succeed, if continued."  18 U.S.C. section 2518 (3).  This language suggests that something less intrusive must at least be attempted, and not merely evaluated as "unlikely to succeed," and bypassed in favor of a wiretap.  As was said in U.S. v. Giordano, 416 U.S. 505 (1974):

Congress legislated in considerable detail in providing for applications and orders authorizing wiretapping and evinced the clear intent to make doubly sure that the statutory authority be used with restraint and only where the circumstances warrant the surreptitious interception of wire and oral communications. These procedures were not to be routinely employed as the initial step in criminal investigation. Id. at 515.


Surreptitious Entry

The Fourth Amendment implications of surreptitious forcible entry were examined by the Third Circuit in U.S. v. Dalia, 575 F.2d 1344 (3d Cir. 1978).  The court stated that when an order has been made upon adequate proof as to the probable cause for the installation of a device in an particular premise, a separate order authorizing entry for installation purposes is not required.  Id. at 1346.  The court followed the reasoning enunciated by the Second, Fourth, and D.C. Circuits, stating:

Any order approving electronic surveillance of conversation to be overheard at a particular private place must, to be effective, carry its own authority to make such reasonable entry as may be necessary to effect the "seizure" of the conversation.  Id. at 1346, quoting U.S. v. Scafidi, 564 F.2d 633 (2d Cir. 1977).

The Sixth Circuit has concluded that Title III does not authorize secret entry.  See U.S. v. Finazzo, 429 F.Supp. 803 (E.D. Mich. 1977), aff'd 583 F.2d 837 (6th Cir. 1978).  The Eighth Circuit has divided evenly on the question whether the statute and the constitution authorize secret entry onto business premises, with even stronger reservations about whether such entry onto residential premises would be permitted.  See U.S. v Argusa, 541 F.2d 690 (8th Cir. 1976).


Minimization of Interrupted Conversations

Once the device has been installed, the interception process begins.  Defense counsel must confront the adequacy of the government's compliance with minimization requirements of Title III.  18 U.S.C. section 2815.  Courts have yet to arrive at a precise definition of what minimization is or how it is to be achieved; in part because the statute's definition of "intercept" is so vague.  The essential notion of minimization is that conversations which relate to the investigation should be intercepted, but that interception of conversations unrelated to the investigation should be minimized or avoided.

Two general approaches have been taken to the question of when a conversation is "subject to interception."  Under what is known as the "permissive" approach, the monitors are authorized to intercept a conversation unless, at the outset of the conversation, it is apparent that no information helpful to the attainment of the authorized objective will be obtained.  Under the "restrictive" approach, the monitors are not authorized to intercept a conversation unless, at the outset of the conversation, it is probable that information necessary to the attainment of the authorized objective will b e obtained.

In Scott v. U.S., 436 U.S. 128 (1978), the Supreme Court specifically addressed the issue of minimization as required by Title III.  Justice Rehnquist, writing for the Court, stated that the proper approach for evaluating compliance with the minimization requirement is to objectively assess the agent's or officer's actions in light of the facts and circumstances confronting him at the time, without regard to his underlying intent or motive.  The Court's holding in Scott has had the effect of leaving minimization under 18 U.S.C. section 2518 (5) to the discretion of the recording agents and, at best, the trial judge.

It is interesting to note that the goals and scope of a narcotics investigation have been cited by the courts as justifying extensive monitoring in cases where substantial minimization was achieved, nevertheless.  U.S. v, Armocida, 515 F. 2d 29 (3d Cir.) cert, denied, 423 U.S.858 (1975).  Compare U.S. v. King, 335 F.Supp. 523 (S.D.Cal. 1971), aff'd in part, rev'd in part, 478 F.2d 494 (9th Cir.) cert. denied, 414 U.S. 846 (1973) (which involved a narcotics investigation of limited scope).  In this case, total interception of all conversations was condemned as excessive.

In the recent case of U.S. v. Chagra, F. Supp. (W.D. Tex. 1982), the trial court was faced with both the "over" and "under" minimization arguments.  One of the codefendants objected during pretrial that the "over" minimization by the government had the effect of removing his recorded conversations from t heir exculpatory context.  Conversely, another codefendant filed pretrial motions alleging that the government's actions in "under" minimizing the recorded conversations had the effect of leaving intact too much unrelated conversation.


Aggressive Eavesdropping:  Bugging

When it is not the "vessel" of transmission, such as a telephone wire, but a vantage point that is being seized in order to transmit an intercepted conversation, we have made the jump from a wiretapping to a bugging.  Bugging is a more aggressive form of electronic narcotics cases.

The term "bug" refers here to a miniature electronic device which overhears, broadcasts, or records a speaker's conversation.  Most bugs must be located relatively close to the conversations sought to be overheard, since microphones which can overhear from a distance are bulky, difficult to conceal, and require considerable operational skill to achieve successful results, at least at present.

When placed in a private area such as an office or home to capture non-telephonic conversations, a bug can be considerably more intrusive than a wiretap.  A wiretap is only effective if a particular telephone is used, while the bug hears all conversations within its range.  It is necessary to realize that the procedural requirements for any device for listening to oral communication, such as the authorization of the warrant, identification of the person or persons to be intercepted, etc., are identical to the requirements for a wiretapping application.  Both forms of electronic surveillance are governed by Title III.


Tracking Devices:  Beepers and Transponders

The major distinction between a beeper, which is a tracking device that signals the location of the boat, plane, person or car to which it is attached, and a bug, which sends electronic signals of an oral communication, is that the electronic tracking device is not within the scope of Title III.

Beepers are most commonly attached to automobiles, but a number of cases have dealt with transponders which are attached to airplanes.  Transponders are similar to beepers, except they emit a radar signal on screen as a "blip" signature which is distinctly different from other radar "blips."  Since transponders are, for the purpose of Fourth Amendment analysis, indistinguishable from ordinary beepers, no distinction between them and ordinary beepers is found in the case law.

In a decision announced on March 2, 1983, the Supreme Court ruled that the monitoring of a beeper attached to a chloroform container was not a search under the Fourth Amendment.  U.S. v. Knotts, U.S.(No. 81-1802, decided 3/2/83).  In a unanimous decision written by Justice Rehnquist, the Court found that there was no reasonable expectation of privacy in this case, because the respondent was traveling in an automobile on a public thoroughfare--an area with diminished expectation of privacy.  Thus there was no search, merely "the following of an automobile on public streets and highways."

The Supreme Court specifically did not rule on the warrantless installation of the beeper in the chloroform container.  The respondent's attorney did not believe he had standing to raise the issue because the seller of the chloroform had consented to its installation.  On the Supreme Court level, therefore, the constitutionality of warrantless beeper installation remains undetermined.

Justices Brennan and Marshall, in a concurring opinion, emphasized that "[c]ases such as Silverman v. U.S., 365 U.S. 505.509-12 (1961), however, hold that, when the government does engage in a physical intrusion of a constitutionally protected area in order to obtain information, that intrusion may constitute a violation of the Fourth Amendment, even if the same information could have been obtained by other means" (emphasis in original).

The case of U.S. v. Holmes, 521 F.2d 859 (5th Cir. 1976), held that the use of a beeper should be categorized as a search raising Fourth Amendment issues.  Without actual physical entry, a beeper was magnetically attached to the underside of Holmes' van.  Monitoring the beeper led to the discovery of a large amount of marijuana and the arrest of nine persons, including Holmes.

The trial court held that the "use of the beeper to monitor the movements of the van was a search subject to the Fourth Amendment, and that the search was illegal because of the failure to obtain a warrant for its installation."  Id. at 863.  The trial judge also found that an application for a warrant would have been rejected because no probable cause existed to justify its installation.

A three-judge panel of the Fifth Circuit Court of Appeals affirmed each of the rulings of the district court, citing Katz v. U.S., 389 U.S. 347 (1976), and its reasonable expectation of privacy interpretation.  521 F. 2d at 866.  On rehearing, the Fifth Circuit, en banc, agreed with the panel opinion.  537 F.2 227 (5th Cir. 1976).  What appears to be missing from the Supreme Court decision and both Holmes decisions is any clear distinction between the installation of the beeper, and subsequent monitoring of the device.

In U.S. v. Moore, 562 F.2d 106 (1st Cir. 1977), the First Circuit did distinguish between the installation and subsequent monitoring of the beeper device.  Circuit Judge Campbell stated that the important issue in the case was not the common law trespass necessary to place the beeper on the automobile, but rather whether the use of beepers so implanted violated the defendants' reasonable expectation of privacy.

In holding that such monitoring did violate defendant's privacy rights, the court reasoned:  "while a driver has no claim to be free from observation while driving in public, he properly can expect no to be carrying around an uninvited device that continuously signals his presence."

U.S. v. Hufford, 539 F.2d 32 (9th Cir.), cert. denied, 429 U.S. 1002 (1976), is the leading circuit court case to hold that beeper monitoring does not violate the Forth Amendment.  Federal drug agents planted one beeper in a drum of caffeine and attached another, pursuant to a court order, to the suspects' truck battery.  These beepers helped the agents locate a house where illegal drugs were seized.

The Ninth Circuit, ruling on the admissibility of the evidence, stated:  "we see no distinction between visual surveillance and the uses of an electronic beeper to aid the agents in following the movements of an automobile along public roads, provided no Fourth Amendment violation occurred when the beeper was attached."  Id. at 34.  The beeper was analogized to other tracking devices that heighten human senses, such as binoculars, tracking dogs, or search lights.  The court also referred to the cases involving informers who are "wired for sound."

The court reasoned that no infringement of any Fourth Amendment right occurred in the placement of the first beeper since the defendant had no constitutionally protected expectation that the chemical company would not consent to the installation of a beeper.  In discussing the installation of the second beeper with a court order, the court emphasized the fact that prior judicial approval was obtained.  This discussion implied that a warrant supported by probable cause would be required any time entry was necessary in order to place a beeper, unless circumstances excused the obtaining of a warrant.

In a recent case handed down by the U.S. District Court for the Western District of Texas, Senior Judge Suttle stated that if surveillance is improperly continued after the authorization for a wiretap has terminated, such surveillance is unlawful and subject to suppression.  As the court reasoned:

[S]urveillance of a moving aircraft by a beeper is, in some respects, less intrusive than the monitoring of a phone conversation.  But the fact remains that, when such beepers are installed inside an airplane under court order, there must be some guideline to dictate by what time they must be removed. U.S. v. Butts, F.Supp.(W.D. Tex. 1982).

The owner of a premise has no right to electronically eavesdrop on those who are lawfully on his premises.  Thus, an employee or subordinate enjoys a constitutionally recognized expectation of privacy in his office.  Therefore, if the employer or supervisor bugs that office, the employer or supervisor may be prosecuted for violating 18 U.S.C. section 2511(1).  In the case of U.S. v. McIntyre, 582 F.2d 1221 (9th Cir. 1978), the court upheld a conviction of a police chief and his lieutenant for bugging the assistant chief's office.

In situations where law enforcement officers are the individuals who install the bugging devices in the office of someone, cases such as U.S. v. Santora, 583 F. 2d 453 (9th Cir. 1979), have revealed a reluctance to interpret Title III to authorize break-ins to plant such bugging devices.  Judge Hufstedler writes that numerous passages of the legislative history of Title III strongly support the conclusion that Congress did not intend to permit court-ordered break-ins to install bugging devices.  Id. at 462.  See also U.S. v. Finazzo, 583 F. 2d 837 (6th Cir. 1978); U.S. v. Scafidi, 564 F. 2d 633 (2d Cir. 1978); Application of the United States, 563 F.2d 637 (4th Cir. 1977); U.S. v.Argusa, 541 F.2d 690 (8th Cir. 1976); U.S. v Ford, 553 F.2d 146 (D.C. Cir. 1977).


Consensual Recordings

Perhaps the most commonplace method of electronic surveillance encountered in narcotics cases is a consensual recording.  Consensual interceptions are exceptions to the provisions of Title III.  Title 18 U.S.C. section 2511 (2)(c) provides:  "it shall not be unlawful under this chapter for a person acting under color of law to intercept a wire or oral communication, where such person is a party to the communication or one of the parties to the communication has given prior consent to such interception."

Therefore, if a person who is a party to the conversation consents whether that person is an undercover agent can record or overhear a conversation, and the recording can be produced (as well as testimony as to what the consenting party heard) without obtaining a warrant.

Conversations can be consensually intercepted in three basic ways.  First, the consenting party may wear or carry a tape recorder with which he can record his face-to-face conversations.  Second, the consenting party may wear a transmitter which broadcasts his conversations to agents who are equipped with a receiver.  And finally, telephone conversations may be consensually intercepted by recording the conversation, or by permitting a third party to listen and record over an extension phone.

Consensual interceptions have been discussed by the Supreme Court in three cases:  On Lee v. U.S., 343 U.S. 747 (1952); Lopez v. U.S., 373 U.S. 427 (1963); and U.S. v. White, 401 U.S. 745 (1971).

In each of these three cases, the Court held that a consensual interception was not a "search and seizure" under the Fourth Amendment, and that no search warrant was needed to authorize such interceptions or to use the fruits of the interception at a trial.

At present, all circuits have accepted White as constitutional authority for the principle that search warrants are not required to authorize consensual interceptions.  Further, no federal court since White has distinguished between the transmitter and concealed recorder situations.  See U.S. v. Bishton, 463 F.2d 887 (D.C. Cir. 1973); U.S. v. Lemonakis, 485 F.2d 989 (D.C. Cir. 1973) (both are cases in which transmitters were approved).

The constitutionality of consensually intercepting telephone conversations without a warrant has never reached the Supreme Court.  However, the federal circuits have cited White as authority that no warrant is needed to overhear or record a telephone conversation with the consent of a participant.

Frequently, in narcotics cases involving consensual recordings, the consenting party is an informant who is cooperating with law enforcement authorities in hope of receiving lenient treatment for his or her own crimes.  In such situations, defendants often claim that the informant's consent was "involuntary" because it was coerced.

Virtually every federal circuit that has considered this issue has held that consent under these circumstances is not necessarily involuntary.  See, e.g., U.S. v. Bastone, 526 F.2d 971 (7th Cir.) cert. denied, 425 U.S. 973 (1976).  As the Second Circuit reasoned in U.S. v. Bonnano, 487 F.2d 654 (2d Cir. 1973):  "an informer's consent to the monitoring or recording of a telephone conversation is an incident to a course of cooperation with law enforcement officials on which he has ordinarily decided some time previously."  Presently, three circuits have adopted the reasoning in Bonnano:  U.S. v. Glickman, 604 F.2d 625 (6th Cir. 1979); U.S. v. Horton, 601 F. 2d 319 (7th Cir, 1979); and U.S. v. Axselle, 604 F.2d 1330 (10th Cir. 1979).

In those rare instances where the courts have indeed found "coerced consent," the following circumstances have been mentioned:  the opportunity to consult with an attorney, Good v. U.S., 378 F.2d 934 (9th Cir. 1967); whether the consenting party was provided with Miranda warnings, U.S. v. Rangel, 488 F.2d 871 (5th Cir. 1974); signed waiver forms, U.S. v. Bastone, supra; or was shown the equipment used by the officers, U.S. v. Rangel, supra; the number of officers present, People v. Bates, 330 P. 2d 102 (Cal. 1978); the duration of the prior conversation, U.S. v. Campbell, 337 F.2d 396 (7th Cir. 1958); and the fact that the call, once agreed to, was made, U.S. v. Bonnano, supra.

Another interesting aspect to consensual recordings is the issue whether the right to intercept such conversations is limited by either the means used to record the conversation, or the location where the conversation is intercepted.  The Texas Court of Criminal Appeals addressed this issue recently in the case of Rovinsky v. State, 605 S.W. 2d 578 (Tex. Crim. App. 1980).  In Rovinsky, appellant contended that the trial court admitted the tape recordings of his conversations with an informer in violation of 18 U.S.C. section 2511 (2)(c).  In ruling against the appellant's claim, Judge Douglas followed the holding of the Fifth Circuit's case of U.S. v. Juarez, 573 F.2d 267 (5th Cir. 1978), writing that the only issue was the voluntariness of the informer's consent.  Location and the means used to record the conversation outcome of the case.  U.S. v. White, 401 U.S. 745 (1967).

A dissent authored by Judge Clinton indicates that a distinction must be made between wiring an informant for sound and wiring a hotel room to eavesdrop.  He reasons that, if it has been accepted that an expectation of privacy is present in a public telephone booth, Katz v.U.S., 389 U.S. 345 (1967), or a commercial establishment, O'Brien v. U.S., 386 U.S. 345 (1967), a similar expectation of privacy should be accorded private negotiations that occur within the confines of a hotel room.  See also American Civil Liberties Union, Lessons of Abscam, a report on the Abscam operation recommending remedial legislation.


Attorney-Client Recordings

Another aspect of an individual's expectation of privacy arises in the context of the attorney-client privilege.  The issue of intercepting the conversation between an attorney and an informer, whom the attorney was representing, was raised in the case of U.S. v. Juarez, 573 F. 2d 267 (5th Cir. 1978).  In allowing the introduction into evidence of such tape recordings, the court reasoned that the tape did not violate the attorney-client privilege because the client-informer waived the privilege by not raising it at trial.  The court found no authority for the attorney's position in attempting to claim the privilege based on Fisher v. U.S., 425 U.S. 391 (1976).

The court concludes that if the client wishes to waive the privilege, the attorney may not assert it either for the client's or for his own benefit.  It is important also to note that the intrusion into attorney-client communications could, under some circumstances, result in the dismissal of the charges against the defendant.  Hoffa v. U.S., 385 U.S. 293 (1966); Weatherford v. Bursey, 429 U.S. 545(1977).

At the trial of a case involving consensual recordings, two main defenses are usually raised.  The first, and far less successful, defense is one of entrapment.  In Sorrells v. U.S. 435 (1932), the Supreme Court defined entrapment as "occurring only when the criminal conduct is the product of the creative activity of the creative activity of law enforcement officials."  Entrapment has been discussed by the Supreme Court on numerous occasions, and not once has it been used to exclude the consensual recordings.  See U.S. v Russell, 411 U.S. 423 (1973); Hampton v. U.S., 425 U.S. 484 (1976).

Another defense to be asserted in a narcotics case involving consensual recordings is "outrageous government."  In U.S. v. Wylie, 625 F. 2d 1371 (9th Cir. 1980), the court stated that the outrageous government involvement defense focuses on the outrageousness of governmental agents and their involvement in criminal activity.  Any consideration exercised by government agents is secondary to any consideration of the outrageousness of their involvement.

The distinction of the defense of "outrageous government conduct" from the entrapment defense is discussed in U.S. v. Batres-Santolino, 521 F.Supp. 744 (N.D. Cal 1981).  The court emphasizes that the "outrageous government conduct" defense raises a question of law for the court; i.e., a due process issue, and is available to a defendant who was "predisposed" to commit the crime and thus could not claim entrapment.  The court in Batres goes on to point out, however, that the level of government misconduct that must be shown is perhaps higher than for entrapment.