Vous êtes sur la page 1sur 35

November 2000

Volume 69
Number 11
United States
Department of Justice
Federal Bureau of Investigation
Washington, DC 20535-0001

Louis J. Freeh
Director

Contributors' opinions and statements


Features
should not be considered an
endorsement by the FBI for any policy,
program, or service.

The Attorney General has determined Law enforcement must make every
that the publication of this periodical is Runaway or Abduction?
necessary in the transaction of the
public business required by law. Use
By André B. Simons 1 attempt to classify missing child
cases appropriately.
of funds for printing this periodical has and Jeannine Willie
been approved by the Director of the
Office of Management and Budget.
Stealing Secrets Solved Law enforcement can work with
The FBI Law Enforcement Bulletin
(ISSN-0014-5688) is published
monthly by the Federal Bureau of
By Thomas R. Stutler 11 companies to help prevent the loss
of intellectual property and the theft
Investigation, 935 Pennsylvania of trade secrets.
Avenue, N.W., Washington, D.C.
20535-0001. Periodicals postage paid Microscopic slides serve as valuable
at Washington, D.C., and additional The Microscopic Slide
mailing offices. Postmaster: Send
address changes to Editor, FBI Law
By John E. Smialek, Charlotte Word, 18 reservoirs that law enforcement
agencies can use in DNA testing years
Enforcement Bulletin, FBI Academy, and Arthur E. Westveer
Madison Building, Room 209, after the commission of a crime.
Quantico, VA 22135.
Supreme Court Cases Four Supreme Court decisions
Editor
John E. Ott
1999–2000 Term 28 of particular importance to law
enforcement are summarized.
By Sophia Y. Kil
Associate Editors
Glen Bartolomei
Cynthia L. Lewis
Bunny S. Morris
Art Director Departments
Brian K. Parnell
Assistant Art Director
Denise Bennett Smith
Staff Assistant 8 Perspective 23 Focus on Cooperation
Linda W. Szumilo
Professional Police Joint Employee
This publication is produced by Traffic Stops Assistance Programs
members of the Law Enforcement
Communication Unit,
William T. Guyton, Chief. 17 Book Review 26 Bulletin Reports
Police Auditing: The SEARCH Program
Internet Address
Theories and Practices Training Programs
leb@fbiacademy.edu National Night Out
Cover Photo
© Digital Vision

Send article submissions to Editor,


FBI Law Enforcement Bulletin, FBI
Academy, Madison Building, Room
209, Quantico, VA 22135.

ISSN 0014-5688 USPS 383-310


Runaway or Abduction?
Assessment Tools for the
First Responder
By ANDRÉ B. SIMONS, M.A., and JEANNINE WILLIE

© André B. Simons

A 15-year-old girl disap- to third parties who assist in a whatever the circumstances. Be-
peared from her home in a child abduction, 1 even through tween the extremes, however, deci-
small California coastal inaction.”2 sion making often proves difficult.3
town. Police initially classified her Such inaction may often result When a child simply vanishes, no
as a runaway. Eight months later, when law enforcement erroneously clear indicators may exist to suggest
her abused body was discovered. categorizes a child abduction as a a voluntary or an involuntary disap-
Subsequent investigation revealed voluntary disappearance, or a run- pearance. When responding police
that three high school-aged boys in- away. When someone reports a officers navigate through a situation
volved in a Satanic cult had ab- child missing, traditionally, law en- with no witnesses, obvious crime
ducted, raped, tortured, and mur- forcement quickly confirms or scene, nor clues to what happened,
dered the girl the night of her eliminates evidence of an abduc- they might find it difficult to distin-
disappearance. tion. Police agencies decide easily guish an abducted child from a run-
In another case, a jury ordered a how to respond to cases with away initially. A recent survey re-
town to pay a family $3.8 million clear indicators about what hap- quested law enforcement agencies
because police failed to respond ad- pened, such as dealing with a wit- to identify common obstacles to a
equately to the father’s plea for help nessed stranger abduction, a run- successful investigation in a miss-
when he reported his daughter miss- away who packs a bag and leaves a ing child case.4 Fifty-eight percent
ing. The father stated later that the note, or a very young missing child, of the agencies responded that the
verdict presented “a clear warning which police generally investigate highest ranking concern involved

November 2000 / 1
administrative and investigative
branches must rely on the patrol
officer’s assessment to determine
the most appropriate course of ac-
tion. Police agencies may jeopar-
dize crucial investigative opportu-
nities if they classify an abduction
case erroneously. Almost no other
crime investigation will stretch re-
sources and generate public criti-
cism as a missing child case. A law
enforcement agency may find itself
Special Agent Simons, formerly a Ms. Willie serves in the in the unenviable position of having
police officer with the Portland, Missing/Unidentified Persons to make up for precious lost hours
Oregon, Police Bureau, now Unit, California Department of or days if they mistakenly classify
serves in the FBI’s Redding, Justice, in Sacramento,
California, resident agency. California. the missing child as a runaway.
However, the large amount of vol-
untary missing reports each year
makes a full-scale law enforcement
the difficulty of knowing whether a responding law enforcement offi- response unreasonable and inappro-
child has disappeared voluntarily. cers to overlook evidence of an ab- priate for all incidents.
The fact that hundreds of thou- duction. Such predispositions can To assess a missing child report
sands of children leave their homes become particularly hazardous in accurately, responding officers
voluntarily each year compounds light of research indicating that in must explore the missing child’s
the difficulty in accurately classify- cases where individuals abduct and lifestyle and behaviors. Officers
ing a missing child as a runaway or murder children, the population at must have the motivation and avail-
a victim of abduction. National av- highest risk for victimization con- ability of resources necessary to
erages indicate approximately sists of teenage girls ages 13 to 17.6 take the extra time needed for such
450,000 runaways in the United an evaluation and to form an assess-
States at any given time.5 In Cali- ASSESSING THE SITUATION ment as to whether a voluntary de-
fornia in 1999, nearly 101,000 chil- The responding police officers’ parture proves consistent with the
dren left their homes voluntarily. initial assessment will have a great child’s behavior patterns.
Comparatively, only 64 witnessed impact on the outcome of the miss-
abductions of children by a stranger ing child case. The attitude or ap- The Parental Interview
or nonfamily member occurred. Not proach that officers take in the ini- The need to interview parents
surprisingly, law enforcement of- tial response to a missing child call separately from other family mem-
ficers may believe initially that a actually may determine whether the bers and reporting parties remains
missing child between 13 and 17 child is recovered and returned critical. Responding officers may
years of age has run away. Without home safely, remains missing, or, feel reluctant to conduct separate
obvious indicators of an abduction, worse yet, is found dead.7 No other interviews of the parents because of
such as witnesses who observed the criminal investigation is as time- their emotionally escalated state.
actual kidnapping event, signs of sensitive as this type of case, where Conversely, if the parents do not
forced entry, or a ransom note, sta- the very life of the victim often may appear particularly concerned about
tistics indicate that the missing depend on the swift and effective the child’s absence, the officers
child most likely has run away. This mobilization of investigative may not view separate interviews as
philosophy often may cause the resources. The police agency’s necessary. While they cannot

2 / FBI Law Enforcement Bulletin


determine what a parent’s “normal” • Develop and verify a detailed the probability of leaving
reaction to a missing child would timeline of the child’s last voluntarily at night is low.
be, officers must remain objective known activities up to the Similarly, if the missing child
and realize that a family member time the child was last seen was afraid to travel without
may later become a suspect if the or reported missing. a favorite item, such as a toy
child has been abducted. Officers or security blanket, and the
must balance this objectivity with • Determine habits, hobbies, item remains in the house
empathy and support if the parents interests, and favorite after the disappearance, the
are in a state of emotional crisis. activities. child possibly did not leave
Most important, officers must en- • Identify normal activity voluntarily.
sure that they interview parents in- patterns, and determine the • Note any recent changes in
dividually and preserve potential victim’s known comfort zone. behavior or activity patterns
evidence while remaining alert to Officers should assess the and unusual events and
document each parent’s demeanor child’s survival skills and abil- stressors. Officers should
and attitude throughout the ity to adapt to new or strange explore any motivations for
interview. circumstances, which include leaving. How does the child
During the parental interview, an examination of the child’s normally deal with stressful
officers quickly should compile ac- intellectual maturity. Did the situations? Have any recent
curate physical characteristics, such child travel alone frequently? traumatic or stressful events
as the child’s appearance, age, Did the child have a routine caused such a prompt depar-
clothing, and obtain recent photo- where independent travel oc- ture? Do abuse issues occur
graphs and videotapes. Officers curred on a regular basis (e.g., within the residence or family?
should attempt to include a full riding a bike to school)? What Officers also should determine
criminal and psychiatric history fears and phobias did the child any recent changes in sleeping
check of all family members with exhibit? For example, if the and eating patterns that would
access to the child, as well as child was afraid of the dark, indicate stress.
acquire local agency history of prior
abuse or neglect calls to the house.
Through separate interviews of
family members, responding offic- Guidelines to Clarify Procedures
ers should question if the child’s for Categorizing the Missing Child Case
absence shows a significant devia-
tion from established patterns of be- • The parental interview: separation of parents, family
havior.8 Only a further exploration members, and reporting parties during interviews.
into the victimology of the missing
• Victimology: examination of the missing child’s family
child can answer this question.
dynamics, comfort zones, and school and peer group
Victimology associates.
To understand if the child’s ab- • Scene assessment: assessment of the child’s residence for
sence is consistent with established evidence, or lack of, predeparture preparation.
patterns of behavior, officers first • Resources: evaluation of resources available to the child
must understand the child’s normal that would enable or inhibit a voluntary departure.
actions prior to the disappearance.
Officers should use the following • Time factors: consideration of the amount of time that has
guidelines for assessing the missing passed since the child was last seen.
child’s personality.9

November 2000 / 3
Resources
existing conditions still present
To successfully sustain a voluntary long-term absence, the in the house? The presence of
runaway child must have access to resources that will satisfy medications that the child
basic needs, such as food, shelter, and transportation. needs may indicate an involun-
tary departure.
Money
• Does the child have access to money or credit cards? • Identify and interview boy-
Officers should verify if the child recently has accessed friends/girlfriends; determine
bank accounts through ATM withdrawals or other means. normal dating patterns, includ-
Is money missing from parents or siblings? Officers also ing sexual activity. If the
should determine if the child possesses adequate skills to missing child is a postpubes-
obtain employment and, therefore, additional money. cent female, are there preg-
nancy and abortion issues? If
Transportation so, officers should consider
• Does the missing child have access to a vehicle, and if contacting local pregnancy
so, is that vehicle present or absent? Officers should health and abortion clinics.
determine if the child is familiar with public transpor- Also, officers should familiar-
tation, such as a public bus or train system, and conduct ize themselves with depart-
appropriate follow-up contacts with local transportation ment policy and legal issues
providers. Friends or family members unwittingly may concerning confidentiality if
have helped the child run away by providing some form they find the missing child at
of transportation. such a clinic.

Clothing/toiletries • Obtain and review any per-


sonal writings, diaries, draw-
• Does evidence suggest that the child has packed any ings, and schoolwork, includ-
clothing or toiletries? Remembering the possibility that ing any entries into a personal
a crime scene may exist within the child’s residence, computer or interaction with
officers should attempt to verify what items, if any, are on-line computer systems or
no longer present in the child’s room. Missing clothes, services. A critical item often
toiletries, makeup, medications, or other items of personal overlooked in the missing
significance often may indicate predeparture preparations. child call is the presence or
absence of journals/diaries.
Besides the obvious insights
that diaries may provide into
• Identify and separately inter- (NCAVC) created a general the child’s state of mind, the
view close friends, school- assessment form to distribute presence or absence of any
mates, teachers, coworkers, to family members and associ- written communication can
and other significant individu- ates to assist in police officers’ prove relevant. A child who
als. Again, although respond- efforts to understand the consistently and regularly has
ing officers reluctantly may child’s personality.10 memorialized thoughts and
conduct separate interviews of feelings in writing might not
distraught friends and family • Determine any history of depart voluntarily without
members, they must obtain alcohol and other drug use. leaving some form of written
independent statements not Does the child have any communication for people left
influenced by other witnesses. particular medical conditions behind.11 Similarly, calendars
The FBI’s National Center for or allergies? If so, are the or schedules indicating
the Analysis of Violent Crime child’s medications to treat the planned events may provide

4 / FBI Law Enforcement Bulletin


insight into the child’s possible away and the length of time prompted the child’s departure
motivation for staying or spent away. Did the child go to in prior absences? Officers
leaving. friends, other family members, should determine if the child
• Determine any history of or a runaway shelter? Officers exhibited any runaway ges-
running away, discontent with should determine what enabled tures, such as staying out all
home life, or suicidal ide- the child to run away success- night, threats to leave, or other
ations. Has the child disap- fully, or conversely, what behaviors that violated clear
peared voluntarily on prior prevented the child from expectations from parents or
occasions? Officers should sustaining a long-term ab- caregivers. Officers should
note the last time the child ran sence. What happened that determine the existence of any

Case Example

I n June 1997, 16-year-old Mary Roberts (name


has been changed) disappeared from a small
mountain skiing community in northern Califor-
assessment of Mary’s residence failed to yield
evidence of any preparation or packing. Investi-
gators examining Mary’s bedroom discovered
nia. The town’s crime rate is low, and residents her favorite purse, which family members
generally leave their doors and windows open in identified as an item Mary never left home
the summer to take advantage of the cool moun- without. After looking at Mary’s available
tain breeze. After living in the town for only 1 resources, investigators discovered that she did
year, Mary reportedly was yearning for the not have access to a vehicle, nor did she have
bustling activity of Los Angeles, her hometown. access to any money to fund a departure from
At approximately 10 p.m. one night, Mary the area. In creating a victimology for Mary,
was walking home alone through the quiet officers realized that she probably did not have
streets. She had just broken up with her boyfriend the survival skills or psychological stamina to
and was upset. Mary walked around the neigh- engineer a long-term absence successfully.
borhood, talked with a friend, then started to head People knew Mary was afraid of the dark, so it
home. Her walk was only a few blocks, and most seemed unreasonable that she would choose the
of the dark streets were empty. Without a sound, nighttime for an exit. Interviews with family
without a witness, and without a trace, Mary members and friends revealed that Mary had
disappeared. She has never been found. never attempted a voluntary departure before.
Local law enforcement officials initially The investigation began to focus on Mary’s
classified Mary as a runaway. She had, in recent disappearance as an abduction. As investigators
weeks, spoke of leaving town and returning to quickly discovered, 2 weeks of lost time created
Los Angeles where family members still lived. substantial investigative problems: witnesses’
Her friends knew she was heartbroken over recollections were dulled, no trail existed for
troubles with her boyfriend. Final exams at scent-tracking dogs to follow, and any potential
school were looming as Mary struggled with her crime scenes had been contaminated. Even more
studies. It seemed reasonable to think that, frustrating, the investigators realized that Mary’s
perhaps, Mary had just decided to leave. initial runaway classification possibly had
After 2 weeks had passed with no contact provided additional time for her abductors to
from Mary, investigators developed a sense that further conceal evidence of the crime. This case
Mary had not disappeared voluntarily. An remains open and unsolved.

November 2000 / 5
Investigative Resources
written letters, voice mail mes-
• The FBI’s National Center for the Analysis of Violent Crime sages, and computer messages. Law
has published a manual entitled Child Abduction Response enforcement officers should con-
Plan—an investigative tool for first responders and investi- sider all modes of communication
gators. Law enforcement agencies can request a copy by available to the missing child, in-
contacting the NCAVC coordinator at their local FBI field cluding their access to on-line chat
office. rooms and communication with
• Additionally, the National Center for Missing and Exploited others via the Internet.
Children (NCMEC) has published an investigative resource While the initial response logi-
guide entitled Investigator’s Guide to Missing Child Cases. cally may include an examination
Agencies can contact NCMEC at 1-800-THE-LOST. of the child’s room, responding of-
ficers also should consider an ex-
amination of the parents’ room or
other areas of the house. If no items
appear missing from the child’s
prior suicide attempts or scene and they should take all nec- room, are items missing from other
gestures by the child and essary steps to prevent the destruc- areas of the house that may provide
consider the possibility that the tion of evidence. Officers can make additional resources?
child has disappeared as a some important observations. They Officers should attempt to com-
result of a self-inflicted injury. can note the presence or absence of pile and examine a list of known
These observations will assist obvious signs of disruption, such as associates or family members that
officers in crafting the child’s forced entry. How did the offender the child most likely would seek
victimology, which will indicate and the victim enter and exit the assistance from. Should those asso-
whether the child had the motiva- house? If the house appears disor- ciates or family members be un-
tion and capability of leaving vol- derly or in disarray, officers should aware of the child’s whereabouts,
untarily. If the victim assessment compare this with the child’s per- officers must consider this as part of
suggests that these two factors do sonal living space and determine if the child’s lack of available re-
not exist, officers seriously must this remains consistent with the way sources and once again contemplate
consider the possibility that an ab- the room appears now. Officers the possibility that someone has ab-
duction has occurred. should note any dramatic changes ducted the child.
in the child’s room that coincide
Scene Assessment with the departure, which may indi- Time Factors
In a survey of police agencies, cate predeparture preparation or How long does a runaway child
approximately 93 percent of law an attempt by an abductor to con- typically stay away from home, and
enforcement officers responding to ceal evidence. Officers should at- how does the passage of time
a missing child call state that they tempt to verify if any of the child’s influence the classification of a
usually interview the parents or clothing or toiletries are missing missing child case? The California
guardian in person. However, only that would indicate packing or Department of Justice’s Missing/
41 percent routinely would search preparation. If officers or family Unidentified Persons Unit has re-
the child’s home.12 A search of the members cannot find any such ported the following trends in run-
missing child’s residence can pro- items missing nor evidence of pack- away returns:
vide a preliminary assessment with ing, officers must consider the pos-
useful information to officers. sibility that the child may have been Time Frame Percent Returned
Upon arriving at the child’s resi- abducted. within 7 days............50 percent
dence or last known location, offi- Has the child left any commu- 7-14 days..................30 percent
cers must remember that the entire nication for discovery by parents 14-30 days................17 percent
house may prove a potential crime or guardians? This may include 30+ days.....................3 percent

-
6 / FBI Law Enforcement Bulletin
These statistics indicate that the often may occur during the initial should make every attempt to assess
majority of runaway children can- response, where the patrol officer the situation accurately in an effort
not sustain an absence for more than struggles to assess the circum- to classify the missing child
2 weeks. In general, the longer the stances of a missing child report appropriately.
absence, the greater the likelihood appropriately. While the statistics
that an individual has abducted the suggest that a majority of missing Endnotes
child or that the child has fallen children have run away, overlook- 1
For purposes of this article, the term child
victim to a violent crime. If the child ing indicators of an abduction can is used when referring to anyone under 18 years
has a history of running away, offi- jeopardize attempts to locate the of age.
2
cers should determine the length of missing child and expose law en- Guidelines and Curriculum for Handling
Missing Person and Runaway Cases,
time the child remained missing forcement agencies to civil liability. Sacramento, CA: California Commission on
during previous absences. If the Although the large number of run- Peace Officer Standards and Training, 1989.
length of time in the current absence away cases makes a large-scale re- 3
U.S. Department of Justice, Office of
grossly exceeds previous absences, sponse impractical in every circum- Juvenile Justice and Delinquency Prevention,
National Incidence Studies of Missing,
officers should consider the current stance, police officers have the Abducted, Runaway, and Thrownaway
disappearance a deviation from nor- responsibility of examining each in- Children in America (Washington, DC, 1990),
mal behavior patterns. dividual case with a critical, in- 97.
4
Responding officers also formed eye, and as the evidence in- J.J. Collins, M.E. McCalla, L.L. Powers,
and E.S. Stutts, The Police and Missing
should note the amount of time that dicates, they should always err on Children: Findings from a National Survey,
transpired between the last known the side of caution. (Research Triangle Park, NC: Research
sighting of the missing child and Triangle Institute, 1989), 11.
5
when the parents or guardian National Center for Missing and Exploited


Children, Missing and Abducted Children: A
alerted authorities. While 24 hours Law Enforcement Guide to Case Investigation
or more may indicate apathy or ne- and Program Management (Alexandria, VA,
glect, this time frame also can per- Almost no other 1994), 93.
6
petuate the common misconception K. Hanfland, R. Keppel, and J. Weis, Case
that an individual must be missing
crime investigation Management for Missing Children: Homicide

for 24 hours before law enforce- will stretch resources Investigation, Washington State Attorney
General’s Office, 1997.
ment can respond. The responding and generate public 7
National Center for Missing and Exploited
officers should construct a time line criticism as a Children, Investigator’s Guide to Missing Child
Cases (Alexandria, VA, 1987), 2.
identifying the parents’ activities missing child case. 8
Ibid, 6.
during this window. This time line 9
Adopted from the Federal Bureau of


highlights family dynamics and Investigation, Critical Incident Response
clarifies the parents’ potential role Group, National Center for the Analysis of
Violent Crime, Child Abduction Response
in the child’s disappearance.13 Plan, (Quantico, VA), 15-16.
Finally, law enforcement agen- 10
For more information, agencies can
CONCLUSION cies must provide their patrol offi- contact the NCAVC coordinator at their local
Given the extraordinary cers with adequate resources and FBI field office.
11
Interview with Supervisory Special Agent
amount of time and resources an training that will allow for a thor- Mark Hilts, Federal Bureau of Investigation,
abducted child case can drain from ough assessment of the facts. Re- NCAVC, March 2, 1999.
a police department, law enforce- search indicates that when police 12
Supra note 3, 63. Law enforcement
ment agencies should take measures agencies pursue missing child cases officers should consult with their departments’
legal advisors to ensure that any search of a
to ensure that they do not label an with vigor, child recovery outcomes residence is legal.
abduction as a runaway—an error improve.14 In spite of the often am- 13
Supra note 9, 17.
that can cripple the subsequent in- biguous nature of the missing child 14
Supra note 4, 137.
vestigation. This mistaken labeling report, law enforcement officers

November 2000 / 7
Perspective
Professional Police the issue of racial profiling will elevate the level of
information and institutional knowledge about the
Traffic Stops problem. Administrators can defuse potential contro-
Strategies to Address versy with officers by assuring them that the objective
Racial Profiling of the agency is the protection of individual rights for
By Grady Carrick, M.S., M.P.A. all citizens.
Establishing policy in a potentially controversial
arena, such as racial profiling, requires leadership

T he phenomenon of targeting “people of color”


in traffic enforcement as a pretext to further
investigation or search describes the term racial
from the top of the organization. Once an agency has
established its direction through a well-structured
policy, the agency’s leaders must bring the message
personally to the employees, as well as the public.
profiling. To professional law enforcement officers
“Management by walking around” represents a sound
and the public, racial profiling is blatantly objection-
leadership practice and proves crucial when imple-
able and indefensible. Basically, it amounts to the
menting a policy regarding racial profiling. Adminis-
improper practice of selecting potential criminal
trators must demonstrate that they hold personal
suspects because of their race or ethnicity.
convictions about the issue and welcome questions on
The law enforcement response to racial profiling,
the topic. By taking the message to the public, they
termed professional police traffic stops, can ensure
provide assurance that their agency will not tolerate
that officers base their behavior on sound legal
any type of racial discrimination.
reason, safety for officers and citizens, and the
accepted standards of modern policing. The reason Officer Training
for the stop and any enforcement action of the officer Integrating discussion about racial profiling into
must be legally and morally defensible. The mechani- diversity and refresher training proves beneficial.
cal elements of executing a professional police traffic Agencies may not need to create an additional forum
stop aside, agencies need a comprehensive strategy for the issue, provided they adequately can infuse it
for success. To implement professional police traffic
stops, agencies must adopt a three-dimensional
approach. Organizational policy, officer training, and
data collection represent the essential ingredients of a Major Carrick serves as
comprehensive agency strategy. a Florida Highway Patrol
troop commander for
northeast Florida.
Agency Policy
Policy formation is the process of establishing a
new direction for agency philosophy or employee
conduct. Agencies must develop a well-structured
policy concerning professional traffic stops, outlining
the conduct of officers and prohibition of discrimina-
tory practices. Managers, supervisors, and the entire
workforce must embrace and employ the policy.
Involving the organizational decision makers and
managers in the policy development process ensures
that the agency leader works from complete, accurate
information and assumptions. It also dramatically
increases the chance that subordinate supervisors will
“buy into” the new agenda. Workshop discussions on

8 / FBI Law Enforcement Bulletin


into an existing program. Nationally, the Police • rationale for the search;
Officer Standards and Training Commission should • nature of contraband recovered, if any; and
evaluate the topic for inclusion in current diversity
training programs required for all officers. Moreover, • enforcement action taken during the stop (e.g.,
the discussion of racial profiling is appropriate for ticket issued or warning given).
both entry-level and in-service officer training. While traffic citation data can prove useful,
The body of knowledge concerning racial profil- critics argue that many stops do not result in the
ing is growing rapidly. Reams of information are issuance of a citation. Notably, the “questionable
available on the Internet, and many media stories are stops” that are predicated on no articulatable reason
readily obtainable. While empirical data is lacking, cannot result in enforcement action because they were
stories and accounts from the public can assist not the result of a violation occurring. Officers who
officers in understanding the scope of the problem use profiling tactics typically do not “give paper” to
and the emotions created by racial profiling. Most individuals they stop who subsequently turn out not to
cases focus on stops to search for contraband in be criminals. Therefore, agencies may find traffic
vehicles, but the tentacles of the misconduct reach ticket or other statistical information a good starting
into every aspect of life for the targeted motorist. point, but may need a more comprehensive data set to
Agencies may want to consult local chapters of the provide insight into their use or nonuse of profiles.
National Association for the Advancement of Colored To obtain complete data, agencies may need to
People or the American Civil Liberties Union to modify their traffic citation, written warning, or field
obtain accounts and examples for use in training interview forms. An alternative to these changes may
programs. include having officers complete a
Raising sensitivity to the issue, separate form that captures the
as well as reinforcing the agency’s desired information. Either way, a
position, stands as the objective of snapshot of who officers are
the training. Agencies must ensure
that a clear message is delivered to
all employees—racial profiling is
not an acceptable law enforcement

...racial profiling is
blatantly
objectionable
stopping is needed. Policy should
require officers to document each
traffic stop they initiate. By
requiring data collection on all
practice and will not be tolerated. and indefensible. stops, agencies obtain a complete
data set and an accurate depiction
Data Collection of officer actions. Complete data
Agencies must offer a skepti-
cal public more than rhetoric
concerning their stance on the
issue. Statistics comparing traffic stop demographics Many
” collection on all stops also mini-
mizes the ability of unethical
officers to hide improper conduct.
jurisdictions have taken the initiative to
with population demographics can assure the public begin tracking traffic stop statistics, including San
that an agency does not practice racial profiling. In Diego and San Jose, California; Houston, Texas; and
short, agencies must collect information that shows many others. Two states, Connecticut and North
that they do not stop a disproportionate number of Carolina, have enacted legislation that will require
minorities. According to recent proposed federal such record keeping. Recently, the Florida Highway
1
legislation, traffic stop data collection should include Patrol, like other state police agencies, has imple-
the— mented collection. Many other states and jurisdictions
• reason for the stop; are considering similar action.
While this trend toward voluntary data collection
• race, sex, approximate age, and ethnicity of the can result in aggregate statistics demonstrating that an
individual stopped; agency’s enforcement action is consistent with popu-
• type of search conducted, if any; lation demographics, it also can monitor individual

November 2000 / 9
performance. At the officer level, agencies can use with the facts necessary to assure their communities
this data to ensure that individual officers do not base that they do not employ racial profiling. Voluntary
their enforcement on racial profiles. Using this two- collection of traffic stop data is an attractive route for
pronged data analysis, agencies can address ad- agencies who may undertake collection on their own,
equately any issues that arise concerning racial or as part of a broader program among multiple
profiling. agencies. A systematic and standardized approach is
desirable, implemented at the state level where
Conclusion possible. Uniformity allows for a larger data set that
Both state and federal lawmakers continue to will increase reliability and validity in the statistics
consider legislation prohibiting racial profiling. This derived.
issue concerns every community, and law enforce- The highly visible function of police patrol and
ment must recognize these concerns. Citizen percep- traffic enforcement mandates professionalism in
tions regarding professional police practices may traffic stops. By implementing a strategy that ad-
require agency modification of policy, additional dresses racial profiling, agencies move closer to
training, and statistical monitoring. While the topic of professionalism. Moreover, implementing a program
racial profiling often proves uncomfortable for law for professional police traffic stops can protect and
enforcement, ensuring that appropriate measures are strengthen the bond of trust between the public and
in place reduces some of the anxiety that accompanies the police.
the issue.
Besides a well-structured policy and effective Endnotes
training, reliable data can bolster agency prohibition 1
Traffic Stop Statistics Act of 1999, U.S. Senate Bill 821, 106th
of such practices and arm law enforcement officials Congress, April 15, 1999.

The Bulletin’s
E-mail Address

T he FBI Law Enforcement Bulletin staff invites


you to communicate with us via e-mail. Our
Internet address is leb@fbiacademy.edu.
We would like to know your thoughts on
contemporary law enforcement issues. We
welcome your comments, questions, and
suggestions concerning the magazine.
Please include your name, title, and
agency on all e-mail messages.
Also, the Bulletin is available
for viewing or downloading on a
number of computer services,
as well as the FBI’s home page.
The home page address is
http://www.fbi.gov.

10 / FBI Law Enforcement Bulletin


Stealing Secrets Solved
Examining the Economic
Espionage Act of 1996
By THOMAS R. STUTLER
© Digital Stock

I n January 1997, Ted Hong manufactures and sells pressure- frequently targeted industries in-
“Victor” Lee attended a meet- sensitive products 2 in Taiwan, clude aerospace, biotechnology,
ing at Avery Denison, one of Malaysia, Singapore, the United computer hardware and software,
the largest manufacturers of adhe- States, and the People’s Republic of transportation technology, defense
sive products in the United States, China.3 Avery Denison estimated and armaments technology, energy
where he and others learned of a its lost at over $50 million. research, basic research, and la-
binder containing confidential in- Within U.S. borders, the FBI sers.4 Estimates of losses from eco-
formation on the company’s plans has assumed the role of understand- nomic espionage in the United
for the Far East. Later, closed-cir- ing and dealing with the problem of States range from almost $2 billion
cuit television showed Lee gaining stealing secrets. The economy is to $240 billion per year.5
access three times to the file drawer shifting steadily from one based on Prior to 1996, state and federal
where the binder was kept, and tangible goods to one based on in- laws did not address economic es-
wearing gloves once, when he re- formation, commonly referred to as pionage specifically, or in particu-
moved it from the office for a few intellectual property. The United lar, the theft of intellectual prop-
minutes.1 Confronted by FBI agents States produces much of the erty, in any systematic manner.6
in March 1997, Lee admitted that he world’s intellectual property and But, federal law enforcement has
had provided confidential informa- remains the primary target of a new weapon in its arsenal to
tion to Four Pillars, a company that economic espionage. The most use against industrial thieves—the

November 2000 / 11
“ Finally, long-standing
civil remedies that
recognize the value
integral part of economic well-
being in the United States. More-
over, the nation’s economic inter-
ests are a part of its national security
interests. Thus, threats to the
of intellectual economy jeopardize the nation’s vi-
tal security interest. Congress re-
property now have mains committed to stopping the
a twin in the often-elusive adversary, as evi-
criminal world. denced by its efforts in this area.
Unlike patents, copyrights, and

Special Agent Stutler serves in the FBI’s


Oakland, California, resident agency. ” trademarks, no federal trade secrets
statute existed. On October 11,
1996, the President signed the Eco-
nomic Espionage Act,9 which gave
the U.S. Department of Justice the
authority to prosecute cases both
Economic Espionage Act of 1996, a a foreign government or a company, domestically and internationally in
comprehensive federal criminal the perpetrator of the theft had the area of economic espionage.
statute that helps law enforcement a “trust” relationship with the Thus, the theft of trade secrets be-
investigate economic espionage and company, such as an employee or came a federal criminal offense.
punish criminals and spies in an un- former employee, retiree, contrac- This echoes the civil view that
precedented manner. tor, vendor supplier, consultant, or “trade secret protection is an impor-
business partner. tant part of intellectual property that
BEHIND THE LAW Since the signing of the Consti- is of growing importance to the
On May 9, 1996, FBI Director tution, corporations to Congress competitiveness of American in-
Louis J. Freeh testified to Congress have sought hard to protect people dustry. The future of the nation de-
that individuals or organizations who create ideas and punish people pends in no small part on the effi-
from 23 different countries were who steal ideas, regardless of ciency of industry, and the
conducting economic espionage ac- whether they are competitors or efficiency of industry depends in no
tivity against the United States. spies. Many companies do not have small part on the protection of intel-
Long-time political and military al- resources to pursue a defendant, lectual property.”10 Finally, long-
lies target the United States and, in and some are confounded by situa- standing civil remedies that recog-
some cases, take advantage of their tions involving foreign defendants nize the value of intellectual
considerable legitimate access to or those with no assets. In other property now have a twin in the
U.S. sources to collect sensitive in- instances, companies have declined criminal world.
formation. Experts have identified to pursue legal remedies to avoid Previously, most federal crimi-
foreign nations involved in 21 per- the discovery process because it nal enforcement in this area used
cent of incidents concerning intel- would force the disclosure of the the Interstate Transportation of Sto-
lectual property loss where they sensitive information they sought to len Property Act (ITSP),11 the mail
knew the nationality of the perpe- protect. History has shown that the fraud statute,12 or the fraud by wire
trators.7 Some countries maintain a security and survival of a nation de- statute.13 Agencies used mail and
military alliance with the United pends on how well it keeps secrets.8 wire fraud statutes on a limited ba-
States and use their intelligence ser- The development of trade secrets, sis because they required use of
vices to simultaneously target U.S. also known as proprietary eco- mail or interstate communications.
technologies. In cases not involving nomic information, represents an Also, the U.S. Supreme Court

12 / FBI Law Enforcement Bulletin


essentially negated the use of the two sections: Section 1831, Eco- requires an “economic benefit,”
ITSP Act in intellectual property nomic Espionage, and Section which recognizes that the foreign
cases by holding that “the element 1832, Theft of Trade Secrets, which entity necessarily might not receive
of physical goods, wares, or mer- together form the Economic Es- an economic benefit. The Economic
chandise in sections 2314 and 2315 pionage Act of 1996. In an effort to Espionage Act is not intended to
is critical. The limitation which this protect corporate equities from apply to innocent innovators or to
places on the reach of the ITSP Act spies, as well as criminals, Con- individuals who seek to capitalize
is imposed by the statute itself, and gress punishes them both under this on the personal knowledge, skill, or
must be observed.”14 With little law. abilities they may have developed.16
chance that other courts would rule The statute is not intended to pros-
differently to expand the ITSP What Is Economic Espionage? ecute employees who change em-
Act—a 1930s vintage law—to in- Economic espionage expands ployers or start their own compa-
clude intellectual property, Con- on concepts related to industrial es- nies using general knowledge and
gress enacted the Economic Espio- pionage. It includes activity by for- skills developed while employed.
nage Act of 1996, which effectively eign governments that might use the However, Congress purposely
provides a unique and independent classic espionage apparatus to spy criminalized the act of individuals
means to combat economic on a company, and ranges from be- who leave their job and use their
espionage. havior such as two U.S. companies knowledge about specific products
or processes in order to duplicate
UNDERSTANDING THE LAW them or develop similar goods for


The Economic Espionage Act themselves or a new employer to
creates a new crime of wrongfully compete with their former
copying or otherwise controlling company.
trade secrets, if done with the intent
The economy is An earlier version of the statute
either to benefit a foreign govern- shifting steadily from contained language that exempted
ment, instrumentality, or agent, or one based on tangible “knowledge, experience, training or
to disadvantage the rightful owner goods to one based skill that a person lawfully acquires
of the trade secret and for the eco- on information.... during their work as an employee”
nomic benefit of another person. from coverage under the act. Some


The law applies to conduct occur- commentators speculate that by
ring in the United States, and to subjecting employees and their sub-
conduct occurring outside the sequent employers to potential
United States provided that the of- attempting to uncover each other’s criminal liability in this area, the
fender is either a U.S. citizen or bid proposals to the disgruntled law will hamper the mobility of em-
resident alien, an organization sub- former employee who leaves the ployees and have a chilling effect
stantially owned or controlled by a company with a computer diskette on this mobility, in part responsible
citizen or permanent resident, or an full of engineering schematics.15 for the vibrancy of the American
organization incorporated in the The Economic Espionage Act economy and substantially condu-
United States or that an act in fur- prohibits the taking, copying, or re- cive to the stability of the nation’s
therance of the offense was com- ceiving of trade secrets without au- democracy. Perhaps in recognition
mitted in the United States. thorization. Section 1831 prohibits of this, the U.S. Attorney General
As intangible assets, such as anyone from doing so for the “ben- stated that the Attorney General’s
intellectual property and trade efit” of any foreign government, Office must review all complaints
secrets, became increasingly foreign instrumentality, or foreign brought under this act for the 5
important to a company’s survival, agent. Interestingly, Section 1832 years following its enactment in
Congress expanded Title 18 with deals with domestic theft and 1996.17

November 2000 / 13
What Are Trade Secrets? CONFIDENTIALITY ISSUES reluctant to issue protective orders
Two key concepts used in the Congress recognized the need out of concern for the defendant’s
Economic Espionage Act involve to preserve the confidential and right to a fair trial, companies might
the requirement that the economic valuable nature of trade secrets. develop reluctance to bring com-
information involved is a secret in Therefore, the Economic Espionage plaints under this statute in fear that
the legal sense and that the owner of Act contains a provision that autho- their secrets will suffer even
secret information takes reasonable rizes the court to issue orders during broader exposure.
measures to keep it a secret.18 Previ- legal proceedings consistent with
ously, the courts were reluctant to the requirements of the Federal PUNISHMENT
regard intellectual property as tan- Rules of Criminal and Civil Proce- The Economic Espionage Act
gible goods to have protection un- dure, the Federal Rules of Evi- of 1996 punishes criminals and
der federal criminal law. In the stat- dence, and all other applicable laws. spies in an unprecedented manner.
ute, Congress uses terms usually The House Judiciary Committee It authorizes substantial sentences
associated with ownership of tan- pointed out that without such a pro- for individual and organizational
gible property. A proprietary secret vision, owners may be reluctant to defendants and can include fines
for purposes of the economic espio- cooperate in prosecutions for fear and forfeiture penalties. Individuals
nage law applies to information not of further exposing their trade se- may receive fines of up to $500,000
generally known to the public or the crets to public view, thus further and an imprisonment sentence of up
business, scientific, or educational devaluing or even destroying their to 15 years for economic espionage
community in which the owner worth. benefitting foreign entities and
might seek to use the information.19 fines of up to $5 million and impris-
onment for up to 10 years for the


What Constitutes theft of a trade secret.21 Organiza-
Reasonable Measures? tions may receive fines up to $10
A trade secret requires that the million for economic espionage and
owner of the information must have The Economic up to $5 million for the theft of a
taken reasonable and active mea- Espionage Act trade secret.22 Additionally, a court
sures to protect the information of 1996 punishes may require defendants to forfeit
from becoming known to unautho- criminals and spies any property or proceeds to the
rized individuals. Thus, if owners in an unprecedented United States obtained as the result
fail to attempt to safeguard their of the violation of the law as man-
proprietary information, no one can
manner. dated in the Comprehensive Drug


be rightfully accused of misappro- Abuse Prevention Control Act of
priating it. 1970.23 This statute defines prop-
The term reasonable measures erty subject to forfeiture not only as
is not defined specifically, but a Because courts only recently property derived directly or indi-
reading of the House Report indi- have begun to test this provision of rectly from the offense, but also
cates that, while owners of informa- the statute, it remains too early to “property used, or intended to be
tion must take reasonable steps to tell how it will be implemented in used, in any manner or part, to com-
keep the information secret, owners actual practice, but it could prove mit, or to facilitate the commission
do not have to exhaust every con- a serious problem in cases where of such violation.”24
ceivable means to keep the informa- the secret to be protected is one of Some individuals argue that,
tion secure. Thus, reasonableness the central issues.20 The criminal unlike copyrights or patents, trade
will vary from case to case and de- defendant has the right to a public secrets are not defined clearly and
pend upon the nature of the infor- trial with all pertinent facts placed may represent very broad and gen-
mation in question. before a jury. Should courts prove eral business methods or ideas that

14 / FBI Law Enforcement Bulletin


affect wide parts of a business or State and local law enforcement by police officers, detectives, and
entire industry. Large forfeitures officials’ understanding of the corporate security personnel re-
could result based on the theft of a Economic Espionage Act helps be- mains invaluable for tracking and
single idea. Similarly, the second cause oftentimes they receive the uncovering schemes to commit
provision, which allows forfeiture first call from a victim company economic espionage.29
of property used in any manner to suffering a loss or theft of intellec-
facilitate violations, could subject tual property. An understanding of RECOMMENDATIONS
an entire international computer “the bigger picture” aids initial ef- Due to the nature of economic
network to forfeiture because one forts to collect evidence. For in- espionage, violations do not occur
computer was used. Such broad stance, a police officer responding on a daily basis. Nor do these viola-
definitions of forfeitable property to a trespasser sifting through gar- tions occur typically in plain view
may have a stifling effect on lawful bage cans on private property might like most white collar crimes, such
business behavior because of the have the only law enforcement op- as fraud, money laundering, em-
risk of consequences from a minor portunity to uncover a widespread bezzlement, and advance fee
violation.25 schemes. Law enforcement discov-
Additionally, the statute allows © Digital Stock ers most economic espionage viola-
the U.S. government to apply for an tions through the use of criminal
injunction against a person commit- informants, cooperating witnesses,
ting a violation of the Economic Es- and victims. Liaison with corporate
pionage statute. The individual vic- security personnel also may lead to
tims and private parties have the developing cases in this area.
traditional injunctive relief avail- Federal, state, and local au-
able in state courts. thorities are working together to in-
crease the awareness and threat of
THE ROLE OF LAW economic espionage. Many agen-
ENFORCEMENT cies take a proactive approach, such
The Economic Espionage Act as the FBI’s ANSIR program that
of 1996 expands the FBI’s criminal focuses on intellectual property by
investigative jurisdiction and en- promoting the existence of the Eco-
hances its existing counterintelli- nomic Espionage Act, while some
gence responsibilities. At present, departments offer case studies for
the FBI investigates approximately corporate entities to digest.
270 criminal violations and is the “dumpster diving” effort by a busi- On a day-to-day basis, local law
lead counterintelligence agency in ness competitor or foreign entity to enforcement’s understanding of
the United States, responsible for collect intelligence.27 Trespassers this violation advertises the law to
safeguarding the nation against of this nature often have multiple the general public and corporations.
the threat posed by foreign intelli- identifications,28 a vehicle nearby The increasing popularity of using
gence services. In the counterintel- containing more trash collected e-mail and Web sites and conduct-
ligence world, the FBI thwarts ef- from other companies, and a time ing business over the Internet re-
forts through a variety of means, schedule to deliver trash to a central sults in companies becoming vic-
such as identifying threats, stopping location. Trespassers who claim tims repeatedly without ever
such operations through court- they recycle for money usually do knowing it. Oftentimes, the corpo-
authorized electronic or physical not know the location of the recy- rate world does not consider secu-
surveillance, and recruiting mem- cling center. Information, such as rity until after a company incurs a
bers of foreign intelligence service names, times, locations, and vehicle loss. Education remains one of the
as double agents.26 description information developed keys to success.

November 2000 / 15
2
CONCLUSION For example, pressure-sensitive products American Society of Industrial Security,
include address and mailing labels designed to (Arlington, VA: March 1, 1996).
The days of catching the spy pass through all types of printers without 8
Economic Espionage Act of 1996, 104th
or the criminal sneaking boxes or adversely affecting the adhesive backing of the Cong., 2nd sess., H.R. 104-788 (September 16,
folders out the door in a briefcase label. 1996).
3 9
no longer exist. Today, enough Supra note 1. 18 U.S.C. 1831 (Economic Espionage)
4
Senator Specter, Congress, U.S. Senate, and 18 U.S. C. 1832 (Theft of Trade Secrets).
information to fill a public library speaking on the Economic Espionage Act of 10
Rockwell Graphic Systems, Inc., v. DEV
easily fits on a CD-ROM or can go 1996 to the Select Committee on Intelligence of Industries, 925 F.2d 174, 180 (7th Cir. 1991).
undetected over the Internet in sec- the U.S. Senate and the Subcommittee on 11
18 U.S.C. § 2314.
12
onds at the push of a button. Law Terrorism, Technology, and Government 18 U.S.C. § 1341.
13
Information of the Committee on the Judiciary 18 U.S.C. § 1343.
enforcement and security personnel of the U.S. Senate. 104th Cong., 2nd Session, 14
United States vs. Brown, 925 F.2d 1301
who investigate economic crimes S12208 (daily ed. October 2, 1996). (10th Cir. 1991).
should realize that victims of eco- 15
Supra note 8.
16
nomic espionage, both individual Supra note 8.
17
21 U.S.C. § 853.


and corporate, reluctantly may dis- 18
18 U.S.C. § 1839. The term owner, with
close information or work with law respect to a trade secret, means the person or
enforcement on these matters. entity in whom or in which rightful legal or
Companies answer to shareholders, Law enforcement equitable title to or license in the trade secret is
reposed.
consumers, and investors and, discovers most 19
Supra note 8.
therefore, often make their deci- economic espionage 20
See U.S. v. Kai-Lo Hsu, 982 F. Supp.
sions not with concern for reporting violations through 1022 (E.D. Pa. 1997) 20, cited as example.
21
illegal criminal activity but rather 21 U.S.C. § 1831 and § 1832.
with reference to how disclosure
the use of criminal 22
Ibid.
23

will affect the bottom line and mar- informants, 24


21 U.S.C. § 853.
21 U.S.C. § 853(a)(2).
ket share. Companies may believe cooperating witnesses, 25
Leslie G. Berkowitz, “The Economic
that becoming involved in this sort and victims. Espionage Act of 1996: An Experiment in
Unintended Consequences?” 26 Colorado
of criminal prosecution literally


Lawyer 12 (December 1997).
could prove counterproductive. Ul- 26
Speech by Howard M. Shapiro, former
timately, they have to protect them- General Counsel, FBI, at a Cornell Law School
selves and often only with the help forum sponsored by the Criminal Justice
5
See, e.g., Peter J. G. Toren, “The Society, October 18, 1994.
of law enforcement. Prosecution of Trade Secrets Thefts Under 27
Dumpster diving is the act of going
Fortunately, the loss of intellec- Federal Law,” 22 Pepperdine Law Review 59, through someone’s trash to get information
tual property is no longer just a civil at 62 (1994) ($1.8 billion) and Sam Perry, about them. As a general rule, trash on the curb
“Economic Espionage: The Corporate Threat,” has no expectation of privacy while trash on
matter and, therefore, law enforce- ($240 billion) available from http://the- private property does.
ment should not treat it as one. The south.com/USInternational/econ.html; 28
More than five false identifications may
Economic Espionage and Theft of accessed September 11, 2000. be a violation of federal law under the Fraud
6
Trade Secrets Act of 1996 provides State law did not adequately fill the gaps and Related Activity to Identification
left by federal law. While the majority of states Documents (FRAID) Act, 18 U.S.C. § 1028.
a powerful and viable tool for law have some form of civil remedy for the theft of 29
The FBI uses the Awareness of National
enforcement to protect individuals proprietary economic information (trade Security Issues and Response (ANSIR) program
and corporations, while seriously secrets), either by recognizing a tort for the to communicate with industry, provide
punishing spies and thieves. misappropriation of the information or by advisories and alerts on topics such as
enforcing contracts governing the use of the economic espionage, and present unclassified
information, these civil remedies often are briefings to corporate security personnel
Endnotes insufficient. House Report 104-788, 104th nationwide. For more information or to make a
1
United States of America v. Pin Yen Yang Cong., 2nd Session (September 16, 1996). referral, contact the FBI ANSIR coordinator at
7
et al., Criminal No. 97 CR 288 (N.D. Ohio, Richard J. Heffernan, Dan T. Swarthwood, the local FBI field office, or access
September 4, 1997). “Trends in Intellectual Property Loss Survey,” www.fbi.gov.

16 / FBI Law Enforcement Bulletin


Book Review

Police Auditing: Theories and Practices recommendations. These credentials allow him
by Allan Y. Jiao, Ph.D., Charles C. Thomas, to draw upon his research and practical audit
Springfield, Illinois, 1999. experience at the city level and from govern-
Police Auditing focuses primarily on mental and international departments to provide
theories and practices in law enforcement valuable information, in a systematic approach,
auditing. It provides a comprehensive view to the entire law enforcement community. He
of auditing by examining empirical standards, identifies outstanding demonstrated audit proce-
procedures, and practices and evaluations of dures and methods of improved audit effective-
conducting and responding to such audits. ness and integrates them throughout the book.
Developing and maintaining positive In the chapter titled “Variety Police Au-
changes in law enforcement departments that dits,” the author makes a relevant point that law
eliminate gaps in performance and enhance enforcement auditing is not tied just to financial
interface with technology and the community records involving allocation and expenditures
are stressed in Police Auditing. These improve- of the budget and grants. The audit must address
ments help managers develop their short- and the total aspects of all law enforcement opera-
long-range strategies and operational planning tions that compose and interface with the book’s
efforts. This book does not cover accounting identified elements that will ultimately provide
practices and is not a summary of a scientific local residents and merchants with a safer living
research report. and business environment.
The book provides law enforcement with The author ends each chapter with an
various auditing methods to assist police depart- abstract to help auditors prepare an executive
ments in becoming more efficient, effective, summary for distribution throughout law
and financially competent. It accomplishes this enforcement oversight offices and their organi-
through a model for planned change and police zation and improve overall audit performance.
auditing that incorporates certain interrelated When police auditors and department managers
elements applicable to police auditing, regard- apply the procedures described in Police
less of a department’s mission and size. Auditing, the benefits can lead beyond the
This book examines eight components of basics of just reviewing and documenting and
implementing auditing changes that will give aid them in completing a variety of other
shape and direction to a law enforcement department goals. Police executives, supervi-
agency’s vision and culture. Some examples sors, accountants, audit team members, depart-
of these include coping with external/internal ment trainers, citizen review board members,
pressures, closing performance gaps, meeting and academic personnel should add Police
goals and objectives, and developing solutions Auditing to their intended reading list.
and alternatives. These points will aid adminis-
trators in developing a systematic and compre- Reviewed by
hensive review in improving their departments. Larry R. Moore
The author served as a member of a munic- Certified Emergency Manager
ipal budget review task force and as chairman International Association
of a city public safety committee that evaluated of Emergency Managers
law enforcement responses to various audit Knoxville, Tennessee

November 2000 / 17
The
Microscopic
Slide
A Potential
DNA
Reservoir
By JOHN E. SMIALEK, M.D.,
CHARLOTTE WORD, Ph.D., and
ARTHUR E. WESTVEER, M.L.A.

D etectives of the Baltimore


County, Maryland, Police
Department began pursu-
ing a lead in a sexual-assault homi-
cide case, which had remained un-
solved for 19 years. In an effort to
identify DNA evidence from the
victim, officers requested the mi-
croscopic slides, made during the
autopsy, from the chief medical
examiner’s office. Because the pro-
cess of extracting DNA results in
the loss of cellular material on the
slide, the medical examiner photo- © PhotoDisc
graphed and delivered the slides,
through the proper chain of cus-
tody, to the Baltimore County Po- perspiration). Individuals leave investigation scenes provides valu-
lice Department, who, subse- DNA evidence on many items, such able evidence. Therefore, law en-
quently, delivered them to a as cigarette butts, facial tissues, and forcement officers must inform in-
nationally recognized DNA labora- eyeglasses. Law enforcement offic- vestigators when DNA material
tory. In turn, the laboratory staff ers only need a few cells from an exists and obtain, secure, and pre-
extracted sufficient DNA from the individual to recover DNA. serve the DNA evidence properly.
slides to produce a satisfactory DNA testing has identified per-
DNA profile to assist in solving the petrators years after they have com- Obtaining and Securing
case. mitted a crime.1 Evidence retained DNA Material
DNA, also known as a “genetic in adjudicated cases may exonerate Evidence obtained decades ago
fingerprint,” exists in biological an individual accused wrongly can contain forensically valuable
materials (e.g., blood, semen, and identify the true perpetrator. DNA material. However, environ-
skin cells, bone, saliva, and DNA material from homicide mental factors that exist at a crime

18 / FBI Law Enforcement Bulletin


scene (e.g., heat, sunlight, moisture, technique to replicate DNA. This careful procedures to obtain and se-
bacteria, and mold 2) can affect technique involves extracting DNA cure DNA material, they must take
DNA and render it useless. If not from a small evidence sample and appropriate steps to preserve and
properly obtained and secured, then replicating it through a com- process DNA evidence correctly as
DNA evidence can degrade. Offi- plex operation of repeated heating well.
cers should ensure that DNA evi- and cooling cycles and exposure to
dence remains dry and at room tem- an enzyme. Because each cycle Preserving and Processing
perature and secured in paper bags doubles the quantity of DNA, ex- DNA Evidence
or envelopes, sealed and labeled perts can replicate the original ex- Today, investigators can reex-
properly. Officers should never traction several million times amine evidence from preserved
place DNA evidence in plastic con- within a short period.3 But, the PCR DNA samples using newer and
tainers, direct sunlight, or the trunk process cannot distinguish between more sophisticated technologies
of a car. DNA from a suspect and another unavailable when they obtained the
When identifying, obtaining, source. Therefore, any substantial evidence. For DNA evidence to
and handling DNA evidence, offi- contamination to the DNA material meet legal and scientific require-
cers must ensure that they do not will result in a confusing result. ments for admissibility in court, in-
contaminate the material. Contami- Biological material may con- vestigators must follow certain pro-
nation occurs when the evidence tain hazardous pathogens that can cedures to preserve the DNA
comes in contact with another cause potentially lethal diseases. evidence properly and to prevent
individual’s body fluids through ac- Law enforcement officers always decomposition and deterioration.
tions, such as sneezing, coughing, should contact their laboratory per- First, as with any evidence, agen-
or touching. Contamination be- sonnel or evidence collection tech- cies must maintain a proper chain of
comes a critical issue because to- nicians when they have questions custody when handling DNA mate-
day, laboratories use the poly- about obtaining or securing DNA rial. When transferring DNA evi-
merase chain reaction (PCR) evidence. After officers follow dence by direct or indirect means,

Dr. Smialek, the chief medical Dr. Word serves as a forensic Mr. Westveer is a violent
examiner for Maryland, heads laboratory deputy director for crime specialist in the
the Forensic Pathology Division, a private firm in Germantown, Behavioral Science Unit
Department of Pathology, School Maryland. at the FBI Academy.
of Medicine, at the University of
Maryland in College Park.

November 2000 / 19
Case Scenarios
Case #1 Case #2
In 1982, the Naval Criminal Investigative The Richmond, Virginia, Police Department
Service opened a homicide case that involved investigated a homicide with little evidence and
the rape and murder of a woman, placed in the few leads. However, investigators secured blood
trunk of a car and pushed into a bay. Investi- and semen samples from the scene. Officers
gators recovered little evidence from the scene identified a suspect, but DNA analysis exoner-
except some DNA material. This case remained ated him. Four years later, investigators exam-
unsolved until 1995 when, with support from ined these samples again and submitted them to
new analysis of the 14-year-old DNA, investi- their state’s DNA indexing system. The DNA
gators reexamined the case and identified a samples from the homicide matched samples
suspect. Officers arrested and charged the from a 20-year-old man who had a criminal
suspect with the rape and murder of the female history of rape and murder. Officers charged
victim. the suspect with the 4-year-old homicide.

the material remains on surfaces by scopic slide, this evidence retains Advancing Technology
absorption or adherence.4 Liquid its DNA characteristics. But, the Recent efforts at the local, state,
biological evidence (e.g., blood, se- specimen must remain sequestered and federal levels of government to
men, and urine) absorbs into sur- from exposure to environmental ef- employ advanced information sys-
faces, and solid biological evidence fects, which could result in decom- tem technologies emphasize the im-
(e.g., hair, bones, and teeth) adheres position and deterioration. If the portance of preserving DNA
to surfaces. The proper way to pre- material transferred to the slide con- samples. For example, the FBI cre-
serve DNA evidence depends on tains a sufficient number of sperm, ated a National DNA Indexing Sys-
the liquid or solid state and the con- experts can use the PCR technique tem (NDIS) that uses computer ap-
dition of the evidence.5 to identify the male’s DNA profile, plications and forensic science
Medical examiners and foren- regardless of the time interval from practices to match DNA samples
sic pathologists permanently main- when they made the slide. across the country.9 In this effort,
tain microscopic slides that contain Smear preparation of DNA ma- scientists analyze DNA samples
biological evidence from a swab of terial, which includes drying by air, and store profiles of the biological
a body cavity taken at the time of an immersing in several liquids, and evidence in a computer database.
autopsy. Experts have extracted mounting on various kinds of mate- Public forensic laboratories
DNA material successfully from rial, does not degrade the genetic throughout the United States use
medical examiners’ offices, hospi- material. Similarly, DNA tissues these profiles to exchange and com-
tals, or rape kits.6 The critical num- preserved in paraffin blocks, such pare DNA profiles electronically.10
ber of sperm on a slide for as surgical specimens, often remain If an electronic match results, the
successful DNA testing appears suitable for PCR testing. Research FBI notifies the submitting jurisdic-
to exist in the range of at least over the past 10 years has demon- tion and further investigation en-
100.7 For example, after experts strated that tissues stored in forma- sues. Additionally, the design of the
properly fix, process, and stain a lin/formaldehyde may be suitable FBI’s Combined DNA Indexing
specimen of sperm on a micro- for DNA testing using PCR.8 System (CODIS) allows state and

20 / FBI Law Enforcement Bulletin


local law enforcement crime from 3 to 7 days. However, this time that investigators can use in DNA
laboratories to exchange and com- frame depends on the volume of re- testing years after the commission
pare DNA profiles electronically quests, the availability of trained of a crime. Efforts by law enforce-
as well. DNA samples in CODIS personnel, and the number of labo- ment officers and forensic patholo-
represent both DNA profiles from ratories equipped to conduct the gists to comb crime scenes for pos-
convicted felons and evidence from test. Regardless of the backlogs, the sible DNA material remain crucial
unsolved cases. advances in DNA analysis technol- to solving cases. Investigators must
In many instances, administra- ogy and information systems tech- remember to obtain, secure, and
tive backlogs, such as processing nology have combined to provide a preserve DNA material properly, or
and analyzing DNA and legal re- powerful law enforcement tool in the evidence will not meet admissi-
strictions on the collection of DNA solving some crimes. bility requirements in court. New
from offenders, have prevented technology in DNA analysis allows
these efforts from becoming more Conclusion crime laboratories to exchange and
successful. The processing of sus- Microscopic slides serve as compare DNA profiles, which can
pected DNA evidence usually takes valuable reservoirs of key evidence help solve crimes committed many

Identifying DNA Evidence

Possible Location of DNA


Evidence on the Evidence Source of DNA

baseball bat handle, end sweat, skin, blood, tissue

hat, bandanna, or mask inside sweat, hair, dandruff

eyeglasses nose or ear pieces, lens sweat, skin

toothpick tips saliva


tape or ligature inside/outside surface skin, sweat
bottle, can, or glass sides, mouthpiece saliva, sweat

“through and through” bullet outside surface blood, tissue

bite mark individual’s skin or clothing saliva

fingernail, partial fingernail scrapings blood, sweat, tissue

used cigarette cigarette butt saliva

Source: U.S. Department of Justice, National Institute of Justice, National Commission on the Future of DNA
Evidence, What Every Law Enforcement Officer Should Know About DNA Evidence, (Washington, DC, 1999).

November 2000 / 21
Contamination Precautions
To prevent contamination of DNA evidence, officers Wanted:
should— Photographs
• wear gloves and change them often;
• use disposable instruments or clean them thoroughly
before and after handling each sample;
• avoid touching the area where DNA evidence may exist;
• avoid talking, sneezing, and coughing over evidence;
• air-dry evidence thoroughly before packaging; and
• put evidence into new paper bags or envelopes, not into
plastic bags, and never use staples.
Source: U.S. Department of Justice, National Institute of Justice,
National Commission on the Future of DNA Evidence, What Every
T he Bulletin staff is
always on the lookout
for dynamic, law enforce-
Law Enforcement Officer Should Know About DNA Evidence, ment-related photos for
(Washington, DC, 1999). possible publication in the
magazine. We are interested
in photos that visually depict
the many aspects of the law
enforcement profession and
years prior to the DNA testing. http://www.ncjrs.org/txtfiles/13102-9.txt.; illustrate the various tasks
Biological evidence within police accessed November 10, 1999.
4
law enforcement personnel
U.S. Department of Justice, Federal
departments, maintained with a Bureau of Investigation, Handbook of Forensic
perform.
proper chain of custody, can assist Sciences: Evidence Examinations, available We can use either black-
in the successful identification of from http://www.fbi.gov/programs/lab/ and-white glossy or color
the perpetrator, as well as in the handbook/examsdna.htm.; accessed September prints or slides, although we
11, 2000. For questions concerning DNA
exoneration of a wrongly convicted evidence, contact the FBI Laboratory at
prefer prints (5x7 or 8x10).
person. 202-324-5436. Appropriate credit will be
5
Ibid. given to contributing photog-
6
Based on a study by one of the authors raphers when their work
Endnotes who recorded several successful extractions of
1 DNA material.
appears in the magazine. We
U.S. Department of Justice, Convicted by
Juries, Exonerated by Science: Case Studies 7
Ibid. suggest that you send dupli-
in the Use of DNA Evidence to Establish 8
D. Shibata, T. Namiki, R. Huguchi, cate, not original, prints as
Innocence After Trial, Research Report, “Identification of a Mislabeled Fixed Specimen we do not accept responsibil-
(Washington, DC, June 1996) and “Oops! by DNA Analysis, The Journal of Surgical
Pathology 14(1): 1076-1078, 1990.
ity for prints that may be
We Forgot to Put it in the Refrigerator: DNA
Identification and the State’s Duty to Preserve 9
U.S. Department of Justice, Federal damaged or lost. Send your
Evidence,” The John Marshall Law Review, Bureau of Investigation, “The National DNA photographs to:
25:809-836, 1992. Indexing System,” FBI National Press Release,
2
U.S. Department of Justice, National (Washington, DC, October 13, 1998). Brian Parnell, Art
10
Institute of Justice, National Commission on U.S. Department of Justice, Federal Director, FBI Law
the Future of DNA Evidence, What Every Law Bureau of Investigation, Ensuring Public Safety
Enforcement Officer Should Know About DNA and National Security Under the Rule of Law:
Enforcement Bulletin,
Evidence, (Washington, DC, 1999). A Report to the American People on the Work FBI Academy, Madison
3
U.S. Department of Justice, Office of of the FBI, 1993-1998, available from Building, Room 209,
Justice Programs, National Institute of Justice, www.fbi.gov/library5-year/5-year_rpt.htm; Quantico, VA 22135.
Automated DNA Typing: Method of the accessed September 11, 2000.
Future, February 1997; available from

22 / FBI Law Enforcement Bulletin


Focus on Cooperation
Joint Employee of the DNR divers, who, though accustomed to the
recovery of bodies in boating accidents, stated, “you
Assistance Programs think you get over it, but you just don’t.” These
By Mark Huguley, M.C.J. leaders formed a study group, which recommended
the establishment of a statewide law enforcement
© Richard E. Hunton Jr.
chaplaincy with a professional staff.
Establishing the Chaplaincy
Originally established as a volunteer program at
SLED, the chaplaincy obtained victim assistance
grant funding with a $355,985 initial award.1 The
grant enabled the chaplaincy to hire three employ-
ees—two ordained clergy and one clinical social
worker. When the program started, it primarily
supported sworn staff members dealing with the
effects of high stress critical incidents.
SLED, DNR, and the Departments of Public
Safety (DPS) and Probation, Pardon and Parole (PPP)
considered the work of the chaplaincy and decided to
continue it as an expanded program to assist civilians,
as well as sworn members of the four agencies. Each
agency realized it did not have an employee assis-
tance program (EAP) and interest evolved in that
direction. Because March 31, 2000, marked the end of
the grant, the agencies needed a new funding source.
Managers of the four agencies decided their depart-

I n 1997, when a young woman in Union, South


Carolina, reported her two sons abducted, she
simultaneously helped provide the genesis of a
statewide chaplaincy and, later, a full-fledged em-
ments could support a program better collectively
than on an individual basis.
Knowing that combined effort in a task force can
maximize the resources of participating organizations,
the agencies determined that sharing the operation of
ployee assistance program. The mother received a life a joint employee assistance program would prove
sentence for drowning her children to advance an effective. Subsequently, SLED, DPS, DNR, and PPP
extramarital affair gone bad. Numerous law enforce- committed to establishing and maintaining an em-
ment officers from many jurisdictions worked on this ployee assistance program to advance the welfare of
case, which drew national attention. Union County their employees and to sharing the cost of providing
sheriff’s deputies, State Law Enforcement Division this service.
(SLED) agents, Department of Natural Resources
(DNR) officers, highway patrol troopers, and other Adding Employee Assistance
law enforcement personnel worked hard to investigate Five organizations signed a memorandum of
the crime, search for the children, and recover their understanding (MOU) on January 21, 2000, to create
bodies. the South Carolina Law Enforcement Assistance
In the aftermath of this incident, a group of law Program (SCLEAP). Four state agencies and the Law
enforcement leaders in Columbia, South Carolina, Enforcement Chaplaincy for South Carolina (LECSC)
realized that such horrific trauma takes a serious toll comprise the organization. The LECSC is registered
on both veteran and rookie officers. A powerful with the IRS as a 501(c)(3) nonprofit entity, serves
statement supporting this conclusion came from one as a foundation, and performs related tasks for the

November 2000 / 23
SCLEAP. It has a governing board of leaders from hamper operations. Chaplains intercede to comfort
local, state, and federal law enforcement, as well as and control the relatives, allowing officers to do
private citizens who represent community leaders their work.
with diverse backgrounds. The chaplaincy board acts Similarly, SCLEAP chaplains work with the
in an advisory capacity to SCLEAP and initiated the SLED special weapons and tactics (SWAT) team to
process leading to its creation. counsel hostages and to calm family members, as well
The concept for the SCLEAP initiative is simple. as witnesses to serious incidents. Chaplains don
Multiple agencies with a mutual need to provide armor vests and respond to SWAT calls that involve
employees with special support associated with barricaded suspects, subjects who are mentally
stressful duty enter into a jointly funded program. In disturbed, or multiple victims. The chaplains help
the South Carolina program, participating agencies reassure neighbors or other individuals who show
pay an equal share to support the concern about or become suspi-
staff and provide operating funds. cious of police tactical operations.
Additionally, SCLEAP chaplains
Implementing Duties


respond to incidents of trooper-
The SCLEAP staff has facili- involved shootings, certain vehicu-
tated critical incident debriefings, ...agencies determined lar pursuits, and related incidents.
responded to critical incidents in that sharing the Due to the size of the highway
support of officers and victims, operation of a joint patrol and its parent agency, DPS,
provided pastoral care to officers employee assistance response on behalf of DPS is
and family members, and referred program would becoming frequent. Likewise,
officers to other professional prove effective. support for the PPP will grow as
resources. In an incident involving that agency begins to use SCLEAP
a workplace shooting, law enforce-
ment chaplains provided critical
incident care follow-up and
referrals for approximately 300 witnesses. This
” services.
Additionally, plans exist for
chaplains to support officers sent
to natural disasters. During hurricanes or other
police-sponsored intervention greatly facilitated disasters where officers leave for extended duty, they
relations between police and victims/witnesses. may have concerns or worries regarding the welfare
Winthrop University in Rock Hill, South Caro- and safety of family left at home. The chaplains will
lina, held the first interagency postcritical incident check on officers’ families who experience difficul-
seminar (PCIS) in conjunction with LECSC. The FBI ties and, where possible, facilitate support to these
designed the PCIS model to assist agents with han- families and report to the officers in the disaster area.
dling the effects of critical incident stress.2 The
chaplaincy borrowed this concept and applied it on an Providing Services
interagency basis with both state and local officers All services begun under the chaplaincy have
meeting with trained law enforcement peer support- continued under the MOU with additional ones
ers, mental health professionals, and chaplains. added. The SCLEAP provides a full-time professional
Participants received information on trauma, patterns staff, whose members have master’s degrees or above,
of resolution, and field-tested coping strategies to on a 24-hour, 7-day basis to assist all employees and
promote recovery and resilience. their families. Also, the SCLEAP staff coordinates a
SCLEAP regularly supports DNR law enforce- trained critical incident stress debriefing and peer
ment officers while they conduct search and rescue support team from partner agencies. The SCLEAP
or search and recovery missions. In this capacity, staff furnishes a confidential system of care and
DNR officers usually encounter family members of referral for employees and family members to thera-
the victim who come to the scene and inadvertently peutic resources in areas of need, such as alcohol and

24 / FBI Law Enforcement Bulletin


other drug problems, mental health issues, and family SCLEAP staff works carefully to understand and
and marital counseling. They visit sick or injured respect the common law enforcement experience and
personnel and provide notification, in accordance the individuality of each agency. While part of a
with procedures of each agency, to families of person- universal brotherhood, a sense of uniqueness remains
nel who have received serious injuries or who have important to the partner agencies.
died in the course of employment. Also, they act as
a liaison between partner agencies and civic and Conclusion
religious leaders, while providing support and assis- The South Carolina Law Enforcement Assistance
tance for victim advocacy services and community Program and its chaplain staff provides support and
relations. assistance to member agency personnel, but does not
While the MOU provides the framework for the proselytize or spread a religious message or personal
program, partner agencies designate members to serve agenda. The program provides alternative services for
on a governing committee. The partner agencies employees and facilitates the exercise of First
agreed that, to ensure efficient administration, one Amendment rights under proper conditions. When
agency should serve as the host agency and govern member agencies call for support, it must be for
the program as an official secular reasons, and when
function of that agency. an employee calls for
The SCLEAP staff must assistance, it must be for
meet all applicable state whatever the employee
personnel rules and needs and requests. The
regulations. The desig- setting in which the
nated representatives activity takes place and the
assemble at least annually person on whose behalf
to decide the course of the request for service is
operations and whether made represent key issues.
they should make any Multiagency opera-
changes. tions make the most
The location of efficient use of existing
SCLEAP’s office space resources. This approach
represents an important proves as useful for
aspect of the program. employee assistance
Some employees are more programs as it does for law
likely to seek assistance without their peers’ knowl- enforcement operations. The success of the joint
edge, therefore agencies intentionally found office program depends on staff members who understand
space in an area away from the four agencies. More- the culture of the law enforcement organizations and
over, individuals involved with this program believe the personnel they serve.
some employees more willingly will accept or seek
assistance offered by members of the clergy, rather Endnotes
than mental health professionals. Chaplains refer 1
This sum includes $100,000 that funded the production of a national
employees to other counseling as appropriate, and teleconference on law enforcement trauma entitled “The Rusting Badge.”
2
sometimes they convince a reluctant employee to Vincent J. McNally and Roger M. Solomon, “The FBI’s Critical
Incident Stress Management Program,” FBI Law Enforcement Bulletin,
get help that they would not seek otherwise. February 1999, 20-25.
Another vital part of the success of the program
hinges on the ability of the staff to be perceived as
Major Huguley serves with the South Carolina Law
“one of their own” by each participating agency Enforcement Division in Columbia.
although actually serving all partner agencies. The

November 2000 / 25
Bulletin Reports

The SEARCH National Technical


Assistance and Training Program
SEARCH, The National Consortium for Justice Information and Statistics,
has a National Technical Assistance and Training Program that offers on-site,
no-cost technical assistance. Available to law enforcement personnel, prosecu-
tors, public defenders, jail administrators, court officials, correctional officers,
probation and parole officers, and associated agencies, the technical assistance
activities, services, and products help these entities determine system needs,
establish system requirements, and design or procure cost-effective, integrated
information and workload management systems. Projects include working
with law enforcement agencies to implement mobile computing, computer-
aided dispatch, mugshot and fingerprint identification, and records manage-
ment system technologies; assisting prosecutors, public defenders, and court
officials with case management information systems; working with jails,
corrections, and probation and parole agencies to implement offender tracking
programs; and, most important, helping each agency work toward integrating
its information management system technologies.
SEARCH offers training courses to local, state, and federal agencies on
such topics as seizure and examination of microcomputers, investigation of
computer crime, Internet crime investigation, investigation of on-line child
exploitation, basic local area network investigations, and child pornography
and the Internet. On-site training occurs at
SEARCH’s National Criminal Justice
Computer Laboratory and Training Center
in Sacramento, California. SEARCH also Training Programs
provides outreach training at regional
training facilities nationwide. The Bureau of Justice Assistance now has the
Other technical assistance and training latest federally funded training programs on-line at
resources include technical bulletin series, www.ojp.usdoj.gov/BJA. This centralized and fully
Internet services, and conferences, work- searchable database can help criminal justice
shops, and symposia. For further informa- professionals—
tion, contact SEARCH at 916-392-2550 • identify their training needs quickly and easily;
or access its Web site at http:// • locate course descriptions for more than 650
www.search.org. training programs available from providers
throughout the nation; and
• find the most updated contact information on
training programs for all state and local law
enforcement agencies worldwide; information
that may no long exist in print.

26 / FBI Law Enforcement Bulletin


National Night Out
National Night Out: A Community-Police Partnership Program, a Bureau of Justice
Assistance Fact Sheet, describes the program’s scope, objectives, and services. Launched
in 1984 by the National Association of Town Watch, National Night Out has gone from
2.5 million participants in 400 communities in 23 states that first year to 32 million
people representing 9,500 communities in all 50 states, the District of Columbia, the 5
U.S. territories, numerous Canadian cities, and U.S. military bases worldwide in 1999.
National Night Out provides information, educational material, and technical assistance
for developing effective year-long community-police partnerships that can reduce crime,
violence, and substance abuse. To obtain a copy of the Fact Sheet, contact the Bureau of
Justice Assistance Clearinghouse at 800-688-4252 or access its Web site at http://
www.ojp.usdoj.gov/BJA. For additional information about National Night Out, contact
the National Association of Town Watch at 800-648-3688 or access its Web site at http://
www.natw.org.

Clarification

I t has come to the attention of the


Bulletin staff that the article, “The
Community Outreach Program: Putting a
Police Department’s Special Operations
Team (SOT), the suspect was killed by
members of the SOT after he killed one
Face on Law Enforcement,” which ap- officer and seriously wounded another.
peared in the September 2000, issue The second officer died shortly after the
contained erroneous information regarding incident. No other individuals, including
a 1989 shooting incident in Alexandria, the hostage, were injured. Also, although a
Virginia. In the article, the incident is number of FBI special agents were at the
described as “a drug bust that had gone scene of the incident, the FBI SWAT team
wrong, ending in a shootout between the was on standby during the incident and had
police and the drug suspects that left two not been sent to the scene. The authors of
residents dead.” The incident, in fact, the article and editors of the Bulletin take
began when a drug seller took a drug full responsibility for this error and regret
purchaser hostage, pointing a weapon at any confusion this error may have caused
the victim’s head. During a confrontation Bulletin readers and members of the
with members of the Alexandria, Virginia, Alexandria, Virginia, Police Department.

November 2000 / 27
Legal Digest

Supreme Court Cases


1999–2000 Term
By SOPHIA Y. KIL

D uring the 1999-2000 term, officer’s initial stop is supported by manipulation of a bus passenger’s
the U.S. Supreme Court reasonable suspicion when the sus- carry-on luggage was a search and
ruled on three Fourth pect is both present in an area of therefore governed by the Fourth
Amendment cases relating to crimi- expected criminal activity and flees Amendment. Steven Dewayne
nal procedure and a Fifth Amend- upon seeing the police; 3) whether Bond was a passenger with carry-on
ment case involving the constitu- an anonymous tip that a person is luggage on a bus. When the bus
tionality of the Miranda rule. Law carrying a gun, without more infor- stopped at a Border Patrol check-
enforcement officers and their mation, justifies a police officer’s point, a Border Patrol agent
agencies may find these cases par- stop and frisk of that person; and boarded the bus to check the pas-
ticularly important and interesting. 4) whether the Miranda rule is a sengers’ immigration status. In an
Specifically, the Court ruled on constitutionally based rule. effort to locate illegal drugs, the
1) whether a law enforcement of- agent began to squeeze the soft lug-
ficer conducts a Fourth Amendment Bond v. United States, gage, which some passengers had
search when physically manipulat- 120 S. Ct. 1462 (2000) placed in the overhead storage
ing a bus passenger’s carry-on lug- The Supreme Court held that a space above their seats. The agent
gage; 2) whether a law enforcement law enforcement officer’s physical squeezed the canvas bag above

28 / FBI Law Enforcement Bulletin


Bond’s seat and noticed that it subjective expectation of privacy is
contained a “brick-like” object. objectively reasonable.2 According
Bond admitted that the bag was to the Court, Bond had a subjective
his and consented to its search. expectation of privacy in his bag3
When the agent looked inside the because he used an opaque bag and
bag, he discovered a “brick” of placed it directly above his seat.
methamphetamine. Bond’s expectation of privacy was
Bond was indicted for federal objectively reasonable because al-
drug charges. Bond moved to sup- though a bus passenger expects
press the drugs, arguing that the other passengers or bus employees
agent conducted an illegal search to handle or move his bag when he
when he squeezed the bag. The Dis- places it in an overhead storage
trict Court denied his motion to sup- area, he does not expect that they Ms. Kil, a third-year law student,
press and convicted Bond. The will feel the bag in an exploratory recently served as an honors
Court of Appeals affirmed the de- manner. In this case, the agent’s intern in the Legal Instruction
nial of the motion to suppress, hold- manipulation of Bond’s bag was an Unit at the FBI Academy.
ing that the agent’s manipulation of infringement of Bond’s reasonable
the bag was not a search within the expectation of privacy because he
meaning of the Fourth Amendment. felt Bond’s bag in an exploratory
The Supreme Court reversed, hold- manner when he squeezed it. Thus, Illinois v. Wardlow,
ing that the agent’s manipulation of the agent’s manipulation of the bag 120 S. Ct. 673 (2000)
the bag was a search and that it constituted a search. The Supreme Court held that a
violated the Fourth Amendment. Under the second consider- police officer’s initial stop of a sus-
The Fourth Amendment pro- ation, any government search con- pect was supported by reasonable
vides that “[t]he right of the people ducted without a warrant is per se suspicion because the suspect was
to be secure in their persons, unreasonable, unless the search both present in an area of expected
houses, papers, and effects, against falls under a few recognized excep- criminal activity and fled upon see-
unreasonable searches and seizures, tions to the warrant requirement ing the police.
shall not be violated....” What con- (e.g., consent searches, emergency Two police officers were inves-
stitutes an unreasonable search that searches, motor vehicle searches, tigating drug transactions while
violates the Fourth Amendment? inventory searches, and searches driving in an area known for heavy
The Court’s analysis involves two incident to arrest).4 In this case, drug trafficking. As they were driv-
considerations: 1) Did the police the agent’s search was unreason- ing, they noticed Wardlow holding
conduct at issue constitute a able because he conducted the a bag. When Wardlow saw the two
“search” within the meaning of search without a warrant and officers, he fled. The officers pur-
the Fourth Amendment? and 2) If the search did not fall under any of sued and stopped him. One of the
the conduct constituted a search the recognized exceptions. Al- officers conducted a protective pat
within the meaning of the Fourth though Bond consented to a search down search for weapons because,
Amendment, then was the search of his bag, his consent was not at in his experience, it was common
“reasonable”? issue. The agent’s squeezing of for weapons to be in the vicinity
Under the first consideration, Bond’s bag was at issue—Bond ar- of drug transactions. During the pat
the Court defines a search as a gued that the agent’s squeezing of down, one of the officers squeezed
government infringement of a his bag was an illegal search and the Wardlow’s bag and felt a heavy,
person’s reasonable expectation of government did not assert Bond’s hard object in the shape of a gun.
privacy.1 A reasonable expectation consent as a basis for admitting the When the officer opened the bag,
of privacy exists when the person’s evidence. he discovered a handgun with

November 2000 / 29
ammunition. The officers subse- reviewing an officer’s decision to sufficient to establish reasonable
quently arrested Wardlow. stop an individual, the Court does suspicion. In this case, the Court
Wardlow moved to suppress not expect scientific certainty. The concluded that the officer was justi-
the gun. The Illinois trial court de- determination of reasonable suspi- fied in suspecting that Wardlow
nied Wardlow’s motion to sup- cion must be based on common was involved in criminal activity
press, finding that the officers per- sense judgments and inferences and investigating further because
formed a lawful stop and frisk. At about human behavior.7 However, Wardlow was both present in an
the bench trial, Wardlow was con- several factors can be used to deter- area of expected criminal activity
victed for unlawful use of a weapon mine whether an officer has reason- and fled upon seeing the police.
by a felon. The Illinois Appellate able suspicion to make a Terry stop,
Court reversed Wardlow’s convic- including 1) whether the stop oc-
tion, finding that the officer did not curred in a “high crime area”;8 2) a
have reasonable suspicion suffi- suspect’s nervous, evasive behav-
cient to justify an investigative stop ior;9 and 3) a suspect’s unprovoked
under Terry v. Ohio.5 The Illinois flight upon noticing the police.10
Supreme Court affirmed. The U.S. Each factor alone may not be
Supreme Court granted certiorari enough to support a reasonable sus-
solely on the question of whether picion that criminal activity is
the initial stop was reasonable and afoot. For example, an individual’s
reversed, holding that the initial presence in a high crime area, stand-
stop was supported by reasonable ing alone, is not enough to support a
suspicion. reasonable suspicion that he is com-
Under Terry, an officer may, mitting a crime. And although head-
consistent with the Fourth Amend- long flight is not necessarily indica-
ment, conduct a brief, investigatory tive of ongoing criminal activity, it
stop when the officer has a reason- is suggestive of such because it is
Florida v. J.L.,
able, articulable suspicion that an act of evasion. However, these
120 S. Ct. 1375 (2000)
criminal activity is afoot.6 When factors, taken together, may be
The Supreme Court held that an
anonymous tip that a person is car-
© Jennifer Hill rying a gun, without more informa-
tion, does not justify a police
officer’s stop and frisk of that per-
son. 11 An anonymous caller re-
ported to the police that a young
black man standing at a particular
bus stop and wearing a plaid shirt
was carrying a gun. According to
the record, there was no audio re-
cording of the tip and nothing was
known about the informant. Offi-
cers went to the bus stop and saw
three black men. One of the men,
J.L., was wearing a plaid shirt.
Aside from the tip, the officers had
no reason to suspect the three of
illegal conduct. The officers did

30 / FBI Law Enforcement Bulletin


not see a firearm or observe any knowledge of concealed criminal activity, but merely identified J.L.’s
unusual movements. One of the activity.16 A tip that merely identi- appearance and location.
officers frisked J.L. and seized a fies a specific person is not reliable
gun from his pocket. enough to show knowledge of con-
J.L, who was 15 years old at the cealed criminal activity.17
time of the frisk, was charged under Will an anonymous tip, stand-
state law with carrying a concealed ing alone, ever provide enough rea-
firearm without a license and pos- sonable suspicion to make a Terry
sessing a firearm while under the stop? In a concurring opinion, two
age of 18. J.L. moved to suppress of the justices noted that an anony-
the gun as the fruit of an unlawful mous tip with certain features or in
search. The trial court granted his certain situations may make it more
motion. The appellate court re- reliable, justifying police action.
versed. The Supreme Court of Such features or situations could in-
Florida quashed that decision, hold- clude 1) caller identification of
ing the search invalid under the anonymous tips; 2) voice recording
Fourth Amendment. The U.S. Su- of anonymous telephone tips; 3) an
preme Court affirmed. unnamed person giving the infor-
If an officer is relying on an mation, face to face, to the police; Dickerson v. United States,
anonymous tip to make a Terry and 4) an unnamed caller with a 120 S. Ct. 2326 (2000)
stop, then the tip must be suffi- voice that sounds the same each The Supreme Court held that
ciently reliable to provide the of- time he tells the police on two suc- the decision of Miranda v. Ari-
ficer with reasonable suspicion to cessive nights about criminal activ- zona19 is a constitutional decision of
make the stop. Generally, an anony- ity, which, in fact, occurs each the Court that may not be overruled
mous tip alone is not sufficiently night—a similar call on the third by any Act of Congress (i.e., 18
reliable because it “seldom demon- night should not be treated like an U.S.C. § 3501) and reaffirmed that
strates the informant’s basis of unreliable anonymous tip.18 The Miranda governs the admissibility
knowledge or veracity.”12 For ex- first three factors relate to the of statements made during custodial
ample, an anonymous tip that a sus- informant’s credibility since the po- interrogation in both state and fed-
pect is carrying cocaine and pre- lice officer is able to locate the in- eral courts.
dicts her movements, standing formant, while the last one relates to Charles Thomas Dickerson was
alone, would not justify a Terry the predictability of the situation. charged with conspiracy to commit
stop. In this case, the tip was not suf- bank robbery and other offenses.
However, an anonymous tip ficiently reliable to justify a Terry Before trial, Dickerson moved to
that is suitably corroborated may be stop. First, the officers’ suspicions suppress a statement he had made to
sufficiently reliable to provide the that J.L. was carrying a weapon did the FBI on grounds that he had not
officer with reasonable suspicion to not stem from any of their own ob- received Miranda warnings before
make a Terry stop.13 The Court con- servations, but solely from a call by being interrogated. The District
siders two factors: 1) what the offic- an unknown, unaccountable infor- Court granted his motion to sup-
ers knew—either by their own ob- mant. Second, the informant’s call press. The government appealed.
servations, their experience, or did not provide any information The Court of Appeals reversed the
prior knowledge of the suspect or predicting J.L.’s movements, leav- suppression order, holding that
area—before they conducted their ing the police without a way to test since Miranda was not a constitu-
stop;14 and 2) whether the anony- the informant’s knowledge or cred- tional holding, Congress could su-
mous tip showed that the informant ibility. In addition, the informant persede Miranda by enacting 18
had predicted accurately the did not disclose any basis for his U.S.C. § 3501. The Supreme Court
suspect’s movements 15 or had knowledge of concealed criminal reversed.

November 2000 / 31
© Jennifer Hill

in both state and federal courts. If


the Court had upheld § 3501, then
Miranda would have been inappli-
cable in federal courts, but would
have still applied in state courts. In
light of the Dickerson decision, a
violation of Miranda is now clearly
a violation of the Constitution,
which can result in suppression of
statements in both federal and state
courts.

Endnotes
1
Katz v. United States, 389 U.S. 347, 360
(1967) (J. Harlan, concurring).
2
Bond v. United States, 120 S. Ct. 1462,
In order to protect an individual The Court held Miranda to be a 1466 (2000), citing Katz, 389 U.S. at 361 (J.
against compelled self-incrimina- constitutional decision—that is, a Harlan, concurring).
3
Bond, 120 S. Ct. at 1464. The Court noted
tion during police custodial interro- decision which interprets and ap- that a traveler’s personal luggage is an “effect”
gations, Miranda established four plies the Constitution—that cannot protected by the Fourth Amendment.
warnings, or Miranda rights. A sus- be overruled by an Act of Congress, 4
Katz, 389 U.S. at 357.
5
pect must be told that he “1) has the such as 18 U.S.C. § 3501. While 392 U.S. 1 (1968).
6
Illinois v. Wardlow, 120 S. Ct. 673
right to remain silent; 2) that any- conceding that Congress may (2000), citing Terry, 392 U.S. at 30.
thing he says can be used against modify or set aside the Court’s rules 7
Wardlow, 120 S. Ct. at 676.
him in a court of law; 3) that he has of evidence and procedure that are 8
Id. at 673, quoting Adams v. Williams, 407
the right to the presence of an attor- not required by the Constitution, the U.S. 143, 144 (1972).
9
Wardlow, 120 S. Ct. at 673.
ney; and 4) that if he cannot afford Court emphasized that Congress 10
Id.
an attorney, one will be appointed may not overrule the Court’s deci- 11
An officer’s authority to make the initial
for him prior to any questioning if sions that interpret and apply the stop was at issue, not the officer’s authority
he so desires.” 20 Whether a Constitution. under Terry to conduct a frisk of a person who
already has been stopped legitimately.
suspect’s statement during his cus- The Court cited various other Obviously, if the initial stop is unreasonable,
todial interrogation will be admis- reasons for reaching its conclusion then any resulting frisk would likewise be
sible in evidence depends on that Miranda is a constitutionally unlawful.
12
whether the police provided him based rule. Among them, the Court Florida v. J.L., 120 S. Ct. 1375, 1378
(2000), quoting Alabama v. White, 496 U.S.
with these four warnings and ob- noted that Miranda had become 325, 329 (1990).
tained an appropriate waiver. part of our national culture because 13
Id. at 327.
Two years after Miranda, Con- the warnings were embedded in 14
J.L., 120 S. Ct. at 1379.
15
gress enacted 18 U.S.C. § 3501, routine police practice. Further- Id. at 1378, citing White, 496 U.S. at 332.
16
J.L., 120 S. Ct. at 1379.
providing that a confession shall be more, § 3501 is more difficult than 17
Id.
admissible in federal court if it is Miranda for law enforcement offi- 18
Id. at 1381.
voluntarily given.21 The Court de- cers to conform to and for courts to 19
384 U.S. 436 (1966).
20
termined that Congress intended to apply in a consistent manner.22 Id. at 479.
21
18 U.S.C. § 3501(a).
overrule Miranda because § 3501 By holding Miranda to be a 22
Dickerson, 120 S. Ct. at 2336.
requires merely voluntariness—not constitutional decision, the Court
the four warnings—as the deter- reaffirmed that Miranda governs
mining factor as to whether a state- the admissibility of statements
ment will be admissible. made during custodial interrogation

32 / FBI Law Enforcement Bulletin


The Bulletin Notes

Law enforcement officers are challenged daily in the performance of their duties; they face each
challenge freely and unselfishly while answering the call to duty. In certain instances, their actions
warrant special attention from their respective departments. The Bulletin also wants to recognize
their exemplary service to the law enforcement profession.

While on patrol, Officers Jeffrey E. Stehr and


T. Chuck Seney of the North Greenbush, New York,
Police Department responded to an emergency medical
service call. A 77-year-old female, who had complained
of breathing difficulties, fell unconscious while talking
to the 911 dispatcher. When Officers Stehr and Seney
arrived on the scene, they found the woman unconscious,
unresponsive, not breathing, and without a pulse. They
initiated CPR and maintained the victim until emergency
medical personnel arrived. The quick response by
Officer Stehr Officer Seney Officers Stehr and Seney saved the woman’s life.

Officer William Hummel of the Pinellas Park, Florida, Police Department


was off duty on his way to work when he observed a crash scene between two
large trucks. One of the drivers was injured seriously and his legs were pinned
under the dash as he lay over the engine area. Officer Hummel stopped immedi-
ately to render aid and discovered that fuel had begun leaking, and a fire had
erupted. He obtained fire extinguishers from nearby businesses and drivers of
other vehicles and attempted to control the fire. Officer Hummel climbed onto
the burning truck to spray the flames and protect the driver. Although the
vehicles involved were leaning and had unstable truck beds, Officer Hummel put
his own safety aside to save the driver’s life by removing him from the burning
Officer Hummel truck.

Marine Patrol Officer Gary Mick of the Metro-Dade, Florida, Police Depart-
ment was dispatched alone to an ocean rescue of a capsized sailboat during a
severe weather watch with 10- to 13-foot seas, 30 mile per hour winds gusting to
40 miles per hour, and heavy rain. Officer Mick almost was thrown overboard
due to the extremely stormy seas, but, in spite of the hazardous conditions, he
successfully rescued two individuals from the water. During the rescue opera-
tion, Officer Mick single-handedly maneuvered his boat into the wind while
battling ocean waves breaking in over the gunwale. While doing this, he also
had to remove a dive door, attach a line to a boat cleat, and toss the line to the
nearest victim. Officer Mick’s courage and determination saved the lives of
Officer Mick the two victims who had been in the water for over an hour, were extremely
fatigued, and suffered from hypothermia.
U.S. Department of Justice Periodicals
Postage and Fees Paid
Federal Bureau of Investigation Federal Bureau of Investigation
FBI Law Enforcement Bulletin ISSN 0014-5688
935 Pennsylvania Avenue, N.W.
Washington, DC 20535-0001

Official Business
Penalty for Private Use $300

Subscribe Now

Vous aimerez peut-être aussi