Académique Documents
Professionnel Documents
Culture Documents
Volume 69
Number 11
United States
Department of Justice
Federal Bureau of Investigation
Washington, DC 20535-0001
Louis J. Freeh
Director
The Attorney General has determined Law enforcement must make every
that the publication of this periodical is Runaway or Abduction?
necessary in the transaction of the
public business required by law. Use
By André B. Simons 1 attempt to classify missing child
cases appropriately.
of funds for printing this periodical has and Jeannine Willie
been approved by the Director of the
Office of Management and Budget.
Stealing Secrets Solved Law enforcement can work with
The FBI Law Enforcement Bulletin
(ISSN-0014-5688) is published
monthly by the Federal Bureau of
By Thomas R. Stutler 11 companies to help prevent the loss
of intellectual property and the theft
Investigation, 935 Pennsylvania of trade secrets.
Avenue, N.W., Washington, D.C.
20535-0001. Periodicals postage paid Microscopic slides serve as valuable
at Washington, D.C., and additional The Microscopic Slide
mailing offices. Postmaster: Send
address changes to Editor, FBI Law
By John E. Smialek, Charlotte Word, 18 reservoirs that law enforcement
agencies can use in DNA testing years
Enforcement Bulletin, FBI Academy, and Arthur E. Westveer
Madison Building, Room 209, after the commission of a crime.
Quantico, VA 22135.
Supreme Court Cases Four Supreme Court decisions
Editor
John E. Ott
1999–2000 Term 28 of particular importance to law
enforcement are summarized.
By Sophia Y. Kil
Associate Editors
Glen Bartolomei
Cynthia L. Lewis
Bunny S. Morris
Art Director Departments
Brian K. Parnell
Assistant Art Director
Denise Bennett Smith
Staff Assistant 8 Perspective 23 Focus on Cooperation
Linda W. Szumilo
Professional Police Joint Employee
This publication is produced by Traffic Stops Assistance Programs
members of the Law Enforcement
Communication Unit,
William T. Guyton, Chief. 17 Book Review 26 Bulletin Reports
Police Auditing: The SEARCH Program
Internet Address
Theories and Practices Training Programs
leb@fbiacademy.edu National Night Out
Cover Photo
© Digital Vision
© André B. Simons
A 15-year-old girl disap- to third parties who assist in a whatever the circumstances. Be-
peared from her home in a child abduction, 1 even through tween the extremes, however, deci-
small California coastal inaction.”2 sion making often proves difficult.3
town. Police initially classified her Such inaction may often result When a child simply vanishes, no
as a runaway. Eight months later, when law enforcement erroneously clear indicators may exist to suggest
her abused body was discovered. categorizes a child abduction as a a voluntary or an involuntary disap-
Subsequent investigation revealed voluntary disappearance, or a run- pearance. When responding police
that three high school-aged boys in- away. When someone reports a officers navigate through a situation
volved in a Satanic cult had ab- child missing, traditionally, law en- with no witnesses, obvious crime
ducted, raped, tortured, and mur- forcement quickly confirms or scene, nor clues to what happened,
dered the girl the night of her eliminates evidence of an abduc- they might find it difficult to distin-
disappearance. tion. Police agencies decide easily guish an abducted child from a run-
In another case, a jury ordered a how to respond to cases with away initially. A recent survey re-
town to pay a family $3.8 million clear indicators about what hap- quested law enforcement agencies
because police failed to respond ad- pened, such as dealing with a wit- to identify common obstacles to a
equately to the father’s plea for help nessed stranger abduction, a run- successful investigation in a miss-
when he reported his daughter miss- away who packs a bag and leaves a ing child case.4 Fifty-eight percent
ing. The father stated later that the note, or a very young missing child, of the agencies responded that the
verdict presented “a clear warning which police generally investigate highest ranking concern involved
November 2000 / 1
administrative and investigative
branches must rely on the patrol
officer’s assessment to determine
the most appropriate course of ac-
tion. Police agencies may jeopar-
dize crucial investigative opportu-
nities if they classify an abduction
case erroneously. Almost no other
crime investigation will stretch re-
sources and generate public criti-
cism as a missing child case. A law
enforcement agency may find itself
Special Agent Simons, formerly a Ms. Willie serves in the in the unenviable position of having
police officer with the Portland, Missing/Unidentified Persons to make up for precious lost hours
Oregon, Police Bureau, now Unit, California Department of or days if they mistakenly classify
serves in the FBI’s Redding, Justice, in Sacramento,
California, resident agency. California. the missing child as a runaway.
However, the large amount of vol-
untary missing reports each year
makes a full-scale law enforcement
the difficulty of knowing whether a responding law enforcement offi- response unreasonable and inappro-
child has disappeared voluntarily. cers to overlook evidence of an ab- priate for all incidents.
The fact that hundreds of thou- duction. Such predispositions can To assess a missing child report
sands of children leave their homes become particularly hazardous in accurately, responding officers
voluntarily each year compounds light of research indicating that in must explore the missing child’s
the difficulty in accurately classify- cases where individuals abduct and lifestyle and behaviors. Officers
ing a missing child as a runaway or murder children, the population at must have the motivation and avail-
a victim of abduction. National av- highest risk for victimization con- ability of resources necessary to
erages indicate approximately sists of teenage girls ages 13 to 17.6 take the extra time needed for such
450,000 runaways in the United an evaluation and to form an assess-
States at any given time.5 In Cali- ASSESSING THE SITUATION ment as to whether a voluntary de-
fornia in 1999, nearly 101,000 chil- The responding police officers’ parture proves consistent with the
dren left their homes voluntarily. initial assessment will have a great child’s behavior patterns.
Comparatively, only 64 witnessed impact on the outcome of the miss-
abductions of children by a stranger ing child case. The attitude or ap- The Parental Interview
or nonfamily member occurred. Not proach that officers take in the ini- The need to interview parents
surprisingly, law enforcement of- tial response to a missing child call separately from other family mem-
ficers may believe initially that a actually may determine whether the bers and reporting parties remains
missing child between 13 and 17 child is recovered and returned critical. Responding officers may
years of age has run away. Without home safely, remains missing, or, feel reluctant to conduct separate
obvious indicators of an abduction, worse yet, is found dead.7 No other interviews of the parents because of
such as witnesses who observed the criminal investigation is as time- their emotionally escalated state.
actual kidnapping event, signs of sensitive as this type of case, where Conversely, if the parents do not
forced entry, or a ransom note, sta- the very life of the victim often may appear particularly concerned about
tistics indicate that the missing depend on the swift and effective the child’s absence, the officers
child most likely has run away. This mobilization of investigative may not view separate interviews as
philosophy often may cause the resources. The police agency’s necessary. While they cannot
November 2000 / 3
Resources
existing conditions still present
To successfully sustain a voluntary long-term absence, the in the house? The presence of
runaway child must have access to resources that will satisfy medications that the child
basic needs, such as food, shelter, and transportation. needs may indicate an involun-
tary departure.
Money
• Does the child have access to money or credit cards? • Identify and interview boy-
Officers should verify if the child recently has accessed friends/girlfriends; determine
bank accounts through ATM withdrawals or other means. normal dating patterns, includ-
Is money missing from parents or siblings? Officers also ing sexual activity. If the
should determine if the child possesses adequate skills to missing child is a postpubes-
obtain employment and, therefore, additional money. cent female, are there preg-
nancy and abortion issues? If
Transportation so, officers should consider
• Does the missing child have access to a vehicle, and if contacting local pregnancy
so, is that vehicle present or absent? Officers should health and abortion clinics.
determine if the child is familiar with public transpor- Also, officers should familiar-
tation, such as a public bus or train system, and conduct ize themselves with depart-
appropriate follow-up contacts with local transportation ment policy and legal issues
providers. Friends or family members unwittingly may concerning confidentiality if
have helped the child run away by providing some form they find the missing child at
of transportation. such a clinic.
Case Example
November 2000 / 5
Investigative Resources
written letters, voice mail mes-
• The FBI’s National Center for the Analysis of Violent Crime sages, and computer messages. Law
has published a manual entitled Child Abduction Response enforcement officers should con-
Plan—an investigative tool for first responders and investi- sider all modes of communication
gators. Law enforcement agencies can request a copy by available to the missing child, in-
contacting the NCAVC coordinator at their local FBI field cluding their access to on-line chat
office. rooms and communication with
• Additionally, the National Center for Missing and Exploited others via the Internet.
Children (NCMEC) has published an investigative resource While the initial response logi-
guide entitled Investigator’s Guide to Missing Child Cases. cally may include an examination
Agencies can contact NCMEC at 1-800-THE-LOST. of the child’s room, responding of-
ficers also should consider an ex-
amination of the parents’ room or
other areas of the house. If no items
appear missing from the child’s
prior suicide attempts or scene and they should take all nec- room, are items missing from other
gestures by the child and essary steps to prevent the destruc- areas of the house that may provide
consider the possibility that the tion of evidence. Officers can make additional resources?
child has disappeared as a some important observations. They Officers should attempt to com-
result of a self-inflicted injury. can note the presence or absence of pile and examine a list of known
These observations will assist obvious signs of disruption, such as associates or family members that
officers in crafting the child’s forced entry. How did the offender the child most likely would seek
victimology, which will indicate and the victim enter and exit the assistance from. Should those asso-
whether the child had the motiva- house? If the house appears disor- ciates or family members be un-
tion and capability of leaving vol- derly or in disarray, officers should aware of the child’s whereabouts,
untarily. If the victim assessment compare this with the child’s per- officers must consider this as part of
suggests that these two factors do sonal living space and determine if the child’s lack of available re-
not exist, officers seriously must this remains consistent with the way sources and once again contemplate
consider the possibility that an ab- the room appears now. Officers the possibility that someone has ab-
duction has occurred. should note any dramatic changes ducted the child.
in the child’s room that coincide
Scene Assessment with the departure, which may indi- Time Factors
In a survey of police agencies, cate predeparture preparation or How long does a runaway child
approximately 93 percent of law an attempt by an abductor to con- typically stay away from home, and
enforcement officers responding to ceal evidence. Officers should at- how does the passage of time
a missing child call state that they tempt to verify if any of the child’s influence the classification of a
usually interview the parents or clothing or toiletries are missing missing child case? The California
guardian in person. However, only that would indicate packing or Department of Justice’s Missing/
41 percent routinely would search preparation. If officers or family Unidentified Persons Unit has re-
the child’s home.12 A search of the members cannot find any such ported the following trends in run-
missing child’s residence can pro- items missing nor evidence of pack- away returns:
vide a preliminary assessment with ing, officers must consider the pos-
useful information to officers. sibility that the child may have been Time Frame Percent Returned
Upon arriving at the child’s resi- abducted. within 7 days............50 percent
dence or last known location, offi- Has the child left any commu- 7-14 days..................30 percent
cers must remember that the entire nication for discovery by parents 14-30 days................17 percent
house may prove a potential crime or guardians? This may include 30+ days.....................3 percent
-
6 / FBI Law Enforcement Bulletin
These statistics indicate that the often may occur during the initial should make every attempt to assess
majority of runaway children can- response, where the patrol officer the situation accurately in an effort
not sustain an absence for more than struggles to assess the circum- to classify the missing child
2 weeks. In general, the longer the stances of a missing child report appropriately.
absence, the greater the likelihood appropriately. While the statistics
that an individual has abducted the suggest that a majority of missing Endnotes
child or that the child has fallen children have run away, overlook- 1
For purposes of this article, the term child
victim to a violent crime. If the child ing indicators of an abduction can is used when referring to anyone under 18 years
has a history of running away, offi- jeopardize attempts to locate the of age.
2
cers should determine the length of missing child and expose law en- Guidelines and Curriculum for Handling
Missing Person and Runaway Cases,
time the child remained missing forcement agencies to civil liability. Sacramento, CA: California Commission on
during previous absences. If the Although the large number of run- Peace Officer Standards and Training, 1989.
length of time in the current absence away cases makes a large-scale re- 3
U.S. Department of Justice, Office of
grossly exceeds previous absences, sponse impractical in every circum- Juvenile Justice and Delinquency Prevention,
National Incidence Studies of Missing,
officers should consider the current stance, police officers have the Abducted, Runaway, and Thrownaway
disappearance a deviation from nor- responsibility of examining each in- Children in America (Washington, DC, 1990),
mal behavior patterns. dividual case with a critical, in- 97.
4
Responding officers also formed eye, and as the evidence in- J.J. Collins, M.E. McCalla, L.L. Powers,
and E.S. Stutts, The Police and Missing
should note the amount of time that dicates, they should always err on Children: Findings from a National Survey,
transpired between the last known the side of caution. (Research Triangle Park, NC: Research
sighting of the missing child and Triangle Institute, 1989), 11.
5
when the parents or guardian National Center for Missing and Exploited
“
Children, Missing and Abducted Children: A
alerted authorities. While 24 hours Law Enforcement Guide to Case Investigation
or more may indicate apathy or ne- and Program Management (Alexandria, VA,
glect, this time frame also can per- Almost no other 1994), 93.
6
petuate the common misconception K. Hanfland, R. Keppel, and J. Weis, Case
that an individual must be missing
crime investigation Management for Missing Children: Homicide
for 24 hours before law enforce- will stretch resources Investigation, Washington State Attorney
General’s Office, 1997.
ment can respond. The responding and generate public 7
National Center for Missing and Exploited
officers should construct a time line criticism as a Children, Investigator’s Guide to Missing Child
Cases (Alexandria, VA, 1987), 2.
identifying the parents’ activities missing child case. 8
Ibid, 6.
during this window. This time line 9
Adopted from the Federal Bureau of
”
highlights family dynamics and Investigation, Critical Incident Response
clarifies the parents’ potential role Group, National Center for the Analysis of
Violent Crime, Child Abduction Response
in the child’s disappearance.13 Plan, (Quantico, VA), 15-16.
Finally, law enforcement agen- 10
For more information, agencies can
CONCLUSION cies must provide their patrol offi- contact the NCAVC coordinator at their local
Given the extraordinary cers with adequate resources and FBI field office.
11
Interview with Supervisory Special Agent
amount of time and resources an training that will allow for a thor- Mark Hilts, Federal Bureau of Investigation,
abducted child case can drain from ough assessment of the facts. Re- NCAVC, March 2, 1999.
a police department, law enforce- search indicates that when police 12
Supra note 3, 63. Law enforcement
ment agencies should take measures agencies pursue missing child cases officers should consult with their departments’
legal advisors to ensure that any search of a
to ensure that they do not label an with vigor, child recovery outcomes residence is legal.
abduction as a runaway—an error improve.14 In spite of the often am- 13
Supra note 9, 17.
that can cripple the subsequent in- biguous nature of the missing child 14
Supra note 4, 137.
vestigation. This mistaken labeling report, law enforcement officers
November 2000 / 7
Perspective
Professional Police the issue of racial profiling will elevate the level of
information and institutional knowledge about the
Traffic Stops problem. Administrators can defuse potential contro-
Strategies to Address versy with officers by assuring them that the objective
Racial Profiling of the agency is the protection of individual rights for
By Grady Carrick, M.S., M.P.A. all citizens.
Establishing policy in a potentially controversial
arena, such as racial profiling, requires leadership
November 2000 / 9
performance. At the officer level, agencies can use with the facts necessary to assure their communities
this data to ensure that individual officers do not base that they do not employ racial profiling. Voluntary
their enforcement on racial profiles. Using this two- collection of traffic stop data is an attractive route for
pronged data analysis, agencies can address ad- agencies who may undertake collection on their own,
equately any issues that arise concerning racial or as part of a broader program among multiple
profiling. agencies. A systematic and standardized approach is
desirable, implemented at the state level where
Conclusion possible. Uniformity allows for a larger data set that
Both state and federal lawmakers continue to will increase reliability and validity in the statistics
consider legislation prohibiting racial profiling. This derived.
issue concerns every community, and law enforce- The highly visible function of police patrol and
ment must recognize these concerns. Citizen percep- traffic enforcement mandates professionalism in
tions regarding professional police practices may traffic stops. By implementing a strategy that ad-
require agency modification of policy, additional dresses racial profiling, agencies move closer to
training, and statistical monitoring. While the topic of professionalism. Moreover, implementing a program
racial profiling often proves uncomfortable for law for professional police traffic stops can protect and
enforcement, ensuring that appropriate measures are strengthen the bond of trust between the public and
in place reduces some of the anxiety that accompanies the police.
the issue.
Besides a well-structured policy and effective Endnotes
training, reliable data can bolster agency prohibition 1
Traffic Stop Statistics Act of 1999, U.S. Senate Bill 821, 106th
of such practices and arm law enforcement officials Congress, April 15, 1999.
The Bulletin’s
E-mail Address
I n January 1997, Ted Hong manufactures and sells pressure- frequently targeted industries in-
“Victor” Lee attended a meet- sensitive products 2 in Taiwan, clude aerospace, biotechnology,
ing at Avery Denison, one of Malaysia, Singapore, the United computer hardware and software,
the largest manufacturers of adhe- States, and the People’s Republic of transportation technology, defense
sive products in the United States, China.3 Avery Denison estimated and armaments technology, energy
where he and others learned of a its lost at over $50 million. research, basic research, and la-
binder containing confidential in- Within U.S. borders, the FBI sers.4 Estimates of losses from eco-
formation on the company’s plans has assumed the role of understand- nomic espionage in the United
for the Far East. Later, closed-cir- ing and dealing with the problem of States range from almost $2 billion
cuit television showed Lee gaining stealing secrets. The economy is to $240 billion per year.5
access three times to the file drawer shifting steadily from one based on Prior to 1996, state and federal
where the binder was kept, and tangible goods to one based on in- laws did not address economic es-
wearing gloves once, when he re- formation, commonly referred to as pionage specifically, or in particu-
moved it from the office for a few intellectual property. The United lar, the theft of intellectual prop-
minutes.1 Confronted by FBI agents States produces much of the erty, in any systematic manner.6
in March 1997, Lee admitted that he world’s intellectual property and But, federal law enforcement has
had provided confidential informa- remains the primary target of a new weapon in its arsenal to
tion to Four Pillars, a company that economic espionage. The most use against industrial thieves—the
November 2000 / 11
“ Finally, long-standing
civil remedies that
recognize the value
integral part of economic well-
being in the United States. More-
over, the nation’s economic inter-
ests are a part of its national security
interests. Thus, threats to the
of intellectual economy jeopardize the nation’s vi-
tal security interest. Congress re-
property now have mains committed to stopping the
a twin in the often-elusive adversary, as evi-
criminal world. denced by its efforts in this area.
Unlike patents, copyrights, and
“
The Economic Espionage Act themselves or a new employer to
creates a new crime of wrongfully compete with their former
copying or otherwise controlling company.
trade secrets, if done with the intent
The economy is An earlier version of the statute
either to benefit a foreign govern- shifting steadily from contained language that exempted
ment, instrumentality, or agent, or one based on tangible “knowledge, experience, training or
to disadvantage the rightful owner goods to one based skill that a person lawfully acquires
of the trade secret and for the eco- on information.... during their work as an employee”
nomic benefit of another person. from coverage under the act. Some
”
The law applies to conduct occur- commentators speculate that by
ring in the United States, and to subjecting employees and their sub-
conduct occurring outside the sequent employers to potential
United States provided that the of- attempting to uncover each other’s criminal liability in this area, the
fender is either a U.S. citizen or bid proposals to the disgruntled law will hamper the mobility of em-
resident alien, an organization sub- former employee who leaves the ployees and have a chilling effect
stantially owned or controlled by a company with a computer diskette on this mobility, in part responsible
citizen or permanent resident, or an full of engineering schematics.15 for the vibrancy of the American
organization incorporated in the The Economic Espionage Act economy and substantially condu-
United States or that an act in fur- prohibits the taking, copying, or re- cive to the stability of the nation’s
therance of the offense was com- ceiving of trade secrets without au- democracy. Perhaps in recognition
mitted in the United States. thorization. Section 1831 prohibits of this, the U.S. Attorney General
As intangible assets, such as anyone from doing so for the “ben- stated that the Attorney General’s
intellectual property and trade efit” of any foreign government, Office must review all complaints
secrets, became increasingly foreign instrumentality, or foreign brought under this act for the 5
important to a company’s survival, agent. Interestingly, Section 1832 years following its enactment in
Congress expanded Title 18 with deals with domestic theft and 1996.17
November 2000 / 13
What Are Trade Secrets? CONFIDENTIALITY ISSUES reluctant to issue protective orders
Two key concepts used in the Congress recognized the need out of concern for the defendant’s
Economic Espionage Act involve to preserve the confidential and right to a fair trial, companies might
the requirement that the economic valuable nature of trade secrets. develop reluctance to bring com-
information involved is a secret in Therefore, the Economic Espionage plaints under this statute in fear that
the legal sense and that the owner of Act contains a provision that autho- their secrets will suffer even
secret information takes reasonable rizes the court to issue orders during broader exposure.
measures to keep it a secret.18 Previ- legal proceedings consistent with
ously, the courts were reluctant to the requirements of the Federal PUNISHMENT
regard intellectual property as tan- Rules of Criminal and Civil Proce- The Economic Espionage Act
gible goods to have protection un- dure, the Federal Rules of Evi- of 1996 punishes criminals and
der federal criminal law. In the stat- dence, and all other applicable laws. spies in an unprecedented manner.
ute, Congress uses terms usually The House Judiciary Committee It authorizes substantial sentences
associated with ownership of tan- pointed out that without such a pro- for individual and organizational
gible property. A proprietary secret vision, owners may be reluctant to defendants and can include fines
for purposes of the economic espio- cooperate in prosecutions for fear and forfeiture penalties. Individuals
nage law applies to information not of further exposing their trade se- may receive fines of up to $500,000
generally known to the public or the crets to public view, thus further and an imprisonment sentence of up
business, scientific, or educational devaluing or even destroying their to 15 years for economic espionage
community in which the owner worth. benefitting foreign entities and
might seek to use the information.19 fines of up to $5 million and impris-
onment for up to 10 years for the
“
What Constitutes theft of a trade secret.21 Organiza-
Reasonable Measures? tions may receive fines up to $10
A trade secret requires that the million for economic espionage and
owner of the information must have The Economic up to $5 million for the theft of a
taken reasonable and active mea- Espionage Act trade secret.22 Additionally, a court
sures to protect the information of 1996 punishes may require defendants to forfeit
from becoming known to unautho- criminals and spies any property or proceeds to the
rized individuals. Thus, if owners in an unprecedented United States obtained as the result
fail to attempt to safeguard their of the violation of the law as man-
proprietary information, no one can
manner. dated in the Comprehensive Drug
”
be rightfully accused of misappro- Abuse Prevention Control Act of
priating it. 1970.23 This statute defines prop-
The term reasonable measures erty subject to forfeiture not only as
is not defined specifically, but a Because courts only recently property derived directly or indi-
reading of the House Report indi- have begun to test this provision of rectly from the offense, but also
cates that, while owners of informa- the statute, it remains too early to “property used, or intended to be
tion must take reasonable steps to tell how it will be implemented in used, in any manner or part, to com-
keep the information secret, owners actual practice, but it could prove mit, or to facilitate the commission
do not have to exhaust every con- a serious problem in cases where of such violation.”24
ceivable means to keep the informa- the secret to be protected is one of Some individuals argue that,
tion secure. Thus, reasonableness the central issues.20 The criminal unlike copyrights or patents, trade
will vary from case to case and de- defendant has the right to a public secrets are not defined clearly and
pend upon the nature of the infor- trial with all pertinent facts placed may represent very broad and gen-
mation in question. before a jury. Should courts prove eral business methods or ideas that
November 2000 / 15
2
CONCLUSION For example, pressure-sensitive products American Society of Industrial Security,
include address and mailing labels designed to (Arlington, VA: March 1, 1996).
The days of catching the spy pass through all types of printers without 8
Economic Espionage Act of 1996, 104th
or the criminal sneaking boxes or adversely affecting the adhesive backing of the Cong., 2nd sess., H.R. 104-788 (September 16,
folders out the door in a briefcase label. 1996).
3 9
no longer exist. Today, enough Supra note 1. 18 U.S.C. 1831 (Economic Espionage)
4
Senator Specter, Congress, U.S. Senate, and 18 U.S. C. 1832 (Theft of Trade Secrets).
information to fill a public library speaking on the Economic Espionage Act of 10
Rockwell Graphic Systems, Inc., v. DEV
easily fits on a CD-ROM or can go 1996 to the Select Committee on Intelligence of Industries, 925 F.2d 174, 180 (7th Cir. 1991).
undetected over the Internet in sec- the U.S. Senate and the Subcommittee on 11
18 U.S.C. § 2314.
12
onds at the push of a button. Law Terrorism, Technology, and Government 18 U.S.C. § 1341.
13
Information of the Committee on the Judiciary 18 U.S.C. § 1343.
enforcement and security personnel of the U.S. Senate. 104th Cong., 2nd Session, 14
United States vs. Brown, 925 F.2d 1301
who investigate economic crimes S12208 (daily ed. October 2, 1996). (10th Cir. 1991).
should realize that victims of eco- 15
Supra note 8.
16
nomic espionage, both individual Supra note 8.
17
21 U.S.C. § 853.
“
and corporate, reluctantly may dis- 18
18 U.S.C. § 1839. The term owner, with
close information or work with law respect to a trade secret, means the person or
enforcement on these matters. entity in whom or in which rightful legal or
Companies answer to shareholders, Law enforcement equitable title to or license in the trade secret is
reposed.
consumers, and investors and, discovers most 19
Supra note 8.
therefore, often make their deci- economic espionage 20
See U.S. v. Kai-Lo Hsu, 982 F. Supp.
sions not with concern for reporting violations through 1022 (E.D. Pa. 1997) 20, cited as example.
21
illegal criminal activity but rather 21 U.S.C. § 1831 and § 1832.
with reference to how disclosure
the use of criminal 22
Ibid.
23
”
Lawyer 12 (December 1997).
could prove counterproductive. Ul- 26
Speech by Howard M. Shapiro, former
timately, they have to protect them- General Counsel, FBI, at a Cornell Law School
selves and often only with the help forum sponsored by the Criminal Justice
5
See, e.g., Peter J. G. Toren, “The Society, October 18, 1994.
of law enforcement. Prosecution of Trade Secrets Thefts Under 27
Dumpster diving is the act of going
Fortunately, the loss of intellec- Federal Law,” 22 Pepperdine Law Review 59, through someone’s trash to get information
tual property is no longer just a civil at 62 (1994) ($1.8 billion) and Sam Perry, about them. As a general rule, trash on the curb
“Economic Espionage: The Corporate Threat,” has no expectation of privacy while trash on
matter and, therefore, law enforce- ($240 billion) available from http://the- private property does.
ment should not treat it as one. The south.com/USInternational/econ.html; 28
More than five false identifications may
Economic Espionage and Theft of accessed September 11, 2000. be a violation of federal law under the Fraud
6
Trade Secrets Act of 1996 provides State law did not adequately fill the gaps and Related Activity to Identification
left by federal law. While the majority of states Documents (FRAID) Act, 18 U.S.C. § 1028.
a powerful and viable tool for law have some form of civil remedy for the theft of 29
The FBI uses the Awareness of National
enforcement to protect individuals proprietary economic information (trade Security Issues and Response (ANSIR) program
and corporations, while seriously secrets), either by recognizing a tort for the to communicate with industry, provide
punishing spies and thieves. misappropriation of the information or by advisories and alerts on topics such as
enforcing contracts governing the use of the economic espionage, and present unclassified
information, these civil remedies often are briefings to corporate security personnel
Endnotes insufficient. House Report 104-788, 104th nationwide. For more information or to make a
1
United States of America v. Pin Yen Yang Cong., 2nd Session (September 16, 1996). referral, contact the FBI ANSIR coordinator at
7
et al., Criminal No. 97 CR 288 (N.D. Ohio, Richard J. Heffernan, Dan T. Swarthwood, the local FBI field office, or access
September 4, 1997). “Trends in Intellectual Property Loss Survey,” www.fbi.gov.
Police Auditing: Theories and Practices recommendations. These credentials allow him
by Allan Y. Jiao, Ph.D., Charles C. Thomas, to draw upon his research and practical audit
Springfield, Illinois, 1999. experience at the city level and from govern-
Police Auditing focuses primarily on mental and international departments to provide
theories and practices in law enforcement valuable information, in a systematic approach,
auditing. It provides a comprehensive view to the entire law enforcement community. He
of auditing by examining empirical standards, identifies outstanding demonstrated audit proce-
procedures, and practices and evaluations of dures and methods of improved audit effective-
conducting and responding to such audits. ness and integrates them throughout the book.
Developing and maintaining positive In the chapter titled “Variety Police Au-
changes in law enforcement departments that dits,” the author makes a relevant point that law
eliminate gaps in performance and enhance enforcement auditing is not tied just to financial
interface with technology and the community records involving allocation and expenditures
are stressed in Police Auditing. These improve- of the budget and grants. The audit must address
ments help managers develop their short- and the total aspects of all law enforcement opera-
long-range strategies and operational planning tions that compose and interface with the book’s
efforts. This book does not cover accounting identified elements that will ultimately provide
practices and is not a summary of a scientific local residents and merchants with a safer living
research report. and business environment.
The book provides law enforcement with The author ends each chapter with an
various auditing methods to assist police depart- abstract to help auditors prepare an executive
ments in becoming more efficient, effective, summary for distribution throughout law
and financially competent. It accomplishes this enforcement oversight offices and their organi-
through a model for planned change and police zation and improve overall audit performance.
auditing that incorporates certain interrelated When police auditors and department managers
elements applicable to police auditing, regard- apply the procedures described in Police
less of a department’s mission and size. Auditing, the benefits can lead beyond the
This book examines eight components of basics of just reviewing and documenting and
implementing auditing changes that will give aid them in completing a variety of other
shape and direction to a law enforcement department goals. Police executives, supervi-
agency’s vision and culture. Some examples sors, accountants, audit team members, depart-
of these include coping with external/internal ment trainers, citizen review board members,
pressures, closing performance gaps, meeting and academic personnel should add Police
goals and objectives, and developing solutions Auditing to their intended reading list.
and alternatives. These points will aid adminis-
trators in developing a systematic and compre- Reviewed by
hensive review in improving their departments. Larry R. Moore
The author served as a member of a munic- Certified Emergency Manager
ipal budget review task force and as chairman International Association
of a city public safety committee that evaluated of Emergency Managers
law enforcement responses to various audit Knoxville, Tennessee
November 2000 / 17
The
Microscopic
Slide
A Potential
DNA
Reservoir
By JOHN E. SMIALEK, M.D.,
CHARLOTTE WORD, Ph.D., and
ARTHUR E. WESTVEER, M.L.A.
Dr. Smialek, the chief medical Dr. Word serves as a forensic Mr. Westveer is a violent
examiner for Maryland, heads laboratory deputy director for crime specialist in the
the Forensic Pathology Division, a private firm in Germantown, Behavioral Science Unit
Department of Pathology, School Maryland. at the FBI Academy.
of Medicine, at the University of
Maryland in College Park.
November 2000 / 19
Case Scenarios
Case #1 Case #2
In 1982, the Naval Criminal Investigative The Richmond, Virginia, Police Department
Service opened a homicide case that involved investigated a homicide with little evidence and
the rape and murder of a woman, placed in the few leads. However, investigators secured blood
trunk of a car and pushed into a bay. Investi- and semen samples from the scene. Officers
gators recovered little evidence from the scene identified a suspect, but DNA analysis exoner-
except some DNA material. This case remained ated him. Four years later, investigators exam-
unsolved until 1995 when, with support from ined these samples again and submitted them to
new analysis of the 14-year-old DNA, investi- their state’s DNA indexing system. The DNA
gators reexamined the case and identified a samples from the homicide matched samples
suspect. Officers arrested and charged the from a 20-year-old man who had a criminal
suspect with the rape and murder of the female history of rape and murder. Officers charged
victim. the suspect with the 4-year-old homicide.
the material remains on surfaces by scopic slide, this evidence retains Advancing Technology
absorption or adherence.4 Liquid its DNA characteristics. But, the Recent efforts at the local, state,
biological evidence (e.g., blood, se- specimen must remain sequestered and federal levels of government to
men, and urine) absorbs into sur- from exposure to environmental ef- employ advanced information sys-
faces, and solid biological evidence fects, which could result in decom- tem technologies emphasize the im-
(e.g., hair, bones, and teeth) adheres position and deterioration. If the portance of preserving DNA
to surfaces. The proper way to pre- material transferred to the slide con- samples. For example, the FBI cre-
serve DNA evidence depends on tains a sufficient number of sperm, ated a National DNA Indexing Sys-
the liquid or solid state and the con- experts can use the PCR technique tem (NDIS) that uses computer ap-
dition of the evidence.5 to identify the male’s DNA profile, plications and forensic science
Medical examiners and foren- regardless of the time interval from practices to match DNA samples
sic pathologists permanently main- when they made the slide. across the country.9 In this effort,
tain microscopic slides that contain Smear preparation of DNA ma- scientists analyze DNA samples
biological evidence from a swab of terial, which includes drying by air, and store profiles of the biological
a body cavity taken at the time of an immersing in several liquids, and evidence in a computer database.
autopsy. Experts have extracted mounting on various kinds of mate- Public forensic laboratories
DNA material successfully from rial, does not degrade the genetic throughout the United States use
medical examiners’ offices, hospi- material. Similarly, DNA tissues these profiles to exchange and com-
tals, or rape kits.6 The critical num- preserved in paraffin blocks, such pare DNA profiles electronically.10
ber of sperm on a slide for as surgical specimens, often remain If an electronic match results, the
successful DNA testing appears suitable for PCR testing. Research FBI notifies the submitting jurisdic-
to exist in the range of at least over the past 10 years has demon- tion and further investigation en-
100.7 For example, after experts strated that tissues stored in forma- sues. Additionally, the design of the
properly fix, process, and stain a lin/formaldehyde may be suitable FBI’s Combined DNA Indexing
specimen of sperm on a micro- for DNA testing using PCR.8 System (CODIS) allows state and
Source: U.S. Department of Justice, National Institute of Justice, National Commission on the Future of DNA
Evidence, What Every Law Enforcement Officer Should Know About DNA Evidence, (Washington, DC, 1999).
November 2000 / 21
Contamination Precautions
To prevent contamination of DNA evidence, officers Wanted:
should— Photographs
• wear gloves and change them often;
• use disposable instruments or clean them thoroughly
before and after handling each sample;
• avoid touching the area where DNA evidence may exist;
• avoid talking, sneezing, and coughing over evidence;
• air-dry evidence thoroughly before packaging; and
• put evidence into new paper bags or envelopes, not into
plastic bags, and never use staples.
Source: U.S. Department of Justice, National Institute of Justice,
National Commission on the Future of DNA Evidence, What Every
T he Bulletin staff is
always on the lookout
for dynamic, law enforce-
Law Enforcement Officer Should Know About DNA Evidence, ment-related photos for
(Washington, DC, 1999). possible publication in the
magazine. We are interested
in photos that visually depict
the many aspects of the law
enforcement profession and
years prior to the DNA testing. http://www.ncjrs.org/txtfiles/13102-9.txt.; illustrate the various tasks
Biological evidence within police accessed November 10, 1999.
4
law enforcement personnel
U.S. Department of Justice, Federal
departments, maintained with a Bureau of Investigation, Handbook of Forensic
perform.
proper chain of custody, can assist Sciences: Evidence Examinations, available We can use either black-
in the successful identification of from http://www.fbi.gov/programs/lab/ and-white glossy or color
the perpetrator, as well as in the handbook/examsdna.htm.; accessed September prints or slides, although we
11, 2000. For questions concerning DNA
exoneration of a wrongly convicted evidence, contact the FBI Laboratory at
prefer prints (5x7 or 8x10).
person. 202-324-5436. Appropriate credit will be
5
Ibid. given to contributing photog-
6
Based on a study by one of the authors raphers when their work
Endnotes who recorded several successful extractions of
1 DNA material.
appears in the magazine. We
U.S. Department of Justice, Convicted by
Juries, Exonerated by Science: Case Studies 7
Ibid. suggest that you send dupli-
in the Use of DNA Evidence to Establish 8
D. Shibata, T. Namiki, R. Huguchi, cate, not original, prints as
Innocence After Trial, Research Report, “Identification of a Mislabeled Fixed Specimen we do not accept responsibil-
(Washington, DC, June 1996) and “Oops! by DNA Analysis, The Journal of Surgical
Pathology 14(1): 1076-1078, 1990.
ity for prints that may be
We Forgot to Put it in the Refrigerator: DNA
Identification and the State’s Duty to Preserve 9
U.S. Department of Justice, Federal damaged or lost. Send your
Evidence,” The John Marshall Law Review, Bureau of Investigation, “The National DNA photographs to:
25:809-836, 1992. Indexing System,” FBI National Press Release,
2
U.S. Department of Justice, National (Washington, DC, October 13, 1998). Brian Parnell, Art
10
Institute of Justice, National Commission on U.S. Department of Justice, Federal Director, FBI Law
the Future of DNA Evidence, What Every Law Bureau of Investigation, Ensuring Public Safety
Enforcement Officer Should Know About DNA and National Security Under the Rule of Law:
Enforcement Bulletin,
Evidence, (Washington, DC, 1999). A Report to the American People on the Work FBI Academy, Madison
3
U.S. Department of Justice, Office of of the FBI, 1993-1998, available from Building, Room 209,
Justice Programs, National Institute of Justice, www.fbi.gov/library5-year/5-year_rpt.htm; Quantico, VA 22135.
Automated DNA Typing: Method of the accessed September 11, 2000.
Future, February 1997; available from
November 2000 / 23
SCLEAP. It has a governing board of leaders from hamper operations. Chaplains intercede to comfort
local, state, and federal law enforcement, as well as and control the relatives, allowing officers to do
private citizens who represent community leaders their work.
with diverse backgrounds. The chaplaincy board acts Similarly, SCLEAP chaplains work with the
in an advisory capacity to SCLEAP and initiated the SLED special weapons and tactics (SWAT) team to
process leading to its creation. counsel hostages and to calm family members, as well
The concept for the SCLEAP initiative is simple. as witnesses to serious incidents. Chaplains don
Multiple agencies with a mutual need to provide armor vests and respond to SWAT calls that involve
employees with special support associated with barricaded suspects, subjects who are mentally
stressful duty enter into a jointly funded program. In disturbed, or multiple victims. The chaplains help
the South Carolina program, participating agencies reassure neighbors or other individuals who show
pay an equal share to support the concern about or become suspi-
staff and provide operating funds. cious of police tactical operations.
Additionally, SCLEAP chaplains
Implementing Duties
“
respond to incidents of trooper-
The SCLEAP staff has facili- involved shootings, certain vehicu-
tated critical incident debriefings, ...agencies determined lar pursuits, and related incidents.
responded to critical incidents in that sharing the Due to the size of the highway
support of officers and victims, operation of a joint patrol and its parent agency, DPS,
provided pastoral care to officers employee assistance response on behalf of DPS is
and family members, and referred program would becoming frequent. Likewise,
officers to other professional prove effective. support for the PPP will grow as
resources. In an incident involving that agency begins to use SCLEAP
a workplace shooting, law enforce-
ment chaplains provided critical
incident care follow-up and
referrals for approximately 300 witnesses. This
” services.
Additionally, plans exist for
chaplains to support officers sent
to natural disasters. During hurricanes or other
police-sponsored intervention greatly facilitated disasters where officers leave for extended duty, they
relations between police and victims/witnesses. may have concerns or worries regarding the welfare
Winthrop University in Rock Hill, South Caro- and safety of family left at home. The chaplains will
lina, held the first interagency postcritical incident check on officers’ families who experience difficul-
seminar (PCIS) in conjunction with LECSC. The FBI ties and, where possible, facilitate support to these
designed the PCIS model to assist agents with han- families and report to the officers in the disaster area.
dling the effects of critical incident stress.2 The
chaplaincy borrowed this concept and applied it on an Providing Services
interagency basis with both state and local officers All services begun under the chaplaincy have
meeting with trained law enforcement peer support- continued under the MOU with additional ones
ers, mental health professionals, and chaplains. added. The SCLEAP provides a full-time professional
Participants received information on trauma, patterns staff, whose members have master’s degrees or above,
of resolution, and field-tested coping strategies to on a 24-hour, 7-day basis to assist all employees and
promote recovery and resilience. their families. Also, the SCLEAP staff coordinates a
SCLEAP regularly supports DNR law enforce- trained critical incident stress debriefing and peer
ment officers while they conduct search and rescue support team from partner agencies. The SCLEAP
or search and recovery missions. In this capacity, staff furnishes a confidential system of care and
DNR officers usually encounter family members of referral for employees and family members to thera-
the victim who come to the scene and inadvertently peutic resources in areas of need, such as alcohol and
November 2000 / 25
Bulletin Reports
Clarification
November 2000 / 27
Legal Digest
D uring the 1999-2000 term, officer’s initial stop is supported by manipulation of a bus passenger’s
the U.S. Supreme Court reasonable suspicion when the sus- carry-on luggage was a search and
ruled on three Fourth pect is both present in an area of therefore governed by the Fourth
Amendment cases relating to crimi- expected criminal activity and flees Amendment. Steven Dewayne
nal procedure and a Fifth Amend- upon seeing the police; 3) whether Bond was a passenger with carry-on
ment case involving the constitu- an anonymous tip that a person is luggage on a bus. When the bus
tionality of the Miranda rule. Law carrying a gun, without more infor- stopped at a Border Patrol check-
enforcement officers and their mation, justifies a police officer’s point, a Border Patrol agent
agencies may find these cases par- stop and frisk of that person; and boarded the bus to check the pas-
ticularly important and interesting. 4) whether the Miranda rule is a sengers’ immigration status. In an
Specifically, the Court ruled on constitutionally based rule. effort to locate illegal drugs, the
1) whether a law enforcement of- agent began to squeeze the soft lug-
ficer conducts a Fourth Amendment Bond v. United States, gage, which some passengers had
search when physically manipulat- 120 S. Ct. 1462 (2000) placed in the overhead storage
ing a bus passenger’s carry-on lug- The Supreme Court held that a space above their seats. The agent
gage; 2) whether a law enforcement law enforcement officer’s physical squeezed the canvas bag above
November 2000 / 29
ammunition. The officers subse- reviewing an officer’s decision to sufficient to establish reasonable
quently arrested Wardlow. stop an individual, the Court does suspicion. In this case, the Court
Wardlow moved to suppress not expect scientific certainty. The concluded that the officer was justi-
the gun. The Illinois trial court de- determination of reasonable suspi- fied in suspecting that Wardlow
nied Wardlow’s motion to sup- cion must be based on common was involved in criminal activity
press, finding that the officers per- sense judgments and inferences and investigating further because
formed a lawful stop and frisk. At about human behavior.7 However, Wardlow was both present in an
the bench trial, Wardlow was con- several factors can be used to deter- area of expected criminal activity
victed for unlawful use of a weapon mine whether an officer has reason- and fled upon seeing the police.
by a felon. The Illinois Appellate able suspicion to make a Terry stop,
Court reversed Wardlow’s convic- including 1) whether the stop oc-
tion, finding that the officer did not curred in a “high crime area”;8 2) a
have reasonable suspicion suffi- suspect’s nervous, evasive behav-
cient to justify an investigative stop ior;9 and 3) a suspect’s unprovoked
under Terry v. Ohio.5 The Illinois flight upon noticing the police.10
Supreme Court affirmed. The U.S. Each factor alone may not be
Supreme Court granted certiorari enough to support a reasonable sus-
solely on the question of whether picion that criminal activity is
the initial stop was reasonable and afoot. For example, an individual’s
reversed, holding that the initial presence in a high crime area, stand-
stop was supported by reasonable ing alone, is not enough to support a
suspicion. reasonable suspicion that he is com-
Under Terry, an officer may, mitting a crime. And although head-
consistent with the Fourth Amend- long flight is not necessarily indica-
ment, conduct a brief, investigatory tive of ongoing criminal activity, it
stop when the officer has a reason- is suggestive of such because it is
Florida v. J.L.,
able, articulable suspicion that an act of evasion. However, these
120 S. Ct. 1375 (2000)
criminal activity is afoot.6 When factors, taken together, may be
The Supreme Court held that an
anonymous tip that a person is car-
© Jennifer Hill rying a gun, without more informa-
tion, does not justify a police
officer’s stop and frisk of that per-
son. 11 An anonymous caller re-
ported to the police that a young
black man standing at a particular
bus stop and wearing a plaid shirt
was carrying a gun. According to
the record, there was no audio re-
cording of the tip and nothing was
known about the informant. Offi-
cers went to the bus stop and saw
three black men. One of the men,
J.L., was wearing a plaid shirt.
Aside from the tip, the officers had
no reason to suspect the three of
illegal conduct. The officers did
November 2000 / 31
© Jennifer Hill
Endnotes
1
Katz v. United States, 389 U.S. 347, 360
(1967) (J. Harlan, concurring).
2
Bond v. United States, 120 S. Ct. 1462,
In order to protect an individual The Court held Miranda to be a 1466 (2000), citing Katz, 389 U.S. at 361 (J.
against compelled self-incrimina- constitutional decision—that is, a Harlan, concurring).
3
Bond, 120 S. Ct. at 1464. The Court noted
tion during police custodial interro- decision which interprets and ap- that a traveler’s personal luggage is an “effect”
gations, Miranda established four plies the Constitution—that cannot protected by the Fourth Amendment.
warnings, or Miranda rights. A sus- be overruled by an Act of Congress, 4
Katz, 389 U.S. at 357.
5
pect must be told that he “1) has the such as 18 U.S.C. § 3501. While 392 U.S. 1 (1968).
6
Illinois v. Wardlow, 120 S. Ct. 673
right to remain silent; 2) that any- conceding that Congress may (2000), citing Terry, 392 U.S. at 30.
thing he says can be used against modify or set aside the Court’s rules 7
Wardlow, 120 S. Ct. at 676.
him in a court of law; 3) that he has of evidence and procedure that are 8
Id. at 673, quoting Adams v. Williams, 407
the right to the presence of an attor- not required by the Constitution, the U.S. 143, 144 (1972).
9
Wardlow, 120 S. Ct. at 673.
ney; and 4) that if he cannot afford Court emphasized that Congress 10
Id.
an attorney, one will be appointed may not overrule the Court’s deci- 11
An officer’s authority to make the initial
for him prior to any questioning if sions that interpret and apply the stop was at issue, not the officer’s authority
he so desires.” 20 Whether a Constitution. under Terry to conduct a frisk of a person who
already has been stopped legitimately.
suspect’s statement during his cus- The Court cited various other Obviously, if the initial stop is unreasonable,
todial interrogation will be admis- reasons for reaching its conclusion then any resulting frisk would likewise be
sible in evidence depends on that Miranda is a constitutionally unlawful.
12
whether the police provided him based rule. Among them, the Court Florida v. J.L., 120 S. Ct. 1375, 1378
(2000), quoting Alabama v. White, 496 U.S.
with these four warnings and ob- noted that Miranda had become 325, 329 (1990).
tained an appropriate waiver. part of our national culture because 13
Id. at 327.
Two years after Miranda, Con- the warnings were embedded in 14
J.L., 120 S. Ct. at 1379.
15
gress enacted 18 U.S.C. § 3501, routine police practice. Further- Id. at 1378, citing White, 496 U.S. at 332.
16
J.L., 120 S. Ct. at 1379.
providing that a confession shall be more, § 3501 is more difficult than 17
Id.
admissible in federal court if it is Miranda for law enforcement offi- 18
Id. at 1381.
voluntarily given.21 The Court de- cers to conform to and for courts to 19
384 U.S. 436 (1966).
20
termined that Congress intended to apply in a consistent manner.22 Id. at 479.
21
18 U.S.C. § 3501(a).
overrule Miranda because § 3501 By holding Miranda to be a 22
Dickerson, 120 S. Ct. at 2336.
requires merely voluntariness—not constitutional decision, the Court
the four warnings—as the deter- reaffirmed that Miranda governs
mining factor as to whether a state- the admissibility of statements
ment will be admissible. made during custodial interrogation
Law enforcement officers are challenged daily in the performance of their duties; they face each
challenge freely and unselfishly while answering the call to duty. In certain instances, their actions
warrant special attention from their respective departments. The Bulletin also wants to recognize
their exemplary service to the law enforcement profession.
Marine Patrol Officer Gary Mick of the Metro-Dade, Florida, Police Depart-
ment was dispatched alone to an ocean rescue of a capsized sailboat during a
severe weather watch with 10- to 13-foot seas, 30 mile per hour winds gusting to
40 miles per hour, and heavy rain. Officer Mick almost was thrown overboard
due to the extremely stormy seas, but, in spite of the hazardous conditions, he
successfully rescued two individuals from the water. During the rescue opera-
tion, Officer Mick single-handedly maneuvered his boat into the wind while
battling ocean waves breaking in over the gunwale. While doing this, he also
had to remove a dive door, attach a line to a boat cleat, and toss the line to the
nearest victim. Officer Mick’s courage and determination saved the lives of
Officer Mick the two victims who had been in the water for over an hour, were extremely
fatigued, and suffered from hypothermia.
U.S. Department of Justice Periodicals
Postage and Fees Paid
Federal Bureau of Investigation Federal Bureau of Investigation
FBI Law Enforcement Bulletin ISSN 0014-5688
935 Pennsylvania Avenue, N.W.
Washington, DC 20535-0001
Official Business
Penalty for Private Use $300
Subscribe Now