You are on page 1of 35

August 2000

Volume 69
Number 8
United States
Department of Justice
Federal Bureau of
Investigation
Washington, DC
20535-0001

Louis J. Freeh
Director
Features
Contributors' opinions and
statements should not be
considered an endorsement by
the FBI for any policy, program, Investigative Uses of Computers Law enforcement can use time line
or service.

The Attorney General has


By Craig W. Meyer and 1 analysis to provide a method of quickly
tracking and retrieving valuable case
determined that the publication
Gary M. Morgan information.
of this periodical is necessary in
the transaction of the public
business required by law. Use of Identity Theft Law enforcement officers can help
funds for printing this periodical
has been approved by the
By Matthew L. Lease 8 citizens prevent and resolve identity
theft.
Director of the Office of and Tod W. Burke
Management and Budget.

The FBI Law Enforcement Color of Law Investigations Officers can help prevent most color
Bulletin (ISSN-0014-5688) is
published monthly by the
Federal Bureau of Investigation,
By John R. Schafer 15 of law investigations by acting in a
professional manner and writing more
935 Pennsylvania Avenue, detailed, accurate reports,
N.W., Washington, D.C.
20535-0001. Periodical postage
paid at Washington, D.C., and
additional mailing offices. Getting Along with Although many law enforcement
Postmaster: Send address
changes to Editor, FBI Law
Enforcement Bulletin, FBI
Citizen Oversight 22 agencies have voiced concern about
citizen oversight, more and more
Academy, Madison Building,
By Peter Finn agencies are finding the process helpful.
Room 209, Quantico, VA 22135.
Anonymous Tips and Frisks Officers can conduct protective searches
Editor
John E. Ott By Michael J. Bulzomi 28 based on reasonable suspicion when
dangerous situations justify taking
Associate Editors unusual precautions.
Glen Bartolomei
Cynthia L. Lewis
Bunny S. Morris
Art Director
Brian K. Parnell
Departments
Assistant Art Director
Denise Bennett Smith
Staff Assistant 6 Perspective 14 Book Review
Linda W. Szumilo Investigative Priorities Crime Prevention
Internet Address
13 Crime Data 21 Technology Update
leb@fbiacademy.edu
Police Deaths LEO
Cover Photo
© Digital Stock

Send article submissions to


Editor, FBI Law Enforcement
Bulletin, FBI Academy, Madison
Building, Room 209, Quantico,
VA 22135.

ISSN 0014-5688 USPS 383-310


© Mark C. Ide

Investigative
Uses of
Computers
Analytical
Time Lines
By CRAIG W. MEYER, M.S.
and GARY M. MORGAN, M.A.

H
ow often has a defense at-
torney exploited a gap in
an investigator’s case
without the investigator realizing
this obvious discrepancy existed?
How can investigators work on
complex cases with developing in-
formation that proves difficult to as-
similate? How can they keep track
of a myriad of case facts used dur-
ing interviews and interrogations
and meetings with prosecutors, task
forces, or management? Do they
struggle to keep track of which
leads they have covered? The solu-
tion to any or all of these problems
may lie in time line analysis—a
simple application of readily avail-
able computer software. TIME LINE tasks in production analysis for
Using time lines will often DEVELOPMENT scheduling resources. 1 In 1958,
prove more productive for these is- Many disciplines, such as man- these early efforts evolved into a
sues as well as enable investigators agement science and psychology, scheduling technique that incorpo-
to virtually eliminate duplication of have used time lines for analytical rates the interrelationships of tasks
effort and inefficiencies during the purposes for decades. Studies dat- called Program Evaluation and Re-
course of an investigation. This ing as far back as 1917 focused on view Technique (PERT).2 One re-
concept also will help investigators using time lines in production and cent study involves a seven-step
quickly track and retrieve informa- scheduling. Early management pio- process, termed the Critical Deci-
tion that took numerous hours to neers employed time lines to sion Method, which discusses the
develop. represent the start and duration of use of time lines in cognitive task

August 2000 / 1
analysis.3 Step five of this process protests made by subjects concern- investigation. Investigators should
uses time lines to chronologically ing their guilt. The time line also update the time line by adding perti-
capture the salient events within an gives investigators a tool for pre- nent information to it after each
incident, allowing the expert to senting their case, logically and interview.
verify the time line during its con- concisely, to others, such as manag-
struction. In a more fundamental ers, prosecutors, and grand jurors. Interrogation Application
application, farmers have advo- Whether in simple handwritten An interrogation differs signifi-
cated the use of time lines to im- form or in a sophisticated multime- cantly from the interview in several
prove grain drying and the handling dia program, the time line also can ways. While the objective of an
and storage of farm commodities.4 serve as an invaluable tool through- interview is to gain information, the
out the case process. objective of an interrogation is to
TIME LINE APPLICATION gain a confession. An interrogation
FOR LAW ENFORCEMENT Interviewing Application generally involves the subject of the
Time line analysis can help law Experienced investigators investigation, whereas the inter-
enforcement investigators record know that the first step in a struc- view usually involves a witness. A
and analyze large amounts of data, tured interview is preparation, witness interview can turn into an
prepare for witness interviews, and which includes reviewing case interrogation if the interviewer be-
write affidavits. Additionally, the facts.5 Investigators can use the lieves the individual has become the
time line can assimilate the volumi- time line to study case facts before focus of the investigation as a result
nous information gathered from in- the interview and refer to it during of the interview.6
vestigative techniques, such as the interview to verify the inter- In the first stages of an interro-
search warrants, record reviews, viewee’s information. Having the gation, an investigator confronts the
and wire taps. A time line can help time line available will aid investi- subject.7 A time line may help the
during interrogations by providing gators in determining the truthful- interrogator convincingly make this
investigators with succinct infor- ness of the individual and help accusation. Next, the investigator
mation that will aid in accusing keep a potentially large number of may need to cut off denials, redirect
subjects and may help to redirect facts in order during a complex protests, and provide reasons for the
subject to confess.8 The time line
would help investigators accom-
plish this by providing them quick
and easy access to case facts,
thereby enhancing the probability
of a confession.
Other Applications
Time lines have other uses per-
tinent to law enforcement. Behav-
ioral science experts advocate de-
veloping and maintaining a time
line for information collected about
a particular subject, indicating
whether a person behaves with
some consistency over time.9 This
Special Agent Meyer teaches Special Agent Morgan teaches could prove useful for court pur-
interviewing and interrogation computer crime investigations at poses or for further evaluation by
at the FBI Academy. the FBI Academy. documenting aspects of a subject’s
behavior and mental state. Time

2 / FBI Law Enforcement Bulletin


lines also serve as an excellent
method for law enforcement admin-
istrators to enhance crime surveys
that help track crime problems
in their jurisdictions and to deter-
mine where they should apply their
resources.
Courts can benefit from using
time lines to track subjects through
the judicial process. This ensures
that the courts have completed all
the appropriate procedures both be-
fore and after adjudication. Addi-
tionally, the time line also can help Consolidated Time Line
visually depict case facts to a pros-
ecutor, grand jury, magistrate, or
judge.

TIME LINE the information and place the lyzing potential subsequent inves-
IMPLEMENTATION salient facts, in chronologic order, tigations to help identify appropri-
Various affordable spreadsheet on a time line for the interview and ate leads or courses of action that
programs exist that investigators on a master time line for the case. In would bring a case to a logical con-
can use to effectively construct time doing so, investigators can quickly clusion. As investigators analyze
lines. After becoming familiar with view these events to determine sub- the master time line, they should
the program's drawing and hyper- sequent courses of action. consider possible shortcomings in
linking tools, all levels of users can In a murder investigation, wit- the overall investigation. This
create fairly sophisticated time nesses’ statements that they ob- analysis will help investigators de-
lines. served the subject with a weapon on velop a strong case and disclose a
a certain date before the crime rep- possible course of action for subse-
Consolidating Time Lines resents a significant event that in- quent investigation. The master
Creating a master or consoli- vestigators would place on a time time line also may provide manag-
dated time line represents one goal line. In a fraud investigation, the ers or prosecutors a quick reference
of using this type of software. To investigator would document a sub- for case presentation or aid investi-
produce a master time line, investi- poenaed record reflecting the trans- gators in conducting further inter-
gators should develop individual fer of a large sum of money to a views or interrogations.
time lines for each investigative bank account on the time line. As
step that deserves documenting, the investigator places each event Linking Time Lines
such as witness interviews, search on the time line, an outline of the Time lines can contain much
warrant reports, record reviews, or case, which investigators can con- more than a simple chronology of
surveillance logs. When grouped, tinue to build on, emerges. Investi- events. Many software programs al-
they form the master time line that gators should modify the time line low investigators to add other data
investigators could use to compare as the case develops or facts change. to time lines through hyperlinks,
events developed from various fac- By continually updating the time which allow users to electronically
ets of the investigation. For ex- line, investigators can use it for a cross-reference documents. In do-
ample, when investigators conduct variety of purposes, such as analyz- ing so, investigators can incor-
an interview, they need to analyze ing the investigation to date or ana- porate photographs, additional

August 2000 / 3
reports, scanned documents, video Anytown (NBA). In conducting the • Jones was observed in a new
material, and other digitized data investigation, investigators initially car on 2/22/99.
into the time line. Simply clicking interviewed NBA’s Branch Man- • Jones was observed wearing
on the hyperlink allows investiga- ager James Adams and bank teller a new expensive watch on
tors to view the corresponding in- Joan Smith. 2/24/99.
formation in its appropriate pro-
gram. This allows investigators Adams Interview
Smith Interview
access to an evidence-retrieval Investigators gleaned pertinent
information regarding this crime Smith also provided relevant
mechanism that can double as a pre- information during her interview.
sentation tool. from the Adams interview. Ana-
lysts would then place the salient Investigators can create a summary
A TIME LINE points on a time line. of her information and place it on
ILLUSTRATION the time line.
• Teller Jesse Jones has
The following sample case appeared somewhat unhappy • Jones complained about her
shows the concept of using a time at work. finances on 2/12/99.
line. However, the time lines in this • Jones complained about being
• Jones asked for a raise on
sample are oversimplified for illus- denied a raise on 2/14/99.
2/13/99, which management
trative purposes. Obviously, in an • Smith dropped Jones off at the
denied.
actual investigation, the time line car dealer Imports, Ltd. to pick
could contain dozens if not hun- • Jones acted as head teller from
2/13/99 through 2/15/99, and, up a new car on 2/19/99.
dreds of events. Most software pro-
grams allow investigators to aug- as a result, had legitimate • Smith met the car salesman
ment time lines and can handle access to the bank vault. and saw the new car.
voluminous case information. • An audit conducted on 2/17/99 • Jones was boasting about an
The crime in this case involves discovered a $50,000 shortage, expensive watch she received
the theft of $50,000 from the bank which prompted this as a gift on 2/23/99.
vault of the National Bank of investigation.
Bank Records Review
A review of bank personnel
records indicated that Jones had a
checking account at NBA. A subse-
quent review of this account (result-
ing from a subpoena) showed trans-
actions worthy of placing on the
time line.
• A cash deposit of $19,000 was
made on 2/19/99.
• A cash deposit of $8,750 was
made on 2/20/99.
• A wire transfer to Imports,
Ltd. in the amount of $22,000
was made on 2/21/99.
• A cash withdrawal of $3,000
Time Line Comparison Shows Interview Discrepancies was made on 2/22/99.

4 / FBI Law Enforcement Bulletin


As a result of the obtained in- Investigators must resolve this digitized evidence, they can make
formation, investigators conducted conflict through a follow-up comparisons to obviate problems
a follow-up interview at Imports, interview of one or both witnesses in the investigation. Subsequent
Ltd., with the salesman Bill Will- or decide upon another course of investigations become apparent and
iams. Investigators added the sig- action to verify the accuracy of the case resolution is enhanced. Addi-
nificant data to the time line. witness statements. Use of time tionally, investigators can access all
lines in this fashion prove most ef- of the supporting evidence with the
Williams Interview fective in managing case informa- click of a mouse. Time lines enable
• On 2/20/99, Imports, Ltd. tion. The value of time line analysis investigators to search for specific
received an $8,000 cash becomes most apparent when these information should a trial attorney
deposit from Jones for a new types of discrepancies exist in an require them to do so. Investigators
car. investigation because they become who use time lines may begin with a
visual. If investigators cannot seemingly common spreadsheet
• Jones purchased a new car for eliminate discrepancies, at least a program but become armed with a
$30,000 using a wire transfer time line can alert them to possible powerful and impressive tool that
for the balance of $22,000 on issues that a prosecutor must diffuse helps them to better manage their
2/21/99. before trial. cases.
• Williams met Smith when


Jones came to pick up the new Endnotes
car on 2/21/99. 1
Samuel C. Certo, Modern Management:
Diversity, Quality, Ethics, and the Global
Time Line Review Time lines can Environment (Boston, Massachusetts: Allyn
Up to this point, investigators contain much and Bacon, 1994), 198-199.
2
Joseph Horowits, Critical Path Schedul-
have created a time line for each more than a simple ing: Management Control Through CPM and
witness and the record review of the chronology of events. PERT (New York, New York: Ronald Press
checking account. Analysts can Company, 1967).


3
compare these time lines by build- Robert R. Hoffman, Beth Crandall, and
Nigel Shadbolt, “Use of the Critical Decision
ing a master time line, which they Method to Elicit Expert Knowledge: A Case
should perform as the investigation Study in the Methodology of Cognitive Task
progresses. By creating and con- CONCLUSION Analysis” Human Factors, June 1998, 254-276.
4
stantly reviewing and updating each The law enforcement commu- Larry Reichenberger, “A Bottleneck at the
Bins (Tips to Improve Grain Drying),”
individual time line, investigators nity handles many complex crimi- Successful Farming, November 1997, 27-29.
can look for inconsistencies in the nal investigations each year. Ad- 5
John E. Hess, Interviewing and Interroga-
investigation and logically conduct ministrators constantly must look tion (Cincinnati, Ohio: Anderson Publishing
subsequent investigations. for ways to help investigators deal Co., 1997), 9-10.
6
Don Rabon, Interviewing and Interroga-
A review of the consolidated with the difficulty of assimilating tion (Durham, North Carolina: Carolina
time line reflects a discrepancy be- vast amounts of information inher- Academic Press, 1992), 5.
tween the witness statements of ent in managing complicated cases. 7
“The Reid Technique of Interviewing and
Smith and Williams. Smith indi- Time line analysis can provide in- Interrogation,” John E. Reid and Associates,
Inc., Chicago, Illinois, 1998.
cates that she gave Jones a ride to vestigators with a method of 8
Michael R. Napier and Susan H. Adams,
the car dealership and met Williams quickly tracking and retrieving in- “Magic Words to Obtain Confessions,” FBI
on 2/19/99, wherein Williams indi- formation that they may have spent Law Enforcement Bulletin, October 1998,
cates that meeting occurred on 2/21/ many hours developing. 11-15.
9
Anthony J. Pinizzotto and George D.
99. A time line analysis can show Once investigators have con- Deshazor, “Interviewing Erratic Subjects,”
this discrepancy in a more obvious structed time lines and completed FBI Law Enforcement Bulletin, November
fashion. all of the supporting links to the 1997, 1-5.

August 2000 / 5
Perspective
Rethinking cases, no witnesses or evidence exists. Consequently,
these incidents have a low solvability factor.
Investigative Priorities In most departments, high-profile crimes garner
By Gary J. Glemboski high priority, not only because of the gravity of the
crime but also because of their high solvability. At the

A community beleaguered by crime faces a


host of related problems. Businesses will not
locate in or will move from crime-ridden cities, taking
same time, larcenies and other property crimes get
relegated to the bottom of the case pile. However, the
SPD assigns each case equal weight, an approach it
calls “reverse solvability.” It may take even more skill
jobs and employees with them. Tourists will vacation
to investigate crimes with traditionally low solvability
elsewhere. Perhaps most important, residents will
and bring them to a successful closure. However,
move to where they feel safe, and those who are left
doing so can significantly decrease the crime rate.
behind will live in fear.
Next, the department emphasizes thorough
While public officials may clamor for a reduction
investigation by responding patrol officers, who
in high-profile crimes to decrease the overall crime
attend 8 hours of in-service training to sharpen their
rate, minor crimes increase the overall crime rate
interviewing skills. They learn to ask pertinent,
because they account for such a large portion of total
probing questions and not just be report writers.
crime. Although violent crimes prove traumatic for
Officers must understand that they serve as the
the victims and their families, such crimes occur
preliminary investigators and strive to produce an
much less often than other crimes, such as larceny.1
all-inclusive report. A supplemental report, which
In short, larceny2 is a crime that hits close to home.
includes the patrol officer’s opinions regarding
Accordingly, the Savannah, Georgia, Police Depart-
suspects and other important information, goes to
ment (SPD) targeted larcenies to reduce their occur-
investigators for follow-up.
rence, decrease the crime rate, and to improve the
Above all, patrol officers must ensure the factual
quality of life for all of its residents.
accuracy of their reports. In some cases, investigation
Reduce Larcenies, Reduce Crime
Violent crimes are serious offenses that require
and deserve adequate attention and resources. Yet, Lieutenant Glemboski
both larcenies and murders have equal value when it commands a special
operations unit for the
comes to the crime rate because they each count as Savannah, Georgia,
one incident.3 Assigning high-profile, violent crime Police Department.
cases to the most skilled investigators while giving
larcenies to inexperienced investigators or not empha-
sizing the importance of solving them not only
adversely affects an agency’s ability to influence the
crime rate but also gives lesser priority to a crime
problem that affects a majority of citizens.
Targeting Larcenies:
The Reverse Solvability Factor
The SPD’s strategy to target larcenies represents a
multifaceted approach. First, the department gives
each crime equal weight. For such crimes as homi-
cides, witnesses, confessions, and other evidence can
help investigators quickly close the case, giving it a
high solvability factor. However, in many larceny

6 / FBI Law Enforcement Bulletin


may reveal that the incident could not have happened the court for larceny crimes would receive the maxi-
as claimed, and the property owner may be guilty of mum sentence. Such punishment sends a strong
filing a false report. Equally important, officers message to those contemplating crimes of this type.
should correctly classify each crime. If necessary, Finally, crime prevention officers in each precinct
reclassification must be done honestly, not merely in work with residents to help prevent crime.
an attempt to reduce a department’s crime numbers.
In the SPD, data entry personnel review all reports, Conclusion
and only the supervisor, a sergeant, can reclassify a Every day the news paints a gruesome crime
crime. The check-list style of form the department picture. Rape, murder, and other violent acts capture
uses for reporting crimes leaves the public’s attention. Yet, Ameri-
little room for error, so reclassifi- cans remain more likely to become
cation rarely occurs. victims of theft than homicide.4
Should patrol officers spend By assigning equal resources to
their valuable time taking theft
reports? After all, many property
owners only report thefts to the
police so they can file an insurance

...both larcenies and
murders have equal
value when it comes
property crimes, which affect the
crime rate just as much as other
crimes while affecting more of the
population,5 police departments
claim. Consequently, agencies may reduce crime rates while
often take these reports over the to the crime rate helping their residents feel safe.
telephone with little or no investi- because they each The Savannah Police Depart-
gation. Although this method saves count as one incident. ment has initiated such a strategy.
time and resources, it could lead to While still committed to reducing


fraudulent reporting. Moreover, violent crimes, the department also
when officers take reports in has begun to address the less
person, it can go a long way to serious, yet more prevalent occur-
improving community relations. Agencies need to rence, of larcenies. By attacking a problem that
decide for themselves if the benefits of sending a affects many of its citizens, the department has shown
patrol officer to investigate a property crime out- its concern not only for those few victims of violence
weigh the costs. No matter what method they use but for the welfare of the entire community.
to take reports, agencies should use computerized
records management systems to help link incidents Endnotes
and solve additional cases. 1
U.S. Department of Justice, Federal Bureau of Investigation, Uniform
Crime Reporting, Crime in the United States 1998 (Washington DC:
A Collaborative Approach 1998), 66-67.
The SPD realized that teamwork can mean the 2
Larceny-theft is the unlawful taking, carrying, leading, or riding
difference between success and failure for any away of property from the possession or constructive possession of
another. It includes crimes, such as shoplifting, pocket-picking, purse-
program. Accordingly, the department has assigned snatching, thefts from motor vehicles, thefts of motor vehicle parts and
property crimes investigators in two of the city’s four accessories, and bicycle thefts, in which no use of force, violence, or fraud
precincts. This arrangement brought investigators and occurs. U.S. Department of Justice, Federal Bureau of Investigation,
patrol officers closer together physically and, at the Uniform Crime Reporting, Crime in the United States 1998 (Washington,
DC: 1998), 43.
same time, improved communication between them. 3
Eight crimes comprise the FBI’s Uniform Crime Reporting
Working closely with patrol officers and precinct program’s Part I, or Index, Crimes. These crimes—murder and
commanders helps investigators tackle the city’s nonnegligent manslaughter, forcible rape, robbery, aggravated assault,
property crime problem. burglary, larceny-theft, motor vehicle theft, and arson—determine a
community’s crime rate.
In addition, SPD’s leaders met with prosecutors 4
Supra note 1.
and judges to ensure that individuals brought before 5
Supra note 1.

August 2000 / 7
Identity Theft
A Fast-growing Crime
By MATTHEW L. LEASE and TOD W. BURKE, Ph.D.

© Photodisc

C
riminals have evolved from business in order to obtain property and recognized the true victim—the
picking pockets to using or some lawful right.2 Identity theft person who had their identity sto-
more sophisticated meth- differs from other forms of less cal- len. This act enables law enforce-
ods of theft. Today, thieves can culated fraud. For example, a juve- ment agencies to investigate iden-
steal personal information and use nile using someone else’s driver’s tity theft crimes and the associated
another person’s identity to commit license to purchase alcohol does not fraud that often results.3 In 1997, the
numerous forms of fraud. Identity constitute identity theft. Although Financial Crimes Division of the
theft, the criminal act of assuming intentional deception exists, using U.S. Secret Service investigated
another person’s name, address, so- someone else’s license to make a 9,455 cases of identity theft with
cial security number, and date of purchase does not result in a loss to losses totaling $745 million.4 In the
birth in order to commit fraud, af- the victim company. past decade, the U.S. Secret Service
fects approximately 350,000 to The Identity Theft and As- has observed an increase in finan-
500,000 victims annually.1 Fraud is sumption Deterrence Act of 1998 cial institution, credit, and com-
intentionally deceiving a person or made identity theft a federal crime puter fraud facilitated by identity

8 / FBI Law Enforcement Bulletin


theft.5 One of the three major credit garbage collection day.7 He picked old receipts and financial records
bureaus reported 522,922 consumer up garbage bags left on the curb, carelessly. Through town hall meet-
inquiries in 1997, with two-thirds of took them home, and rummaged ings, local newsletters, or commu-
this amount related to identity theft, through them. The social security nity bulletins, law enforcement
up from 35,000 in 1992. 6 The numbers and preapproved credit departments can disseminate pre-
amount of identifying information cards he obtained from the garbage, vention information on identity
available over the Internet and from along with using rented mailboxes, theft. By encouraging people to
an individual’s trash and mail as cloaked him from his crimes.8 Busi- shred documents and by enforcing
well as the increasingly sophisti- nesses that rent mailboxes for short local trespass ordinances with re-
cated tactics used by criminals has periods of time make tracing a gard to residential and industrial
facilitated the increase in identity dumpster diver difficult. These dump sites, law enforcement agen-
theft. By examining how identity companies do not require a lot of cies can prevent thousands of iden-
theft occurs and the steps to resolve information about the renter, which tity theft cases.
it, preventive measures can curb aids the individual in remaining
this fast-growing crime. mobile and isolated from the crime. Mail Theft
Law enforcement agencies should Mail theft presents another way
HOW IDENTITY establish mutual agreements with criminals obtain personal identifi-
THEFT OCCURS these businesses to facilitate infor- cation information. Thieves check
Identity theft can occur in many mation gathering. Additionally, po- mailboxes looking for paid bills or
ways. Identity thieves scavenge lice may deter dumpster divers by credit card payments that people
through garbage, steal and redirect patrolling residential areas more ag- leave in their mailbox for the postal
mail, use internal access of data- gressively on garbage collection carrier to collect. Thieves use infor-
bases, and surf the Internet search- days and during the tax season, a mation from these items to obtain
ing for personal information. To prosperous time for dumpster credit or to purchase products and
combat the growing number of divers. Many taxpayers dispose of services in the victim’s name.
identity theft cases, law enforce-
ment officials should know how
thieves gather another person’s
identifying information.

Dumpster Diving
An individual or business that
fails to dispose properly of personal
identification information, by
shredding or mutilating, could find
themselves susceptible to a
“dumpster diver”—an individual
who retrieves discarded material
looking for anything of value.
Dumpster divers obtain account
numbers, addresses, and dates of
birth from financial, medical, and Mr. Lease served as a military Mr. Burke, a former police
personal records—all of which they police officer and is currently a officer, is an associate
can use to assume an identity. graduate student-researcher at professor with the department
One dumpster diver drove Radford University in Radford, of criminal justice at Radford
Virginia. University in Radford, Virginia.
around affluent neighborhoods on

August 2000 / 9
Further, mail theft can occur from may attempt to sell the personal Computerized Information
mail processing areas by postal information to another thief. This and the Internet
employees. happened in Fayetteville, Califor- Today’s information age
Additionally, criminals might nia, when a consumer learned that changes the way thieves commit
attempt to complete a change of ad- her credit report revealed five new crimes. With so much personal in-
dress card in order to divert the accounts issued in her name. An formation obtainable in the net-
victim’s mail to a rented mailbox. identity thief had charged over worked world, thieves can access
Police agencies should instruct vic- $65,000 of unsecured debt using her information easily. They find per-
tims to notify their postal inspector identity.10 sonal identifying information
immediately if they suspect that The negligence of a company through computerized information
someone has forwarded their mail that permits such access in an services, also known as information
to another location. Law enforce- unmonitored environment contrib- brokers. These services collect,
ment departments should urge utes to this type of identity theft. sort, package, and sell personal in-
people not to leave their paid bills in One medical office employee ille- formation in electronic form to
the mailbox for the carrier to collect gally obtained a patient’s name and other businesses and individuals.
and recommend that residents drop social security number, established Computerized information services
their paid bills and account pay- a credit line, rented an apartment, may not safeguard the personal in-
ments at the post office or in a and earned income in the patient’s formation adequately nor screen
locked mailbox. name.11 purchasers of computerized infor-
The Citrus Heights Police De- mation appropriately, creating the
partment in Sacramento, California, opportunity for an identity thief to


conducted community meetings, commit fraud. Private companies
which revealed that mail and iden- and individuals in some states can
tity theft had become significant ...state legislatures purchase driver’s license informa-
problems for citizens.9 By contact- tion and photos, traditionally re-
ing mail couriers or the local postal have begun stricted to law enforcement authori-
inspector, officers can determine if adopting statutes ties. South Carolina and Florida
mail theft presents a problem in that make stealing officials sold millions of digital
their jurisdiction. Cooperation be- a person’s identity photos of driver’s licenses to pri-
tween law enforcement and postal a crime.... vate companies, which raised seri-
officials will make mail theft more ous questions about personal pri-


difficult. vacy. Who has access to the
information? How will individuals
Internal Access and companies safeguard the data?
Internal access refers to an indi- To reduce the misuse of per- After a surge of citizen complaints
vidual obtaining personal informa- sonal information, police depart- and questions, state officials in
tion illegally from a computer con- ments with financial or crime pre- Florida and South Carolina halted
nected to a credit reporting bureau vention units should conduct 1- or the sale of digital photographs.12
or to an employee accessing a 2-day workshops with businesses According to one organization,
company’s database that contains that have the threat of internal ac- the Internet also provides opportu-
personal identification information. cess fraud. Law enforcement repre- nities for identity theft.13 Compro-
Such an insider will look for names sentatives should work with busi- mised public and private networks
similar to their own, or for someone ness security managers to suggest endure millions of dollars in losses,
with good credit, intending to as- possible restrictions and procedures annually.14 In the case of one com-
sume their identity and commit to limit access to personal identifi- pany, a security breach allowed
credit fraud. Also, the employee cation information. anyone to view thousands of private

10 / FBI Law Enforcement Bulletin


Recommendations and Strategies for Preventing Identity Theft
• Patrol residential areas on trash collection • Disseminate information to the public on
days and during the tax season. how to mitigate and prevent computer,
• Enforce trespass laws with regard to credit, and cellular telephone fraud.
residential and industrial dump sites. • Suggest restrictions to businesses to reduce
• Advise citizens to shred documents internal access fraud.
and drop off mail in a locked mailbox. • Educate officers about the various methods
• Remind people to be cautious using used to commit identity theft and the
automated teller machines. resulting types of fraud.

customer information files that to mitigate and resolve the damage provide a contact number to verify
revealed names, addresses, and caused by identity theft. Depart- credit applications, as well. Victims
other personal information, without ments can provide these steps should request the credit bureaus to
restriction. 15 Company officials through a booklet or private consul- provide free monthly credit reports
corrected the problem quickly, but tation with an investigator, using to monitor for evidence of new
many consumers began to question separate procedures for different fraudulent activity. Departments
the guarantees of information confi- types of identity theft. Although should recommend that victims
dentiality and realized the vulner- other forms of identity theft exist keep a log of all conversations with
ability of information on the (e.g., theft of cellular phones, police officers and financial institu-
Internet. driver’s licenses, passports, and tion officials. Agencies should ad-
checks), credit theft remains the vise victims that no one can remove
HOW TO RESOLVE most common. information from their credit report
IDENTITY THEFT Law enforcement agencies and warn them about credit repair
Victims may need months or should instruct victims to contact scams that promise to restore tar-
years to restore their credit and their current credit card and loan nished credit reports. Officers may
reputation. Law enforcement agen- companies about the theft. Victims need to refer traumatized victims of
cies should advise citizens to should cancel old cards and order identity theft to support groups,
report identity theft immediately. new cards with different account which can assist and support iden-
Departments should gather as numbers. The victim should inform tity theft victims as well as help in
much documented evidence from all check-monitoring agencies of the recovery process.16
the victim as possible. After com- the theft and alert the fraud depart-
pleting the initial report, agencies ments of the three major credit bu- HOW TO PREVENT
should provide a copy to the victim, reaus in order to place a hold on IDENTITY THEFT
along with the phone number of the accounts. Law enforcement agencies, as
fraud investigator assigned to the Additionally, victims should well as businesses and consumers,
case. Credit card companies, banks, complete and submit a credit fraud have an equal obligation to fulfill
and insurance companies often re- report with a victim statement to the when preventing identity theft.
quire the police report to verify credit bureaus. The victim state- Agencies can disseminate informa-
the crime. ment should explain briefly that an tion to minimize the risk of identity
After notifying the police, vic- individual has used their identity theft through their Internet sites,
tims should take the necessary steps fraudulently to apply for credit and local media, or community policing

August 2000 / 11
initiatives, such as Neighborhood when necessary. Other tips include thousands of identity theft cases.
Watch meetings and community shredding financial documents and Recognizing this increase, state leg-
liaisons. Departments should rec- preapproved credit card applica- islatures have begun adopting stat-
ommend that individuals check tions, which minimizes the threat utes that make stealing a person’s
their credit report annually to en- of dumpster divers obtaining valu- identity a crime, giving law en-
sure accuracy and report any dis- able personal information. Law forcement the necessary tools to
crepancies to credit bureaus for cor- enforcement officers should advise battle this fast-growing offense.
rective action. consumers who purchase products Some consumer advocates have
Additionally, agencies should over the Internet to use a secure estimated that identity thieves vic-
advise individuals to reduce the site, which encrypts their personal timize as many as 1,000 people per
amount of personal information that information, to place their order. day.17 Some criminals use conven-
exists in the public domain and en- tional methods, such as dumpster
courage people to remove their CONCLUSION diving and mail theft, while others
names and addresses from Identity theft has escalated use newer technology, such as in-
telemarketing lists. They should dramatically. Local and state sider computer access and the
disclose personal information only law enforcement agencies handle Internet, to obtain a fraudulent iden-
tity. The various ways that crimi-
nals use personal information will
change as technological develop-
ments continue. Police can assist in
Identity Theft Resources the recovery and prevention of
identity theft by providing correc-
Social Security Administration tive steps and helpful tips that allow
Fraud report 800-269-0271 citizens to avoid the traumatic con-
sequences that result.
The three major credit bureaus:
TransUnion Endnotes
Fraud report 800-680-7289 1
L. Wolf, “Theft of Identity, Credit Abuses
Credit report 800-888-4213 Stir Anguish,” The San Diego Union Tribune,
February 10, 1999, B1.
Cancel preapproved credit card offers 888-567-8688 2
M. Pena, Practical Criminal Investigation,
3d Ed. (Placerville, California: Copperhouse
Equifax Publishing Company, 1993).
3
Fraud report 800-525-6285 18 U.S.C. §1028.
4
T. Lowry, “Information Brokers Put on
Credit report 800-685-1111 or 800-997-2493 Brakes, New Limits to Cut Identity Theft,” USA
Today, January 18, 1999, 3B.
Experian 5
Ibid.
6
Fraud report 800-301-7195 Ibid.
7
J. Hoffman, The Art and Science of
Credit report 800-682-7654 Dumpster Diving, (Port Townsend, Washington:
Cancel preapproved credit card offers 800-353-0809 Loompanics Unlimited, 1993).
8
T. Dacolias, “Identity Theft,” available
from http://www.congames.com/identity.html,
For more details on identity theft, visit these Web sites: accessed on March 5, 1999. This site is no
www.identitytheft.org longer accessible.
www.privacyrights.org 9
D. Richie, “Police Eye Residents
Concerns, Drug Dealing Seen As City’s Top
www.futurecrime.com
Trouble,” The Sacramento Bee, January 31,
1999, N1.

12 / FBI Law Enforcement Bulletin


10
B. Horne, “Identity Theft Disrupts established in 1974, is an organization of The Globe and Mail, March 4, 1999, T1.
16
Fayetteville Woman’s Life,” Fayetteville computer security professionals dedicated to California Public Interest Research Group,
Observer-Times, September 21, 1998. serving and training information, computer, and “Victims of Identity Theft Action and
11
State of California, Department of network professionals. It offers classes in Support Group,” available from http://
Consumer Affairs, “Credit Identity Theft: Tips encryption and intrusion management. www.igc.apc.org/pirg/calpirg/consumer/
14
to Avoid and Resolve Problems,” Legal Guide Newswire, “eBay Selects Equifax Secure privacy/toi/voit.htm; accessed on Janu-
P-3, January, 1998, 1. to Verify Identity of Buyers, Sellers Over the ary 5, 2000.
12 17
R. O’Harrow and L. Leyden, “Firm Internet,” January 15, 1999. Supra note 4.
15
Got Almost $1.5 Million in Federal Aid to Build T. Hamilton, “Privacy Czar Raps Absence
Driver’s License Database,” The Dallas of Online Protection, Commissioner Says
Morning News, February 18, 1999, 6A. Electronic Commerce Will Stagnate until
13
The Computer Security Institute, Regulations Establish Trust on the Internet,”

Crime Data

Lowest Number of U.S. Police Deaths in 35 Years


Preliminary statistics released by the FBI Twelve officers lost their lives during arrest
indicate that 42 law enforcement officers lost situations: 6 serving arrest warrants; 3 attempting
their lives due to criminal action in 1999, the to prevent robberies or apprehend robbery sus-
lowest recorded figure in more than 35 years. pects; 2 investigating drug-related situations; and 1
The total shows a decrease of 19 officer deaths attempting to apprehend a burglary suspect. Eight
compared with the 1998 annual count of 61 and officers were killed enforcing traffic laws, 7
29 fewer deaths than occurred in 1997. Thirty- investigating suspicious persons or circum-
nine separate incidents account for the 42 stances, 7 answering disturbance calls, 6 encoun-
officer deaths in 1999. Law enforcement agen- tering ambush situations, and 2 handling prisoners.
cies have cleared 38 of these incidents by The FBI also released preliminary statistics
arrest or exception means; 2 suspects remain at on the number of officers accidentally killed in the
large. performance of their duties. In 1999, 63 officers
Firearms continue as the weapon most fre- lost their lives in accidents. This total represents
quently used to kill officers. Suspects employed a decrease of 18 compared with the 81 accidental
handguns in 25 slayings, rifles in 11, and deaths that occurred in 1998.
shotguns in 5. The remaining officer was killed For the complete preliminary annual Law
with a vehicle. At the time of their deaths, 27 Enforcement Officers Killed and Assaulted press
officers were wearing body armor. Five of the release, access the FBI’s Internet site at http://
42 officers were killed with their own weapons. www.fbi.gov.

August 2000 / 13
Book Review

Community Education and Crime Pre- Within its fifteen chapters, Part II ranges from
vention: Confronting Foreground and Back- “What is Community Education?” to “Leader-
ground Causes of Criminal Behavior by ship for Community Education.” The book
Carolyn Siemens Ward, published by Bergin & includes theories by the authorities and the
Garvey, Westport, CT, 1998 practical wisdom of the neighborhood citizenry.
Community Education and Crime Preven- For example, one expert believes that “citizens
tion gives both specific insight into how the tended to drastically misperceive the power
Hyde Park community of St. Louis, Missouri, arrangement in their communities, seeing more
manages criminal behavior as well as providing competition than actually existed.” A local
general information on crime prevention that resident commented on the power structure by
any community can use. Community policing, stating, “I look at it as pluralistic” and “we have
a popular topic in law enforcement circles, a lot of different agencies that do a lot of differ-
receives attention throughout the United States ent things.”
in print, at lectures and conferences, and through The crux of the book lies with bringing
course work. It encompasses community educa- citizens out of their individual circles and
tion, citizen involvement, and crime prevention. encouraging participation in every facet of the
The author, a community education professor community’s makeup. A basic step to accom-
and member of the National Community Edu- plishing such a task involves using neighbor-
cation Association, discusses all of these topics hood schools as community centers to fulfill
in Community Education and Crime Prevention. multiple purposes. Neighborhoods should
The author begins by using a quote from conduct community events and meetings in
Alexis de Toqueville: “Each person, withdrawn neighborhood schools and keep the schools’
into himself, behaves as though he is a stranger doors open after school hours, allowing children
to the destiny of all the others. As for his trans- a safe location to meet and play with friends.
actions with his fellow citizens, he may mix Parents should volunteer in their children’s
among them, but he sees them not; he touches schools and understand how they can make
them, but does not feel them; he exists only in positive changes. Additionally, neighborhoods
himself and for himself alone. There no longer should recruit or become aware of the existing
remains a sense of society.” To the contrary, the service or social organizations whose outreach
author presents research clearly indicating that involves all aspects of family and community
law enforcement agencies must become in- assistance. After instituting these services,
volved with citizens and create strategic and families should spread the word about such
long-term plans to manage the increase in opportunities and available assistance. All of
criminal behavior. these suggestions combine to form a final
Community Education and Crime Preven- product. A strong, interwoven system of services
tion is divided into two parts. Part I addresses and neighbors may effectively reduce crime in
foreground causes (opportunity) of criminal communities. Educating neighborhood residents
behavior and consists of five chapters that leads to their empowerment.
include “A Theory of Crime Causation” and Reviewed by
“Hyde Park Crime: Prevention Efforts and Their Djana E. Trofimoff
Effects.” Part II confronts background causes Operations Analyst
(social malaise and demographics) and offers Planning and Research Unit
instruction on a community education approach. Kansas City, Missouri, Police Department

14 / FBI Law Enforcement Bulletin


© George Godoy

Color of Law Investigations


By JOHN R. SCHAFER

T he vast majority of police


officers perform their diffi-
cult jobs in a professional
manner. However, exceptions do
Even those officers cleared
of wrongdoing often do not
understand the color of law investi-
gative protocol and feel unjustly
BACKGROUND
In 1957, President Eisenhower
mandated that DOJ prosecute civil
rights violations, to include police
occur. In one instance, an on-duty targeted by the U.S. Department of misconduct, thus, allowing uniform
sheriff’s deputy approached a ver- Justice (DOJ) or the FBI, which application of civil rights law across
bally abusive drug addict strapped have jurisdiction in these matters.1 the nation.2 Approximately 74 per-
to a gurney in an emergency room, In order to better comprehend color cent of all civil rights investigations
drew his pistol, placed the barrel of of law investigations, officers reported each year allege police
the weapon into the addict’s mouth, should understand the role of the misconduct.3 Because state and fed-
and threatened to pull the trigger if FBI and DOJ in color of law investi- eral authority for civil rights inves-
he did not stop shouting. Police mis- gations, the legal guidelines for po- tigations comes from different
conduct also encompasses less ob- lice misconduct, and the investiga- statutes, double jeopardy usually
vious wrongdoing, such as striking tive protocol in these cases. More does not apply. In fact, dual pros-
suspects more than necessary or important, officers can take steps to ecution may occur because separate
threatening to harm them if they do prevent unnecessary color of law sovereigns (i.e., federal and state)
not cooperate. investigations. may prosecute individuals. One

August 2000 / 15
well-known example of dual pros- COLOR OF LAW STATUTES guards, private citizens, judges, de-
ecution occurred when a Los Ange- The term color of law derives fense attorneys, and prosecutors
les County Superior Court jury ac- from the federal statute, Title 18, who willfully participate with fed-
quitted the four police officers who U.S. Code, Section 242, titled eral, state, or local law enforcement
beat Rodney King. After reviewing “Deprivation of Rights Under Color officials in the commission of color
the jury’s verdict, DOJ elected to of Law,” which primarily governs of law violations fall within the pur-
charge the officers in federal court police misconduct investigations. view of the federal statutes.
with color of law violations. This statute makes it a crime for any Punishment for color of law
Approximately 30 attorneys person acting under the color of law violations varies depending on the
from the DOJ Civil Rights Division to willfully deprive any individual gravity of the offense. Penalties for
and 190 FBI special agents in 56 residing in the United States those minor infractions range from proba-
field offices investigate and pros- rights protected by the Constitution tion to 1-year imprisonment, a fine,
ecute civil rights matters.4 The most and U.S. laws. Other related federal or both.6 Under aggravated circum-
common types of police miscon- statutes include Title 18, U.S. Code, stances, offenders risk the maxi-
duct include excessive force, sexual Section 241, “Conspiracy Against mum sentence of imprisonment up
assault, intentional false arrest, fal- Rights”; Title 18, U.S. Code, Sec- to 10 years, a fine, or both. If loss of
sifying evidence, extortion, and tion 1512, “Obstruction of Justice”; life occurs as a result of intentional
other related offenses. Of the nearly and Title 18, U.S. Code, Section police misconduct, the officer could
10,000 color of law complaints re- 1001, “False Statements.” Federal face the death penalty.7
ceived each year, DOJ prosecutes statutes generally restrict color of INVESTIGATIVE PROTOCOL
only about 30 police officers.5 The law investigations to official ac-
remaining cases either lack pros- tions taken by police officers, fed- Color of law investigations
ecutive merit or do not require for- eral agents, sheriff’s deputies, cor- comprise two categories—criminal
mal judicial proceedings to resolve. rectional officers, and other public wrongdoing and pattern-and-prac-
Additionally, these figures do not safety officials. However, off-duty tice misconduct. Criminal wrong-
include police misconduct com- officers who assert their official sta- doing focuses on individual mis-
plaints adjudicated at the state or tus also may face prosecution. In conduct, while pattern-and-practice
local level. rare cases, the actions of security misconduct leads to civil proceed-
ings and examines systemic mis-
conduct in law enforcement agen-
cies. Police officers wontedly using
traffic stops as a tool of intimidation
to discourage minorities from enter-

“ Two types of color


of law investigations
exist: a preliminary
ing town illustrates pattern-and-
practice misconduct. To sustain this
type of misconduct, the actions of
officers in a department must prove
pervasive. The Special Litigation
investigation and a Section of DOJ’s Civil Rights Divi-
substantial case sion investigates most pattern-and-
investigation. practice violations.
Criminal matters require proof
beyond a reasonable doubt; how-

Special Agent Schafer serves in the Lancaster Resident


Agency of the FBI’s Los Angeles, California, Field Office.
” ever, civil proceedings need only
establish the preponderance of the
evidence—a lower standard of

16 / FBI Law Enforcement Bulletin


proof.8 Punishment for criminal the complainant, the subject or sub- response nor the vagueness of the
wrongdoing is imprisonment, a jects of the investigation, and a notification letters indicates any
fine, or both. In civil proceedings, a supervising official at the employ- level of guilt on the part of the offic-
judge orders the police department ing law enforcement agency. After ers involved. Regardless of the
to correct any deficiencies in their completing these steps, the FBI for- outcome of the federal investiga-
administrative, training, or policy wards the report to DOJ for review. tion, the employing agency still
procedures. The FBI mandates that its maintains the prerogative to disci-
DOJ or the FBI can initiate a agents complete preliminary color pline violators of administrative
color of law investigation based on of law investigations within 21 days policies.
credible media reports or a com- of receipt of the complaint; how-
plaint from any person who does ever, a DOJ decision may take Substantial Case Investigation
not have a history of providing false months to finish because of the If the facts cited in the prelimi-
information. Any valid complaint large number of reports submitted nary report warrant additional in-
triggers a color of law investigation; each year. This delay often leaves a vestigation, DOJ initiates a substan-
however, the extent of the investi- police officer frustrated while tial case. The investigative steps
gation depends on the specific facts awaiting the outcome of the DOJ beyond the preliminary investiga-
of the complaint. Two types of review. The DOJ notification letter tion include interviewing medical
color of law investigations exist: a personnel and physicians, if appro-
preliminary investigation and a sub- priate; reviewing police logs and in-


stantial case investigation. ternal affairs reports; interviewing
the subject or subjects of the inves-
Preliminary Investigation tigation; photographing and dia-
The preliminary investigation ...officers can take gramming the crime scene; and se-
gleans sufficient information for steps to prevent curing all relevant evidence and
DOJ attorneys to evaluate the inci- unnecessary witness testimony. When the facts
dent with the least amount of dis- of the substantial case indicate that
ruption to the police officer’s daily
color of law
the subjects may have violated the
routine. The investigative steps in investigations. civil rights of the victims, a federal
the preliminary investigation in- grand jury convenes to formally in-


clude identifying and interviewing vestigate the incident.
the victims; identifying and inter-
viewing witnesses; conducting The Grand Jury Process
criminal checks for both subjects also discourages some officers be- A federal grand jury consists of
and complainants; photographing cause it states only that the facts of between 18 and 24 citizens, who
the injuries, if appropriate; and ob- the case do not support federal pros- have the power to subpoena wit-
taining police reports and medical ecution. Due to the large volume of nesses and examine all relevant evi-
records or a coroner’s report in the complaints, DOJ does not tailor the dence. The grand jury inquiry estab-
event of a death. Additionally, the notification letters to each specific lishes victim and witness
FBI notifies in writing the officer’s complaint. The generic wording in credibility, provides the subject an
employing agency of the ongoing these letters may not specifically opportunity to testify, and deter-
color of law preliminary investiga- exonerate the officer, leaving the mines probable cause. When the in-
tion. Also, the preliminary report officer and the officer’s employer to quiry concludes, the grand jury
incorporates a list of individuals wonder if the report lacked suffi- hands down a true bill or a no bill.
that DOJ will notify at the conclu- cient evidence to support a prosecu- A true bill, also referred to as an
sion of the investigation. This list tion or if the officer acted properly. indictment, means the grand jury
contains the name and address of Neither the length of the DOJ determined that probable cause

August 2000 / 17
FBI Civil Rights Subprograms*

FBI Civil Rights Subprograms **Percent of FBI


Priority Investigations

Racial or Religious Discrimination—


Violence/No Violence
Includes investigations of:
• Violence and hate crimes by individuals or members
of racist groups
1 • Damage/destruction of religious property 25
• Discrimination in occupation, purchase, sale, rental or
financing of housing on the basis of race, color, religion,
sex, handicap, familial status, or national origin.
• Voting rights violations
• Criminal interference with the Civil Rights Act of 1964

Color of Law—Force/Misconduct
Includes investigations of:
2 • Physical abuse 72
• The infliction of summary punishment
• The deprivation of rights through fabrication of evidence

Involuntary Servitude/Slavery
3 • Investigations involve migrant farm workers or
0.2
immigrants who are forced to work against their will.

Violence Against Reproductive Health Clinics


4 • Bars conduct, including violence, that would obstruct 2.5
access to reproductive health facilities or cause damage
or destruction to these properties.

Note: Percentages may not equal 100 due to rounding.


*Obtained from “FBI Headquarters Civil Rights Program New Agent Training Handbook,” (U.S. Department of
Justice, Federal Bureau of Investigation), 5.
**Percentages reflect civil rights investigations conducted in fiscal year 1997.

18 / FBI Law Enforcement Bulletin


exists to believe that a crime oc- batons, pepper spray, guns, and struck an aggressive inmate several
curred and that the subject of the other tools to protect their lives and times in the head with a baton, caus-
inquiry committed the crime. After the lives of others. Officers should ing severe injuries. The officer who
the grand jury indicts a subject, a use these tools within the param- struck the inmate, along with
trial in federal court follows. A no eters of state and federal laws and several other officers present during
bill means the grand jurors found their agency’s policies. the attack, failed to accurately
insufficient evidence to sustain a Most officers exercise good record the sequence of events. Ad-
federal prosecution. judgment in crisis situations, but ditional investigation determined
they often do not adequately record that some officers enhanced their
PRACTICAL APPLICATION their actions. In the event of a mis- reports, without the subject
The public, activist groups, and conduct complaint, the reviewing officer’s knowledge, attempting to
internal affairs units routinely scru- officials rely almost exclusively on help him explain his actions. To
tinize the conduct of law enforce- reports to make an initial judgment compound matters, this prison’s
ment officers. However, this scru- regarding justification for the use of policy required that officers com-
tiny should not prevent police force. In many cases, the lack of plete all reports before going home.
officers from effectively doing their information in reports triggers sub- Because this incident occurred at
jobs. Neither the subjects of a color stantial case investigations when, in the end of the shift, the officers
of law preliminary investigation nor fact, the officers did not violate any wrote incomplete and inaccurate re-
their employers should assume any laws. ports in a rush to go home. The
wrongdoing on the part of the offic- Complete and accurate reports conflicting reports provided the im-
ers. A preliminary investigation reflect officers’ actions regardless petus for a substantial case investi-
simply means that a citizen filed a of how officers or their colleagues gation, which, in the end, exoner-
complaint; the investigation that judged those actions. Good inten- ated the officers. Nevertheless, the
follows determines the veracity of tions do not always yield good re- intense inquiry significantly dis-
the allegation. sults. For example, a California rupted the officers’ professional
In many instances, offenders, state prison correctional officer and personal lives.
upon arrest, allege police miscon-
duct to divert attention from their
© Mark C. Ide
own misdeeds. Typically, DOJ does
not open an investigation but,
rather, allows the local judicial sys-
tem to examine the alleged miscon-
duct in conjunction with the
complainant’s pending charges. In
the event the allegations are sub-
stantiated, DOJ will initiate a
preliminary investigation.
PREVENTING COLOR OF
LAW INVESTIGATIONS
Although police officers cannot
prevent color of law complaints,
they can take steps to ensure that
their actions do not place them
in jeopardy. Police officers carry

August 2000 / 19
In another example, three offi- the use of force. Including these is- simple as periodically reminding
cers shot and killed a transient. A sues in the report helps the review- officers at role call to be mindful of
review of the incident reports could ing official determine whether the color of law investigations.
not determine if the officers’ ac- use of force was justified. Officers
CONCLUSION
tions were justified because two of must know when to use force, how
the officers’ reports contained no much force to use, and, most impor- Even police officers who con-
more that 500 words, and one of- tant, how to accurately record their scientiously perform their duties
ficer described the shooting in just actions in a report. Written reports should expect allegations of police
98 words. After a long and exhaus- often provide officers with the only misconduct at some point in their
tive grand jury investigation, the opportunity to explain their actions careers. However, officers can pre-
grand jurors found insufficient evi- outside the courtroom setting. A vent most misconduct complaints if
dence for indictments. Again, in- well-written report can prevent an they conduct themselves in a pro-
complete report writing caused un- otherwise-long-and-stressful color fessional manner and write detailed,
necessary stress in the officers’ of law investigation. accurate reports. A report not only
lives. records facts but also reflects the
Many officers write such words writer’s integrity.


or phrases in reports as “lunged,” Police oversight and color of
“menacing,” or “furtive move to the law investigations constitute a part
waistband.” Instead of using the of today’s policing environment.
...incomplete report Understanding the purpose and the
word “lunged,” the officer should writing caused
describe the actions of the offender. mechanics of color of law investi-
For example, “the offender, holding unnecessary stress gations not only reassures police of-
a 9-inch butcher knife in his out- in the officers’ lives. ficers but also ensures that the pub-
stretched right hand, took three lic receives professional police
services.


rapid steps toward me.” Instead of
using the word “menacing,” the of- Endnotes
ficer should write, for example, “the 1
For a complete definition of color of law,
offender squinted her eyes, Empirical evidence suggests see, 18 U.S.C. § 242.
2
clenched her teeth, and made deep that a high number of color of law Alexis Agathocleous and Heather Ward,
Prosecuting Police Misconduct (New␣ York:
growling sounds.” When officers investigations stem from pursuits. Vera Institute of Justice, 1998), 1-2.
fear for their lives, or the lives of When pursuits terminate, police of- 3
Egon Dezihan, et al., “Color of Law
others, they should narrate what ficers sometimes vent their excess Matters,” (Washington, DC: U.S. Department
specific actions led them to this energy on suspects. Devising tech- of Justice, Federal Bureau of Investigation,
unpublished).
state of mind. In addition to a niques to dissipate excess energy in 4
Louis J. Freeh, “Ensuring Public Safety
description of the offenders’ ac- an appropriate manner often pre- and National Security Under the Rule of Law –
tions, a notation of the officer’s vents the spontaneous use of exces- Report to the American People on the Work of
state of mind provides a more com- sive force. With one technique, the FBI 1993 – 1998, (Washington, DC, 1999),
2; Egon Dezihan, et al., “Civil Rights Program,
plete picture as to why the officer partners agree to monitor each National Academy Manual,” (Quantico, VA:
responded with a measure of force. other’s behavior at the end of a pur- U.S. Department of Justice, Federal Bureau of
Such phrases as “furtive move to suit, to include restraint, if neces- Investigation) 2.
5
the waist band” or “shiny metal ob- sary. Police administrators can de- Supra note 2.
6
18 U.S.C. § 242.
ject” often lack credibility because vise other simple, yet effective, 7
Ibid.
of their overuse and, often, misuse. techniques to reduce the possibility 8
“Addressing Police Misconduct - Laws
A good report also addresses of officer misconduct and subse- Enforced by the United States Department of
the legal elements as well as spe- quent color of law investigations. Justice, Civil Rights Division,” (Washington,
DC), 3.
cific agency policies that authorize This could include something as

20 / FBI Law Enforcement Bulletin


Technology Update

Law Enforcement Online (LEO) Promotes Information Sharing


Every day across the country, law enforce- country or with numerous special interest groups.
ment, criminal justice, and public safety profes- The LEO system allows users to pose questions,
sionals are “signing on” to Law Enforcement gather feedback, do research, and access profes-
Online (LEO), a secure Intranet communication sional expertise.
system built and maintained by the FBI, to share Moreover, LEO Special Interest Groups
sensitive information. They rely on LEO as their (LEOSIGs) serve to connect users with common
primary tool to communicate or obtain mission interests or goals. Over 50 LEOSIGs have sites
critical information, to provide or participate in on the LEO system, including the International
online educational programs, and to participate Association of Auto Theft Investigators, Criminal
in professional special Intelligence Information
interest or topically Sharing Group, National
focused dialog. Drug Intelligence Center,
Keys to LEO’s rapid National Center for the
growth include its easy Analysis of Violent Crime,
use, free services, and National Center for
access availability at any Missing and Exploited
time and any place. On a Children, FBI Bomb Data
daily basis, the system’s Center, Asset Forfeiture
23,000 users take advan- Program, National Infra-
tage of LEO’s various structure Protection
Web sites and electronic Center, and National
links, as well as its e-mail Cybercrime Training
and distance learning Partnership. Group mem-
capabilities, to stay bers can interact online to
abreast of relevant law share information in their
enforcement issues; to respective areas. LEO also
establish or maintain can connect its users to
contact with peers, colleagues, or experts in relevant Internet sites and, therefore, can put them
various fields; or to receive training on a wide in touch with agencies, such as the International
range of topics. Association of Chiefs of Police, Drug Enforce-
Communication links to other agencies or ment Administration, International Association
organizations is particularly valuable to LEO of Undercover Officers, and others.
users. In the market for new patrol vehicles or LEO access is free to qualified law enforce-
body armor? Planning to integrate your agency’s ment, criminal justice, or public safety profes-
records system? Have an unsolved crime or sionals. To learn more about the LEO system,
unique modus operandi? Always wanted to learn or to request an application, contact the LEO
more about terrorism? The LEO system can put Program Office at 202-324-8833, or via e-mail
you in touch with other professionals across the at feedback@leo.gov.

August 2000 / 21
Getting Along with
Citizen Oversight
By PETER FINN
© DigitalVision

T wo Rochester, New York,


police officers arrested two
young males allegedly for
dealing drugs. One youth’s mother
owner reported that the officers had
remained polite and professional
during the encounter and that the
woman’s son had pushed the officer
police in the United States. In light
of this expansion, police adminis-
trators and citizen oversight mem-
bers must consider how they
claimed that the young men were into the store window. The review can work together with a minimum
innocently walking along the street board discovered the truth, exoner- of conflict and a maximum of
when the officers approached them. ated the officers, and calmed the collaboration.2
She further alleged that one officer community members.1
grabbed her son and threw him While this example illustrates OVERSIGHT MODELS
through a store window. Some com- how citizen oversight helped defuse Communities rarely create
munity members became enraged at a potentially volatile situation, the identical oversight systems. How-
what they perceived as police bru- relationship between law enforce- ever, most of these review pro-
tality. When the city’s citizen re- ment and citizen oversight often has cesses fall into four main types.
view board heard the case, how- proved strained, at best, or even 1) Citizens investigate allega-
ever, it learned that the two males adversarial, in some cases. How- tions of police misconduct and
had drugs in their possession at the ever, the 1990s showed a consider- recommend a finding to the
time of the arrest. Also, the store able increase in citizen oversight of head of the agency.

22 / FBI Law Enforcement Bulletin


2) Officers investigate allega- A member of the department helps POLICE CONCERNS
tions and develop findings. coordinate the review board’s ac- In many jurisdictions, law en-
Then, citizens review and tivities. By comparison, 13 citizen forcement agencies have fought the
recommend that the head of advisors, appointed by the city initiation of citizen oversight. After
the agency approve or reject council and neighborhood coali- communities have implemented
the findings. tions in Portland, Oregon, hear ap- such systems, agencies frequently
3) Complainants may appeal peals from citizens dissatisfied with have found them troublesome. Ba-
findings established by the police investigations of their com- sically, most agencies have opposed
agency to citizens who review plaints, review all closed cases in- citizen oversight because they feel
them and make recommenda- volving allegations of the use of ex- that oversight procedures represent
tions to the head of the cessive force, and conduct random outside interference, oversight staff
agency. audits of internal affairs investiga- lack experience with and under-
tions. The city council also meets as standing of police work, and over-
4) An auditor investigates the an audit committee to hear appeals sight processes are unfair.
process the agency uses to from citizens dissatisfied with the
accept and investigate com- department’s investigation of their Outside Interference
plaints and reports to the complaints. A professional exam- Most police administrators be-
agency and the community iner coordinates the work of the city lieve that their agencies should have
the thoroughness and fairness council committee and the citizen the final say in matters of discipline,
of the process. advisors and conducts many of the policies and procedures, and train-
While some oversight proce- audits. Although different in ing. Because police administrators
dures represent “pure” samples of structure and content, these three are in charge of their agencies,
these models, many exist as hy- oversight systems all function in they are held accountable for their
brids that merge features from two similar ways by providing policy officers’ behavior. Accordingly,
or more different varieties of citi- and training recommendations to without final say over matters that
zen review into their own unique their respective law enforcement directly affect their officers, admin-
systems. For example, the Minne- agencies. istrators feel that this accountability
apolis, Minnesota, civilian police
review operates in two stages.
First, paid, professional investiga-
tors and an executive director ex-


amine most citizen complaints to
determine whether there is prob- In many
able cause to believe that police jurisdictions,
misconduct occurred. Then, volun-
teer board members conduct law enforcement
closed-door hearings to decide agencies have
whether they should support the al- fought the
legations in probable cause cases. initiation of
However, in Orange County, citizen oversight.
Florida, nine volunteer citizen re-
view board members hold hear-
ings, open to the public and the
media, on all cases involving the
alleged use of excessive force and
abuse of power after the sheriff’s
department has investigated them.

Mr. Finn is a senior research associate for a private firm in
Cambridge, Massachusetts, and serves as a special officer
with the Belmont, Massachusetts, Police Department.

August 2000 / 23
becomes undermined. Therefore, Citizens generally are not familiar hours per evening for 2 weeks and 2
most jurisdictions have used a vari- with pertinent case law governing all-day Saturday sessions. The
ety of approaches in addressing officer behavior nor do they under- members use a shoot/don’t shoot
concerns about outside involve- stand the nature of police discre- simulator, practice handcuffing,
ment in police affairs. In many com- tion, the methods employed to train and learn about department policies
munities, local governments have officers, or the totality of the cir- and procedures, including the use-
established oversight bodies that cumstances of an incident that can of-force continuum. Other over-
solely advise; they can make only influence officer behavior. Officers sight systems require a department
nonbinding recommendations to frequently observe that state medi- supervisor to attend hearings or be
law enforcement agencies. Also, cal boards, composed only of physi- on call to answer questions about
some review bodies can appeal the cians, investigate doctors for mal- department policies and operations.
agency’s rejection of their recom- practice, and only attorneys Also, review systems that investi-
mendations to elected or appointed investigate lawyers for misconduct. gate citizen complaints often hire
officials who can require the depart- Similarly, some police argue that investigators with pertinent law en-
ment to act. However, because only law enforcement officers have forcement expertise. Finally, many
these officials have this authority the knowledge to investigate and agencies have found that outsiders
regardless of whether an oversight judge other sworn personnel. can sometimes do a more objective
body exists, the oversight procedure job than insiders in assessing the


itself does not further diminish the performance of members of their
authority of agency administrators. own profession. Juries illustrate a
Even when citizen oversight frequent use of representatives of
systems have some authority over ...the oversight many different professions and life
the police, they generally exercise it process can help experiences to resolve allegations
cautiously. For example, oversight of police misconduct, physician and
bodies in St. Paul, Minnesota, and
establish and maintain attorney malpractice, and other pro-
Flint, Michigan, have never used an agency’s reputation fession-specific cases in civil and
their subpoena power to compel of- for fairness and criminal trials.3
ficers to testify. Moreover, most firmness in addressing
oversight staff members agree that allegations of police Unfair Process
citizens should not have the power misconduct. While many law enforcement
to discipline officers. They realize administrators and officers feel that
that giving citizens that authority the oversight process is unfair be-


could violate state laws, city char- cause outside reviewers are unfa-
ters, or collective bargaining agree- miliar with police work, they have
ments with police unions. Also, However, many law enforce- other objections to citizen over-
such authority would detract from ment administrators have worked sight. For example, unjust criticism
holding the agency’s administrator with citizen review members to ad- and lengthy delays represent two
accountable for ensuring proper dress these concerns and find ways concerns that many officers have
standards of professional conduct. of improving their relationships. about the oversight process.
For example, some agencies train
Lack of Understanding oversight staff and volunteers. In Unjust Criticism
Because they lack experience Rochester, New York, candidates Many officers complain that
as law enforcement officers, over- for the review board attend a oversight staff members hold them
sight members may have difficulty condensed version of a police acad- accountable for minor infractions,
fairly determining whether officers emy run by the police department. such as placing the wrong offense
have engaged in misconduct. The 48-hour course involves 3 code on a citation or failing to

24 / FBI Law Enforcement Bulletin


© DigitalVision

record the end mileage on a vehicle


transport. Also, some administra-
tors feel that complainants take ad-
vantage of the complaint process to
benefit a planned or ongoing civil
suit against an officer or the com-
munity.
Through educating civilian re-
view members about police work
and informing officers of the ben-
efits that review members can pro-
vide, administrators can reduce
some of these concerns. In one case,
when a citizen, whose complaint a
review board did not sustain, filed a
civil suit, the city attorney had the
oversight investigator testify. This
investigator’s testimony helped
administrators have discovered that oversight system can cause the in-
have the suit dismissed.
they can take steps that may short- volved parties to have different ex-
Lengthy Delays circuit future tension and lead to a pectations for how the process
Delays harm the credibility of successful relationship with over- should operate and what it should
the oversight process and cause of- sight members. First, administra- accomplish. For example, specific
ficers considerable stress as they tors can initiate citizen oversight objectives could—
wait for their cases to be decided.4 systems. For example, the chief of
• reassure the public that the
To reduce these delays, agencies the St. Paul, Minnesota, Police De-
agency appropriately disci-
first should avoid contributing to partment decided to implement an
plines officers who engage
them by establishing their own time oversight system to gain citizens’
in misconduct;
lines for each stage of the review perspectives on the behavior of
process. Next, agencies should the department’s officers. The • provide the public with a
work with oversight bodies and lo- seven-member commission meets “window” on how the agency
cal government officials to estab- monthly to review cases investi- investigates allegations of
lish deadlines. For example, in gated and decided by the depart- officer misconduct;
Rochester, New York, the city ment. The members, including two • defuse hostility expressed by
council requires oversight members police officers, make their own residents or specific groups
to review cases within 2 weeks after findings and, in sustained cases, of citizens;
the police department has com- recommend discipline to the chief • reduce the number of police
pleted its investigation. To speed up who makes the final decision. shootings; and
the hearing process in Berkeley, In addition, when local officials
begin talking about setting up a citi- • establish mechanisms through
California, the review board de-
zen oversight system, administra- which citizens can make
cided to allow the director to recom-
tors can become involved in the recommendations for improv-
mend that the board summarily dis-
planning process. This allows ad- ing police policies, procedures,
miss cases without merit.
ministrators to try to ensure that the and training.
POLICE STRATEGIES oversight system has realistic and Finally, law enforcement
Faced with concerns about the precisely specified objectives. administrators should demon-
oversight process, law enforcement Without well-defined objectives, an strate their willingness to work

August 2000 / 25
cooperatively with oversight mem- Internal Investigations Policies and Procedures
bers. Police supervisors and over- Oversight systems can improve Many law enforcement admin-
sight staff should meet regularly to the quality of a department’s inter- istrators and oversight staff feel that
discuss any specific misconcep- nal investigations of alleged officer providing suggestions for agency
tions or conflicts and to share infor- misconduct.5 Some agencies report policy and procedure changes rep-
mation. For example, when the that officers perform more thorough resents the greatest benefit of over-
Tucson, Arizona, citizen oversight investigations of such cases be- sight systems. Policy recommenda-
board found some of the police cause they know that the oversight tions, including suggestions for
department’s statistics difficult to body—and, through it, the general training improvements, can influ-
understand, the chief and the public—will be examining how ac- ence entire departments not just in-
board’s chair met with the curate and unbiased their reports dividual officers’ behavior.
department’s statistical personnel, are. While some police administra-
who then developed a clearer pre- tors believe that outsiders do not
sentation method.


have the necessary understanding
of police practices to make useful
POLICE BENEFITS policy recommendations, others
Despite serious reservations ...law enforcement disagree. For example, some man-
about citizen oversight, many law agers feel that this lack of expertise
enforcement administrators have administrators have allows oversight members to ask
identified several ways that such discovered that they questions that encourage officers to
systems can benefit police agencies. can take steps that reevaluate long-standing practices
These include bettering an agency’s may short-circuit and approach situations from a dif-
image with the community, enhanc- future tension.... ferent perspective.
ing an agency’s ability to police it- Citizen oversight bodies can


self, and, most important, improv- provide two general types of recom-
ing an agency’s policies and mendations for changing police op-
procedures. erations. First, they can recommend
While no empirical evidence changes in the way the department
Police Image may show that oversight systems conducts its internal investigation
The example at the beginning deter police misconduct,6 citizen re- into alleged misconduct. For ex-
of this article illustrates how citizen view may help in three ways to im- ample, because of investigative in-
oversight can improve a depart- prove officer actions. First, by rec- consistencies in Portland, Oregon,
ment’s relationship and image with ommending additional training for the oversight committee recom-
the community it serves. Particu- errant officers, oversight bodies can mended that the police depart-
larly among skeptical citizens, the encourage officers to learn how to ment’s internal affairs unit handle
oversight process can help establish avoid the behavior that led to citizen all use-of-force complaints rather
and maintain an agency’s repu- complaints. Next, oversight sys- than sending them to the precincts
tation for fairness and firmness in tems may discourage some officers for investigation. The department
addressing allegations of police from engaging in misconduct by re- agreed.
misconduct. Citizen oversight also ducing their chances for promotion. More often, oversight bodies
can promote the goals of commu- Finally, when law enforcement offer recommendations intended
nity policing by enhancing commu- agencies adopt policy and proce- to improve department policies
nication between police and citi- dure changes recommended by governing officer behavior. For
zens and obtaining the public’s oversight bodies, officers gain a example, in the wake of riots in
views about law enforcement better understanding of how they a local park that drew over 30
activities. should perform their duties. complaints from citizens alleging

26 / FBI Law Enforcement Bulletin


officer misconduct, the Berkeley, automatic termination and sus- law enforcement administrators
California, city council directed pended, but did not terminate, the perform their jobs more effectively
oversight members to prepare rec- deputy. and with increased public support.
ommendations about crowd control
at large demonstrations. As a result, CONCLUSION
Endnotes
the city’s oversight commission Law enforcement administra- 1
Andrew Thomas, executive director of the
recommended 12 specific changes, tors often find citizen oversight a Rochester Center for Dispute Settlement, which
including obtaining and using bet- burdensome, even contentious, pro- operates the city’s citizen review board,
ter-amplified sound devices to ad- cedure. In many jurisdictions, per- interview by author 1999.
2
petual conflict has reigned between The author based this article on informa-
dress crowds and monitoring the tion he collected as part of a report prepared for
audibility of dispersal orders; pro- agencies and oversight members. In the U.S. Department of Justice, National
viding clearer instructions about the fact, some tension between the two Institute of Justice, Contract OJP-94-C-007.
location of the unlawful assembly may prove inevitable if the over- 3
Mary Dunlap, director of the San
sight system is functioning consci- Francisco, California, Office of Citizen
site, the route that persons can use Complaints, interview by author, 1999.
to leave the area, and the amount entiously. However, constant fric- 4
Jerry Sanders, former chief of the San
of time given to comply with the tion does not have to exist. Diego, California, Police Department, interview
dispersal order; and training spe- Ultimately, a good, or at least by author, 1999.
5
tolerable, working relationship de- Charles Moose, former chief of the
cific officers to serve as crowd liai- Portland, Oregon, Police Bureau, and Captain
sons at demonstrations. The depart- pends on the personalities and com- Melvin Sears of the Orange County, Florida,
ment subsequently implemented all mitment to fairness displayed by the Sheriff’s Office and administrative coordinator
12 of the oversight commission’s oversight director and the law en- of the Orange County Citizen Review Board,
forcement administrator. Both of interview by author, 1999.
recommendations. 6
The oversight process may lack certain
By comparison, oversight sys- these individuals must communi- qualities thought necessary to deter misconduct:
tems may recommend changes to cate openly and with a willingness certainty, severity, and swiftness of punishment.
policies and procedures that prove to listen to the other’s point of view. Michele Sviridoff and Jerome E. McElroy,
Indeed, if both sides make a sincere Processing Complaints Against Police: The
more favorable to officers. For ex- [New York City] Civilian Complaint Review
ample, the internal affairs unit of the and sustained effort to work to- Board (New York: Vera Institute of Justice,
Orange County, Florida, Sheriff’s gether, citizen oversight can help 1998), 35.
Office recommended firing a © DigitalVision
deputy for violating the agency’s
pepper spray policy—excessive use
of force. However, the citizen re-
view board determined that the
deputy, a recent hire from another
department where deputies had car-
ried ammonia capsules, had used
the pepper spray only as a substitute
to wake an unconscious suspect.
The board concluded that the
sheriff’s office had a poor pepper
spray policy because it required au-
tomatic termination for misuse re-
gardless of mitigating circum-
stances. As a result, the department
rewrote its policy so that misuse of
pepper spray would not require

August 2000 / 27
Legal Digest
© Mark C. Ide

Anonymous Tips and Frisks


Determining Reasonable Suspicion
By MICHAEL J. BULZOMI, J.D.

T
he law enforcement profes- need by recognizing search warrant suspicion of danger to justify a lim-
sion is a precarious and per- exceptions that apply to situations ited search2 or probable cause to
ilous one. Its priorities are where the usual search warrant re- allow a search to prevent escape3 or
protecting the public and ensuring quirement would hinder law en- to avoid the destruction of evi-
officer safety. Officers must be cau- forcement in acquiring evidence dence;4 2) the consent exception,
tious because violence is always that may be otherwise lost, or in which requires a reasonable belief
possible. Caution, however, does obtaining items that would pose a that the consenting party has appar-
not mean that constitutional rights danger to the public or to the offic- ent authority, control, and access
can be overlooked. It has been ar- ers. These exceptions require a suf- over the property and voluntarily
gued that “in dealing with rapidly ficient showing of probable cause, consents;5 3) the motor vehicle ex-
unfolding and often dangerous situ- or in cases of safety, reasonable sus- ception requires probable cause to
ations on city streets, the police are picion. The Court appears reluctant believe there is evidence or contra-
in need of an escalating set of flex- to create any further search warrant band in the motor vehicle;6 4) the
ible responses, graduated in relation exceptions other than the five it has search incident to arrest exception,
to the amount of information they currently allowed. These excep- which is justified by a lawful custo-
possess.”1 tions are: 1) the emergency or dial arrest,7 permitting a search of
The Supreme Court of the exigent circumstances exception, the arrestee, personal items in his
United States has addressed this which requires a reasonable possession,8 the area within the

28 / FBI Law Enforcement Bulletin


arrestee’s immediate control9 for
weapons, means of escape and evi-
dence of any crime, and immediate
adjacent areas for persons who may
pose a danger to officers;10 and 5)
“ ...an anonymous
tip of a person
carrying a gun is
not...sufficient to
the inventory exception, which al-
lows law enforcement to locate and justify police
identify valuable or dangerous officers stopping
items contained within property and frisking
they have lawful custody of, using a that person.
standardized inventory policy.11


This article discusses one aspect of
the emergency exception regarding Special Agent Bulzomi is a legal
frisks for weapons and the decisions instructor at the FBI Academy.
made by the Court about frisks for
weapons based on anonymous tips
in Florida v. J.L. 12
The Florida trial court granted for weapons. Officers’ assessment
Florida v. J.L. the youth’s motion to suppress the of reasonable suspicion can be
On October 13, 1995, an anony- gun as the fruit of an unlawful based on their own perceptions,
mous caller reported to police that a search. The intermediate appellate their training and experience, their
young black man was standing at a court reversed, but the Supreme knowledge of the area or person(s),
particular bus stop wearing a plaid Court of Florida quashed that deci- and witness or informant informa-
shirt and carrying a gun. Officers sion and held the search invalid un- tion, including corroborated anony-
went to the bus stop within minutes der the Fourth Amendment. The mous tips. This is a reiteration of the
after receiving the information and case then came before the U.S. Su- Court’s landmark case, Terry v.
saw three black males, one of whom preme Court to determine whether Ohio.13
was wearing a plaid shirt. Apart an anonymous tip that a person is
from the tip, the officers had no carrying a gun is, without more, suf- Terry v. Ohio
reason to suspect any of the three of ficient to justify a police officer’s Terry involved three individu-
illegal conduct. The officers did not stop and frisk of that person. als who were stopped and frisked by
see a firearm or observe any un- The opinion of the Court deliv- Officer McFadden after he had ob-
usual movements to indicate the ex- ered by Justice Ginsburg held that served them repeatedly walking up
istence of a firearm. Without hesita- an anonymous tip of a person carry- and down a street and peering into
tion or question, one of the officers, ing a gun is not, without more infor- the window of a particular store. In
who was a 14-year veteran, frisked mation, sufficient to justify police Terry, the Court said, to justify a
the young man wearing the plaid officers stopping and frisking that stop, the officer must identify spe-
shirt and seized a gun from his person. The Court found that offic- cific articulable facts which, when
pocket. The other officer frisked the ers, for the protection of themselves taken with their logical inferences,
remaining two youths, against and others, may detain individuals establish a reasonable suspicion
whom no allegations had been based on a reasonable suspicion that that criminal activity is about to
made, and found nothing. The criminal activity is about to occur. occur. This makes the intrusion
youth who carried the gun was As long as officers can articulate a reasonable.
charged under state law with carry- separate reasonable suspicion that Officer McFadden was a 36-
ing a concealed firearm without a the individual is armed, they can year veteran with 30 years working
license and possessing a firearm conduct a carefully limited search the same beat. He observed the
while under the age of 18. of the individual’s outer clothing individuals and concluded that he

August 2000 / 29
did not know them and, based upon used to assault them. However, nei- They then saw the suspect leave the
his training and experience, deter- ther J.L. nor his associates were apartment building, enter the car,
mined that they were “casing the shown to pose a danger to the offic- and drive the route toward the spe-
joint” for an armed robbery. Having ers or to the public. cific motel. Officers stopped the car
come to this conclusion, Officer Anonymous tips alone seldom just short of the motel. A consen-
McFadden approached the indi- demonstrate the tipster’s basis of sual search of the car resulted in the
viduals to engage them in conversa- knowledge or veracity, unlike tips recovery of marijuana. After her ar-
tion. When Officer McFadden iden- received by police from known in- rest, cocaine was found in her purse.
tified himself and asked the formants whose reputation can be The Court held that the anony-
individuals who they were and what assessed and can be held respon- mous tip, standing alone, did not
they were doing, they gave sible if the allegations turn out to be justify White’s detention. However,
mumbled responses. It was only fabricated.14 However, the Court once police corroborated the
then that Officer McFadden frisked has recognized that there are situa- informant’s accurate prediction of
the individuals, having a reasonable tions in which an anonymous tip, the woman’s future movements, it
suspicion that they were armed and suitably corroborated, can be became reasonable for police to
therefore dangerous. His actions enough to give rise to the reason- think that the tipster had inside
were deemed reasonable by the able suspicion required to make an knowledge about the suspect and
Court. investigatory stop. bolstered his assertion about the co-
caine possession. Although the
Anonymous Tips and Court held that the detention was


Reasonable Suspicion reasonable in White, the detention
Terry v. Ohio and Florida v. was regarded as borderline in re-
J.L. present an interesting contrast. Reasonable suspicion gard to establishing the necessary
In Florida v. J.L., the officer’s sus- must be based on reasonable suspicion to stop and de-
picion that J.L. was carrying a tain. The Court explained that
weapon arose not from any personal
what officers know “knowledge concerning a person’s
observations, training, or experi- prior to their stop future movements indicates some
ence, but solely from a telephone and frisk, not on familiarity with that person’s af-
call made by an unknown caller. In what they find as a fairs, but having such knowledge
the course of investigating the result of a search. does not necessarily imply that the
anonymous tip, the officers did not informant knows, in particular,


identify themselves as police or whether that person is carrying hid-
make reasonable inquiries. They den contraband.”16
observed no unusual conduct that Predicting future behavior is
might have led the officers to rea- Anonymous Tips and Reliability important. Unlike the White case,
sonably conclude, in light of their In Alabama v. White,15 police the tip concerning J.L. provided de-
experience and training, that crimi- received an anonymous tip that a scriptive information, but no pre-
nal activity was about to occur or woman would be leaving a particu- dictive information. It, therefore,
that the individuals with whom they lar apartment at a particular time in left the police without any means to
were dealing were armed and dan- a particular vehicle. The tip also test the reliability of the informant’s
gerous. Officers are entitled to con- included information that the information and, more important,
duct a carefully limited search of woman would drive to a named mo- the informant’s credibility. All that
the outer clothing of individuals tel and would have cocaine in a the police knew in J.L. was the bare
who pose a danger to them for the brown attache case. Police corrobo- report of an unknown, unaccount-
protection of themselves and others rated the information by going to able informant who neither ex-
in the area and in an attempt to the apartment building and observ- plained how he knew about the gun
discover weapons which might be ing the car described by the caller. nor supplied any basis for believing

30 / FBI Law Enforcement Bulletin


he had inside information concern- caller.18 They also suggested that a and 3) there are no factors that cast
ing J.L. The fact that officers found repeat anonymous caller with a rec- doubt on the reliability of the tip.20
a gun did not add credence to the ognizable voice, who repeatedly The basis of this argument is that it
tipster’s allegation. The officers, provides police with information is reasonable for law enforcement
prior to the frisks, had no reason- that has proven to be true, may be officers to begin an investigation
able basis for suspecting J.L. of en- deemed a reliable source even into a tip concerning a person with a
gaging in unlawful conduct. Rea- though his true identity is not gun by protecting themselves and
sonable suspicion must be based on known.19 The full Court may not the public with an automatic frisk of
what officers know prior to their adopt these views, but they do pro- the person(s) in question.
stop and frisk, not on what they find vide some guidance in this as yet The Court responded to this ar-
as a result of a search. unsettled area of the law. gument by stating that “an auto-
matic firearm exception to our es-
Possible Means of Firearms Exception to Terry tablished reliability analysis would
Establishing Reliability The state of Florida and the fed- rove too far. Such an exception
Florida v. J.L. and Alabama v. eral government argued before the would enable any person seeking to
White make it clear that an anony- Court that there should be a fire- harass another to set in motion an
mous tip that merely identifies a arms exception to the Terry rule. intrusive, embarrassing police
person, but does not show that the The United States, as amicus curiae search of the targeted person simply
tipster has knowledge of concealed (or friend of the court), specifically by placing an anonymous call
criminal activity is not sufficient to argued that a stop and frisk should falsely reporting the target’s unlaw-
establish a reasonable suspicion be permitted when 1) an anony- ful carriage of a gun.”21 The Court
justifying a stop and frisk. An mous tip provides a description of a also expressed a fear that such an
anonymous tip may be bolstered particular person at a particular lo- exception would be difficult to limit
where it predicts the subject’s fu- cation illegally carrying a con- to firearms and that it would eventu-
ture behavior, and police can cor- cealed firearm, 2) police promptly ally be extended to allegations
roborate that prediction through ob- verify the pertinent details of the tip of drug possession. Several courts
servation and investigation. except the existence of the firearm, of appeals have held it per se
Two additional suggestions as © Mark C. Ide
to establishing the reliability of an
anonymous tipster were given in the
concurring opinion of Justice
Kennedy joined by Chief Justice
Rehnquist. They advised that an
anonymous tip may be thought reli-
able where the tipster has somehow
put his identity at risk. For example,
a tip given to police by a person in a
vehicle, even if the tipster does not
give his name, is entitled to more
weight than the anonymous tele-
phone tipster.17 They speculated
that reliability may be bolstered
where an anonymous tip is received
by law enforcement on a telephone
line equipped with caller I.D. and
the tipster has not blocked the caller
I.D., enabling police to identify the

August 2000 / 31
foreseeable that people carrying assertion of illegality. The require- Endnotes
1
large amounts of drugs also carry ment that an anonymous tip bear Terry v. Ohio, 392 U.S. 1, 88 S. Ct. 1868
(1968).
weapons.22 The Court was con- some standard of reliability in order 2
Ibid.
cerned that these holdings would to justify a stop in no way dimin- 3
Welsh v. Wisconsin, 566 U.S. 740 (1984).
soon be used to justify an automatic ishes a police officers’ prerogative, 4
Schmerber v. California, 384 U.S. 757
frisk exception in cases where the in accord with Terry, to conduct a (1966).
5
Illinois v. Rodriguez, 110 S. Ct. 2793
anonymous tip alleged mere drug protective search of a person who (1990).
possession, allowing the “excep- has already been legitimately 6
Maryland v. Dyson, 119 S. Ct. 2013
tions to swallow the rule.”23 stopped. (1999).
7
The Court reaffirmed the rea- The Court, in Florida v. J.L., 8
U.S. v. Robinson, 414 U.S. 218 (1973).
U.S. v. Edwards, 415 U.S. 800 (1974).
sonable suspicion standard in Terry. recognized the serious threat that 9
Chimel v. California, 395 U.S. 752
It decided that the Terry rule creates armed criminals pose. Firearms are (1969).
the proper balance between the dangerous and extraordinary dan- 10
Maryland v. Buie, 494 U.S. 325 (1990).
11
safety concerns of police and an gers sometimes justify unusual pre- South Dakota v. Opperman, 428 U.S. 362
(1976).
individual’s personal privacy guar- cautions. The Terry rule is such a 12
Florida v. J.L., 120 S. Ct. 1375 (2000).
anteed by the Fourth Amendment. precaution. It permits protective po- 13
Terry v. Ohio, 392 U.S. 1, 88 S. Ct. 1868
Law enforcement officers must lice searches based on a reasonable (1968) at1874.
14
conduct a case-by-case analysis and suspicion rather than the higher Adams v. Williams, 407 U.S. 143, 92 S.
Ct. 1921 (1972) at 1923-1924.
be able to articulate why a particular 15
Alabama v. White, 496 U.S. 325, 110 S.
individual is armed.


Ct. 2412 (1990) at 2415.
The Court did note that under 16
Florida v. J.L., 120 S. Ct. 1375 (2000) at
certain circumstances the danger al- 1378.
17
Id at 1381.
leged in an anonymous tip might be ...to justify a stop, the 18
Ibid.
so great as to justify a search with-
out a showing of reliability. How-
officer must identify 19

20
Ibid.
Id at 1379.
ever, the Court did not articulate specific...facts 21
Id. at 1380.
what these circumstances might be. which...establish a 22
See U.S. v. Sakyi, 160 F.3d 164 (C.A. 4
1998) at 169; U.S. v. Dean, 59 F.3d 1479,
The Court did state that in places reasonable suspicion (C.A. 5 1995) at 1490, n.20; U.S. v. Odom, 13
where there is a diminished expec- that criminal activity F.3d 949 (C.A. 6 1994) at 959; U.S. v.
tation of privacy, such as in air- is about to occur. Martinez, 958 F.2d 217 (C.A. 8 1992).
23
Richards v. Wisconsin, 520 U.S. 385, 117
ports 24 or schools, 25 protective S. Ct. 1416 (1997) at 1421-1422. (rejecting a


searches could be conducted on the per se exception to the knock and announce rule
basis of information that would not for narcotics cases partly because the reasons
be sufficient elsewhere. for creating an exception in one category [of
standard of probable cause nor- Fourth Amendment cases] can, relatively easily,
Conclusion be applied to others, thus allowing the
mally required for police to conduct exception to swallow the rule).
An anonymous tip providing an a search. However, the Court has 24
See Florida v. Rodriguez, 469 U.S. 1, 105
accurate description of a subject’s reminded law enforcement that S. Ct. 308 (1984) (per curiam).
25
readily observable location and ap- even a limited search of an See New Jersey v. T.L.O., 469 U.S. 325,
105 S. Ct. 733 (1985).
pearance identifies the person individual’s outer clothing “ consti- 26
Terry v. Ohio, 392 U.S. 1, 88 S. Ct. 1868
whom the tipster means to accuse. tutes a severe...intrusion upon cher- (1968).
However, this descriptive informa- ished personal security, and surely Law enforcement officers of other than
tion alone is not necessarily enough must be an annoying and frighten- federal jurisdiction who are interested in
to show that the accused is engaged ing, and perhaps humiliating expe- this article should consult their legal
advisors. Some police procedures ruled
in criminal activity. Predictive in- rience.”26 As such, it should only permissible under federal constitutional law
formation may be necessary to es- occur when permitted by the Con- are of questionable legality under state law
tablish the reliability of the tip in its stitution of the United States. or are not permitted at all.

32 / FBI Law Enforcement Bulletin


The Bulletin Notes
Law enforcement officers are challenged daily in the performance of their duties; they face each
challenge freely and unselfishly while answering the call to duty. In certain instances, their actions
warrant special attention from their respective departments. The Bulletin also wants to recognize
their exemplary service to the law enforcement profession.

While on patrol, Officers Gail Hagen and Dustin


Roscoe of the Chicago, Illinois, Police Department drove
by an apartment building and heard the sound of breaking
glass. Upon investigation, they saw smoke and flames
coming from the building’s first floor area. When
Officers Hagen and Roscoe approached the building,
residents told them that a family was trapped on the
second floor. Because intense smoke and fire prohibited
Officers Hagen and Roscoe from entering through the
front and rear of the house, the officers made verbal
Officer Hagen Officer Roscoe contact with the trapped victims—four children and their
parents—calmed them, and urged them to move to a side
window away from the blaze. Upon reaching the side window, the officers persuaded the father to drop
the children down to the awaiting officers. After the children were safe, the parents leapt into the
officers’ arms. Although treated for minor injuries from smoke inhalation and the fall, the family
survived the ordeal because of the bravery and decisive actions by Officers Hagen and Roscoe.

Officer Jeremy Floyd of the Redlands, California, Police Department re-


sponded to a call that an 8-year-old boy had fallen into a canal, which was full
of raging water from a sudden rainstorm. When Officer Floyd spotted the child
floating in the rapidly moving water, he jumped into the canal. Although battered
by the force of the water,
Officer Floyd was able to
grab the child, who now
Nominations for the Bulletin Notes should be based
was semiconscious, and on either the rescue of one or more citizens or
pull him out of the water. arrest(s) made at unusual risk to an officer’s safety.
Submissions should include a short write-up
Officer Floyd carried the (maximum of 250 words), a separate photograph of
Officer Floyd child to safety where each nominee, and a letter from the department’s
paramedics were waiting to ranking officer endorsing the nomination. Submis-
sions should be sent to the Editor, FBI Law Enforce-
transport him to the hospital. Due to Officer ment Bulletin, FBI Academy, Madison Building,
Floyd’s courageous actions and disregard for his Room 209, Quantico, VA 22135.
own personal safety, the 8-year-old child sus-
tained only minor injuries.
U.S. Department of Justice Periodicals
Federal Bureau of Investigation Postage and Fees Paid
Federal Bureau of Investigation
935 Pennsylvania Avenue, N.W. ISSN 0014-5688
Washington, DC 20535-0001

Official Business
Penalty for Private Use $300

Subscribe Now

You might also like