Professional Documents
Culture Documents
Volume 69
Number 8
United States
Department of Justice
Federal Bureau of
Investigation
Washington, DC
20535-0001
Louis J. Freeh
Director
Features
Contributors' opinions and
statements should not be
considered an endorsement by
the FBI for any policy, program, Investigative Uses of Computers Law enforcement can use time line
or service.
The FBI Law Enforcement Color of Law Investigations Officers can help prevent most color
Bulletin (ISSN-0014-5688) is
published monthly by the
Federal Bureau of Investigation,
By John R. Schafer 15 of law investigations by acting in a
professional manner and writing more
935 Pennsylvania Avenue, detailed, accurate reports,
N.W., Washington, D.C.
20535-0001. Periodical postage
paid at Washington, D.C., and
additional mailing offices. Getting Along with Although many law enforcement
Postmaster: Send address
changes to Editor, FBI Law
Enforcement Bulletin, FBI
Citizen Oversight 22 agencies have voiced concern about
citizen oversight, more and more
Academy, Madison Building,
By Peter Finn agencies are finding the process helpful.
Room 209, Quantico, VA 22135.
Anonymous Tips and Frisks Officers can conduct protective searches
Editor
John E. Ott By Michael J. Bulzomi 28 based on reasonable suspicion when
dangerous situations justify taking
Associate Editors unusual precautions.
Glen Bartolomei
Cynthia L. Lewis
Bunny S. Morris
Art Director
Brian K. Parnell
Departments
Assistant Art Director
Denise Bennett Smith
Staff Assistant 6 Perspective 14 Book Review
Linda W. Szumilo Investigative Priorities Crime Prevention
Internet Address
13 Crime Data 21 Technology Update
leb@fbiacademy.edu
Police Deaths LEO
Cover Photo
© Digital Stock
Investigative
Uses of
Computers
Analytical
Time Lines
By CRAIG W. MEYER, M.S.
and GARY M. MORGAN, M.A.
H
ow often has a defense at-
torney exploited a gap in
an investigator’s case
without the investigator realizing
this obvious discrepancy existed?
How can investigators work on
complex cases with developing in-
formation that proves difficult to as-
similate? How can they keep track
of a myriad of case facts used dur-
ing interviews and interrogations
and meetings with prosecutors, task
forces, or management? Do they
struggle to keep track of which
leads they have covered? The solu-
tion to any or all of these problems
may lie in time line analysis—a
simple application of readily avail-
able computer software. TIME LINE tasks in production analysis for
Using time lines will often DEVELOPMENT scheduling resources. 1 In 1958,
prove more productive for these is- Many disciplines, such as man- these early efforts evolved into a
sues as well as enable investigators agement science and psychology, scheduling technique that incorpo-
to virtually eliminate duplication of have used time lines for analytical rates the interrelationships of tasks
effort and inefficiencies during the purposes for decades. Studies dat- called Program Evaluation and Re-
course of an investigation. This ing as far back as 1917 focused on view Technique (PERT).2 One re-
concept also will help investigators using time lines in production and cent study involves a seven-step
quickly track and retrieve informa- scheduling. Early management pio- process, termed the Critical Deci-
tion that took numerous hours to neers employed time lines to sion Method, which discusses the
develop. represent the start and duration of use of time lines in cognitive task
August 2000 / 1
analysis.3 Step five of this process protests made by subjects concern- investigation. Investigators should
uses time lines to chronologically ing their guilt. The time line also update the time line by adding perti-
capture the salient events within an gives investigators a tool for pre- nent information to it after each
incident, allowing the expert to senting their case, logically and interview.
verify the time line during its con- concisely, to others, such as manag-
struction. In a more fundamental ers, prosecutors, and grand jurors. Interrogation Application
application, farmers have advo- Whether in simple handwritten An interrogation differs signifi-
cated the use of time lines to im- form or in a sophisticated multime- cantly from the interview in several
prove grain drying and the handling dia program, the time line also can ways. While the objective of an
and storage of farm commodities.4 serve as an invaluable tool through- interview is to gain information, the
out the case process. objective of an interrogation is to
TIME LINE APPLICATION gain a confession. An interrogation
FOR LAW ENFORCEMENT Interviewing Application generally involves the subject of the
Time line analysis can help law Experienced investigators investigation, whereas the inter-
enforcement investigators record know that the first step in a struc- view usually involves a witness. A
and analyze large amounts of data, tured interview is preparation, witness interview can turn into an
prepare for witness interviews, and which includes reviewing case interrogation if the interviewer be-
write affidavits. Additionally, the facts.5 Investigators can use the lieves the individual has become the
time line can assimilate the volumi- time line to study case facts before focus of the investigation as a result
nous information gathered from in- the interview and refer to it during of the interview.6
vestigative techniques, such as the interview to verify the inter- In the first stages of an interro-
search warrants, record reviews, viewee’s information. Having the gation, an investigator confronts the
and wire taps. A time line can help time line available will aid investi- subject.7 A time line may help the
during interrogations by providing gators in determining the truthful- interrogator convincingly make this
investigators with succinct infor- ness of the individual and help accusation. Next, the investigator
mation that will aid in accusing keep a potentially large number of may need to cut off denials, redirect
subjects and may help to redirect facts in order during a complex protests, and provide reasons for the
subject to confess.8 The time line
would help investigators accom-
plish this by providing them quick
and easy access to case facts,
thereby enhancing the probability
of a confession.
Other Applications
Time lines have other uses per-
tinent to law enforcement. Behav-
ioral science experts advocate de-
veloping and maintaining a time
line for information collected about
a particular subject, indicating
whether a person behaves with
some consistency over time.9 This
Special Agent Meyer teaches Special Agent Morgan teaches could prove useful for court pur-
interviewing and interrogation computer crime investigations at poses or for further evaluation by
at the FBI Academy. the FBI Academy. documenting aspects of a subject’s
behavior and mental state. Time
TIME LINE the information and place the lyzing potential subsequent inves-
IMPLEMENTATION salient facts, in chronologic order, tigations to help identify appropri-
Various affordable spreadsheet on a time line for the interview and ate leads or courses of action that
programs exist that investigators on a master time line for the case. In would bring a case to a logical con-
can use to effectively construct time doing so, investigators can quickly clusion. As investigators analyze
lines. After becoming familiar with view these events to determine sub- the master time line, they should
the program's drawing and hyper- sequent courses of action. consider possible shortcomings in
linking tools, all levels of users can In a murder investigation, wit- the overall investigation. This
create fairly sophisticated time nesses’ statements that they ob- analysis will help investigators de-
lines. served the subject with a weapon on velop a strong case and disclose a
a certain date before the crime rep- possible course of action for subse-
Consolidating Time Lines resents a significant event that in- quent investigation. The master
Creating a master or consoli- vestigators would place on a time time line also may provide manag-
dated time line represents one goal line. In a fraud investigation, the ers or prosecutors a quick reference
of using this type of software. To investigator would document a sub- for case presentation or aid investi-
produce a master time line, investi- poenaed record reflecting the trans- gators in conducting further inter-
gators should develop individual fer of a large sum of money to a views or interrogations.
time lines for each investigative bank account on the time line. As
step that deserves documenting, the investigator places each event Linking Time Lines
such as witness interviews, search on the time line, an outline of the Time lines can contain much
warrant reports, record reviews, or case, which investigators can con- more than a simple chronology of
surveillance logs. When grouped, tinue to build on, emerges. Investi- events. Many software programs al-
they form the master time line that gators should modify the time line low investigators to add other data
investigators could use to compare as the case develops or facts change. to time lines through hyperlinks,
events developed from various fac- By continually updating the time which allow users to electronically
ets of the investigation. For ex- line, investigators can use it for a cross-reference documents. In do-
ample, when investigators conduct variety of purposes, such as analyz- ing so, investigators can incor-
an interview, they need to analyze ing the investigation to date or ana- porate photographs, additional
August 2000 / 3
reports, scanned documents, video Anytown (NBA). In conducting the • Jones was observed in a new
material, and other digitized data investigation, investigators initially car on 2/22/99.
into the time line. Simply clicking interviewed NBA’s Branch Man- • Jones was observed wearing
on the hyperlink allows investiga- ager James Adams and bank teller a new expensive watch on
tors to view the corresponding in- Joan Smith. 2/24/99.
formation in its appropriate pro-
gram. This allows investigators Adams Interview
Smith Interview
access to an evidence-retrieval Investigators gleaned pertinent
information regarding this crime Smith also provided relevant
mechanism that can double as a pre- information during her interview.
sentation tool. from the Adams interview. Ana-
lysts would then place the salient Investigators can create a summary
A TIME LINE points on a time line. of her information and place it on
ILLUSTRATION the time line.
• Teller Jesse Jones has
The following sample case appeared somewhat unhappy • Jones complained about her
shows the concept of using a time at work. finances on 2/12/99.
line. However, the time lines in this • Jones complained about being
• Jones asked for a raise on
sample are oversimplified for illus- denied a raise on 2/14/99.
2/13/99, which management
trative purposes. Obviously, in an • Smith dropped Jones off at the
denied.
actual investigation, the time line car dealer Imports, Ltd. to pick
could contain dozens if not hun- • Jones acted as head teller from
2/13/99 through 2/15/99, and, up a new car on 2/19/99.
dreds of events. Most software pro-
grams allow investigators to aug- as a result, had legitimate • Smith met the car salesman
ment time lines and can handle access to the bank vault. and saw the new car.
voluminous case information. • An audit conducted on 2/17/99 • Jones was boasting about an
The crime in this case involves discovered a $50,000 shortage, expensive watch she received
the theft of $50,000 from the bank which prompted this as a gift on 2/23/99.
vault of the National Bank of investigation.
Bank Records Review
A review of bank personnel
records indicated that Jones had a
checking account at NBA. A subse-
quent review of this account (result-
ing from a subpoena) showed trans-
actions worthy of placing on the
time line.
• A cash deposit of $19,000 was
made on 2/19/99.
• A cash deposit of $8,750 was
made on 2/20/99.
• A wire transfer to Imports,
Ltd. in the amount of $22,000
was made on 2/21/99.
• A cash withdrawal of $3,000
Time Line Comparison Shows Interview Discrepancies was made on 2/22/99.
“
Jones came to pick up the new Endnotes
car on 2/21/99. 1
Samuel C. Certo, Modern Management:
Diversity, Quality, Ethics, and the Global
Time Line Review Time lines can Environment (Boston, Massachusetts: Allyn
Up to this point, investigators contain much and Bacon, 1994), 198-199.
2
Joseph Horowits, Critical Path Schedul-
have created a time line for each more than a simple ing: Management Control Through CPM and
witness and the record review of the chronology of events. PERT (New York, New York: Ronald Press
checking account. Analysts can Company, 1967).
”
3
compare these time lines by build- Robert R. Hoffman, Beth Crandall, and
Nigel Shadbolt, “Use of the Critical Decision
ing a master time line, which they Method to Elicit Expert Knowledge: A Case
should perform as the investigation Study in the Methodology of Cognitive Task
progresses. By creating and con- CONCLUSION Analysis” Human Factors, June 1998, 254-276.
4
stantly reviewing and updating each The law enforcement commu- Larry Reichenberger, “A Bottleneck at the
Bins (Tips to Improve Grain Drying),”
individual time line, investigators nity handles many complex crimi- Successful Farming, November 1997, 27-29.
can look for inconsistencies in the nal investigations each year. Ad- 5
John E. Hess, Interviewing and Interroga-
investigation and logically conduct ministrators constantly must look tion (Cincinnati, Ohio: Anderson Publishing
subsequent investigations. for ways to help investigators deal Co., 1997), 9-10.
6
Don Rabon, Interviewing and Interroga-
A review of the consolidated with the difficulty of assimilating tion (Durham, North Carolina: Carolina
time line reflects a discrepancy be- vast amounts of information inher- Academic Press, 1992), 5.
tween the witness statements of ent in managing complicated cases. 7
“The Reid Technique of Interviewing and
Smith and Williams. Smith indi- Time line analysis can provide in- Interrogation,” John E. Reid and Associates,
Inc., Chicago, Illinois, 1998.
cates that she gave Jones a ride to vestigators with a method of 8
Michael R. Napier and Susan H. Adams,
the car dealership and met Williams quickly tracking and retrieving in- “Magic Words to Obtain Confessions,” FBI
on 2/19/99, wherein Williams indi- formation that they may have spent Law Enforcement Bulletin, October 1998,
cates that meeting occurred on 2/21/ many hours developing. 11-15.
9
Anthony J. Pinizzotto and George D.
99. A time line analysis can show Once investigators have con- Deshazor, “Interviewing Erratic Subjects,”
this discrepancy in a more obvious structed time lines and completed FBI Law Enforcement Bulletin, November
fashion. all of the supporting links to the 1997, 1-5.
August 2000 / 5
Perspective
Rethinking cases, no witnesses or evidence exists. Consequently,
these incidents have a low solvability factor.
Investigative Priorities In most departments, high-profile crimes garner
By Gary J. Glemboski high priority, not only because of the gravity of the
crime but also because of their high solvability. At the
”
fraudulent reporting. Moreover, violent crimes, the department also
when officers take reports in has begun to address the less
person, it can go a long way to serious, yet more prevalent occur-
improving community relations. Agencies need to rence, of larcenies. By attacking a problem that
decide for themselves if the benefits of sending a affects many of its citizens, the department has shown
patrol officer to investigate a property crime out- its concern not only for those few victims of violence
weigh the costs. No matter what method they use but for the welfare of the entire community.
to take reports, agencies should use computerized
records management systems to help link incidents Endnotes
and solve additional cases. 1
U.S. Department of Justice, Federal Bureau of Investigation, Uniform
Crime Reporting, Crime in the United States 1998 (Washington DC:
A Collaborative Approach 1998), 66-67.
The SPD realized that teamwork can mean the 2
Larceny-theft is the unlawful taking, carrying, leading, or riding
difference between success and failure for any away of property from the possession or constructive possession of
another. It includes crimes, such as shoplifting, pocket-picking, purse-
program. Accordingly, the department has assigned snatching, thefts from motor vehicles, thefts of motor vehicle parts and
property crimes investigators in two of the city’s four accessories, and bicycle thefts, in which no use of force, violence, or fraud
precincts. This arrangement brought investigators and occurs. U.S. Department of Justice, Federal Bureau of Investigation,
patrol officers closer together physically and, at the Uniform Crime Reporting, Crime in the United States 1998 (Washington,
DC: 1998), 43.
same time, improved communication between them. 3
Eight crimes comprise the FBI’s Uniform Crime Reporting
Working closely with patrol officers and precinct program’s Part I, or Index, Crimes. These crimes—murder and
commanders helps investigators tackle the city’s nonnegligent manslaughter, forcible rape, robbery, aggravated assault,
property crime problem. burglary, larceny-theft, motor vehicle theft, and arson—determine a
community’s crime rate.
In addition, SPD’s leaders met with prosecutors 4
Supra note 1.
and judges to ensure that individuals brought before 5
Supra note 1.
August 2000 / 7
Identity Theft
A Fast-growing Crime
By MATTHEW L. LEASE and TOD W. BURKE, Ph.D.
© Photodisc
C
riminals have evolved from business in order to obtain property and recognized the true victim—the
picking pockets to using or some lawful right.2 Identity theft person who had their identity sto-
more sophisticated meth- differs from other forms of less cal- len. This act enables law enforce-
ods of theft. Today, thieves can culated fraud. For example, a juve- ment agencies to investigate iden-
steal personal information and use nile using someone else’s driver’s tity theft crimes and the associated
another person’s identity to commit license to purchase alcohol does not fraud that often results.3 In 1997, the
numerous forms of fraud. Identity constitute identity theft. Although Financial Crimes Division of the
theft, the criminal act of assuming intentional deception exists, using U.S. Secret Service investigated
another person’s name, address, so- someone else’s license to make a 9,455 cases of identity theft with
cial security number, and date of purchase does not result in a loss to losses totaling $745 million.4 In the
birth in order to commit fraud, af- the victim company. past decade, the U.S. Secret Service
fects approximately 350,000 to The Identity Theft and As- has observed an increase in finan-
500,000 victims annually.1 Fraud is sumption Deterrence Act of 1998 cial institution, credit, and com-
intentionally deceiving a person or made identity theft a federal crime puter fraud facilitated by identity
Dumpster Diving
An individual or business that
fails to dispose properly of personal
identification information, by
shredding or mutilating, could find
themselves susceptible to a
“dumpster diver”—an individual
who retrieves discarded material
looking for anything of value.
Dumpster divers obtain account
numbers, addresses, and dates of
birth from financial, medical, and Mr. Lease served as a military Mr. Burke, a former police
personal records—all of which they police officer and is currently a officer, is an associate
can use to assume an identity. graduate student-researcher at professor with the department
One dumpster diver drove Radford University in Radford, of criminal justice at Radford
Virginia. University in Radford, Virginia.
around affluent neighborhoods on
August 2000 / 9
Further, mail theft can occur from may attempt to sell the personal Computerized Information
mail processing areas by postal information to another thief. This and the Internet
employees. happened in Fayetteville, Califor- Today’s information age
Additionally, criminals might nia, when a consumer learned that changes the way thieves commit
attempt to complete a change of ad- her credit report revealed five new crimes. With so much personal in-
dress card in order to divert the accounts issued in her name. An formation obtainable in the net-
victim’s mail to a rented mailbox. identity thief had charged over worked world, thieves can access
Police agencies should instruct vic- $65,000 of unsecured debt using her information easily. They find per-
tims to notify their postal inspector identity.10 sonal identifying information
immediately if they suspect that The negligence of a company through computerized information
someone has forwarded their mail that permits such access in an services, also known as information
to another location. Law enforce- unmonitored environment contrib- brokers. These services collect,
ment departments should urge utes to this type of identity theft. sort, package, and sell personal in-
people not to leave their paid bills in One medical office employee ille- formation in electronic form to
the mailbox for the carrier to collect gally obtained a patient’s name and other businesses and individuals.
and recommend that residents drop social security number, established Computerized information services
their paid bills and account pay- a credit line, rented an apartment, may not safeguard the personal in-
ments at the post office or in a and earned income in the patient’s formation adequately nor screen
locked mailbox. name.11 purchasers of computerized infor-
The Citrus Heights Police De- mation appropriately, creating the
partment in Sacramento, California, opportunity for an identity thief to
“
conducted community meetings, commit fraud. Private companies
which revealed that mail and iden- and individuals in some states can
tity theft had become significant ...state legislatures purchase driver’s license informa-
problems for citizens.9 By contact- tion and photos, traditionally re-
ing mail couriers or the local postal have begun stricted to law enforcement authori-
inspector, officers can determine if adopting statutes ties. South Carolina and Florida
mail theft presents a problem in that make stealing officials sold millions of digital
their jurisdiction. Cooperation be- a person’s identity photos of driver’s licenses to pri-
tween law enforcement and postal a crime.... vate companies, which raised seri-
officials will make mail theft more ous questions about personal pri-
”
difficult. vacy. Who has access to the
information? How will individuals
Internal Access and companies safeguard the data?
Internal access refers to an indi- To reduce the misuse of per- After a surge of citizen complaints
vidual obtaining personal informa- sonal information, police depart- and questions, state officials in
tion illegally from a computer con- ments with financial or crime pre- Florida and South Carolina halted
nected to a credit reporting bureau vention units should conduct 1- or the sale of digital photographs.12
or to an employee accessing a 2-day workshops with businesses According to one organization,
company’s database that contains that have the threat of internal ac- the Internet also provides opportu-
personal identification information. cess fraud. Law enforcement repre- nities for identity theft.13 Compro-
Such an insider will look for names sentatives should work with busi- mised public and private networks
similar to their own, or for someone ness security managers to suggest endure millions of dollars in losses,
with good credit, intending to as- possible restrictions and procedures annually.14 In the case of one com-
sume their identity and commit to limit access to personal identifi- pany, a security breach allowed
credit fraud. Also, the employee cation information. anyone to view thousands of private
customer information files that to mitigate and resolve the damage provide a contact number to verify
revealed names, addresses, and caused by identity theft. Depart- credit applications, as well. Victims
other personal information, without ments can provide these steps should request the credit bureaus to
restriction. 15 Company officials through a booklet or private consul- provide free monthly credit reports
corrected the problem quickly, but tation with an investigator, using to monitor for evidence of new
many consumers began to question separate procedures for different fraudulent activity. Departments
the guarantees of information confi- types of identity theft. Although should recommend that victims
dentiality and realized the vulner- other forms of identity theft exist keep a log of all conversations with
ability of information on the (e.g., theft of cellular phones, police officers and financial institu-
Internet. driver’s licenses, passports, and tion officials. Agencies should ad-
checks), credit theft remains the vise victims that no one can remove
HOW TO RESOLVE most common. information from their credit report
IDENTITY THEFT Law enforcement agencies and warn them about credit repair
Victims may need months or should instruct victims to contact scams that promise to restore tar-
years to restore their credit and their current credit card and loan nished credit reports. Officers may
reputation. Law enforcement agen- companies about the theft. Victims need to refer traumatized victims of
cies should advise citizens to should cancel old cards and order identity theft to support groups,
report identity theft immediately. new cards with different account which can assist and support iden-
Departments should gather as numbers. The victim should inform tity theft victims as well as help in
much documented evidence from all check-monitoring agencies of the recovery process.16
the victim as possible. After com- the theft and alert the fraud depart-
pleting the initial report, agencies ments of the three major credit bu- HOW TO PREVENT
should provide a copy to the victim, reaus in order to place a hold on IDENTITY THEFT
along with the phone number of the accounts. Law enforcement agencies, as
fraud investigator assigned to the Additionally, victims should well as businesses and consumers,
case. Credit card companies, banks, complete and submit a credit fraud have an equal obligation to fulfill
and insurance companies often re- report with a victim statement to the when preventing identity theft.
quire the police report to verify credit bureaus. The victim state- Agencies can disseminate informa-
the crime. ment should explain briefly that an tion to minimize the risk of identity
After notifying the police, vic- individual has used their identity theft through their Internet sites,
tims should take the necessary steps fraudulently to apply for credit and local media, or community policing
August 2000 / 11
initiatives, such as Neighborhood when necessary. Other tips include thousands of identity theft cases.
Watch meetings and community shredding financial documents and Recognizing this increase, state leg-
liaisons. Departments should rec- preapproved credit card applica- islatures have begun adopting stat-
ommend that individuals check tions, which minimizes the threat utes that make stealing a person’s
their credit report annually to en- of dumpster divers obtaining valu- identity a crime, giving law en-
sure accuracy and report any dis- able personal information. Law forcement the necessary tools to
crepancies to credit bureaus for cor- enforcement officers should advise battle this fast-growing offense.
rective action. consumers who purchase products Some consumer advocates have
Additionally, agencies should over the Internet to use a secure estimated that identity thieves vic-
advise individuals to reduce the site, which encrypts their personal timize as many as 1,000 people per
amount of personal information that information, to place their order. day.17 Some criminals use conven-
exists in the public domain and en- tional methods, such as dumpster
courage people to remove their CONCLUSION diving and mail theft, while others
names and addresses from Identity theft has escalated use newer technology, such as in-
telemarketing lists. They should dramatically. Local and state sider computer access and the
disclose personal information only law enforcement agencies handle Internet, to obtain a fraudulent iden-
tity. The various ways that crimi-
nals use personal information will
change as technological develop-
ments continue. Police can assist in
Identity Theft Resources the recovery and prevention of
identity theft by providing correc-
Social Security Administration tive steps and helpful tips that allow
Fraud report 800-269-0271 citizens to avoid the traumatic con-
sequences that result.
The three major credit bureaus:
TransUnion Endnotes
Fraud report 800-680-7289 1
L. Wolf, “Theft of Identity, Credit Abuses
Credit report 800-888-4213 Stir Anguish,” The San Diego Union Tribune,
February 10, 1999, B1.
Cancel preapproved credit card offers 888-567-8688 2
M. Pena, Practical Criminal Investigation,
3d Ed. (Placerville, California: Copperhouse
Equifax Publishing Company, 1993).
3
Fraud report 800-525-6285 18 U.S.C. §1028.
4
T. Lowry, “Information Brokers Put on
Credit report 800-685-1111 or 800-997-2493 Brakes, New Limits to Cut Identity Theft,” USA
Today, January 18, 1999, 3B.
Experian 5
Ibid.
6
Fraud report 800-301-7195 Ibid.
7
J. Hoffman, The Art and Science of
Credit report 800-682-7654 Dumpster Diving, (Port Townsend, Washington:
Cancel preapproved credit card offers 800-353-0809 Loompanics Unlimited, 1993).
8
T. Dacolias, “Identity Theft,” available
from http://www.congames.com/identity.html,
For more details on identity theft, visit these Web sites: accessed on March 5, 1999. This site is no
www.identitytheft.org longer accessible.
www.privacyrights.org 9
D. Richie, “Police Eye Residents
Concerns, Drug Dealing Seen As City’s Top
www.futurecrime.com
Trouble,” The Sacramento Bee, January 31,
1999, N1.
Crime Data
August 2000 / 13
Book Review
Community Education and Crime Pre- Within its fifteen chapters, Part II ranges from
vention: Confronting Foreground and Back- “What is Community Education?” to “Leader-
ground Causes of Criminal Behavior by ship for Community Education.” The book
Carolyn Siemens Ward, published by Bergin & includes theories by the authorities and the
Garvey, Westport, CT, 1998 practical wisdom of the neighborhood citizenry.
Community Education and Crime Preven- For example, one expert believes that “citizens
tion gives both specific insight into how the tended to drastically misperceive the power
Hyde Park community of St. Louis, Missouri, arrangement in their communities, seeing more
manages criminal behavior as well as providing competition than actually existed.” A local
general information on crime prevention that resident commented on the power structure by
any community can use. Community policing, stating, “I look at it as pluralistic” and “we have
a popular topic in law enforcement circles, a lot of different agencies that do a lot of differ-
receives attention throughout the United States ent things.”
in print, at lectures and conferences, and through The crux of the book lies with bringing
course work. It encompasses community educa- citizens out of their individual circles and
tion, citizen involvement, and crime prevention. encouraging participation in every facet of the
The author, a community education professor community’s makeup. A basic step to accom-
and member of the National Community Edu- plishing such a task involves using neighbor-
cation Association, discusses all of these topics hood schools as community centers to fulfill
in Community Education and Crime Prevention. multiple purposes. Neighborhoods should
The author begins by using a quote from conduct community events and meetings in
Alexis de Toqueville: “Each person, withdrawn neighborhood schools and keep the schools’
into himself, behaves as though he is a stranger doors open after school hours, allowing children
to the destiny of all the others. As for his trans- a safe location to meet and play with friends.
actions with his fellow citizens, he may mix Parents should volunteer in their children’s
among them, but he sees them not; he touches schools and understand how they can make
them, but does not feel them; he exists only in positive changes. Additionally, neighborhoods
himself and for himself alone. There no longer should recruit or become aware of the existing
remains a sense of society.” To the contrary, the service or social organizations whose outreach
author presents research clearly indicating that involves all aspects of family and community
law enforcement agencies must become in- assistance. After instituting these services,
volved with citizens and create strategic and families should spread the word about such
long-term plans to manage the increase in opportunities and available assistance. All of
criminal behavior. these suggestions combine to form a final
Community Education and Crime Preven- product. A strong, interwoven system of services
tion is divided into two parts. Part I addresses and neighbors may effectively reduce crime in
foreground causes (opportunity) of criminal communities. Educating neighborhood residents
behavior and consists of five chapters that leads to their empowerment.
include “A Theory of Crime Causation” and Reviewed by
“Hyde Park Crime: Prevention Efforts and Their Djana E. Trofimoff
Effects.” Part II confronts background causes Operations Analyst
(social malaise and demographics) and offers Planning and Research Unit
instruction on a community education approach. Kansas City, Missouri, Police Department
August 2000 / 15
well-known example of dual pros- COLOR OF LAW STATUTES guards, private citizens, judges, de-
ecution occurred when a Los Ange- The term color of law derives fense attorneys, and prosecutors
les County Superior Court jury ac- from the federal statute, Title 18, who willfully participate with fed-
quitted the four police officers who U.S. Code, Section 242, titled eral, state, or local law enforcement
beat Rodney King. After reviewing “Deprivation of Rights Under Color officials in the commission of color
the jury’s verdict, DOJ elected to of Law,” which primarily governs of law violations fall within the pur-
charge the officers in federal court police misconduct investigations. view of the federal statutes.
with color of law violations. This statute makes it a crime for any Punishment for color of law
Approximately 30 attorneys person acting under the color of law violations varies depending on the
from the DOJ Civil Rights Division to willfully deprive any individual gravity of the offense. Penalties for
and 190 FBI special agents in 56 residing in the United States those minor infractions range from proba-
field offices investigate and pros- rights protected by the Constitution tion to 1-year imprisonment, a fine,
ecute civil rights matters.4 The most and U.S. laws. Other related federal or both.6 Under aggravated circum-
common types of police miscon- statutes include Title 18, U.S. Code, stances, offenders risk the maxi-
duct include excessive force, sexual Section 241, “Conspiracy Against mum sentence of imprisonment up
assault, intentional false arrest, fal- Rights”; Title 18, U.S. Code, Sec- to 10 years, a fine, or both. If loss of
sifying evidence, extortion, and tion 1512, “Obstruction of Justice”; life occurs as a result of intentional
other related offenses. Of the nearly and Title 18, U.S. Code, Section police misconduct, the officer could
10,000 color of law complaints re- 1001, “False Statements.” Federal face the death penalty.7
ceived each year, DOJ prosecutes statutes generally restrict color of INVESTIGATIVE PROTOCOL
only about 30 police officers.5 The law investigations to official ac-
remaining cases either lack pros- tions taken by police officers, fed- Color of law investigations
ecutive merit or do not require for- eral agents, sheriff’s deputies, cor- comprise two categories—criminal
mal judicial proceedings to resolve. rectional officers, and other public wrongdoing and pattern-and-prac-
Additionally, these figures do not safety officials. However, off-duty tice misconduct. Criminal wrong-
include police misconduct com- officers who assert their official sta- doing focuses on individual mis-
plaints adjudicated at the state or tus also may face prosecution. In conduct, while pattern-and-practice
local level. rare cases, the actions of security misconduct leads to civil proceed-
ings and examines systemic mis-
conduct in law enforcement agen-
cies. Police officers wontedly using
traffic stops as a tool of intimidation
to discourage minorities from enter-
“
stantial case investigation. ternal affairs reports; interviewing
the subject or subjects of the inves-
Preliminary Investigation tigation; photographing and dia-
The preliminary investigation ...officers can take gramming the crime scene; and se-
gleans sufficient information for steps to prevent curing all relevant evidence and
DOJ attorneys to evaluate the inci- unnecessary witness testimony. When the facts
dent with the least amount of dis- of the substantial case indicate that
ruption to the police officer’s daily
color of law
the subjects may have violated the
routine. The investigative steps in investigations. civil rights of the victims, a federal
the preliminary investigation in- grand jury convenes to formally in-
”
clude identifying and interviewing vestigate the incident.
the victims; identifying and inter-
viewing witnesses; conducting The Grand Jury Process
criminal checks for both subjects also discourages some officers be- A federal grand jury consists of
and complainants; photographing cause it states only that the facts of between 18 and 24 citizens, who
the injuries, if appropriate; and ob- the case do not support federal pros- have the power to subpoena wit-
taining police reports and medical ecution. Due to the large volume of nesses and examine all relevant evi-
records or a coroner’s report in the complaints, DOJ does not tailor the dence. The grand jury inquiry estab-
event of a death. Additionally, the notification letters to each specific lishes victim and witness
FBI notifies in writing the officer’s complaint. The generic wording in credibility, provides the subject an
employing agency of the ongoing these letters may not specifically opportunity to testify, and deter-
color of law preliminary investiga- exonerate the officer, leaving the mines probable cause. When the in-
tion. Also, the preliminary report officer and the officer’s employer to quiry concludes, the grand jury
incorporates a list of individuals wonder if the report lacked suffi- hands down a true bill or a no bill.
that DOJ will notify at the conclu- cient evidence to support a prosecu- A true bill, also referred to as an
sion of the investigation. This list tion or if the officer acted properly. indictment, means the grand jury
contains the name and address of Neither the length of the DOJ determined that probable cause
August 2000 / 17
FBI Civil Rights Subprograms*
Color of Law—Force/Misconduct
Includes investigations of:
2 • Physical abuse 72
• The infliction of summary punishment
• The deprivation of rights through fabrication of evidence
Involuntary Servitude/Slavery
3 • Investigations involve migrant farm workers or
0.2
immigrants who are forced to work against their will.
August 2000 / 19
In another example, three offi- the use of force. Including these is- simple as periodically reminding
cers shot and killed a transient. A sues in the report helps the review- officers at role call to be mindful of
review of the incident reports could ing official determine whether the color of law investigations.
not determine if the officers’ ac- use of force was justified. Officers
CONCLUSION
tions were justified because two of must know when to use force, how
the officers’ reports contained no much force to use, and, most impor- Even police officers who con-
more that 500 words, and one of- tant, how to accurately record their scientiously perform their duties
ficer described the shooting in just actions in a report. Written reports should expect allegations of police
98 words. After a long and exhaus- often provide officers with the only misconduct at some point in their
tive grand jury investigation, the opportunity to explain their actions careers. However, officers can pre-
grand jurors found insufficient evi- outside the courtroom setting. A vent most misconduct complaints if
dence for indictments. Again, in- well-written report can prevent an they conduct themselves in a pro-
complete report writing caused un- otherwise-long-and-stressful color fessional manner and write detailed,
necessary stress in the officers’ of law investigation. accurate reports. A report not only
lives. records facts but also reflects the
Many officers write such words writer’s integrity.
“
or phrases in reports as “lunged,” Police oversight and color of
“menacing,” or “furtive move to the law investigations constitute a part
waistband.” Instead of using the of today’s policing environment.
...incomplete report Understanding the purpose and the
word “lunged,” the officer should writing caused
describe the actions of the offender. mechanics of color of law investi-
For example, “the offender, holding unnecessary stress gations not only reassures police of-
a 9-inch butcher knife in his out- in the officers’ lives. ficers but also ensures that the pub-
stretched right hand, took three lic receives professional police
services.
”
rapid steps toward me.” Instead of
using the word “menacing,” the of- Endnotes
ficer should write, for example, “the 1
For a complete definition of color of law,
offender squinted her eyes, Empirical evidence suggests see, 18 U.S.C. § 242.
2
clenched her teeth, and made deep that a high number of color of law Alexis Agathocleous and Heather Ward,
Prosecuting Police Misconduct (New␣ York:
growling sounds.” When officers investigations stem from pursuits. Vera Institute of Justice, 1998), 1-2.
fear for their lives, or the lives of When pursuits terminate, police of- 3
Egon Dezihan, et al., “Color of Law
others, they should narrate what ficers sometimes vent their excess Matters,” (Washington, DC: U.S. Department
specific actions led them to this energy on suspects. Devising tech- of Justice, Federal Bureau of Investigation,
unpublished).
state of mind. In addition to a niques to dissipate excess energy in 4
Louis J. Freeh, “Ensuring Public Safety
description of the offenders’ ac- an appropriate manner often pre- and National Security Under the Rule of Law –
tions, a notation of the officer’s vents the spontaneous use of exces- Report to the American People on the Work of
state of mind provides a more com- sive force. With one technique, the FBI 1993 – 1998, (Washington, DC, 1999),
2; Egon Dezihan, et al., “Civil Rights Program,
plete picture as to why the officer partners agree to monitor each National Academy Manual,” (Quantico, VA:
responded with a measure of force. other’s behavior at the end of a pur- U.S. Department of Justice, Federal Bureau of
Such phrases as “furtive move to suit, to include restraint, if neces- Investigation) 2.
5
the waist band” or “shiny metal ob- sary. Police administrators can de- Supra note 2.
6
18 U.S.C. § 242.
ject” often lack credibility because vise other simple, yet effective, 7
Ibid.
of their overuse and, often, misuse. techniques to reduce the possibility 8
“Addressing Police Misconduct - Laws
A good report also addresses of officer misconduct and subse- Enforced by the United States Department of
the legal elements as well as spe- quent color of law investigations. Justice, Civil Rights Division,” (Washington,
DC), 3.
cific agency policies that authorize This could include something as
August 2000 / 21
Getting Along with
Citizen Oversight
By PETER FINN
© DigitalVision
“
amine most citizen complaints to
determine whether there is prob- In many
able cause to believe that police jurisdictions,
misconduct occurred. Then, volun-
teer board members conduct law enforcement
closed-door hearings to decide agencies have
whether they should support the al- fought the
legations in probable cause cases. initiation of
However, in Orange County, citizen oversight.
Florida, nine volunteer citizen re-
view board members hold hear-
ings, open to the public and the
media, on all cases involving the
alleged use of excessive force and
abuse of power after the sheriff’s
department has investigated them.
”
Mr. Finn is a senior research associate for a private firm in
Cambridge, Massachusetts, and serves as a special officer
with the Belmont, Massachusetts, Police Department.
August 2000 / 23
becomes undermined. Therefore, Citizens generally are not familiar hours per evening for 2 weeks and 2
most jurisdictions have used a vari- with pertinent case law governing all-day Saturday sessions. The
ety of approaches in addressing officer behavior nor do they under- members use a shoot/don’t shoot
concerns about outside involve- stand the nature of police discre- simulator, practice handcuffing,
ment in police affairs. In many com- tion, the methods employed to train and learn about department policies
munities, local governments have officers, or the totality of the cir- and procedures, including the use-
established oversight bodies that cumstances of an incident that can of-force continuum. Other over-
solely advise; they can make only influence officer behavior. Officers sight systems require a department
nonbinding recommendations to frequently observe that state medi- supervisor to attend hearings or be
law enforcement agencies. Also, cal boards, composed only of physi- on call to answer questions about
some review bodies can appeal the cians, investigate doctors for mal- department policies and operations.
agency’s rejection of their recom- practice, and only attorneys Also, review systems that investi-
mendations to elected or appointed investigate lawyers for misconduct. gate citizen complaints often hire
officials who can require the depart- Similarly, some police argue that investigators with pertinent law en-
ment to act. However, because only law enforcement officers have forcement expertise. Finally, many
these officials have this authority the knowledge to investigate and agencies have found that outsiders
regardless of whether an oversight judge other sworn personnel. can sometimes do a more objective
body exists, the oversight procedure job than insiders in assessing the
“
itself does not further diminish the performance of members of their
authority of agency administrators. own profession. Juries illustrate a
Even when citizen oversight frequent use of representatives of
systems have some authority over ...the oversight many different professions and life
the police, they generally exercise it process can help experiences to resolve allegations
cautiously. For example, oversight of police misconduct, physician and
bodies in St. Paul, Minnesota, and
establish and maintain attorney malpractice, and other pro-
Flint, Michigan, have never used an agency’s reputation fession-specific cases in civil and
their subpoena power to compel of- for fairness and criminal trials.3
ficers to testify. Moreover, most firmness in addressing
oversight staff members agree that allegations of police Unfair Process
citizens should not have the power misconduct. While many law enforcement
to discipline officers. They realize administrators and officers feel that
that giving citizens that authority the oversight process is unfair be-
”
could violate state laws, city char- cause outside reviewers are unfa-
ters, or collective bargaining agree- miliar with police work, they have
ments with police unions. Also, However, many law enforce- other objections to citizen over-
such authority would detract from ment administrators have worked sight. For example, unjust criticism
holding the agency’s administrator with citizen review members to ad- and lengthy delays represent two
accountable for ensuring proper dress these concerns and find ways concerns that many officers have
standards of professional conduct. of improving their relationships. about the oversight process.
For example, some agencies train
Lack of Understanding oversight staff and volunteers. In Unjust Criticism
Because they lack experience Rochester, New York, candidates Many officers complain that
as law enforcement officers, over- for the review board attend a oversight staff members hold them
sight members may have difficulty condensed version of a police acad- accountable for minor infractions,
fairly determining whether officers emy run by the police department. such as placing the wrong offense
have engaged in misconduct. The 48-hour course involves 3 code on a citation or failing to
August 2000 / 25
cooperatively with oversight mem- Internal Investigations Policies and Procedures
bers. Police supervisors and over- Oversight systems can improve Many law enforcement admin-
sight staff should meet regularly to the quality of a department’s inter- istrators and oversight staff feel that
discuss any specific misconcep- nal investigations of alleged officer providing suggestions for agency
tions or conflicts and to share infor- misconduct.5 Some agencies report policy and procedure changes rep-
mation. For example, when the that officers perform more thorough resents the greatest benefit of over-
Tucson, Arizona, citizen oversight investigations of such cases be- sight systems. Policy recommenda-
board found some of the police cause they know that the oversight tions, including suggestions for
department’s statistics difficult to body—and, through it, the general training improvements, can influ-
understand, the chief and the public—will be examining how ac- ence entire departments not just in-
board’s chair met with the curate and unbiased their reports dividual officers’ behavior.
department’s statistical personnel, are. While some police administra-
who then developed a clearer pre- tors believe that outsiders do not
sentation method.
“
have the necessary understanding
of police practices to make useful
POLICE BENEFITS policy recommendations, others
Despite serious reservations ...law enforcement disagree. For example, some man-
about citizen oversight, many law agers feel that this lack of expertise
enforcement administrators have administrators have allows oversight members to ask
identified several ways that such discovered that they questions that encourage officers to
systems can benefit police agencies. can take steps that reevaluate long-standing practices
These include bettering an agency’s may short-circuit and approach situations from a dif-
image with the community, enhanc- future tension.... ferent perspective.
ing an agency’s ability to police it- Citizen oversight bodies can
”
self, and, most important, improv- provide two general types of recom-
ing an agency’s policies and mendations for changing police op-
procedures. erations. First, they can recommend
While no empirical evidence changes in the way the department
Police Image may show that oversight systems conducts its internal investigation
The example at the beginning deter police misconduct,6 citizen re- into alleged misconduct. For ex-
of this article illustrates how citizen view may help in three ways to im- ample, because of investigative in-
oversight can improve a depart- prove officer actions. First, by rec- consistencies in Portland, Oregon,
ment’s relationship and image with ommending additional training for the oversight committee recom-
the community it serves. Particu- errant officers, oversight bodies can mended that the police depart-
larly among skeptical citizens, the encourage officers to learn how to ment’s internal affairs unit handle
oversight process can help establish avoid the behavior that led to citizen all use-of-force complaints rather
and maintain an agency’s repu- complaints. Next, oversight sys- than sending them to the precincts
tation for fairness and firmness in tems may discourage some officers for investigation. The department
addressing allegations of police from engaging in misconduct by re- agreed.
misconduct. Citizen oversight also ducing their chances for promotion. More often, oversight bodies
can promote the goals of commu- Finally, when law enforcement offer recommendations intended
nity policing by enhancing commu- agencies adopt policy and proce- to improve department policies
nication between police and citi- dure changes recommended by governing officer behavior. For
zens and obtaining the public’s oversight bodies, officers gain a example, in the wake of riots in
views about law enforcement better understanding of how they a local park that drew over 30
activities. should perform their duties. complaints from citizens alleging
August 2000 / 27
Legal Digest
© Mark C. Ide
T
he law enforcement profes- need by recognizing search warrant suspicion of danger to justify a lim-
sion is a precarious and per- exceptions that apply to situations ited search2 or probable cause to
ilous one. Its priorities are where the usual search warrant re- allow a search to prevent escape3 or
protecting the public and ensuring quirement would hinder law en- to avoid the destruction of evi-
officer safety. Officers must be cau- forcement in acquiring evidence dence;4 2) the consent exception,
tious because violence is always that may be otherwise lost, or in which requires a reasonable belief
possible. Caution, however, does obtaining items that would pose a that the consenting party has appar-
not mean that constitutional rights danger to the public or to the offic- ent authority, control, and access
can be overlooked. It has been ar- ers. These exceptions require a suf- over the property and voluntarily
gued that “in dealing with rapidly ficient showing of probable cause, consents;5 3) the motor vehicle ex-
unfolding and often dangerous situ- or in cases of safety, reasonable sus- ception requires probable cause to
ations on city streets, the police are picion. The Court appears reluctant believe there is evidence or contra-
in need of an escalating set of flex- to create any further search warrant band in the motor vehicle;6 4) the
ible responses, graduated in relation exceptions other than the five it has search incident to arrest exception,
to the amount of information they currently allowed. These excep- which is justified by a lawful custo-
possess.”1 tions are: 1) the emergency or dial arrest,7 permitting a search of
The Supreme Court of the exigent circumstances exception, the arrestee, personal items in his
United States has addressed this which requires a reasonable possession,8 the area within the
”
This article discusses one aspect of
the emergency exception regarding Special Agent Bulzomi is a legal
frisks for weapons and the decisions instructor at the FBI Academy.
made by the Court about frisks for
weapons based on anonymous tips
in Florida v. J.L. 12
The Florida trial court granted for weapons. Officers’ assessment
Florida v. J.L. the youth’s motion to suppress the of reasonable suspicion can be
On October 13, 1995, an anony- gun as the fruit of an unlawful based on their own perceptions,
mous caller reported to police that a search. The intermediate appellate their training and experience, their
young black man was standing at a court reversed, but the Supreme knowledge of the area or person(s),
particular bus stop wearing a plaid Court of Florida quashed that deci- and witness or informant informa-
shirt and carrying a gun. Officers sion and held the search invalid un- tion, including corroborated anony-
went to the bus stop within minutes der the Fourth Amendment. The mous tips. This is a reiteration of the
after receiving the information and case then came before the U.S. Su- Court’s landmark case, Terry v.
saw three black males, one of whom preme Court to determine whether Ohio.13
was wearing a plaid shirt. Apart an anonymous tip that a person is
from the tip, the officers had no carrying a gun is, without more, suf- Terry v. Ohio
reason to suspect any of the three of ficient to justify a police officer’s Terry involved three individu-
illegal conduct. The officers did not stop and frisk of that person. als who were stopped and frisked by
see a firearm or observe any un- The opinion of the Court deliv- Officer McFadden after he had ob-
usual movements to indicate the ex- ered by Justice Ginsburg held that served them repeatedly walking up
istence of a firearm. Without hesita- an anonymous tip of a person carry- and down a street and peering into
tion or question, one of the officers, ing a gun is not, without more infor- the window of a particular store. In
who was a 14-year veteran, frisked mation, sufficient to justify police Terry, the Court said, to justify a
the young man wearing the plaid officers stopping and frisking that stop, the officer must identify spe-
shirt and seized a gun from his person. The Court found that offic- cific articulable facts which, when
pocket. The other officer frisked the ers, for the protection of themselves taken with their logical inferences,
remaining two youths, against and others, may detain individuals establish a reasonable suspicion
whom no allegations had been based on a reasonable suspicion that that criminal activity is about to
made, and found nothing. The criminal activity is about to occur. occur. This makes the intrusion
youth who carried the gun was As long as officers can articulate a reasonable.
charged under state law with carry- separate reasonable suspicion that Officer McFadden was a 36-
ing a concealed firearm without a the individual is armed, they can year veteran with 30 years working
license and possessing a firearm conduct a carefully limited search the same beat. He observed the
while under the age of 18. of the individual’s outer clothing individuals and concluded that he
August 2000 / 29
did not know them and, based upon used to assault them. However, nei- They then saw the suspect leave the
his training and experience, deter- ther J.L. nor his associates were apartment building, enter the car,
mined that they were “casing the shown to pose a danger to the offic- and drive the route toward the spe-
joint” for an armed robbery. Having ers or to the public. cific motel. Officers stopped the car
come to this conclusion, Officer Anonymous tips alone seldom just short of the motel. A consen-
McFadden approached the indi- demonstrate the tipster’s basis of sual search of the car resulted in the
viduals to engage them in conversa- knowledge or veracity, unlike tips recovery of marijuana. After her ar-
tion. When Officer McFadden iden- received by police from known in- rest, cocaine was found in her purse.
tified himself and asked the formants whose reputation can be The Court held that the anony-
individuals who they were and what assessed and can be held respon- mous tip, standing alone, did not
they were doing, they gave sible if the allegations turn out to be justify White’s detention. However,
mumbled responses. It was only fabricated.14 However, the Court once police corroborated the
then that Officer McFadden frisked has recognized that there are situa- informant’s accurate prediction of
the individuals, having a reasonable tions in which an anonymous tip, the woman’s future movements, it
suspicion that they were armed and suitably corroborated, can be became reasonable for police to
therefore dangerous. His actions enough to give rise to the reason- think that the tipster had inside
were deemed reasonable by the able suspicion required to make an knowledge about the suspect and
Court. investigatory stop. bolstered his assertion about the co-
caine possession. Although the
Anonymous Tips and Court held that the detention was
“
Reasonable Suspicion reasonable in White, the detention
Terry v. Ohio and Florida v. was regarded as borderline in re-
J.L. present an interesting contrast. Reasonable suspicion gard to establishing the necessary
In Florida v. J.L., the officer’s sus- must be based on reasonable suspicion to stop and de-
picion that J.L. was carrying a tain. The Court explained that
weapon arose not from any personal
what officers know “knowledge concerning a person’s
observations, training, or experi- prior to their stop future movements indicates some
ence, but solely from a telephone and frisk, not on familiarity with that person’s af-
call made by an unknown caller. In what they find as a fairs, but having such knowledge
the course of investigating the result of a search. does not necessarily imply that the
anonymous tip, the officers did not informant knows, in particular,
”
identify themselves as police or whether that person is carrying hid-
make reasonable inquiries. They den contraband.”16
observed no unusual conduct that Predicting future behavior is
might have led the officers to rea- Anonymous Tips and Reliability important. Unlike the White case,
sonably conclude, in light of their In Alabama v. White,15 police the tip concerning J.L. provided de-
experience and training, that crimi- received an anonymous tip that a scriptive information, but no pre-
nal activity was about to occur or woman would be leaving a particu- dictive information. It, therefore,
that the individuals with whom they lar apartment at a particular time in left the police without any means to
were dealing were armed and dan- a particular vehicle. The tip also test the reliability of the informant’s
gerous. Officers are entitled to con- included information that the information and, more important,
duct a carefully limited search of woman would drive to a named mo- the informant’s credibility. All that
the outer clothing of individuals tel and would have cocaine in a the police knew in J.L. was the bare
who pose a danger to them for the brown attache case. Police corrobo- report of an unknown, unaccount-
protection of themselves and others rated the information by going to able informant who neither ex-
in the area and in an attempt to the apartment building and observ- plained how he knew about the gun
discover weapons which might be ing the car described by the caller. nor supplied any basis for believing
August 2000 / 31
foreseeable that people carrying assertion of illegality. The require- Endnotes
1
large amounts of drugs also carry ment that an anonymous tip bear Terry v. Ohio, 392 U.S. 1, 88 S. Ct. 1868
(1968).
weapons.22 The Court was con- some standard of reliability in order 2
Ibid.
cerned that these holdings would to justify a stop in no way dimin- 3
Welsh v. Wisconsin, 566 U.S. 740 (1984).
soon be used to justify an automatic ishes a police officers’ prerogative, 4
Schmerber v. California, 384 U.S. 757
frisk exception in cases where the in accord with Terry, to conduct a (1966).
5
Illinois v. Rodriguez, 110 S. Ct. 2793
anonymous tip alleged mere drug protective search of a person who (1990).
possession, allowing the “excep- has already been legitimately 6
Maryland v. Dyson, 119 S. Ct. 2013
tions to swallow the rule.”23 stopped. (1999).
7
The Court reaffirmed the rea- The Court, in Florida v. J.L., 8
U.S. v. Robinson, 414 U.S. 218 (1973).
U.S. v. Edwards, 415 U.S. 800 (1974).
sonable suspicion standard in Terry. recognized the serious threat that 9
Chimel v. California, 395 U.S. 752
It decided that the Terry rule creates armed criminals pose. Firearms are (1969).
the proper balance between the dangerous and extraordinary dan- 10
Maryland v. Buie, 494 U.S. 325 (1990).
11
safety concerns of police and an gers sometimes justify unusual pre- South Dakota v. Opperman, 428 U.S. 362
(1976).
individual’s personal privacy guar- cautions. The Terry rule is such a 12
Florida v. J.L., 120 S. Ct. 1375 (2000).
anteed by the Fourth Amendment. precaution. It permits protective po- 13
Terry v. Ohio, 392 U.S. 1, 88 S. Ct. 1868
Law enforcement officers must lice searches based on a reasonable (1968) at1874.
14
conduct a case-by-case analysis and suspicion rather than the higher Adams v. Williams, 407 U.S. 143, 92 S.
Ct. 1921 (1972) at 1923-1924.
be able to articulate why a particular 15
Alabama v. White, 496 U.S. 325, 110 S.
individual is armed.
“
Ct. 2412 (1990) at 2415.
The Court did note that under 16
Florida v. J.L., 120 S. Ct. 1375 (2000) at
certain circumstances the danger al- 1378.
17
Id at 1381.
leged in an anonymous tip might be ...to justify a stop, the 18
Ibid.
so great as to justify a search with-
out a showing of reliability. How-
officer must identify 19
20
Ibid.
Id at 1379.
ever, the Court did not articulate specific...facts 21
Id. at 1380.
what these circumstances might be. which...establish a 22
See U.S. v. Sakyi, 160 F.3d 164 (C.A. 4
1998) at 169; U.S. v. Dean, 59 F.3d 1479,
The Court did state that in places reasonable suspicion (C.A. 5 1995) at 1490, n.20; U.S. v. Odom, 13
where there is a diminished expec- that criminal activity F.3d 949 (C.A. 6 1994) at 959; U.S. v.
tation of privacy, such as in air- is about to occur. Martinez, 958 F.2d 217 (C.A. 8 1992).
23
Richards v. Wisconsin, 520 U.S. 385, 117
ports 24 or schools, 25 protective S. Ct. 1416 (1997) at 1421-1422. (rejecting a
”
searches could be conducted on the per se exception to the knock and announce rule
basis of information that would not for narcotics cases partly because the reasons
be sufficient elsewhere. for creating an exception in one category [of
standard of probable cause nor- Fourth Amendment cases] can, relatively easily,
Conclusion be applied to others, thus allowing the
mally required for police to conduct exception to swallow the rule).
An anonymous tip providing an a search. However, the Court has 24
See Florida v. Rodriguez, 469 U.S. 1, 105
accurate description of a subject’s reminded law enforcement that S. Ct. 308 (1984) (per curiam).
25
readily observable location and ap- even a limited search of an See New Jersey v. T.L.O., 469 U.S. 325,
105 S. Ct. 733 (1985).
pearance identifies the person individual’s outer clothing “ consti- 26
Terry v. Ohio, 392 U.S. 1, 88 S. Ct. 1868
whom the tipster means to accuse. tutes a severe...intrusion upon cher- (1968).
However, this descriptive informa- ished personal security, and surely Law enforcement officers of other than
tion alone is not necessarily enough must be an annoying and frighten- federal jurisdiction who are interested in
to show that the accused is engaged ing, and perhaps humiliating expe- this article should consult their legal
advisors. Some police procedures ruled
in criminal activity. Predictive in- rience.”26 As such, it should only permissible under federal constitutional law
formation may be necessary to es- occur when permitted by the Con- are of questionable legality under state law
tablish the reliability of the tip in its stitution of the United States. or are not permitted at all.
Official Business
Penalty for Private Use $300
Subscribe Now