You are on page 1of 35

April 2002

Volume 71
Number 4
United States
Department of Justice
Federal Bureau of Investigation
Washington, DC 20535-0001

Robert S. Mueller III


Director
Features
Contributors' opinions and statements
should not be considered an
endorsement by the FBI for any policy,
program, or service.
Special Event Safety Thorough planning, strong leadership,
The attorney general has determined
that the publication of this periodical is
necessary in the transaction of the
and Security 1 and cooperation among agencies can
help bring about a successful and
public business required by law. Use
By Greg Morrison and secure special event.
of funds for printing this periodical has Joseph Airey
been approved by the director of the
Office of Management and Budget.
Forensic Pyscholinguistics Analyzing the language of written or
The FBI Law Enforcement Bulletin
(ISSN-0014-5688) is published
monthly by the Federal Bureau of
By Sharon S. Smith and 16 recorded communications may aid
investigators in identifying and
Investigation, 935 Pennsylvania Roger W. Shuy
Avenue, N.W., Washington, D.C.
assessing offenders.
20535-0001. Periodicals postage paid
at Washington, D.C., and additional Hunting Terrorists Using A variety of reward mechanisms are
mailing offices. Postmaster: Send
address changes to Editor, FBI Law
Enforcement Bulletin, FBI Academy,
Confidential Informant 26 available to law enforcement agencies
seeking terrorist-related information.
Madison Building, Room 209,
Reward Programs
Quantico, VA 22135. By Douglas A. Kash
Editor
John E. Ott
Associate Editors Departments
Cynthia L. Lewis
Bunny S. Morris
Art Director 5 Crime Data 24 Bulletin Reports
Denise Bennett Smith
Assistant Art Director
Victimization Survey Intimate Partner Violence
Stephanie L. Lowe Drugs and Crime
Staff Assistant 6 Research Forum Uniform Crime Reporting Data
Linda W. Szumilo Deadly Force Animal Abuse
This publication is produced by
members of the Law Enforcement 14 Book Reviews 31 VICAP Alert
Communication Unit, Protect Your Life Attention: Homicide, Sex
William T. Guyton, chief.
Criminal Poisioning Crimes, and Robbery Units
Internet Address
leb@fbiacademy.edu 22 Police Practice
Send article submissions to Editor,
Citizen Firearm Safety
FBI Law Enforcement Bulletin, FBI Program
Academy, Madison Building, Room
209, Quantico, VA 22135.

ISSN 0014-5688 USPS 383-310


Special Event Safety
and Security
Protecting the World Alpine
Ski Championships
By GREG MORRISON and JOSEPH AIREY

M any consider the alpine from the national ski teams of more ongoing internal and international
village of Vail, Colo- than 60 countries participated. The political or civil turmoil. Officials
rado, as one of the opening ceremonies on the evening anticipated attendance by 2,000
world’s premier ski resorts. Lo- of January 30 culminated a 3-year members of the international media
cated in a scenic valley at an eleva- security planning process that in- and a worldwide television audi-
tion of 8,150 feet, the nearby sum- volved the participation of numer- ence of more than 500 million
mit of Vail Mountain climbs to ous federal, state, and local agen- people. Additionally, numerous
nearly 11,000 feet. Because of such cies. In addition, the 1999 WASC dignitaries, heads of state, and inter-
natural amenities, Vail has become was one of the first events that the national leaders of industry had ex-
a popular location for many winter U.S. attorney general, under the De- pressed interest in attending. Secu-
sport competitions. partment of Defense provisions for rity concerns became heightened by
During January and February support to civilian sporting events, an October 19, 1998, arson attack
1999, Vail hosted the World Alpine certified. on Vail Mountain. The Earth
Ski Championships (WASC), a Authorities predicated security Liberation Front, a group known
winter sporting event second in planning for the 1999 WASC on the for its involvement in acts of
scope only to the Winter Olympic invitation of 90 national ski teams, “ecoterrorism,” claimed responsi-
games. Five hundred competitors many from countries involved in bility for the attack, which caused in

April 2002 / 1
excess of $12 million in damage. international scope of the event, the planning, logistics, and finance—
No matter what the event, well-de- FBI also became involved. the standard ICS structure did not fit
veloped plans for maintaining secu- The initial organizational struc- the committee’s specific needs.
rity and for responding to a critical ture of the security committee con- Therefore, it developed a unified
incident, should one arise, remain sisted of a chairman, 2 joint vice command structure, uniquely tai-
crucial for a successful outcome. chairmen, and 12 working groups: lored for the needs of the WASC,
venue security, criminal justice, and reorganized the working groups
ORGANIZATION communications, command post, to fit the new structure. The goal
Soon after the 1999 champion- traffic/parking, special operations, was to efficiently plan and execute
ships were awarded to Vail, au- fire/emergency services, training, safety and security operations by
thorities established an organizing community relations, intelligence, using an ICS structure to coordinate
committee that appointed the Vail logistics/housing, and volunteers. the resources of numerous federal,
police chief as security chairman in After approximately 6 months of state, and local response agencies.
December 1995. The chief created a planning, it became apparent that Due to the geographic setting of
security committee in early 1996 this structure overlapped and often Vail Valley and the widely dis-
and assembled a multiagency task resulted in duplicative efforts by the persed venue sites, the security
force, which included more than 30 working groups. The chairman and committee defined its operational
federal, state, and local law enforce- vice chairmen of the security com- jurisdiction as being from the top of
ment, fire, health emergency man- mittee met with representatives of the Vail Pass to the Eagle County
agement, military, and private secu- the Colorado Office of Emergency Airport, a distance of nearly 60
rity agencies. Because of the large Management who recommended miles. Then, the committee imple-
geographic area involved and the improving the organizational struc- mented a unified command, con-
overlapping jurisdictions, the com- ture by implementing the incident sisting of high-ranking personnel
mittee appointed the western com- command system (ICS). from the Vail Police Department,
mander of the Colorado State Patrol While the committee agreed the Eagle County Sheriff’s Office,
and the Eagle County sheriff as on the use of ICS—which incorpo- the Colorado State Patrol, and the
joint vice chairmen. Due to the rates the functions of operations, FBI.
Under the direction of the secu-
rity committee’s chairman, the uni-
fied command cooperatively made
all major decisions, both during the
planning process and the actual
management of the event. To main-
tain an efficient command structure
during specific events, the unified
command designated one of its
members as an incident com-
mander, based upon primary law
enforcement jurisdiction. On occa-
sion, several different events at
separate locations occurred simul-
taneously. Therefore, the unified
Chief Morrison formerly led the Special Agent Airey serves in the command assigned venue supervi-
Vail, Colorado, Police Denver, Colorado, FBI office. sors, who reported to the incident
Department and currently heads commander at the command post, to
the Grand Junction, Colorado, oversee individual events.
Police Department.

2 / FBI Law Enforcement Bulletin


CERTIFICATION linguistics, temporary facilities, and post with modular furniture, tele-
Hosting a major winter sporting training. During the precertification phone communications, computer
event was not new to Vail officials. process, the security committee and radio networks, remote video
In fact, Vail is the only city in the chairman and the FBI worked equipment, and large-format video
world to host the World Alpine Ski closely with DOD representatives displays. The unified command
Championships a second time, the to ensure that the categories were developed a layout of command
first having been in 1989. Based on supportable and the requested re- post personnel positioning and de-
this previous experience, the secu- sources were not otherwise avail- signed an exercise to evaluate the
rity committee knew that providing able. In several of the categories, structure.
for the safety and security of an joint responsibility was proposed Shortly after the start of the
event of this scope and duration between FBI and DOD resources. command post exercise, it became
would overwhelm locally available obvious that the number and physi-


resources. During the 1989 champi- cal location of participants created
onships, the U.S. Department of an atmosphere of chaos. The uni-
Defense (DOD), in response to di- fied command suspended the exer-
rect requests from the organizing To evaluate the overall cise and revised the number of per-
committee and local law enforce- safety and security sonnel and their physical locations
ment officials, had provided logisti- plan, authorities held to facilitate communication among
cal and emergency response sup- a large-scale practice key personnel and to reduce back-
port. By 1996, the National Defense ground noise. The new structure
Authorization Act required that
exercise.... proved a success, both for the re-
mainder of the exercise and during


similar support and assistance only
could be attained for essential the WASC.
safety and security functions fol-
lowing a certification process re- The FBI Denver office for- TABLETOP EXERCISE
quiring the concurrence of the U.S. warded the finalized request, with a To evaluate the overall safety
attorney general. letter of concurrence, to the Special and security plan, authorities held a
The certification process, es- Events Management Unit (SEMU) large-scale practice exercise in Vail
tablished by Title 10 U.S. Code, at FBI headquarters. SEMU coordi- on September 17, 1998. Participa-
Section 2564 (a), requires that offi- nated the approval process with se- tion included federal, state, and lo-
cials responsible for providing law nior officials of DOD and DOJ. The cal agencies, as well as representa-
enforcement and safety services attorney general approved the re- tives from the military, private
to civilian sporting events submit quest in October 1998. security, and volunteers. Presented
written requests for specific as a “no-fault” event by the Colo-
categories of DOD support to the COMMAND POST rado Office of Emergency Manage-
U.S. Department of Justice (DOJ). The size, complexity, and num- ment, the exercise was designed to
In compliance with DOJ proce- ber of personnel involved in secu- evaluate issues, such as interagency
dures, the security committee rity for the WASC created the need notification and coordination,
chairman submitted a written re- for a state-of-the-art command post. command and control, and commu-
quest to the FBI Denver office in The unified command determined nications. Participants learned a
February 1998. The categories that the Vail Police Department was great deal and, most important, de-
deemed necessary for support and the optimal site due to its central veloped liaisons. Because of the
not available locally included com- location and close proximity to the tabletop exercise, the unified
munications, explosive ordnance majority of the events. Based on the command implemented changes
disposal, transportation/air support, certification of the WASC, DOD that strengthened the incident
physical security, operations center, designed and equipped a command command structure.

April 2002 / 3
Weather and Traffic
The geographic nature of Vail
Valley allows for some of the best
skiing in the world. It also creates
limited road access and dramatic
changes in weather. During the
WASC, as many as 50,000 specta-
tors were on hand at any given time,
and several heavy snows, combined
with already limited parking, kept
the command post busy. The inclu-
sion of public works in the com-
mand post, however, made it pos-
sible to rapidly assess problem
areas and take steps to redirect traf-
fic flow. Helicopter support from
THE EVENT the opening ceremonies, the secu- the FBI and DOD allowed law en-
rity committee conducted a number forcement personnel to view prob-
On January 30, 1999, after 3
of classes on handling such matters lem areas from the air, while
years of preparation, planning, and
with all of the emergency respond- prepositioned electronic traffic
training, the opening ceremonies
ers, private security personnel, and signs quickly were programmed to
for the WASC began. From the
volunteers who quickly notified the provide routing information. This
start, a constant flow of issues
command post of anything unusual combined effort helped to keep
needed to be addressed, ranging
during the WASC. such issues at a manageable level.
from missing children to unat-
tended or suspicious packages. The Private and Volunteer Security
extensive planning and practice ex- Mercury Scare
ercises paid off as the established During the first few days of Despite months of planning,
security apparatus handled these in- the WASC, numerous mercury preparation, and training, the volun-
cidents effectively and efficiently. switches began disappearing out of teer and private security functions
However, the command post re- local condominiums. Shortly there- quickly became overwhelmed. This
mained very busy responding to a after, a Vail official remarked that was due, in part, to the large number
wide variety of safety and security he had heard a rumor that the water of spectators and competitors who
issues, including unattended pack- supply had been contaminated with seemed to ignore their directions.
ages, a mercury scare, weather and mercury. Authorities conducted a The planning section in the com-
traffic problems, and private and threat evaluation and determined mand post organized a schedule of
volunteer security concerns. that the amount of missing mercury, uniformed officers drawn from the
if concentrated in a local water sup- Colorado State Patrol and surround-
Unattended Packages ply tank, could pose a health risk. ing municipal police forces to pro-
As part of the security plan for The command post quickly ar- vide a more visible presence at key
the WASC, prestaged teams from ranged for all of the local water sup- security points. While the local edi-
the FBI; Bureau of Alcohol, To- plies to be sampled and analyzed. torial pages reported some grum-
bacco and Firearms; and DOD Ex- The resulting tests proved negative. bling about the increased police
plosive Ordnance Disposal stayed Although officials anticipated press presence, the security problems
busy responding to numerous re- inquiries regarding the rumor, the abated. In fact, many visitors re-
ports of unattended or suspicious matter faded without further media quested photographs with the Colo-
boxes, bags, and backpacks. Prior to attention. rado State Patrol troopers.

4 / FBI Law Enforcement Bulletin


CONCLUSION the 2001 World Mountain Bike well as individuals from other coun-
Through extensive planning, Championships in Vail and the tries, recognize the dangers of at-
strong leadership, and exceptional 2002 Winter Olympics in Salt Lake tending such events, but also know
interagency cooperation, the 1999 City, Utah. that to avoid them plays into the
World Alpine Ski Championships With the events of September hands of those who wish to destroy
in Vail, Colorado, took place in 11, 2001, the need for such coopera- a free society. The public safety
a secure, yet enjoyable, venue. tive efforts becomes of even greater community must unite to ensure
The relationships built during this importance. All public safety agen- that they can protect all law-abiding
event continue to produce benefits cies should realize that they must individuals who attend special
for the community. Many of those make concerted efforts to provide events, regardless of the content or
involved in the planning and execu- safe and secure environments for all purpose, and to prove to those wish-
tion of the safety and security plan types of special events, now more ing to cause panic and alarm that
also participated in the planning for than ever. The American public, as their attempts will fail.

Crime Data

National Crime Victimization Survey

A ccording to the U.S. Department of


Justice’s National Crime Victimization
Survey, Americans experienced about 1 million
Most violent crime victims (67 percent) did
not face an armed offender during 2000. Rape
and sexual assault victims were the least likely to
fewer violent crimes in 2000 than they did in be threatened or harmed by an armed offender
1999. The Bureau of Justice Statistics (BJS), (6 percent), while criminals used a weapon in 55
which conducts the survey, noted that the violent percent of the robberies, including 26 percent
and property crime victimization rates were at with a firearm, 14 percent with a knife, and 13
their lowest since the survey began in 1973. The percent with another type of weapon. In 3
2000 victimization level continues a downward percent of the victimization incidents, the type
trend in the number of violent victimizations that of weapon was not ascertained.
began in 1994. Forty-eight percent of the violent victimiza-
Almost every demographic group identified tions and 36 percent of the property crimes were
in the survey—including males, females, whites, reported to law enforcement. Historically,
blacks, Hispanics, non-Hispanics, and 12-to14- victims most commonly do not report crime
year-olds—experienced less violent crime in because they feel the offense was a private or
2000 than they did during 1999. The largest rate personal matter or the offender was unsuccessful
decreases between 1993 and 2000 were for or the stolen property was recovered.
Hispanics (down an average 5.7 percent per year) The report, Criminal Victimization 2000,
and males (down an average annual 4.6 percent). Changes 1993-2000 (NCJ 187007), by BJS
Western and Midwestern residents were violence statistician Callie Marie Rennison, may be
victims at rates that were higher than for North- obtained from the BJS clearinghouse at 1-800-
eastern and Southern residents. 732-3277 or from the BJS Web site at http://
www.ojp.usdoj.gov/bjs.

April 2002 / 5
Research Forum

© George Godoy

Deadly Force
A 20-Year Study of
Fatal Encounters
By Larry C. Brubaker, M.S.

A round 9:45 p.m. on a late August evening,


neighbors in a small rural Minnesota town
called police to report that a 42-year-old former
patient of a mental facility who lived with his 75-
devastating consequences. When a shooting results in
the death of a citizen, emotions erupt from the com-
munity, media, the victim’s family, and the law
enforcement profession. People take sides, and
year-old father was indiscriminately firing shots. everyone seems to have an opinion. While officers
Attempts to negotiate with him to come out of the have the responsibility to protect members of society
house lasted over 3 hours. The father eventually and swear an oath to carry out their duties, occasion-
exited the residence and told officers that he would go ally, they must resort to the use of deadly force when
back in and get his son. As a deputy rushed forward to circumstances call for it. At that time, often within a
escort the father to safety, the son turned on a door- split second, officers must draw upon their experience
way light and suddenly appeared. He shot the deputy and training, in many different disciplines, to make
twice with a .357-caliber revolver from a distance of the right choice. That quick decision may result in
1 to 2 feet. Two officers returned fire, killing the man years of criminal or civil legal proceedings and
at the scene. Although wearing body armor, the forever alter the officers who found it necessary to
deputy died later from one round that struck him use deadly force.
below the vest.
This actual incident illustrates two events that law METHODOLOGY
enforcement officers never want to experience— During the 20-year period of 1981-2000, the state
attending the funeral of a fellow officer and taking the of Minnesota experienced 78 incidents where officers,
life of a person while acting in their official capacity. while acting in their official capacity, used deadly
While losing a fellow officer is a heartrending trag- force that resulted in the deaths of 80 citizens. The
edy, causing the death of someone often has equally author personally interviewed many of the officers in

6 / FBI Law Enforcement Bulletin


those incidents to obtain their rank, experience, Division of Alcohol and Gambling Enforcement, state
caliber of firearm, and firearm training requirements, conservation officers, metropolitan transit police
along with the type of weapon used by the offender officers, and the Department of Corrections’ Fugitive
and the impact of the investigation following the Apprehension Unit officers.3 Great bodily harm
incident. The author also reviewed investigative denotes bodily injury that creates a high probability
files and photographs, as well as media reports, of death or causes serious permanent disfigurement,
to determine— a permanent or protracted loss or impairment of the
• the feelings and needs of the officers involved in function of any bodily member or organ, or other
such acts; serious bodily harm.4 Reasonable refers to any action
that is fair, proper, just, moderate, or suitable under
• the conditions, such as time of day or officer
the circumstances.5 Firearm means a weapon, espe-
assignment, that increase the possibility of the
cially a pistol or rifle, capable of firing a projectile
need to use deadly force;
and using an explosive as a propellant.6
• better methods to prepare officers through
training for such an event; and OVERVIEW OF OFFICERS INVOLVED
• the relationship between the assignment, experi- The research determined that 140 male officers
ence, training, age, and sex of the officers in- and 8 female officers fired weapons during incidents
volved in such incidents. that resulted in the deaths of 80 individuals. Three
officers were off duty, but in
Officer Composition uniform, when the incidents
The study was restricted to occurred. One female officer and


peace officers in Minnesota. In one male officer were providing
2000, Minnesota had 8,949 sworn security at private business
officers: 8,125 males and 824 Uniform patrol establishments. The third off-duty
1
females. Information in the study represented the officer, a male, was in his personal
related to the small population of overwhelming type vehicle when an individual ran
148 officers (six officers were of assignment of the past shooting at other people. The
involved in two separate shootings) officers. shooter turned his weapon toward
who fired weapons during those 20 the officer, who immediately shot
and killed the suspect.


years at 80 individuals who
subsequently died. One hundred thirty-seven of
the officers involved were Cauca-
Term Definitions sians, five were African-Ameri-
For purposes of the study, deadly force relates cans, two American Indians, two Asians, and two
to the force that an actor uses with the purpose of Hispanics. The average age was 34 years and 11
causing, or that the actor should reasonably know months. The oldest officer was 59, and two at age
creates a substantial risk of causing, death or great 23 were the youngest. The age of 28 was the most
bodily harm. The intentional discharge of a firearm frequent, with 15 officers at that age, followed by
in the direction of another person, or at a vehicle in 14 officers at age 33.
which another person is believed to be, constitutes
deadly force.2 Peace officer describes an employee or Level of Experience
elected or appointed official of a political subdivision The experience level of the officers proved
or law enforcement agency who is licensed by the significant. Most of the officers were not “rookies.”
board and charged with the prevention and detection The average experience at the time of the event was
of crime and the enforcement of the general criminal just under 10 years, including law enforcement
laws of the state who has the full powers of arrest, experience in other states or in the military police.
including the Minnesota State Police, agents of the However, one officer had only 5 days on the job,

April 2002 / 7
while another had only 4 months, but had been a Patrol officers and one officer from the Department
community service officer with the same agency for of Natural Resources fired their weapons. One
3 years. Two officers, with 30 years each, had the hundred eighteen of the officers involved came from
most experience. the 7-county Minneapolis/St. Paul metropolitan area.
Larger organizations, specifically the Minneapolis
Type of Assignment and St. Paul Police Departments, had a higher fre-
Uniform patrol represented the overwhelming quency of shootings. Just over one-half, 79 officers,
type of assignment of the officers. However, a variety were with departments employing more than 100
of other assignments also occurred. Four officers were officers.
assigned to a moving surveillance of convenience
stores when a robbery occurred. A high-speed chase Weapons Used
resulted, and all of the officers fired their weapons. During the years covered by the study, Minnesota
One perpetrator was killed, and the other was peace officers routinely used three types of weapons
wounded. While serving civil papers at a financial in the performance of their duties—a revolver, a
institution, another officer semiautomatic handgun, and a
encountered an armed individual shoulder-type weapon. The
on parole for bank robbery. One standard weapon into the mid-
officer purported to be a pizza 1980s was the .38- or .357-caliber
deliveryman in an attempt to gain
access for a search warrant to a
residence where narcotics were
sold. When the “doorman” at the
“ ...the majority of
officers commented
that they were not
revolver. Later, the semiauto-
matic handgun gained popularity
and now constitutes the issued
weapon for almost all depart-
residence displayed a weapon, prepared for the ments. Initially, the 9-millimeter
the officer shot and killed him. psychological impact was the most common; however,
An officer involved in a decoy upon themselves, their more recently, some departments
role accidentally fired his weapon families, and their have begun using .40- and .45-
during an arrest of a man who departments.... caliber handguns. The typical
had committed a felony. In shoulder weapon, a .12-gauge
another incident, a detective was
eating lunch when a citizen came
running into the restaurant and
announced a robbery at a nearby bank. The robber
” shotgun loaded with 00 buckshot,
was employed in all except one
shotgun shooting, where rifle
ammunition was used in the shotgun. Additionally,
shot at the officer who returned fire, killing the tactical teams used 9-millimeter shoulder-type
subject. Another bank robber led officers on a long, weapons. However, one officer on a tactical team
high-speed chase. Throughout the chase and subse- used a .308-caliber sniper rifle to shoot a person
quent encounter, six officers from four different wanted for an armed robbery after a prolonged
agencies fired at the robber. barricade incident, and a deputy fired a .223-caliber
Only one tactical team was involved in a fatal rifle during another shooting. Three officers changed
shooting from 1981-1990. During the last 10-year weapons during incidents. In two situations, officers
period, tactical teams were involved in seven had difficulty ejecting spent rounds from shotguns
shootings. Two of these were regional-type teams and changed weapons. The third officer changed
that responded to specific incidents. weapons after firing all of the rounds from his
shotgun.
Agency Breakdown
Of those involved in fatal shootings, police Extent of Firearms Training
departments employed 122 of the officers, whereas Familiarity with the weapon did not appear to
22 were sheriff deputies. Three Minnesota State pose a problem with any shooting. Only the two

8 / FBI Law Enforcement Bulletin


Suicide by Cop

W hile determining some suicide-by-cop


situations remains difficult, these two
incidents from the study demonstrate how two
six officers responded by shooting and killing
the man. The man’s weapon was empty; he had
fired all of the cartridges.
individuals created confrontations with police A woman entered a 24-hour convenience
officers to bring about their own demise. store/gas station at 3 a.m. in mid-October. She
On a hot July day, police located a 49-year- announced a robbery to the store attendant and
old fugitive driving his vehicle. Accompanied by claimed to have a gun in a crumpled brown
his 14-year-old son, the fugitive started a chase paper bag that she pointed toward him. Because
and shot at the officers. He fled to a large the outline of the bag resembled a handgun, he
warehouse where his wife worked. Police gave her the money that she demanded. She told
evacuated 120 employees from the building; him to call the police and then waited to hear
however, the man kept his son as a hostage for him report the robbery before she left the scene.
10 hours before releasing him. The boy had his Officers responded and located her a short
father’s hat, glasses, wallet, and—unknown to distance away. They repeatedly asked her to
police at the time—a farewell letter. SWAT drop the bag that she was pointing at them and
teams entered the building after hearing one show them her hands. She screamed words to
shot. After a long search, they located the man the effect “you want to see the gun, I’ll show
lying on his back with his weapon, a .44-caliber you the gun.” She charged toward an officer
revolver, in his hand resting on his chest. SWAT using a metal garbage dumpster for cover. Two
members yelled at the man to surrender, but officers fired, killing the 35-year-old woman
received no response. Suddenly, he sat up and who once had been a reserve officer. The brown
turned the weapon toward the officers. Five of paper bag contained a hairbrush.

incidents involving a shotgun revealed a problem with Number of Officer Casualties


the weapon not functioning properly. That problem One officer lost his life during the incident
entailed ejecting the spent shell and appeared related described at the beginning of this article. In addition,
to the stress of the incident. Two accidental dis- one officer fatally shot an individual who had killed
charges of weapons resulted in death. One involved a an officer from a nearby jurisdiction approximately
shotgun used in a decoy type of assignment, and the 2 hours earlier during a traffic stop.
other occurred when the officer slipped on a wet Six officers involved in shootings were physically
running board climbing into a stolen truck. injured. One officer had glass and lead fragments hit
Most agencies were very prudent with firearms him, and another had minor glass cuts. Only one of
training. Over one-half of the officers interviewed had these officers required medical attention at a hospital.
trained with their weapons within 2 months of the An officer from the Minneapolis Police Department
shootings. One officer had trained approximately 36 suffered a serious physical injury when he was
hours before the event, while another officer had not stabbed twice in the neck from behind before shooting
fired his weapon for over a year. Most agencies his assailant. He recovered and later returned to duty.
required their officers to qualify with their weapons Assailants who later were killed injured three St. Paul
quarterly, whereas a few agencies stipulated that their officers. On one occasion, the assailant wrestled an
officers shoot every 2 months. Also, most depart- officer’s weapon away from him and shot one officer
ments had some form of decision-based, or “shoot/ in the foot and another officer, wearing a ballistic
don’t shoot,” training. vest, in the chest. The officer shot in the chest

April 2002 / 9
grabbed the cylinder of the revolver so it could not officers afford to wait for suspects who appear armed
turn. The officer who had lost the weapon regained when in actuality they are wielding a nonlethal replica
possession at that point and fatally shot the offender. weapon, pellet gun, starter’s pistol, or paint gun? Can
A man shot another St. Paul officer in the hand and officers, who have to react in a split second, wait for
chest with a .45-caliber handgun. The officer man- individuals charging them with a knife, screwdriver,
aged to return six shots that killed the individual. An pry bar, or other type of instrument that appears to
innocent bystander standing behind the officer was hit them as a lethal weapon? What should officers do
in the leg by one shot from the assailant. All of the when a person drives a vehicle, a very large and
injured St. Paul officers recovered and returned to dangerous weapon, at them? How can officers know
work. the mental state or purposeful intentions of the driver?
Further research into these deadly situations must be
CONDITIONS AT THE SCENE conducted to discover ways to help officers who find
Research showed that several factors influenced themselves in these circumstances.
conditions at the scene of the Conversely, examples of
shootings. These included the incidents where individuals were
demographics of the individuals armed with more than one weapon


slain and the weapons they bran- or showed considerable intent to
dished, the number of officers harm the officers involved in-
involved, and the dates and times cluded one suspect who pointed a
Familiarity with the
that the shootings occurred. shotgun at officers and was shot,
weapon did not
but then pulled a handgun. Two
Demographics of appear to pose a individuals, one in rural Minne-
Individuals Slain problem with any sota and one during a metropoli-
Officers shot 50 Caucasian and shooting. tan area bank robbery, used .223-
18 African-American individuals. caliber rifles to begin shooting at
The remaining 12 consisted of 5
Native Americans, 5 Asians, 1
Cuban, and 1 Iranian. The average
age of those killed was 32 years
” officers and then changed to 9-
millimeter handguns. Two indi-
viduals were shot when they
attempted to obtain officers’
and 8 months. Two individuals at 13 years of age (the service weapons. One succeeded and shot two offi-
same incident) were the youngest, and the two oldest cers; however, the weapon was retrieved and used to
were 65 years old. fatally shoot the person. Another took an officer’s
handgun, but was shot by that officer, using his
Weapons Brandished shotgun, and aided by two other officers. These
Officers faced a variety of weapons. Forty-two situations illustrate the need for officers to remain
suspects confronted officers with firearms—34 used vigilant in the performance of their duties to ensure
handguns and 8 employed shoulder-type weapons. the safety of the citizens they serve and themselves
Twenty suspects wielded knives or edged weapons, as well.
and four utilized vehicles as weapons. In addition,
two officers shot two suspects accidentally. A most Number of Officers
significant part of the research revealed that, because The number of officers at the shooting scene
some of the shootings took place in poorly lighted varied somewhat; however, just over one-half of the
areas, 21 officers shot 12 suspects who appeared incidents (40 of the 78) had only one officer firing a
armed with deadly devices, such as handguns, knives, weapon. Two separate events occurred where only
or other lethal weapons. one officer shot a weapon and two individuals died.
This last category raises important questions that Twenty-two situations involved two officers firing
the criminal justice community must consider. Can their weapons; seven incidents had three officers; and

10 / FBI Law Enforcement Bulletin


five had four officers. Two incidents involved five Department investigated two shootings by MPD in the
officers, and the remaining two had six officers firing city of Minneapolis in 2000. One MPD shooting in
their weapons. 2000 occurred in Saint Paul, and the Saint Paul Police
Department’s Homicide Unit investigated that case.
Dates and Times Smaller police departments typically had the BCA
The day of the week with the most shootings and the residing county sheriff conduct the shooting
represented an interesting finding. Wednesday had the investigation. Sheriff’s departments had the BCA
most shootings with 24. Saturday, Sunday, and investigate. When requested, the FBI conducted a
Monday each had 10 shootings. One officer com- separate investigation to determine whether a civil
mented that he believed that Wednesday was high rights violation occurred. Additionally, every case in
because most burglars and armed robbers commit the 7-county metropolitan area went to a grand jury
their deeds during the week and proceeding, with no charges
usually at night. Most know that being brought against any officer.
weekends have more officers on Many prosecuting attorneys in
duty for the heavier number of calls counties outside the metropolitan
into neighborhoods for parties and area routinely decline prosecu-
domestic disputes. Burglars and tion without grand jury participa-
robbers do not want officers tion. Some families of deceased
accidentally coming across them individuals received civil awards.
during their illegal activity. Three cases went to trial with no
Wednesday also represented the money being awarded.
day of the week with the second
highest number of officers killed Officer Reaction
due to criminal action (108) for the Most officers felt that they
10-year period, 1990-1999. Friday were well prepared tactically for
was first with only two more the shooting. By contrast, the
officers (110) killed.7 majority of officers commented
The time of day, however, that they were not prepared for
proved unsurprising. Twenty-six of © George Godoy the psychological impact upon
the shootings, just under one-third, themselves, their families, and
occurred during the 4-hour period from midnight to 4 their departments after the event. Most officers
a.m. With the addition of the 4 hours before midnight, believed that fellow officers supported them after the
over one-half of the shootings occurred during that 8- shootings; however, some were upset at the adminis-
hour time period. This also was consistent with the trators of their departments. Those few officers
time of day when most felonious line-of-duty officer thought that the administrators were worried more
deaths occurred.8 about the image of their departments than the well-
being of their officers. Some officers described
POSTSHOOTING ANALYSIS “flashbacks” on occasions where they responded to a
Of course, every case was classified as a homi- similar situation or when they drove past the location
cide and investigated thoroughly. Usually, the larger where the incident occurred.
departments, such as those in Minneapolis and Saint One officer stated that he was very satisfied with
Paul, had their respective homicide units investigate his agency. He was given a different weapon, com-
the shootings. In 1999, the Minnesota Bureau of pleted his interview with representation, donated
Criminal Apprehension (BCA), the investigative mandatory blood samples, received explanations of
branch of the Minnesota attorney general, investi- administrative procedures, and had his fiancé brought
gated two shootings by the Minneapolis Police to the office—all within 2 hours of the incident.
Department (MPD). The Hennepin County Sheriff’s Officers from other jurisdictions in the same shooting

April 2002 / 11
told him later that it took their agencies most of the Although the weapon was an authentic-looking
day to sort out everything. It was a complete opposite replica, the subsequent investigation could not
and negative event for them. determine if this was an officer-precipitated suicide. It
Six of the officers were in two different fatal also remained difficult to determine the motivation of
shootings. One officer was in his second shooting 16 someone under the influence of alcohol or other drugs
years after the first one. One officer was at a different who charged an officer with a knife or club when the
agency 5 years after the first shooting. During the officer was pointing a firearm at the attacking person.
second event, he and another officer fired simulta- Overall, the study revealed that 17 of the 80 shootings
neously at a man who had just killed his mother and reviewed possibly were suicide-by-cop incidents.
stabbed his father. One of the officers in a shooting
death in the 1980s recently commented, “I’d quit RECOMMENDATIONS
[law enforcement] if I had another fatal shooting.” The author discovered several significant issues
Other than through retirement, relating to the use of deadly force as a result of the
seven of the officers left the law study. Through personal inter-
enforcement profession. One views with officers involved in


officer began a new career in a such situations, he established four
field that he had worked in part recommendations.
time prior to the shooting. Two First, an agency other than the
Research showed
officers had to leave as existing
medical conditions became worse
and made them unable to continue
in law enforcement. Another
“ that several factors
influenced conditions
at the scene of the
department of those officers firing
their weapons should investigate
the fatal shootings. A large metro-
politan department should have the
officer left a department in a shootings. county sheriff, state investigative
dispute over a separate matter. agency, or another nearby large
Four officers (three males and one department that routinely investi-
female) quit as a direct result of
the shooting incident. Two of the
four continued working for a
” gates homicides conduct the
investigation. This is not a reflec-
tion of competency or integrity of
period of time before leaving their agency. In addition the officer’s department, but, rather, an attempt to
to these seven officers, one officer later died of a eliminate any question of partiality or cover-up.
heart attack while on duty. Second, firearms training should include more
low-light and artificial-light shooting. The officers
Suicide by Cop interviewed also indicated that training scenarios of
The exact number of deaths through suicide by actual deadly force situations are more believable and
cop, or officer-precipitated suicide, proved somewhat beneficial. The use of wax or paint bullets in these
difficult to determine. Some were rather obvious—the scenarios allows officers to determine the effective-
person who had given his son a suicide note when he ness of cover and accuracy of shots fired. While
released him and had no live rounds in his weapon. computer-generated videos are excellent, a person
Others, however, remained enigmatic as to whether provides a life-size target and is more realistic. This
they fit the characteristics of suicide by cop. One training also should include all types of weather
individual was walking down the street listening to extremes as most agencies do not train when it is
music with headphones. He had a weapon in his hand. raining or snowing.
Witnesses called the police, and two officers con- Next, all officers involved in a shooting death
fronted him. Witnesses over a block away could hear should have one mandatory consultation with a
the officers yelling at him to “put the gun down.” The professional counselor. Many officers expressed
individual walked toward a young boy and pointed concern that if they asked for counseling, the word
the weapon at him. Officers shot and killed him. would spread among their departments that they

12 / FBI Law Enforcement Bulletin


Number of Officers at Shooting Scene
Number of Officers Number of Incidents Number of Fatalities
Involved in Each Incident in Each Incident
6 2 2
5 2 2
4 5 5
3 7 7
2 22 22
1* 40 42
Totals 78 80
*Two separate events occurred where only one officer fired a weapon and two individuals died.

were having “problems.” The need for counseling discourage the suspects. Officers with a shoulder
apparently is viewed by many officers as “not being weapon did not have a greater effect making the
strong” or not acting “like an officer should act.” person stop than those with a handgun. Officers
Fortunately, this belief is changing. Agencies should overwhelmingly felt prepared tactically for the
not only provide officers with this service at no cost shooting, believing that their training with a firearm
but also any of their family members requesting to was very adequate. However, the psychological
attend. trauma following the shooting appeared the most
Finally, the use of nonlethal weapons during some devastating. One officer summed it up best when he
situations needs to increase. The development of such said, “All officers should have training and knowl-
weapons has advanced in recent years.9 Training and edge concerning the postshooting experience. All
the use of such weapons should expand, especially in officers need to know that when you pull that trigger,
situations where officers confront individuals armed your department and family also are pulling it.”
with weapons, such as knives or clubs, that these
subjects could use in close proximity to the officers. Endnotes
1
Statistics obtained from the state of Minnesota POST (Police Officer
CONCLUSION Standards and Training) in St. Paul.
2
Minnesota Statute Annotated (M.S.A) § 609.066, subd. 1, 2000.
The use of deadly force remains an issue of great 3
M.S.A. § 626.84, subd, 1 (c) (1), 2000.
concern for the law enforcement community. This 4
M.S.A. § 609.02, subd. 8, 2000.
study of Minnesota peace officers offers a variety 5
Black’s Law Dictionary, 5th ed., (1985), s.v. “reasonable.”
6
of interesting findings, some surprising and some The American College Dictionary (1997), s.v. “firearm.”
7
U.S. Department of Justice, Federal Bureau of Investigation, Law
expected. All may contribute to reducing these tragic Enforcement Officers Killed and Assaulted, 1999 (Washington, DC,
events. 2000), 20.
The study showed that officers in large metropoli- 8
Ibid., 19.
9
tan areas were involved in approximately 75 percent For additional information, see Ed Nowicki, “Lethal Force Options,”
Law and Order, September 2001, 18-20; Sid Heal, “An Evaluation of
of the shooting incidents. Over two-thirds of the Less-Lethal Munitions,” Law and Order, September 2001, 88-93; and
shootings took place outdoors. Most shootings “IACP’s Less Lethal Force Options Course,” Law and Order, September
occurred between the hours of 8 p.m. and 4 a.m., 2001, 95-99.
and the majority happened on a Wednesday. Having
more than one officer present did not appear to deter Mr. Brubaker, a retired FBI special agent, currently works
offenders from continuing their actions. The type for a private firm in Minneapolis, Minnesota.
of weapon displayed by officers did not seem to

April 2002 / 13
Book Reviews

Protect Your Life! A Health Handbook allowing readers to remove critical information
for Law Enforcement Professionals edited by for personal use, to support procedure and policy
Davidson C. Umeh, Looseleaf Law Publica- development, and to assist in training programs
tions, Inc., Flushing, New York, 1999. and act as handout material.
Protect Your Life compiles selected essays At the end of each section of important
into a text that expands the understanding and issues, one or two major material review ques-
knowledge of health and fitness and their tions appear for the reader to address. Questions
positive relationship to reducing job stress, poor focus on the main health and safety awareness
nutrition, and negative environmental variables and knowledge points that uniform services and
on uniform services. The handbook begins with other departmental readers can gain concerning
an examination of cardiovascular disease issues positive impact on their overall personal health
involving law enforcement officers, correctional and safety during the execution of their duties and
personnel, and first responders, such as fire while in an off-duty status.
department and hazardous materials profession- Most of the handbook’s chapters end with
als, their working environments, and personal either a listing of the endnotes cited, references, a
health and safety concerns. summary or conclusion, or recommendations to
The essays provide basic information on departments and their personnel. The handbook
how important it is to have an accurate knowl- also includes selected tables and charts for matrix
edge of the possible dangers of public safety comparisons of critical information to better
work; protective and response equipment; understand the material presented and what
physical fitness of personnel; and the causes, uniform service personnel need to analyze for
signs and symptoms, and methods of disease health and safety protection. In addition, a
transmissions. These essays also include bibliography sets forth current publications and
procedures and personal precautions against leading periodicals in the field of public uniform
infectious diseases and blood-borne pathogens services.
needed to protect and preserve the health Protecting Your Life is interesting and
of public safety personnel, resulting in the informative to readers. To summarize the editor’s
most effective and complete service to their statement in the handbook’s forward, with
communities. accurate knowledge of health and safety issues
Seven chapters concentrate on stress, and awareness of work environment situations,
alcohol and other drug use, infectious and the uniform services profession can continue to
noninfectious concerns, nutrition, physical protect departmental members while these
fitness, suicide, and environmental and safety members diligently and professionally protect and
issues. Each chapter contains three to six critical serve the public.
essays that analyze the key issues impacting the Reviewed by
uniform services. The handbook is designed for Larry R. Moore
easy reading and acts as a ready reference for Certified Emergency Manager
the quick location of key health and safety International Association of Emergency Managers
issues and topics. Each page is perforated, Knoxville, Tennessee

14 / FBI Law Enforcement Bulletin


Criminal Poisoning: Investigational Guide including types of poisons encountered, classifica-
for Law Enforcement, Toxicologists, Forensic tion of poisoners, poisoning victim characteristics,
Scientists, and Attorneys by John Harris crime scene investigation, the forensic autopsy, and
Trestrail III, Humana Press, Totowa, New Jersey, the prosecution of poisoners. In this portion of the
2000. book, the author shares much of his own experi-
Criminal poisoning is an offense that often ence in the investigation of criminal poisonings.
receives little attention due to its apparently rare His survey of actual poisoning cases indicate that
occurrence. Although statistics indicate that the most widely employed poisons are arsenic,
poisonings account for only 3 to 6 percent of cyanide, and strychnine. He discusses his own
homicides, many cases of criminal poisoning may classification system for poisoners, which catego-
go undetected as a result of the difficulties rizes offenders according to victim specificity and
associated with detecting this type of crime. As the extent of planning completed for the poisoning
noted by the author of the book, Criminal Poison- event. In the chapter on crime scene investigation,
ing, this type of crime frequently becomes known he includes a detailed list of information to obtain
only after exhumation of the victim’s remains. If during a poisoning investigation.
this is the case, then how many additional poison- While not a comprehensive reference, Criminal
ing cases are missed in the initial investigation Poisoning is a useful starting point for those
process? In Criminal Poisoning, John Trestrail III involved in criminal poisoning investigations.
provides investigators with a multidisciplinary Readers desiring more detailed information should
guide for the investigation of criminal poisoning. consult reference materials on their topic of
To highlight some of the author’s relevant interest. With this consideration, the author has
experience, Trestrail has served as the managing compiled an extensive bibliography, including
director at a certified regional poison control references on poisoners throughout history, poison-
center for over 20 years in addition to his work as ing in fiction, forensic poisoning, and analytic
an expert consultant in many criminal poisoning toxicology. This bibliography is an extremely
investigations. He also has presented numerous useful tool for the investigator pursuing difficult to
seminars on “Murder by Poison!” and “Poisoners find reference information, as it lists many re-
Through History” and is a visiting instructor at sources not likely found in the most widely used
the FBI Academy. medical reference databases.
The author begins the book with a review of The author concludes that investigators should
the historical use of poisons in ancient cultures, consider poisoning in all death investigations that
including the Sumerians, the Egyptians, the have no visible signs of trauma until the facts prove
Greeks, and the Romans, among others. He also otherwise. A useful tool for the investigator,
discusses poisoners in the modern era, including Criminal Poisoning discusses the aspects of
the cases of Dr. Crippen (hyoscine) and Henri poisoning cases in an easily followed style and
Girard (various biological agents), as well as provides investigators with basic, but important,
the murders of Georgi Markov (ricin) and Stella information for the investigation of criminal
Nickell (cyanide). The cases reviewed prove poisoning cases.
very interesting, and the author provides a list Reviewed by
of suggested readings at the end of each chapter. Rebecca A. Jufer, Ph.D.
The remainder of the book focuses on the FBI Laboratory
practical investigation of poisoning cases, Washington, D.C.

April 2002 / 15
© John Foxx Images

Forensic
Psycholinguistics
Using Language Analysis
for Identifying and Assessing Offenders
By SHARON S. SMITH, M.S., and ROGER W. SHUY, Ph.D.

E arly one Friday afternoon, and cause millions of dollars in patterns represent examples of fo-
police officials from a damage, FBI agents from the rensic evidence that can provide in-
midsized city contacted the NCAVC and the FBI Academy’s vestigative leads and tie offenders
local office of the FBI. A 911 caller Behavioral Science Unit immedi- to their crimes. On the other hand,
had just left a message: seven ately began analyzing the recording criminal investigative analysis, for-
bombs had been planted at a petro- of the call.1 Within hours, they ad- merly known as criminal profiling,
leum facility, and it would blow up vised local authorities of their is an investigative tool that can link
within 24 hours. The male caller left assessment of the offender’s pos- offenders to their crimes by analyz-
no information about his identity or sible characteristics and the poten- ing their behavior.
motive. tial risk of the threat’s legitimacy.
Police officers began gathering What had the agents discovered in Criminal Investigative Analysis
evidence from the area around the the recording of the telephone call? Criminal investigative analysis
petroleum facility while the local How did they find it? originally was designed for, and
FBI office quickly contacted the works best in, investigations of
National Center for the Analysis ANALYZING LANGUAGE serial criminal acts, such as serial
of Violent Crime (NCAVC) at Law enforcement agencies rou- homicides, rapes, or arsons, but it
Quantico, Virginia. Realizing that tinely train their new recruits to rec- also can be used to analyze indi-
these bombs had the potential to kill ognize crime scene evidence. Hairs vidual crimes. This process exam-
or injure hundreds of employees and fibers, DNA, and ballistic ines the crime scene evidence and

16 / FBI Law Enforcement Bulletin


information about the victim to as- dialects, such as differences in the such as using a word order with a
sess the offender’s behavior. The speech of native Virginians from subject-object-verb sequence (“he
offender’s behavior at the crime Norfolk as opposed to those from finally will the seriousness of the
scene and interaction with victims Fairfax. Written communications problem recognize”) rather than the
can help reveal the motive for com- offer fewer clues, although vocabu- typical English subject-verb-object
mitting the crime. It also can help lary (word choice) and grammar can order (“he finally will recognize the
investigators construct a descrip- sometimes indicate geographic seriousness of the problem”). This
tion of the offender’s personality origin. In Pennsylvania, when clue, along with others from the let-
and demographic characteristics. people from Philadelphia want a ters, led investigators to focus on a
One type of behavior often carbonated soft drink, they tend to foreign national.
overlooked, or underused, exists in ask for a “soda,” whereas those
the offender’s actual language. The from Pittsburgh more likely request Age
offender’s written or spoken lan- a “pop.” Different generations find lin-
guage can provide investigators guistic ways of separating them-
with a wealth of information. This Ethnicity or Race selves from other age groups.
information, in turn, suggests the Native ethnic groups, as well as Parents know that teenagers de-
types of analyses investigators may immigrants from various countries, velop their own vocabulary and
request when referring their cases to may retain remnants of their native sometimes even grammatical pat-
the FBI for criminal investigative language. In one case in which terns. Different generations also are
analysis. What kind of information a business owner received anony- likely to retain expressions and ref-
does language provide? mous threat letters, the writer erences that they used when they
seemed comfortable with English, were younger. As technological
Sociolinguistics but wrote some sentences in a changes occur, many older people
Both written and spoken lan- way that indicated a specific resist adopting them and their asso-
guage have features that may reveal non-English language influence, ciated vocabulary. As a result, they
an individual’s geographical ori-
gins; ethnicity or race; age; sex; and
occupation, education level, and
religious orientation or background.
Sociolinguistics is the study of lan-
guage variability, including the re-
lationships between social charac-
teristics and linguistic features.
Geographic Origins
Although Americans tend to
move frequently, their speech often
retains remnants of the regional dia-
lect of the area where they were
reared. For example, most Ameri-
cans easily can distinguish the late
president John F. Kennedy’s Mas- Special Agent Smith is an Dr. Shuy retired from Georgetown
instructor in the Behavioral University in Washington, D.C., after
sachusetts accent from former Science Unit at the FBI teaching linguistics for 30 years,
president Jimmy Carter’s Georgia Academy. consulting on many criminal cases,
accent. Some sociolinguists can dis- and writing extensively on the uses
tinguish even more subtle regional of linguistics in the legal setting.

April 2002 / 17
preserve language that marks them Occupation, Education Level, experts within the disciplines of
to their general age group. Refer- and Religious Orientation psychology and linguistics, includ-
ring to the Internet as an “inven- Language sometimes contains ing sociolinguistics.
tion,” rather than “technology,” for clues to the writer’s occupation, The law enforcement commu-
example, would indicate that the education level, or religious orien- nity can learn a great deal from
writer more likely is middle-aged or tation. Use of nautical terms, such these disciplines. In 1979, an
older. References to specific adver- as port or starboard, can reflect FBI agent and a professor joined
tisements, products, and music knowledge of boating or even ser- forces to write an article on
groups also tend to give clues to a vice in the military. Consistent use psycholinguistic analysis of threat-
person’s age range. of sophisticated language or correct ening communications, one of
grammar and punctuation skills the first that combined knowledge
Sex may reflect at least a high school from both law enforcement and
Research has demonstrated that education, if not some college. Ref- academia.4 Also, research done by a
men and women may have slightly erences to biblical figures in one forensic sociolinguist spans four
different language patterns. 2 threat case narrowed the list of decades and a variety of topics,
Occasionally, offenders even will suspects to an individual in the such as detecting deception in inter-
use overt male and female markers. victim’s workplace who often views and analyzing threats.5
For example, in one case, the author spoke of his faith and exhorted his In the last 30 years, psycholo-
of a threat letter talked about being coworkers to repent their sins. gists have increased their research
pregnant. Although overt clues on discourse analysis6 because of
like this often are legitimate, inves- the wealth of information it offers


tigators should examine them about understanding personality.
for the possibility that a male writer Psychiatrists and political psy-
is trying to disguise his identity Research has chologists, for example, have iden-
by claiming to be a woman. demonstrated that tified language features associated
Fortunately for investigators, as men and women may with personality traits, such as
authors become more immersed in have slightly impulsivity, anxiety, depression,
the documents that they create, different language paranoia, and the need for power
they tend to drop their guard and control. For several years,
and reveal language patterns
patterns.
political psychologists have used


indicative of their sex and other these analysis systems for predict-
demographic characteristics. Com- ing the behavior of national lead-
pared with male writers, females ers.7 Information like this also may
are more likely to express tentative- EXPLORING FORENSIC prove valuable for understanding
ness, such as “it seems like...” PSYCHOLINGUISTICS criminal behavior. This knowledge
and “I suppose I should have....” Psycholinguistics is the study can, in turn, suggest more effective
Their language may rely more of the relationship between linguis- investigative strategies and inter-
heavily on expressions of feeling, tic behavior and psychological pro- view techniques.
such as “I felt compelled...,” “I was cesses of the speaker or writer that
upset...,” and “I hope....” Females, underlie that behavior.3 Forensic Current Applications of
more than males, tend to psycholinguistics applies the field Forensic Psycholinguistics
use polite speech acts, such as of psycholinguistics to criminal or At present, investigators are us-
thanking someone and apologizing. civil cases. A young discipline, ing forensic psycholinguistic analy-
Intensifiers also mark female forensic psycholinguistics com- sis of language in several types of
language more often, such as “I was bines the practical experience of cases to help them make more in-
so upset...” and “we had such a seasoned investigators with knowl- formed decisions. These cases in-
good time....” edge gained from the research of clude threat assessment, authorship

18 / FBI Law Enforcement Bulletin


identification, false allegations, the victim received seven threaten- just before the letters started, the
workplace violence, and statement ing letters that a stalker left at her investigators mentioned that she
analysis. residence over a period of a few had been dating one of the officers
weeks. The seventh letter stated that in their department. Four days be-
Threat Assessment the writer was considering raping fore the letters began, this officer,
The exact words in spoken or the victim. The victim provided the who had been separated from his
written threats, such as the 911 call identities of two men who had wife, broke off his relationship with
described at the beginning of this shown an interest in her and, there- the victim and moved back in with
article, can assist investigators in fore, might be her stalker. The local his wife. The investigators went on
determining the offender’s motiva- to say that, when the officer heard
tion, personality, and demographic © PhotoDisc about the threats from the unknown
features, as well as the risk of the stalker, he left his wife again and
threatener carrying out the threat. reinitiated a relationship with
Currently, the FBI’s Behavioral the victim. This information re-
Science Unit is conducting research vealed the victim’s motivation for
on the relationship between lan- authoring the stalker letters. Recog-
guage in threatening communica- nizing this case as a false allegation
tions and the threatener’s potential may have prevented two innocent
risk for violence. The results may men from being erroneously ac-
offer law enforcement agencies cused and publicly embarrassed.
more information on evaluating
threats. Workplace Violence
In recent years, media attention
Authorship Identification has focused on the danger
Trained personnel can analyze of violence erupting in the work-
stylistic features (e.g., sentence police referred the case to the FBI place. Disgruntled or terminated
construction, word choice, spelling, and requested an assessment of the employees have killed their co-
and punctuation) in documents, threatener’s potential for violence workers. Estranged spouses or part-
such as threatening communica- and any personality and demo- ners who have taken revenge at
tions. Then, they can compare these graphic characteristics that could their target’s job site also have mur-
features with those from the writ- lead to his identification. When dered employees. The “snap”
ings of a suspect to determine if the agents began the case consultation, theory (“he just snapped”) has
suspect could have authored them. they concentrated on the task of gained some favor in the media, but
In one case, investigators identified identifying characteristics of a male law enforcement officers frequently
a stalker as the author of threat let- offender and then planned to exam- have found that the offenders’ lan-
ters after they compared them with ine the two suspects to see if either guage has provided clues that they
love letters that he had written to the might be a good match. It soon be- were thinking about acting vio-
victim when they were dating. came clear, however, that the clues lently long before they committed
provided by the language in the the act. Disgruntled employees of-
False Allegations threats led back to the victim (a fe- ten express displeasure in the work-
Occasionally, rape or stalking male) as the probable writer. At the place. That displeasure is directed
victims make false allegations conclusion of the consultation, at, or at least vocalized about, the
of victimization. Notes or threaten- agents contacted the police investi- eventual target of the violence. As
ing letters analyzed for clues to gators who had requested the threat the employees’ anger escalates over
the identity of the offender may pro- assessment. When they asked the time, their comments reflect this.
vide indications that, in reality, the investigators if the victim had expe- Some offenders eventually make
victim is writing them. In one case, rienced any major stressful event specific comments about buying or

April 2002 / 19
possessing weapons. They talk examining suicide notes to deter- However, more research is needed
about committing some violent act mine whether such deaths could be on the features of this type of false
against the target of their anger, disguised homicides and studying suicide note.
such as “Someday, I’m going to computer codes employed by crimi-
stick a gun in his face and kill him.” nals who exploit technology. Computer Crimes
Unfortunately, these clues often are As technology has become in-
ignored until the violence occurs. Homicides Disguised creasingly essential to everyone’s
Afterward, coworkers sometimes as Suicides standard of living, computer crimi-
say that they felt uncomfortable, or Cases have occurred where nals have become more and more
even fearful, in the offender’s pres- husbands have killed their wives proficient. Computer criminals who
ence. Law enforcement officials and then forged suicide notes to are “insiders” (those who work for
and business managers can work to- cover their crimes. In one of these the company) and “outsiders”
gether to train employees to recog- cases, the husband shot and killed (those who do not) have broken into
nize and report danger signals be- the computer systems of govern-
fore such tragedies take place. ment organizations and private


Careful assessment of language companies to steal secrets. Sophis-
clues can allow employers to ini- ticated computer criminals are care-
tiate procedures to defuse and get One type of ful to cover their trails, but lan-
help for the would-be perpetrator behavior often guage, even in the form of computer
and, thereby, prevent violence from overlooked, or codes, may leave clues that knowl-
occurring. edgeable investigators can use to
underused, exists in identify and pursue offenders. The
Statement Analysis the offender’s FBI’s National Infrastructure Pro-
Many investigators currently actual language. tection Center (NIPC) currently
use statement analysis to determine works with agents in FBI field of-


if an interviewee is being deceptive fices to investigate hacker cases,
or telling the truth. Statement analy- but more research on these types of
sis represents a tool that investiga- offenders also is needed. Members
tors employ to help them examine his wife and two teenaged children. of the FBI’s Behavioral Science
the words that offenders use and the By placing the forged suicide note Unit have initiated research on
information that they omit. Then, near his wife’s body, the husband computer criminals and expect re-
investigators can analyze these escaped responsibility for 20 years. sults in the near future.
word choices and missing informa- After his first wife’s death, he re-
tion and determine the best ap- married twice, and both of these CONCLUSION
proach to take during the inter- wives died in questionable ways. Law enforcement officers
view.8 Once again, language can Recently, the husband, now dying, know that they must examine all
play an important part in solving admitted that he killed his first and kinds of evidence to solve crimes.
crimes. third wives and his children. He still One type, which some investigators
claims that he is not responsible for may overlook, involves the written
Potential Applications of the death of his second wife. How and spoken words of the criminals.
Forensic Psycholinguistics many more suicide notes have been When a subject’s written or oral
Future uses of forensic fabricated to cover homicides? Tak- language is available, it can assist
psycholinguistics in law enforce- ing time to do a personality assess- officers significantly.
ment investigations may prove ment of the victim and examining To this end, forensic psycho-
equally, or even more, valuable. all of the evidence, including the linguistic analysis can extract vital
While further research is needed, language of the suicide note, can clues from language in many types
some potential applications include assist in identifying these cases.9 of crimes. This process may offer

20 / FBI Law Enforcement Bulletin


information useful in determining Endnotes Collegiate Dictionary, 10th ed. (1996), s.v.
1 “discourse analysis.”
offenders’ identities, their truthful- Dr. Roger W. Shuy, coauthor of this
7
article, assisted the FBI with this investigation. Walter Weintraub, Verbal Behavior in
ness, their personality characteris- 2
Deborah Tannen, You Just Don’t Everyday Life (New York, NY: Springer
tics, and their potential for violence. Understand: Men and Women in Conversation Publishing Company, 1989); and Margaret G.
This knowledge, in turn, can help (New York, NY: Ballantine Books, 1990). Hermann, “Explaining Foreign Policy Behavior
3 Using the Personal Characteristics of Political
law enforcement develop investiga- David Crystal, The Cambridge Encyclope-
dia of Language, 2d ed. (Cambridge: MA Leaders,” International Studies Quarterly,
tive leads, construct interview strat- Cambridge University Press, 1998). March 1980, 7-46.
egies, and perform more effective 4
Murray S. Miron and John O. Douglas,
8
Susan H. Adams, “Statement Analysis:
searches for evidence. Forensic “Threat Analysis: The Psycholinguistics What Do Suspects’ Words Really Reveal?”
FBI Law Enforcement Bulletin, October 1996,
psycholinguistics constitutes an im- Approach,” FBI Law Enforcement Bulletin,
September 1979, 5-9. 12-20.
portant investigative tool and one 5
Roger W. Shuy, Language Crimes: The
9
Adam Gregory, “The Decision to Die,”
that, with additional research and Use and Abuse of Language Evidence in the Interviewing and Deception (Dartmouth, MA:
use, may provide the law enforce- Courtroom (Oxford, UK: Blackwell Publishers, Ashgate, 1999); and David Lester, Why People
Kill Themselves: A 1990s Summary of Research
ment community with another way 1993); and The Language of Confession,
Interrogation, and Deception (Thousand Oaks, Findings on Suicidal Behavior (Springfield, IL:
to resolve crimes that prove diffi- CA: Sage Publications, 1998). Charles C. Thomas Publisher, 1992).
cult to solve through conventional 6
The study of linguistic relations and
techniques. structures in discourse; Merriam-Webster’s

Subscribe Now

April 2002 / 21
Police Practice

Citizen
Firearm
Safety
Program
By Trevin R. Sorby
and J.B. Wheeler

D uring 1997, in the United States, approxi-


mately four people died every hour from
gunshot wounds. Of the 32,436 gun-related deaths
that year, approximately 33 percent were uninten-
The Development Phase
The PWCPD spent approximately 12 months
developing this program. The Firearms Training Unit
conducted extensive research, developed a thorough
tional or “accidental” shootings.1 Because of such lesson plan, and contacted various vendors to evalu-
incidents, police executives in Prince William ate their weapon safety and storage products.
County, Virginia, took steps to help reduce these The PWCPD advertised the program in local
numbers in their county. In June 1998, the Prince newspapers and on local cable channels. They
William County Police Department (PWCPD) publicized the program through Neighborhood Watch
Firearms Training Unit developed a firearms safety and Crime Council meetings, the Citizen’s Police
course to teach gun safety to its residents. Academy, and an educational pamphlet offering
weapon safety tips.
The Objective
A firearms training program can help citizens The Program
increase their gun safety awareness by providing Each 8-hour class begins with a 90-minute
information concerning appropriate storage of weap- lecture presented by a prosecutor from the Prince
ons, especially in homes with children, as well as how William County Commonwealth Attorney’s Office.
to safely handle a firearm, including what to do if one The prosecutor informs the participants of various
is found. The PWCPD Firearms Training Unit legal ramifications of gun use and citizen liability
designed this program to help prevent accidental and and allows time for a question-and-answer period.
unintentional deaths or injuries associated with Additional lectures presented during the class include
firearms. Although intended for adults, the program such topics as the elements of gun safety, gun safety
allows children from ages 12 to 17 to attend when rules, the safe use and storage of guns, and special
accompanied by a parent or guardian. responsibilities for parents. The program participants

22 / FBI Law Enforcement Bulletin


are encouraged to bring their own unloaded guns to provided thorough coverage on gun safety that
the class so a trained armorer can perform a safety individuals with varying levels of experience could
inspection. In addition to lectures, attendees also apply. The participants’ surveys revealed that they
receive numerous handouts and other visual aids and most enjoyed the legal discussions and the home
watch a live firearm demonstration on various safety parts of the program. The PWCPD’s Citizen
weapons and their capabilities. At the end of the Firearm Safety Program has received several awards
class, each participant receives a certificate of for its contribution to the community.
completion and a free gun lock.
Initially, program coordinators planned a 4-hour Conclusion
course; however, due to requests from the partici- While it remains difficult to specifically measure
pants and the volume of supporting information, they its success, since the first class in 1999, no graduate
lengthened the class to 8 hours. or family member of this course has reported an
The PWCPD offers the course accidental discharge involving a
three or four times per year, firearm. Although this course


depending on enrollment interest. does not meet Virginia’s con-
Since the program’s inception in cealed weapon permit require-
1999, approximately 80 citizens Attendees stated ments, nor does it replace a
have graduated from the program. that they received hunter safety course, it does
enhance the relationship between
The Costs much valuable the police department and the
Although the PWCPD offers information from community. By educating citizens
the program free of charge, each this course.... on the proper use, storage, and
class costs the county approxi- safe handling of firearms, such
mately $525, which includes wages
for two certified instructors,
ammunition for the weapons
demonstration, and a light meal for the participants.
” programs can help prevent
firearm mishaps and potentially
save lives.

The benefits to the department and the community Endnote


far outweigh the minimal costs of presenting this Centers for Disease Control and Prevention, National Center for
program. Health Statistics, unpublished data from the National Vital Statistics
After contacting numerous vendors to solicit System, 1977.
donations to support the class, program coordinators
received various visual aids to use, such as various Sergeant Trevin R. Sorby serves in the Operations Division
types of gun locks and different caliber ammunition. of the Prince William County, Virginia, Police Department.
The vendors realized that their support of the pro- Sergeant Jacqueline B. Wheeler serves in the Operations
gram can benefit the community by helping to Division of the Prince William County, Virginia, Police
Department.
educate citizens and ultimately prevent injuries
and save lives.
For further information regarding specifics of this
The Response program contact:
At the conclusion of each class, instructors ask Prince William County Police Department
participants to evaluate the course. Since its incep- 1 County Complex Court
tion, the program has received only positive feed- Prince William, VA 22191
policedept@pwcgov.org
back. Attendees stated that they received much
703-792-6599
valuable information from this course and that it

April 2002 / 23
Bulletin Reports

Intimate Partner Violence


The U.S. Department of Justice’s Bureau of Justice Statistics (BJS) recently announced that
violence rates among intimate partners—current or former spouses, boyfriends or girlfriends—differ
greatly according to the victim’s age. While the overall per capita rate of nonfatal intimate partner
violence against females 12 years of age or older was 5.8 victimizations per 1,000 females in 1999,
among females 16 to 24 the rate was 15.6 victimizations per 1,000. Women 16 to 24 years of age were
the most vulnerable to nonfatal intimate violence. Women 35 to 49 were the most vulnerable to murder
by an intimate partner.
Trends over the period from 1993 to 1999 show that the rates of intimate partner violence fell for
females 20 to 24, 25 to 34, and 35 to 49. Despite some year-to-year fluctuations, rates of violence by
intimates against women in other age categories were unchanged from 1993 through 1999.
Black and white women experienced intimate partner violence at similar rates for every age range
except 20 to 24. Among that group, 29 violent victimizations per 1,000 black women occurred com-
pared to 20 per 1,000 white women.
Women separated from their husbands were victimized by an intimate partner at rates higher than
married, divorced, widowed, or never-married women. A majority of intimate partner violence that
occurred between 1993 and 1999 was perpetrated by boyfriends and girlfriends (53 percent), with an
additional 33 percent perpetrated by a current spouse.
The special report, Intimate Partner Violence and Age of Victim, 1993-1999, (NCJ 187635), was
written by BJS statistician Callie Marie Rennison. Copies may be obtained by calling the BJS clearing-
house at 800-732-3277 or accessing the BJS Web site at http://www.ojp.usdoj.gov/bjs.

Drugs and Crime


Breaking the Juvenile Drug-Crime Cycle: A Guide for Practitioners and Policymakers summa-
rizes existing knowledge about efforts to intervene in the juvenile drug-crime cycle. Additionally, it
proposes interventions and programmatic changes to successfully address that cycle. The coordination
of case management strategies to meet the diverse needs of juveniles from their entry into the juvenile
justice system until they no longer require supervision represents one of the key approaches to inter-
rupting the drug-crime cycle presented in this National Institute of Justice Research report. The report
also discusses implementing such strategies at the local level. Furthermore, the report elaborates on
several key elements of a comprehensive model, including a single point of entry into the juvenile
justice system and an active judicial role in ensuring the juvenile’s adherence to recommended treat-
ment services. This 22-page guide (NCJ 186156) is available only electronically at http://
www.ncjrs.org/txtfiles1/nij/186156.txt.

24 / FBI Law Enforcement Bulletin


Linking Uniform Crime Reporting Data
Since the 1930s, the FBI’s Uniform Crime Reporting (UCR) Program has collected
data on crimes reported to the police and on arrests. While these data come from state
and local law enforcement agencies, for collection purposes, the FBI developed its own
agency identifiers. Most other federal data collections, including the decennial census
and the census of governments, use geocodes and government entity identifiers devel-
oped by the Census Bureau or by, what is now, the National Institute for Standards and
Technology (NIST). Because UCR and other data sources do not share place identifiers,
analysis of crime data in conjunction with data from other sources has been difficult.
To overcome this obstacle, the
Bureau of Justice Statistics (BJS) and
the National Archive of Criminal Justice
Animal Abuse and Data (NACJD) have created a data file,
Youth Violence the Law Enforcement Agency Identifi-
ers Crosswalk. This file lists agencies
A resurgence of interest in the relation between by the FBI’s codes, as well as the other
cruelty to animals, or animal abuse, and serious major identifying standards in use today.
violent behavior, especially among young offenders, BJS’s technical report, Linking Uniform
has occurred in the past 20 years. The Office of Crime Reporting Data to Other
Juvenile Justice and Delinquency Prevention (OJJDP) Datasets (NCJ 185233), written by Sue
presents Animal Abuse and Youth Violence, a report A. Lindgren and Marianne W. Zawitz,
on the psychiatric, psychological, and criminological describes this file and its uses. To obtain
research linking animal abuse to juvenile- and adult- a copy of this report, access the BJS
perpetrated violence. It addresses the challenge of Web site at http://www.ojp.usdoj.
defining animal abuse and examines the difficulty of gov/bjs.
deriving accurate incidence and prevalence data for
this behavior. Additionally, it explores the relation-
ships between animal abuse and conduct disorder,
analyzes the motives of child and adolescent animal
abusers, and considers the contexts that may lead to Bulletin Reports is an edited collection
the emergence of animal abuse as a symptom of of criminal justice studies, reports, and
psychological disorder. The importance of including project findings. Send your material for
information about animal abuse in assessments of consideration to: FBI Law Enforcement
youth at risk of committing interpersonal violence is Bulletin, Room 209, Madison Building,
FBI Academy, Quantico, VA 22135.
emphasized throughout, and a list of national organi-
(NOTE: The material in this section is
zations with programs related to the link between intended to be strictly an information
animal abuse and other violent behavior also is source and should not be considered an
provided. For a copy of this bulletin, call the Juvenile endorsement by the FBI for any product
Justice Clearinghouse at 800-638-8736 or access or service.)
OJJDP’s Web site at http://www.ojjdp.ncjrs.org.

April 2002 / 25
Legal Digest

Hunting Terrorists Using


Confidential Informant
Reward Programs
By DOUGLAS A. KASH, J.D.

T he criminal acts of Septem- of rewards, they modified the incen- Establishment of the
ber 11, 2001, resulted in tives to informants, including those Confidential Informant
changes to existing U.S. who are noncitizens. Reward Program for
law, including rewards available The notion of rewards for infor- Terrorist Information
to confidential informants who mation is neither new nor limited to Rewards for information in-
provide information on terrorists or terrorism. Indeed, the U.S. Code volving terrorism were established
terrorist activities. Specifically, on provides for several types of re- by the 1984 Act to Combat Interna-
October 26, 2001, the U.S. Con- wards for different kinds of infor- tional Terrorism (1984 ACIT) 3
gress enacted the Uniting and mation.2 This article identifies the which provides the following:
Strengthening America By Provid- different reward mechanisms for With respect to acts of terror-
ing Appropriate Tools Required terrorist-related information and ism primarily within the
to Intercept and Obstruct Terror- explains the process of each pro- territorial jurisdiction of the
ism Act of 2001 (PATRIOT Act).1 gram. While several U.S intelli- United States, the attorney
Prior to September 11, there were gence agencies (civilian and mili- general may reward any
several different venues under tary) have internally managed individual who furnishes
which an informant could be eli- reward programs for confidential information—
gible for a reward, depending upon informants, these programs and 1) leading to the arrest or
which agency received the informa- their appropriations are classified conviction, in any country, of
tion. Although the events of Sep- for national security purposes and any individual or individuals
tember 11 did not increase the types will not be addressed. for the commission of an act

26 / FBI Law Enforcement Bulletin


of terrorism against a U.S. the jurisdiction of the secretary of Current law, specifically, Re-
person or U.S. property; state.8 Upon signing the bill into wards for Information Concerning
2) leading to the arrest or law, President Reagan proclaimed Terrorist Acts and Espionage,11 em-
conviction, in any country, of that this law would “provide the re- ploys the same definition for terror-
any individual or individuals sources and authorities essential in ism as the 1984 ACIT. Rewards still
for conspiring or attempting countering the insidious threat ter- are deemed conclusive and no court
to commit an act of terrorism rorism poses to those who cherish has the power or jurisdiction to re-
against a U.S. person or freedom and democracy.... This view the reward. Again, infor-
property; or nation bears global responsibilities mants’ identities can be kept strictly
that demand that we maintain a classified, and their immediate
3) leading to the prevention, worldwide presence and not suc- families are eligible to participate
frustration, or favorable cumb to these cowardly attempts at in the attorney general’s Witness
resolution of an act of terror- intimidation.”9 Protection Program.12
ism against a U.S. person or The 1984 ACIT law adopted The recently enacted PA-
property.4 the definition of “terrorism” from TRIOT Act amended the reward
Excluding government employ- the Foreign Intelligence Surveil- program’s authority by increasing
ees acting within the scope of their lance Act,10 defining terrorism as the amount of money offered or
official duties, an individual is en- violent or dangerous acts that would paid to an informant. Now, a reward
titled to a reward up to $500,000. be crimes if committed in the totaling $250,000 or more requires
Rewards up to $100,000 can be paid United States and that appear to be the personal approval of the presi-
with the approval of the attorney intended to intimidate or coerce a dent or attorney general.13 The PA-
general, while a reward of $100,000 civilian population or to influence TRIOT Act also mandates that if an
or more requires the approval of the the policy or conduct of a govern- award is approved under this sec-
president or attorney general. The ment or political subdivision of a tion, the attorney general must ten-
rewards are deemed conclusive, and government by intimidation or co- der written notice to the chairmen
no court has the power or jurisdic- ercion. The 1984 ACIT was first and ranking minority members of
tion to review it.5 Additionally, al- used in 1985 in connection with the the Committees on Appropriations
though the identity of an informant slayings of four U.S. Marines and and the Judiciary in the Senate and
is kept strictly classified, infor- two U.S. civilians in El Salvador. House of Representatives, not later
mants and their immediate families
are eligible to participate in the at-
torney general’s Witness Protection


Program.6
When he sent the bill to Con-
gress in April 1984, President The notion of
Reagan noted the limitations of ex-
isting laws, specifically the lack of
rewards for
authority to pay rewards for infor- information is
mation concerning acts of terrorism neither new nor
abroad. 7 President Reagan also limited to
stated that the payment for rewards terrorism.
in connection with domestic acts of


terrorism was appropriately desig-
nated to the attorney general, while
acts of terrorism outside of the terri-
torial United States raised political Mr. Kash serves as a senior attorney for the DEA in Arlington, Virginia.
and foreign relations issues within

April 2002 / 27
than 30 days after the approval.14 in the United States is necessary for U.S. Department of Justice. When
The funding for the reward program the successful prosecution of the necessary, the AAG can empanel
can come from any executive criminal activity. The S-2 visa is personnel from the U.S. Marshals
agency or military department. The available to aliens possessing “criti- Service, FBI, DEA, DOJ Criminal
attorney general’s refusal to make a cal reliable information” regarding Division, and Department of State
reward is not subject to judicial terrorist activity (emphasis added). to review the applications and pri-
review.15 In addition to the cooperation under oritize the cases to conform to the
S-1, the S-2 informant must be in statutorily mandated numerical
The “S” Visa danger as a result of providing the limitations.21 The application then
In addition to the monetary re- information to the United States. is forwarded to the commissioner of
ward incentive, the Immigration Only state and federal law enforce- the INS for final approval.22 Within
and Naturalization Service (INS), a ment authorities (including federal their 3-year stay, aliens can apply
component agency of the U.S. De- or state courts and U.S. attorneys) for permanent resident status
partment of Justice (DOJ), has the can initiate a request under the “S” (“green card”), which ultimately
authority under specific limited cir- may result in citizenship.
cumstances to grant special visas to


nonimmigrants and their imme- The U.S. Department of State’s
diate families. On November 29, Reward for Justice Program
2001, Attorney General John The Department of State also
Ashcroft announced a new pro-
The funding for the
reward program can has the authority to pay rewards for
gram, the Responsible Cooperators information on terrorism. The De-
Program, which provides incentives come from any partment of State was authorized to
to aliens to provide useful informa- executive agency or establish a rewards program in the
tion about terrorists and their activi- military department. Omnibus and Diplomatic Security
ties.16 The incentives already ex- Act of 1986,23 funded from the


isted within the U.S. Code, but this moneys available under section
program is an effort to reinvigorate 36(a) of the State Department Basic
cooperative communication be- Authorities Act of 1956.24
tween the U.S. Department of State category.18 The alien must be eli- Similar to the attorney general,
and alien groups regarding any gible for an award under Title 22 the secretary of state may pay a
knowledge their members may have U.S. Code, Section 2708(a), also reward to any individual who
regarding criminal acts, particularly designated as section 36(a) of the furnishes information leading to—
terrorism. State Department Basic Authorities 1) the arrest or conviction in
The Violent Crime Control and Act of 1956.19 The application must any country of any individual
Law Enforcement Act of 1994 cre- contain evidence establishing the for the commission of an act of
ated a new immigration regulation nature of the alien’s cooperation international terrorism against
establishing an “S” visa, which pro- with the government, the need for a U.S. person or U.S property;
vides for a temporary, and poten- the alien’s presence in the United
tially permanent stay within the States, all conduct and conditions 2) the arrest or conviction in
United States.17 There are two cat- that may constitute grounds for ex- any country of any individual
egories of the “S” visa. The S-1 clusion, and all factors and consid- conspiring or attempting to
visa, is issued to aliens who possess erations warranting favorable con- commit an act of international
“critical reliable information” re- sideration by the attorney general terrorism against a U.S. person
garding criminal activity (emphasis on the alien’s behalf.20 or U.S. property;...
added), who are willing to share The request must be sub- 4) the arrest or conviction in
their information with a U.S. mitted to the assistant attorney gen- any country of any individual
agency or court and whose presence eral (AAG), Criminal Division, aiding or abetting in the

28 / FBI Law Enforcement Bulletin


commission of an act de- 5) the payment and approval of Witness Security program, INS,
scribed in paragraph 1 [or] 2;... payment.27 Federal Aviation Administration,
5) the prevention, frustration, However, before making a reward and Department of Energy.29
or favorable resolution of an payment for any matter over which Any individual can furnish
act described in paragraph 1 there is federal criminal jurisdic- confidential information at http://
[or] 2), including by disman- tion, the secretary of state must se- www.rewardsforjustice.net, or
tling an organization in whole cure the approval of the attorney call toll free at 800-USREWARDS.
or significant part; or general.28 If individuals do not have any
Since the days of the “Wanted” information to offer, they can
6) the identification or loca- posters, new methods and technolo- contribute money to http://www.
tion of an individual who holds gies have contributed to the fight RewardsFund.org, whose sole pur-
a key leadership position in a against terrorism. The Department pose is to fund Rewards For Justice,
terrorist organization.25 of State, in coordination with a 501(c)(3)30 nonprofit charity fund
The PATRIOT Act also from which the awards are paid.
amended the maximum amount © PhotoDisc RewardsFund.org was created on
of a reward under Title 22, Section December 13, 2001, by Steve Case
2708 (e)(1), U.S. Code, which now and Joe Rutledge, two businessmen
provides “No reward under this sec- who were moved to lend their busi-
tion shall exceed $5,000,000, ex- ness and advertising expertise after
cept as personally authorized by the the terrorist attacks. In coordination
secretary of state if he determines with the Department of State’s cam-
that offer or payment of an award of paign undertaken by Under Secre-
a larger amount is necessary to tary of State Cheryl Beers, Case and
combat terrorism or defend the Na- Rutledge also advised the Depart-
tion against terrorist acts” (PA- ment of State to create the toll-free
TRIOT Act amendment in italic).26 line. At least two states, Connecti-
The PATRIOT Act appears to give cut and Florida, have introduced
the secretary of state the discretion legislation for the creation of
to offer a reward without a mon- “United We Stand” license plates.
etary limit. several media outlets and other pri- The proceeds from the sales of
In an effort to avoid duplication vate entities, repeatedly has broad- those plates will go to the fund.
or interference with the payment of cast ways in which the public can The availability of rewards
informants or obtaining evidence or assist the government. The Re- have been published in domestic
information, the secretary of state wards for Justice Program was cre- newspapers, such as The New York
shall consult with the attorney gen- ated in 1984 and is managed by the Times, and internationally in Al
eral regarding— Diplomatic Security Service (DSS), Hayat, Paris Match, Die Welt, and
a component of the Department of Pravda. These announcements
1) [the identification of]
State. The director of the DSS comport with the statutory mandate,
individuals, organizations, and
chairs an interagency committee referred to as the Aviation Security
offenses with respect to which
that reviews reward candidates and Improvement Act of 1990,31 requir-
rewards will be offered;
makes recommendations to the sec- ing the secretary of state to publish
2) the publication of rewards; retary of state. Depending upon the the availability of U.S. rewards for
type of incident, the committee can information on international terror-
3) the offering of joint rewards
include representatives from the ist-related activities, which to the
with foreign governments;
National Security Council, Central appropriate extent, prominently dis-
4) the receipt and analysis of Intelligence Agency, DOJ, FBI, played domestically and abroad in
data; and DEA, U.S. Marshals Service international airports.32

April 2002 / 29
Secretary of State Powell called approve rewards. The secretary of Federal drug law enforcement agent”; 26 U.S.C.
§ 7623 authorizes the secretary of treasury to
the Rewards for Justice Program state has the apparent authority to
pay rewards “for detecting and bringing to trial
“an extremely effective weapon in offer rewards, without a monetary and punishment persons guilty of violating the
the United States’ arsenal to combat limit, to provide an incentive to per- internal revenue laws”; and 28 U.S.C. § 524(c)
terrorism.” David Carpenter, assis- sons with information sought by the authorizes the attorney general to reward those
who provide “information or assistance leading
tant secretary of state for diplomatic United States. Some of those who
to a civil or criminal forfeiture.”
security, added that the reward pro- possess the information have such 3
Pub. L 98-533, Stat. 2706, codified at 18
gram has saved thousands of lives deeply held religious or political U.S.C. § 3071-77.
4
by preempting terrorist attacks. He convictions that no amount of Id. Amended by P.L. 103-359, Title VIII, §
803 et. seq., Oct. 14, 1994, 108 Stat. 3438-39
noted that 22 people have received a money would cause them to contact
(to include acts of espionage) and substituting
total of more than $8 million for U.S. authorities. Consequently, the heading to Chapter 204 from “Rewards for
information over the past 17 years Information Concerning Terrorist Acts” to


since the reward program’s enact- “Rewards for Information Concerning Terrorist
Acts and Espionage.”
ment. The program generated infor- 5
18 U.S.C. § 3072 (1984).
mation that led to the arrest of 6
Id. § 3076.
Ramzi Yousef who was convicted The...PATRIOT Act 7
20 Weekly Comp. Pres. Doc. 590 (April
for the World Trade Center bomb- 26, 1984).
ing in 1993.33 State Department
amended the reward 8
Id.

spokesman Richard Boucher stated program’s authority by 9


20 Weekly Comp. Pres. Doc. 1573
(October 19, 1984).
that the Rewards for Justice Pro- increasing the amount 10
50 U.S.C. § 1801(c)(1) and (2)(1982).
gram has resulted in more than 100 of money offered or 11

12
18 U.S.C. § 3077(1)(2001).
Id. § 3076.
telephone calls, 600 letters, 1,200 e- paid to an informant. 13
Supra note 1 at Title V, § 501.
mails and 1.2 million hits on the 14
Id. at § (b)(2).


Web site.34 15
Id. at §§ (b)(3) and (4).
16
Moreover, in 1990 the Air Dan Eggen, “U.S. Dangles Citizenship to
Entice ‘Cooperators,’ ” The Washington Post,
Transport Association of America A1, November 30, 2001.
(ATAA) and the Air Line Pilots U.S. intelligence community con- 17
Immigration and Naturalization Act §
Association, International (ALPA) tinues to develop its information- 101(a)(15)(S), codified at 8 U.S.C. §
agreed to supplement the rewards gathering techniques and recruit 1101(a)(15)(S) (1994). See also Section
212(d) of the Immigration and Nationality
paid by the U.S. government for in- sources who, notwithstanding their Act, which allows the attorney general to
formation that prevents a terrorist religious or political affiliations, are waive inadmissibility with respect to a
act against U.S. civil aviation or willing to provide confidential nonimmigrant as set forth in § 101(a)(15)(S) if
leads to the arrest or conviction of information in an effort to avoid the attorney general considers it to be in the
national interest.
any person who has committed such attacks on those who cherish free- 18
8 C.F.R. § 214.2(t). The application is
an act.35 Although not a separate dom and provide for its security. made on INS form I-854 accompanied by an I-
fund, this enables the ATAA and 539.
19
ALPA to increase a reward by up to Endnotes
22 U.S.C. § 2708 amended by Chapter
502 in the PATRIOT Act supra note 1; see also
$2 million. 1 § 36 State Department Basic Authorities Act of
Pub. L 107-56, 115 Stat. 272 (2001).
Conclusion 2
18 U.S.C. § 3095B authorizes the attorney 1956 (Pub. L. 885, August 1, 1956), 70 Stat.
general to reward “any individual who assists 890, as amended by The Anti-Drug Abuse Act
Based upon the aforementioned the Department of Justice in performing its of 1988, Pub. L. 100-690, 102 Stat. 4181
statutes, there are sufficient tools function”; 19 U.S.C. § 1619 enables the (November 18, 1988) § 4602 and the
through which confidential infor- secretary of the treasury to pay rewards for International Narcotics Control Act of 1989,
mants can be rewarded for their “information concerning any fraud upon the Pub. L. 101-231, 103 Stat. 1954 (December 13,
customs revenue”; 21 U.S.C. § 881 authorizes 1989) § 13.
information regarding terrorism. the attorney general to pay rewards for 20
Supra note 18 at (t)(4)(i)(C).
The PATRIOT Act empowers the “information which leads to the arrest and 21
Id. at (t)(4)(ii)(B).
president and attorney general to conviction of a person who kills or kidnaps a 22
Id. at (t)(4).

30 / FBI Law Enforcement Bulletin


23 32
Pub. L 99-399 (HR 4151) August 27. H.R. Rep. No. 236(I), to accompany H.R. Id. at § 5512(c). Found under Title 22 at
1986, 100 Stat. 853. Codified throughout the 2975, 107th Cong. 1st Sess. 2001, 2001 WL Chapter 64, United States Response to
U.S. Code. 1205861 (Leg. Hist.). Terrorism Affecting Americans Abroad.
24 27 33
Supra note 19. 22 U.S.C. § 2208 (c)(1). Tim Johnson, “Ads Stress $25 Million
25 28
Id. PATRIOT Act amendments in the Id. at (c)(2). U.S. Kitty For Informants,” The Miami Herald,
29
italic. http://www.rewardsforjustice.net. December 14, 2001.
26 30 34
It is noteworthy that the U.S. House of 26 Internal Revenue Code § “Cash Offered, New Strategy Pushed in
Representatives passed a resolution amending 501(c)(3)(1986). U.S. Fight to Foil Terrorism,” http://CNN.com
31
22 U.S.C. § 2708 by increasing, yet limiting, 22 U.S.C. § 5501-5513, Pub. L. 101-674, December 14, 2000.
35
the secretary’s award authority to $25,000,000. 104 Stat. 3075. http://www.rewardsforjustice.net.

Attention: Homicide, Sex VICAP Alert


Crimes, and Robbery Units
Any agency that has a case exhibiting similar Possible Suspect Information
modus operandi should contact the Fort Collins,
Colorado, Police Department at 970-224-6090. The offender is described as a white or mixed-
race male, 18 to 35 years of age, 5’7” to 6’2” in
height, and weighing between 160 and 180 pounds.
He has brown collar-length hair, tan-colored skin, and

T he Fort Collins, Colorado, Police Department


is investigating a series of six sexual assaults
that occurred near the campus of Colorado State
University between May 2001 and August 2001.
emanates a discernable odor of stale cigarettes.
During one of the assaults, the offender wore a polo
shirt, khaki shorts, and a Quik Silver baseball cap.
Eyewitnesses to the most recent assault identified
a late 1980s-model metallic light blue four-door sedan
DNA obtained was entered into CODIS and com- leaving the scene. The sedan resembled possibly a
pared to the existing DNA profiles. Comparisons Buick Sentry or Toyota Camry.
determined that the DNA matched five sexual The FBI’s National Center for the Analysis of
assaults and one homicide in Philadelphia, Pennsyl- Violent Crime (NCAVC) has conducted a profile of
vania, that occurred near major universities between the offender and ascertained that he is a Power
June 1997 and August 1999. One of the Philadel- Reassurance Rapist. He is of white or mixed race,
phia assaults resulted in the death of a 23-year-old above-average intelligence, not verbally confident
college student. with women, and may have had previous arrests for
nuisance offenses, such as peeping, prowling, or
Crime Scenes possibly burglary. The offender may have connections
The offender targets multiresident complexes, to both Colorado and Pennsylvania.
allowing unimpeded egress from each crime scene.
The offender enters through unsecured doors and Alert to Law Enforcement
windows or removes window screens. The suspect Law enforcement agencies should bring this
blindfolds the victim with materials found at the information to the attention of all crime analysis
scene. The assaults take place in the early morning personnel and officers investigating homicides/crimes
hours while the victims are sleeping. Each complex against persons, sex crimes, and robberies. Any
is located a short distance from a major university. agency with crimes similar to these should contact
It is believed that the suspect surveilled each Detective Kim Cochran of the Fort Collins, Colorado,
location prior to the assault either through employ- Police Department at 970-224-6090 or Tracy Miller
ment opportunities or as a result of nocturnal of the FBI’s Violent Criminal Apprehension Program
actions. (VICAP) at 703-632-4168.

April 2002 / 31
FBI Law Enforcement Bulletin
Call for Authors

Why Should You Publish an Article? or referring to information that generally is not
• Allows you to share your experiences well known. Authors should study several
issues of the magazine to ensure that their
• Provides you with a wider audience writing style meets the Bulletin’s require-
• Increases your credibility ments. Most important, authors should
• Enhances your professional image contact the Bulletin staff for the expanded
author guidelines, which contain additional
• Improves your chances for promotion specifications, detailed examples, and effec-
tive writing techniques.
What Should You Write About? The Bulletin judges articles on relevance
Write about topics that interest you. Write to the audience, factual accuracy, analysis of
about problems that you, your department, or the information, structure and logical flow,
community have solved. style and ease of reading, and length. The staff
Possible Bulletin topics include— edits all manuscripts for length, clarity, format,
• administrative/personnel issues; and style.
• crime problems and solutions; The Bulletin generally does not publish
articles on similar topics within a 12-month
• domestic violence;
period or accept articles previously published
• drugs; or currently under consideration by other
• equipment; magazines. Because it is a government publi-
• ethics; cation, the Bulletin cannot accept articles that
advertise a product or service.
• environmental crimes;
• firearms; How Do You Submit an Article?
• future of policing; • Send a query letter and short outline or
• information resources; • Submit a completed manuscript to—
• investigative techniques; Editor, FBI Law Enforcement Bulletin
FBI Academy, Quantico, VA 22135
• juveniles; Telephone: 703-632-1952
• leadership/management concerns; E-mail: leb@fbiacademy.edu.
• negotiation/interviewing skills; The Bulletin staff will review queries and
• police-community relations; articles and advise the authors of acceptance
or rejection. The magazine cannot guarantee
• technology; and
a publication date for accepted articles.
• training. Authors should submit three copies of
their articles typed and double-spaced on
How Do You Write an Article? 81/2- by 11-inch white paper with all pages
Authors should write in third person and numbered. When possible, authors should
use active voice. They should supply references include an electronic version of the article
when quoting a source exactly, citing or saved on computer disk. A photograph of the
paraphrasing another person’s work or ideas, author(s) should accompany the article.

32 / FBI Law Enforcement Bulletin


The Bulletin Notes
Law enforcement officers are challenged daily in the performance of their duties; they face each
challenge freely and unselfishly while answering the call to duty. In certain instances, their actions
warrant special attention from their respective departments. The Bulletin also wants to recognize
their exemplary service to the law enforcement profession.

During a violent During a lightning


thunderstorm with high storm, Sergeant Robert
winds and heavy rain Ross of the San Mateo,
that rapidly flooded California, Police
many streets, Sergeant Department responded
Edwin Boehm of the to calls of various
Paradise Valley, lightning-strike loca-
Arizona, Police tions. Sergeant Ross
Department received a just had left the scene
report of a vehicle that where a lightning strike
Sergeant Boehm apparently had been Sergeant Ross had set a gas main on
swept off the road. fire when he noticed
Upon arrival, Sergeant Boehm saw that a smoke coming from a residential area one
female driver was trapped inside the car. The block away. Upon arriving at the scene, he
driver’s side window was down and water saw that the front of a house was fully
was rapidly filling the vehicle. The female engulfed in flames. While waiting for fire
driver appeared to be in shock and was units to respond, he heard cries for help
unable to exit the vehicle. Because the coming from the residence. Sergeant Ross
driver’s door was perpendicular to the strong attempted to enter the dwelling in several
current, it was difficult to open against the different areas, but smoke and fire drove him
water pressure. Sergeant Boehm waded into back. After testing the temperature of the
the waist-deep water, opened the driver’s front door, Sergeant Ross kicked it in and
door, and helped the female exit her vehicle. found a semiconscious elderly male lying on
Then, he helped her through the swift water the floor in the midst of burning walls. He
to safety. Without Sergeant Boehm’s expedi- dragged the victim from the burning building
ent and courageous actions, the woman likely to safety. Sergeant Ross’ courageous and
would have drowned. selfless actions saved the victim’s life.

Sergeant Ronald Dalphonse of the Plymouth, New Hampshire, Police


Department received a call to assist at an unknown medical emergency. Upon
arrival, Sergeant Dalphonse learned that the male patient possibly was depressed
and suicidal. While emergency medical staff attended the patient, the patient
reached into a bag and withdrew a loaded pistol. A struggle ensued between
medical personnel, Sergeant Dalphonse, and the patient. Sergeant Dalphonse
was able to jump behind the patient and employ a tactical hold to deprive him of
the strength and agility to retain the weapon. The pistol was secured without
injury to the patient or the medical personnel. Sergeant Dalphonse’s quick
thinking and action prevented serious injury to the medical staff or the patient.
Sergeant Dalphonse
U.S. Department of Justice Periodicals
Federal Bureau of Investigation Postage and Fees Paid
Federal Bureau of Investigation
FBI Law Enforcement Bulletin ISSN 0014-5688
935 Pennsylvania Avenue, N.W.
Washington, DC 20535-0001

Official Business
Penalty for Private Use $300

Patch Call

The Idaho State University Public Safety patch is The patch of the Keene, New Hampshire, Police
an extension of the Idaho State University logo as Department depicts the First Congregational Church,
outlined in the rectangle. The hills in the logo depict a landmark of the city, erected in 1786. The city of
those on the West Bench of the city of Pocatello, as Keene was designated as an All American City in
seen through the tall, narrow windows of the 1965 and has been recognized as a Tree City USA by
university’s fine arts building. The centennial refer- the National Arbor Day Foundation each year since
ence signifies the agency’s contribution to the cel- 1979.
ebration of the university’s centennial.

You might also like