You are on page 1of 35

June 2003

Volume 72
Number 6
United States
Department of Justice
Federal Bureau of Investigation
Washington, DC 20535-0001

Robert S. Mueller III


Director
Contributors’ opinions and statements Features
should not be considered an
endorsement by the FBI for any policy,
program, or service.

The attorney general has determined


that the publication of this periodical is
necessary in the transaction of the
public business required by law. Use The New ViCAP The New ViCAP has enhanced
of funds for printing this periodical has
been approved by the director of the
Office of Management and Budget.
By Eric W. Witzig 1 technology to assist agencies
attempting to solve violent crime cases.

The FBI Law Enforcement Bulletin


(ISSN-0014-5688) is published
monthly by the Federal Bureau of Police Work Addiction Being too dedicated to the profession
Investigation, 935 Pennsylvania
Avenue, N.W., Washington, D.C.
By Gerard J. Solan 13 can cost law enforcement officers their
families, friends, and, ultimately, their
20535-0001. Periodicals postage paid and Jean M. Casey
at Washington, D.C., and additional lives.
mailing offices. Postmaster: Send
address changes to Editor, FBI Law A Four-Domain Model Investigators can focus on four domains
Enforcement Bulletin, FBI Academy,
Madison Building, Room 209,
Quantico, VA 22135.
for Detecting Deception 19 to help them detect deception during
interviews.
By Joe Navarro
Editor
John E. Ott Foreign Intelligence The FISA and USA PATRIOT Act
Associate Editors
Cynthia L. Lewis
Surveillance Act 25 provide oversight to law enforcement
officers investigating terrorist and
By Michael J. Bulzomi intelligence cases.
David W. MacWha
Bunny S. Morris
Art Director
Denise Bennett Smith
Assistant Art Director Departments
Stephanie L. Lowe
Staff Assistant
Linda W. Szumilo
8 Perspective 18 Book Reviews
This publication is produced by Career Criminals, Practical Law Enforcement
members of the Law Enforcement Security Threat Groups, Management
Communication Unit, Training Division.
and Prison Gangs
Internet Address
leb@fbiacademy.edu

Cover Photo
©stockbyte

Send article submissions to Editor,


FBI Law Enforcement Bulletin, FBI
Academy, Madison Building, Room
209, Quantico, VA 22135.

ISSN 0014-5688 USPS 383-310


The New ViCAP
More User-Friendly and
Used by More Agencies
By ERIC W. WITZIG, M.S.

W here should officers go


to obtain information
about unsolved violent
crime cases? Where do they direct
jurisdiction by sending a teletype or
similar communication.
Yet, the communication might
not reach the employees who have
violent crime cases with the arrest
of an offender.
ORIGIN OF VICAP
their inquiries? Who do they ask? the necessary information. Gener- The Violent Criminal Appre-
Officers in small departments ally, personnel who need informa- hension Program (ViCAP)1 origi-
might ask their colleagues during tion about violent crime cases do nated from an idea by local law en-
morning roll call. Those in mid- not connect with the investigators forcement and the late Pierce
sized agencies might question in- who have that knowledge. Informa- Brooks.2 In 1956, Mr. Brooks inves-
vestigators working other shifts. tion technology (IT) has enhanced tigated the murders of two Los An-
Personnel in large departments communication for law enforce- geles women who had replied to an
might ask officers in the next ment, allowing departments to close advertisement for photographic

June 2003 / 1

control of the FBI training center at
Quantico, Virginia.”4
...a tremendous ViCAP became a part of the
change has NCAVC with its goal to “...collect,
occurred in the collate, and analyze all aspects of
the investigation of similar-pattern,
way ViCAP now multiple murders, on a nationwide
provides services basis, regardless of the location or
to state and local number of police agencies in-
law enforcement. volved.”5 Mr. Brooks envisioned
ViCAP as a “nationwide clearing-


Mr. Witzig, a former detective in the Homicide Branch of the Washington, D.C.,
Metropolitan Police Department and agent of the chief medical examiner for
Washington, D.C., is a major case specialist with the FBI’s Violent Criminal
Apprehension Program.
house...to provide all law enforce-
ment agencies reporting similar-
pattern violent crimes with the
information necessary to initiate a
coordinated multiagency investi-
gation.”6 ViCAP attempts to iden-
tify similar characteristics that
may exist in a series of unsolved
models. Their bodies, tied with rope investigators easily could query the murders and provide all police
in such a fashion as to suggest that database for similar ones when they agencies reporting similar patterns
the killer might practice bondage, first confront new, “mystery” cases. with information necessary to ini-
subsequently were found in the They could use clues from other tiate a coordinated multiagency
desert. cases that exhibit similar character- investigation.7
Mr. Brooks, convinced that istics to solve more cases. More-
these were not the killer’s first mur- over, when officers identify offend- REDESIGN OF VICAP
ders and that the offender would ers, a search of the computer using Since ViCAP’s beginning at the
kill again, devised an early form their modus operandi (MO) would FBI Academy in July 1985, its goal
of ViCAP. For 18 months, he used reveal other open cases for which of identifying cases exhibiting simi-
his off-duty time to visit the Los they might be responsible.3 lar characteristics and providing
Angeles central library and read In 1983, the Office of Juvenile that information to law enforcement
out-of-town newspapers to look for Justice and Delinquency Prevention agencies for a coordinated, case-
information on murders that exhib- and the National Institute of Justice closing investigation has remained
ited characteristics similar to those gave a planning grant, the “National constant. But, a tremendous change
he was investigating. He found such Missing/Abducted Children and has occurred in the way ViCAP
an article in a newspaper and, using Serial Murder Tracking and Pre- now provides services to state and
pieces from that case coupled with vention Program,” to Sam Houston local law enforcement. In 1996, a
evidence from his own cases, ar- State University in Huntsville, business analysis revealed several
rested an individual who subse- Texas. After three workshops, with details about ViCAP.8
quently was tried, convicted, and the last held in November 1983, the • Only 3 to 7 percent of the total
executed for the murders. National Center for the Analysis of cases were reported each year.
Mr. Brooks refined his idea Violent Crime (NCAVC) emerged. Of the 21,000 homicides
and concluded that a computer The U.S. Department of Justice pro- (average) reported per year in
could capture relevant information vided the initial funding for the the 1990s,9 only about 1,500
about murders. If open and closed NCAVC and stipulated that it to 1,800 were submitted to
cases were stored in the computer, would be “...under the direction and the nationwide database.

2 / FBI Law Enforcement Bulletin


• An urban void existed. While integrates, organizes, and analyzes software would have to operate on
most murders occurred in large information in active support of in- a modestly priced desktop com-
cities, the cities were not vestigations by federal, state, and puter. Crime bill monies provided
contributing their homicides local law enforcement agencies of the initial funding to create com-
to the nationwide database. violent serial crimes.”10 pletely new software for ViCAP
• ViCAP users reported that the From the business analysis, and to move it as an application
189-question ViCAP form was ViCAP learned that the program from a mainframe to a client-server
cumbersome and difficult. had to be placed in the hands of environment.
state and local law enforcement. ViCAP decided that users of
• Users perceived that ViCAP This concept of program delivery the new ViCAP software would re-
case submissions entered a required two conditions of ViCAP ceive the service free of charge.
bureaucratic “black hole” software: 1) migration of the appli- Moreover, ViCAP loaned high-end
never to emerge or be seen cation from a mainframe computing computers loaded with the new
again. environment to a platform more software to more than 50 law
• Chronic understaffing caused a affordable by state and local law enforcement entities. These com-
failure to address incoming enforcement and 2) a choice of puters had a modem that enabled
case work on a timely basis. software that eliminated the need users to exchange information with
The beginning of the ViCAP for a computer programmer to ex- each other and forward case infor-
change originated with the 1994 tract information from a database. mation to state hubs where it was
crime bill. Legislation in this bill To accomplish these objectives, downloaded to the national data-
directed the attorney general to ViCAP had to create a powerful, base. A memorandum of under-
“...develop and implement, on a pi- object-oriented, user-friendly, soft- standing (MOU) formalized the
lot basis with no more than 10 ware seamlessly integrating data, conveyance of new ViCAP soft-
participating cities, an intelligent mapping, reporting, and image- ware, the loan of a desktop com-
information system that gathers, capturing tools. This high-end puter to participating agencies, and

Case Example: Victim by the Lake


In 1996, a suspect in a drug case in a northeastern state made an offer to the authorities—in
exchange for leniency in his prosecution or at the time of his sentencing, he would give informa-
tion linking his brother to a murder. He advised that a white male in a southeastern state died from
repeated strikes with a blunt object. The investigators questioned the suspect about where the crime
occurred, and the suspect advised that he did not know the exact location, but that he thought it
happened near a body of water. Further, the suspect advised that his brother ran over the victim
with an automobile.
Investigators from the northeastern state contacted ViCAP and related the details of the case as
told to them by the suspect. A crime analyst searched the ViCAP database and found a case from
1986 in a southeastern state that matched the details offered by the suspect in the drug case. The
victim’s cause of death was blunt force trauma, and he was run over by an automobile. Further, the
murder occurred near a small lake. Authorities in the northeast with the information contacted
investigators in the southeast with the open homicide case. The southeastern case successfully was
closed with the identification and arrest of the offender.11

June 2003 / 3
Case Example: Texas Railroads
In 1999, a series of homicides occurred in Texas. Early in the series, the cases were presented as
murders in the victims’ homes. Female victims were sexually assaulted, blunt force trauma was the
cause of death,12 and items of value were stolen from the homes.13 The murder scenes were close to
railroad tracks, sometimes only a few feet away.
In May 1999, personnel from the command post in Texas called ViCAP with information about
three of the murders. One of the ViCAP crime analysts remembered a case from Kentucky where
railroad tracks were prominently mentioned. The analyst searched the database and quickly found
the case in Kentucky where a male was killed along a pair of railroad tracks. The cause of death
was blunt force trauma.14 His female companion was sexually assaulted and left for dead. ViCAP
relayed information concerning the Kentucky rape/homicide to the command post in Texas. Subse-
quent DNA examinations linked the Texas cases with the Kentucky case.
An itinerant freight train rider was identified as the suspect in the series of cases.15 He was
apprehended by authorities on July 13, 1999, when he surrendered at the border in El Paso, Texas.
Charged with nine murders, two in Illinois, one in Kentucky, and six in Texas,16 the subject was
tried, convicted, and sentenced to death.
In July 2000, he confessed to the 1997 murders of two teenagers on a railroad track near
Oxford, Florida.17 The male victim’s body was found on March 23, 1997; the female victim’s body
was not found until July 2000, when authorities, following the killer’s directions, found her skeletal
remains wrapped in a blanket and jacket.18
While confessing to the two murders in Florida, the subject said that he once killed a woman in
a southeastern state, somewhere along railroad tracks. She was an old woman, hanging her wash on
the line, and he killed her inside her house. He did not provide more details.
A check of the ViCAP database revealed a 1998 case from a southeastern state where an elderly
woman was hanging laundry in her backyard just a few feet from a pair of railroad tracks that ran
by her property. The command post in Texas and the investigator in the southeastern state were
notified of the case match. When interviewed by the investigator, the subject confessed in detail
and drew a diagram of the inside of the victim’s house. In this case, no fingerprint or DNA evidence
matched the defendant to the murder.

these agencies’ relationship with and experienced crime analysts THE NEW VICAP
ViCAP. serve with ViCAP, and they address Some agencies run the New
Additionally, the 189-question incoming work and requests on a ViCAP system in their own depart-
ViCAP form was completely re- more timely basis. They handle ments, others prefer to run the soft-
designed, streamlined to only 95 high-profile or immediate case ware on a stand-alone desktop, and
questions, and became more ap- requests rapidly, frequently within several put the software on their in-
pealing to the eye. The paper form the same hour or day. In a symbolic, ternal networks. Agency networks
both looked and became more but important, perceptual break support as few as three users,
user-friendly. with the old ways of doing business, through the entire investigative
In 1998, Congress provided ad- ViCAP reflected its new software staff, and up to five different bor-
ditional funding for ViCAP crime and energy with a new name—the oughs and the precincts therein.
analysts. Today, 19 well-trained New ViCAP. New ViCAP software operating in

4 / FBI Law Enforcement Bulletin


participating agencies allows direct information about a case in one multiagency case meetings. The ad
access to all of the information that place, but the concept of electronic hoc query and resulting matrix
they enter and the ability to perform storage of case information proves analysis prove a very powerful
their own crime analysis. unsettling to some people. To over- combination of tools for any analyst
Cold case squads can store come this problem, New ViCAP examining violent crime.
their cases without resorting to provided a hard copy. This multi-
wall-filling filing cabinets. With page report prints on screen or on Sexual Assault Data Collection
just a piece of information, a nick- paper and includes all of the infor- Many New ViCAP users have
name, an address, or the name of a mation entered into the database. reported that the homicide-oriented
bar or other business, investigators The printed document can be placed version was a helpful crime analysis
can retrieve decade-old cases for in the case folder or jacket and pre- tool. But, what the users really
additional investigation. Con- served indefinitely. needed was a crime analysis tool for
versely, cold case squads looking sexual assaults. ViCAP currently is
for cases exhibiting an MO used by working on that product by deter-


a suspect, or a series of cases match- mining data elements for the paper
ing a particular MO, can make those form and the electronic version and
searches as well. New ViCAP designing the paper form for sexual
Research has shown that ad- understands that assault data collection to mirror the
ministrators like the reports existing homicide-oriented form.
package in New ViCAP. Standard
unique cases ViCAP is developing the electronic
reports include— require distinctive portion of the system in a Web-en-
• cases by day of the week,
database queries. abled fashion. This will permit us-
month, or district; ers to exchange information more


easily and potentially will provide
• case status (open or closed); limited access to the nationwide
• causative factors; database.
New ViCAP understands that
• offender age or ethnicity; unique cases require distinctive More Developments
• victim age or ethnicity; database queries. To provide for A recent development in New
• victim-offender relationship; discrete, particular questions of the ViCAP is the ability to store one or
and database, the program has a pow- more images and associate them
erful ad hoc query tool, whereby with a particular case. The images
• all weapons used or firearms any combination of New ViCAP can be photographs scanned into the
used by caliber or type. variables and attributes can be system or maps or other graphics
Perhaps most useful to adminis- strung together to produce a set of imported into the system. This tool
trators and investigators is the one- possibly related cases. Refinement has important implications for
page New ViCAP summary report, of the ad hoc query produces more, training new investigators, refresh-
which collects the main facts from a or fewer, cases delivered to the ing case-specific recollections of
violent crime and prints them to the crime analyst through the possibili- experienced investigators, or ex-
screen or, typically, two sheets of ties set. When the listing of cases is changing precise information to
paper. The summary report proves returned, the crime analyst can con- identify unknown victims.
an excellent briefing tool for ad- trast and compare them in a matrix An envisioned tool, not yet a
ministrators, managers, or elected of variables specified by the ana- part of the software, is a mapping
officials. lyst. Particularly valuable case ma- capability. New ViCAP already
Some investigators and pros- trixes can be titled and printed for captures graphic information sys-
ecutors like to have all of the more formal presentations, such as tem (GIS) data. This information

June 2003 / 5
could be used for traditional pin use New ViCAP were Kansas City, Bureau of Investigation (CBI) and
maps. Alternatively, investigators Missouri, and Kansas City, Kansas. cities and counties in the state.
could use GIS data to store and Now, police and sheriff depart- Cases can be entered at the local
search offender time lines like those ments in the largest metropolitan level and uploaded to the state. In
prepared for suspected or known areas are using New ViCAP, in- addition to its networking arrange-
serial killers. Once offender time cluding Baltimore, Maryland; Chi- ments, CBI selected New ViCAP as
lines are stored, GIS data for each cago, Illinois; Los Angeles, Califor- the statewide tool for sex offender
newly entered case could be auto- nia; Miami, Florida; New York, registry.
matically compared with the time New York; and Washington, D.C. Other states have implemented
lines. For example, an automated Further, MOUs and the New a regional model. For example, the
hit system could report to the ana- ViCAP system are in place with 40 Los Angeles County Sheriff’s and
lyst that plus or minus 3 days, a states. More than 400 state and local Los Angeles Police Departments
killer was in the town where the law enforcement entities use the provide an excellent example of
murder occurred.19 New ViCAP software. regional concept application. The
The architecture of the New sheriff’s department serves as the
A Communication Tool ViCAP network is as varied as the collection point and analysis hub
Police agencies across the needs of its users. For some states, for cases in the county. MOUs are
country recognize New ViCAP as a such as Colorado, a “hub and in place between the sheriff’s
valuable violent crime communica- spoke” design works well. MOUs department and 45 of the 46 po-
tion tool. The first pair of cities to are created between the Colorado lice agencies in the county, thus

Case Example: Bag of Bones

In 2001, a ViCAP crime analyst reviewed a state police publication that mentioned a bag of
human bones found by hunters in a seaboard forest of an eastern state. The victim was a white
male, about 40 to 60 years old, and between 5' 7" and 5' 9" in height. His cause of death was blunt
force trauma to the head. Recovered with the remains was a 14-carat gold ring with engraved
letters. Authorities had no leads for identification of the remains.
A ViCAP crime analyst searched the database using the physical description of the victim and
then made an additional search, thinking that the letters engraved in the ring might be the initials
of a name. A possible match was made with a July 1998 case where three people were reported
missing from a midwestern state. The report was made by a fourth member of the family, a son,
who waited a week before reporting his mother, father, and sibling as missing persons. Personnel
had exhausted all investigative leads.
Authorities in the eastern and midwestern states contacted each other. In January 2001, ViCAP
learned that forensic odontology had identified the bones in the bag as those of the father missing
from the midwestern state. The letters in the recovered ring represented the maiden name of the
missing mother and the name of the missing father.
ViCAP learned later that a suspect was identified and charged with the murder—the oldest son
who made the report in the midwest. The remains of his mother and his sibling have not been
located.

6 / FBI Law Enforcement Bulletin


providing a web of case-sharing in- relationship with a state hub or Wambaugh wrote the book The Onion Field
based on this crime. Subsequently, Mr. Brooks
formation for participating law ViCAP. The software is case-man- served as a technical consultant to Jack Webb
enforcement entities, including the agement and case-matching capable and the television show “Dragnet,” as well as
two largest, the police and sheriff’s with an easy-to-use data retrieval “Dragnet 1969,” the made-for-television
departments. scheme and a package of reports production of the case outlined here.
3
Author interviews with Pierce R. Brooks,
that serves the needs of adminis- Quantico, Virginia, 1985 and Vida, Oregon,
Data Security trators and commanders. Initially April 1992.
New ViCAP created a standard designed for homicide-oriented vio- 4
Steven A. Egger, Serial Murder—An
of information for exchange be- lent crime, New ViCAP soon will Elusive Phenomenon (New York, NY: Prager
Publishers, 1990), 192-193.
tween law enforcement agencies. provide an information technology 5
Ibid.
Naturally, a law enforcement entity system to capture and analyze sex 6
Pierce Brooks, “The Investigative
would express concern for violent offenses as well. Forty years after Consultant Team: A New Approach for Law
crime data sent to a national data- Mr. Brooks’ idea of putting all ho- Enforcement Cooperation,” (Washington, DC:
Police Executive Research Forum, 1981),
base with information no longer un- micides into a computer, law en- unpublished report, in Steven A. Egger, Serial
der an agency’s direct control. forcement is on the cusp of making Murder—An Elusive Phenomenon (New York,
ViCAP recognizes its responsibility his thinking a practical reality. NY: Prager Publishers, 1990), 193.
7
Supra note 4, 193.
to provide security for violent crime 8
Arthur Meister, ViCAP lectures at
case data and has provided Quantico, Virginia, 1999-2000.
that security for more than 9
U.S. Department of Justice,
16 years. New ViCAP con- Federal Bureau of Investigation,
Crime in the United States
tinues to recognize the sen- (Washington, DC: U.S. Govern-
sitive nature of violent ment Printing Office, 1991-2000),
crime data and provides ap- 8, 13, 14, or 15. In 1991, a high of
propriate security. 24,526 homicides were reported,
contrasted with a low of 15,533
reported in 1999.
CONCLUSION 10
U.S. Congress, Senate,
Violent Crime Control and Law
The FBI’s Violent Enforcement Act of 1993, H.R.
Criminal Apprehension 3355 Amendment, 103rd Cong., 1st
Program Unit has helped sess., 1993, 267-268.
11
local and state law enforce- Arthur Meister, ViCAP
lectures at Quantico, VA, 1999-
ment agencies solve violent 2000.
crimes for almost 20 years. 12
David McLemore, “Aliases,
As technology has im- Trainhopping Obscure Suspect’s
proved, ViCAP has ensured that its Endnotes
Trail,” Dallas Morning News, June 17, 1999,
sec. A., p. 16.
objectives change to support such 1
ViCAP has been distinguished by several 13
Pauline Arrillaga, “Town Copes After
advancements. New ViCAP repre- acronyms since its inception. To ensure Slayings by Suspected Rail Rider,” Dallas
sents an instructional and techno- consistency in this article, the author used Morning News, June 11, 1999, sec. A., p. 29.
logical violent crime analysis tool the current acronym for the program. 14
Supra note 12, sec. A., p. 17.
2
Mr. Brooks was a former commander 15
Michael Pearson, “Railroad Killer,”
suitable for use in a law enforce- of the Los Angeles, California, Police Associated Press, June 22, 1999.
ment agency of any size. It provides Department’s Robbery-Homicide Division. 16
Mark Babineck, “Railroad Killer,”
a standard method for the communi- See, Bob Keefer, “Distinguished Homicide Associated Press, 2000.
cation of violent crime information Detective Dies at 75,” The Register-Guard, 17
“Railroad Killer,” Associated Press,
Eugene, Oregon, March 1, 1998, p. 1, in which July 2000.
between and among agencies. he wrote that Mr. Brooks investigated the 18
Ibid.
New ViCAP software is free murder of a Los Angeles officer in an onion 19
This represents an arbitrary number;
to agencies that formalize their field outside of Bakersfield, California. Joseph analysts could select any number of days.

June 2003 / 7
Perspective
Career Criminals, This brief sketch shows the necessity for, and the
difficulty of, achieving a consensus for the definition
Security Threat Groups, of the term gang.2 The authors, however, have em-
and Prison Gangs ployed the FBI’s definition of a criminal street gang:
An Interrelated Threat “A group of people who form an allegiance based on
By David M. Allender and Frank Marcell various social needs and engage in acts injurious to
public health and morals. Members of street gangs
engage in (or have engaged in) gang-focused criminal

J ust after midnight, a young police officer


stopped a vehicle unaware that the driver was
a gang member recently released from prison, strung
out on crystal meth, and resolved not to return to jail.
activity either individually or collectively; they create
an atmosphere of fear and intimidation within the
community.”3
When criminal street gangs engage in violence
or large-scale illegal pursuits, they threaten the com-
Upon approaching the vehicle, the officer first noticed munities where they exist. Criminal street gangs, or
a female passenger and then saw the driver, wearing sets, operate in neighborhoods throughout the United
a trench coat, quickly exit the vehicle. The officer States. Some are small, whereas others have many
instinctively knew that something was wrong. He members or associates, and all vary greatly in organi-
immediately searched the driver and found a .45- zational sophistication.
caliber handgun in a shoulder holster. A fight ensued
during which the driver shouted to the female, “Shoot
him, shoot him!” As the officer turned toward the Captain Allender serves
vehicle, he saw the woman in a crouched position, with the Indianapolis,
Indiana, Police Department.
pointing a weapon at him. He immediately drew his
service weapon and fired, terminating the threat and
the life of this accomplice.
Such incidents occur, sometimes daily, involving
individuals who belong to criminal gangs and have
served time in prison. Who are these individuals,
these “career criminals,” who seemingly have chosen
crime as a way of life? What are some characteristics
that law enforcement officers can learn to assist in
identifying them? And, most important, what can
officers do to protect themselves and the citizens
they serve from such threatening individuals?1
Mr. Marcell is an executive
Defining the Threat board member of the
A broad spectrum of people use the term gang to National Major Gang Task
Force and a jail intelligence
describe diverse groups with a wide range of charac- supervisor with the
teristics. Academicians, police investigators, politi- Maricopa County, Arizona,
cians, researchers, and residents of crime-ridden Sheriff’s Department.
neighborhoods all have a mental picture based on
their experiences of what constitutes a gang. To some,
a gang is a loose confederation of neighborhood
youths engaged in delinquent activity. Other people
refer to gangs as highly structured drug-dealing
organizations, and still others form mental images of
outlaw motorcycle clubs when they think of gangs.

8 / FBI Law Enforcement Bulletin


Correctional officers have special concerns when activities. They learn of these criminal ventures
it comes to identifying criminal gang members. To from other like-minded criminals, or they travel to
maintain order in the facilities, they must know which a new location to avoid police scrutiny, attempt-
groups are in conflict with each other and what threats ing to blend into a new environment.
these sets pose an officer working in the institution. A • Career criminals disdain authority. They often
number of states and the Federal Bureau of Prisons show their contempt through aggressive behavior
have determined that when an identifiable collection or words. They can react violently over the
of individuals poses a hazard to order inside their slightest perceived provocation, especially when
penal systems, they will label these subjects a security under the influence of alcohol or other drugs.
threat group (STG). The same situation exists with They also have a propensity for sudden physical
criminal sets living in open society. For example, the violence, especially those who have worked their
term community threat group has emerged as a way to way through the prison system. However, when
provide a clearer understanding of preparing for or committing
the hazards these groups represent crimes, they can be deliberate,
to American communities.4 calculating, and rational in their


Individuals labeled as criminal actions.
gang or STG members are not
“kids” drawn unknowingly into a Prison gangs • Career criminals have an acute
dangerous situation. Rather, these communicate with awareness of their surroundings
people pose a viable threat to the and possess many survival skills,
persons on the
safety and security of communities learned traits during incarceration.
outside in a variety They know how to size up a
throughout the country. Such of ways.
individuals, or “career criminals,” situation quickly to pursue crimi-
have chosen to make crime a way nal objectives or scam their way
of life and seldom worry about the
consequences of their actions until
after their apprehension. Then,
they tend to put all of their efforts into rationalizing or
” out of a situation.
• Career criminals rarely stick to
one type of crime. Revolving in
and out of county jails and other prisons, they
minimizing their crimes in an attempt to manipulate learn how to pursue a multitude of different types
the judicial system. of criminal activities.
• Career criminals view themselves with an inflated
Examining Career Criminals
ego. They even may have contempt for fellow
The career criminal personality may vary broadly inmates and scorn law-abiding people and author-
and is best left to the clinicians to analyze. The ity. They know and use the psychological tactics
authors, however, have learned that career criminals of fear and intimidation and can switch quickly
often demonstrate certain types of behavior, and law into this mind-set. While committing a crime,
enforcement professionals may find this information they may have a false sense of invincibility,
useful as a predicator to what these criminals are making them all the more dangerous. Moreover,
capable of and what to expect when interacting with they continue their criminal enterprises even
them. If, indeed, experience is the best teacher, then while incarcerated.
the authors submit the results of their education as an
overview of some of the behaviors exhibited by the Understanding Security Threat Groups
career criminals they have encountered.5 The authors have observed that during periods of
• Career criminals have no boundaries; they reside incarceration, career criminals often align themselves
in every state. They migrate to communities that with groups or cliques that control illegal activities
afford them opportunities to pursue their criminal through force or cunning. They set out to distinguish

June 2003 / 9
themselves from the mainstream inmate population. may be incarcerated in a local jail and then in a
This explains why STGs are a magnet for career longer-term state or federal facility. If they have a
criminals. reputation among their peers that indicates their
Corrections practitioners who have identified desirability as a candidate for induction into an STG,
STGs within their systems know that the groups’ members inside the facility will approach them.
criminal activities extend beyond prison walls. Their Inmates may remain an associate of an STG or may
success inside a corrections facility largely depends earn a chance to become a full member. Either way,
on an infrastructure on the outside to further their they will fulfill assignments given to them by the
criminal enterprises, providing financial assistance prison gang.
and communication (i.e., intelligence). The overriding The motivation driving the prison gang member is
trait of these like-minded career criminals who complex. While many sources have cited the need for
comprise these groups is commitment. Upon release protection from predatory inmates, other factors enter
from prison, most of these offend- in, including the human need to
ers will continue to prey upon the © brandXpictures seek acceptance, increased status,
community or those who dare to and financial profit from gang
oppose them. activities. When gang members
are released from custody, they
Recognizing Prison Gangs often return to their neighbor-
Criminal gangs may partici- hoods and renew old associations.
pate in a wide range of illegal They then may reenter the gang
activities. Profits from unlawful subculture, which led to their
actions, like drug dealing, can incarceration. If they return to
prove important to the cohesion of criminal activity, the contacts
a street gang. To realize the made in the prison system will
desired profits, small, disorga- become more important. The
nized groups need a reliable drug prison gang will allow the gang-
source or a buyer for large ster on the outside to network
amounts of stolen property. with other criminals or provide
Bigger criminal enterprises, such regular secure sources for illegal
as prison gangs, may provide the resources sought products, such as drugs. The STG also will serve as
by a street crew. Managing the source of the illegal protection for others in the gangster’s crew when they
profits allows the larger gang to exert influence over are incarcerated. The STG even may provide income
street-level operations. Control is further strengthened to the street gang with compensation for missions it
when the upper-tier gang pays a street-level crew to assigns.
perform tasks, such as assault or murder. As the Because other street gangs will have similar
connection between the groups solidifies, reputation situations, the prison gang can use the same methods
and rumor can make a prison gang even more power- to gain influence over a multitude of street crews.
ful, drawing other street-level crews into their sphere STGs will pick which sets they hope to influence and
of influence. build a coalition. To control the street, a prison gang
A hierarchy exists in the criminal gang world.6 may withhold the desired product from an uncoopera-
Gangsters typically start out in a street crew, usually tive set while ensuring that a competitor gets ample
in a neighborhood or crowd where they have connec- amounts. A more direct approach might occur,
tions. These associations often will be rooted in whereby an incarcerated member of an uncooperative
family ties or friendship because gangs need both to gang may suffer an assault orchestrated by the STG.
trust partners in their criminal enterprises and to Or, a powerful group may order a cooperative street
fraternize with during their social functions. At some gang to use violence to force a reluctant clique to
point in their lives, criminal gang members eventually conform to the rules as formulated by the STG. In

10 / FBI Law Enforcement Bulletin


exchange for the protection and profit associated with typically focus on group behavior as opposed to the
cooperation, the street crews will continue to do the commonalties of individual members. Yet, under-
bidding of the prison gang. Over time, the relationship standing career criminals, their perceptions, character-
may grow strong, but rarely will the prison gang allow istics, and traits as individuals should rank among the
a street gang to “patch over” and become members of most paramount objectives of improving officer
the STG. For this reason, many more criminal street safety. This proves especially important when decid-
gangs than prison gangs exist. Criminal street gang- ing to employ undercover personnel or conduct search
sters accepted into an STG normally return to their warrant application. It also is useful in assessing
original gang upon release from prison. Street gang criminal activity trends or modus operandi patterns
members inducted into an STG will have increased within a jurisdiction.
status due to the connections made in prison. Unless Similarly, during police contacts or in corrections
they have committed some infraction against the settings, officers must realize that career criminals
STG, the gangsters will be accepted back into the constantly scrutinize them. The authors have found
prison gang during any subsequent incarcerations. that these criminals think that they are smarter than
Prison gangs communicate criminal justice professionals and
with persons on the outside in a attempt to use techniques to take
variety of ways. Although corrup- control or manipulate situations.
tion is sometimes an issue, the
majority of communication
methods are legal. Persons unfa-
miliar with the gang subculture
“ Because career
criminals have been
through the criminal
A favorite is the “stare down,” an
intimidation tactic used to see if
an officer will break eye contact
and, if so, is seen as a sign of
tend to underestimate gangsters. weakness. Also, career criminals
They are not stupid or slow, even justice system may be smooth talking or manipu-
though, for the most part, they do extensively, they lative in one instant and verbally
poorly in structured educational become aware of the abusive the next. They may test
settings. Criminal gang members nuances in corrections officers to gauge reaction or see
have chosen an alternate lifestyle settings. how much they can get away
that often engages in illegal with. Regardless of the tactic
activity. Gang members in gen-
eral, but prison gangsters espe-
cially, study and train to improve
” employed, officers must remain
aware of such techniques and
immediately inform subjects
their crime-related skills. The authors have found that of their knowledge and intolerance of such actions.
a review of security videos or literature confiscated Corrections officers should know the career
from gang members can provide evidence of the criminals in their units and housing locations. Be-
enormous amount of effort that they put into being cause career criminals have been through the criminal
gangsters. The literature from most gang members justice system extensively, they become aware of the
includes some type of coded alphabet, often based nuances in corrections settings. They look for security
upon a foreign language that members must master. breaches; examine the relationship between staff
For example, some Hispanic gangs use the Aztec members and administrators; take into account any
language to code their documents. Although learning staff shortages; and seek ways to access materials,
this language expresses pride in a common heritage, it people, or contraband. Career criminals also tend to
becomes sinister when used to shield illegal acts from gravitate to leadership positions within the inmate
appropriate law enforcement scrutiny. population or STGs. Therefore, officers should
review the institutional files on such inmates to gain
Responding to the Threat insight into their backgrounds. How extensive are
Generally, when criminal justice professionals their criminal histories? Are there prior charges or
attempt to assess STGs and prison gangs, they convictions for escape or assaulting officers? What

June 2003 / 11
does the psychological profile say about high manip- change in the way gangs do business. Other indica-
ulation or violence potential? Are there any past tions exist that imply increasing cooperation among
incarcerations in other state or federal prisons? criminal gangs.
Corrections officers should find out as much as Current gang trends, while disturbing, are not
possible about the criminals they face daily. unexpected when considering the history of gangs in
Likewise, law enforcement officers should apply America and in other countries. Historically, gang
these same techniques. If career criminals reside activity has flourished during those periods of time
within the community, officers when sources of illegal profit
should know who they are and were readily available and social
what kind of danger they present. conditions encouraged the
This illustrates the importance of
maintaining liaison with parole
divisions, departments of correc-
tions, and county jail facilities.
“If career criminals
reside within the
existence of gangs. The entire
criminal justice system needs to
educate itself to combat this most
recent form of organized criminal
These institutions can share community, officers behavior and profit. The first
important information about such should know who they important step in this process
criminals. Are they involved in are and what kind of rests with an exchange of infor-
multiple criminal activities, such danger they present. mation between the law enforce-
as narcotics, armed robbery, and ment and corrections communi-
burglary? Are they spontaneous ties that will allow for the
or methodical in their criminal
activities? Do they have a history
of high violence potential? Were
they members of an STG while in prison? Answers
” tracking of criminals as they
increasingly migrate around the
country. As the flow of informa-
tion increases so will the effectiveness of combating
to these types of questions can mean the difference such criminal activities. Although the criminal justice
between life and death for officers responding to calls system never will stop all criminal activity, gang
for service, executing search warrants, or making enforcement is an area where police and corrections,
traffic stops or other contacts, as illustrated dramati- with increased intelligence information sharing, can
cally by the opening scenario of this article. make a major impact in reducing the interrelated
In short, to effectively curtail the activities of threat posed by career criminals, security threat
career criminals and the groups to which they often groups, and prison gangs.
belong, criminal justice professionals must learn the
mind-sets, traits, and characteristics of these offend- Endnotes
1
The authors based this article on a research project they participated
ers. Officers must know how and where to obtain in that compiled information about gangs obtained from personal
information on these individuals. To this end, commu- interviews with local, state, and federal police officers, as well as officers
nicating this type of information between corrections working in local, state, and federal correctional institutions.
2
and law enforcement personnel becomes paramount For additional information, see Mike Langston, “Addressing the
Need for a Uniform Definition of Gang-Involved Crime,” FBI Law
for the safety of both professional entities, as well as Enforcement Bulletin, February 2003, 7-11.
the communities they serve. 3
U.S. Department of Justice, Federal Bureau of Investigation, An
Introduction to Violent Street Gangs in the United States, 2nd edition,
Conclusion 1999.
4
FBI analyst, Safe Streets Gang Unit.
A growing trend seems to be developing among 5
The authors’ education results from their personal interactions with
prison gangs to organize criminal street crews to career criminals, security threat groups, and gang members during their
facilitate the drug trade. The enormous profits avail- many years of working in the criminal justice system.
6
For additional information on gang structure, see David M. Allender,
able to those willing to take the risks inherent in this “Gangs in Middle America: Are They a Threat?” FBI Law Enforcement
and other lucrative illegal enterprises are leading to a Bulletin, December 2001, 1-9.

12 / FBI Law Enforcement Bulletin


© George Godoy

Police Work
Addiction
A Cautionary Tale
By GERARD J. SOLAN, M.A.,
and JEAN M. CASEY, Ph.D.

G
reat leaders lead by ex- and even sadder that he should pass
Everyone is bound to bear ample, and Police Chief away in the prime of his life.
patiently the results of his William Smith was no ex- Certainly, police officers are
own example. ception. He was totally selfless and expected to put aside all other needs
—Phaedrus
always available, arriving at his when duty calls, and, without ques-
command each morning before tion, duty does call. Commanders
eight o’clock and not leaving until and officers alike must sustain an
everyone else had gone home. It endless capacity to meet this de-
was not uncommon to find him mand. Communities hold fast to the
working on Saturday or Sunday. expectation that the police will do
The deputy chief told those assem- all that can be humanly done and, at
bled at the church that he actually times, much more than should be
was reluctant to leave each night expected of mere humans. Therein
before the chief. Everyone felt sad lies the great challenge for law en-
that Chief Smith left a young family forcement officers and supervisors,

June 2003 / 13
maintaining a healthy balance in requires consideration of, and for, Regrettably, they do not suffer
meeting reasonable responsibilities those very people. alone. They unwittingly share this
to the job, to themselves, and to pain with their families and col-
their families. The Price of Work Addiction leagues alike.
Perhaps, Chief Smith repre- Workaholics are married to
The Old Covenant sents an extreme example of the their work. Their vows to love and
Some in public safety view the dangers inherent in the work- honor their spouses above all “oth-
aphorism “work ethic,” surely a cu- addicted lifestyle. However, litera- ers” no longer holds meaning or
rious juxtaposition of words, as rep- ture on work addiction asserts that possibility. No spouse and no fam-
resentative of the old covenant. work constitutes the drug of choice ily can compete with this all-
This paradigm celebrates the job for some 30 percent of the popu- consuming obsession.
above all else. Team players count lation, for whom working is so vital Workaholics themselves are a
the most; the job comes first; no to their emotional well-being that key contributor to the unhealthy
sacrifice is too great. in fact, they have become addicted family patterns resulting from work
Police supervisors, socialized to it.1 While the actual mortality addiction for a number of reasons.
within this old covenant, operate in rate for work addiction may be First, they may have grown up in a
a world that expects human carnage low, the social lethality of this be- dysfunctional family system where
as a by-product. Work ethic repre- havior proves overwhelming. These role models taught unhealthy pat-
sents a “code” for doing whatever it unfortunate individuals are predis- terns of relating to others. Research
takes, and, perhaps, the only ethic posed to involve themselves—and indicates that the family of origin
involved is the certainty that the job their families—in a life not unlike contributes greatly to the develop-
must be done. Lost in this reasoning that of Chief Smith. Clearly, work ment of the workaholic, and the
is the moral responsibility that addicts (or workaholics, the more roots of the workaholic’s perfec-
supervisors hold for the fair and common descriptor) cannot assess tionism often lie in childhood expe-
ethical treatment of officers and what is important in healthy riences.2 In these dysfunctional
their families. As a practical matter, lifestyle choices and, thus, experi- homes, families reward children for
getting the job done through people ence a diminished quality of life. good performance, not for who they
are. They give praise and condi-
tional love only whenever children
perform a certain way or meet cer-
tain high expectations. In adult-
hood, this same need for perfection
is the basis for the obsession for
work—everything must be done
properly and always at a very high
level of competence and perfection.
Second, the need for worka-
holics to feel dominant and “in
control” may make them less able
to relate to peers. They may inter-
act more easily with older and
younger people or those of a lower
status or socioeconomic level than
Mr. Solan, a retired law enforcement Dr. Casey teaches counseling themselves. This need for con-
officer, currently is an adjunct faculty and psychological services at
member at Columbia College in the State University of New York
tinually being in control of them-
Syracuse, New York. at Oswego. selves and in charge creates tension
in family relationships. The one

14 / FBI Law Enforcement Bulletin


constant involved in this work treated the three of them like the workaholic describes “a person
mind-set devalues the quality of so- police officers he supervised. He whose need for work has become so
cial interactions. Loved ones have a was demanding, controlling, and excessive that it creates noticeable
reasonable expectation that time very jealous of her close relation- disturbance or interference with his
spent together is time well spent ship with their children. She never bodily health, personal happiness,
and, therefore, should not be made knew which personality he would and interpersonal relations, and
to feel that such time comes at the exhibit. with his smooth social function-
expense of personal productivity. The self-imposed behavior of ing.”5 The unique difference be-
Loved ones can sense “just going work addiction also causes physical tween work addiction and other
through the motions.” The same symptoms. Excessive pumping of addictions, however, is that super-
holds true for relationships with adrenaline resulting in abnormal visors often sanction work addic-
peer groups and clients. People blood pressure, heart trouble, stom- tion. Supervisors and peers admire
have a strong sense for those who ach sensitivity, nervousness, and this so-called work ethic, and it can
are too busy to make time to prop- the inability to relax under any cir- be both financially and profession-
erly address issues. Conflict be- cumstances are commonplace. ally rewarding.
comes inevitable, and everyone Without question, healthy work
“gets drawn into the act by waltzing can provide a sense of accomplish-


around the workaholic’s schedule, ment and greatly enhance an
moods, and actions.”3 individual’s well-being. Employees
Chief Smith was the proud fa- who work hard, with great energy
ther of two sons, ages 10 and 14. His While the actual and dedication, are not necessarily
wife of 18 years, a stay-at-home mortality rate for addicted to their work. Most of the
mother, formed a close relationship work addiction may time, they thoroughly enjoy their
with the children, having adjusted be low, the social work. However, the key is their
to the irregular and long hours of the ability to maintain a balance in their
chief’s workday. After his death,
lethality of this lives so that their work does not
Mrs. Smith explained that her hus- behavior proves consume them.
band lived on the periphery of the overwhelming. Workaholics, on the other
family’s life. She said that when- hand, become gradually more emo-


ever he spent time with her and their tionally crippled as they become
children, he seemed to do so grudg- embroiled with the demands and
ingly, as though they were depriv- expectations of the workplace.
ing him of valuable time away from Workaholics report feeling pressure They are “addicted to control and
his office. She noted that sometimes in their chests, dizziness, and light- power in a compulsive drive to gain
when he was home, he only slept headedness.4 Obviously, any long- approval and success.”6 The obses-
and never interacted with the fam- term stress that manifests such sion with work grows out of the
ily. She also spoke about going to symptoms as these can result in workaholic’s perfectionism and
family gatherings, such as birthday dangerous health consequences of competitive nature. As with other
parties, with only the children and many types. Chief Smith’s pro- addictions, work is the “fix,” the
finding it hard to explain to friends tracted work addiction led to seri- drug that frees the workaholic from
and family that her husband was ous illness and his ultimate, un- experiencing the emotional pain of
either sleeping or working on his timely death. the anger, hurt, guilt, and fear in the
day off, rather than celebrating a Those people obsessed with other areas of the workaholic’s life.
special occasion. She thought that work share the traits of others with Workaholics constantly focus on
he ignored his family, and she felt such addictions as substance abuse, work, seeking to meet their per-
taken for granted and unwanted. food dependencies, or sexual com- sonal emotional needs through their
Other times, he came home and pulsions. A classic definition of a professions.

June 2003 / 15
Work-Addiction Risk Test
To find out if you are a workaholic, rate yourself on each of the statements below, using a rating scale of 1 (never
true), 2 (sometimes true), 3 (often true), or 4 (always true). Put the number that best describes your work habits in the
blank beside each statement. After you have responded to all 25 statements, add up the numbers for your total score.
The higher your score, the more likely that you are a workaholic, whereas the lower your score, the less likely that you
are a workaholic.
__ 1. I prefer to do most things myself, rather than ask for help.
__ 2. I get impatient when I have to wait for someone else or when something takes too long.
__ 3. I seem to be in a hurry and racing against the clock.
__ 4. I get irritated when I am interrupted while I am in the middle of something.
__ 5. I stay busy and keep many irons in the fire.
__ 6. I find myself doing two or three things at one time, such as eating lunch, writing a memo,
and talking on the telephone.
__ 7. I overcommit myself by accepting more work than I can finish.
__ 8. I feel guilty when I am not working on something.
__ 9. It is more important that I see the concrete results of what I do.
__ 10. I am more interested in the final result of my work than in the process.
__ 11. Things just never seem to move fast enough or get done fast enough for me.
__ 12. I lose my temper when things do not go my way or work out to suit me.
__ 13. I ask the same question again, without realizing it, after I already have received the answer.
__ 14. I spend a lot of time mentally planning and thinking about future events while tuning out
the here and now.
__ 15. I find myself continuing to work after my coworkers have stopped.
__ 16. I get angry when people do not meet my standards of perfection.
__ 17. I get upset when I am in situations where I cannot be in control.
__ 18. I tend to put myself under pressure from self-imposed deadlines.
__ 19. It is hard for me to relax when I am not working.
__ 20. I spend more time working than socializing with friends or on hobbies or leisure activities.
__ 21. I dive into projects to get a head start before all of the phases have been finalized.
__ 22. I get upset with myself for making even the smallest mistake.
__ 23. I put more thought, time, and energy into my work than I do into my relationships
with loved ones and friends.
__ 24. I forget, ignore, or minimize celebrations, such as birthdays, reunions, anniversaries, or holidays.
__ 25. I make important decisions before I have all of the facts and a chance to think them through.

For clinical use, scores on the test are divided into three ranges. Those scoring in the upper third (67-100) are
considered highly workaholic. If you scored in this range, it could mean that you are on your way to burnout, and new
research suggests that family members may be experiencing emotional repercussions as well. Those scoring in the
middle range (57-66) are considered mildly workaholic. If you scored in this range, there is hope. With acceptance
and modifications, you and your loved ones can prevent negative long-term effects. Those scoring in the lowest range
(25-56) are considered not workaholic. If you scored in this range, you are probably an efficient worker instead of a
workaholic and have no need to worry that your work style will negatively affect yourself or others.

Source: B.E. Robinson, Chained to the Desk (New York, NY: New York University Press, 1998), 52-54.
Minor editorial revisions have been made to several test items.

16 / FBI Law Enforcement Bulletin


With this information in mind, officers have different tolerance
law enforcement supervisors must levels to manage the personal, as Wanted:
understand the dangers that work well as the professional, issues that Photographs
addiction presents. These supervi- they encounter. Most important,
sors also must remember that they commanders must realize that the
have an ethical responsibility to quickest route to supervisory negli-
intervene when they observe the gence is a shortsighted focus on re-
telltale signs of the work-addicted sults, not people.
personality.
Conclusion
A New Covenant While law enforcement profes-
Perhaps, the poet Robert Frost sionals should possess a strong
had Chief Smith in mind when he sense of duty and responsibility for
observed, “By working faithfully 8
hours a day, you may eventually get
the public’s welfare, they must not
forget the well-being of their fami- T he Bulletin staff is
always on the lookout
for dynamic, law enforce-
to be boss and work 12 hours a lies, friends, and, most important,
day.” Certainly, expectations run themselves. The sad lesson of Chief ment-related photos for
high in the law enforcement profes- William Smith demonstrates the possible publication in the
sion. Establishing and maintaining need for officers to take the long- magazine. We are interested
relationships creates tremendous term view, beyond the crisis of the in photos that visually depict
demands on time, resources, and moment. Thomas Merton, a the many aspects of the law
energy; life balance easily becomes Trappist monk and prominent au- enforcement profession and
lost. The wise boss must understand thor, said, “We cannot be happy if illustrate the various tasks
and accept this reality. we expect to live all the time at the law enforcement personnel
Twenty-first century police highest peak of intensity. Happiness perform.
management has embraced a sea of is not a matter of intensity, but of We can use either black-
change. Police supervisors now balance and order and rhythm and and-white glossy or color
routinely use technology to gather harmony.” The real challenge for prints or slides, although we
and analyze data across the full law enforcement professionals rests prefer prints (5x7 or 8x10).
spectrum of police performance with at least seeking, if not achiev- We will give appropriate
measures, and, more important, ing, that balance for their families, credit to photographers when
they hold officers accountable for their peers, their communities, and, their work appears in the
results. Today, supervisors ac- most of all, themselves. In so doing, magazine. Contributors
knowledge a new covenant, which they will become better spouses, should send duplicate, not
demands that they set out quantifi- friends, coworkers, and officers original, prints as we do not
able work standards to measure who value their work, but do not let accept responsibility for
work performance. it overwhelm their lives. damaged or lost prints. Send
Prudent and ethical supervisors photographs to:
must measure subordinate produc- Endnotes
1
Art Director
tivity in many ways. They must con- B.E. Robinson, Chained to the Desk (New
York, NY: New York University Press, 1998), 3. FBI Law Enforcement
sider the relative limits of what can 2
B. Killinger, Workaholics: The Respect- Bulletin, FBI Academy,
be reasonably achieved by different able Addicts (Buffalo, NY: Firefly Books, Madison Building,
officers, with diverse skills and 1991). Room 209, Quantico,
3
abilities, across the spectrum of as- Supra note 1, 75.
4
Supra note 2. VA 22135.
signments and work shifts, as well 5
W.E. Oates, Confessions of a Workaholic
as family and personal situations. (New York, NY: Abingdon Press, 1971), 4.
Supervisors must understand that 6
Supra note 2, 6.

June 2003 / 17
Book Reviews

Practical Law Enforcement Management one on management. And, he provides a step-


by Roger Fulton, Gould Publications, Inc., by-step road map on becoming a complete law
Longwood, Florida, 2002. enforcement manager by presenting a guideline
“Practical” is the operative word in describing or framework for each individual reader.
Practical Law Enforcement Management. The In addition to discussing management styles,
book represents a straightforward, no-nonsense Dr. Fulton addresses preparing for promotion, as
approach to managing issues in today’s law well as working toward retirement. He not only
enforcement environment. provides the question mark of how to be a leader
Dr. Fulton examines the components of and manager but he also presents an outline on
management through five chapters titled “Super- how to successfully manage a law enforcement
vision,” “Management,” “Administration,” agency by using common sense, along with the
“Leadership,” and “Your Career.” He begins each known policies and procedures. Whether readers
chapter with a brief synopsis outlining the topic are preparing for a promotion or just wanting to
and a statement of fact on what the reader might hone their skills as a supervisor, this book offers
do to reach a successful conclusion to each invaluable information.
dilemma. He also requires the reader to actually
interact with him by asking questions, such as Reviewed by
“How do you stack up?” in the chapter on super- Deputy Chief Brenda J. Smith
vision and “Are you part of the problem?” in the Omaha, Nebraska, Police Department

Practical Law Enforcement Management by of New York. Currently an assistant professor


Roger Fulton stands as an excellent resource for of criminal justice at Adirondack Community
current law enforcement managers and for those College in Queensbury, New York, he also has
who have aspirations of being promoted through authored one book, contributed to another, and
the chain of command. Dr. Fulton, a retired written numerous articles for national law en-
captain with the New York State Police, a man- forcement publications.
agement consultant, and an author of two suc- Between the two, Dr. Fulton and Professor
cessful books and dozens of articles, has taken Carpenter share a wealth of experiences with the
his many years of expertise in police management reader through an engaging and highly readable
and training and condensed it into an outstanding format. Practical Law Enforcement Management
guide for veteran law enforcement managers, is recommended for law enforcement officers and
as well as the up-and-coming leaders of managers who want a successful career in police
tomorrow. supervision, management, and leadership.
As an additional plus to Dr. Fulton’s creden-
tials, Michael Carpenter, who edited the book, Reviewed by
brings more than 26 years of experience in Chief John M. Eller
various aspects of law enforcement, including Brookhaven, Pennsylvania,
serving as a police training specialist for the state Police Department

18 / FBI Law Enforcement Bulletin


A Four-Domain Model
for Detecting Deception
An Alternative Paradigm for Interviewing
By JOE NAVARRO, M.A.

F or 30 years, the literature on


interviewing has empha-
sized the use of both verbal
and nonverbal cues in detecting de-
deception when, in fact, it just may
be nervousness or such behavior as
face touching that also can indicate
honesty.2
a model that incorporates research
with empirical experience to differ-
entiate honesty from deception.
They can use an alternative para-
ception during the interview pro- Repeated studies have shown digm for detecting deception based
cess.1 Much of that emphasis paral- that traditional methods of detect- on four critical domains: comfort/
leled the immense amount of ing deception during interviews discomfort, emphasis, synchrony,
research during that same time pe- succeed only 50 percent of the time, and perception management.
riod in the area of psychology and even for experienced law enforce-
the study of nonverbal behavior. ment officers.3 In spite of this, in- Comfort/Discomfort
Unfortunately, many people still vestigators still need the ability to Comfort is readily apparent in
misinterpret a significant amount of test the veracity of those they inter- conversations with family mem-
nonverbal behavior as indicative of view.To do so, investigators require bers and friends. People sense when

June 2003 / 19

becomes faster. Beyond the physi-
ological responses, which are auto-
nomic and require very little think-
In interviewing ing, people primarily manifest
and detecting discomfort nonverbally instead
deception, of vocally. They tend to move
synchrony plays their bodies by rearranging them-
selves, jiggling their feet, fidgeting,
an important role. or drumming their fingers when
scared, nervous, or significantly


uncomfortable.7
If, while the interviewer re-
Special Agent Navarro is assigned to the FBI’s Tampa office and also mains relaxed and poised, the
serves in the FBI’s National Security Division’s Behavioral Analysis Program. interviewee continually looks at the
clock, sits tensely, or does not
move (“flash frozen”), the inter-
viewer may discern a lack of com-
others have a good time and when touched, people may touch back to fort even though everything may
they feel comfortable in their pres- emphasize a point. Some may dis- appear normal to the untrained
ence. Experiencing comfort in the play their comfort more openly, eye.8 Interviewees show discomfort
presence of strangers becomes such as showing more of their torso when they repeatedly talk about
more difficult, especially in stress- and the insides of their arms and finalizing the interview or when
ful situations, such as during an in- legs. People who speak the truth disruptions appeal to them.
terview. A person’s level of com- more often display comfort because People tend to distance them-
fort or discomfort is one of the most they have no stress to conceal nor selves from those with whom they
important clues interviewers should do they have guilty knowledge to feel uncomfortable. Even while
focus on when trying to establish make them feel uncomfortable.6 sitting side by side, people will
veracity. Tension and distress most While seated at a table, people lean away from those with whom
often manifest upon guilty people comfortable with each other will they feel uncomfortable, often mov-
who must carry the knowledge of move objects aside so that nothing ing either their torsos or their feet
their crimes with them. Attempting blocks their view. Over time, they away or toward an exit, which
to disguise their guilt places a dis- may draw closer so that they do not nonverbally exhibits displeasure.9
tressing cognitive load on them as have to talk as loud, and their These actions can occur in inter-
they struggle to fabricate answers to breathing rhythm, tone of speech, views due to the subject matter dis-
what otherwise would be simple pitch, and general demeanor will cussed. Likewise, people create ar-
questions.4 become similar. tificial barriers with either their
When comfortable, an individ- Subtleties of comfort contrast shoulders and arms or with inani-
ual’s nonverbal behavior tends to with discomfort. People show dis- mate objects in front of them. For
mirror the other person present.5 comfort when they do not like what example, by the end of one inter-
For example, if one person leans is happening to them, what they are view, a very uncomfortable and dis-
forward, the other tends to do so as seeing or hearing, or when others honest interviewee had built a little
well. Or, if one leans to the side compel them to talk about things barrier in front of himself using
with hands in pockets and feet that they would prefer to keep soda cans, pencil holders, and vari-
crossed, the other person may do hidden. People first display discom- ous documents, ultimately planting
the same. Subconsciously, people fort physiologically—heart rates a backpack on the table between
demonstrate their comfort with quicken, hairs stand up, perspira- himself and the interviewer. At
whom they are talking. When tion increases, and breathing the time, the interviewer did not

20 / FBI Law Enforcement Bulletin


recognize the subject’s obvious in- eyelids may close or flutter rapidly people learned to look down or
tent of creating a barrier. as an expression of their senti- away from parental authority as a
Other clear signs of discomfort ment.12 Research also has shown form of respect when questioned or
include rubbing the forehead near that when people are nervous or scolded. Investigators should re-
the temple region, squeezing the troubled, their blink rate increases, main aware of changes in eye con-
face, rubbing the neck, or stroking a phenomenon often seen with liars tact and eye behavior during inter-
the back of the head with the hand.10 under stress.13 In one case where views. They should establish the
Interviewees often will show their investigators closely videotaped the interviewee’s default pattern of eye
displeasure by rolling their eyes out interviewee, observers in another behavior during benign questioning
of disrespect; picking lint off them- room catalogued the subject’s blink then look for changes or indicators
selves (preening); talking down to rate increase from 27 times per of discomfort as the interview
the interviewer; giving short an- minute to 84 times a minute during progresses, which often gives clues
swers; becoming resistant, hostile, stressful questions. Investigators to deception.
or sarcastic; or displaying “micro should consider all of the eye mani-
gestures” with indecent connota- festations that fall under the com- Emphasis
tions, such as “giving the finger.”11 fort/discomfort domain as powerful When people speak, they natu-
Eyes also serve as formidable clues to how subjects register infor- rally incorporate various parts of
communicators of discomfort, yet mation or what questions prove their body, such as the eyebrows,
investigators often ignore them dur- problematic. head, hands, arms, torso, legs,
ing interviews. People use their and feet, to emphasize a point for
eyes as a blocking mechanism simi- which they feel deeply or emotion-


lar to folding their arms across their ally. This movement proves impor-
chest or turning away from those tant to investigators because, as a
with whom they disagree. In a simi- rule, people emphasize when genu-
lar response, when people do not Subtleties of ine. Liars, for the most part, do
like something they hear, they usu- comfort contrast not emphasize with nonverbals.16
ally close their eyes as if to block with discomfort. They will think of what to say and
out what they just heard. They do how to deceive, but rarely do they
this subconsciously and so often think about the presentation of the


that others do not pay attention to it lie. When compelled to lie, most
in day-to-day affairs. People may people do not realize how much
close their eyes before touching or emphasis or accentuation enters
rubbing them as if to further block When interpreting eye contact, into everyday conversations. For
or relieve themselves of what they however, many misconceptions still the interviewer, emphasis accu-
just heard. Interviewers can capital- exist. Little or no eye contact is per- rately reflects reality or the truth.17
ize on this behavior by noting when ceived erroneously by some as a When liars attempt to fabricate an
interviewees block with their eyes. classic sign of deception, especially answer, their emphasis looks un-
This may point to questions that during questioning, while the truth- natural or is delayed; they rarely
trouble the subject or to issues with ful should “lock eyes.” This may be emphasize where appropriate, or
which they are struggling. In most accurate for some but not for all. they choose to do so only on unim-
cases, eye blocking proves ex- For instance, research shows that portant matters.
tremely accurate in highlighting is- Machiavellian 14 people actually People accentuate both verbally
sues problematic to the interviewee. will increase eye contact during de- and nonverbally in their interac-
Additionally, when people feel ception.15 This may occur because tions. They emphasize verbally
troubled or frustrated or they have they know that many interviewers through voice, pitch, tone, or repe-
a subdued temper tantrum, their look for this feature. Also, some tition. On the other hand, they

June 2003 / 21
emphasize nonverbally, which can they said and how it is being re- odds, if not totally disparate, with
prove even more accurate and use- ceived, which is inconsistent with each other. These circumstances
ful to investigators. People who honest behavior. prohibit effective communication,
typically use their hands while an element pertinent to successful
speaking punctuate their remarks Synchrony interviewing.
with hand gestures that emphati- In interviewing and detecting When interviewed, people who
cally illustrate or exclaim. They deception, synchrony plays an im- answer in the affirmative should
also may thrust forward, point, or portant role. Ideally, synchrony have congruent head movement
pound the desk as they emphasize. (e.g., harmony, congruence, and supporting what they say. Lack of
Others accentuate with the tips of concordance) should occur between synchrony often occurs when
their fingers, either touching things the interviewer and the interviewee; people say, “I did not do it,” while
or gesturing with them. Hand between what is said vocally and nodding their heads up and down as
behaviors compliment speech, nonverbally; between the circum- if to say, “yes, I did.” Or, when
thoughts, and true sentiments.18 stances of the moment and what the asked, “Would you lie about this?”
Raising eyebrows (eyebrow flash) subject is saying; and between their heads again bob up and down.
or widening eyes also emphasizes a events and emotions, including syn- Upon catching themselves in this
point.19 chrony of time and space. faux pas, they then reverse their
When interested, people lean head movement. When observed,
their torsos forward and, often, em- these instances are almost comical
ploy gravity-defying gestures, such and amateurish. More often, a men-
as raising up on the balls of their dacious statement, such as “I did
feet as they make a significant or not do it,” precedes a noticeably de-
emotionally charged point. While layed and less emphatic negative
sitting down, some emphasize by head movement. These behaviors
raising the knee to highlight impor- are not synchronous and, therefore,
tant points. Occasionally, people more likely to be equated with a lie.
will add emphasis by slapping their Synchrony should occur be-
knee as it comes up, indicative of tween what is being said and the
emotional exuberance. Gravity-de- events of the moment. During a
fying gestures symbolize emphasis street interview, if the subject inter-
and true sentiment, both of which jects with superfluous information
liars rarely possess. or facts totally irrelevant, the officer
In contrast, people de-empha- should note the disharmony. The
size or show lack of commitment by information and facts should re-
speaking behind their hands or In an interview setting, the tone main pertinent to the issue at hand,
showing limited facial expression of both parties should mirror each the circumstances, and the ques-
as if to control their countenance other over time if synchrony ex- tions. When the answers are asyn-
because they are not committed to ists.21 A certain amount of harmony chronous with the event and ques-
what they are saying.20 Deceptive occurs in speech patterns, sitting tions, officers may assume that
people often show deliberative, styles, touching frequency, and gen- something likely is wrong or the
pensive displays, such as touching eral expressions. An interviewer person is stalling for time to fabri-
fingers to their chin or stroking their and subject “out of sync” become cate a story.
cheeks, as though they still are subtly palpable because each will For instance, when parents re-
thinking about something, rather sit differently, talk in a manner port the alleged kidnapping of their
than emphasizing the point they are or tone dissimilar from the other, infant, synchrony should occur be-
making. They are evaluating what and possibly have expressions at tween the event (kidnapping) and

22 / FBI Law Enforcement Bulletin


their emotions. The complainant instance, nonverbally, subjects will so-called close friends. Further,
should be clamoring for law en- yawn excessively as if to show that subjects may self-medicate through
forcement assistance, emphasizing they feel bored. If the person is sit- the use of alcohol or prescription
every detail, feeling the depth of ting, they may slouch or splay out drugs to appear placid and content.
despair, showing an eagerness to on a couch, stretch their arms, and They may change their clothing or
help, and willing to retell the story, cover more territory as if to demon- hair styles to appear more genuine
even at personal risk. When placid strate their comfort. or more socially conventional.
individuals make such reports, they Verbally, liars will try to vocal- In all of these examples, sub-
appear more concerned with fur- ize their honesty, integrity, and the jects attempt to manage the per-
nishing one particular version of the implausibility of their involvement ception of the interviewer. People
story, lacking consistent emotional in committing a crime. They will try practice perception management
displays or seem more concerned to “look good” to the interviewer. every day, such as getting dressed
about their well-being and how for a date. However, when it mani-
they are perceived vis-a-vis the fests itself in an interview setting,


egregious event (alleged kidnap- investigators should recognize such
ping of a loved one). These ex- efforts and question the intent.
amples do not exhibit synchrony ...investigators require Conclusion
with circumstances and prove in- a model that
consistent with honesty. The detection of deception re-
Last, synchrony should exist
incorporates research mains a difficult task. Interviewers
between events, time, and space. A with empirical can enhance their ability to detect
person who delays reporting a sig- experience to deception by focusing on four do-
nificant event, such as the drowning differentiate honesty mains—comfort/discomfort, em-
of a fellow passenger, or one who from deception. phasis, synchrony, and perception
travels to another jurisdiction to re- management—rather than merely


port the event rightfully should trying to detect traditional signs of
come under suspicion. Addition- deception, which, in some cases,
ally, interviewers should remain may be misleading.24 The research
cognizant of subjects who report They may use perception manage- in this area over the last 20 years is
events that would have been impos- ment statements, such as “I could unequivocal. Nonverbal behaviors,
sible for them to observe from the never hurt someone,” “Lying is in and of themselves, do not clearly
vantage point from which they tell below me,” “I have never lied,” “I indicate deception. 25 However,
the story. People who lie do not would never lie,” or “I would never when interviewers notice a display
think of how synchrony fits into the do such a thing,” all of which of discomfort and a lack of comfort,
equation; yet, it plays a major role should alert investigators to the pos- emphasis, synchrony, and percep-
during interviews and the reporting sibility of deception. Other state- tion management, a greater certi-
of crimes. ments, such as “to be perfectly tude for assessing deception exists.
frank,” “to be honest,” “to be per- Investigators can expect sub-
Perception Management fectly truthful,” or “I was always jects to react poorly in one or two
Perception management occurs taught to tell the truth,” are solely areas. But, to do so in all four
both verbally and nonverbally. Dur- intended to influence the perception domains indicates communication
ing interviews, liars often use per- of the interviewer.23 problems, which may originate
ception management, a concept Other forms of perception man- from the interviewee’s antipathy
with which psychopaths are well agement include attending the inter- toward the interviewer or law
acquainted, to influence their in- view with someone of prominence enforcement or result from cul-
tended targets of deception.22 For in the community or a retinue of pability, guilty knowledge, or

June 2003 / 23
dishonesty. Regardless, in these Interaction, 3d ed. (Orlando, FL: Harcourt 15
R.E. Exline, J. Thibaut, C.B. Hickey, and
Brace Jovanovich, College Publishers, 1997), 277. P. Gumpert, Visual Interaction in Relation to
cases, information likely did not 6
Paul Ekman, Telling Lies: Clues to Deceit Machiavellianism and an Unethical Act, in R.
flow freely from the interviewee, in the Marketplace, Politics, and Marriage Christie and F.L. Geis (eds.), Studies in
which rendered an interview of (New York, NY: W.W. Norton & Co., 1985), Machiavellianism (New York, NY: Academic
limited value or, worse, a complete 185.
7
Press, 1970).
16
fabrication. Gavin De Becker, The Gift of Fear (New David J. Lieberman, Never Be Lied to
York, NY: Dell Publishing, 1997), 133. Again (New York, NY: St. Martin’s Press,
8
Supra note 5, 321. 1998), 37.
Endnotes 9
Supra note 5, 320. 17
Supra note 6, 107.
1 10 18
Fred E. Inbau and et. al., Criminal David G. Givens, The Nonverbal Supra note 5, 277-284.
19
Interrogation and Confessions, 4th ed. Dictionary of Gestures, Signs & Body Desmond Morris, Body Watching (New
(Gaithersburg, MD: Aspen Publishers, Inc., Language Cues (Spokane, WA: Center for York, NY: Crown Publishers, 1985), 61 and
2001), ix. Nonverbal Studies, 1998-2002); http:// supra note 5, 68.
2 20
Charles V. Ford, Lies! Lies! Lies!: The members.aol.com/nonverbal2/diction1.htm Supra notes 5, 320, and 15, 37.
11 21
Psychology of Deceit (Washington, DC: Supra note 6, 101-103. Robert B. Cialdini, Influence: The
12
American Psychiatric Press, Inc., 1996), 200. Joe Navarro and John R. Schafer, Psychology of Persuasion (New York, NY:
3
Ibid., 217. “Detecting Deception,” FBI Law Enforcement William Morrow and Company, Inc., 1993),
4
B.M. DePaulo, J.I. Stone, and G.D. Bulletin, July 2001, 10. 167-207.
13 22
Lassiter, Deceiving and Detecting Deceit, in Supra note 5, 467. J. Reid Meloy, The Psychopathic Mind:
14
The Self and Social Life, edited by B.R. “Suggesting the principles of conduct laid Origins, Dynamics, and Treatment (Northvale,
Schlender, (New York, NY: McGraw-Hill, down by Machiavelli; specifically marked by NJ: Jason Aronson, Inc., 1998), 139.
23
1985), 323-370. cunning, duplicity, or bad faith,” Merriam Supra note 16, 46.
5 24
Mark L. Knapp and Judith A. Hall, Webster’s Collegiate Dictionary, 10th ed., s.v. Supra note 6, 162-189.
25
Nonverbal Communication in Human “Machiavellian.” Supra notes 2, 217, and 6, 98.

The Bulletin’s
E-mail Address

T he FBI Law Enforcement Bulletin staff invites


you to communicate with us via e-mail. Our
Internet address is leb@fbiacademy.edu.
We would like to know your thoughts on
contemporary law enforcement issues. We
welcome your comments, questions, and
suggestions about the magazine. Please
include your name, title, and agency
on all e-mail messages.
Also, the Bulletin is available
for viewing or downloading on a
number of computer services,
as well as the FBI’s home page.
The home page address is
http://www.fbi.gov.

24 / FBI Law Enforcement Bulletin


Legal Digest

Foreign Intelligence
Surveillance Act
Before and After the USA PATRIOT Act
By MICHAEL J. BULZOMI, J.D.
© George Godoy

T
he terrorist attacks of Sep- Act of 20011 (USA PATRIOT Act) use its new tools in a way that
tember 11, 2001, left an in- and its impact upon the use of preserves the rights and freedoms
delible mark upon America electronic surveillance and physical guaranteed by America’s democ-
and an overshadowing feeling of searches authorized under the racy, but, at the same time, ensure
vulnerability. They also created a Foreign Intelligence Surveillance that the fight against terrorism is
determination to respond to the new Act of 1978 (FISA)2 to combat for- vigorous and effective. No Ameri-
national security threats they repre- eign threats. can should be forced to seek safety
sented. Congress reacted to these Some Americans fear the ac- over liberty. This article briefly
threats by passing laws providing tions taken by Congress may in- examines FISA and the impact of
new tools to fight terrorism. Per- fringe upon basic American liber- the USA PATRIOT Act upon it.
haps, the most controversial recent ties. Benjamin Franklin warned that
act of Congress is the United and “ those who would give up essential FISA
Strengthening of America by Pro- liberty, to purchase a little tempo- Electronic monitoring (includ-
viding Appropriate Tools Required rary safety, deserve neither liberty ing both wiretaps and microphone
to Intercept and Obstruct Terrorism nor safety.”3 The government must installations) and physical searches

June 2003 / 25
are excellent, and sometimes essen- blow up the local CIA recruiting rules governing the use of national
tial, sources of information for both office in Ann Arbor, Michigan, and security wiretaps should be the
foreign intelligence and criminal a number of other government same as those governing criminal
activities. In 1968, Congress passed buildings. Evidence obtained dur- wiretaps. The Court made it clear
the Omnibus Crime Control and ing a domestic national security that it was not deciding the issue of
Safe Streets Act. Title III of that act4 wire interception, undertaken with- the government’s authority to con-
contains provisions concerning the out a formal court order, was used duct wiretaps in cases of foreign
authorization and use of electronic in the subsequent criminal trial. The threats to the national security.
monitoring by the government to use of this evidence was contested. To establish the necessary au-
gather information regarding crimi- The issue was whether or not the thority and procedures for the gov-
nal activities. Under Title III, the president had the authority, through ernment to conduct wiretaps in re-
government has specific authoriza- the attorney general, to authorize sponse to foreign threats, Congress
tion procedures and rules to follow electronic surveillance for national passed FISA. FISA established a re-
when it monitors people and places security matters without prior judi- quirement of judicial approval be-
to collect evidence of violations of cial review. The Court held that fore the government engages in an
criminal laws. But, Title III did not the government does not have un- electronic surveillance (as well as
answer the question of whether or limited power to conduct national physical searches) for foreign intel-
not the government is required to security wiretaps for domestic secu- ligence purposes. The act estab-
obtain court authorization for elec- rity matters, and that prior judicial lished the FISA Court, consisting of
tronic monitoring conducted, not authorization is needed before us- U.S. District Court judges desig-
for criminal investigations but for ing wiretaps for national security nated by the chief justice of the
the collection of information re- purposes. However, the Court rec- U.S. Supreme Court. The court’s
garding threats to national security. ognized that such wiretaps involve purpose is to review government
The U.S. Supreme Court faced different policy and practical con- applications for national security
this issue in the case of United siderations from ordinary criminal electronic monitoring and searches
States v. United States District wiretaps. It suggested that Congress and authorize their use with ap-
Court.5 In this case, a group of consider exploring the issue and de- propriate limitations. If the FISA
Vietnam War protesters tried to cide if the authorization for and Court denies an application for an
order authorizing a national secu-
rity wiretap or search, the matter is
referred under seal to the FISA
Court of Review, comprised of

“ The government must


use its new tools in a way
that preserves the rights
three federal judges selected by the
chief justice of the U.S. Supreme
Court. The court of review deter-
mines whether the application was
properly denied.6 Its decision can be
and freedoms guaranteed appealed directly to the U.S. Su-
by America’s democracy, preme Court.
but, at the same time,
ensure that the fight FISA Contrasted with Title III
against terrorism is In essence, the purpose of a
FISA order is to gather foreign in-
vigorous and effective. telligence information,7 while the


purpose of a Title III wiretap order
Special Agent Bulzomi is a legal
instructor at the FBI Academy. is to gather evidence for criminal
prosecution. The FISA application

26 / FBI Law Enforcement Bulletin


need only state facts supporting searches in the case of FISA). How- violations of the Fourth Amend-
probable cause to believe that the ever, because of the differing objec- ment. The U.S. Court of Appeals
target of the intercept (or search) is tives of the two acts, the degree of for the Fourth Circuit admitted the
a foreign power, or an agent of a specificity required differs mark- evidence collected during the early
foreign power, and that the facilities edly. Arguably, because of the dif- days of the collection but held that
to be monitored or searched are be- ferent probable cause showing re- evidence obtained after the primary
ing used, or are about to be used, by quired by FISA, it is easier for the purpose of the investigation had
a foreign power, or an agent of a government to obtain a FISA order shifted from securing intelligence
foreign power, and to certify that a than it is to obtain a Title III order. information to accumulating evi-
significant purpose of the surveil- Because of this, the courts became dence of a crime and must be sup-
lance is to obtain foreign intelli- concerned that the government pressed because of the failure to
gence information.8 To show that a comply with the requirements of
person is an agent of a foreign Title III. This ruling is the origin of


power, the government need only the “primary purpose” test that was
relate facts demonstrating that the to create problems in later cases.
subject is an officer or employee of ...both FISA and Subsequent cases decided after
a foreign power or acts on the for- Title III require a the passage of FISA distinguished
eign power’s behalf; or knowingly showing of probable Truong on the grounds that the sur-
engages in clandestine intelligence- cause to authorize veillance authorization in that case
gathering activities that may in- was not obtained pursuant to a FISA
volve a violation of U.S. criminal electronic monitoring warrant.15 These courts noted that
statutes; or knowingly engages in (and physical FISA contains a statutory mecha-
sabotage, international terrorism, or searches in the nism for the dissemination of crimi-
in the preparation of these activities case of FISA). nal information obtained during an
on behalf of a foreign power.9 intelligence intercept and have held


In contrast, a criminal Title III that when such evidence is discov-
wiretap must be supported by prob- ered “incidentally” during an autho-
able cause to believe that a spe- rized FISA intercept it may be ad-
cific individual, using an identified would obtain FISA electronic sur- mitted in subsequent criminal
phone or location, is committing veillance orders in what were essen- prosecutions.16 This would include
a particular crime.10 It requires that tially criminal investigations to situations where “the government
the government show that a predi- avoid the stricter requirements of can anticipate that the fruits of such
cate offense is, has, or will be Title III. surveillance may later be used, as
committed by the subject of the sur- This concern surfaced in an es- allowed by [the statute], as evi-
veillance11 and that particular com- pionage case that predates FISA. In dence in a criminal trial.”17 This line
munications concerning the predi- United States v. Truong Dinh of reasoning became known as the
cate offense will be obtained Hung,14 the government used a war- “primary purpose” test and was
through the wiretap12 at a specified rantless wiretap to overhear and adopted by several circuits.18 In
location or through a specified de- record telephone conversations of other words, when the primary ob-
vice used by the target.13 the defendant and to bug his apart- ject of the electronic monitoring (or
ment. The wiretapping and bugging search) was to collect foreign intel-
FISA Information for were authorized by the attorney ligence information, FISA was the
Criminal Prosecutions general under the “foreign intelli- appropriate mechanism to seek au-
It is important to note that both gence” exception to the Fourth thorization from the courts. When
FISA and Title III require a showing Amendment. The defendant moved the primary purpose was to seek
of probable cause to authorize elec- to suppress the evidence collected criminal prosecution, Title III was
tronic monitoring (and physical by means of the wiretap and bug as the appropriate mechanism. Failure

June 2003 / 27
to strictly observe this distinction gathering be a “significant pur- ruled that law enforcement offi-
resulted in a possible suppression of pose.”19 The act amends FISA so cials cannot a) direct or control an
the evidence. that intelligence officials may coor- investigation using FISA searches
The “primary purpose” test led dinate efforts with law enforcement or surveillances for law enforce-
the FISA Court and the U.S. Depart- officials to investigate or protect ment objectives, b) direct or control
ment of Justice (DOJ) to adopt a against attacks, terrorism, sabotage, the use of FISA procedures to en-
policy of building a “wall” between or clandestine intelligence activities hance a criminal prosecution, c)
intelligence investigators and without undermining the required make recommendations to intelli-
criminal investigators for fear of certification of the “significant pur- gence officials concerning the ini-
tainting FISA court ordered surveil- pose” of FISA orders. The result is tiation, operation, continuation or
lances. Intelligence investigators that Congress rejected the idea of expansion of FISA searches or sur-
were not to discuss ongoing foreign having a “wall” between foreign in- veillances, or d) that representatives
intelligence or foreign counterintel- telligence and law enforcement of- of DOJ’s Office of Intelligence
ligence investigations with criminal ficials when the object of the inves- Policy and Review (OIPR) be in-
investigators. In this way, FISA or- tigation is to detect, prevent, or vited to (“chaperone” in the view of
ders could not be used by criminal prosecute foreign intelligence the DOJ) all meetings between FBI
investigators to avoid seeking Title crimes. and DOJ’s Criminal Division to
III orders. This practice led to a consult regarding efforts to investi-
critical lack of coordination in in- gate or protect against foreign at-
vestigations, such as international tack, sabotage, or international ter-
terrorism cases, which have both in- rorism to ensure that foreign
telligence and criminal aspects. intelligence gathering remains the
primary purpose of any FISA-au-
FISA AS AMENDED BY thorized technique. The FISA
THE USA PATRIOT ACT Court’s rejection of the new guide-
Following the September 11, lines led to the first-ever appeal to
2001, terrorist attacks, Congress re- the FISA Court of Review.
assessed intelligence-gathering In its decision, the FISA Court
procedures and passed the USA of Review decided that FISA does
PATRIOT Act. The most signifi- not preclude or limit the govern-
cant changes involve the purposes ment’s use of foreign intelligence
for which FISA-authorized elec- information, including evidence of
tronic monitoring and searches crimes, in certain types of criminal
may be used and the exchange of On March 6, 2002, Attor- prosecutions.21 The court of review
information between criminal and ney General John D. Ashcroft determined that the restrictions im-
foreign intelligence investigators. implemented the USA PATRIOT posed by the FISA Court on the
Previously, FISA-authorized Act by establishing a new DOJ government are not required by
electronic monitoring and searches policy regarding information-shar- FISA, as amended by the USA PA-
only could be used if high-level ing procedures. The new proce- TRIOT Act or by the Constitution
executive officials certified that dures permitted the complete ex- and that the USA PATROIT Act
“the purpose” was to obtain foreign change of information and advice amendments of the FISA statute do
intelligence information. As noted, between intelligence officers and not violate the Fourth Amendment
that language came to be inter- law enforcement officers regarding of the Constitution.
preted as the “primary purpose” FISA surveillances and searches. The court of review made sev-
by the courts and DOJ. The USA On May 17, 2002, the FISA eral important points. First, there
PATROIT Act now requires that Court rejected the attorney gen- must be a significant foreign in-
foreign intelligence information eral’s new policy.20 The FISA Court telligence information-gathering

28 / FBI Law Enforcement Bulletin


purpose for every FISA applica- coordinate efforts to investi- using all available resources, in-
tion for electronic monitoring or gate or protect against cluding FISA surveillances and
search, such as recruiting a foreign searches, to detect, frustrate, and
spy as a double agent, identifica- a) actual or potential attack convict spies and terrorists.
tion of foreign intelligence task- or other grave hostile acts of It is important to note that addi-
ings, or the discovery of foreign spy a foreign power or an agent tional safeguards are built into
tradecraft.22 of a foreign power; FISA if the target of the monitoring
Second, the court determined b) sabotage or international or search is a U.S. citizen or an alien
that FISA could be used to obtain terrorism by a foreign power admitted for permanent residence.
evidence primarily for a criminal or an agent of a foreign power; The burden placed upon the govern-
prosecution if the prosecution is an or ment to obtain a FISA order is
offense related to a foreign intelli- higher if the target is a U.S. per-
c) clandestine intelligence
gence threat (a foreign intelligence son.27 The act clearly states that the
activities by an intelligence
crime) and a significant foreign in- simple exercise of First Amend-
service or network of a foreign
telligence-gathering purpose also is ment rights by U.S. persons can-
power or by an agent of a
present.23 The court defined foreign not be the basis for considering that
foreign power.
intelligence crimes as those listed in person to be an agent of a foreign
the FISA statute, including espio- power.28 The act also clearly estab-


nage, international terrorism, un- lishes how and when information
lawful clandestine intelligence ac- regarding a U.S. person may be
tivities, sabotage, identity fraud used.29
offenses committed for or on behalf ...additional
of a foreign power, and aiding or safeguards are built USA PATRIOT Act
abetting or conspiring to commit into FISA if the target and Information Sharing
these offenses.24 Additionally, any of the monitoring An extremely important aspect
ordinary crime intertwined with a or search is a U.S. of the USA PATRIOT Act is that it
foreign intelligence activity is in- citizen or an alien permits greater sharing of intelli-
cluded, such as bank robbery to fi- gence information between law
nance terrorist actions or even admitted for
permanent residence. enforcement and national security
credit card fraud to hide the identity investigators, regardless of the
of a spy.25 source of the intelligence informa-


Finally, the court recognized tion. Section 203 of the USA PA-
that the USA PATRIOT Act law- TRIOT Act amends Rule 6 of the
fully breached the “wall” between Federal Rules of Criminal Proce-
criminal law enforcement and intel- 2) Coordination authorized under dure to permit the disclosure of
ligence or counterintelligence gath- paragraph 1 shall not preclude grand jury information containing
ering. Congress’ intent in this mat- the certification required by foreign intelligence information to
ter is demonstrated amply by its Section [1804](a)(7)(B) of this “any federal law enforcement, intel-
addition of a new section to FISA title or the entry of an order ligence, protective, immigration,
by the USA PATRIOT Act. The under Section [1805] of this national defense, or national secu-
new FISA Section 1806(k) reads: title.26 rity official in order to assist the
1) Federal officers who conduct This decision by the FISA official receiving that information
electronic surveillance to Court of Review vindicates Con- in the performance of his official
acquire foreign intelligence gress’ and the attorney general’s duties.”30 The reporting require-
information under this title view of FISA. It is permissible for ment differs in that the name of the
may consult with federal intelligence and law enforcement individual receiving the informa-
law enforcement officers to officials to coordinate their efforts tion is not given to the court, only

June 2003 / 29
the department or agency receiving USA PATRIOT Act and Pen on communication networks other
the information. This section also Registers and Traps and Traces than just telephones.37 Computer
amends Title III (the federal wiretap FISA contains specific provi- networks and cellular telephones
statute) to permit the same type of sions regarding the use of pen regis- are now specifically subject to this
disclosure of intelligence informa- ters and traps and traces in foreign technique.
tion gathered during a court autho- intelligence investigations.35 Sec- Criminal pen register and trap
rized criminal wiretap.31 tion 214 of the USA PATRIOT Act and trace orders are no longer lim-
Section 905 of the act32 under- changes the standard for issuing pen ited to the geographic area within
scores the importance that Congress registers and trap and trace orders. the jurisdiction of the issuing
assigns to information sharing. That FISA pen registers and traps and court.38 All service providers neces-
section requires the attorney gen- traces now can be obtained when sary to the execution of the order,
eral, or any head of a federal the government certifies that the in- regardless of their location, are cov-
department or agency with law formation likely to be obtained is ered by such orders.
enforcement responsibility, to foreign intelligence information
promptly disclose to the director USA PATRIOT Act
of the CIA any foreign intelligence and Physical Searches


information gathered as a result of a Historically, some federal
criminal investigation. courts permitted the government
to search premises, but delay for a
Other Related Amendments ...the USA PATRIOT reasonable time the required notice
The USA PATRIOT Act Act makes terrorism that the government had entered the
amended many federal statutes in a predicate offense premises.39 The USA PATRIOT
significant ways that are import- allowing for a wiretap Act amended federal law to statuto-
ant to criminal and intelligence in- under Title III. rily recognize the practice.40 De-
vestigators. It is impossible to dis- layed notice, or sneak-and-peek


cuss all of these amendments in warrants, are now permissible
this limited space. However, some where the court finds reasonable
of these amendments should be not concerning a U.S. person or is cause to believe that immediate no-
mentioned. relevant to ongoing investigations tification of the execution of the
A very significant change is to protect against terrorism or clan- warrant would have an adverse re-
that the USA PATRIOT Act makes destine intelligence activities. 36 sult.41 The warrant must prohibit the
terrorism a predicate offense allow- Prior to the USA PATRIOT Act, seizure of tangible property unless
ing for a wiretap under Title III.33 pen register and trap and trace or- the court finds it necessary. The
Investigators now have a choice, ders required showing that there warrant also must provide for giv-
depending on the nature of the in- was relevance to an investigation ing notice of the search within a
vestigation, to apply for a FISA or- and that there was reason to believe reasonable time, but extensions of
der or a Title III wiretap order. that the targeted line was being used time can be granted.
In addition, the act also allows by an agent of a foreign power or The act expands the reach of
for a roving wiretap under FISA.34 someone in communication with search warrants in domestic and in-
Roving wiretaps allow law enforce- such an agent under certain circum- ternational terrorism cases.42 Ordi-
ment to respond to time-sensitive stances. The second requirement no narily, criminal search warrants
criminal or terrorist activity by con- longer exists. must be issued in the districts where
tinuing court sanctioned electronic The USA PATRIOT Act also the searches will occur.43 Under the
surveillance, even if the target of amended Title III, FISA, and the new rule, however, a magistrate
the surveillance rapidly switches federal statute related to pen regis- judge in a district “in which activi-
cellular telephones, Internet ac- ters to explicitly authorize the use ties related to the terrorism may
counts, or meeting venues. of pen registers and traps and traces have occurred”44 may issue a war-

30 / FBI Law Enforcement Bulletin


rant in that terrorism investigation without understanding.”47 Govern- 4

5
18 U.S.C. §§ 2510-2520.
407 U.S. 297 (1972).
that can be executed within or out- ment should not overstep its 6
50 U.S.C. § 1803(b).
side that district. bounds. 7
50 U.S.C. § 1804(a)(7)(B). Foreign
It is important to note that there Law enforcement must act ag- intelligence information is defined as “(1)
is a 4-year sunset provision for gressively to investigate and pre- information that relates to, and if concerning a
some parts of the act.45 The sharing vent attacks from those who wish U.S. person is necessary to, the ability of the
United States to protect against (a) actual or
of grand jury information portion this country harm. At the same potential attack or other grave hostile acts of a
of the act does not expire as of De- time, there must be oversight, both foreign power or an agent of a foreign power;
cember 31, 2005. However, the internal and external, to ensure that (b) sabotage or international terrorism by a
“significant purpose” certification law enforcement is not overzealous. foreign power or an agent of a foreign power;
or (c) clandestine intelligence activities by an
for FISA intercepts, the provosions FISA and the USA PATRIOT Act intelligence service or network of a foreign
regarding roving FISA surveil- provide such oversight. While the power or by an agent of a foreign power; or
lance, and the pen register and trap USA PATRIOT Act removed many (2) information with respect to a foreign
power or foreign territory that relates to, and
and trace do. of the obstacles that hindered ter-
if concerning a U.S. person, is necessary to (a)
rorist and intelligence investiga- the national defense or the security of the
CONCLUSION tions in the past, it did not give law United States; or (b) the conduct of the foreign

From a national security and enforcement and intelligence agen- affairs of the United States.” See 50 U.S.C. §
cies a free hand. The actions of 1801 (e).
law enforcement perspective, 8
50 U.S.C. § 1804.
the United States has made © K. L. Morrison 9
50 U.S.C. § 1801 (b).
10
considerable progress through re- 18 U.S.C. § 2518(3).
11
18 U.S.C. § 2518(3)(a).
cent court cases and congressional 12
18 U.S.C. § 2518(3)(b).
action toward ensuring that threats 13
18 U.S.C. § 2518(3)(d).
to national security are effectively 14
629 F.2d 908 (4th Cir. 1980).
15
investigated and countered. At the United States v. Falvey, 540 F. Supp.
1306, 1314 (E.D.N.Y. 1982).
same time, care must be taken to 16
United States v. Cavanagh, 807 F.2d 787,
ensure that the new tools provided 791 (9th Cir. 1987), and United States v.
by Congress in the USA PATRIOT Duggan, 743 F.2d 59, 73 n.5 (2d Cir. 1984)
17
Act are employed within the con- United States v. Duggan, 743 F.2d 59, at
78 (2d Cir. 1984) and United States v. Pelton,
straints of the Constitution. The Su- 835 F.2d 1067 (4th Cir. 1987).
preme Court has said “the police 18
United States v. Megahey, 553 F.Supp.
must obey the law while enforcing 1180 (E.D.N.Y. 1982) aff’d sub nom. United
the law, that in the end life and States v. Duggan, 743 F.2d 59 (2nd Cir. 1984);
United States v. Pelton, 835 F.2d 1067 (4th Cir.
liberty can be as much endan- 1987); United States v. Badia, 827 F.2d 1458
gered from illegal methods used to the government still are conducted (11th Cir.1987), cert. denied 485 U.S. 937
convict those thought to be crimi- under the watchful eye of the (1988); United States v. Johnson, 952 F.2d 565
nals as from the actual criminals (1st Cir. 1991), cert. denied 506 U.S. 816
courts. In the end, law enforcement (1992).
themselves.”46 and intelligence investigators must 19
PL 107-56, October 26, 2001, 115 Stat
FISA’s different standards for be mindful that the constitutional 272, § 218 (amending 50 U.S.C. §§
intelligence surveillance have been protections that limit their authority 1804(a)(7)(B) and 1823(a)(7)(B)).
20
viewed suspiciously by some who In re All matters Submitted to Foreign
also serve to protect their own rights Intelligence Surveillance Court, 218 F.Supp.
fear the loss of individual liberty. as citizens of the United States. 611.
Care must be taken to avoid any 21
In re Sealed Case, 310 F.3d 717 (Foreign
abuse of this tool by law enforce- Endnotes Intel. Surv. Ct. Rev., 2002).
1
ment. The Court has warned that PL 107-56, October 26, 2001, 115 Stat 22
Id. at 736.
272. 23
Supra note 21 at 743.
“the greatest dangers to liberty 2
50 U.S.C. §§ 1801-1863(1994). 24
Supra note 21 at 723; 50 U.S.C. §
lurk in insidious encroachment by 3
Reply of the Pennsylvania Assembly to the 1801(a)-(e).
men of zeal, well meaning but governor, November 11, 1775. 25
Supra note 21 at 736.

June 2003 / 31
26 35
Supra note 21 at 733; 50 U.S.C. § 50 U.S.C. §§ 1841-1846. investigation or undue delay in trial; see 18
36
1806(k). Supra note 1, § 214, amending 50 U.S.C. U.S.C. § 2705(a)(2).
27 42
50 U.S.C. § 1801(b) distinguishing § 1842(c)(2). Supra note 1, § 219, amending F.R.C.P.
37
between agents of a foreign power who are Supra note 1, §§ 214 and 216 (amending Rule 41(b)(3). International terrorism is
U.S. persons and non-U.S. persons and setting 50 U.S.C. §§ 1842, 1843, and 18 U.S.C. §§ defined in Title 18 U.S.C. § 2331(1);
out a somewhat higher standard for a U.S. 3121, 3123, and 3127). domestic terrorism is defined in 18 U.S.C. §
38
person to be considered an agent of a foreign Supra note 1, § 216 (amending 18 § 3123; 2331(5).
43
power; § 1801(e) setting out a stricter definition 3123(b)(1)(C) no longer requires that geo- There is an exception to this rule for
of foreign intelligence information where U.S. graphic limits be specified; however, movable objects; see F.R.C.P. Rule 41(b)(2).
44
persons are involved. 3127(2)(A) imposes a “nexus”). Supra note 42.
28 39 45
50 U.S.C. § 1805(a)(3)(A); § United States v. Freitas, 800 F.2d 1451 Supra note 1, § 224(a).
46
1824(a)(3)(A); § 1842(c)(2). (9th Cir. 1986); United States v. Ludwig, 902 Spano v. New York, 79 S. Ct. at 1206
29
50 U.S.C. § 1801(h); § 1805(f); § F.Supp. 121 (W.D. Tex. 1995); United States v. (1959).
47
1806(a),(j); § 1821(4); § 1824(e)(4); § 1825; § Villegas, 899 F.2d 1324 (2nd Cir.1990); United Olmstead v. United States, 48 S. Ct. 564
1843(c)(2); § 1845. States v. Pangburn, 983 F.2d 449 (2nd Cir. at 572-573 (1928).
30
Supra note 1, § 203a, amending Rule 1993).
6(e)(3)(c)(I)(V). 40
Supra note 1, § 213, amending 18 U.S.C. Law enforcement officers of other than
31
Supra note 1, § 203b. § 3103a. federal jurisdiction who are interested in this
32 41 article should consult their legal advisors.
Supra note 1, § 905. Adverse result is defined as one resulting Some police procedures ruled permissible
33
Supra note 1, § 201, amending 18 U.S.C. in endangering a life or a person’s physical under federal constitutional law are of
2516(1). safety; flight from prosecution; destruction of questionable legality under state law or are
34
Supra note 1, § 206, amending 50 U.S.C. or tampering with evidence; intimidation of not permitted at all.
§ 1805(c)(2)(B). potential witnesses; serious jeopardy of an

Subscribe Now

32 / FBI Law Enforcement Bulletin


The Bulletin Notes
Law enforcement officers are challenged daily in the performance of their duties; they face each
challenge freely and unselfishly while answering the call to duty. In certain instances, their actions
warrant special attention from their respective departments. The Bulletin also wants to recognize
those situations that transcend the normal rigors of the law enforcement profession.

Heading home from his daily tour of duty, Officer Christopher R. Tillman
of the Danville, Virginia, Police Department witnessed an apartment building
engulfed in flames. Without hesitation, he exited his vehicle and ran toward the
burning complex. Hearing a child screaming from inside, Officer Tillman kicked
down the front door and rescued a 5-year-old boy from the flames. Once the
child was safe from the flames and the falling electrical wires outside, Officer
Tillman returned to the burning building to assist any other occupants. Over the
next few minutes, he rescued three adults and two children from the fire. Officer
Tillman’s courage and quick judgement saved the lives of all six individuals.

Officer Tillman

Corporal Martin J. Larner of the Rosenburg, Oregon, Police Department


responded to the scene of a terminated pursuit involving a suspect and other
officers. The suspect previously had fired several shots at officers during the
pursuit, then fired several additional shots into the air after wrecking his vehicle
and finally rolling to a stop. The suspect then held a weapon to his head at vari-
ous intervals during the subsequent negotiations. Corporal Larner, who also is a
marksman with the department’s tactical team, directed officers into a perimeter
to contain the suspect, divert traffic, and protect neighboring residents. After
nearly an hour of negotiations, the suspect exited his vehicle to urinate and
turned his back to the officers. Corporal Larner used the opportunity to tackle
Corporal Larner the suspect from behind, even though the suspect still was holding a rifle. The
courageous actions of
Corporal Larner prevented the subject from
harming himself or others and precluded the Nominations for the Bulletin Notes should be based
need for greater force being used to end the on either the rescue of one or more citizens or arrest(s)
standoff. made at unusual risk to an officer’s safety. Submissions
should include a short write-up (maximum of 250
words), a separate photograph of each nominee, and a
letter from the department’s ranking officer endorsing
the nomination. Submissions should be sent to the
Editor, FBI Law Enforcement Bulletin, FBI Academy,
Madison Building, Room 209, Quantico, VA 22135.
U.S. Department of Justice Periodicals
Federal Bureau of Investigation Postage and Fees Paid
Federal Bureau of Investigation
Investigation
FBI Law Enforcement Bulletin ISSN 0014-5688
935 Pennsylvania Avenue, N.W.
Washington, DC 20535-0001

Official Business
Penalty for Private Use $300

Patch Call

The patch of the North Bend, Oregon, Police The city of Show Low, Arizona, received its name
Department features the McCullough Bridge, built as the result of a game of Show Low Poker between
in 1936, which spans Coos Bay from North Bend to two ranch owners; the winner gained sole possession of
Glascow, Oregon. The tree and sunset symbolize the the ranch. This tale became widespread and the city of
beauty and serenity of the southern Oregon coast. Show Low later was created nearby. The patch of the
Show Low Police Department features a deuce of
clubs, the winning card in the game and the namesake
of the city’s main street.

You might also like