Professional Documents
Culture Documents
Volume 72
Number 6
United States
Department of Justice
Federal Bureau of Investigation
Washington, DC 20535-0001
Cover Photo
©stockbyte
June 2003 / 1
“
control of the FBI training center at
Quantico, Virginia.”4
...a tremendous ViCAP became a part of the
change has NCAVC with its goal to “...collect,
occurred in the collate, and analyze all aspects of
the investigation of similar-pattern,
way ViCAP now multiple murders, on a nationwide
provides services basis, regardless of the location or
to state and local number of police agencies in-
law enforcement. volved.”5 Mr. Brooks envisioned
ViCAP as a “nationwide clearing-
”
Mr. Witzig, a former detective in the Homicide Branch of the Washington, D.C.,
Metropolitan Police Department and agent of the chief medical examiner for
Washington, D.C., is a major case specialist with the FBI’s Violent Criminal
Apprehension Program.
house...to provide all law enforce-
ment agencies reporting similar-
pattern violent crimes with the
information necessary to initiate a
coordinated multiagency investi-
gation.”6 ViCAP attempts to iden-
tify similar characteristics that
may exist in a series of unsolved
models. Their bodies, tied with rope investigators easily could query the murders and provide all police
in such a fashion as to suggest that database for similar ones when they agencies reporting similar patterns
the killer might practice bondage, first confront new, “mystery” cases. with information necessary to ini-
subsequently were found in the They could use clues from other tiate a coordinated multiagency
desert. cases that exhibit similar character- investigation.7
Mr. Brooks, convinced that istics to solve more cases. More-
these were not the killer’s first mur- over, when officers identify offend- REDESIGN OF VICAP
ders and that the offender would ers, a search of the computer using Since ViCAP’s beginning at the
kill again, devised an early form their modus operandi (MO) would FBI Academy in July 1985, its goal
of ViCAP. For 18 months, he used reveal other open cases for which of identifying cases exhibiting simi-
his off-duty time to visit the Los they might be responsible.3 lar characteristics and providing
Angeles central library and read In 1983, the Office of Juvenile that information to law enforcement
out-of-town newspapers to look for Justice and Delinquency Prevention agencies for a coordinated, case-
information on murders that exhib- and the National Institute of Justice closing investigation has remained
ited characteristics similar to those gave a planning grant, the “National constant. But, a tremendous change
he was investigating. He found such Missing/Abducted Children and has occurred in the way ViCAP
an article in a newspaper and, using Serial Murder Tracking and Pre- now provides services to state and
pieces from that case coupled with vention Program,” to Sam Houston local law enforcement. In 1996, a
evidence from his own cases, ar- State University in Huntsville, business analysis revealed several
rested an individual who subse- Texas. After three workshops, with details about ViCAP.8
quently was tried, convicted, and the last held in November 1983, the • Only 3 to 7 percent of the total
executed for the murders. National Center for the Analysis of cases were reported each year.
Mr. Brooks refined his idea Violent Crime (NCAVC) emerged. Of the 21,000 homicides
and concluded that a computer The U.S. Department of Justice pro- (average) reported per year in
could capture relevant information vided the initial funding for the the 1990s,9 only about 1,500
about murders. If open and closed NCAVC and stipulated that it to 1,800 were submitted to
cases were stored in the computer, would be “...under the direction and the nationwide database.
June 2003 / 3
Case Example: Texas Railroads
In 1999, a series of homicides occurred in Texas. Early in the series, the cases were presented as
murders in the victims’ homes. Female victims were sexually assaulted, blunt force trauma was the
cause of death,12 and items of value were stolen from the homes.13 The murder scenes were close to
railroad tracks, sometimes only a few feet away.
In May 1999, personnel from the command post in Texas called ViCAP with information about
three of the murders. One of the ViCAP crime analysts remembered a case from Kentucky where
railroad tracks were prominently mentioned. The analyst searched the database and quickly found
the case in Kentucky where a male was killed along a pair of railroad tracks. The cause of death
was blunt force trauma.14 His female companion was sexually assaulted and left for dead. ViCAP
relayed information concerning the Kentucky rape/homicide to the command post in Texas. Subse-
quent DNA examinations linked the Texas cases with the Kentucky case.
An itinerant freight train rider was identified as the suspect in the series of cases.15 He was
apprehended by authorities on July 13, 1999, when he surrendered at the border in El Paso, Texas.
Charged with nine murders, two in Illinois, one in Kentucky, and six in Texas,16 the subject was
tried, convicted, and sentenced to death.
In July 2000, he confessed to the 1997 murders of two teenagers on a railroad track near
Oxford, Florida.17 The male victim’s body was found on March 23, 1997; the female victim’s body
was not found until July 2000, when authorities, following the killer’s directions, found her skeletal
remains wrapped in a blanket and jacket.18
While confessing to the two murders in Florida, the subject said that he once killed a woman in
a southeastern state, somewhere along railroad tracks. She was an old woman, hanging her wash on
the line, and he killed her inside her house. He did not provide more details.
A check of the ViCAP database revealed a 1998 case from a southeastern state where an elderly
woman was hanging laundry in her backyard just a few feet from a pair of railroad tracks that ran
by her property. The command post in Texas and the investigator in the southeastern state were
notified of the case match. When interviewed by the investigator, the subject confessed in detail
and drew a diagram of the inside of the victim’s house. In this case, no fingerprint or DNA evidence
matched the defendant to the murder.
these agencies’ relationship with and experienced crime analysts THE NEW VICAP
ViCAP. serve with ViCAP, and they address Some agencies run the New
Additionally, the 189-question incoming work and requests on a ViCAP system in their own depart-
ViCAP form was completely re- more timely basis. They handle ments, others prefer to run the soft-
designed, streamlined to only 95 high-profile or immediate case ware on a stand-alone desktop, and
questions, and became more ap- requests rapidly, frequently within several put the software on their in-
pealing to the eye. The paper form the same hour or day. In a symbolic, ternal networks. Agency networks
both looked and became more but important, perceptual break support as few as three users,
user-friendly. with the old ways of doing business, through the entire investigative
In 1998, Congress provided ad- ViCAP reflected its new software staff, and up to five different bor-
ditional funding for ViCAP crime and energy with a new name—the oughs and the precincts therein.
analysts. Today, 19 well-trained New ViCAP. New ViCAP software operating in
“
a suspect, or a series of cases match- mining data elements for the paper
ing a particular MO, can make those form and the electronic version and
searches as well. New ViCAP designing the paper form for sexual
Research has shown that ad- understands that assault data collection to mirror the
ministrators like the reports existing homicide-oriented form.
package in New ViCAP. Standard
unique cases ViCAP is developing the electronic
reports include— require distinctive portion of the system in a Web-en-
• cases by day of the week,
database queries. abled fashion. This will permit us-
month, or district; ers to exchange information more
”
easily and potentially will provide
• case status (open or closed); limited access to the nationwide
• causative factors; database.
New ViCAP understands that
• offender age or ethnicity; unique cases require distinctive More Developments
• victim age or ethnicity; database queries. To provide for A recent development in New
• victim-offender relationship; discrete, particular questions of the ViCAP is the ability to store one or
and database, the program has a pow- more images and associate them
erful ad hoc query tool, whereby with a particular case. The images
• all weapons used or firearms any combination of New ViCAP can be photographs scanned into the
used by caliber or type. variables and attributes can be system or maps or other graphics
Perhaps most useful to adminis- strung together to produce a set of imported into the system. This tool
trators and investigators is the one- possibly related cases. Refinement has important implications for
page New ViCAP summary report, of the ad hoc query produces more, training new investigators, refresh-
which collects the main facts from a or fewer, cases delivered to the ing case-specific recollections of
violent crime and prints them to the crime analyst through the possibili- experienced investigators, or ex-
screen or, typically, two sheets of ties set. When the listing of cases is changing precise information to
paper. The summary report proves returned, the crime analyst can con- identify unknown victims.
an excellent briefing tool for ad- trast and compare them in a matrix An envisioned tool, not yet a
ministrators, managers, or elected of variables specified by the ana- part of the software, is a mapping
officials. lyst. Particularly valuable case ma- capability. New ViCAP already
Some investigators and pros- trixes can be titled and printed for captures graphic information sys-
ecutors like to have all of the more formal presentations, such as tem (GIS) data. This information
June 2003 / 5
could be used for traditional pin use New ViCAP were Kansas City, Bureau of Investigation (CBI) and
maps. Alternatively, investigators Missouri, and Kansas City, Kansas. cities and counties in the state.
could use GIS data to store and Now, police and sheriff depart- Cases can be entered at the local
search offender time lines like those ments in the largest metropolitan level and uploaded to the state. In
prepared for suspected or known areas are using New ViCAP, in- addition to its networking arrange-
serial killers. Once offender time cluding Baltimore, Maryland; Chi- ments, CBI selected New ViCAP as
lines are stored, GIS data for each cago, Illinois; Los Angeles, Califor- the statewide tool for sex offender
newly entered case could be auto- nia; Miami, Florida; New York, registry.
matically compared with the time New York; and Washington, D.C. Other states have implemented
lines. For example, an automated Further, MOUs and the New a regional model. For example, the
hit system could report to the ana- ViCAP system are in place with 40 Los Angeles County Sheriff’s and
lyst that plus or minus 3 days, a states. More than 400 state and local Los Angeles Police Departments
killer was in the town where the law enforcement entities use the provide an excellent example of
murder occurred.19 New ViCAP software. regional concept application. The
The architecture of the New sheriff’s department serves as the
A Communication Tool ViCAP network is as varied as the collection point and analysis hub
Police agencies across the needs of its users. For some states, for cases in the county. MOUs are
country recognize New ViCAP as a such as Colorado, a “hub and in place between the sheriff’s
valuable violent crime communica- spoke” design works well. MOUs department and 45 of the 46 po-
tion tool. The first pair of cities to are created between the Colorado lice agencies in the county, thus
In 2001, a ViCAP crime analyst reviewed a state police publication that mentioned a bag of
human bones found by hunters in a seaboard forest of an eastern state. The victim was a white
male, about 40 to 60 years old, and between 5' 7" and 5' 9" in height. His cause of death was blunt
force trauma to the head. Recovered with the remains was a 14-carat gold ring with engraved
letters. Authorities had no leads for identification of the remains.
A ViCAP crime analyst searched the database using the physical description of the victim and
then made an additional search, thinking that the letters engraved in the ring might be the initials
of a name. A possible match was made with a July 1998 case where three people were reported
missing from a midwestern state. The report was made by a fourth member of the family, a son,
who waited a week before reporting his mother, father, and sibling as missing persons. Personnel
had exhausted all investigative leads.
Authorities in the eastern and midwestern states contacted each other. In January 2001, ViCAP
learned that forensic odontology had identified the bones in the bag as those of the father missing
from the midwestern state. The letters in the recovered ring represented the maiden name of the
missing mother and the name of the missing father.
ViCAP learned later that a suspect was identified and charged with the murder—the oldest son
who made the report in the midwest. The remains of his mother and his sibling have not been
located.
June 2003 / 7
Perspective
Career Criminals, This brief sketch shows the necessity for, and the
difficulty of, achieving a consensus for the definition
Security Threat Groups, of the term gang.2 The authors, however, have em-
and Prison Gangs ployed the FBI’s definition of a criminal street gang:
An Interrelated Threat “A group of people who form an allegiance based on
By David M. Allender and Frank Marcell various social needs and engage in acts injurious to
public health and morals. Members of street gangs
engage in (or have engaged in) gang-focused criminal
“
Individuals labeled as criminal actions.
gang or STG members are not
“kids” drawn unknowingly into a Prison gangs • Career criminals have an acute
dangerous situation. Rather, these communicate with awareness of their surroundings
people pose a viable threat to the and possess many survival skills,
persons on the
safety and security of communities learned traits during incarceration.
outside in a variety They know how to size up a
throughout the country. Such of ways.
individuals, or “career criminals,” situation quickly to pursue crimi-
have chosen to make crime a way nal objectives or scam their way
of life and seldom worry about the
consequences of their actions until
after their apprehension. Then,
they tend to put all of their efforts into rationalizing or
” out of a situation.
• Career criminals rarely stick to
one type of crime. Revolving in
and out of county jails and other prisons, they
minimizing their crimes in an attempt to manipulate learn how to pursue a multitude of different types
the judicial system. of criminal activities.
• Career criminals view themselves with an inflated
Examining Career Criminals
ego. They even may have contempt for fellow
The career criminal personality may vary broadly inmates and scorn law-abiding people and author-
and is best left to the clinicians to analyze. The ity. They know and use the psychological tactics
authors, however, have learned that career criminals of fear and intimidation and can switch quickly
often demonstrate certain types of behavior, and law into this mind-set. While committing a crime,
enforcement professionals may find this information they may have a false sense of invincibility,
useful as a predicator to what these criminals are making them all the more dangerous. Moreover,
capable of and what to expect when interacting with they continue their criminal enterprises even
them. If, indeed, experience is the best teacher, then while incarcerated.
the authors submit the results of their education as an
overview of some of the behaviors exhibited by the Understanding Security Threat Groups
career criminals they have encountered.5 The authors have observed that during periods of
• Career criminals have no boundaries; they reside incarceration, career criminals often align themselves
in every state. They migrate to communities that with groups or cliques that control illegal activities
afford them opportunities to pursue their criminal through force or cunning. They set out to distinguish
June 2003 / 9
themselves from the mainstream inmate population. may be incarcerated in a local jail and then in a
This explains why STGs are a magnet for career longer-term state or federal facility. If they have a
criminals. reputation among their peers that indicates their
Corrections practitioners who have identified desirability as a candidate for induction into an STG,
STGs within their systems know that the groups’ members inside the facility will approach them.
criminal activities extend beyond prison walls. Their Inmates may remain an associate of an STG or may
success inside a corrections facility largely depends earn a chance to become a full member. Either way,
on an infrastructure on the outside to further their they will fulfill assignments given to them by the
criminal enterprises, providing financial assistance prison gang.
and communication (i.e., intelligence). The overriding The motivation driving the prison gang member is
trait of these like-minded career criminals who complex. While many sources have cited the need for
comprise these groups is commitment. Upon release protection from predatory inmates, other factors enter
from prison, most of these offend- in, including the human need to
ers will continue to prey upon the © brandXpictures seek acceptance, increased status,
community or those who dare to and financial profit from gang
oppose them. activities. When gang members
are released from custody, they
Recognizing Prison Gangs often return to their neighbor-
Criminal gangs may partici- hoods and renew old associations.
pate in a wide range of illegal They then may reenter the gang
activities. Profits from unlawful subculture, which led to their
actions, like drug dealing, can incarceration. If they return to
prove important to the cohesion of criminal activity, the contacts
a street gang. To realize the made in the prison system will
desired profits, small, disorga- become more important. The
nized groups need a reliable drug prison gang will allow the gang-
source or a buyer for large ster on the outside to network
amounts of stolen property. with other criminals or provide
Bigger criminal enterprises, such regular secure sources for illegal
as prison gangs, may provide the resources sought products, such as drugs. The STG also will serve as
by a street crew. Managing the source of the illegal protection for others in the gangster’s crew when they
profits allows the larger gang to exert influence over are incarcerated. The STG even may provide income
street-level operations. Control is further strengthened to the street gang with compensation for missions it
when the upper-tier gang pays a street-level crew to assigns.
perform tasks, such as assault or murder. As the Because other street gangs will have similar
connection between the groups solidifies, reputation situations, the prison gang can use the same methods
and rumor can make a prison gang even more power- to gain influence over a multitude of street crews.
ful, drawing other street-level crews into their sphere STGs will pick which sets they hope to influence and
of influence. build a coalition. To control the street, a prison gang
A hierarchy exists in the criminal gang world.6 may withhold the desired product from an uncoopera-
Gangsters typically start out in a street crew, usually tive set while ensuring that a competitor gets ample
in a neighborhood or crowd where they have connec- amounts. A more direct approach might occur,
tions. These associations often will be rooted in whereby an incarcerated member of an uncooperative
family ties or friendship because gangs need both to gang may suffer an assault orchestrated by the STG.
trust partners in their criminal enterprises and to Or, a powerful group may order a cooperative street
fraternize with during their social functions. At some gang to use violence to force a reluctant clique to
point in their lives, criminal gang members eventually conform to the rules as formulated by the STG. In
June 2003 / 11
does the psychological profile say about high manip- change in the way gangs do business. Other indica-
ulation or violence potential? Are there any past tions exist that imply increasing cooperation among
incarcerations in other state or federal prisons? criminal gangs.
Corrections officers should find out as much as Current gang trends, while disturbing, are not
possible about the criminals they face daily. unexpected when considering the history of gangs in
Likewise, law enforcement officers should apply America and in other countries. Historically, gang
these same techniques. If career criminals reside activity has flourished during those periods of time
within the community, officers when sources of illegal profit
should know who they are and were readily available and social
what kind of danger they present. conditions encouraged the
This illustrates the importance of
maintaining liaison with parole
divisions, departments of correc-
tions, and county jail facilities.
“If career criminals
reside within the
existence of gangs. The entire
criminal justice system needs to
educate itself to combat this most
recent form of organized criminal
These institutions can share community, officers behavior and profit. The first
important information about such should know who they important step in this process
criminals. Are they involved in are and what kind of rests with an exchange of infor-
multiple criminal activities, such danger they present. mation between the law enforce-
as narcotics, armed robbery, and ment and corrections communi-
burglary? Are they spontaneous ties that will allow for the
or methodical in their criminal
activities? Do they have a history
of high violence potential? Were
they members of an STG while in prison? Answers
” tracking of criminals as they
increasingly migrate around the
country. As the flow of informa-
tion increases so will the effectiveness of combating
to these types of questions can mean the difference such criminal activities. Although the criminal justice
between life and death for officers responding to calls system never will stop all criminal activity, gang
for service, executing search warrants, or making enforcement is an area where police and corrections,
traffic stops or other contacts, as illustrated dramati- with increased intelligence information sharing, can
cally by the opening scenario of this article. make a major impact in reducing the interrelated
In short, to effectively curtail the activities of threat posed by career criminals, security threat
career criminals and the groups to which they often groups, and prison gangs.
belong, criminal justice professionals must learn the
mind-sets, traits, and characteristics of these offend- Endnotes
1
The authors based this article on a research project they participated
ers. Officers must know how and where to obtain in that compiled information about gangs obtained from personal
information on these individuals. To this end, commu- interviews with local, state, and federal police officers, as well as officers
nicating this type of information between corrections working in local, state, and federal correctional institutions.
2
and law enforcement personnel becomes paramount For additional information, see Mike Langston, “Addressing the
Need for a Uniform Definition of Gang-Involved Crime,” FBI Law
for the safety of both professional entities, as well as Enforcement Bulletin, February 2003, 7-11.
the communities they serve. 3
U.S. Department of Justice, Federal Bureau of Investigation, An
Introduction to Violent Street Gangs in the United States, 2nd edition,
Conclusion 1999.
4
FBI analyst, Safe Streets Gang Unit.
A growing trend seems to be developing among 5
The authors’ education results from their personal interactions with
prison gangs to organize criminal street crews to career criminals, security threat groups, and gang members during their
facilitate the drug trade. The enormous profits avail- many years of working in the criminal justice system.
6
For additional information on gang structure, see David M. Allender,
able to those willing to take the risks inherent in this “Gangs in Middle America: Are They a Threat?” FBI Law Enforcement
and other lucrative illegal enterprises are leading to a Bulletin, December 2001, 1-9.
Police Work
Addiction
A Cautionary Tale
By GERARD J. SOLAN, M.A.,
and JEAN M. CASEY, Ph.D.
G
reat leaders lead by ex- and even sadder that he should pass
Everyone is bound to bear ample, and Police Chief away in the prime of his life.
patiently the results of his William Smith was no ex- Certainly, police officers are
own example. ception. He was totally selfless and expected to put aside all other needs
—Phaedrus
always available, arriving at his when duty calls, and, without ques-
command each morning before tion, duty does call. Commanders
eight o’clock and not leaving until and officers alike must sustain an
everyone else had gone home. It endless capacity to meet this de-
was not uncommon to find him mand. Communities hold fast to the
working on Saturday or Sunday. expectation that the police will do
The deputy chief told those assem- all that can be humanly done and, at
bled at the church that he actually times, much more than should be
was reluctant to leave each night expected of mere humans. Therein
before the chief. Everyone felt sad lies the great challenge for law en-
that Chief Smith left a young family forcement officers and supervisors,
June 2003 / 13
maintaining a healthy balance in requires consideration of, and for, Regrettably, they do not suffer
meeting reasonable responsibilities those very people. alone. They unwittingly share this
to the job, to themselves, and to pain with their families and col-
their families. The Price of Work Addiction leagues alike.
Perhaps, Chief Smith repre- Workaholics are married to
The Old Covenant sents an extreme example of the their work. Their vows to love and
Some in public safety view the dangers inherent in the work- honor their spouses above all “oth-
aphorism “work ethic,” surely a cu- addicted lifestyle. However, litera- ers” no longer holds meaning or
rious juxtaposition of words, as rep- ture on work addiction asserts that possibility. No spouse and no fam-
resentative of the old covenant. work constitutes the drug of choice ily can compete with this all-
This paradigm celebrates the job for some 30 percent of the popu- consuming obsession.
above all else. Team players count lation, for whom working is so vital Workaholics themselves are a
the most; the job comes first; no to their emotional well-being that key contributor to the unhealthy
sacrifice is too great. in fact, they have become addicted family patterns resulting from work
Police supervisors, socialized to it.1 While the actual mortality addiction for a number of reasons.
within this old covenant, operate in rate for work addiction may be First, they may have grown up in a
a world that expects human carnage low, the social lethality of this be- dysfunctional family system where
as a by-product. Work ethic repre- havior proves overwhelming. These role models taught unhealthy pat-
sents a “code” for doing whatever it unfortunate individuals are predis- terns of relating to others. Research
takes, and, perhaps, the only ethic posed to involve themselves—and indicates that the family of origin
involved is the certainty that the job their families—in a life not unlike contributes greatly to the develop-
must be done. Lost in this reasoning that of Chief Smith. Clearly, work ment of the workaholic, and the
is the moral responsibility that addicts (or workaholics, the more roots of the workaholic’s perfec-
supervisors hold for the fair and common descriptor) cannot assess tionism often lie in childhood expe-
ethical treatment of officers and what is important in healthy riences.2 In these dysfunctional
their families. As a practical matter, lifestyle choices and, thus, experi- homes, families reward children for
getting the job done through people ence a diminished quality of life. good performance, not for who they
are. They give praise and condi-
tional love only whenever children
perform a certain way or meet cer-
tain high expectations. In adult-
hood, this same need for perfection
is the basis for the obsession for
work—everything must be done
properly and always at a very high
level of competence and perfection.
Second, the need for worka-
holics to feel dominant and “in
control” may make them less able
to relate to peers. They may inter-
act more easily with older and
younger people or those of a lower
status or socioeconomic level than
Mr. Solan, a retired law enforcement Dr. Casey teaches counseling themselves. This need for con-
officer, currently is an adjunct faculty and psychological services at
member at Columbia College in the State University of New York
tinually being in control of them-
Syracuse, New York. at Oswego. selves and in charge creates tension
in family relationships. The one
“
around the workaholic’s schedule, ment and greatly enhance an
moods, and actions.”3 individual’s well-being. Employees
Chief Smith was the proud fa- who work hard, with great energy
ther of two sons, ages 10 and 14. His While the actual and dedication, are not necessarily
wife of 18 years, a stay-at-home mortality rate for addicted to their work. Most of the
mother, formed a close relationship work addiction may time, they thoroughly enjoy their
with the children, having adjusted be low, the social work. However, the key is their
to the irregular and long hours of the ability to maintain a balance in their
chief’s workday. After his death,
lethality of this lives so that their work does not
Mrs. Smith explained that her hus- behavior proves consume them.
band lived on the periphery of the overwhelming. Workaholics, on the other
family’s life. She said that when- hand, become gradually more emo-
”
ever he spent time with her and their tionally crippled as they become
children, he seemed to do so grudg- embroiled with the demands and
ingly, as though they were depriv- expectations of the workplace.
ing him of valuable time away from Workaholics report feeling pressure They are “addicted to control and
his office. She noted that sometimes in their chests, dizziness, and light- power in a compulsive drive to gain
when he was home, he only slept headedness.4 Obviously, any long- approval and success.”6 The obses-
and never interacted with the fam- term stress that manifests such sion with work grows out of the
ily. She also spoke about going to symptoms as these can result in workaholic’s perfectionism and
family gatherings, such as birthday dangerous health consequences of competitive nature. As with other
parties, with only the children and many types. Chief Smith’s pro- addictions, work is the “fix,” the
finding it hard to explain to friends tracted work addiction led to seri- drug that frees the workaholic from
and family that her husband was ous illness and his ultimate, un- experiencing the emotional pain of
either sleeping or working on his timely death. the anger, hurt, guilt, and fear in the
day off, rather than celebrating a Those people obsessed with other areas of the workaholic’s life.
special occasion. She thought that work share the traits of others with Workaholics constantly focus on
he ignored his family, and she felt such addictions as substance abuse, work, seeking to meet their per-
taken for granted and unwanted. food dependencies, or sexual com- sonal emotional needs through their
Other times, he came home and pulsions. A classic definition of a professions.
June 2003 / 15
Work-Addiction Risk Test
To find out if you are a workaholic, rate yourself on each of the statements below, using a rating scale of 1 (never
true), 2 (sometimes true), 3 (often true), or 4 (always true). Put the number that best describes your work habits in the
blank beside each statement. After you have responded to all 25 statements, add up the numbers for your total score.
The higher your score, the more likely that you are a workaholic, whereas the lower your score, the less likely that you
are a workaholic.
__ 1. I prefer to do most things myself, rather than ask for help.
__ 2. I get impatient when I have to wait for someone else or when something takes too long.
__ 3. I seem to be in a hurry and racing against the clock.
__ 4. I get irritated when I am interrupted while I am in the middle of something.
__ 5. I stay busy and keep many irons in the fire.
__ 6. I find myself doing two or three things at one time, such as eating lunch, writing a memo,
and talking on the telephone.
__ 7. I overcommit myself by accepting more work than I can finish.
__ 8. I feel guilty when I am not working on something.
__ 9. It is more important that I see the concrete results of what I do.
__ 10. I am more interested in the final result of my work than in the process.
__ 11. Things just never seem to move fast enough or get done fast enough for me.
__ 12. I lose my temper when things do not go my way or work out to suit me.
__ 13. I ask the same question again, without realizing it, after I already have received the answer.
__ 14. I spend a lot of time mentally planning and thinking about future events while tuning out
the here and now.
__ 15. I find myself continuing to work after my coworkers have stopped.
__ 16. I get angry when people do not meet my standards of perfection.
__ 17. I get upset when I am in situations where I cannot be in control.
__ 18. I tend to put myself under pressure from self-imposed deadlines.
__ 19. It is hard for me to relax when I am not working.
__ 20. I spend more time working than socializing with friends or on hobbies or leisure activities.
__ 21. I dive into projects to get a head start before all of the phases have been finalized.
__ 22. I get upset with myself for making even the smallest mistake.
__ 23. I put more thought, time, and energy into my work than I do into my relationships
with loved ones and friends.
__ 24. I forget, ignore, or minimize celebrations, such as birthdays, reunions, anniversaries, or holidays.
__ 25. I make important decisions before I have all of the facts and a chance to think them through.
For clinical use, scores on the test are divided into three ranges. Those scoring in the upper third (67-100) are
considered highly workaholic. If you scored in this range, it could mean that you are on your way to burnout, and new
research suggests that family members may be experiencing emotional repercussions as well. Those scoring in the
middle range (57-66) are considered mildly workaholic. If you scored in this range, there is hope. With acceptance
and modifications, you and your loved ones can prevent negative long-term effects. Those scoring in the lowest range
(25-56) are considered not workaholic. If you scored in this range, you are probably an efficient worker instead of a
workaholic and have no need to worry that your work style will negatively affect yourself or others.
Source: B.E. Robinson, Chained to the Desk (New York, NY: New York University Press, 1998), 52-54.
Minor editorial revisions have been made to several test items.
June 2003 / 17
Book Reviews
June 2003 / 19
“
becomes faster. Beyond the physi-
ological responses, which are auto-
nomic and require very little think-
In interviewing ing, people primarily manifest
and detecting discomfort nonverbally instead
deception, of vocally. They tend to move
synchrony plays their bodies by rearranging them-
selves, jiggling their feet, fidgeting,
an important role. or drumming their fingers when
scared, nervous, or significantly
”
uncomfortable.7
If, while the interviewer re-
Special Agent Navarro is assigned to the FBI’s Tampa office and also mains relaxed and poised, the
serves in the FBI’s National Security Division’s Behavioral Analysis Program. interviewee continually looks at the
clock, sits tensely, or does not
move (“flash frozen”), the inter-
viewer may discern a lack of com-
others have a good time and when touched, people may touch back to fort even though everything may
they feel comfortable in their pres- emphasize a point. Some may dis- appear normal to the untrained
ence. Experiencing comfort in the play their comfort more openly, eye.8 Interviewees show discomfort
presence of strangers becomes such as showing more of their torso when they repeatedly talk about
more difficult, especially in stress- and the insides of their arms and finalizing the interview or when
ful situations, such as during an in- legs. People who speak the truth disruptions appeal to them.
terview. A person’s level of com- more often display comfort because People tend to distance them-
fort or discomfort is one of the most they have no stress to conceal nor selves from those with whom they
important clues interviewers should do they have guilty knowledge to feel uncomfortable. Even while
focus on when trying to establish make them feel uncomfortable.6 sitting side by side, people will
veracity. Tension and distress most While seated at a table, people lean away from those with whom
often manifest upon guilty people comfortable with each other will they feel uncomfortable, often mov-
who must carry the knowledge of move objects aside so that nothing ing either their torsos or their feet
their crimes with them. Attempting blocks their view. Over time, they away or toward an exit, which
to disguise their guilt places a dis- may draw closer so that they do not nonverbally exhibits displeasure.9
tressing cognitive load on them as have to talk as loud, and their These actions can occur in inter-
they struggle to fabricate answers to breathing rhythm, tone of speech, views due to the subject matter dis-
what otherwise would be simple pitch, and general demeanor will cussed. Likewise, people create ar-
questions.4 become similar. tificial barriers with either their
When comfortable, an individ- Subtleties of comfort contrast shoulders and arms or with inani-
ual’s nonverbal behavior tends to with discomfort. People show dis- mate objects in front of them. For
mirror the other person present.5 comfort when they do not like what example, by the end of one inter-
For example, if one person leans is happening to them, what they are view, a very uncomfortable and dis-
forward, the other tends to do so as seeing or hearing, or when others honest interviewee had built a little
well. Or, if one leans to the side compel them to talk about things barrier in front of himself using
with hands in pockets and feet that they would prefer to keep soda cans, pencil holders, and vari-
crossed, the other person may do hidden. People first display discom- ous documents, ultimately planting
the same. Subconsciously, people fort physiologically—heart rates a backpack on the table between
demonstrate their comfort with quicken, hairs stand up, perspira- himself and the interviewer. At
whom they are talking. When tion increases, and breathing the time, the interviewer did not
“
lar to folding their arms across their ally. This movement proves impor-
chest or turning away from those tant to investigators because, as a
with whom they disagree. In a simi- rule, people emphasize when genu-
lar response, when people do not Subtleties of ine. Liars, for the most part, do
like something they hear, they usu- comfort contrast not emphasize with nonverbals.16
ally close their eyes as if to block with discomfort. They will think of what to say and
out what they just heard. They do how to deceive, but rarely do they
this subconsciously and so often think about the presentation of the
”
that others do not pay attention to it lie. When compelled to lie, most
in day-to-day affairs. People may people do not realize how much
close their eyes before touching or emphasis or accentuation enters
rubbing them as if to further block When interpreting eye contact, into everyday conversations. For
or relieve themselves of what they however, many misconceptions still the interviewer, emphasis accu-
just heard. Interviewers can capital- exist. Little or no eye contact is per- rately reflects reality or the truth.17
ize on this behavior by noting when ceived erroneously by some as a When liars attempt to fabricate an
interviewees block with their eyes. classic sign of deception, especially answer, their emphasis looks un-
This may point to questions that during questioning, while the truth- natural or is delayed; they rarely
trouble the subject or to issues with ful should “lock eyes.” This may be emphasize where appropriate, or
which they are struggling. In most accurate for some but not for all. they choose to do so only on unim-
cases, eye blocking proves ex- For instance, research shows that portant matters.
tremely accurate in highlighting is- Machiavellian 14 people actually People accentuate both verbally
sues problematic to the interviewee. will increase eye contact during de- and nonverbally in their interac-
Additionally, when people feel ception.15 This may occur because tions. They emphasize verbally
troubled or frustrated or they have they know that many interviewers through voice, pitch, tone, or repe-
a subdued temper tantrum, their look for this feature. Also, some tition. On the other hand, they
June 2003 / 21
emphasize nonverbally, which can they said and how it is being re- odds, if not totally disparate, with
prove even more accurate and use- ceived, which is inconsistent with each other. These circumstances
ful to investigators. People who honest behavior. prohibit effective communication,
typically use their hands while an element pertinent to successful
speaking punctuate their remarks Synchrony interviewing.
with hand gestures that emphati- In interviewing and detecting When interviewed, people who
cally illustrate or exclaim. They deception, synchrony plays an im- answer in the affirmative should
also may thrust forward, point, or portant role. Ideally, synchrony have congruent head movement
pound the desk as they emphasize. (e.g., harmony, congruence, and supporting what they say. Lack of
Others accentuate with the tips of concordance) should occur between synchrony often occurs when
their fingers, either touching things the interviewer and the interviewee; people say, “I did not do it,” while
or gesturing with them. Hand between what is said vocally and nodding their heads up and down as
behaviors compliment speech, nonverbally; between the circum- if to say, “yes, I did.” Or, when
thoughts, and true sentiments.18 stances of the moment and what the asked, “Would you lie about this?”
Raising eyebrows (eyebrow flash) subject is saying; and between their heads again bob up and down.
or widening eyes also emphasizes a events and emotions, including syn- Upon catching themselves in this
point.19 chrony of time and space. faux pas, they then reverse their
When interested, people lean head movement. When observed,
their torsos forward and, often, em- these instances are almost comical
ploy gravity-defying gestures, such and amateurish. More often, a men-
as raising up on the balls of their dacious statement, such as “I did
feet as they make a significant or not do it,” precedes a noticeably de-
emotionally charged point. While layed and less emphatic negative
sitting down, some emphasize by head movement. These behaviors
raising the knee to highlight impor- are not synchronous and, therefore,
tant points. Occasionally, people more likely to be equated with a lie.
will add emphasis by slapping their Synchrony should occur be-
knee as it comes up, indicative of tween what is being said and the
emotional exuberance. Gravity-de- events of the moment. During a
fying gestures symbolize emphasis street interview, if the subject inter-
and true sentiment, both of which jects with superfluous information
liars rarely possess. or facts totally irrelevant, the officer
In contrast, people de-empha- should note the disharmony. The
size or show lack of commitment by information and facts should re-
speaking behind their hands or In an interview setting, the tone main pertinent to the issue at hand,
showing limited facial expression of both parties should mirror each the circumstances, and the ques-
as if to control their countenance other over time if synchrony ex- tions. When the answers are asyn-
because they are not committed to ists.21 A certain amount of harmony chronous with the event and ques-
what they are saying.20 Deceptive occurs in speech patterns, sitting tions, officers may assume that
people often show deliberative, styles, touching frequency, and gen- something likely is wrong or the
pensive displays, such as touching eral expressions. An interviewer person is stalling for time to fabri-
fingers to their chin or stroking their and subject “out of sync” become cate a story.
cheeks, as though they still are subtly palpable because each will For instance, when parents re-
thinking about something, rather sit differently, talk in a manner port the alleged kidnapping of their
than emphasizing the point they are or tone dissimilar from the other, infant, synchrony should occur be-
making. They are evaluating what and possibly have expressions at tween the event (kidnapping) and
“
egregious event (alleged kidnap- investigators should recognize such
ping of a loved one). These ex- efforts and question the intent.
amples do not exhibit synchrony ...investigators require Conclusion
with circumstances and prove in- a model that
consistent with honesty. The detection of deception re-
Last, synchrony should exist
incorporates research mains a difficult task. Interviewers
between events, time, and space. A with empirical can enhance their ability to detect
person who delays reporting a sig- experience to deception by focusing on four do-
nificant event, such as the drowning differentiate honesty mains—comfort/discomfort, em-
of a fellow passenger, or one who from deception. phasis, synchrony, and perception
travels to another jurisdiction to re- management—rather than merely
”
port the event rightfully should trying to detect traditional signs of
come under suspicion. Addition- deception, which, in some cases,
ally, interviewers should remain may be misleading.24 The research
cognizant of subjects who report They may use perception manage- in this area over the last 20 years is
events that would have been impos- ment statements, such as “I could unequivocal. Nonverbal behaviors,
sible for them to observe from the never hurt someone,” “Lying is in and of themselves, do not clearly
vantage point from which they tell below me,” “I have never lied,” “I indicate deception. 25 However,
the story. People who lie do not would never lie,” or “I would never when interviewers notice a display
think of how synchrony fits into the do such a thing,” all of which of discomfort and a lack of comfort,
equation; yet, it plays a major role should alert investigators to the pos- emphasis, synchrony, and percep-
during interviews and the reporting sibility of deception. Other state- tion management, a greater certi-
of crimes. ments, such as “to be perfectly tude for assessing deception exists.
frank,” “to be honest,” “to be per- Investigators can expect sub-
Perception Management fectly truthful,” or “I was always jects to react poorly in one or two
Perception management occurs taught to tell the truth,” are solely areas. But, to do so in all four
both verbally and nonverbally. Dur- intended to influence the perception domains indicates communication
ing interviews, liars often use per- of the interviewer.23 problems, which may originate
ception management, a concept Other forms of perception man- from the interviewee’s antipathy
with which psychopaths are well agement include attending the inter- toward the interviewer or law
acquainted, to influence their in- view with someone of prominence enforcement or result from cul-
tended targets of deception.22 For in the community or a retinue of pability, guilty knowledge, or
June 2003 / 23
dishonesty. Regardless, in these Interaction, 3d ed. (Orlando, FL: Harcourt 15
R.E. Exline, J. Thibaut, C.B. Hickey, and
Brace Jovanovich, College Publishers, 1997), 277. P. Gumpert, Visual Interaction in Relation to
cases, information likely did not 6
Paul Ekman, Telling Lies: Clues to Deceit Machiavellianism and an Unethical Act, in R.
flow freely from the interviewee, in the Marketplace, Politics, and Marriage Christie and F.L. Geis (eds.), Studies in
which rendered an interview of (New York, NY: W.W. Norton & Co., 1985), Machiavellianism (New York, NY: Academic
limited value or, worse, a complete 185.
7
Press, 1970).
16
fabrication. Gavin De Becker, The Gift of Fear (New David J. Lieberman, Never Be Lied to
York, NY: Dell Publishing, 1997), 133. Again (New York, NY: St. Martin’s Press,
8
Supra note 5, 321. 1998), 37.
Endnotes 9
Supra note 5, 320. 17
Supra note 6, 107.
1 10 18
Fred E. Inbau and et. al., Criminal David G. Givens, The Nonverbal Supra note 5, 277-284.
19
Interrogation and Confessions, 4th ed. Dictionary of Gestures, Signs & Body Desmond Morris, Body Watching (New
(Gaithersburg, MD: Aspen Publishers, Inc., Language Cues (Spokane, WA: Center for York, NY: Crown Publishers, 1985), 61 and
2001), ix. Nonverbal Studies, 1998-2002); http:// supra note 5, 68.
2 20
Charles V. Ford, Lies! Lies! Lies!: The members.aol.com/nonverbal2/diction1.htm Supra notes 5, 320, and 15, 37.
11 21
Psychology of Deceit (Washington, DC: Supra note 6, 101-103. Robert B. Cialdini, Influence: The
12
American Psychiatric Press, Inc., 1996), 200. Joe Navarro and John R. Schafer, Psychology of Persuasion (New York, NY:
3
Ibid., 217. “Detecting Deception,” FBI Law Enforcement William Morrow and Company, Inc., 1993),
4
B.M. DePaulo, J.I. Stone, and G.D. Bulletin, July 2001, 10. 167-207.
13 22
Lassiter, Deceiving and Detecting Deceit, in Supra note 5, 467. J. Reid Meloy, The Psychopathic Mind:
14
The Self and Social Life, edited by B.R. “Suggesting the principles of conduct laid Origins, Dynamics, and Treatment (Northvale,
Schlender, (New York, NY: McGraw-Hill, down by Machiavelli; specifically marked by NJ: Jason Aronson, Inc., 1998), 139.
23
1985), 323-370. cunning, duplicity, or bad faith,” Merriam Supra note 16, 46.
5 24
Mark L. Knapp and Judith A. Hall, Webster’s Collegiate Dictionary, 10th ed., s.v. Supra note 6, 162-189.
25
Nonverbal Communication in Human “Machiavellian.” Supra notes 2, 217, and 6, 98.
The Bulletin’s
E-mail Address
Foreign Intelligence
Surveillance Act
Before and After the USA PATRIOT Act
By MICHAEL J. BULZOMI, J.D.
© George Godoy
T
he terrorist attacks of Sep- Act of 20011 (USA PATRIOT Act) use its new tools in a way that
tember 11, 2001, left an in- and its impact upon the use of preserves the rights and freedoms
delible mark upon America electronic surveillance and physical guaranteed by America’s democ-
and an overshadowing feeling of searches authorized under the racy, but, at the same time, ensure
vulnerability. They also created a Foreign Intelligence Surveillance that the fight against terrorism is
determination to respond to the new Act of 1978 (FISA)2 to combat for- vigorous and effective. No Ameri-
national security threats they repre- eign threats. can should be forced to seek safety
sented. Congress reacted to these Some Americans fear the ac- over liberty. This article briefly
threats by passing laws providing tions taken by Congress may in- examines FISA and the impact of
new tools to fight terrorism. Per- fringe upon basic American liber- the USA PATRIOT Act upon it.
haps, the most controversial recent ties. Benjamin Franklin warned that
act of Congress is the United and “ those who would give up essential FISA
Strengthening of America by Pro- liberty, to purchase a little tempo- Electronic monitoring (includ-
viding Appropriate Tools Required rary safety, deserve neither liberty ing both wiretaps and microphone
to Intercept and Obstruct Terrorism nor safety.”3 The government must installations) and physical searches
June 2003 / 25
are excellent, and sometimes essen- blow up the local CIA recruiting rules governing the use of national
tial, sources of information for both office in Ann Arbor, Michigan, and security wiretaps should be the
foreign intelligence and criminal a number of other government same as those governing criminal
activities. In 1968, Congress passed buildings. Evidence obtained dur- wiretaps. The Court made it clear
the Omnibus Crime Control and ing a domestic national security that it was not deciding the issue of
Safe Streets Act. Title III of that act4 wire interception, undertaken with- the government’s authority to con-
contains provisions concerning the out a formal court order, was used duct wiretaps in cases of foreign
authorization and use of electronic in the subsequent criminal trial. The threats to the national security.
monitoring by the government to use of this evidence was contested. To establish the necessary au-
gather information regarding crimi- The issue was whether or not the thority and procedures for the gov-
nal activities. Under Title III, the president had the authority, through ernment to conduct wiretaps in re-
government has specific authoriza- the attorney general, to authorize sponse to foreign threats, Congress
tion procedures and rules to follow electronic surveillance for national passed FISA. FISA established a re-
when it monitors people and places security matters without prior judi- quirement of judicial approval be-
to collect evidence of violations of cial review. The Court held that fore the government engages in an
criminal laws. But, Title III did not the government does not have un- electronic surveillance (as well as
answer the question of whether or limited power to conduct national physical searches) for foreign intel-
not the government is required to security wiretaps for domestic secu- ligence purposes. The act estab-
obtain court authorization for elec- rity matters, and that prior judicial lished the FISA Court, consisting of
tronic monitoring conducted, not authorization is needed before us- U.S. District Court judges desig-
for criminal investigations but for ing wiretaps for national security nated by the chief justice of the
the collection of information re- purposes. However, the Court rec- U.S. Supreme Court. The court’s
garding threats to national security. ognized that such wiretaps involve purpose is to review government
The U.S. Supreme Court faced different policy and practical con- applications for national security
this issue in the case of United siderations from ordinary criminal electronic monitoring and searches
States v. United States District wiretaps. It suggested that Congress and authorize their use with ap-
Court.5 In this case, a group of consider exploring the issue and de- propriate limitations. If the FISA
Vietnam War protesters tried to cide if the authorization for and Court denies an application for an
order authorizing a national secu-
rity wiretap or search, the matter is
referred under seal to the FISA
Court of Review, comprised of
”
purpose of a Title III wiretap order
Special Agent Bulzomi is a legal
instructor at the FBI Academy. is to gather evidence for criminal
prosecution. The FISA application
“
power, the government need only the “primary purpose” test that was
relate facts demonstrating that the to create problems in later cases.
subject is an officer or employee of ...both FISA and Subsequent cases decided after
a foreign power or acts on the for- Title III require a the passage of FISA distinguished
eign power’s behalf; or knowingly showing of probable Truong on the grounds that the sur-
engages in clandestine intelligence- cause to authorize veillance authorization in that case
gathering activities that may in- was not obtained pursuant to a FISA
volve a violation of U.S. criminal electronic monitoring warrant.15 These courts noted that
statutes; or knowingly engages in (and physical FISA contains a statutory mecha-
sabotage, international terrorism, or searches in the nism for the dissemination of crimi-
in the preparation of these activities case of FISA). nal information obtained during an
on behalf of a foreign power.9 intelligence intercept and have held
”
In contrast, a criminal Title III that when such evidence is discov-
wiretap must be supported by prob- ered “incidentally” during an autho-
able cause to believe that a spe- rized FISA intercept it may be ad-
cific individual, using an identified would obtain FISA electronic sur- mitted in subsequent criminal
phone or location, is committing veillance orders in what were essen- prosecutions.16 This would include
a particular crime.10 It requires that tially criminal investigations to situations where “the government
the government show that a predi- avoid the stricter requirements of can anticipate that the fruits of such
cate offense is, has, or will be Title III. surveillance may later be used, as
committed by the subject of the sur- This concern surfaced in an es- allowed by [the statute], as evi-
veillance11 and that particular com- pionage case that predates FISA. In dence in a criminal trial.”17 This line
munications concerning the predi- United States v. Truong Dinh of reasoning became known as the
cate offense will be obtained Hung,14 the government used a war- “primary purpose” test and was
through the wiretap12 at a specified rantless wiretap to overhear and adopted by several circuits.18 In
location or through a specified de- record telephone conversations of other words, when the primary ob-
vice used by the target.13 the defendant and to bug his apart- ject of the electronic monitoring (or
ment. The wiretapping and bugging search) was to collect foreign intel-
FISA Information for were authorized by the attorney ligence information, FISA was the
Criminal Prosecutions general under the “foreign intelli- appropriate mechanism to seek au-
It is important to note that both gence” exception to the Fourth thorization from the courts. When
FISA and Title III require a showing Amendment. The defendant moved the primary purpose was to seek
of probable cause to authorize elec- to suppress the evidence collected criminal prosecution, Title III was
tronic monitoring (and physical by means of the wiretap and bug as the appropriate mechanism. Failure
June 2003 / 27
to strictly observe this distinction gathering be a “significant pur- ruled that law enforcement offi-
resulted in a possible suppression of pose.”19 The act amends FISA so cials cannot a) direct or control an
the evidence. that intelligence officials may coor- investigation using FISA searches
The “primary purpose” test led dinate efforts with law enforcement or surveillances for law enforce-
the FISA Court and the U.S. Depart- officials to investigate or protect ment objectives, b) direct or control
ment of Justice (DOJ) to adopt a against attacks, terrorism, sabotage, the use of FISA procedures to en-
policy of building a “wall” between or clandestine intelligence activities hance a criminal prosecution, c)
intelligence investigators and without undermining the required make recommendations to intelli-
criminal investigators for fear of certification of the “significant pur- gence officials concerning the ini-
tainting FISA court ordered surveil- pose” of FISA orders. The result is tiation, operation, continuation or
lances. Intelligence investigators that Congress rejected the idea of expansion of FISA searches or sur-
were not to discuss ongoing foreign having a “wall” between foreign in- veillances, or d) that representatives
intelligence or foreign counterintel- telligence and law enforcement of- of DOJ’s Office of Intelligence
ligence investigations with criminal ficials when the object of the inves- Policy and Review (OIPR) be in-
investigators. In this way, FISA or- tigation is to detect, prevent, or vited to (“chaperone” in the view of
ders could not be used by criminal prosecute foreign intelligence the DOJ) all meetings between FBI
investigators to avoid seeking Title crimes. and DOJ’s Criminal Division to
III orders. This practice led to a consult regarding efforts to investi-
critical lack of coordination in in- gate or protect against foreign at-
vestigations, such as international tack, sabotage, or international ter-
terrorism cases, which have both in- rorism to ensure that foreign
telligence and criminal aspects. intelligence gathering remains the
primary purpose of any FISA-au-
FISA AS AMENDED BY thorized technique. The FISA
THE USA PATRIOT ACT Court’s rejection of the new guide-
Following the September 11, lines led to the first-ever appeal to
2001, terrorist attacks, Congress re- the FISA Court of Review.
assessed intelligence-gathering In its decision, the FISA Court
procedures and passed the USA of Review decided that FISA does
PATRIOT Act. The most signifi- not preclude or limit the govern-
cant changes involve the purposes ment’s use of foreign intelligence
for which FISA-authorized elec- information, including evidence of
tronic monitoring and searches crimes, in certain types of criminal
may be used and the exchange of On March 6, 2002, Attor- prosecutions.21 The court of review
information between criminal and ney General John D. Ashcroft determined that the restrictions im-
foreign intelligence investigators. implemented the USA PATRIOT posed by the FISA Court on the
Previously, FISA-authorized Act by establishing a new DOJ government are not required by
electronic monitoring and searches policy regarding information-shar- FISA, as amended by the USA PA-
only could be used if high-level ing procedures. The new proce- TRIOT Act or by the Constitution
executive officials certified that dures permitted the complete ex- and that the USA PATROIT Act
“the purpose” was to obtain foreign change of information and advice amendments of the FISA statute do
intelligence information. As noted, between intelligence officers and not violate the Fourth Amendment
that language came to be inter- law enforcement officers regarding of the Constitution.
preted as the “primary purpose” FISA surveillances and searches. The court of review made sev-
by the courts and DOJ. The USA On May 17, 2002, the FISA eral important points. First, there
PATROIT Act now requires that Court rejected the attorney gen- must be a significant foreign in-
foreign intelligence information eral’s new policy.20 The FISA Court telligence information-gathering
“
nage, international terrorism, un- lishes how and when information
lawful clandestine intelligence ac- regarding a U.S. person may be
tivities, sabotage, identity fraud used.29
offenses committed for or on behalf ...additional
of a foreign power, and aiding or safeguards are built USA PATRIOT Act
abetting or conspiring to commit into FISA if the target and Information Sharing
these offenses.24 Additionally, any of the monitoring An extremely important aspect
ordinary crime intertwined with a or search is a U.S. of the USA PATRIOT Act is that it
foreign intelligence activity is in- citizen or an alien permits greater sharing of intelli-
cluded, such as bank robbery to fi- gence information between law
nance terrorist actions or even admitted for
permanent residence. enforcement and national security
credit card fraud to hide the identity investigators, regardless of the
of a spy.25 source of the intelligence informa-
”
Finally, the court recognized tion. Section 203 of the USA PA-
that the USA PATRIOT Act law- TRIOT Act amends Rule 6 of the
fully breached the “wall” between Federal Rules of Criminal Proce-
criminal law enforcement and intel- 2) Coordination authorized under dure to permit the disclosure of
ligence or counterintelligence gath- paragraph 1 shall not preclude grand jury information containing
ering. Congress’ intent in this mat- the certification required by foreign intelligence information to
ter is demonstrated amply by its Section [1804](a)(7)(B) of this “any federal law enforcement, intel-
addition of a new section to FISA title or the entry of an order ligence, protective, immigration,
by the USA PATRIOT Act. The under Section [1805] of this national defense, or national secu-
new FISA Section 1806(k) reads: title.26 rity official in order to assist the
1) Federal officers who conduct This decision by the FISA official receiving that information
electronic surveillance to Court of Review vindicates Con- in the performance of his official
acquire foreign intelligence gress’ and the attorney general’s duties.”30 The reporting require-
information under this title view of FISA. It is permissible for ment differs in that the name of the
may consult with federal intelligence and law enforcement individual receiving the informa-
law enforcement officers to officials to coordinate their efforts tion is not given to the court, only
June 2003 / 29
the department or agency receiving USA PATRIOT Act and Pen on communication networks other
the information. This section also Registers and Traps and Traces than just telephones.37 Computer
amends Title III (the federal wiretap FISA contains specific provi- networks and cellular telephones
statute) to permit the same type of sions regarding the use of pen regis- are now specifically subject to this
disclosure of intelligence informa- ters and traps and traces in foreign technique.
tion gathered during a court autho- intelligence investigations.35 Sec- Criminal pen register and trap
rized criminal wiretap.31 tion 214 of the USA PATRIOT Act and trace orders are no longer lim-
Section 905 of the act32 under- changes the standard for issuing pen ited to the geographic area within
scores the importance that Congress registers and trap and trace orders. the jurisdiction of the issuing
assigns to information sharing. That FISA pen registers and traps and court.38 All service providers neces-
section requires the attorney gen- traces now can be obtained when sary to the execution of the order,
eral, or any head of a federal the government certifies that the in- regardless of their location, are cov-
department or agency with law formation likely to be obtained is ered by such orders.
enforcement responsibility, to foreign intelligence information
promptly disclose to the director USA PATRIOT Act
of the CIA any foreign intelligence and Physical Searches
“
information gathered as a result of a Historically, some federal
criminal investigation. courts permitted the government
to search premises, but delay for a
Other Related Amendments ...the USA PATRIOT reasonable time the required notice
The USA PATRIOT Act Act makes terrorism that the government had entered the
amended many federal statutes in a predicate offense premises.39 The USA PATRIOT
significant ways that are import- allowing for a wiretap Act amended federal law to statuto-
ant to criminal and intelligence in- under Title III. rily recognize the practice.40 De-
vestigators. It is impossible to dis- layed notice, or sneak-and-peek
”
cuss all of these amendments in warrants, are now permissible
this limited space. However, some where the court finds reasonable
of these amendments should be not concerning a U.S. person or is cause to believe that immediate no-
mentioned. relevant to ongoing investigations tification of the execution of the
A very significant change is to protect against terrorism or clan- warrant would have an adverse re-
that the USA PATRIOT Act makes destine intelligence activities. 36 sult.41 The warrant must prohibit the
terrorism a predicate offense allow- Prior to the USA PATRIOT Act, seizure of tangible property unless
ing for a wiretap under Title III.33 pen register and trap and trace or- the court finds it necessary. The
Investigators now have a choice, ders required showing that there warrant also must provide for giv-
depending on the nature of the in- was relevance to an investigation ing notice of the search within a
vestigation, to apply for a FISA or- and that there was reason to believe reasonable time, but extensions of
der or a Title III wiretap order. that the targeted line was being used time can be granted.
In addition, the act also allows by an agent of a foreign power or The act expands the reach of
for a roving wiretap under FISA.34 someone in communication with search warrants in domestic and in-
Roving wiretaps allow law enforce- such an agent under certain circum- ternational terrorism cases.42 Ordi-
ment to respond to time-sensitive stances. The second requirement no narily, criminal search warrants
criminal or terrorist activity by con- longer exists. must be issued in the districts where
tinuing court sanctioned electronic The USA PATRIOT Act also the searches will occur.43 Under the
surveillance, even if the target of amended Title III, FISA, and the new rule, however, a magistrate
the surveillance rapidly switches federal statute related to pen regis- judge in a district “in which activi-
cellular telephones, Internet ac- ters to explicitly authorize the use ties related to the terrorism may
counts, or meeting venues. of pen registers and traps and traces have occurred”44 may issue a war-
5
18 U.S.C. §§ 2510-2520.
407 U.S. 297 (1972).
that can be executed within or out- ment should not overstep its 6
50 U.S.C. § 1803(b).
side that district. bounds. 7
50 U.S.C. § 1804(a)(7)(B). Foreign
It is important to note that there Law enforcement must act ag- intelligence information is defined as “(1)
is a 4-year sunset provision for gressively to investigate and pre- information that relates to, and if concerning a
some parts of the act.45 The sharing vent attacks from those who wish U.S. person is necessary to, the ability of the
United States to protect against (a) actual or
of grand jury information portion this country harm. At the same potential attack or other grave hostile acts of a
of the act does not expire as of De- time, there must be oversight, both foreign power or an agent of a foreign power;
cember 31, 2005. However, the internal and external, to ensure that (b) sabotage or international terrorism by a
“significant purpose” certification law enforcement is not overzealous. foreign power or an agent of a foreign power;
or (c) clandestine intelligence activities by an
for FISA intercepts, the provosions FISA and the USA PATRIOT Act intelligence service or network of a foreign
regarding roving FISA surveil- provide such oversight. While the power or by an agent of a foreign power; or
lance, and the pen register and trap USA PATRIOT Act removed many (2) information with respect to a foreign
power or foreign territory that relates to, and
and trace do. of the obstacles that hindered ter-
if concerning a U.S. person, is necessary to (a)
rorist and intelligence investiga- the national defense or the security of the
CONCLUSION tions in the past, it did not give law United States; or (b) the conduct of the foreign
From a national security and enforcement and intelligence agen- affairs of the United States.” See 50 U.S.C. §
cies a free hand. The actions of 1801 (e).
law enforcement perspective, 8
50 U.S.C. § 1804.
the United States has made © K. L. Morrison 9
50 U.S.C. § 1801 (b).
10
considerable progress through re- 18 U.S.C. § 2518(3).
11
18 U.S.C. § 2518(3)(a).
cent court cases and congressional 12
18 U.S.C. § 2518(3)(b).
action toward ensuring that threats 13
18 U.S.C. § 2518(3)(d).
to national security are effectively 14
629 F.2d 908 (4th Cir. 1980).
15
investigated and countered. At the United States v. Falvey, 540 F. Supp.
1306, 1314 (E.D.N.Y. 1982).
same time, care must be taken to 16
United States v. Cavanagh, 807 F.2d 787,
ensure that the new tools provided 791 (9th Cir. 1987), and United States v.
by Congress in the USA PATRIOT Duggan, 743 F.2d 59, 73 n.5 (2d Cir. 1984)
17
Act are employed within the con- United States v. Duggan, 743 F.2d 59, at
78 (2d Cir. 1984) and United States v. Pelton,
straints of the Constitution. The Su- 835 F.2d 1067 (4th Cir. 1987).
preme Court has said “the police 18
United States v. Megahey, 553 F.Supp.
must obey the law while enforcing 1180 (E.D.N.Y. 1982) aff’d sub nom. United
the law, that in the end life and States v. Duggan, 743 F.2d 59 (2nd Cir. 1984);
United States v. Pelton, 835 F.2d 1067 (4th Cir.
liberty can be as much endan- 1987); United States v. Badia, 827 F.2d 1458
gered from illegal methods used to the government still are conducted (11th Cir.1987), cert. denied 485 U.S. 937
convict those thought to be crimi- under the watchful eye of the (1988); United States v. Johnson, 952 F.2d 565
nals as from the actual criminals (1st Cir. 1991), cert. denied 506 U.S. 816
courts. In the end, law enforcement (1992).
themselves.”46 and intelligence investigators must 19
PL 107-56, October 26, 2001, 115 Stat
FISA’s different standards for be mindful that the constitutional 272, § 218 (amending 50 U.S.C. §§
intelligence surveillance have been protections that limit their authority 1804(a)(7)(B) and 1823(a)(7)(B)).
20
viewed suspiciously by some who In re All matters Submitted to Foreign
also serve to protect their own rights Intelligence Surveillance Court, 218 F.Supp.
fear the loss of individual liberty. as citizens of the United States. 611.
Care must be taken to avoid any 21
In re Sealed Case, 310 F.3d 717 (Foreign
abuse of this tool by law enforce- Endnotes Intel. Surv. Ct. Rev., 2002).
1
ment. The Court has warned that PL 107-56, October 26, 2001, 115 Stat 22
Id. at 736.
272. 23
Supra note 21 at 743.
“the greatest dangers to liberty 2
50 U.S.C. §§ 1801-1863(1994). 24
Supra note 21 at 723; 50 U.S.C. §
lurk in insidious encroachment by 3
Reply of the Pennsylvania Assembly to the 1801(a)-(e).
men of zeal, well meaning but governor, November 11, 1775. 25
Supra note 21 at 736.
June 2003 / 31
26 35
Supra note 21 at 733; 50 U.S.C. § 50 U.S.C. §§ 1841-1846. investigation or undue delay in trial; see 18
36
1806(k). Supra note 1, § 214, amending 50 U.S.C. U.S.C. § 2705(a)(2).
27 42
50 U.S.C. § 1801(b) distinguishing § 1842(c)(2). Supra note 1, § 219, amending F.R.C.P.
37
between agents of a foreign power who are Supra note 1, §§ 214 and 216 (amending Rule 41(b)(3). International terrorism is
U.S. persons and non-U.S. persons and setting 50 U.S.C. §§ 1842, 1843, and 18 U.S.C. §§ defined in Title 18 U.S.C. § 2331(1);
out a somewhat higher standard for a U.S. 3121, 3123, and 3127). domestic terrorism is defined in 18 U.S.C. §
38
person to be considered an agent of a foreign Supra note 1, § 216 (amending 18 § 3123; 2331(5).
43
power; § 1801(e) setting out a stricter definition 3123(b)(1)(C) no longer requires that geo- There is an exception to this rule for
of foreign intelligence information where U.S. graphic limits be specified; however, movable objects; see F.R.C.P. Rule 41(b)(2).
44
persons are involved. 3127(2)(A) imposes a “nexus”). Supra note 42.
28 39 45
50 U.S.C. § 1805(a)(3)(A); § United States v. Freitas, 800 F.2d 1451 Supra note 1, § 224(a).
46
1824(a)(3)(A); § 1842(c)(2). (9th Cir. 1986); United States v. Ludwig, 902 Spano v. New York, 79 S. Ct. at 1206
29
50 U.S.C. § 1801(h); § 1805(f); § F.Supp. 121 (W.D. Tex. 1995); United States v. (1959).
47
1806(a),(j); § 1821(4); § 1824(e)(4); § 1825; § Villegas, 899 F.2d 1324 (2nd Cir.1990); United Olmstead v. United States, 48 S. Ct. 564
1843(c)(2); § 1845. States v. Pangburn, 983 F.2d 449 (2nd Cir. at 572-573 (1928).
30
Supra note 1, § 203a, amending Rule 1993).
6(e)(3)(c)(I)(V). 40
Supra note 1, § 213, amending 18 U.S.C. Law enforcement officers of other than
31
Supra note 1, § 203b. § 3103a. federal jurisdiction who are interested in this
32 41 article should consult their legal advisors.
Supra note 1, § 905. Adverse result is defined as one resulting Some police procedures ruled permissible
33
Supra note 1, § 201, amending 18 U.S.C. in endangering a life or a person’s physical under federal constitutional law are of
2516(1). safety; flight from prosecution; destruction of questionable legality under state law or are
34
Supra note 1, § 206, amending 50 U.S.C. or tampering with evidence; intimidation of not permitted at all.
§ 1805(c)(2)(B). potential witnesses; serious jeopardy of an
Subscribe Now
Heading home from his daily tour of duty, Officer Christopher R. Tillman
of the Danville, Virginia, Police Department witnessed an apartment building
engulfed in flames. Without hesitation, he exited his vehicle and ran toward the
burning complex. Hearing a child screaming from inside, Officer Tillman kicked
down the front door and rescued a 5-year-old boy from the flames. Once the
child was safe from the flames and the falling electrical wires outside, Officer
Tillman returned to the burning building to assist any other occupants. Over the
next few minutes, he rescued three adults and two children from the fire. Officer
Tillman’s courage and quick judgement saved the lives of all six individuals.
Officer Tillman
Official Business
Penalty for Private Use $300
Patch Call
The patch of the North Bend, Oregon, Police The city of Show Low, Arizona, received its name
Department features the McCullough Bridge, built as the result of a game of Show Low Poker between
in 1936, which spans Coos Bay from North Bend to two ranch owners; the winner gained sole possession of
Glascow, Oregon. The tree and sunset symbolize the the ranch. This tale became widespread and the city of
beauty and serenity of the southern Oregon coast. Show Low later was created nearby. The patch of the
Show Low Police Department features a deuce of
clubs, the winning card in the game and the namesake
of the city’s main street.