You are on page 1of 35

May 2001

Volume 70
Number 5
United States
Department of Justice
Federal Bureau of Investigation
Washington, DC 20535-0001

Louis J. Freeh
Director
Features
Contributors' opinions and statements
should not be considered an
endorsement by the FBI for any policy,
program, or service.

The Attorney General has determined Money Laundering Working together, law enforcement
that the publication of this periodical is
necessary in the transaction of the By William R. Schroeder 1 and financial institution administrators
and regulators can combat money
public business required by law. Use
of funds for printing this periodical has laundering.
been approved by the Director of the
Office of Management and Budget.
Investment Fraud Innovative investigative techniques
The FBI Law Enforcement Bulletin
(ISSN-0014-5688) is published
By John Cauthen 13 can help law enforcement officers
successfully prosecute fraudulent
monthly by the Federal Bureau of
Investigation, 935 Pennsylvania investment schemes.
Avenue, N.W., Washington, D.C.
20535-0001. Periodicals postage paid Enterprise Theory Law enforcement investigators can use
at Washington, D.C., and additional
mailing offices. Postmaster: Send
address changes to Editor, FBI Law
of Investigation 19 the enterprise theory of investigation to
help dismantle criminal enterprises.
By Richard A. McFeely
Enforcement Bulletin, FBI Academy,
Madison Building, Room 209,
Quantico, VA 22135. Law Enforcement Physical Title VII of the Civil Rights Acts of
Editor Fitness Standards and Title VII 26 1964 and 1991 may prohibit employers
from creating discriminatory physical
John E. Ott By Michael E. Brooks standard limits.
Associate Editors
Glen Bartolomei
Cynthia L. Lewis
Bunny S. Morris
Art Director
Denise Bennett Smith
Departments
Staff Assistant
Linda W. Szumilo

This publication is produced by 10 Technology Update 18 Book Review


members of the Law Enforcement The Public Safety Wireless Police Trauma: Psychological
Communication Unit,
William T. Guyton, Chief. Network Program Aftermath of Civilian Combat

Internet Address 12 Unusual Weapon


leb@fbiacademy.edu Barrel Gun
Cover Photo
© John Foxx Images

Send article submissions to Editor,


FBI Law Enforcement Bulletin, FBI
Academy, Madison Building, Room
209, Quantico, VA 22135.

ISSN 0014-5688 USPS 383-310


Money Laundering
A Global Threat and the International
Community’s Response
By WILLIAM R. SCHROEDER
© Digital Stock

A
new era of globalization than ever before. However, the serious challenge to law enforce-
has emerged, and it is same aspects of globalization that ment agencies and financial
shrinking the world and have expanded opportunities for regulators.
shaping domestic politics and inter- free-market capitalism also have Because globalization repre-
national relationships.1 Globaliza- resulted in new risks. Globaliza- sents an overarching international
tion involves the international inte- tion has turned the international phenomenon, the international
gration of capital, technology, and financial system into a money community’s response to the chal-
information in a manner resulting in launderer’s dream, siphoning off lenge posed by money laundering
a single global market and, to some billions of dollars a year from has to address the financial, legal,
degree, a global village.2 This inte- economies around the world and and enforcement issues in a univer-
gration enables individuals and cor- extending the reach of organized sal manner, through harmonization
porations to reach around the world crime. This unintended conse- of remedies. Understanding the glo-
farther, faster, deeper, and cheaper quence of globalization presents a bal threat of money laundering and

May 2001 / 1
the international community’s Criminals engage in money ill-gotten gains from suspicion and
response will assist investigators laundering for three reasons. First, protect them from seizure, crimi-
pursuing the evidentiary trail of money represents the lifeblood of nals must conceal their existence
a launderer by identifying the the organization that engages in or, alternatively, make them look
enforcement tools and techniques criminal conduct for financial gain legitimate.
developed to overcome obstacles because it covers operating ex-
encountered when crossing interna- penses, replenishes inventories, HOW IS MONEY
tional boundaries. purchases the services of corrupt LAUNDERED?
officials to escape detection and Money laundering consists of a
WHAT IS MONEY further the interests of the illegal three-stage process. The first stage
LAUNDERING? enterprise, and pays for an extrava- involves the placement of proceeds
Generally, money laundering is gant lifestyle. To spend money in derived from illegal activities—the
“the process by which one conceals these ways, criminals must make movement of proceeds, frequently
the existence, illegal source, or ille- the money they derived illegally ap- currency—from the scene of the
gal application of income and then pear legitimate. Second, a trail of crime to a place, or into a form, less
disguises that income to make it ap- money from an offense to criminals suspicious and more convenient for
pear legitimate.”3 In other words, can become incriminating evi- the criminal. For example, a gov-
the process used by criminals dence. Criminals must obscure or ernment official may take a bribe in
through which they make “dirty” hide the source of their wealth or the form of cash and place it in a
money appear “clean.” Though ini- alternatively disguise ownership or safe deposit box or bank account
tially considered an aspect integral control to ensure that illicit pro- opened under the name of another
to only drug trafficking, laundering ceeds are not used to prosecute individual to hide its existence or
represents a necessary step in al- them. Third, the proceeds from conceal the ownership.
most every criminal activity that crime often become the target of Layering constitutes the second
yields profits. investigation and seizure. To shield stage of the laundering process and
involves the separation of proceeds
from the illegal source through the
use of complex transactions de-
signed to obscure the audit trail and


hide the proceeds. This phase of the
laundering process can include the
...law enforcement transfer of money from one bank
account to another, from one bank
must work closely to another, from one country to an-
with financial other, or any combination thereof.
institution Criminals layer transactions to in-
managers and crease the difficulty of tracing the
regulators. proceeds back to its illegal source.
They frequently use shell corpora-


tions and offshore banks at this
stage because of the difficulty in
Mr. Schroeder, former chief of the FBI's Legal Forfeiture Unit, now serves as obtaining information to identify
president of a private law enforcement consultant company in Woodbridge, ownership interests and acquiring
Virginia, and is a technical advisor for the U.S. Department of the Treasury necessary account information
regarding money laundering and asset forfeiture and corruption.
from them.

2 / FBI Law Enforcement Bulletin


Integration, the third stage of WHY IS MONEY which criminals can launder large
money laundering, represents the LAUNDERING AN amounts of money in a short time
conversion of illegal proceeds into INTERNATIONAL THREAT? period.7 Several individuals and
apparently legitimate business Money laundering has become three companies pleaded guilty to
earnings through normal financial a global problem as a result of the federal money laundering charges
or commercial operations. In- confluence of several remarkable in that case in connection with a
tegration creates the illusion of a changes in world markets (i.e., the scheme that funneled more than $7
legitimate source for criminally de- globalization of markets). The billion from Russia through a bank
rived funds and involves techniques growth in international trade, the in New York over a 2-year period.
as numerous and creative as those expansion of the global financial The laundering scheme involved
used by legitimate businesses to in- system, the lowering of barriers to the transfer of funds by wire from
crease profit and reduce tax liabil- international travel, and the surge in Moscow to the United States and
ity. Common techniques include the internationalization of orga- then to offshore financial institu-
producing false invoices for goods nized crime have combined to pro- tions. Additionally, in 1998, federal
purportedly sold by a firm in one vide the source, opportunity, and authorities in Florida announced ar-
country to a firm in another country, means for converting illegal pro- rests in an international fraud and
using funds held in a foreign bank ceeds into what appears to be legiti- money laundering scheme involv-
as security for a domestic loan, mate funds. Money laundering can ing victims from 10 countries, with
comingling money in the bank ac- have devastating effects on the losses up to $60 million laundered
counts of companies earning legiti- soundness of financial institutions through two banks on the Caribbean
mate income, and purchasing prop- island of Antigua.8
erty to create the illusion of legal Emerging market countries9 are


proceeds upon disposal. particularly vulnerable to launder-
The successful money laun- ing as they begin to open their
derer closely approximates legal financial sectors, sell government-
transactions employed routinely by Criminals engage owned assets, and establish fledg-
legitimate businesses. In the hands in money ling securities markets.10 The eco-
of a skillful launderer, the payment laundering for nomic changes taking place in the
for goods that appeared to have three reasons. former Soviet States in Eastern Eu-
been delivered by one company rope create opportunities for un-


based upon an invoice of sale pre- scrupulous individuals where
pared by another company covers money laundering detection, inves-
the laundering of the purchase price tigation, and prosecution tools
when the goods never existed, and and undermine the political stability slowly take shape. Indeed, as most
the companies are owned by the of democratic nations. Criminals emerging markets began the pro-
same party; the sale of real estate quickly transfer large sums of cess of privatizing public monopo-
for an amount far below market money to and from countries lies, the scope of money laundering
value, with an exchange of the dif- through financial systems by wire increased dramatically.
ference in an under-the-table cash and personal computers. 5 Such The international community of
transaction, launders what, on the transfers can distort the demand for governments and organizations that
surface, appears to be capital gain money on a macroeconomic level have studied money laundering rec-
when the property is sold again; and and produce an unhealthy volatility ognize it as a serious international
a variety of lateral transfer schemes in international capital flows and threat.11 The United Nations and the
among three or more parties or com- exchange rates.6 Organization of American States
panies covers the trail of monetary A recent and highly publicized (OAS) have determined that the
transactions between any two of case prosecuted in New York pro- laundering of money derived from
them.4 vides an example of the ease with serious crime represents a threat to

May 2001 / 3
Ten strategies that countries and territories can follow to synthesize the universal
standards adopted by the international community to combat money laundering:
• Enhance cooperation among law enforcement, • Identify bank customers: because launderers
financial institutions, and judiciary: a coordi- covet anonymity for their clandestine activ-
nated response involving the financial indus- ity, institutions must identify their customers
try, the judiciary, and law enforcement is and pass pertinent information to the appro-
necessary to address the issues regarding priate authorities.
effective counterlaundering measures. • Record customer and transaction informa-
• Criminalize laundering: adopt legislation that tion: banks and other covered institutions
criminalizes the laundering of the proceeds must record information obtained in identify-
of all “serious crime.” ing their customers and certain transactions
• Establish a financial intelligence unit (FIU): and keep such records for up to 5 years.
an FIU is a central office, generally composed • Establish effective antimoney laundering
of investigators, banking experts, and finan- programs in banks: banks should establish
cial analysts, that obtains and analyzes infor- effective internal antilaundering programs,
mation from financial institutions and then conduct laundering-detection training for
provides that information indicative of officers and employees, and provide for
laundering to an appropriate government meaningful institutional accountability.
authority for investigation. • Ensure international cooperation: given
• Repeal bank secrecy laws: laws that unduly the ease and speed that criminals can layer
restrict the flow of information between and integrate funds across international
financial institutions and law enforcement boundaries, cooperation among enforce-
should be repealed and specific protections ment authorities on an international basis
afforded those appropriately disclosing is essential. Countries should adopt laws
information to the authorities. to facilitate such international cooperation.
• Report large/suspicious transactions: to obtain • Adopt forfeiture laws: countries should
needed information on a reliable basis, banks adopt laws that permit the forfeiture of
and other covered institutions should be property connected to laundering offenses
required to report all “suspicious” transac- and the pretrial restraint and seizure of
tions and all “large” transactions, where the property subject to forfeiture in domestic
reports on large transactions would help law cases and upon request by authorities from
enforcement agencies in a manner that is not foreign jurisdictions.
cost prohibitive.

the integrity, reliability, and stabil- terrorism, as a threat to global and against money laundering in
ity of financial, as well as govern- peace and freedom. Immediately particular.13 The U.S. Department
ment, structures around the world.12 thereafter, he signed Presidential of the Treasury Deputy Secretary
In October 1995, the President of Directive 42, ordering U.S. law en- summed up the seriousness of the
the United States, in an address to forcement agencies and the intelli- domestic and international threat
the United Nations General Assem- gence community to increase and when he testified before the U.S.
bly, identified money laundering, integrate their efforts against inter- Congress on March 9, 2000. During
along with drug trafficking and national crime syndicates in general his testimony before the House

4 / FBI Law Enforcement Bulletin


Committee on Banking and Finan- yearly basis could range between 2 scope of the laundering problem.20
cial Services, he advised that money and 5 percent of the world’s gross The inability to determine the
laundering encouraged corruption domestic product—or somewhere amount of money laundered im-
in foreign governments, risked un- between $600 billion and $1.5 tril- pedes an adequate understanding of
dermining the integrity of the U.S. lion.17 Estimates come from a vari- the magnitude of the crime, its mac-
financial system, weakened the ef- ety of sources based upon both roeconomic effect, and the effec-
fects of U.S. diplomatic efforts, and macroeconomic theories and on tiveness of current counterlaunder-
facilitated the growth of serious microeconomic approaches. The ing efforts.
crime.14 These assessments make it U.S. Department of the Treasury
clear that money laundering pre- has suggested that $600 billion rep- WHAT IS THE
sents not only a formidable law en- resents a conservative estimate of INTERNATIONAL
forcement problem, but also a seri- the amount of money laundered RESPONSE?
ous national and international each year, and some U.S. law mak- Efforts by governments to ad-
security threat as well. ers believe that, not only does the dress money laundering have been
Money laundering threatens ju- under way for over 10 years. The
risdictions from three related international response to laundering


perspectives. First, on the enforce- has taken a number of forms,
ment level, laundering increases the including multilateral treaties,
threat posed by serious crime, such ...$600 billion regional agreements, international
as drug trafficking, racketeering, represents a organizations, and the identifica-
and smuggling, by facilitating the conservative estimate tion of universal counterlaundering
underlying crime and providing measures.
of the amount of
funds for reinvestment that allow
the criminal enterprise to continue
money laundered The United States’ Response
its operations. Second, laundering each year.... The United States commenced


poses a threat from an economic one of the earliest responses to
perspective by reducing tax rev- money laundering. The Bank
enues and establishing substantial Secrecy Act of 1970 authorized the
underground economies, which amount lie somewhere between Secretary of the U.S. Department of
often stifle legitimate businesses $500 billion and $1 trillion, but that the Treasury to establish regulatory
and destabilize financial sectors half is being laundered through U.S. measures requiring the filing of
and institutions.15 Finally, money banks.18 Due to the clandestine na- currency transaction reports and
laundering undermines democratic ture of laundering activity, govern- served as a foundation for further
institutions and threatens good gov- ments and concerned organizations measures to combat laundering.21
ernance by promoting public cor- cannot accurately quantify the Subsequently, Congress enacted the
ruption through kickbacks, bribery, amount of money laundered each Money Laundering Control Act in
illegal campaign contributions, col- year. Some estimates suggest that 1986,22 which made the launder-
lection of referral fees, and misap- the amount of money laundered ing23 of proceeds derived from any
propriation of corporate taxes and each year is approximately $2.8 one of a long list of offenses (known
license fees.16 trillion, an amount more than four as “specified unlawful activities”) a
times greater than the figure gener- crime.24 This list now includes over
HOW MUCH MONEY ally accepted.19 100 federal offenses, selected state
IS LAUNDERED? Many economists, law enforce- offenses, and certain violations
The International Monetary ment executives, and policy makers of foreign laws. 25 The act also
Fund estimates that the amount of agree on the need to develop an ac- criminalized structuring certain
money laundering occurring on a ceptable means of identifying the transactions to avoid filing currency

May 2001 / 5
reports.26 Congress made civil and community’s response to drug to criminalize the laundering of
criminal procedures available money laundering.29 It requires the drug proceeds.31 In addition, the
to forfeit property involved in a signatory jurisdictions to take fact that the treaty defined money
laundering offense. Subsequent specific actions, including steps to laundering as a crime predicated on
legislation has added further enact domestic laws criminalizing drug trafficking has limited its ef-
enhancements.27 the laundering of money derived fectiveness. Of the countries
Most recently, the Money from drug trafficking and provide tracked in the U.S. Department of
Laundering and Financial Crimes for the forfeiture of property de- State report, 66 have failed to
Strategy Act of 1998 called for the rived from such offenses.30 The criminalize the laundering of pro-
development of a national strategy treaty also promotes international ceeds derived from nondrug traf-
to combat money laundering and re- cooperation as a key to reducing the ficking offenses.
lated financial crimes. 28 In re- global threat of money laundering
sponse, the Departments of Justice and requires states to provide assis- The Strasbourg
and the Treasury developed a 5- tance in obtaining relevant financial Convention of 1990
year strategy that calls for designat- records when requested to do so The Council of Europe is a re-
ing high-risk money laundering without regard to domestic bank se- gional organization established to
zones to direct coordinated enforce- crecy laws. strengthen democracy, human
ment efforts, providing for greater rights, and the rule of law in its
scrutiny of suspicious transactions, member states, in part, by harmo-


creating new legislation, and inten- nizing its policies and encouraging
sifying pressure on nations that lack the adoption of common practices
adequate countermoney laundering Emerging market and standards. It adopted the
controls. In addition to its domestic countries are Strasbourg Convention in Novem-
efforts, the United States has particularly ber 1990,32 which, like the Vienna
become a party to multilateral vulnerable to Convention, requires each party to
treaties and agreements, as well as adopt legislation that criminalizes
numerous bilateral efforts, that
laundering.... money laundering. As of December


support enhanced international 1999, 27 of 41 member states and
cooperation. The United States par- one nonmember (Australia) have
ticipates in and promotes the efforts ratified the Strasbourg Convention.
of international organizations that While the Vienna Convention Unlike the Vienna Convention, this
have developed universal standards remains a benchmark in identifying treaty does not limit the underlying
and monitor current trends to ad- counterlaundering measures on an predicate offense to drug traffick-
dress the laundering threat to the international level, it does not ing. The Strasbourg Convention re-
global community. In furtherance criminalize laundering. Rather, it quires members to adopt laws
of international cooperation, the obligates the parties to adopt do- criminalizing the laundering of the
United States transfers funds to for- mestic legislation that makes laun- proceeds from any “serious
eign jurisdictions (known as “inter- dering drug proceeds a crime. Un- crime.”33 The treaty also requires
national sharing”) that have assisted fortunately, compliance with regard signatories to adopt laws authoriz-
in efforts that resulted in the forfei- to the antilaundering provision ing the forfeiture of the proceeds of
ture of property. has not been universal. The U.S. serious offenses, as well as any in-
Department of State recently issued strumentalities of the crime, or in
Vienna Convention of 1988 a report tracking the counterlaun- the alternative, the value of such
The Vienna Convention repre- dering measures of various jurisdic- property. Members must provide
sents the first concerted effort tions. The report listed 38 parties to investigative assistance to foreign
to influence the international the Vienna Convention that failed jurisdictions regarding forfeiture

6 / FBI Law Enforcement Bulletin


cases and take appropriate mea- money laundering, and the need for against money laundering. The
sures to prevent disposal of subject international cooperation.36 The report, adopted on June 22, 2000,
property prior to confiscation. Forty Recommendations, revised named 15 countries and territories
and updated in 1996, encourage the with systemic problems indicating a
Financial Action Task Force full implementation of the Vienna lack of a serious commitment to
Recommendations and Strasbourg Conventions and eliminating or significantly reduc-
In response to increasing con- the lifting of bank secrecy laws. ing money laundering.37 The juris-
cerns, the governments of the Strategies encouraged by the FATF dictions (noncooperating coun-
Group of Seven (G-7)34 industrial- include the criminalization of the tries) 38 either failed to adopt
ized countries established the Fi- laundering of the proceeds derived meaningful legislation criminal-
nancial Action Task Force on from all serious crime, the forfei- izing laundering or have serious de-
Money Laundering (FATF) in 1989 ture of property connected with a ficiencies in their banking laws and
as an intergovernmental body to de- laundering offense or its corre- implementing regulations. By pub-
velop and promote policies to com- sponding value, the establishment licly criticizing these jurisdictions,
bat money laundering.35 The FATF, of customer identification and the FATF and its member countries
comprised of members from 26 record keeping rules, and the cre- hope that international public pres-
countries and two regional organi- ation of financial intelligence units. sure will result in antilaundering re-
zations, includes the major finan- © PhotoDisc
forms. The list also served as a pre-
cial centers of Europe, North cursor for countries with major
America, and Asia and works both financial centers to issue formal ad-
independently and in cooperation visories to its financial institutions
with other organizations to estab- identifying the risks of conducting
lish and strengthen member and financial transactions with the juris-
nonmember antilaundering mea- dictions on the list. Accordingly, in
sures. One of the guiding principles July 2000, the U.S. Department of
of the FATF is that money launder- the Treasury issued such advisories
ing constitutes a complex economic on each of the jurisdictions on the
crime, which conventional law name and shame list.39 As a result of
enforcement methods cannot con- the FATF’s continuing efforts to
trol effectively. Therefore, law en- address money laundering on an
forcement must work closely with international scale, their recom-
financial institution managers and mendations have become the ac-
regulators. cepted international standard for
In April 1990, the FATF issued As a part of its ongoing efforts antimoney laundering regimes.
a report containing recommended to combat money laundering, the
countermeasures to money launder- FATF prepares annual laundering CONCLUSION
ing. Commonly known as the typology reports and conducts mu- The global threat of money
“Forty Recommendations,” the tual in-depth evaluations of each laundering poses unique challenges
FATF designed these countermea- member’s antilaundering regimes. to the law enforcement community.
sures to provide governments with a Consistent with its continuing over- To pursue the evidentiary trail of a
comprehensive framework for sight role and its efforts to identify money launderer, law enforcement
antimoney laundering action fo- key antimoney laundering weak- agencies must identify and use
cused around the criminal justice nesses throughout the world, the tools and techniques that can help
system and law enforcement, the FATF approved a report on the is- them when crossing international
role of the financial sector and gov- sue of noncooperative countries and boundaries. Multilateral agree-
ernment regulators in combating territories in the international effort ments that require participants to

May 2001 / 7
adopt antilaundering measures and Attorney General, The Cash Connection: have undergone transformation from a
Organized Crime, Financial Institutions, and government-controlled economy to one with
the regional and world organiza-
Money Laundering 7 (1984). fewer government controls and greater market
tions that have developed and en- 4
Jack A. Blum, et al., “Financial Havens, freedom for companies to trade on an
couraged a standardized approach Banking Secrecy and Money Laundering,” international scale, such as the Czech Republic,
to addressing laundering all have Crime Prevention and Criminal Justice News Slovenia, and Thailand.
10
Letter 8, no. 34/35 (1998). See, Stephen R. Kroll, “Money Launder-
contributed to the strides made in 5
See, for example, Eduardo Gallardo, ing: A Concept Paper Prepared for the
addressing the challenges posed.40 “Chile Attracts Drug Money for Laundering: Government of Bulgaria,” International Law 28
Efforts undertaken by nations inde- Strong Economy, Financial Market Lure (1994): 835, 869 (a discussion on
pendent of the international com- Foreign Cartels,” Washington Times, Oct. 21, criminalization of money laundering for
1997 (“Most experts believed drug gangs view Bulgaria and the special concerns about
munity often result in significant
Chile mostly as a good place for money misappropriation of value from privatized
variations from the accepted stan- laundering because of its thriving economy, enterprises during the transformation of the
dard and have the effect of facil- with money flowing in and out of the country Bulgarian economy from a government-
itating laundering activity rather which would allow traffickers to make their controlled economy to a market economy).
11
money look legitimate by channeling it through For example, representatives of the “G-7”
than combating it.41 For example,
businesses...Nearly $2 billion in foreign money (now referred to as the “G-8”), seven major
the government of Antigua and poured into Chile in the first 6 months of the industrial countries in the world, including the
Barbuda weakened its laws relating year for investment in its companies.”). United States, the United Kingdom, France,
to money laundering, resulting in Germany, and Japan, who formed the Financial
Action Task Force (FATF); the Organization of
the U.S. Department of the Trea-


American States (OAS); the Council of Europe;
sury issuing an advisory warning the United Nations (UN); the Asian Pacific
banks and other financial institu- Group on Money Laundering; and the European
tions to be wary of all financial Union.
transactions routed into, or out of, ...the United States 12
United Nations Declaration and Action

that jurisdiction.42 The changes in has become a Plan Against Money Laundering, United
Nations Resolution S-20/4 D (June 10, 1998);
the law strengthened bank secrecy, party to multilateral and the Ministerial Communique, Ministerial
inhibited the scope of laundering treaties and Conference concerning the Laundering of
Proceeds and Instrumentalities of Crime,
investigations, and impeded inter- agreements...that Buenos Aires, Argentina (December 2, 1995);
national cooperation. A common, support enhanced http://www.oecd.org/fatf/Initiatives_en.htm;
harmonized approach will prevent accessed November 13, 2000.
launderers from using the different international 13
U.S. Department of State, International
laws and practices among the juris- cooperation. Crime Control Report, 1999, Money Launder-
ing and Financial Crimes, 599.
dictions to their advantage both at


14
See, House Committee on Banking and
the expense and disadvantage of Financial Services, prepared statement of Stuart
countries interested in pursuing Eizenstat, Deputy Secretary, U.S. Department
of the Treasury (March 9, 2000); http://
them.43 Only with laws that have 6
See remarks of Michel Camdessus, www.ustreas.gov/press/releases/ps445.htm,
been harmonized can law enforce- managing director of the International Monetary accessed November 13, 2000.
ment agencies, working together Fund, at a plenary meeting of the Financial 15
Supra note 6, (“Potential macroeconomic
with financial institution adminis- Action Task Force on Money Laundering, consequences of money laundering include, but
February 10, 1998; http://www.imf.org/ are not limited to: inexplicable changes in
trators and regulators, combat this external/np/speeches/1998/021098.htm. money demand, greater prudential risks to bank
ever-increasing problem. accessed November 13, 2000. soundness, contamination effects on legal
7
Mark Hosenball and Bill Powell, “The financial transactions, and greater volatility of
Russian Money Chase,” Newsweek, February international capitol flows and exchange rates
Endnotes 28, 2000, 42-43. due to unanticipated cross-border asset
1
Thomas L. Friedman, The Lexus and the 8
Catherine Skipp, “Six Arrested in Global transfers.”).
Olive Tree: Understanding Globalization (New Fraud, Money-Laundering Case: Group 16
See, Barry R. McCaffrey, “Efforts to
York, NY: Farrar, Straus, Giroux, 1999). Allegedly Bilked Victims of $60 Million,” Combat Money Laundering,” Loyola of Los
2
Ibid. Washington Post, May 8, 1998, sec. A, p. 2. Angeles International and Comparative Law
3
President’s Commission on Organized 9
For example, countries in Eastern Europe, Journal 791, no. 20 (1998). Also, supra note
Crime, Interim Report to the President and the Asia, and South and Central America that 13.

8 / FBI Law Enforcement Bulletin


17
Financial Action Task Force, Basic transaction reports. See also, Matthew S. Laundering, with Interpretative Notes, WL 35
Facts About Money Laundering, http:// Morgan, “Money Laundering: The American I.L.M. 1291 (1996).
37
www.oecd.org/fatf/Mlaundering_en.htm; Law and Its Global Influence,” 3-SUM NAFTA: Review to Identify Non-Cooperative
accessed November 13, 2000; and supra notes Law & Business Review of the Americas 24, 26 Countries or Territories: Increasing the
6 and 14. (Summer 1997). Worldwide Effectiveness of Anti-Money
18 28
Elise J. Bean, Deputy Chief Counsel to Pub. L. 105-310, § 2(a), 112 Stat. 2942 Laundering Measures, report issued by FATF,
the Minority Senate Permanent Subcommittee (Oct. 30, 1998) codified at 30 U.S.C. § 5341. June 22, 2000.
29 38
Investigations, U.S. Congress, Money The United Nations Convention Against Jurisdictions named as noncooperating
Laundering 2000: What’s Going On? a Illicit Traffic in Narcotic Drugs and Psychotro- countries are: the Bahamas, Cayman Islands,
presentation made at the American Bankers pic Substances of 1988 is commonly known as Cook Islands, Dominica, Israel, Lebanon,
Association/American Bar Association Money the “Vienna Convention,” U.N. Docs. E/Conf. Liechtenstein, Marshall Islands, Nauru, Niue,
Laundering Enforcement Seminar, October 82/15 (Dec. 19, 1998), WL 28 I.L.M. 493 Panama, Philippines, Russian Federation, St.
29-31, 2000. (1989). One hundred fifty-three countries are Kitts and Nevis, and St. Vincent and the
19
John Walker, Measuring the Extent of parties to this treaty. Grenadines.
39
International Crime and Money © PhotoDisc
See FinCen Advisories issued by
Laundering, paper prepared for the the U.S. Department of the Treasury for
Kriminal Expo, a conference held in each of the 15 countries on the name
Budapest, Hungary, on June 9, 1999, and shame list in July 2000; http://
http://www.ozemail.com.au/~born1820/ www.ustreas.gov/fincen; accessed
Budapest.html; accessed October 11, November 13, 2000.
40
2000. There are additional regional
20
There are ongoing efforts in several organizations, not discussed in this
countries to estimate the magnitude of article, that address money laundering.
money laundering. An ad hoc group They include the OAS (established in
composed of members of the FATF is 1948), which developed model
engaged in a study to quantify the regulations for member jurisdictions to
amount of money laundering activity. prevent money laundering through a
Supra note 13. statutory framework; the Asia/Pacific
21
Pub. L. 91-508, § 202, Oct. 26, Group on Money Laundering (APG)
1970, codified at 31 U.S.C. § 5311. (“It (established in 1997) to address
is the purpose of this subchapter...to laundering on a regional basis by
require certain reports or records where applying, inter alia, the FATF Recom-
they have a high degree of usefulness in mendations; the Caribbean Financial
30
criminal, tax, or regulatory investigations or See, Vienna Convention, at Article Action Task Force (CFATF), which consists of
proceedings.”). 3(1)(b) requiring each signatory state to enact representatives of 25 countries and territories in
22
Subtitle H of the Anti-Drug Abuse Act domestic legislation criminalizing money the Caribbean, along with five cooperating and
of 1986, Pub. L. No. 99-570, 100 Stat 3207, laundering activity and Article 5(1), which supporting nations from outside the region. The
codified at 18 U.S.C. §§ 1956, 1957, 31 U.S.C. requires each signatory to adopt measures to CFATF has adopted the FATF Recommenda-
§§ 5324-26. enable confiscation of drug trafficking and tions and added 19 additional region-specific
23
18 U.S.C. §§ 1956(a)(1) and 1957(a). money laundering offenses. recommendations.
24 31 41
See, generally, Barrett Atwood and Molly Supra note 13. Jeffrey Lowell Quillen, “The International
32
McConville, “Money Laundering,” Am. Crim. Convention on Laundering, Search, Attack on Money Laundering: European
L. Rev. 36 (1999): 901 for a discussion of the Seizure, and Confiscation of the Proceeds of Initiatives,” Journal of Comparative and
conduct criminalized by this act. Crime commonly known as the “Strasbourg International Law 213 (1991).
25 42
18 U.S.C. § 1956(c)(7). Convention,” Eur. Consult. Ass., Doc. No. 141 “Treasury Warns Banks on Transaction
26
31 U.S.C. §§ 5322, 5324; 18 U.S.C. (Nov. 9, 1990), WL 30 I.L.M. 148 (1991). with Antigua and Barbuda,” press release
33
§ 1956(a)(2). Ibid., at Article 6 (serious crime under issued by the U.S. Department of the Treasury,
27
Annunzio-Wylie Anti-Money Laundering the treaty may be defined by each signatory RR-3066 (April 1999) http://www.ustreas.gov/
Act, Pub. L. No. 102-550 (1994). Changes as identified by declaration). press/releases; accessed November 13, 2000.
34 43
included: 1) an expanded definition of Supra note 11. At the Summit of Americas held in
35
“financial transaction” to include the transfer House Committee on Banking and Buenos Aires, Argentina, in 1995, representa-
of title to vehicles, aircraft, and real property; Financial Services, “Committing Money tives of 34 countries in the Western Hemisphere
2) authority for the U.S. Treasury to require Laundering,” prepared testimony of Jonathan agreed to recommend to their governments a
financial institutions to carry out antimoney Winer, Deputy Assistant Secretary of State, plan of action for a coordinated hemispheric
laundering programs; 3) increased record U.S. Department of State (June 11, 1998). response to combat money laundering.
36
keeping to cover wire transfers; and, See, Financial Action Task Force on
4) authority for the U.S. Treasury to require Money Laundering: The Forty Recommenda-
financial institutions to file suspicious tions of the Financial Task Force on Money

May 2001 / 9
Technology Update
History and Organization
The PSWN Program is a joint effort sponsored by
the U.S. Departments of Justice and the Treasury. The
program addresses issues facing public safety wireless
communications, primarily in the area of
interoperability among land mobile radio (LMR)
networks used to support public safety missions. The
program is working to plan and foster interoperability
at all levels of government (e.g., local, state, and
federal) and among all public safety disciplines (e.g.,
law enforcement, fire, and emergency medical
services). In 1996, the PSWN Program was founded
in response to a National Partnership for Reinventing
Government (NPRG) initiative that called for the
establishment of an intergovernmental wireless
public safety network as a means of achieving
interoperability. Since then, the vision has evolved to
a system of networks, regionally focused, brought
together through coordination and partnerships among
public safety agencies from all levels of government.
Although its task is very challenging, the PSWN
Program has made great strides in achieving
The Public Safety Wireless interoperability among public safety agencies across
the United States. The program realizes that there
Network (PSWN) Program may never be one nationwide wireless communica-
A Brief Introduction tions system, but that statewide or regional
By Derek Siegle and Rick Murphy interoperability is an achievable goal with the
federal government participating where appropriate.

P ublic safety wireless interoperability refers to


the ability of public safety officials to commu-
nicate with each other seamlessly in real time over
The PSWN Program has been active in several
key areas of the interoperability challenge. The
program is promoting coordination and partnerships
among public safety agencies, exploring difficulties in
their wireless communications network. Whether by funding and the development of funding alternatives,
voice or through data transmissions, interoperable addressing public safety spectrum issues, supporting
communications can mean the difference between life and participating in standards and technology devel-
and death for citizens and public safety personnel and opment, promoting systems security improvements,
often hold the key to minimizing loss of property and implementing pilots, proof-of-concept projects,
when disasters occur. However, the history and and demonstrations in several cities and regions of
evolution of public safety wireless communications the United States.
seems to contradict the need for, and benefits of,
interoperability. Stand-alone systems, operating Coordination and Partnerships
independently, consequently have created obstacles Agencies must be willing to communicate with
to interoperability. Nonetheless, these obstacles can each other. Coordination and partnerships are essen-
be overcome, and the Public Safety Wireless Network tial to achieving interoperability. The PSWN Program
(PSWN) Program is leading efforts to do so. realizes officers and departments first must be willing

10 / FBI Law Enforcement Bulletin


to work together and share a mutual commitment to California, Colorado, and Montana, already have
the goal that no man, woman, and child ever should working groups addressing interoperability issues.
lose their life or be injured because public safety The PSWN Program will offer whatever assistance
officials cannot communicate with each other. The it can to states and their communications councils as
PSWN Program is very active in bringing representa- they work to resolve the issue of interoperability. The
tives from different departments together to find a program realizes it cannot accomplish its mission
solution to their interoperability challenges. Public successfully without the direct involvement and
safety agencies must recognize the importance of actions of individual state and local public safety
interoperability and strive for interoperability as they agencies across the country.
plan system replacements and upgrades. This requires
public safety agencies to identify their interoperability Funding
requirements and form the necessary partnerships to The ability of departments to obtain funding for
meet these requirements. public safety wireless projects is a major obstacle to
The PSWN Program is fostering partnerships, achieving interoperability. Historically, public safety
providing networking opportunities, raising aware- communications, particularly those that enable
ness, and sharing solutions departments to communicate
through its regional sympo- outside their normal realm of
siums. Working with associa- responsibility, have garnered
tions, such as the International
Association of Chiefs of Police
and the International Associa-
tion of Fire Chiefs, and through
“ The PSWN Program is
fostering partnerships,
providing networking
little attention. Quite often,
this issue is very low among
the funding priorities of most
legislatures, administrators,
the efforts of the PSWN and even the public, until
Executive Committee, the opportunities, raising major incidents or disasters
program remains proactive in awareness, and sharing call attention to shortfalls.
developing these relationships. solutions through its To help alleviate the funding
The Executive Committee regional symposiums. difficulty, the PSWN Program
comprises leading representa- is reaching out and educating


tives of local, state, and federal individual members of Con-
public safety agencies. It serves gress and making presentations
as an advisor to, and an advo- to the National Association of
cate of, the program and its Governors, National League
mission. In addition to its symposiums and Executive of Cities, and other similar associations to inform
Committee, the program sponsors Integrated Program state and local decisionmakers. The goal is to make
Teams with direct representation from radio commu- public safety wireless communications systems and
nications specialists from all levels of government. interoperability a priority investment for America’s
These persons serve as members of these working future safety.
groups to solve specific interoperability challenges
and foster solutions and pilot concepts. Conclusion
The program also is beginning a new outreach The ultimate goal of the Public Safety Wireless
initiative to facilitate the formation of public safety Network Program is to develop and enact a road map
communications councils in each of the 50 states. to assist public safety agencies with ongoing and
This campaign hopefully will be a catalyst for the future interoperability efforts, known as the Public
coordination and partnerships necessary for tackling Safety WINS. Public Safety WINS will serve as a
the interoperability challenge. Several states, such as basis to help public safety agencies formulate

May 2001 / 11
strategies for interoperable systems by addressing publications, as well as other issues regarding inter-
coordination and partnership, funding, spectrum, operability can be accessed at http://www.pswn.gov
standards and technology, and security issues associ- or can be obtained by contacting the program at
ated with such an endeavor. Public Safety WINS is 1-800-565-PSWN.
scheduled to be finalized by the end of fiscal year
2001. Public Safety WINS will include an introduc- Mr. Siegle and Mr. Murphy are, respectively, the U.S.
tory video supported by an interactive Web site that Justice and the Treasury Departments’ program managers
will provide both technical and policy solutions to for the Public Safety Wireless Network (PSWN) Program.
interoperability issues. The PSWN Program is a federally sponsored initiative
The PSWN Program is committed to assisting dedicated to improving public safety wireless interoperabil-
public safety agencies with implementation strategies ity, so that no one loses their life because public safety
officials cannot communicate with one another.
and their plans to address interoperability. Informa-
tion regarding the program, its studies, pilots, and

Unusual Weapon

Barrel Gun

A fter an armed bank robbery in New York,


police officers arrested two individuals exiting
the bank and recovered two weapons. One of the
weapons was a machine-lathed zip gun containing
one .22-caliber bullet. The weapon is loaded by
unscrewing the 1 1/2-inch barrel, where the round is
inserted. The barrel is screwed back on, and the
cocking lever is pulled back engaging the trigger
lever. The firing pin has an adjustment spring for the
amount of pressure needed to drive the firing pin. The
weapon is 5 inches long and can be concealed easily
in the palm of the hand.

Submitted by the Joint Bank Robbery Task Force of the


New York, New York, Police Department

12 / FBI Law Enforcement Bulletin


Investment
Fraud
By JOHN CAUTHEN

O ne detective working
white-collar crime en-
countered an investor who
claimed that he did not receive a
promised 900 percent annual profit
on an investment. To complicate
matters, the investor dumped stacks
of paperwork on the detective’s
desk attempting to prove the fraud.
Upon further questioning, the de-
tective learned that the investor
made the investment 2 or 3 years
ago, but it had not paid out during
the past year. The investor ex-
plained that he thought he had in-
vested in an overseas program guar-
anteed by banks involving the
Federal Reserve that made money
by trading some type of bank instru-
ments. He had hesitated to issue a
complaint because he believed the
investment would pay off soon.
The scheme involved volumes of
thick contracts, letters of intent,
secrecy clauses, and a host of other © PhotoDisc
financial terms that the investor re-
ally never understood and could not
explain to the detective. The inves- money—between $500,000 and $1 difficulty in establishing criminal
tor only understood that his in- million. Today, these scams have intent needed for conviction prove
volvement had no risk and that he evolved into targeting larger num- challenging. However, the FBI’s
would receive an extraordinary re- bers of people for smaller dollar Sacramento office has implemented
turn. But, the investment failed. amounts—usually between $5,000 investigative techniques to success-
This scenario describes a prime and $100,000 each.1 fully prosecute these schemes.
bank trading program fraud. These Unfortunately, these scam art- Initially, when investigators receive
types of investment frauds have ists rarely face prosecution because an investment fraud complaint,
existed for many years and, courts traditionally have regarded they should contact promoters and
historically, have involved indi- the cases as civil in nature, and the explain the illegality of market-
viduals investing huge sums of complexity of the issues and the ing such schemes. By doing so,

May 2001 / 13
often called an intermediary or fa-

“ Law enforcement
should ensure that
all promoters
cilitator. The promoter will sign let-
ters of intent or proof of funds and
eventually sign a contract with the
intermediary.
Promoters receive payment by
receive this keeping a portion of the investment
and sending the balance to the inter-
warning during mediary, or by making arrange-
the interview. ments to receive a percentage of the


profits. At this point, the money
starts to flow. The investor gives
Special Agent Cauthen serves in the
money to the promoter, who, in
FBI’s Sacramento, California, office. turn, passes it along to the interme-
diary who initially performs as
promised. Usually, the investor
receives one or two payments as
investigators establish the knowl- to perform as expected. At this profits. Then, the payments reduce
edge of the promoter and warn the point, they reach into their file cabi- greatly or cease all together. Pro-
promoter that continuing the fraud net, pull out a huge stack of paper, moters then will provide a series of
may result in prosecution. If the throw it on the desk, and advise that excuses, often in writing, explain-
promoter continues to contact po- they are a victim as well. ing in detail exactly why the invest-
tential investors to take money, the A number of promoters claim ment cannot pay this month, but that
U.S. Attorney’s Office may charge that they have access to individuals it will pay soon.
the scam artist with mail and wire who can purchase bank instruments In the final analysis, no legiti-
fraud. at a discount and resell them for a mate investment ever takes place. In
higher price for a small profit. fact, everyone in the chain is an
HOW THE FRAUD WORKS These promoters perpetrate prime intermediary who takes a portion of
Assuming a department eventu- bank scams throughout the world the money as fees or commissions
ally opens a criminal case, most in- and claim that they do this continu- and passes the balance to the next
vestigators will become discour- ally, making huge profits in a short person in the chain.
aged after the initial interview with time period with no risk. At this point, law enforcement
these con artists. Usually, they ad- The promoters collect funds easily recognizes the investment as
mit taking money from the victim, from investors and have them sign a a classic Ponzi scheme2 in which
promising an extraordinary return, series of documents to enter into the money paid to old investors repre-
explaining the guarantee of the in- investment. Types of documents sents, in reality, investment princi-
vestment, and failing to perform as seen at this stage include “letters of pal from the new investors. By the
promised. But, investment crimi- intent” and “proof of funds letters,” time the matter comes to the atten-
nals will advise that they were all designed to make investors be- tion of law enforcement, the money
victims, too, because although they lieve that they have to qualify for has passed through several hands
took money from investors, they the investment. Additionally, the and, often, through several states or
gave it to their contacts who documents lend credibility to the countries.
promised they had access to a trader scheme by making the investment
who could deliver the promises. application process appear official. TACKLING THE PROBLEMS
Then, they will explain how their The promoter will enter into Several problems arise in this
contacts took the money but failed an agreement with another person, type of scam. First, investigators

14 / FBI Law Enforcement Bulletin


have difficulty proving that anyone of the fraud before, investigators after receiving the warning. Law
involved acted with intent to de- should tell them now, as well as enforcement should ensure that all
fraud, especially promoters of the provide an information sheet, which promoters receive this warning dur-
scheme. These con artists use ex- describes different types of invest- ing the interview. This process can
cuses like “I thought it was real” or ment programs and proclaims assist prosecutors during trial when
“I thought it would work” as their certain ones as fraudulent.4 This negating a defendant’s claim of ig-
most common defense. sheet can prove helpful as an inves- norance as to the illegality of the
Another problem involves the tigative tool for law enforcement. scheme.
level of complexity these types of Investigators can give the sheet to Second, investigators need evi-
schemes present. One judge charac- promoters to advise them of the dence that promoters have been in-
terized a prime bank scam as inher- fraudulent investments—a criminal volved in these types of investments
ently complex, deliberately de- violation subject to federal securi- in the past and have lost money be-
signed this way by criminals. The ties laws. longing to other individuals. Items
judge compared the difficulty of in- Advising promoters of the obtained by search warrants, such
vestigation to a large jigsaw puzzle fraudulence of these programs as bank records, may prove helpful.
thrown to the ground, leaving the alerts them that moving any money Investigators should ask promoters
investigator with seemingly unre- between bank accounts in this type about specific deals in which they
lated pieces to pick up and reas- of program may constitute money have participated in the past. If they
semble.3 The sheer volume of the laundering. Documenting the fact claim that they have done this suc-
paperwork alone can discourage in- that investigators have warned pro- cessfully before, investigators
vestigators. Even if investigators moters about the fraudulent invest- should get all the details. On the
manage to understand the case, ment may not help in the prosecu- other hand, some promoters will
they probably will have difficulty tion of frauds that already have claim that they have never done this
explaining it to the prosecutor. occurred; however, it can help before. If investigators learn that
Although the investigator and the prove fraudulent intent if the indi- promoters have been involved in
prosecutor eventually may unravel vidual continues to promote even failed deals in the past, but still
the scheme, explaining it to a jury
can feel almost impossible. Never- © PhotoDisc
theless, law enforcement can inves-
tigate and prosecute these cases
successfully with a minimum of
frustration, assuming that they
pay particular attention to contact
with promoters, investors, and the
prosecutor.
Contact with Promoters
Investigators strive to show in-
tent to defraud. To prove intent,
they have to show that the promoter
lied intentionally about the invest-
ment to get the investor’s money.
Proof of intent can include evidence
that the promoter previously knew
that the investments were fraudu-
lent. If the promoters did not know

May 2001 / 15
Information Sheet

T he purpose of this notice is to alert the public to


persons who reportedly have marketed invest-
ment schemes that appear to be fraudulent. Various
America, in which banks trade securities. Any represen-
tations to the contrary are fraudulent.
In addition, investment programs in which a
prime bank trading programs or similar trading financial institution is asked to write a letter, commonly
programs which purport to offer above-average referred to as a “blocked funds letter,” advising that
market returns with below-market risk through the funds are available in the account, that they are “clean
trading of bank instruments are fraudulent. Offering and of noncriminal origin” and are free of “liens or
such programs, or claiming to be able to introduce encumbrances” for a certain time frame are used
investors to persons who have access to such pro- frequently to perpetrate fraud schemes. These letters
grams, violates numerous federal laws, including have no use within legitimate banking circles.
criminal laws. Some phrases are seen commonly in documents
It is illegal to engage in fraud in the offer or sale presented by fraudsters in the course of marketing
of a security. Under most circumstances, it is also fraudulent investment schemes. If one or more of these
illegal to sell securities that have not been registered phrases appear in documentation, they should be treated
with the U.S. Securities and Exchange Commission. with suspicion. These include, but are not limited to—
A security includes the following items: “note,” • noncircumvention, nondisclosure;
“stock,” “bond,” and “debenture,” as well as more • good, clean, clear, and of noncriminal origin;
general terms, such as “investment contract” and “any
interest or instrument commonly known as a ‘secu- • blocked funds trading program;
rity.’” In the leading opinion, the U.S. Supreme Court • prime bank trading program;
held that the definition of a security includes an
investment contract, which is “a contract, transaction, • federal reserve approved;
or scheme whereby a person invests his money in a • roll programs;
common enterprise and is led to expect profits solely • irrevocable pay orders;
from the efforts of the promoter or third party....”
Designating such instruments as “loans” does not • prime bank notes, guarantees, letters of credit; and
alter their legal status as securities. • fresh cut paper.
The FBI, as well as other federal and state
agencies, have identified several characteristics The marketing of fraudulent investment schemes
common to fraudulent schemes. These characteristics violates federal criminal laws. In order to report
include— instances of suspected fraud, please contact Special
• claims that investor funds can be placed in a bank Agent John M. Cauthen, FBI, Sacramento, California
account, and then used, without risk, to trade Division, telephone 916-481-9110 or any of the
bank debentures, or other financial instruments; sources listed below.
• claims that invested funds can be used to lease or
Sources that can corroborate the above information
rent U.S. Department of the Treasury obligations
and then use these same leased securities as include:
collateral for further trading programs; • U.S. Treasury Department, Comptroller of the
Currency, Enforcement and Compliance Division,
• claims that trading medium term notes (MTNs), 250 E Street, SW, Washington, DC 20219
prime bank notes, or any other bank instruments,
on a riskless basis, will yield above market • Securities and Exchange Commission, San
average returns; and Francisco District Office, 44 Montgomery Street,
Suite 1100, San Francisco, CA 94104, 415-
• claims that letters of credit or standby letters of
705-2500
credit can be traded for profits.
In general, investment programs that offer secret, • Bureau of Public Debt, Chief Counsels Office, 200
private investment markets, which offer above-market 3rd Street, Room G-15, Parkersburg, WV 26106
rates of return with below-market rates of risk for • Federal Reserve, Washington DC, Office of
privileged customers in Europe, are fraudulent. There General Counsel, 202-973-5021
are no “secret” markets in Europe, or in North

16 / FBI Law Enforcement Bulletin


received a large payment, this fact fact, understanding the investment Second, law enforcement
may prove useful. can prove impossible because of should interview the victims. Offi-
the amount of fictional information cers should obtain evidence of
Contacts with Investors involved. Investigators should not lulling statements made to victims,
When dealing with a large num- spend too much time trying to un- as well as declarations made by
ber of victims, sometimes the only derstand the meaning of all of the promoters about their past success
method of collecting information is financial jargon and, although in- with these programs.
mass mailing questionnaires.5 Any vestigators might think the invest- Most important, prior to begin-
communication with victims should ment sounds like it makes sense, no ning any steps, investigators should
remain open and honest. Often, vic- investments pay extraordinary re- contact the prosecutor, explain
tims of such schemes do not trust turns without risk. the case and strategy, and keep
investigators who, they think, might the prosecutor informed throughout
ruin their investment opportunity. the investigation. Chances for a


When writing to victims, investiga- successful prosecution of the case
tors should provide all of the infor- increase if a prosecutor works
mation that they have about the in- Chances for on the case early in the investiga-
vestigation. Promoters deliberately a successful tion. If law enforcement waits until
might try to interfere with victims the end of the investigation to re-
by disseminating erroneous infor-
prosecution of quest the prosecutor’s help, con-
mation. Being open and candid with the case increase tinuing with a civil case may be the
investors may convince them to co- if a prosecutor only response.
operate early. To avoid any subse- works on the case
quent allegations by the defense, in- early in the Endnotes
vestigators should include language investigation. 1
Kim Clark, “Pumping the Prime: ‘Prime
advising that defendants are pre- Bank’ Schemes are Back and Targeting the


sumed innocent. If investors still re- Middle Class,” U.S. News and World Report,
main in contact with promoters, any March 15, 1999.
2
An investment swindle in which some
evidence of statements made by the early investors are paid off with money put up
promoter to the investor (known as by later ones in order to encourage more and
“lulling” statements) will prove CONCLUSION bigger risks. Merriam-Webster’s Collegiate
useful, particularly if promoters By using innovative investiga- Dictionary, 10th ed. (1996), s.v. “Ponzi
tive techniques and following cer- scheme.”
make them after investigators al- 3
U.S. vs. Sid Tweady, et al., Cr. S.-99-293
ready have contacted the promoters tain steps in the investigation, law DFL (E. D. CA 2000) statements by Judge
and warned them about the true na- enforcement can prosecute fraudu- David Levi.
ture of these schemes. lent investment schemes success- 4
Investigators can obtain this information
fully. First, investigators should in- sheet, created by the FBI and the Sacramento
Contact with Prosecutors U.S. Attorney’s Office, by contacting either of
terview promoters, obtain a history these offices. A copy of the sheet also is
These types of cases can be- of their past involvement with these provided with this article.
come inherently complex. Investi- schemes, and warn them that these 5
The questionnaire consists of a cover letter
gators should present the case to types of investments are fraudulent. explaining the nature of the investigation, the
status of the prosecution, and any information
prosecutors first, then conduct the Additionally, investigators should known about the disposition of the money. It
investigation. Also, investigators obtain evidence of previous scams consists of questions such as: “What promises
always should remember that through interviews, search war- were made? What was the promised return?
the goal is to prove intent to de- rants, and bank records and search What was the risk? Who made the promises?
What is the promoter telling you now?” Also,
fraud, not understanding how the for evidence that promoters knew the questionnaire includes a copy of the
investment should have worked. In that the program would not work. Information Sheet.

May 2001 / 17
Book Review

Police Trauma: Psychological Aftermath violence and coping and recovery successes. Also
of Civilian Combat edited by John M. Violanti in this section, the authors analyze and present
and Douglas Paton, Charles C. Thomas, LTD., organizational activities that contribute to the
Springfield, Illinois, 1999. incident commander’s emotional recovery from
Police Trauma offers comprehensive research violence and trauma.
for all law enforcement psychologists and con- Police Trauma reviews a successful military
sulting clinical psychologists by providing the model and its application to law enforcement
conditions and precipitants of trauma stress operations based on the organizational similarities
among law enforcement. Police executives, of chain of command, training, leadership,
incident commanders, line officers, policy response, and commitment to control violence
writers, and law enforcement family members resulting in trauma aftermath. The military model
also will find this book beneficial. Police Trauma contained three prevention phases: a primary
may help prevent or minimize trauma stress by phase, concerning prior preparation and training
providing information on how to better deal with for trauma-type incidents; a secondary phase
traumatic experiences and establish an improved focusing on the participants during and immedi-
support system for officers. ately after a traumatic event; and the last phase
The topics discussed in this book suggest addressing considerations in limiting long-term
future policy and procedures for the concep- effects of trauma and how to properly prepare,
tualization, intervention, recovery, and immediate respond, and recover through a shared and well-
and extended treatment of psychological trauma documented after-action report.
in policing. Also covered are suggestions for both Police Trauma provides a tremendous
department and officer self-assessment. research effort on trauma by experts directly
The authors have grouped the chapters of the connected to the field of law enforcement and
book into three sections: conceptual and method- serves as an invaluable asset for all levels and
ological issues, special police groups, and recov- jurisdiction of the law enforcement community,
ery and treatment. Police Trauma begins with a including those in private industry. It presents
thorough assessment of the understanding of an understanding of why police respond to trauma
psychological trauma involving duty-related, the way they do and how they can recover
patrol-response trauma. The book offers an successfully.
assessment test, which includes 66 character- The authors have gathered information on
istics to help officers understand overall risks to trauma research from professionals associated
themselves and others, and offers guidance on with law enforcement. These contributions
how to analyze the test results for a better under- provide the reader with different perspectives
standing of how trauma can affect officers. This on police trauma and its aftermath and identify
chapter also introduces a police compassion what is known, as well as what is not known, on
fatigue model in which authors describe the this complex issue. Police Trauma serves as an
relationship between an officer’s psychological excellent resource for those individuals managing
trauma, how they cope with the trauma, and their law enforcement psychological stress and trauma.
role in the department and personal family after
exposure. Reviewed by
In another section, Police Trauma assesses Larry R. Moore
police groups, such as the South African Police’s Certified Emergency Manager
exposure to violence. Response members of International Association
high-profile incidents also were assessed for post- of Emergency Managers
intervention strategies concerning exposure to the Knoxville, Tennessee

18 / FBI Law Enforcement Bulletin


Enterprise Theory
of Investigation
By RICHARD A. MCFEELY

A lthough the media fre- The ETI has become the stan- furtherance of the criminal enter-
quently focuses on the con- dard investigative model that the prise itself. In other words, indi-
viction of the leaders of FBI employs in conducting investi- viduals commit criminal acts solely
major criminal enterprises, such as gations against major criminal or- to benefit their criminal enterprise.
the Gambino crime family, the ganizations. The successful pros- By applying the ETI with favorable
Colombian Cali Cartel, or the Sicil- ecutions of major crime bosses state and federal legislation, law en-
ian Mafia, dozens of lesser-known serve as direct testaments to the forcement can target and dismantle
individuals belonging to the same benefits of this model. Unlike entire criminal enterprises in one
criminal organization also often re- traditional investigative theory, criminal indictment.
ceive long prison sentences. Those which relies on law enforcement’s
who escaped prosecution or served ability to react to a previously com- Applying the ETI
their sentence may return to find the mitted crime, the ETI encourages a By restructuring both their in-
criminal enterprise to which they proactive attack on the structure of vestigative resources and theory,
once belonged extinct due to a pow- the criminal enterprise. Rather than many law enforcement agencies can
erful tool in the law enforcement viewing criminal acts as isolated use this model. Initially, some po-
arsenal—the Enterprise Theory of crimes, the ETI attempts to show lice agencies may hold a skeptical
Investigation (ETI). that individuals commit crimes in view of the use of the ETI because

May 2001 / 19
its application requires an increased rely on numerous criminal acts to criminal groups have a pyramidal
time commitment, which may affect support their existence and often hierarchy structure where the
case-closure rates and also because divide the responsibility for com- lower levels, consisting of more
they may perceive the ETI as more mitting these acts among their people, conduct the majority of
complex than traditional investiga- members and crews. The ETI capi- the enterprise’s criminal activities.
tive models. However, the advan- talizes on this diversity by analyz- Therefore, working a case “up the
tages of the ETI easily outweigh ing the enterprise’s full range of chain” proves beneficial because it
these presumed disadvantages, criminal activities, determining starts the investigation at the level
primarily because the ETI pro- which components allow the crimi- where most investigative opportu-
vides a highly effective method of nal enterprise to operate and ex- nities exist.
targeting and dismantling criminal ploiting identified vulnerable areas
enterprises. within each component. For in- Defining an Enterprise
To recognize the value of the stance, to accomplish their profit What defines a criminal enter-
ETI, investigators must accept sev- objectives, major drug trafficking prise? Do two bank robbers com-
eral main premises. First, while organizations must establish four mitting serial robberies fall within
some major organized criminal separate subsystems within their or- the definition? How about employ-
groups commit crimes to support ganization—narcotics transporta- ees of a government contractor en-
idealistic views, financial profit tion and distribution, financial, and gaged in systematic bid-rigging?
remains the underlying motive for communication. The ETI identifies Although these criminal groups
most criminal enterprises. and then targets each of these areas might have a loose-knit organiza-
Next, major organized criminal simultaneously, especially those tional structure, application of the
groups typically engage in a broad components viewed as the most vul- ETI probably would not prove ben-
range of criminal activities to nerable. The more diverse the eficial in these instances.
achieve this profit goal. While the criminal enterprise, the more poten- The FBI defines a criminal
nexus of these violations may be tial for exploitation due to the exist- organization as a group of individu-
closely interrelated (e.g., drug traf- ence of these types of subsystems. als with an identified hierarchy en-
ficking and money laundering), ma- A final premise of the ETI gaged in significant criminal activ-
jor criminal enterprises historically maintains that major organized ity. These organizations often
engage in a broad range of crim-
inal activities and have extensive
supporting networks. Generally, the
ETI only proves effective when the


organization engages in a myriad of
criminal activities. In the case of the
By restructuring both bank robbers, federal and state rob-
their investigative bery laws sufficiently address this
resources and group’s single-purpose criminal ac-
tivity. However, if the bank robbers
theory, many law begin to diversify by stealing cars
enforcement and guns to support their robberies,
agencies can use the ETI now offers advantages that
[the ETI] model. traditional methods of investigation
do not. The ETI supports the notion

Special Agent McFeely serves in the


FBI’s Washington, DC, field office. ” that the gang’s new found diversity
allows law enforcement more
investigative opportunities by

20 / FBI Law Enforcement Bulletin


exploiting the most vulnerable area often uses historical information to While larger police agencies of-
of their criminal activities. For ex- prove this element. ten use highly trained and special-
ample, introducing an undercover ized analytical support teams to as-
officer into a close-knit gang to ob- Determining the Scope of the sist with case analysis, those police
tain their robbery preparations may Enterprise’s Criminal Activities agencies without this resource
be practical. However, if the gang Once investigators confidently should not skip this important step.
advances to criminal violations that believe that an enterprise does exist, Investigators can create simple time
require assistance from someone the next step involves determining lines that chart significant historical
outside the gang, a department the scope of its illicit activities. This events based on previous intelli-
could expand its investigative op- step proves important because it gence. In doing so, they can help
portunities and use an undercover will help define the investigative reveal patterns of criminal activity
officer to provide stolen vehicles. strategy. and possibly predict future trends.3
Most state and federal general The investigative strategy that man-
conspiracy laws define a criminal agers develop should anticipate the


conspiracy as two or more individu- steps needed to counter these future
als. The federal Continuing Crimi- trends, which remains the essence
nal Enterprise statute,1 applicable to ...with the [ETI], of the proactive nature of the ETI.
major drug conspiracies, requires the larger the While traditional investigative
that the individual charged led five enterprise...the theory targets individual criminals,
or more individuals while the fed- more investigative the ETI can show they commit
eral Racketeering Influenced Cor- seemingly isolated crimes to benefit
rupt Organizations (RICO) statute
opportunities it an entire criminal enterprise. The
requires only two or more individu- provides for law selection of favorable legislation,
als to comprise a criminal enter- enforcement. from simple state conspiracy laws
prise.2 Law enforcement managers to the more complex federal rack-


must decide which statutes to use eteering laws, will round out the
when they form the investigative investigative strategy by focusing
strategy to direct the evidence col- the prosecution not only on the indi-
lection toward meeting the legal re- Investigators always treasure vidual committing a crime but the
quirements of each statute. This any new intelligence regarding an leaders who order or benefit from it.
type of advance decision making enterprise’s current activities; how-
supports the proactive nature of the ever, investigations can still Developing an
ETI. progress with older information. Investigative Strategy
Using the criminal statutes as For example, a review of past inves- Both historical and real-time
guidance, the investigation should tigations, prosecutions, and crimi- evaluation helps form the investiga-
focus continually on an essential nal histories of suspected members, tive strategy. Because investigators
part of the indictment—proving and even open-source information should base this strategy on per-
who belongs to the criminal enter- (e.g., newspaper accounts) can as- ceived weaknesses within the enter-
prise. Obviously, law enforcement sist in this process. The task force prise, they must conduct a thorough
can use traditional investigative concept allows instant multiagency evaluation of the enterprise’s activi-
techniques, such as physical sur- searches of historical records and ties. The investigators should ob-
veillance, to show criminal associa- indices. In fact, during this stage, tain enough information to analyze
tions. However, the act of showing agencies can piece together infor- to gain a basic understanding of the
criminal associations does not nec- mation that they might have, but extent of the enterprise’s criminal
essarily involve proactive evidence just could not link to the actions of a activities. Investigators should ex-
collection against the subjects and criminal enterprise. amine the full range of these illicit

May 2001 / 21
S howing criminal associations does not necessarily
involve proactive evidence collection against the sub-
jects and often uses historical information to prove this
the investigation “up the chain.” At
this point, the use of innovative and
more sophisticated investigative
element. Consider the following successful examples that techniques becomes invaluable be-
focus on the members of criminal enterprises: cause proving a case against the
leader of a major criminal organi-
• A recent FBI investigation initially used gang graffiti to zation typically is more difficult
not only determine membership in the gang (enterprise), than convicting a “player” of the
but to show its area of influence. Investigators also can organization. For example, defer-
use gang colors, clothing, and hand signals in this manner. ring prosecution of low-level bur-
• Agencies can use intercepted telephone conversations, glars in favor of cooperation or
call-detail records, and pen registers to show associations. a court-authorized wiretap of the
• Officers executing warrants or processing prisoners ring leader’s telephone might sup-
should not overlook the more mundane collection of port a hierarchical attack on the
documentary evidence that can prove useful in showing enterprise.
associations. Some examples could include pagers and Additionally, financial profit
cellular telephones with stored numbers, or address books remains one of the main goals of
or scraps of paper with names and telephone numbers. most criminal enterprises. Virtually
Standard post-seizure practice should involve electroni- every major criminal organization
cally capturing this type of information for later link uses a system to reward its members
analysis. through monetary means. Often-
times, successfully dismantling an
• Officers should include accomplice information when organization relies solely on the
compiling a subject’s biographical file, such as other ability of law enforcement to dis-
individuals arrested and the location of the subjects rupt this financial component. Re-
(i.e., whose house or car) when the arrest took place. moval of a criminal enterprise’s fi-
This information proves valuable in showing past nancial base usually disables the
criminal relationships. organization to a point where they
cannot recover. This occurs be-
cause even the lowest members of
the organization require prompt
payment for their actions. Remov-
activities, separate them into com- “fence” against the ring’s efforts to ing the ability of an enterprise to
ponents, and draw an investigative resell the stolen property. A finan- make payments generally takes
strategy that attacks each compo- cial investigator could track pur- away the incentive for those doing
nent separately, yet simultaneously. chases and asset acquisition of each the work to continue. Although the
For example, a large and so- individual. As the case progresses, enterprise can fill some positions of
phisticated burglary ring must have investigators can shift additional re- those incarcerated members
some form of each of the following sources to the enterprise’s most vul- through upward attrition, only a few
components in place: methods of nerable areas. Because the ETI ulti- trusted members of a criminal orga-
theft, resale of the stolen goods, and mately attempts to indict and nization generally handle methods
concealment of their illicit pro- convict all the members of an enter- of dividing, shielding, and account-
ceeds. Police can use a surveillance prise, especially within the leader- ing for the profits. Successfully in-
team to try to catch the actual bur- ship ranks, the investigative strat- carcerating those in such a position
glars and, at the same time, use un- egy needs to address how each of trust can result in large voids
dercover officers to pose as a investigative method will advance within the criminal organization.

22 / FBI Law Enforcement Bulletin


By creating chaos and uncertainty which may conflict with those de- very few of these agencies employ a
within the financial component of partments that gauge their effec- criminal tax investigator who spe-
the enterprise, members quickly tiveness on raw arrest data and, cializes in tracking international
look elsewhere for “employment” therefore, might not delay arresting money transfers. Thus, getting an
and financial rewards. individuals once sufficient evi- Internal Revenue Service special
Attacking the flow of money dence exists. agent involved in the investigation
has become the norm in major fed- not only adds another individual to
eral organized crime and drug traf- Using a Task Force assist with general investigations,
ficking investigations. Strategic use The use of a joint task force but adds an individual who can pro-
of asset forfeiture and money laun- remains a necessity in the success- vide an area of expertise that the
dering statutes removes not only the ful application of the ETI. Any law task force might otherwise lack.
illegal proceeds (e.g., cars, houses, enforcement officer who ever Many federal task forces em-
and jewelry), but, more important, served on a multiagency task force ploy a wide range of individuals,
it disables the systems that the en- recognizes the strength that com- including nonsworn personnel, with
terprise has put into place to accom- bined resources provide in achiev- specialized skills not usually found
plish its profit goal. Some examples ing objectives. Immediate benefits in the law enforcement realm. De-
include fraudulent bank accounts partments can retain bank examin-
used to shield illicit income and ers, accountants, and securities ex-


property used to facilitate the crimi- perts as either consultants or as an
nal activity, such as “legitimate” actual member of the task force.
businesses. The use of a joint Many federal agencies invest con-
The plan should remain aggres- siderable effort in developing a
sive, yet workable. For instance,
task force remains class of nonsworn professionals,
case managers may not include tar- a necessity in ranging from investigative assis-
geting the head of the criminal en- the successful tants to more specialized positions
terprise in the initial plan, but the application of the ETI. that employ an expertise in areas
investigative strategy should define not typically found in the realm of


the steps on how to achieve this sworn personnel (e.g., link analysis,
objective. chart preparations, and legal
Investigators should interface research).
with prosecutors as early as pos- include additional staff, access to Because police agencies have
sible in the case. Because the inves- more technical and investigative differing missions and methods of
tigative strategy essentially remains equipment (e.g., different sets of measuring success, the most
a start-to-finish blueprint for the surveillance vehicles), and the pool- important part of the task force for-
case, investigators must know from ing of financial resources for items, mation involves complete agree-
the outset which elements of the such as payment of informants ment by the participating agencies
criminal statutes they must prove and purchase of evidence. Another regarding the objectives and goals
and then tailor the investigative major advantage that directly sup- of the investigation and what rules
plan accordingly. ports the ETI model is that different the task force will follow. Addition-
Finally, case managers should police agencies bring the potential ally, the participating agencies
postpone any actions that might ex- to expand jurisdiction and expertise should complete a memorandum of
pose the scope of the investigation into all of the areas that a criminal understanding that addresses ques-
until completion of the covert enterprise engages. For example, tions, such as the following:
phase. This remains important be- while virtually every state and local • Which agency will maintain
cause opportunities to arrest sub- police agency has counterdrug en- responsibility for the overall
jects increase as the case proceeds, forcement as part of its mission, investigation?

May 2001 / 23
• Are the lead agency’s rules • Will each agency accept personnel, time, and resources.
acceptable to the other par- liability for the actions of Task force supervisors should con-
ticipating agencies? their assigned personnel? sider assignments depending on the
• Will the case be prosecuted • Will the state investigators outline of the investigative strategy
in the state or federal courts? need to be deputized or and the areas within the enterprise
vice versa? that remain vulnerable for exploita-
• Will each participating agency tion, along with the area of each
use their own forms or will the • Will the agencies divide officer’s expertise and experience.
task force adopt one standard the forfeiture share equally, Investigators should use both tradi-
format for investigative regardless of the level of tional and sophisticated investiga-
reports? participation (e.g., one part- tive techniques to receive optimal
• Who will maintain seized time officer versus three results. However, regardless of the
evidence? full-time officers)? original plan, the task force must
• Will each agency agree to adapt and shift investigatory re-
Implementing an Attack sources as the case develops. For
delay arrests and seizures
if it may jeopardize the In this stage, task force mem- example, if the task force obtains a
investigation? bers follow the previously devel- wire tap order to penetrate a crimi-
oped investigative strategy and nal enterprise’s methods of commu-
• How much funding (including merge traditional methods of evi- nications, case managers must con-
overtime) will each agency dence collection with investigative sider temporarily reassigning
contribute to the investigation? methods developed specifically to peronnel to meet the high resource
• Whose procurement rules will attack the identified component of requirements of operating wire
the task force follow to acquire the criminal enterprise. This often taps.
equipment and supplies? involves the largest commitment of Careful coordination with pros-
ecutors as the case develops ensures
that all members of the criminal en-
terprise receive indictments and
An Example of the Enterprise that the enterprise’s established
Theory of Investigation criminal subsystems become per-
manently dismantled.
I n a city plagued with chronic drive-by shootings, tradi-
tional investigative methods may focus on each shooting
as an isolated incident. However, a task force suspecting gang
Conclusion
Oftentimes, larger criminal
involvement can develop a time line that shows that each time enterprises prove problematic
a member of a street gang was incarcerated, an increase in for agencies to dissolve using
shootings against rival gang members occurred. Using this traditional investigative methods.
analysis and adopting an enterprise investigative theory, the However, with the enterprise theory
task force can gather “traditional” evidence against the indi- of investigation, the larger the en-
vidual shooters and focus on developing evidence that shows terprise and the more diverse its
the shootings as more than just random acts. At trial, the illegal activities, the more investi-
prosecutors can use the investigative efforts to show that gang gative opportunities it provides for
leaders ordered the shootings to defend a perceived gap in law enforcement.
their turf as a result of the incarceration factor and, therefore, Because the use of conspiracy
prosecute not only the shooters but the gang leaders as well. or criminal enterprise statutes form
the baseline from which agencies

24 / FBI Law Enforcement Bulletin


develop their investigative strate- activity to benefit the enterprise as a whether they actually committed
gies, the ETI requires that depart- whole. By using favorable statutes the crime.
ments expand the traditional mod- along with a carefully laid out,
els of evidence collection. While multipronged attack on each estab- Endnotes
these traditional models generally lished component that a criminal 1
18 U.S.C. § 1961 et. seq.
only attempt to identify individuals enterprise uses to conduct its ille- 2
21 U.S.C. § 848.
3
and the crimes they commit, the ETI gal business, investigators can ex- For additional information on the use of
time lines in investigations, see Craig Meyer
requires that investigators broaden pand criminal culpability for a and Gary Morgan, “Investigative Uses of
evidence collection to show that an single criminal act to all members Computers: Analytical Time Lines,” FBI Law
individual conducted the criminal of the enterprise, regardless of Enforcement Bulletin, August 2000, 1-5.

The Bulletin’s
E-mail Address

T he FBI Law Enforcement Bulletin staff invites


you to communicate with us via e-mail. Our
Internet address is leb@fbiacademy.edu.
We would like to know your thoughts on
contemporary law enforcement issues. We
welcome your comments, questions, and
suggestions regarding the magazine.
Please include your name, title, and
agency on all e-mail messages.
Also, the Bulletin is available
for viewing or downloading on a
number of computer services,
as well as the FBI’s home page.
The home page address is
http://www.fbi.gov.

May 2001 / 25
Legal Digest

Law Enforcement Physical


Fitness Standards and Title VII
By MICHAEL E. BROOKS, J.D.
© Mark C. Ide

hen deciding to establish procedures that either expressly or discrimination results in the loss of

W physical fitness stan-


dards for potential or
onboard law enforcement employ-
ees, law enforcement administra-
effectively discriminate against
specified categories of individuals
except under limited circumstances.
an employment benefit. Virtually
all employment actions fall under
the purview of Title VII. The U.S.
Supreme Court has ruled that Title
tors must be cognizant of the re- Background VII prohibits not only express dis-
quirements imposed by Title VII of The Civil Rights Act of 1964 crimination (disparate treatment)
the Civil Rights Act of 19641 and by prohibits various forms of discrimi- but also prohibits neutral employ-
the Civil Rights Act of 1991.2 This nation based on race, color, sex, na- ment actions that have the effect of
federal legislation requires that all tional origin, or religion. Title VII discriminating against a particular
employers of more than 15 employ- of this act prohibits such discrimi- group protected by the act (dispar-
ees must refrain from policies and nation in the workplace when the ate impact).3 The Civil Rights Act

26 / FBI Law Enforcement Bulletin


of 1991 established burdens of
proof and other procedural require-
ments in litigating a Title VII ac-
tion. As a result of this legislation,
the only defense an employer has
“ Virtually all
employment
actions fall under
when a facially neutral employment
standard effectively discriminates
the purview
against a protected group is to prove of Title VII.
that the standard is “job related for


the position in question and consis-
tent with business necessity.”4
How do these laws apply in the Special Agent Brooks is a legal
area of physical fitness standards? instructor at the FBI Academy.
They apply when a physical fitness
standard limits the employment
rights of a group protected by Title
VII. Most notably, they apply when police officers. Dr. Davis con- while an average of 12 percent of
a particular physical fitness stan- ducted extensive studies to deter- female applicants met the standard.
dard has a disparate impact on mine what physical abilities are re- SEPTA also began a physical fit-
women when compared to how the quired for a SEPTA police officer.5 ness test of incumbent officers,
same standard affects men. An on- Dr. Davis determined that SEPTA which included an aerobic capacity
going case from Pennsylvania dem- officers often are called upon to run test. Because of a grievance filed
onstrates the impact of these laws. various distances in the perfor- by their police union, SEPTA
mance of their duties. He further stopped disciplining officers who
Lanning v. Southeastern determined that a specific aerobic failed the test shortly after institut-
Pennsylvania Transportation capacity was necessary for an of- ing it. Instead, the agency rewarded
Authority ficer to adequately perform the those officers who met the fitness
In 1991, as a part of an effort to physical requirements of a SEPTA standards.7
upgrade its 234-officer police force, officer. After determining that this In 1997, five women who had
the Southeastern Pennsylvania aerobic capacity would have a, been rejected by SEPTA because of
Transportation Authority (SEPTA), “...draconian effect on women ap- their inability to meet the 1.5 miles
which operates a commuter rail sys- plicants,” Dr. Davis decided that a run in 12 minutes standard filed a
tem in Philadelphia and its suburbs, slightly lower aerobic capacity Title VII class action lawsuit on be-
instituted a series of physical fitness would meet the goals of SEPTA in half of all women who applied to
requirements for both onboard and improving the physical abilities of SEPTA in 1993 and 1996 and were
potential police officers. Among its police officers, as well as their rejected for this reason, as well as
these was a requirement that appli- job performance. Dr. Davis advised on behalf of all future women who
cants run 1.5 miles in 12 minutes. SEPTA that applicants who could would be similarly rejected. The
Failure to meet this standard dis- run 1.5 miles in 12 minutes would U.S. Department of Justice, after
qualified an applicant from employ- possess this slightly lower aerobic investigating SEPTA’s employ-
ment as a police officer. Prior to capacity.6 ment practices under Title VII,
instituting this standard, SEPTA During the years 1991, 1993, joined the lawsuit in opposition to
contracted with a noted exercise and 1996, almost 60 percent of male the standard. In 1998, the U.S. Dis-
physiologist, Dr. Paul Davis, to de- applicants to the SEPTA police met trict Court for the Eastern District
velop a physical fitness test for its the 1.5 miles in 12 minutes standard of Pennsylvania entered judgment

May 2001 / 27
for SEPTA after hearing evidence manifest relationship to the em- SEPTA appealed the Third Cir-
that included SEPTA studies show- ployment in question.”11 The Third cuit ruling to the U.S. Supreme
ing that there was a statistically high Circuit ruled that this means that Court, but that Court refused to hear
correlation between high aerobic any such standard must measure a the case.14 The case was then sent
capacity and arrests and commen- minimally necessary skill to per- back to the District Court for the
dations among SEPTA officers and form the job. purpose of determining if the 1.5
also that officers with the aerobic The Third Circuit also rejected miles run in 12 minutes standard
capacity approved by Dr. Davis an argument that the employer’s was minimally necessary to demon-
were better able to perform physical burden to justify a standard that strate the ability to perform the job
tasks after running for 3 minutes causes a disparate impact on a pro- of a SEPTA police officer.
than were officers without that tected group is lessened when the On December 7, 2000, the Dis-
aerobic capacity. The District Court job involves public safety.12 The trict Court ruled that the SEPTA
ruled that SEPTA had established court reasoned that had Congress standard does measure a minimum
that the aerobic capacity standard intended such a distinction for pub- characteristic (the specific aerobic
was job related and consistent with lic safety jobs, it would have codi- capacity) necessary to perform the
business necessity and that there fied it with the 1991 act. The dissent duties of a SEPTA police officer.15
was a “manifest relationship of noted that several other circuits had The District Court exhaustively re-
aerobic capacity to the critical and recognized that public safety is a viewed all of the evidence pre-
important duties of a SEPTA of- consideration in determining what sented during the original 1998 trial
ficer.”8 The women and the United and concluded that, “meeting
States appealed to the U.S. Court of SEPTA’s aerobic capacity standard


Appeals, Third Circuit. is clearly the minimum required to
The Third Circuit ruled that the perform the critical tasks of the job
lower federal court had erred be- such as pursuits, officer backups,
cause it did not find that the 1.5 ...the plaintiff must officer assists, and arrests. Any
miles run in 12 minutes standard show that a facially lesser requirement simply would
was a “minimum qualification nec- neutral standard not satisfy the minimum qualifica-
essary for the successful perfor- results in a tions for the job of SEPTA transit
mance of the job in question.”9 The ‘significantly police officer and would endanger
Circuit Court reviewed U.S. Su- the public and undermine deter-
preme Court case law and the Civil discriminatory rence of crime and apprehension of
Rights Act of 1991 to conclude that pattern.’ criminals.”16
Congress intended to reject the Su-


preme Court’s interpretation of Discussion
Title VII in a 1989 case when it The law enforcement adminis-
ruled that in disparate impact cases trator should remember that Title
an employer can prevail if the stan- is a business necessity justifying a VII is statutory, not constitutional,
dard significantly serves a legiti- disparate impact.13 However, with law. The Supreme Court has ruled
mate employment goal.10 Congress, the exception of cases from the 8th, that for a governmental entity (the
in passing the 1991 law, instead re- 10th, and 11th Circuits, all of theses only type of entity restricted by the
instated an earlier Supreme Court cases predate the 1991 act, which constitution) to discriminate under
interpretation of Title VII that had contained the language relied upon the equal protection clause of the
held that in such circumstances the by the majority of the Third Circuit Fourteenth Amendment, a plaintiff
employer only prevails by showing in ruling that there can be no special must prove an intent to discrimi-
that the standard is “consistent with consideration of the public safety nate.17 Title VII contains no such
business necessity” and “bears a nature of the job. requirement. As a federal statute,

28 / FBI Law Enforcement Bulletin


it is subject to judicial interpreta- goals of the employer.” 19 Congress, binding on federal courts interpret-
tion and to revision by Congress. Of therefore, not only shifted the bur- ing federal legislation. However,
course, any revisions also are sub- den of proving the necessity of such courts will consider these guide-
ject to judicial interpretation. Many a standard to the employer, they ar- lines in ruling on Title VII issues.
of the Title VII standards never guably increased the standard by re- The EEOC has provided that a se-
have been interpreted by the Su- quiring “business necessity” in- lection procedure that results in a
preme Court. Even when they have stead of “significantly serving a protected group’s selection rate of
been defined, the federal circuit legitimate employment goal.” An less than 80 percent of the group
courts have differed on what these employer could certainly argue that with the greatest success will
definitions mean. This presents ad- a requirement, although not abso- be considered to have resulted in a
ministrators with the burden of in- lutely required to meet a legitimate disparate impact.21 While this is a
suring that judicial interpretations employment goal, still could sig- significant issue in most Title VII
and legislative revisions are moni- nificantly serve that employment litigations, it usually does not be-
tored continuously. What passes goal. Congress has precluded that come an issue in challenges to
muster today may be in violation of argument. physical fitness standards. In the
the statute tomorrow. Also, what Lanning case, for example, SEPTA
one court says is permissible may conceded that the 1.5 miles run in
not be controlling law in another 12 minutes standard had a disparate
jurisdiction. impact on women.22 Commentators
Physical fitness standards are have concluded that most physical
only subject to scrutiny under Title fitness tests legally will have a dis-
VII when they either expressly dis- parate impact on women due to the
criminate against a Title VII pro- inherent physical differences be-
tected group or, more commonly, tween the sexes.23
when they have the effect of dis- Where a physical fitness stan-
criminating against such a protected dard has a disparate impact on
group. Where there is no express women, the concern of the law en-
discrimination, a plaintiff has the forcement administrator then be-
burden of proving to a court that the comes how to successfully justify
physical fitness standard has the ef- the physical fitness standard under
fect of discriminating against a pro- the statutory requirement. How-
tected group. Once such a showing ever, the Supreme Court has never
is made, the employer has the bur- How does a plaintiff prove that ruled what “job related for the posi-
den “to demonstrate that the chal- a physical fitness standard has a dis- tion in question and consistent with
lenged practice is job related for the parate impact? The Supreme Court business necessity” means. As pre-
position in question and consistent has ruled that the plaintiff must viously mentioned, the Third Cir-
with business necessity.”18 As pre- show that a facially neutral standard cuit ruled in the Lanning case that
viously stated, this provision was results in a “significantly discrimi- this provision requires that an em-
added in the Civil Rights Act of natory pattern.”20 The Equal Em- ployer must show that the standard
1991 after the Supreme Court had ployment Opportunity Commission is a “minimum qualification neces-
ruled that the plaintiff, not the em- (EEOC) is a federal agency charged sary for the successful performance
ployer, has the burden of showing with promulgating federal regula- of the job in question.” Other cir-
that a challenged standard both has tions to implement Title VII and cuits have not been so restrictive.
a disparate impact and that the stan- other federal antidiscrimination For example, the Eleventh Circuit
dard does not “serve in a significant legislation. These regulations do has ruled that an employer meets
way, the legitimate employment not have the force of law and are not the statutory standard of business

May 2001 / 29
necessity by showing “...that the court noted the significant threat to is a physically demanding job and
practice or action is necessary to public safety that resulted from expect a court to uphold a physical
meeting a goal that, as a matter of these lost arrests in the transit sys- standard that has a disparate impact
law, qualifies as an important busi- tem.28 The court also noted numer- on women. In Lanning, the SEPTA
ness goal.”24 The EEOC has stated ous SEPTA studies that showed Police Department has been forced
that a selection policy that has a that individuals who could meet the to conduct at least seven studies jus-
discriminatory impact on members aerobic standard could perform the tifying the 1.5 miles in 12 minutes
of a Title VII protected classifica- specific job tasks of a transit police standard. These studies were all
tion is inconsistent with EEOC officer. These jobs included chas- conducted by outside experts, in-
guidelines unless the policy has ing criminal violators on foot, run- cluding physicians, physiologists,
been validated pursuant to the ning to a request for officer backups and statisticians and used both
guidelines.25 The guidelines then and assists, and subduing subjects SEPTA personnel and others as
list three means to validate such a subjects.31 The studies did not jus-
policy: criterion-related validity, tify law enforcement physical re-


content validity, and construct va- quirements in general but, instead,
lidity.26 Each of these means of vali- only justified the SEPTA standard
dation are defined in the guide- Disparate treatment, as it related to that one department.
lines. 27 All of these means of The latest District Court ruling
validation appear less restrictive
like disparate impact, noted repeatedly that the job re-
than the Third Circuit standard ex- is only permissible quirements of a SEPTA officer
pressed in Lanning. under the business were unique to that one department,
Of particular importance to the necessity justification. even to the exclusion of other tran-
law enforcement administrator at- sit agencies. For example, the stron-


tempting to justify a physical fitness gest justification of the SEPTA
requirement is whether the courts standard is the requirement that
will consider the public safety na- SEPTA officers be able to run from
ture of law enforcement work in es- after running distances up to 3 one station to another to back up
tablishing the business necessity of blocks.29 In its conclusions of law, another officer. The SEPTA studies
such a standard. While the Third the court held that these tasks are noted that their officers are required
Circuit in Lanning ruled that the the job of a SEPTA transit officer to do this on a monthly basis.32 Un-
public safety nature of a job will not and failure to be able to perform less another agency can produce
change the Title VII requirement of them compromises the safety of the similar statistical evidence, the like-
business necessity, there is no rea- officer, other officers, and the pub- lihood of justifying a similar physi-
son to believe that public safety lic at large. The court ruled that this cal standard under any business ne-
should not play a role in justifying a establishes that the aerobic capacity cessity requirement remains highly
physical fitness standard as a busi- is a minimum trait necessary to per- unlikely.
ness necessity. In the most recent form this job.30 Even if an agency successfully
Lanning District Court ruling, the Regardless of what standard of justifies a preemployment physical
court noted that SEPTA’s studies business necessity is applied, the standard under the business neces-
had shown that SEPTA officers, law enforcement administrator is sity requirement, what is the effect
who did not possess the aerobic ca- going to be required to show at least of not requiring onboard personnel
pacity established by Dr. Davis for a significant relationship between to meet the same standard? The
the applicants, had failed to make the physical fitness requirement and Third Circuit in the Lanning case
470 arrests during the study period the responsibilities of members of noted that SEPTA mistakenly had
due to their inability to physically their department. It is insufficient to hired a female officer in 1991 who
perform their job after running. The simply claim that law enforcement failed to meet the 1.5 miles in 12

30 / FBI Law Enforcement Bulletin


minutes standard. This officer later national origin.”35 Here, the chal- Endnotes
1
received several awards, was nomi- lenge would come from a male who 2
Title 42, USC § 703(a)(1).
Public Law 102-166, §§ 3(1), (3), and (4).
nated for “Officer of the Year,” and could not meet the male standard 3
Griggs v. Duke Power Co., 401 U.S. 424,
was selected as a defensive tactics but could meet the female standard. 431 (1971).
instructor. The court insinuated that Such an action amounts to express 4
Title 42, USC § 2000e-2(k)(1)(A)(i).
5
it found it difficult to understand disparate treatment of the male. These studies are detailed in the opinion
of Lanning v. Southeastern Pennsylvania
how the 1.5 miles in 12 minutes Disparate treatment, like disparate Transportation Authority 1998 WL 341605
standard is justified as a business impact, is only permissible under (E.D.Pa., 1998).
necessity if this officer is not only the business necessity justifica- 6
From the facts discussion Lanning v.
on the force but performing at a tion.36 The administrator who uses Southeastern Pennsylvania Transportation
Authority 181 F.3d 478, 481-82 (3rd Cir.,
high level.33 The District Court, in different physical selection stan- 1999)
its most recent ruling, rejected the dards for female applicants would, 7
Id. at 482-83.
plaintiff’s argument in this area by therefore, have to show what 8
Id. at 484.
9
simply noting that SEPTA is unable business necessity justifies such a 10
Id. at 491.
Wards Cove Packing Co. v. Antonio 490
to discipline onboard personnel practice. U.S. 642 (1989).
who fail to meet the standard due to 11
Griggs v. Duke Power Co. at 431-33.
its collective bargaining agree- 12
Lanning v. Southeastern Pennsylvania
ment.34 It remains to be seen if the Transportation Authority 181 F.3d 478, 490-91
footnote 16 (3rd Cir., 1999).
Third Circuit will accept this ratio- 13
Id., Justice Weis dissenting, at 499-500.
nale under its strict business neces- Among these circuits are the 9th (Harris v. Pan
sity standard. American World Airways 649 F.2d 670 (9th
A law enforcement administra- Cir., 1980)); the 5th (Davis v. City of Dallas
777 F.2d 205 (5th Cir., 1985)); the 6th (Zamlen
tor may decide to avoid these prob- v. City of Cleveland 906 F.2d 209 (6th Cir.,
lems by avoiding a disparate impact 1990); the 11th (Fitzpatrick v. City of Atlanta 2
on women. This can be accom- F.3d 1112 (11th Cir., 1993)); the 10th (York v.
plished by simply setting physical American Telephone and Telegraph 95 F.3d
948 (10th Cir., 1996) and the 8th (Smith v. City
standards so low that few will fail. of Des Moines 99 F.3d 1466 (8th Cir., 1996)).
However, such a course will not ac- 14
Southeastern Pennsylvania Transporta-
complish much, if anything, for an tion Authority v. Lanning 528 U.S. 1131
administrator trying to improve an (2000).
15
Lanning v. Southeastern Pennsylvania
organization. Another course is to Transportation Authority 2000 W.L. 1790125
set different standards for men and (E.D. Pa., 2000).
women in recognition of the differ- Conclusion 16
Id. at 25.
17
ences in physiology between the The law enforcement adminis- Washington v. Davis 426 U.S. 229, 238-
39 (1976). Where a literacy test for police was
sexes. However, such an approach trator who chooses to use physical challenged on equal protection grounds because
raises another federal statutory is- fitness standards must be pre- it had the effect of discriminating against
sue. When Congress enacted the pared to negotiate a veritable minority applicants.
18
Civil Rights Act of 1991, it in- minefield of legal issues when those 19
Title 42, USC § 2000e-2 (k)(1)(A)(i).
Wards Cove Packing v. Atonio 490 U.S.
cluded a provision stating, “It shall standards have the effect of dis- 642, 659 (1989).
be an unlawful employment criminating against a Title VII pro- 20
Dothard v. Rawlinson 433 U.S. 321, 329
practice...in connection with the se- tected class, such as women. As (1977).
21
lection or referral of applicants or has been demonstrated, even the 29 Code of Federal Regulations Section
1607.4 (D) (2000). For example, if 90 percent
candidates for employment or pro- most well-documented justifica- of men meet a physical fitness requirement, at
motion, to adjust the scores of, [or] tions may fail to meet the federal least 72 percent of women (80 percent of 90)
use different cutoff scores,...on the statutory requirements to which must meet the same requirement or a disparate
basis of race, color, religion, sex, or such standards are subject. impact is presumed.

May 2001 / 31
22
Lanning v. Southeastern Pennsylvania
Transportation Authority 181 F.3d 478, 485
(3rd Cir., 1999).
Wanted:
23
See David E. Hollar, Physical Ability Photographs
Tests and Title VII, 67 University of Chicago
Law Review 777, 784 (Summer, 2000).
24
Fitzpatrick v. City of Atlanta 2 F.3d 1112,
1118 (11th Cir., 1993). In this case, African-
American firefighters challenged a no-beard
rule as discriminatory under Title VII because it
had a disparate impact on them due to a higher
incidence of a physical condition among
African-American men that restricts their
ability to shave. The city successfully countered
by presenting proof that firefighters must be
clean shaven to successfully use a breathing
device when fighting fires.
25

26
29 CFR § 1607.3 (2000).
29 CFR § 1607.5 (2000).
T he Bulletin staff is
always on the lookout
for dynamic, law enforce-
27
29 CFR § 1607.16 (2000). Content
validity requires data showing that the content ment-related photos for
of a selection procedure is representative of possible publication in the
important aspects of performance on the job. magazine. We are interested
Construct validity requires data showing that in photos that visually depict
the selection procedure measures the degree to
which candidates have identifiable characteris- the many aspects of the law
tics that have been determined to be important enforcement profession and
for successful job performance. Criterion- illustrate the various tasks
related validity requires data showing that the law enforcement personnel
selection procedure is predictive or significantly
correlated with important elements of work perform.
behavior. We can use either black-
28
Lanning v. Southeastern Pennsylvania and-white glossy or color
Transportation Authority 2000 WL 1790125 prints or slides, although we
at pg. 10.
29
Id. at 11-16. prefer prints (5x7 or 8x10).
30
Id. at 24-25. Appropriate credit will be
31
Id. at 2-11. given to contributing photog-
32
Id. at 24. raphers when their work
33
Lanning v. Southeastern Pennsylvania
Transportation Authority 181 F.3d 478, 483 appears in the magazine. We
(3rd Cir. 1999). suggest that you send dupli-
34
Lanning v. Southeastern Pennsylvania cate, not original, prints as
Transportation Authority 2000 WL 1790125 we do not accept responsibil-
at 26.
35
Title 42, USC § 2000e-2(l). ity for prints that may be
36
29 CFR § 1607.11 (2000). damaged or lost. Send your
photographs to:
Law enforcement officers of other than
federal jurisdiction who are interested in Art Director, FBI Law
this article should consult their legal Enforcement Bulletin,
advisors. Some police procedures ruled
permissible under federal constitutional law FBI Academy, Madison
are of questionable legality under state law Building, Room 209,
or are not permitted at all. Quantico, VA 22135.

32 / FBI Law Enforcement Bulletin


The Bulletin Notes
Law enforcement officers are challenged daily in the performance of their duties; they face each
challenge freely and unselfishly while answering the call to duty. In certain instances, their actions
warrant special attention from their respective departments. The Bulletin also wants to recognize
their exemplary service to the law enforcement profession.

While on patrol in January 1999,


Officer Lou L. Williams of the Flagler
Beach, Florida, Police Department
received a call to respond to two sky-
divers in the ocean. When she arrived on
the scene, Officer Williams removed her
duty gear and entered the frigid water.
Risking hyperthermia, Officer Williams
swam through 4- to 6-foot waves and
strong riptides to reach the skydivers.
Officer Williams After bringing one skydiver to shore, Agent Martines
Officer Williams returned to the water to
rescue the remaining skydiver who was tangled in his parachute While off duty, Agent Rachael
and drowning. Eventually, Officer Williams was able to reach Martines of the state of Nevada’s
the second skydiver, cut the parachute away from him, and Gaming Control Board, came
safely return him to the shoreline. Officer Williams’ quick ac- across a traffic accident where
tion and continued efforts saved the lives of the two skydivers. the vehicle rolled over, and its
occupants were ejected. One of
the vehicle’s occupants, an 18-
month-old female, had eviscerated
organs and had stopped breathing.
On the evening of February 2, 1999, Agent Martines covered the
off-duty Officer Howard Smith of the exposed organs and immediately
Cheyenne, Wyoming, Police Department began CPR. She restored the
answered the door at his residence to child’s breathing and cared for
find several hysterical young females her until medical assistance
yelling that their house was on fire and arrived. Thanks to Agent Martines’
that their grandmother and younger valiant efforts, the child survived
sister were still inside the residence. with no permanent injuries.
Without hesitation, Officer Smith ran
to the dwelling
Officer Smith and entered the
smoke-filled Nominations for the Bulletin Notes should be based on either
house to locate the occupants. Officer the rescue of one or more citizens or arrest(s) made at unusual
Smith escorted the grandmother and risk to an officer’s safety. Submissions should include a short
carried the young child from the resi- write-up (maximum of 250 words), a separate photograph of
dence to safety. Although Officer Smith each nominee, and a letter from the department’s ranking officer
himself was treated for smoke inhala- endorsing the nomination. Submissions should be sent to the
tion, his selfless actions prevented more Editor, FBI Law Enforcement Bulletin, FBI Academy, Madison
serious or even life-threatening injuries Building, Room 209, Quantico, VA 22135.
to the grandmother and young child.
U.S. Department of Justice Periodicals
Federal Bureau of Investigation Postage and Fees Paid
Federal Bureau of Investigation
FBI Law Enforcement Bulletin ISSN 0014-5688
935 Pennsylvania Avenue, N.W.
Washington, DC 20535-0001

Official Business
Penalty for Private Use $300

Patch Call Subscribe Now

You might also like