Professional Documents
Culture Documents
Volume 70
Number 5
United States
Department of Justice
Federal Bureau of Investigation
Washington, DC 20535-0001
Louis J. Freeh
Director
Features
Contributors' opinions and statements
should not be considered an
endorsement by the FBI for any policy,
program, or service.
The Attorney General has determined Money Laundering Working together, law enforcement
that the publication of this periodical is
necessary in the transaction of the By William R. Schroeder 1 and financial institution administrators
and regulators can combat money
public business required by law. Use
of funds for printing this periodical has laundering.
been approved by the Director of the
Office of Management and Budget.
Investment Fraud Innovative investigative techniques
The FBI Law Enforcement Bulletin
(ISSN-0014-5688) is published
By John Cauthen 13 can help law enforcement officers
successfully prosecute fraudulent
monthly by the Federal Bureau of
Investigation, 935 Pennsylvania investment schemes.
Avenue, N.W., Washington, D.C.
20535-0001. Periodicals postage paid Enterprise Theory Law enforcement investigators can use
at Washington, D.C., and additional
mailing offices. Postmaster: Send
address changes to Editor, FBI Law
of Investigation 19 the enterprise theory of investigation to
help dismantle criminal enterprises.
By Richard A. McFeely
Enforcement Bulletin, FBI Academy,
Madison Building, Room 209,
Quantico, VA 22135. Law Enforcement Physical Title VII of the Civil Rights Acts of
Editor Fitness Standards and Title VII 26 1964 and 1991 may prohibit employers
from creating discriminatory physical
John E. Ott By Michael E. Brooks standard limits.
Associate Editors
Glen Bartolomei
Cynthia L. Lewis
Bunny S. Morris
Art Director
Denise Bennett Smith
Departments
Staff Assistant
Linda W. Szumilo
A
new era of globalization than ever before. However, the serious challenge to law enforce-
has emerged, and it is same aspects of globalization that ment agencies and financial
shrinking the world and have expanded opportunities for regulators.
shaping domestic politics and inter- free-market capitalism also have Because globalization repre-
national relationships.1 Globaliza- resulted in new risks. Globaliza- sents an overarching international
tion involves the international inte- tion has turned the international phenomenon, the international
gration of capital, technology, and financial system into a money community’s response to the chal-
information in a manner resulting in launderer’s dream, siphoning off lenge posed by money laundering
a single global market and, to some billions of dollars a year from has to address the financial, legal,
degree, a global village.2 This inte- economies around the world and and enforcement issues in a univer-
gration enables individuals and cor- extending the reach of organized sal manner, through harmonization
porations to reach around the world crime. This unintended conse- of remedies. Understanding the glo-
farther, faster, deeper, and cheaper quence of globalization presents a bal threat of money laundering and
May 2001 / 1
the international community’s Criminals engage in money ill-gotten gains from suspicion and
response will assist investigators laundering for three reasons. First, protect them from seizure, crimi-
pursuing the evidentiary trail of money represents the lifeblood of nals must conceal their existence
a launderer by identifying the the organization that engages in or, alternatively, make them look
enforcement tools and techniques criminal conduct for financial gain legitimate.
developed to overcome obstacles because it covers operating ex-
encountered when crossing interna- penses, replenishes inventories, HOW IS MONEY
tional boundaries. purchases the services of corrupt LAUNDERED?
officials to escape detection and Money laundering consists of a
WHAT IS MONEY further the interests of the illegal three-stage process. The first stage
LAUNDERING? enterprise, and pays for an extrava- involves the placement of proceeds
Generally, money laundering is gant lifestyle. To spend money in derived from illegal activities—the
“the process by which one conceals these ways, criminals must make movement of proceeds, frequently
the existence, illegal source, or ille- the money they derived illegally ap- currency—from the scene of the
gal application of income and then pear legitimate. Second, a trail of crime to a place, or into a form, less
disguises that income to make it ap- money from an offense to criminals suspicious and more convenient for
pear legitimate.”3 In other words, can become incriminating evi- the criminal. For example, a gov-
the process used by criminals dence. Criminals must obscure or ernment official may take a bribe in
through which they make “dirty” hide the source of their wealth or the form of cash and place it in a
money appear “clean.” Though ini- alternatively disguise ownership or safe deposit box or bank account
tially considered an aspect integral control to ensure that illicit pro- opened under the name of another
to only drug trafficking, laundering ceeds are not used to prosecute individual to hide its existence or
represents a necessary step in al- them. Third, the proceeds from conceal the ownership.
most every criminal activity that crime often become the target of Layering constitutes the second
yields profits. investigation and seizure. To shield stage of the laundering process and
involves the separation of proceeds
from the illegal source through the
use of complex transactions de-
signed to obscure the audit trail and
“
hide the proceeds. This phase of the
laundering process can include the
...law enforcement transfer of money from one bank
account to another, from one bank
must work closely to another, from one country to an-
with financial other, or any combination thereof.
institution Criminals layer transactions to in-
managers and crease the difficulty of tracing the
regulators. proceeds back to its illegal source.
They frequently use shell corpora-
”
tions and offshore banks at this
stage because of the difficulty in
Mr. Schroeder, former chief of the FBI's Legal Forfeiture Unit, now serves as obtaining information to identify
president of a private law enforcement consultant company in Woodbridge, ownership interests and acquiring
Virginia, and is a technical advisor for the U.S. Department of the Treasury necessary account information
regarding money laundering and asset forfeiture and corruption.
from them.
“
proceeds upon disposal. particularly vulnerable to launder-
The successful money laun- ing as they begin to open their
derer closely approximates legal financial sectors, sell government-
transactions employed routinely by Criminals engage owned assets, and establish fledg-
legitimate businesses. In the hands in money ling securities markets.10 The eco-
of a skillful launderer, the payment laundering for nomic changes taking place in the
for goods that appeared to have three reasons. former Soviet States in Eastern Eu-
been delivered by one company rope create opportunities for un-
”
based upon an invoice of sale pre- scrupulous individuals where
pared by another company covers money laundering detection, inves-
the laundering of the purchase price tigation, and prosecution tools
when the goods never existed, and and undermine the political stability slowly take shape. Indeed, as most
the companies are owned by the of democratic nations. Criminals emerging markets began the pro-
same party; the sale of real estate quickly transfer large sums of cess of privatizing public monopo-
for an amount far below market money to and from countries lies, the scope of money laundering
value, with an exchange of the dif- through financial systems by wire increased dramatically.
ference in an under-the-table cash and personal computers. 5 Such The international community of
transaction, launders what, on the transfers can distort the demand for governments and organizations that
surface, appears to be capital gain money on a macroeconomic level have studied money laundering rec-
when the property is sold again; and and produce an unhealthy volatility ognize it as a serious international
a variety of lateral transfer schemes in international capital flows and threat.11 The United Nations and the
among three or more parties or com- exchange rates.6 Organization of American States
panies covers the trail of monetary A recent and highly publicized (OAS) have determined that the
transactions between any two of case prosecuted in New York pro- laundering of money derived from
them.4 vides an example of the ease with serious crime represents a threat to
May 2001 / 3
Ten strategies that countries and territories can follow to synthesize the universal
standards adopted by the international community to combat money laundering:
• Enhance cooperation among law enforcement, • Identify bank customers: because launderers
financial institutions, and judiciary: a coordi- covet anonymity for their clandestine activ-
nated response involving the financial indus- ity, institutions must identify their customers
try, the judiciary, and law enforcement is and pass pertinent information to the appro-
necessary to address the issues regarding priate authorities.
effective counterlaundering measures. • Record customer and transaction informa-
• Criminalize laundering: adopt legislation that tion: banks and other covered institutions
criminalizes the laundering of the proceeds must record information obtained in identify-
of all “serious crime.” ing their customers and certain transactions
• Establish a financial intelligence unit (FIU): and keep such records for up to 5 years.
an FIU is a central office, generally composed • Establish effective antimoney laundering
of investigators, banking experts, and finan- programs in banks: banks should establish
cial analysts, that obtains and analyzes infor- effective internal antilaundering programs,
mation from financial institutions and then conduct laundering-detection training for
provides that information indicative of officers and employees, and provide for
laundering to an appropriate government meaningful institutional accountability.
authority for investigation. • Ensure international cooperation: given
• Repeal bank secrecy laws: laws that unduly the ease and speed that criminals can layer
restrict the flow of information between and integrate funds across international
financial institutions and law enforcement boundaries, cooperation among enforce-
should be repealed and specific protections ment authorities on an international basis
afforded those appropriately disclosing is essential. Countries should adopt laws
information to the authorities. to facilitate such international cooperation.
• Report large/suspicious transactions: to obtain • Adopt forfeiture laws: countries should
needed information on a reliable basis, banks adopt laws that permit the forfeiture of
and other covered institutions should be property connected to laundering offenses
required to report all “suspicious” transac- and the pretrial restraint and seizure of
tions and all “large” transactions, where the property subject to forfeiture in domestic
reports on large transactions would help law cases and upon request by authorities from
enforcement agencies in a manner that is not foreign jurisdictions.
cost prohibitive.
the integrity, reliability, and stabil- terrorism, as a threat to global and against money laundering in
ity of financial, as well as govern- peace and freedom. Immediately particular.13 The U.S. Department
ment, structures around the world.12 thereafter, he signed Presidential of the Treasury Deputy Secretary
In October 1995, the President of Directive 42, ordering U.S. law en- summed up the seriousness of the
the United States, in an address to forcement agencies and the intelli- domestic and international threat
the United Nations General Assem- gence community to increase and when he testified before the U.S.
bly, identified money laundering, integrate their efforts against inter- Congress on March 9, 2000. During
along with drug trafficking and national crime syndicates in general his testimony before the House
“
perspectives. First, on the enforce- has taken a number of forms,
ment level, laundering increases the including multilateral treaties,
threat posed by serious crime, such ...$600 billion regional agreements, international
as drug trafficking, racketeering, represents a organizations, and the identifica-
and smuggling, by facilitating the conservative estimate tion of universal counterlaundering
underlying crime and providing measures.
of the amount of
funds for reinvestment that allow
the criminal enterprise to continue
money laundered The United States’ Response
its operations. Second, laundering each year.... The United States commenced
”
poses a threat from an economic one of the earliest responses to
perspective by reducing tax rev- money laundering. The Bank
enues and establishing substantial Secrecy Act of 1970 authorized the
underground economies, which amount lie somewhere between Secretary of the U.S. Department of
often stifle legitimate businesses $500 billion and $1 trillion, but that the Treasury to establish regulatory
and destabilize financial sectors half is being laundered through U.S. measures requiring the filing of
and institutions.15 Finally, money banks.18 Due to the clandestine na- currency transaction reports and
laundering undermines democratic ture of laundering activity, govern- served as a foundation for further
institutions and threatens good gov- ments and concerned organizations measures to combat laundering.21
ernance by promoting public cor- cannot accurately quantify the Subsequently, Congress enacted the
ruption through kickbacks, bribery, amount of money laundered each Money Laundering Control Act in
illegal campaign contributions, col- year. Some estimates suggest that 1986,22 which made the launder-
lection of referral fees, and misap- the amount of money laundered ing23 of proceeds derived from any
propriation of corporate taxes and each year is approximately $2.8 one of a long list of offenses (known
license fees.16 trillion, an amount more than four as “specified unlawful activities”) a
times greater than the figure gener- crime.24 This list now includes over
HOW MUCH MONEY ally accepted.19 100 federal offenses, selected state
IS LAUNDERED? Many economists, law enforce- offenses, and certain violations
The International Monetary ment executives, and policy makers of foreign laws. 25 The act also
Fund estimates that the amount of agree on the need to develop an ac- criminalized structuring certain
money laundering occurring on a ceptable means of identifying the transactions to avoid filing currency
May 2001 / 5
reports.26 Congress made civil and community’s response to drug to criminalize the laundering of
criminal procedures available money laundering.29 It requires the drug proceeds.31 In addition, the
to forfeit property involved in a signatory jurisdictions to take fact that the treaty defined money
laundering offense. Subsequent specific actions, including steps to laundering as a crime predicated on
legislation has added further enact domestic laws criminalizing drug trafficking has limited its ef-
enhancements.27 the laundering of money derived fectiveness. Of the countries
Most recently, the Money from drug trafficking and provide tracked in the U.S. Department of
Laundering and Financial Crimes for the forfeiture of property de- State report, 66 have failed to
Strategy Act of 1998 called for the rived from such offenses.30 The criminalize the laundering of pro-
development of a national strategy treaty also promotes international ceeds derived from nondrug traf-
to combat money laundering and re- cooperation as a key to reducing the ficking offenses.
lated financial crimes. 28 In re- global threat of money laundering
sponse, the Departments of Justice and requires states to provide assis- The Strasbourg
and the Treasury developed a 5- tance in obtaining relevant financial Convention of 1990
year strategy that calls for designat- records when requested to do so The Council of Europe is a re-
ing high-risk money laundering without regard to domestic bank se- gional organization established to
zones to direct coordinated enforce- crecy laws. strengthen democracy, human
ment efforts, providing for greater rights, and the rule of law in its
scrutiny of suspicious transactions, member states, in part, by harmo-
“
creating new legislation, and inten- nizing its policies and encouraging
sifying pressure on nations that lack the adoption of common practices
adequate countermoney laundering Emerging market and standards. It adopted the
controls. In addition to its domestic countries are Strasbourg Convention in Novem-
efforts, the United States has particularly ber 1990,32 which, like the Vienna
become a party to multilateral vulnerable to Convention, requires each party to
treaties and agreements, as well as adopt legislation that criminalizes
numerous bilateral efforts, that
laundering.... money laundering. As of December
”
support enhanced international 1999, 27 of 41 member states and
cooperation. The United States par- one nonmember (Australia) have
ticipates in and promotes the efforts ratified the Strasbourg Convention.
of international organizations that While the Vienna Convention Unlike the Vienna Convention, this
have developed universal standards remains a benchmark in identifying treaty does not limit the underlying
and monitor current trends to ad- counterlaundering measures on an predicate offense to drug traffick-
dress the laundering threat to the international level, it does not ing. The Strasbourg Convention re-
global community. In furtherance criminalize laundering. Rather, it quires members to adopt laws
of international cooperation, the obligates the parties to adopt do- criminalizing the laundering of the
United States transfers funds to for- mestic legislation that makes laun- proceeds from any “serious
eign jurisdictions (known as “inter- dering drug proceeds a crime. Un- crime.”33 The treaty also requires
national sharing”) that have assisted fortunately, compliance with regard signatories to adopt laws authoriz-
in efforts that resulted in the forfei- to the antilaundering provision ing the forfeiture of the proceeds of
ture of property. has not been universal. The U.S. serious offenses, as well as any in-
Department of State recently issued strumentalities of the crime, or in
Vienna Convention of 1988 a report tracking the counterlaun- the alternative, the value of such
The Vienna Convention repre- dering measures of various jurisdic- property. Members must provide
sents the first concerted effort tions. The report listed 38 parties to investigative assistance to foreign
to influence the international the Vienna Convention that failed jurisdictions regarding forfeiture
May 2001 / 7
adopt antilaundering measures and Attorney General, The Cash Connection: have undergone transformation from a
Organized Crime, Financial Institutions, and government-controlled economy to one with
the regional and world organiza-
Money Laundering 7 (1984). fewer government controls and greater market
tions that have developed and en- 4
Jack A. Blum, et al., “Financial Havens, freedom for companies to trade on an
couraged a standardized approach Banking Secrecy and Money Laundering,” international scale, such as the Czech Republic,
to addressing laundering all have Crime Prevention and Criminal Justice News Slovenia, and Thailand.
10
Letter 8, no. 34/35 (1998). See, Stephen R. Kroll, “Money Launder-
contributed to the strides made in 5
See, for example, Eduardo Gallardo, ing: A Concept Paper Prepared for the
addressing the challenges posed.40 “Chile Attracts Drug Money for Laundering: Government of Bulgaria,” International Law 28
Efforts undertaken by nations inde- Strong Economy, Financial Market Lure (1994): 835, 869 (a discussion on
pendent of the international com- Foreign Cartels,” Washington Times, Oct. 21, criminalization of money laundering for
1997 (“Most experts believed drug gangs view Bulgaria and the special concerns about
munity often result in significant
Chile mostly as a good place for money misappropriation of value from privatized
variations from the accepted stan- laundering because of its thriving economy, enterprises during the transformation of the
dard and have the effect of facil- with money flowing in and out of the country Bulgarian economy from a government-
itating laundering activity rather which would allow traffickers to make their controlled economy to a market economy).
11
money look legitimate by channeling it through For example, representatives of the “G-7”
than combating it.41 For example,
businesses...Nearly $2 billion in foreign money (now referred to as the “G-8”), seven major
the government of Antigua and poured into Chile in the first 6 months of the industrial countries in the world, including the
Barbuda weakened its laws relating year for investment in its companies.”). United States, the United Kingdom, France,
to money laundering, resulting in Germany, and Japan, who formed the Financial
Action Task Force (FATF); the Organization of
the U.S. Department of the Trea-
“
American States (OAS); the Council of Europe;
sury issuing an advisory warning the United Nations (UN); the Asian Pacific
banks and other financial institu- Group on Money Laundering; and the European
tions to be wary of all financial Union.
transactions routed into, or out of, ...the United States 12
United Nations Declaration and Action
that jurisdiction.42 The changes in has become a Plan Against Money Laundering, United
Nations Resolution S-20/4 D (June 10, 1998);
the law strengthened bank secrecy, party to multilateral and the Ministerial Communique, Ministerial
inhibited the scope of laundering treaties and Conference concerning the Laundering of
Proceeds and Instrumentalities of Crime,
investigations, and impeded inter- agreements...that Buenos Aires, Argentina (December 2, 1995);
national cooperation. A common, support enhanced http://www.oecd.org/fatf/Initiatives_en.htm;
harmonized approach will prevent accessed November 13, 2000.
launderers from using the different international 13
U.S. Department of State, International
laws and practices among the juris- cooperation. Crime Control Report, 1999, Money Launder-
ing and Financial Crimes, 599.
dictions to their advantage both at
”
14
See, House Committee on Banking and
the expense and disadvantage of Financial Services, prepared statement of Stuart
countries interested in pursuing Eizenstat, Deputy Secretary, U.S. Department
of the Treasury (March 9, 2000); http://
them.43 Only with laws that have 6
See remarks of Michel Camdessus, www.ustreas.gov/press/releases/ps445.htm,
been harmonized can law enforce- managing director of the International Monetary accessed November 13, 2000.
ment agencies, working together Fund, at a plenary meeting of the Financial 15
Supra note 6, (“Potential macroeconomic
with financial institution adminis- Action Task Force on Money Laundering, consequences of money laundering include, but
February 10, 1998; http://www.imf.org/ are not limited to: inexplicable changes in
trators and regulators, combat this external/np/speeches/1998/021098.htm. money demand, greater prudential risks to bank
ever-increasing problem. accessed November 13, 2000. soundness, contamination effects on legal
7
Mark Hosenball and Bill Powell, “The financial transactions, and greater volatility of
Russian Money Chase,” Newsweek, February international capitol flows and exchange rates
Endnotes 28, 2000, 42-43. due to unanticipated cross-border asset
1
Thomas L. Friedman, The Lexus and the 8
Catherine Skipp, “Six Arrested in Global transfers.”).
Olive Tree: Understanding Globalization (New Fraud, Money-Laundering Case: Group 16
See, Barry R. McCaffrey, “Efforts to
York, NY: Farrar, Straus, Giroux, 1999). Allegedly Bilked Victims of $60 Million,” Combat Money Laundering,” Loyola of Los
2
Ibid. Washington Post, May 8, 1998, sec. A, p. 2. Angeles International and Comparative Law
3
President’s Commission on Organized 9
For example, countries in Eastern Europe, Journal 791, no. 20 (1998). Also, supra note
Crime, Interim Report to the President and the Asia, and South and Central America that 13.
May 2001 / 9
Technology Update
History and Organization
The PSWN Program is a joint effort sponsored by
the U.S. Departments of Justice and the Treasury. The
program addresses issues facing public safety wireless
communications, primarily in the area of
interoperability among land mobile radio (LMR)
networks used to support public safety missions. The
program is working to plan and foster interoperability
at all levels of government (e.g., local, state, and
federal) and among all public safety disciplines (e.g.,
law enforcement, fire, and emergency medical
services). In 1996, the PSWN Program was founded
in response to a National Partnership for Reinventing
Government (NPRG) initiative that called for the
establishment of an intergovernmental wireless
public safety network as a means of achieving
interoperability. Since then, the vision has evolved to
a system of networks, regionally focused, brought
together through coordination and partnerships among
public safety agencies from all levels of government.
Although its task is very challenging, the PSWN
Program has made great strides in achieving
The Public Safety Wireless interoperability among public safety agencies across
the United States. The program realizes that there
Network (PSWN) Program may never be one nationwide wireless communica-
A Brief Introduction tions system, but that statewide or regional
By Derek Siegle and Rick Murphy interoperability is an achievable goal with the
federal government participating where appropriate.
”
tives of local, state, and federal individual members of Con-
public safety agencies. It serves gress and making presentations
as an advisor to, and an advo- to the National Association of
cate of, the program and its Governors, National League
mission. In addition to its symposiums and Executive of Cities, and other similar associations to inform
Committee, the program sponsors Integrated Program state and local decisionmakers. The goal is to make
Teams with direct representation from radio commu- public safety wireless communications systems and
nications specialists from all levels of government. interoperability a priority investment for America’s
These persons serve as members of these working future safety.
groups to solve specific interoperability challenges
and foster solutions and pilot concepts. Conclusion
The program also is beginning a new outreach The ultimate goal of the Public Safety Wireless
initiative to facilitate the formation of public safety Network Program is to develop and enact a road map
communications councils in each of the 50 states. to assist public safety agencies with ongoing and
This campaign hopefully will be a catalyst for the future interoperability efforts, known as the Public
coordination and partnerships necessary for tackling Safety WINS. Public Safety WINS will serve as a
the interoperability challenge. Several states, such as basis to help public safety agencies formulate
May 2001 / 11
strategies for interoperable systems by addressing publications, as well as other issues regarding inter-
coordination and partnership, funding, spectrum, operability can be accessed at http://www.pswn.gov
standards and technology, and security issues associ- or can be obtained by contacting the program at
ated with such an endeavor. Public Safety WINS is 1-800-565-PSWN.
scheduled to be finalized by the end of fiscal year
2001. Public Safety WINS will include an introduc- Mr. Siegle and Mr. Murphy are, respectively, the U.S.
tory video supported by an interactive Web site that Justice and the Treasury Departments’ program managers
will provide both technical and policy solutions to for the Public Safety Wireless Network (PSWN) Program.
interoperability issues. The PSWN Program is a federally sponsored initiative
The PSWN Program is committed to assisting dedicated to improving public safety wireless interoperabil-
public safety agencies with implementation strategies ity, so that no one loses their life because public safety
officials cannot communicate with one another.
and their plans to address interoperability. Informa-
tion regarding the program, its studies, pilots, and
Unusual Weapon
Barrel Gun
O ne detective working
white-collar crime en-
countered an investor who
claimed that he did not receive a
promised 900 percent annual profit
on an investment. To complicate
matters, the investor dumped stacks
of paperwork on the detective’s
desk attempting to prove the fraud.
Upon further questioning, the de-
tective learned that the investor
made the investment 2 or 3 years
ago, but it had not paid out during
the past year. The investor ex-
plained that he thought he had in-
vested in an overseas program guar-
anteed by banks involving the
Federal Reserve that made money
by trading some type of bank instru-
ments. He had hesitated to issue a
complaint because he believed the
investment would pay off soon.
The scheme involved volumes of
thick contracts, letters of intent,
secrecy clauses, and a host of other © PhotoDisc
financial terms that the investor re-
ally never understood and could not
explain to the detective. The inves- money—between $500,000 and $1 difficulty in establishing criminal
tor only understood that his in- million. Today, these scams have intent needed for conviction prove
volvement had no risk and that he evolved into targeting larger num- challenging. However, the FBI’s
would receive an extraordinary re- bers of people for smaller dollar Sacramento office has implemented
turn. But, the investment failed. amounts—usually between $5,000 investigative techniques to success-
This scenario describes a prime and $100,000 each.1 fully prosecute these schemes.
bank trading program fraud. These Unfortunately, these scam art- Initially, when investigators receive
types of investment frauds have ists rarely face prosecution because an investment fraud complaint,
existed for many years and, courts traditionally have regarded they should contact promoters and
historically, have involved indi- the cases as civil in nature, and the explain the illegality of market-
viduals investing huge sums of complexity of the issues and the ing such schemes. By doing so,
May 2001 / 13
often called an intermediary or fa-
“ Law enforcement
should ensure that
all promoters
cilitator. The promoter will sign let-
ters of intent or proof of funds and
eventually sign a contract with the
intermediary.
Promoters receive payment by
receive this keeping a portion of the investment
and sending the balance to the inter-
warning during mediary, or by making arrange-
the interview. ments to receive a percentage of the
”
profits. At this point, the money
starts to flow. The investor gives
Special Agent Cauthen serves in the
money to the promoter, who, in
FBI’s Sacramento, California, office. turn, passes it along to the interme-
diary who initially performs as
promised. Usually, the investor
receives one or two payments as
investigators establish the knowl- to perform as expected. At this profits. Then, the payments reduce
edge of the promoter and warn the point, they reach into their file cabi- greatly or cease all together. Pro-
promoter that continuing the fraud net, pull out a huge stack of paper, moters then will provide a series of
may result in prosecution. If the throw it on the desk, and advise that excuses, often in writing, explain-
promoter continues to contact po- they are a victim as well. ing in detail exactly why the invest-
tential investors to take money, the A number of promoters claim ment cannot pay this month, but that
U.S. Attorney’s Office may charge that they have access to individuals it will pay soon.
the scam artist with mail and wire who can purchase bank instruments In the final analysis, no legiti-
fraud. at a discount and resell them for a mate investment ever takes place. In
higher price for a small profit. fact, everyone in the chain is an
HOW THE FRAUD WORKS These promoters perpetrate prime intermediary who takes a portion of
Assuming a department eventu- bank scams throughout the world the money as fees or commissions
ally opens a criminal case, most in- and claim that they do this continu- and passes the balance to the next
vestigators will become discour- ally, making huge profits in a short person in the chain.
aged after the initial interview with time period with no risk. At this point, law enforcement
these con artists. Usually, they ad- The promoters collect funds easily recognizes the investment as
mit taking money from the victim, from investors and have them sign a a classic Ponzi scheme2 in which
promising an extraordinary return, series of documents to enter into the money paid to old investors repre-
explaining the guarantee of the in- investment. Types of documents sents, in reality, investment princi-
vestment, and failing to perform as seen at this stage include “letters of pal from the new investors. By the
promised. But, investment crimi- intent” and “proof of funds letters,” time the matter comes to the atten-
nals will advise that they were all designed to make investors be- tion of law enforcement, the money
victims, too, because although they lieve that they have to qualify for has passed through several hands
took money from investors, they the investment. Additionally, the and, often, through several states or
gave it to their contacts who documents lend credibility to the countries.
promised they had access to a trader scheme by making the investment
who could deliver the promises. application process appear official. TACKLING THE PROBLEMS
Then, they will explain how their The promoter will enter into Several problems arise in this
contacts took the money but failed an agreement with another person, type of scam. First, investigators
May 2001 / 15
Information Sheet
“
When writing to victims, investiga- successful prosecution of the case
tors should provide all of the infor- increase if a prosecutor works
mation that they have about the in- Chances for on the case early in the investiga-
vestigation. Promoters deliberately a successful tion. If law enforcement waits until
might try to interfere with victims the end of the investigation to re-
by disseminating erroneous infor-
prosecution of quest the prosecutor’s help, con-
mation. Being open and candid with the case increase tinuing with a civil case may be the
investors may convince them to co- if a prosecutor only response.
operate early. To avoid any subse- works on the case
quent allegations by the defense, in- early in the Endnotes
vestigators should include language investigation. 1
Kim Clark, “Pumping the Prime: ‘Prime
advising that defendants are pre- Bank’ Schemes are Back and Targeting the
”
sumed innocent. If investors still re- Middle Class,” U.S. News and World Report,
main in contact with promoters, any March 15, 1999.
2
An investment swindle in which some
evidence of statements made by the early investors are paid off with money put up
promoter to the investor (known as by later ones in order to encourage more and
“lulling” statements) will prove CONCLUSION bigger risks. Merriam-Webster’s Collegiate
useful, particularly if promoters By using innovative investiga- Dictionary, 10th ed. (1996), s.v. “Ponzi
tive techniques and following cer- scheme.”
make them after investigators al- 3
U.S. vs. Sid Tweady, et al., Cr. S.-99-293
ready have contacted the promoters tain steps in the investigation, law DFL (E. D. CA 2000) statements by Judge
and warned them about the true na- enforcement can prosecute fraudu- David Levi.
ture of these schemes. lent investment schemes success- 4
Investigators can obtain this information
fully. First, investigators should in- sheet, created by the FBI and the Sacramento
Contact with Prosecutors U.S. Attorney’s Office, by contacting either of
terview promoters, obtain a history these offices. A copy of the sheet also is
These types of cases can be- of their past involvement with these provided with this article.
come inherently complex. Investi- schemes, and warn them that these 5
The questionnaire consists of a cover letter
gators should present the case to types of investments are fraudulent. explaining the nature of the investigation, the
status of the prosecution, and any information
prosecutors first, then conduct the Additionally, investigators should known about the disposition of the money. It
investigation. Also, investigators obtain evidence of previous scams consists of questions such as: “What promises
always should remember that through interviews, search war- were made? What was the promised return?
the goal is to prove intent to de- rants, and bank records and search What was the risk? Who made the promises?
What is the promoter telling you now?” Also,
fraud, not understanding how the for evidence that promoters knew the questionnaire includes a copy of the
investment should have worked. In that the program would not work. Information Sheet.
May 2001 / 17
Book Review
Police Trauma: Psychological Aftermath violence and coping and recovery successes. Also
of Civilian Combat edited by John M. Violanti in this section, the authors analyze and present
and Douglas Paton, Charles C. Thomas, LTD., organizational activities that contribute to the
Springfield, Illinois, 1999. incident commander’s emotional recovery from
Police Trauma offers comprehensive research violence and trauma.
for all law enforcement psychologists and con- Police Trauma reviews a successful military
sulting clinical psychologists by providing the model and its application to law enforcement
conditions and precipitants of trauma stress operations based on the organizational similarities
among law enforcement. Police executives, of chain of command, training, leadership,
incident commanders, line officers, policy response, and commitment to control violence
writers, and law enforcement family members resulting in trauma aftermath. The military model
also will find this book beneficial. Police Trauma contained three prevention phases: a primary
may help prevent or minimize trauma stress by phase, concerning prior preparation and training
providing information on how to better deal with for trauma-type incidents; a secondary phase
traumatic experiences and establish an improved focusing on the participants during and immedi-
support system for officers. ately after a traumatic event; and the last phase
The topics discussed in this book suggest addressing considerations in limiting long-term
future policy and procedures for the concep- effects of trauma and how to properly prepare,
tualization, intervention, recovery, and immediate respond, and recover through a shared and well-
and extended treatment of psychological trauma documented after-action report.
in policing. Also covered are suggestions for both Police Trauma provides a tremendous
department and officer self-assessment. research effort on trauma by experts directly
The authors have grouped the chapters of the connected to the field of law enforcement and
book into three sections: conceptual and method- serves as an invaluable asset for all levels and
ological issues, special police groups, and recov- jurisdiction of the law enforcement community,
ery and treatment. Police Trauma begins with a including those in private industry. It presents
thorough assessment of the understanding of an understanding of why police respond to trauma
psychological trauma involving duty-related, the way they do and how they can recover
patrol-response trauma. The book offers an successfully.
assessment test, which includes 66 character- The authors have gathered information on
istics to help officers understand overall risks to trauma research from professionals associated
themselves and others, and offers guidance on with law enforcement. These contributions
how to analyze the test results for a better under- provide the reader with different perspectives
standing of how trauma can affect officers. This on police trauma and its aftermath and identify
chapter also introduces a police compassion what is known, as well as what is not known, on
fatigue model in which authors describe the this complex issue. Police Trauma serves as an
relationship between an officer’s psychological excellent resource for those individuals managing
trauma, how they cope with the trauma, and their law enforcement psychological stress and trauma.
role in the department and personal family after
exposure. Reviewed by
In another section, Police Trauma assesses Larry R. Moore
police groups, such as the South African Police’s Certified Emergency Manager
exposure to violence. Response members of International Association
high-profile incidents also were assessed for post- of Emergency Managers
intervention strategies concerning exposure to the Knoxville, Tennessee
A lthough the media fre- The ETI has become the stan- furtherance of the criminal enter-
quently focuses on the con- dard investigative model that the prise itself. In other words, indi-
viction of the leaders of FBI employs in conducting investi- viduals commit criminal acts solely
major criminal enterprises, such as gations against major criminal or- to benefit their criminal enterprise.
the Gambino crime family, the ganizations. The successful pros- By applying the ETI with favorable
Colombian Cali Cartel, or the Sicil- ecutions of major crime bosses state and federal legislation, law en-
ian Mafia, dozens of lesser-known serve as direct testaments to the forcement can target and dismantle
individuals belonging to the same benefits of this model. Unlike entire criminal enterprises in one
criminal organization also often re- traditional investigative theory, criminal indictment.
ceive long prison sentences. Those which relies on law enforcement’s
who escaped prosecution or served ability to react to a previously com- Applying the ETI
their sentence may return to find the mitted crime, the ETI encourages a By restructuring both their in-
criminal enterprise to which they proactive attack on the structure of vestigative resources and theory,
once belonged extinct due to a pow- the criminal enterprise. Rather than many law enforcement agencies can
erful tool in the law enforcement viewing criminal acts as isolated use this model. Initially, some po-
arsenal—the Enterprise Theory of crimes, the ETI attempts to show lice agencies may hold a skeptical
Investigation (ETI). that individuals commit crimes in view of the use of the ETI because
May 2001 / 19
its application requires an increased rely on numerous criminal acts to criminal groups have a pyramidal
time commitment, which may affect support their existence and often hierarchy structure where the
case-closure rates and also because divide the responsibility for com- lower levels, consisting of more
they may perceive the ETI as more mitting these acts among their people, conduct the majority of
complex than traditional investiga- members and crews. The ETI capi- the enterprise’s criminal activities.
tive models. However, the advan- talizes on this diversity by analyz- Therefore, working a case “up the
tages of the ETI easily outweigh ing the enterprise’s full range of chain” proves beneficial because it
these presumed disadvantages, criminal activities, determining starts the investigation at the level
primarily because the ETI pro- which components allow the crimi- where most investigative opportu-
vides a highly effective method of nal enterprise to operate and ex- nities exist.
targeting and dismantling criminal ploiting identified vulnerable areas
enterprises. within each component. For in- Defining an Enterprise
To recognize the value of the stance, to accomplish their profit What defines a criminal enter-
ETI, investigators must accept sev- objectives, major drug trafficking prise? Do two bank robbers com-
eral main premises. First, while organizations must establish four mitting serial robberies fall within
some major organized criminal separate subsystems within their or- the definition? How about employ-
groups commit crimes to support ganization—narcotics transporta- ees of a government contractor en-
idealistic views, financial profit tion and distribution, financial, and gaged in systematic bid-rigging?
remains the underlying motive for communication. The ETI identifies Although these criminal groups
most criminal enterprises. and then targets each of these areas might have a loose-knit organiza-
Next, major organized criminal simultaneously, especially those tional structure, application of the
groups typically engage in a broad components viewed as the most vul- ETI probably would not prove ben-
range of criminal activities to nerable. The more diverse the eficial in these instances.
achieve this profit goal. While the criminal enterprise, the more poten- The FBI defines a criminal
nexus of these violations may be tial for exploitation due to the exist- organization as a group of individu-
closely interrelated (e.g., drug traf- ence of these types of subsystems. als with an identified hierarchy en-
ficking and money laundering), ma- A final premise of the ETI gaged in significant criminal activ-
jor criminal enterprises historically maintains that major organized ity. These organizations often
engage in a broad range of crim-
inal activities and have extensive
supporting networks. Generally, the
ETI only proves effective when the
“
organization engages in a myriad of
criminal activities. In the case of the
By restructuring both bank robbers, federal and state rob-
their investigative bery laws sufficiently address this
resources and group’s single-purpose criminal ac-
tivity. However, if the bank robbers
theory, many law begin to diversify by stealing cars
enforcement and guns to support their robberies,
agencies can use the ETI now offers advantages that
[the ETI] model. traditional methods of investigation
do not. The ETI supports the notion
“
conspiracy as two or more individu- steps needed to counter these future
als. The federal Continuing Crimi- trends, which remains the essence
nal Enterprise statute,1 applicable to ...with the [ETI], of the proactive nature of the ETI.
major drug conspiracies, requires the larger the While traditional investigative
that the individual charged led five enterprise...the theory targets individual criminals,
or more individuals while the fed- more investigative the ETI can show they commit
eral Racketeering Influenced Cor- seemingly isolated crimes to benefit
rupt Organizations (RICO) statute
opportunities it an entire criminal enterprise. The
requires only two or more individu- provides for law selection of favorable legislation,
als to comprise a criminal enter- enforcement. from simple state conspiracy laws
prise.2 Law enforcement managers to the more complex federal rack-
”
must decide which statutes to use eteering laws, will round out the
when they form the investigative investigative strategy by focusing
strategy to direct the evidence col- the prosecution not only on the indi-
lection toward meeting the legal re- Investigators always treasure vidual committing a crime but the
quirements of each statute. This any new intelligence regarding an leaders who order or benefit from it.
type of advance decision making enterprise’s current activities; how-
supports the proactive nature of the ever, investigations can still Developing an
ETI. progress with older information. Investigative Strategy
Using the criminal statutes as For example, a review of past inves- Both historical and real-time
guidance, the investigation should tigations, prosecutions, and crimi- evaluation helps form the investiga-
focus continually on an essential nal histories of suspected members, tive strategy. Because investigators
part of the indictment—proving and even open-source information should base this strategy on per-
who belongs to the criminal enter- (e.g., newspaper accounts) can as- ceived weaknesses within the enter-
prise. Obviously, law enforcement sist in this process. The task force prise, they must conduct a thorough
can use traditional investigative concept allows instant multiagency evaluation of the enterprise’s activi-
techniques, such as physical sur- searches of historical records and ties. The investigators should ob-
veillance, to show criminal associa- indices. In fact, during this stage, tain enough information to analyze
tions. However, the act of showing agencies can piece together infor- to gain a basic understanding of the
criminal associations does not nec- mation that they might have, but extent of the enterprise’s criminal
essarily involve proactive evidence just could not link to the actions of a activities. Investigators should ex-
collection against the subjects and criminal enterprise. amine the full range of these illicit
May 2001 / 21
S howing criminal associations does not necessarily
involve proactive evidence collection against the sub-
jects and often uses historical information to prove this
the investigation “up the chain.” At
this point, the use of innovative and
more sophisticated investigative
element. Consider the following successful examples that techniques becomes invaluable be-
focus on the members of criminal enterprises: cause proving a case against the
leader of a major criminal organi-
• A recent FBI investigation initially used gang graffiti to zation typically is more difficult
not only determine membership in the gang (enterprise), than convicting a “player” of the
but to show its area of influence. Investigators also can organization. For example, defer-
use gang colors, clothing, and hand signals in this manner. ring prosecution of low-level bur-
• Agencies can use intercepted telephone conversations, glars in favor of cooperation or
call-detail records, and pen registers to show associations. a court-authorized wiretap of the
• Officers executing warrants or processing prisoners ring leader’s telephone might sup-
should not overlook the more mundane collection of port a hierarchical attack on the
documentary evidence that can prove useful in showing enterprise.
associations. Some examples could include pagers and Additionally, financial profit
cellular telephones with stored numbers, or address books remains one of the main goals of
or scraps of paper with names and telephone numbers. most criminal enterprises. Virtually
Standard post-seizure practice should involve electroni- every major criminal organization
cally capturing this type of information for later link uses a system to reward its members
analysis. through monetary means. Often-
times, successfully dismantling an
• Officers should include accomplice information when organization relies solely on the
compiling a subject’s biographical file, such as other ability of law enforcement to dis-
individuals arrested and the location of the subjects rupt this financial component. Re-
(i.e., whose house or car) when the arrest took place. moval of a criminal enterprise’s fi-
This information proves valuable in showing past nancial base usually disables the
criminal relationships. organization to a point where they
cannot recover. This occurs be-
cause even the lowest members of
the organization require prompt
payment for their actions. Remov-
activities, separate them into com- “fence” against the ring’s efforts to ing the ability of an enterprise to
ponents, and draw an investigative resell the stolen property. A finan- make payments generally takes
strategy that attacks each compo- cial investigator could track pur- away the incentive for those doing
nent separately, yet simultaneously. chases and asset acquisition of each the work to continue. Although the
For example, a large and so- individual. As the case progresses, enterprise can fill some positions of
phisticated burglary ring must have investigators can shift additional re- those incarcerated members
some form of each of the following sources to the enterprise’s most vul- through upward attrition, only a few
components in place: methods of nerable areas. Because the ETI ulti- trusted members of a criminal orga-
theft, resale of the stolen goods, and mately attempts to indict and nization generally handle methods
concealment of their illicit pro- convict all the members of an enter- of dividing, shielding, and account-
ceeds. Police can use a surveillance prise, especially within the leader- ing for the profits. Successfully in-
team to try to catch the actual bur- ship ranks, the investigative strat- carcerating those in such a position
glars and, at the same time, use un- egy needs to address how each of trust can result in large voids
dercover officers to pose as a investigative method will advance within the criminal organization.
“
property used to facilitate the crimi- perts as either consultants or as an
nal activity, such as “legitimate” actual member of the task force.
businesses. The use of a joint Many federal agencies invest con-
The plan should remain aggres- siderable effort in developing a
sive, yet workable. For instance,
task force remains class of nonsworn professionals,
case managers may not include tar- a necessity in ranging from investigative assis-
geting the head of the criminal en- the successful tants to more specialized positions
terprise in the initial plan, but the application of the ETI. that employ an expertise in areas
investigative strategy should define not typically found in the realm of
”
the steps on how to achieve this sworn personnel (e.g., link analysis,
objective. chart preparations, and legal
Investigators should interface research).
with prosecutors as early as pos- include additional staff, access to Because police agencies have
sible in the case. Because the inves- more technical and investigative differing missions and methods of
tigative strategy essentially remains equipment (e.g., different sets of measuring success, the most
a start-to-finish blueprint for the surveillance vehicles), and the pool- important part of the task force for-
case, investigators must know from ing of financial resources for items, mation involves complete agree-
the outset which elements of the such as payment of informants ment by the participating agencies
criminal statutes they must prove and purchase of evidence. Another regarding the objectives and goals
and then tailor the investigative major advantage that directly sup- of the investigation and what rules
plan accordingly. ports the ETI model is that different the task force will follow. Addition-
Finally, case managers should police agencies bring the potential ally, the participating agencies
postpone any actions that might ex- to expand jurisdiction and expertise should complete a memorandum of
pose the scope of the investigation into all of the areas that a criminal understanding that addresses ques-
until completion of the covert enterprise engages. For example, tions, such as the following:
phase. This remains important be- while virtually every state and local • Which agency will maintain
cause opportunities to arrest sub- police agency has counterdrug en- responsibility for the overall
jects increase as the case proceeds, forcement as part of its mission, investigation?
May 2001 / 23
• Are the lead agency’s rules • Will each agency accept personnel, time, and resources.
acceptable to the other par- liability for the actions of Task force supervisors should con-
ticipating agencies? their assigned personnel? sider assignments depending on the
• Will the case be prosecuted • Will the state investigators outline of the investigative strategy
in the state or federal courts? need to be deputized or and the areas within the enterprise
vice versa? that remain vulnerable for exploita-
• Will each participating agency tion, along with the area of each
use their own forms or will the • Will the agencies divide officer’s expertise and experience.
task force adopt one standard the forfeiture share equally, Investigators should use both tradi-
format for investigative regardless of the level of tional and sophisticated investiga-
reports? participation (e.g., one part- tive techniques to receive optimal
• Who will maintain seized time officer versus three results. However, regardless of the
evidence? full-time officers)? original plan, the task force must
• Will each agency agree to adapt and shift investigatory re-
Implementing an Attack sources as the case develops. For
delay arrests and seizures
if it may jeopardize the In this stage, task force mem- example, if the task force obtains a
investigation? bers follow the previously devel- wire tap order to penetrate a crimi-
oped investigative strategy and nal enterprise’s methods of commu-
• How much funding (including merge traditional methods of evi- nications, case managers must con-
overtime) will each agency dence collection with investigative sider temporarily reassigning
contribute to the investigation? methods developed specifically to peronnel to meet the high resource
• Whose procurement rules will attack the identified component of requirements of operating wire
the task force follow to acquire the criminal enterprise. This often taps.
equipment and supplies? involves the largest commitment of Careful coordination with pros-
ecutors as the case develops ensures
that all members of the criminal en-
terprise receive indictments and
An Example of the Enterprise that the enterprise’s established
Theory of Investigation criminal subsystems become per-
manently dismantled.
I n a city plagued with chronic drive-by shootings, tradi-
tional investigative methods may focus on each shooting
as an isolated incident. However, a task force suspecting gang
Conclusion
Oftentimes, larger criminal
involvement can develop a time line that shows that each time enterprises prove problematic
a member of a street gang was incarcerated, an increase in for agencies to dissolve using
shootings against rival gang members occurred. Using this traditional investigative methods.
analysis and adopting an enterprise investigative theory, the However, with the enterprise theory
task force can gather “traditional” evidence against the indi- of investigation, the larger the en-
vidual shooters and focus on developing evidence that shows terprise and the more diverse its
the shootings as more than just random acts. At trial, the illegal activities, the more investi-
prosecutors can use the investigative efforts to show that gang gative opportunities it provides for
leaders ordered the shootings to defend a perceived gap in law enforcement.
their turf as a result of the incarceration factor and, therefore, Because the use of conspiracy
prosecute not only the shooters but the gang leaders as well. or criminal enterprise statutes form
the baseline from which agencies
The Bulletin’s
E-mail Address
May 2001 / 25
Legal Digest
hen deciding to establish procedures that either expressly or discrimination results in the loss of
”
the position in question and consis-
tent with business necessity.”4
How do these laws apply in the Special Agent Brooks is a legal
area of physical fitness standards? instructor at the FBI Academy.
They apply when a physical fitness
standard limits the employment
rights of a group protected by Title
VII. Most notably, they apply when police officers. Dr. Davis con- while an average of 12 percent of
a particular physical fitness stan- ducted extensive studies to deter- female applicants met the standard.
dard has a disparate impact on mine what physical abilities are re- SEPTA also began a physical fit-
women when compared to how the quired for a SEPTA police officer.5 ness test of incumbent officers,
same standard affects men. An on- Dr. Davis determined that SEPTA which included an aerobic capacity
going case from Pennsylvania dem- officers often are called upon to run test. Because of a grievance filed
onstrates the impact of these laws. various distances in the perfor- by their police union, SEPTA
mance of their duties. He further stopped disciplining officers who
Lanning v. Southeastern determined that a specific aerobic failed the test shortly after institut-
Pennsylvania Transportation capacity was necessary for an of- ing it. Instead, the agency rewarded
Authority ficer to adequately perform the those officers who met the fitness
In 1991, as a part of an effort to physical requirements of a SEPTA standards.7
upgrade its 234-officer police force, officer. After determining that this In 1997, five women who had
the Southeastern Pennsylvania aerobic capacity would have a, been rejected by SEPTA because of
Transportation Authority (SEPTA), “...draconian effect on women ap- their inability to meet the 1.5 miles
which operates a commuter rail sys- plicants,” Dr. Davis decided that a run in 12 minutes standard filed a
tem in Philadelphia and its suburbs, slightly lower aerobic capacity Title VII class action lawsuit on be-
instituted a series of physical fitness would meet the goals of SEPTA in half of all women who applied to
requirements for both onboard and improving the physical abilities of SEPTA in 1993 and 1996 and were
potential police officers. Among its police officers, as well as their rejected for this reason, as well as
these was a requirement that appli- job performance. Dr. Davis advised on behalf of all future women who
cants run 1.5 miles in 12 minutes. SEPTA that applicants who could would be similarly rejected. The
Failure to meet this standard dis- run 1.5 miles in 12 minutes would U.S. Department of Justice, after
qualified an applicant from employ- possess this slightly lower aerobic investigating SEPTA’s employ-
ment as a police officer. Prior to capacity.6 ment practices under Title VII,
instituting this standard, SEPTA During the years 1991, 1993, joined the lawsuit in opposition to
contracted with a noted exercise and 1996, almost 60 percent of male the standard. In 1998, the U.S. Dis-
physiologist, Dr. Paul Davis, to de- applicants to the SEPTA police met trict Court for the Eastern District
velop a physical fitness test for its the 1.5 miles in 12 minutes standard of Pennsylvania entered judgment
May 2001 / 27
for SEPTA after hearing evidence manifest relationship to the em- SEPTA appealed the Third Cir-
that included SEPTA studies show- ployment in question.”11 The Third cuit ruling to the U.S. Supreme
ing that there was a statistically high Circuit ruled that this means that Court, but that Court refused to hear
correlation between high aerobic any such standard must measure a the case.14 The case was then sent
capacity and arrests and commen- minimally necessary skill to per- back to the District Court for the
dations among SEPTA officers and form the job. purpose of determining if the 1.5
also that officers with the aerobic The Third Circuit also rejected miles run in 12 minutes standard
capacity approved by Dr. Davis an argument that the employer’s was minimally necessary to demon-
were better able to perform physical burden to justify a standard that strate the ability to perform the job
tasks after running for 3 minutes causes a disparate impact on a pro- of a SEPTA police officer.
than were officers without that tected group is lessened when the On December 7, 2000, the Dis-
aerobic capacity. The District Court job involves public safety.12 The trict Court ruled that the SEPTA
ruled that SEPTA had established court reasoned that had Congress standard does measure a minimum
that the aerobic capacity standard intended such a distinction for pub- characteristic (the specific aerobic
was job related and consistent with lic safety jobs, it would have codi- capacity) necessary to perform the
business necessity and that there fied it with the 1991 act. The dissent duties of a SEPTA police officer.15
was a “manifest relationship of noted that several other circuits had The District Court exhaustively re-
aerobic capacity to the critical and recognized that public safety is a viewed all of the evidence pre-
important duties of a SEPTA of- consideration in determining what sented during the original 1998 trial
ficer.”8 The women and the United and concluded that, “meeting
States appealed to the U.S. Court of SEPTA’s aerobic capacity standard
“
Appeals, Third Circuit. is clearly the minimum required to
The Third Circuit ruled that the perform the critical tasks of the job
lower federal court had erred be- such as pursuits, officer backups,
cause it did not find that the 1.5 ...the plaintiff must officer assists, and arrests. Any
miles run in 12 minutes standard show that a facially lesser requirement simply would
was a “minimum qualification nec- neutral standard not satisfy the minimum qualifica-
essary for the successful perfor- results in a tions for the job of SEPTA transit
mance of the job in question.”9 The ‘significantly police officer and would endanger
Circuit Court reviewed U.S. Su- the public and undermine deter-
preme Court case law and the Civil discriminatory rence of crime and apprehension of
Rights Act of 1991 to conclude that pattern.’ criminals.”16
Congress intended to reject the Su-
”
preme Court’s interpretation of Discussion
Title VII in a 1989 case when it The law enforcement adminis-
ruled that in disparate impact cases trator should remember that Title
an employer can prevail if the stan- is a business necessity justifying a VII is statutory, not constitutional,
dard significantly serves a legiti- disparate impact.13 However, with law. The Supreme Court has ruled
mate employment goal.10 Congress, the exception of cases from the 8th, that for a governmental entity (the
in passing the 1991 law, instead re- 10th, and 11th Circuits, all of theses only type of entity restricted by the
instated an earlier Supreme Court cases predate the 1991 act, which constitution) to discriminate under
interpretation of Title VII that had contained the language relied upon the equal protection clause of the
held that in such circumstances the by the majority of the Third Circuit Fourteenth Amendment, a plaintiff
employer only prevails by showing in ruling that there can be no special must prove an intent to discrimi-
that the standard is “consistent with consideration of the public safety nate.17 Title VII contains no such
business necessity” and “bears a nature of the job. requirement. As a federal statute,
May 2001 / 29
necessity by showing “...that the court noted the significant threat to is a physically demanding job and
practice or action is necessary to public safety that resulted from expect a court to uphold a physical
meeting a goal that, as a matter of these lost arrests in the transit sys- standard that has a disparate impact
law, qualifies as an important busi- tem.28 The court also noted numer- on women. In Lanning, the SEPTA
ness goal.”24 The EEOC has stated ous SEPTA studies that showed Police Department has been forced
that a selection policy that has a that individuals who could meet the to conduct at least seven studies jus-
discriminatory impact on members aerobic standard could perform the tifying the 1.5 miles in 12 minutes
of a Title VII protected classifica- specific job tasks of a transit police standard. These studies were all
tion is inconsistent with EEOC officer. These jobs included chas- conducted by outside experts, in-
guidelines unless the policy has ing criminal violators on foot, run- cluding physicians, physiologists,
been validated pursuant to the ning to a request for officer backups and statisticians and used both
guidelines.25 The guidelines then and assists, and subduing subjects SEPTA personnel and others as
list three means to validate such a subjects.31 The studies did not jus-
policy: criterion-related validity, tify law enforcement physical re-
“
content validity, and construct va- quirements in general but, instead,
lidity.26 Each of these means of vali- only justified the SEPTA standard
dation are defined in the guide- Disparate treatment, as it related to that one department.
lines. 27 All of these means of The latest District Court ruling
validation appear less restrictive
like disparate impact, noted repeatedly that the job re-
than the Third Circuit standard ex- is only permissible quirements of a SEPTA officer
pressed in Lanning. under the business were unique to that one department,
Of particular importance to the necessity justification. even to the exclusion of other tran-
law enforcement administrator at- sit agencies. For example, the stron-
”
tempting to justify a physical fitness gest justification of the SEPTA
requirement is whether the courts standard is the requirement that
will consider the public safety na- SEPTA officers be able to run from
ture of law enforcement work in es- after running distances up to 3 one station to another to back up
tablishing the business necessity of blocks.29 In its conclusions of law, another officer. The SEPTA studies
such a standard. While the Third the court held that these tasks are noted that their officers are required
Circuit in Lanning ruled that the the job of a SEPTA transit officer to do this on a monthly basis.32 Un-
public safety nature of a job will not and failure to be able to perform less another agency can produce
change the Title VII requirement of them compromises the safety of the similar statistical evidence, the like-
business necessity, there is no rea- officer, other officers, and the pub- lihood of justifying a similar physi-
son to believe that public safety lic at large. The court ruled that this cal standard under any business ne-
should not play a role in justifying a establishes that the aerobic capacity cessity requirement remains highly
physical fitness standard as a busi- is a minimum trait necessary to per- unlikely.
ness necessity. In the most recent form this job.30 Even if an agency successfully
Lanning District Court ruling, the Regardless of what standard of justifies a preemployment physical
court noted that SEPTA’s studies business necessity is applied, the standard under the business neces-
had shown that SEPTA officers, law enforcement administrator is sity requirement, what is the effect
who did not possess the aerobic ca- going to be required to show at least of not requiring onboard personnel
pacity established by Dr. Davis for a significant relationship between to meet the same standard? The
the applicants, had failed to make the physical fitness requirement and Third Circuit in the Lanning case
470 arrests during the study period the responsibilities of members of noted that SEPTA mistakenly had
due to their inability to physically their department. It is insufficient to hired a female officer in 1991 who
perform their job after running. The simply claim that law enforcement failed to meet the 1.5 miles in 12
May 2001 / 31
22
Lanning v. Southeastern Pennsylvania
Transportation Authority 181 F.3d 478, 485
(3rd Cir., 1999).
Wanted:
23
See David E. Hollar, Physical Ability Photographs
Tests and Title VII, 67 University of Chicago
Law Review 777, 784 (Summer, 2000).
24
Fitzpatrick v. City of Atlanta 2 F.3d 1112,
1118 (11th Cir., 1993). In this case, African-
American firefighters challenged a no-beard
rule as discriminatory under Title VII because it
had a disparate impact on them due to a higher
incidence of a physical condition among
African-American men that restricts their
ability to shave. The city successfully countered
by presenting proof that firefighters must be
clean shaven to successfully use a breathing
device when fighting fires.
25
26
29 CFR § 1607.3 (2000).
29 CFR § 1607.5 (2000).
T he Bulletin staff is
always on the lookout
for dynamic, law enforce-
27
29 CFR § 1607.16 (2000). Content
validity requires data showing that the content ment-related photos for
of a selection procedure is representative of possible publication in the
important aspects of performance on the job. magazine. We are interested
Construct validity requires data showing that in photos that visually depict
the selection procedure measures the degree to
which candidates have identifiable characteris- the many aspects of the law
tics that have been determined to be important enforcement profession and
for successful job performance. Criterion- illustrate the various tasks
related validity requires data showing that the law enforcement personnel
selection procedure is predictive or significantly
correlated with important elements of work perform.
behavior. We can use either black-
28
Lanning v. Southeastern Pennsylvania and-white glossy or color
Transportation Authority 2000 WL 1790125 prints or slides, although we
at pg. 10.
29
Id. at 11-16. prefer prints (5x7 or 8x10).
30
Id. at 24-25. Appropriate credit will be
31
Id. at 2-11. given to contributing photog-
32
Id. at 24. raphers when their work
33
Lanning v. Southeastern Pennsylvania
Transportation Authority 181 F.3d 478, 483 appears in the magazine. We
(3rd Cir. 1999). suggest that you send dupli-
34
Lanning v. Southeastern Pennsylvania cate, not original, prints as
Transportation Authority 2000 WL 1790125 we do not accept responsibil-
at 26.
35
Title 42, USC § 2000e-2(l). ity for prints that may be
36
29 CFR § 1607.11 (2000). damaged or lost. Send your
photographs to:
Law enforcement officers of other than
federal jurisdiction who are interested in Art Director, FBI Law
this article should consult their legal Enforcement Bulletin,
advisors. Some police procedures ruled
permissible under federal constitutional law FBI Academy, Madison
are of questionable legality under state law Building, Room 209,
or are not permitted at all. Quantico, VA 22135.
Official Business
Penalty for Private Use $300