You are on page 1of 35

January 2003

Volume 72
Number 1
United States
Department of Justice
Federal Bureau of Investigation
Washington, DC 20535-0001

Robert S. Mueller III


Director
Contributors’ opinions and statements Features
should not be considered an
endorsement by the FBI for any policy,
program, or service.

The attorney general has determined


that the publication of this periodical is
necessary in the transaction of the
public business required by law. Use Battling DUI Sobriety checkpoints and saturation
of funds for printing this periodical has
been approved by the director of the
Office of Management and Budget.
By Jeffrey W. Greene 1 patrols provide law enforcement
agencies with two powerful ways
to curb drunk driving incidents.
The FBI Law Enforcement Bulletin
(ISSN-0014-5688) is published
monthly by the Federal Bureau of The Business Police Academy Agencies can implement business
Investigation, 935 Pennsylvania
Avenue, N.W., Washington, D.C.
By Giant Abutalebi Aryani, 10 police academies to help companies
become more aware of potential
20535-0001. Periodicals postage paid Carl L. Alsabrook,
at Washington, D.C., and additional criminal activities and to reduce
mailing offices. Postmaster: Send
and Terry D. Garrett
crimes against them.
address changes to Editor, FBI Law
Enforcement Bulletin, FBI Academy, U.S. Immigration and Naturalization
Madison Building, Room 209, U.S. Immigration Inspectors
Quantico, VA 22135. By Gene M. Soper 16 Service personnel act as ambassadors,
as well as law enforcers, in their effort
Editor to protect America’s borders.
John E. Ott
Warrantless Interception Criminal investigators must understand
Associate Editors
Cynthia L. Lewis
Bunny S. Morris
of Communications 25 when, where, and why subjects’
conversations may be legally
By Richard G. Schott intercepted and recorded.
Art Director
Denise Bennett Smith
Assistant Art Director
Stephanie L. Lowe
Staff Assistant Departments
Linda W. Szumilo

This publication is produced by


members of the Law Enforcement
Communication Unit, Training Division. 7 Police Practice 21 Bulletin Reports
Amnesty Boxes Victims
Internet Address Juvenile Justice
leb@fbiacademy.edu
15 Book Review
Cover Photo American Values in Decline 22 Research Forum
© Digital Stock Principles of Criminal Behavior
Send article submissions to Editor,
FBI Law Enforcement Bulletin, FBI
Academy, Madison Building, Room
209, Quantico, VA 22135.

ISSN 0014-5688 USPS 383-310


Battling DUI
A Comparative Analysis of Checkpoints
and Saturation Patrols
By JEFFREY W. GREENE
© © PhotoDisc

F
or many years, the law en- tolerate drunk driving? Until that
Since September 11, 2001, drunk forcement community has time, the law enforcement commu-
drivers have killed more people attempted to detect impaired nity must attempt to contain the car-
than actually died on that day. drivers through numerous innova- nage inflicted upon law-abiding
Not to take away from the tragedy tive efforts and measures. The prob- citizens by impaired drivers.2
of September 11, but drunk driving
deaths are happening every day
lem of driving under the influence Law enforcement has two basic
in America.1 (DUI) is well known throughout so- methods of dealing with the DUI
ciety, yet, even with all of the strat- problem—sobriety checkpoints and
egies used to remove these drivers saturation patrols. Sobriety check-
from U.S. highways, it continues to points have existed for several years
cause needless and tragic loss of life and have served as a deterrent
each year. When will such madness to drunk driving across many
end? When will society no longer communities. Although not the

January 2003 / 1
most aggressive method of re- increase of more than 800 deaths the likelihood of apprehension is
moving impaired drivers from from 1999. This represented the more important in deterring offend-
America’s roadways, these check- largest percentage increase on ers than the severity of punish-
points comprise one piece of public record.3 By some estimates, about ment.6 Therefore, enforcement is
awareness and education relevant to two out of every five Americans the key to creating the perception of
the drinking and driving dilemma. will be involved in an alcohol-re- a possibility of capture, while publi-
Saturation patrols, on the other lated crash at some time in their cizing these efforts can effect a real
hand, constitute a vigorous tactic lives.4 These tragic statistics dra- threat of detainment.
employed by law enforcement matically illustrate that DUI is a se-
agencies to significantly impact an rious problem. Sobriety Checkpoints
area known for a high concentra- Research has indicated, how- Sobriety checkpoint programs
tion of alcohol-impaired drivers. ever, that most impaired drivers are defined as procedures in which
Law enforcement agencies have never get arrested. Police stop some law enforcement officers restrict
used saturation patrols much longer drivers, but often miss signs of im- traffic flow in a designated, specific
than checkpoints, sometimes under pairment.5 Estimates revealed that location so they can check drivers
a different name or no name at all. as many as 2,000 alcohol-impaired for signs of alcohol impairment. If
Which method offers the best use driving trips occur for every arrest, officers detect any type of incapaci-
of law enforcement’s limited and, even when special drinking- tation based upon their observa-
resources? The choice depends driving enforcement patrols are tions, they can perform additional
upon many issues, such as funding, conducted, as many as 300 trips oc- testing, such as field sobriety or
resource allocations, and targeted cur for each arrest. Because the po- breath analysis tests.7 To this end,
areas. lice cannot catch all offenders, the agencies using checkpoints must
success of alcohol-impaired driving have a written policy as a directive
The Problem laws depends on deterring potential for their officers to follow.
According to National High- offenders by creating the public Agencies normally choose lo-
way Traffic Safety Administration perception that apprehension and cations for checkpoints from areas
statistics, 16,653 people died in punishment of offenders is prob- that statistically reveal a large num-
alcohol-related crashes in 2000, an able. Research also has shown that ber of alcohol-related crashes or of-
fenses. Officers stop vehicles based
on traffic flow, staffing, and overall
safety. They must stop vehicles in
an arbitrary sequence, whether they


stop all vehicles or a specified por-
tion of them. Checkpoints offer a
The key aspect in visible enforcement method in-
both sobriety tended to deter potential offenders,
as well as to apprehend impaired
checkpoints and drivers. Agencies should set up
saturation patrols checkpoints frequently, over ex-
rests with public tended periods, and publicize them
awareness. well.
Sobriety checkpoints must dis-

Staff Lieutenant Greene serves with the


Ohio State Highway Patrol in Wilmington.
” play warning signs to approaching
motorists. Also, they normally will
provide opportunities for drivers to
actually avoid the checkpoint, usu-
ally with an alternate route that a

2 / FBI Law Enforcement Bulletin


driver could divert to after passing and take into account officer and saturation patrols. These efforts
the checkpoint warning signs. motorist safety. also must remain ongoing, not
Agencies typically post an officer Saturation patrols concentrate merely a onetime operation, to pro-
in a marked cruiser at each end of their enforcement on impaired driv- duce successful results, the same as
the checkpoint. These officers can ing behaviors, such as left of center, with sobriety checkpoint programs.
observe the driving behavior of following too closely, reckless driv-
those who choose to avoid the ing, aggressive driving, and speed- A Comparative Study
checkpoint. ing. Multiple agencies often com- Statistics compiled by two
Used to deter drinking and driv- bine and concentrate their resources agencies, similar in size and area of
ing, sobriety checkpoints are re- to conduct saturation patrols. responsibility, offer an overview of
lated more directly to educating the Therefore, planning represents a vi- the scope of the DUI problem.9 In
public and encouraging designated tal part of these efforts. All involved 2000, the Missouri State Highway
drivers, rather than actually appre- parties should participate in the Patrol conducted 58 sobriety check-
hending impaired drivers. Typi- planning phase, furnishing their points and arrested 323 drivers for
cally, sobriety checkpoints do not specific views and concerns. DUI. The Ohio State Highway Pa-
yield a large volume of DUI arrests. trol carried out 12 sobriety check-
Instead, they offer authorities an © brandXpictures points and arrested 77 drivers for
educational tool. Education and DUI. In 2001, Missouri effected 67
awareness serve as a significant part sobriety checkpoints and arrested
of deterrence. Frequent use of 318 drivers for DUI. Ohio imple-
checkpoints and aggressive media mented 19 sobriety checkpoints and
coverage can create a convincing arrested 126 drivers for DUI. Since
threat in people’s minds that offic- 1989, the Ohio State Highway Pa-
ers will apprehend impaired driv- trol has participated in 156 sobriety
ers—a key to general deterrence. In checkpoints and arrested 807 driv-
addition, public opinion polls have ers for DUI.
indicated that 70 to 80 percent of In the past 2 years, the Missouri
Americans surveyed favored the in- State Highway Patrol conducted
creased use of sobriety checkpoints 822 saturation patrol operations, ar-
as an effective law enforcement tool resting 1,666 drivers for DUI. The
to combat impaired driving.8 Ohio State Highway Patrol per-
forms saturation patrols on a regular
Saturation Patrols Saturation patrols may afford a basis across the state. The agency
Saturation patrols involve an more effective means of detecting arrests an average of 25,000 DUI
increased enforcement effort target- repeat offenders, who are likely to drivers per year through all DUI-
ing a specific geographic area to avoid detection at sobriety check- related operations.
identify and arrest impaired drivers. points. These patrols also may more In another example, from 1994
This area always is much larger effectively impact a specific to 1995, Tennessee, in cooperation
than the location chosen for a sobri- geographic location with a history with the National Highway Traffic
ety checkpoint. However, site selec- of a high number of alcohol- Safety Administration, imple-
tion proves vital in both sobriety related crashes. They must en- mented a statewide campaign com-
checkpoints and saturation patrol hance people’s perceptions of being pleting nearly 900 sobriety check-
initiatives. Some states require detected to be effective. Therefore, points. Law enforcement agencies
documentation as to why a specific saturation patrols require the same conducted these in all 95 counties in
location was chosen. Selected sites intense media attention as sobriety Tennessee in just over 1 year. The
should have a statistically high inci- checkpoints. In addition, prosecu- checkpoint program was highly
dence of DUI crashes or fatalities tors and judges must support publicized and conducted basically

January 2003 / 3
every week. The evaluation of the general deterrence if their activities enforcement and publicity cam-
program revealed it as highly favor- are publicized and become widely paign aimed at impaired drivers.
able in reducing the number of alco- known. The campaign was deemed a suc-
hol-related fatal crashes. Although Critics have pointed out that so- cess, indicating “drivers with blood
the program only netted 773 arrests briety checkpoints produce fewer alcohol levels at or above 0.08 per-
for DUI, the deterrent factor created arrests per hour than dedicated pa- cent declined from 198 per 10,000
by the continuous use of the check- trols, but some studies show arrest before the program to 90 per 10,000
points and the media attention re- rates can be increased greatly when after the intensive 3-week alcohol-
ceived resulted in the program’s police employ passive alcohol sen- impaired publicity and enforcement
success.10 sors (i.e., devices that can measure campaign.”12
What do these statistics con- the alcohol content in the air, which
vey? Basically, Missouri averaged officers can use while talking to a Other Factors
about five DUI arrests per check- motorist passing through the check- Is public awareness and educa-
point, Ohio averaged less than point) to help detect drinking driv- tion important? The key aspect in
seven DUI arrests per checkpoint, ers. However, focusing on arrests is both sobriety checkpoints and satu-
and Tennessee’s aggressive check- ration patrols rests with public
point program averaged less than awareness. The perception of a


one DUI arrest per checkpoint.11 higher risk of detection for driving
What these figures do not show under the influence of alcohol may
is the number of impaired drivers Saturation deter more people from driving af-
deterred by the operations, either patrols...constitute ter drinking. The more the public
through sobriety checkpoints or a vigorous tactic understands the issues and severity
saturation patrols. Those statistics of the consequences, the better they
never will be clearly identified, but
employed by law will accept drunk driving as a prob-
any lives saved by such efforts enforcement agencies lem and will embrace a crusade to
are worth the effort and resources to significantly impact reduce occurrences. Indeed, agen-
allocated. an area known for cies must have public support to
What also is not accounted for a high concentration succeed.
in these statistics is the additional of alcohol-impaired All law enforcement agencies
number of other enforcement ac- must accept that the media plays a
tions taken, such as safety belt,
drivers. vital role in combating impaired


commercial vehicle, and child drivers. They must use all outlets
safety seat arrests; speeding viola- possible to spread the word about
tions; warnings for various traffic this needless tragedy that happens
infractions or vehicle defects; and a misleading way to consider the every day. All media entities are
motorist assists. Detecting such ad- value of checkpoints. The purpose looking for stories. By working
ditional violations is more probable of frequent checkpoints is to in- closely with them, agencies can get
during saturation patrols, as op- crease public awareness and deter the message out about the dangers
posed to sobriety checkpoints. This potential offenders, resulting in the of drunk driving. The sooner agen-
alone could represent another mea- ideal situation where very few of- cies realize the importance of the
sure of effectiveness of saturation fenders are left to apprehend. media, the sooner they will gain a
patrols. Sobriety checkpoint programs valuable ally in their fight. Agen-
Overall, measured in arrests per in Florida, North Carolina, New cies can garner a great deal of sup-
hour, a dedicated saturation patrol Jersey, Tennessee, and Virginia port from the public when they
is the most effective method of ap- have led to a reduction in alcohol- speak out on this vital issue.
prehending offenders. Such con- related crashes. In 1995, North Are stricter laws and sanctions
certed efforts also may serve as a Carolina conducted a statewide working? Twenty-seven states and

4 / FBI Law Enforcement Bulletin


the District of Columbia have re- in reducing the number of impaired It is proven that saturation ef-
duced their blood alcohol content drivers. Law enforcement agencies forts will bring more DUI arrests
(BAC) threshold to .08 percent may find that only one of these than sobriety checkpoints. If that
from .10 percent in another effort to works for them, depending upon re- represents an agency’s goal and it
reduce the number of alcohol-re- sources. Others may determine a has the resources, then it should use
lated crashes. The federal govern- combination of both is needed to saturation patrols. If an agency’s
ment also has adopted the standard successfully combat the problem in goal weighs heavier on the educa-
of .08 percent BAC, encouraging their communities. Regardless of tional side, it should use sobriety
states to change to .08 percent. In the selected method, it remains es- checkpoints. If an agency should
2003, states that have not adopted sential to identify the specific keys choose to use checkpoints over
the .08 percent standard will lose to removing more impaired drivers saturation patrols, the evidence is
millions of federal dollars for road from U.S. highways, including— clear that infrequent use is not ef-
construction. Currently, 22 states • exposing a sufficient number fective. So, an agency must con-
have the BAC threshold of .10 per- of motorists to the enforce- sider the cost incurred with the fre-
cent, Ohio included. Studies by the ment efforts and the likelihood quent use of sobriety checkpoints.
Centers for Disease Control and of being arrested; Resources (time and money) may
Prevention’s National Center for greatly affect an agency’s decision
• improving officers’ skills in
Injury Prevention and Control in- regarding which method to employ.
detecting impaired drivers;
dicated, on average, that states If an agency’s goal is to reduce
adopting .08 percent have reduced © Digital Stock the number of impaired drivers over
crash deaths involving alcohol by 7 time, it should use both sobriety
percent.13 checkpoints and saturation patrols,
Administrative license suspen- as well as any other available meth-
sion laws continue to become more ods. The bottom line is to do some-
aggressive, attempting to create a thing—do everything—to remove
stronger deterrent environment. Es- impaired drivers from America’s
timates have indicated that they re- highways.
duce driver involvement in fatal
crashes by about 9 percent.14 Some Conclusion
laws providing for the suspension Law enforcement agencies
or revocation of licenses have indi- should not accept mediocrity in the
cated a reduction in the subsequent area of driving under the influence
crash involvement of those drivers enforcement. It is not a societal
who previously have been con- problem. It is everyone’s problem,
victed of an alcohol-related offense. • implementing an aggressive, and no one should take it lightly.
Although it is known that many sus- continuous, and committed More people die or are injured
pended drivers continue to drive, media effort; on this nation’s highways due to
they tend to drive less and possibly impaired driving than from all other
more carefully, attempting to avoid • continuing efforts by legisla- causes combined. It is unaccept-
detection. tures and courts in an attempt able, and all Americans pay a price,
to consistently punish violators whether personal, financial, or
Recommendations and deter impaired driving; professional.
While many conclusions can be and Law enforcement agencies
drawn from an analysis of sobriety • identifying problem areas, must take up the challenge and em-
checkpoints and saturation patrols, high-level crash locations, and ploy every available weapon to
both serve a significant purpose large volumes of impaired combat this deadly threat. This is a
and, used together, can be effective drivers. “mission possible.” Through better

January 2003 / 5
education, increased awareness, Against Drunk Driving,” Criminal Justice 20, 2002, from http://www.ncadd.com/tsra/
Funding Report (Arlington, VA: Capitol City abstracts/035.html.
and some strict penalties, the battle 8
Publishers, July 3, 2002), 4-5. Mothers Against Drunk Driving, Sobriety
can be won. Working in collabora- 2
The author based this article on research Checkpoints: Facts and Myths; retrieved on
tion with one another, the public, he conducted and a paper he composed for a January 20, 2002, from http://www.madd.org/
the law enforcement community, course while attending Northwestern Univer- madd_programs/0,1056,1229,00.html.
9
and the judicial system can help sity, School of Police Staff and Command. For all Missouri statistics, see Robert
3
Mothers Against Drunk Driving, Statistics Stieffermann, Missouri State Highway Patrol,
prevent the needless loss of life that and Resources; retrieved on January 20, 2002, Progress on Strategic Planning Priorities-
results from drunk driving. “When from http://www.madd.org. Statistics, February 11, 2002. For all Ohio
people are knocked away one at a 4
Ohio State Highway Patrol, “Sobriety statistics, see Ohio State Highway Patrol, Office
time, it doesn’t make the headlines Checkpoints,” Monthly News Article (2001); of Field Operations, Sobriety Checkpoint
retrieved on January 20, 2002, from http:// Statistics, January 23, 2002.
like it should, but we’ve got to make www.state.oh.us/ohiostatepatrol/enforce/ 10
Fell, Jones, and Lacey, National
Americans realize the fact that it’s sobch.html. Commission Against Drunk Driving, The
still the number one killer, and it’s 5
Dekalb County, Georgia, Police Depart- Effectiveness of the “Checkpoint Tennessee”
ment, Strategic Traffic Accident Reduction Program (1996); retrieved on January 20, 2002,
100 percent preventable. This is one
Team Report: Deterrence and Enforcement; from http://www.ncadd.com/tsra/abstracts/043/
thing that we can all work together retrieved on January 22, 2002, from http:// html.
to do something about.”15 www.cyberlinkexchange.usww.com/ 11
Supra notes 9 and 10.
12
homepages/starteam/dui-qu.htlm. Supra note 5.
6 13
Ibid. J.C. Fell, Insurance Institute for Highway
Endnotes 7
Paul Blowers and Jack Stuster, National Safety, Status Report (Arlington, VA, June
1
Millie I. Webb, former national president Commission Against Drunk Driving, 2001), 6.
14
of Mothers Against Drunk Driving (MADD), Experimental Evaluation of Sobriety Check- Supra note 5.
15
quoted in “Advocates Seek to Rejuvenate Fight point Programs (1995); retrieved on January Supra note 1.

The Bulletin’s
E-mail Address

T he FBI Law Enforcement Bulletin staff invites


you to communicate with us via e-mail. Our
Internet address is leb@fbiacademy.edu.
We would like to know your thoughts on
contemporary law enforcement issues. We
welcome your comments, questions, and
suggestions about the magazine. Please
include your name, title, and agency
on all e-mail messages.
Also, the Bulletin is available
for viewing or downloading on a
number of computer services,
as well as the FBI’s home page.
The home page address is
http://www.fbi.gov.

6 / FBI Law Enforcement Bulletin


Police Practice
Amnesty Boxes An amnesty box is a sealed
container positioned immediately
A Component of Physical before a metal detector or search
Security for Law Enforcement checkpoint that allows individuals
By Charlie Mesloh, M.P.A., Mark Henych, M.S., to discard any item of contraband
and Randy Mingo, M.P.A., M.S. inside it without fear of detection or
arrest. The military and international
airports have used this concept for
decades. Could this concept work in
social events where large numbers
of people in attendance present a
security challenge? Such events as
sports competitions, concerts, and
graduations traditionally draw large
audiences and create any number of
possible security issues. These may
manifest as threats, assaults, or
simply the possession and use of
paraphernalia considered contra-
band. In light of recent tragedies,
the law enforcement community
may want to extend the use of the
amnesty box concept into other
areas and make it an integral part
of physical security measures.
ONE UNIVERSITY’S
EXPERIENCE
In response to the recent terror-
ist attacks and the potential for
further reprisals, the University

I n response to the September 11, 2001, terrorist


activities, additional security measures have
sprung up nationwide. As a result, many libertarians
fear that civil rights will erode. Consequently, one
of Central Florida (UCF) and its police department
(UCFPD) went on alert. The heightened concern for
security increased when intelligence reports indicated
that further violent acts would occur at a concert to be
held on the UCF campus on September 29, 2001. The
feature of physical security, amnesty boxes, may intelligence gathered included death threats against
make these intrusions more palatable for civil rights law enforcement officers. To reduce the likelihood
advocates while, at the same time, providing addi- of related or unrelated violent acts, the university and
tional safety for those attending special events. In its police department implemented an amnesty box
addition to reducing the level of intrusiveness of those program as an additional physical security measure
being screened, amnesty boxes also can lessen the at the concert.
risk to law enforcement and contract security officers
working checkpoints by providing guilty individuals Implementation
with a nonconfrontational option to diffuse their In implementing the program, the UCF and the
impending detection. UCFPD examined the environment in which the

January 2003 / 7
amnesty boxes were to be located and conducted a The department placed shredded paper at the bottom
risk analysis. They considered several factors in the of the containers to absorb liquids poured into the
amnesty box placement. Initially, they conducted a boxes and to minimize the shock to any loaded
risk assessment of the environment focusing on access firearm dropped inside. A digital or video camera
to the main auditorium. Next, they examined existing aided in documenting the articles recovered from the
barriers and discussed inserting additional ones. Also, boxes. Miscellaneous items used included tape,
they studied previous incidents at the venue to rubber gloves, evidence collection items, paper
determine potential problems for future events. towels, hand disinfectant, and a tarp.
A narcotics detector canine swept the area 4
hours before the concert to locate contraband that Placement
anyone might have hidden around the arena. Although The police department placed the amnesty boxes
none was found, a noticeable effect occurred on at four locations near the highly visible main, and
those loitering in the area. A sweep by an explosive only, entrance to the arena. Large signs were posted
detector canine was proposed but rejected due to directly behind the boxes. Additional signs were
availability. located at the perimeter of
the main entrance indicat-
Cost ing that authorities would
The initial startup costs search attendees at the
were less than $100. The Amnesty Box Checklist entrance to the arena. As
bulk of the expenses went patrons moved closer to the
• Identify suitable containers to be used
for sign construction; the search area, they passed a
signs, however, are reusable • Conduct security sweep of event final “last chance” amnesty
and not cost recurring. To location to identify potential issues box.
offset these initial costs, • Implement sweep by narcotics and
program “buy in” included explosives detector canine Observations
the sponsoring event With the amnesty
• Obtain evidence-collection supplies
participants who appreci- boxes in place, both
ated the added security uniform and plainclothes
interest on their behalf and officers observed them. In
purchased the signs for the several instances, patrons
department. The signs measured 30" x 30," made passed the boxes and, upon observing the security
from white ˚-inch poster board with black and red searches at the entrance, either returned to their cars
warning letters 2 ˚" x 4" in size. Sign attachments or deposited items in the amnesty boxes.
would vary according to the containers in use. The Additionally, patrons attempted to conceal items
signs can be placed directly on the containers, on of contraband, including cameras, immediately
walls at eye level, or on plastic stands. The depart- behind or in the vicinity of the amnesty boxes,
ment did not use metal stands because they could presumably for later retrieval. Conducting area
become potential weapons in the hands of unruly searches before and after the event proves important,
patrons. especially with repeated amnesty box placement at a
Other materials used during the project included facility. Individuals may attempt to place contraband
30-gallon plastic trash containers with swing-type within the area prior to the event, thus defeating any
lids. Again, plastic is preferable to metal in the event type of precautionary search.
that the container becomes a weapon. The department
taped the lids to the base of the containers to prohibit Outcomes
removal or tampering. The depth of the container Once the flow of patrons to the concert ceased,
prevented anyone from reaching in to remove articles. UCFPD officers collected the amnesty boxes and

8 / FBI Law Enforcement Bulletin


transported them to a safe, secure area located out in CONCLUSION
the open to prevent any cave-in type of destruction In this time of increased vigilance for the security
should explosive devices be present in the boxes. The of all Americans, the law enforcement community
officers used a tarp to spread the contents of the needs to explore all available avenues of ensuring the
boxes. After examining the contents, officers placed public’s safety. In some instances, amnesty boxes can
some items into property and discarded others. An provide an ideal, low-cost complement for a security
inventory of seized items included 24 disposable plan.
cameras, 4 small sealed bottles of liquor, 3 folding The University of Central Florida and its police
lock-blade knives, 3 cigars containing marijuana, 2 department found these devices helpful during a
packages of rolling papers, 2 small plastic bags of concert held on campus shortly after the tragic events
marijuana, 1 marijuana pipe, 1 fake Florida drivers of September 11, 2001. The amnesty boxes related
license, numerous open directly to the “funnel-
containers of alcoholic ing effect” of the crowd,
beverages, and several which eliminated
objects containing individuals from bring-
marijuana residue. ing contraband items
into the arena or con-
Benefits cealing such materials
Overall, the univer- within the area for later
sity and its police recovery. The amnesty
department observed boxes reduced confron-
several benefits from tations between officers
implementing the and patrons carrying
amnesty box concept at contraband. Because
the concert. First, with patrons have the oppor-
patrons not in possession tunity to discard such
of contraband when items, a buffer forms
officers searched them at giving citizens who
the arena entrance, the may, in times of intru-
likelihood of arrest decreased. Thus, the criminal sions to civil liberties, be concerned with their rights.
justice system benefitted as persons did not enter it, However, examination of the boxes at the earliest
thereby alleviating the potential strain on resources. appropriate time provides additional intelligence on
Also, the added safety and the presence of the am- the attendees with possible intrusive motivations. All
nesty boxes as a security measure may have served as in all, the university found the amnesty box concept
a deterrent effect, although such an effect certainly ideally suited to the challenge of providing security
would merit further research to validate this at a highly popular special event.
observation.
Mr. Mesloh, a former law enforcement officer and canine
Finally, the amnesty boxes increased law enforce- handler and trainer, currently is the administrative services
ment’s visibility at the concert. They allowed the coordinator at the University of Central Florida Police
police department the ability to engage in a venture Department in Orlando and is pursuing a Ph.D. in public
that reduced criminality and increased visibility with affairs. Mr Henych is a Ph.D. student and instructor at the
no negative aspects. In short, this effort was akin to University of Central Florida in Orlando. Lieutenant Mingo
community-policing initiatives that attempt to reduce serves with the University of Central Florida Police Depart-
the burden on the criminal justice system by minimiz- ment in Orlando and as an adjunct instructor in criminal
ing arrests. justice at the university.

January 2003 / 9
The
Business
Police
Academy
Commercial
Loss
Prevention
Through
Education
By GIANT ABUTALEBI ARYANI,
CARL L. ALSABROOK, and
TERRY D. GARRETT

D uring the past two decades,


many law enforcement
agencies successfully have
implemented citizen police acad-
emies (CPAs) for the mutual benefit
of their departments and the com-
munities they serve. Building on
© Corbis
this success, another innovative
community policing program, the
business police academy (BPA), CONCEPT The implementation of a BPA
has emerged. BPAs’ benefits to law The BPA, a cooperative educa- follows the same steps as beginning
enforcement agencies and business tional effort teaming law enforce- a CPA.2 Nonetheless, the BPA dif-
communities clearly outweigh the ment and the business community, fers in three major areas: the tar-
costs of their implementation and represents a different version of geted audience, the curriculum, and
operation. Although information on a CPA. A BPA strives to ensure the instructors.
how to implement and operate a a productive exchange of informa-
BPA is not as readily available as tion between businesses and law Audience
material on a CPA, the concepts are enforcement, which leads to an The targeted audience for a
similar. Agencies can apply the increased awareness of potential BPA is the business community
experience and lessons learned criminal activity and, as a result, within the respective jurisdiction.
from CPAs to BPAs in their to a reduction in crimes against Unlike the CPA, where students
communities. businesses.1 ideally represent a cross section of

10 / FBI Law Enforcement Bulletin


the community, the BPA only in- county officials, representatives Lectures should include dem-
cludes students who are members of from the local chamber of com- onstrations, facility tours, role-
the business arena, such as owners, merce, and officials from volunteer plays, and simulations, when ap-
managers, and employees. It en- organizations. Agencies should en- propriate. Videos, slides, audio cas-
compasses all commercial enter- courage graduates to display their settes, overheads, and posters serve
prises, such as retail stores, banks, graduation certificates at their as additional tools to aid in the
restaurants, garages, and office places of business to promote learning experience. Instructors
complexes. publicity for the BPA.3 A positive should relay first-hand experiences
BPA students should live or educational experience for bus- and allow enough time for ques-
work within the particular juris- iness representatives benefits both tions, which sustains the coopera-
diction, be at least 21 years of age, the agency and the business tive atmosphere. They should stress
and maintain a good standing in community. the cost of the respective types of
the community. Agencies should crimes against businesses and how
disqualify applicants with prior Curriculum to alleviate it. This emphasis serves
felony convictions. They should A CPA provides students with a the business community’s interest
select students from various types basic overview of diverse law en- of reducing the cost of running a
of businesses for the first BPA forcement topics.4 On the other business, and it keeps the audience
class, which will ensure maximum hand, a BPA seeks to reduce crimes attentive.
publicity and help in future BPA against businesses; therefore, the
recruitment as well. Agencies curriculum should cover, in-depth, Instructors
should accommodate business topics specific to the business com- A BPA requires a program co-
needs, such as location and sched- munity.5 Crimes covered include ordinator with program manage-
ule of classes and, at the end of the those commonly committed against ment tasks similar to a CPA’s.
academy, hold a graduation cer- businesses, as well as related However, the majority of CPA in-
emony for graduates’ families, information for understanding and structors work for the hosting police
agency administrators, city or responding to them. department and introduce their

Giant Abutalebi Aryani, School Sergeant Carl L. Alsabrook, Lieutenant Terry D. Garrett,
of Social Sciences, University of Community Services Unit, City of Uniformed Services Division, City of
Texas at Dallas, is an instructor Rockwall, Texas, Police Department Rockwall, Texas, Police Department
in the City of Rockwall Business is the coordinator of the City of serves as an instructor in the City of
Police Academy. Rockwall Business Police Academy. Rockwall Business Police Academy.

January 2003 / 11
Typical Curriculum of a 12-Week Business Police Academy
of the peace or small claims court
I. Administration and IV. Violent Crime judge to acquaint the audience with
the Cost of Crime • Business robbery such legal issues as the processes of
• Introduction and welcome • Bank robbery prosecution and restitution.
from the chief Representatives of major retail
• Kidnapping and hostage
• Administrative information survival stores with successful results on
and department overview pursuing shoplifting and decreasing
• Extortion
• Overview of business structure employee theft also can teach these
in the community subjects. Additionally, employees
V. Loss Prevention
• Crime statistics and reporting from the Secret Service can teach
• Suspicious persons and
• The economics of crime situations
students about counterfeiting, and
the FBI can instruct on bank rob-
• Business crime watch
II. Agency Operations and bery and kidnapping. Officers from
the Legal Process • Crime Stoppers nearby major law enforcement
• Patrol procedures • Citizens on patrol and other agencies with specialized units for a
• Communications volunteer programs variety of crime categories can edu-
• Criminal investigations • Security assessment cate the audience on topics, such as
• Crime scene preservation • Selection of private security embezzlement, identity theft, fenc-
ing, extortion, and organized crime.
• Criminal justice system
VI. Special Topics
Employees from other federal and
• Corrections state agencies, as well as specially
• Licensing and permits
trained citizen volunteers, can aug-
III. Property Crime • Bribery ment the available resource pool of
• Shoplifting and employee theft • Organized crime instructors.
• Scams and con games • Federal and state criminal
• Credit card fraud justice system and COSTS
agencies The costs of a BPA to the coor-
• Forgery and check fraud
• Emergency medical services dinating agency are minimal. The
• Embezzlement
• Special weapons and tactics agency charges academy students
• Identity theft tuition and application fees, which
• False alarm reduction
• Counterfeiting typically range from $20 to $100
• Personal safety, self-defense,
• Business burglary and citizen’s powers of per student. These funds should
• Fencing arrest cover material expenses, such as
binders, copies, handouts, and T-
shirts. The agency covers any addi-
tional material cost. However, the
local chamber of commerce or a
students to that agency’s officers.6 local chamber of commerce can business, such as a major retail
This may not prove the same with a deliver the overview of the area’s store, may serve as a sponsor and
BPA, especially with small and business structure. Economic or help alleviate some of these costs.
midsize agencies. The nature and criminal justice academicians fa- Labor represents the bulk of the
depth of the covered classes require miliar with the jurisdiction may costs incurred by the agency.
agencies to recruit expert individu- present issues, such as crime statis- Department officials can decide
als outside of the department to tics and reporting, as well as the whether to pay their officers
maintain the quality of lectures and economics and cost of crime. overtime or grant compensatory
to help the academy achieve its Agencies can invite district attorney time for assuming teaching duties.
goal. For example, officials of the representatives and the local justice Instructors from the chamber of

12 / FBI Law Enforcement Bulletin


commerce and business commu- because the store would make about will survive violent incidents; and
nity, academicians, and citizen vol- $1,000,000 in profits per month. increases the probability of arrest-
unteers typically donate their time. This attitude is counterproductive; ing offenders. In the long run, these
Officers and representatives from it causes some businesses to deny factors lower rates of crime against
other departments either volunteer problems and to let criminal inci- businesses. But, in the short term,
their time or receive compensatory dences go unreported. The BPA the greater number of reports and
time from their respective agencies. helps to reverse this attitude and apprehensions will lead to a statisti-
The use of city or county news- reduce investigation time as coop- cally higher rate of crime against
letters and official agency press re- eration from the business commu- businesses. However, many crimes
leases can minimize the cost of pro- nity increases. against businesses, such as check
motional advertisement. Addition- and credit card fraud, business bur-
ally, word of mouth is an effective glary, and counterfeiting, are com-


and inexpensive advertising tool. mitted by serial criminals. Their ap-
Although unlikely, potential liabil- prehension and prosecution will
ity costs from accidents exist de- Law enforcement significantly decrease the number
spite signed liability waivers. Thor- accrues both direct of such crimes in the community
ough instruction before equipment and further lower the crime rate in
demonstrations, role-plays, and
and indirect benefits the long run. Moreover, the short-
simulations decreases these risks. from a BPA. run statistical increase in crime


against businesses gives the agency
BENEFITS a more accurate picture of crime
Law enforcement accrues both incidences. Departments can de-
direct and indirect benefits from a A BPA familiarizes the busi- velop appropriate strategies and al-
BPA. An enormous direct benefit is ness community, in-depth, with the locate resources needed to fight
the reduction of the workload of an different crimes commonly com- crime, which leads to a decrease in
agency’s investigators. Many mitted against businesses. Students the rate of crime against businesses.
investigators can recount their learn how to prepare for, detect, act, Indirectly, the agency benefits
frustrations over business owners react, and prevent crimes against from enhanced ties to the business
or managers unwilling to aid in businesses. They learn the impor- community, which results in a safer
criminal investigations. Business tance of pursuing crimes committed business climate or, at least, the per-
representatives often cite fears of against them and their businesses ception of one. The agency’s repu-
potential civil liabilities, as well as and not to simply accept their losses tation in the business community
a lack of knowledge about the pro- or rely on their insurance coverage. increases, which potentially can
cess and length of the criminal pros- Instructors from the local prosecu- lead to tangible business support of
ecution. For example, one store tor’s office address students’ fears various agency initiatives and pro-
manager of a nationwide retail store about potential civil liabilities, grams. Business assistance may in-
in a wealthy suburban community which include filing a complaint to clude sponsorships for different
admitted that checking for identifi- the actual prosecution and, in the agency volunteer programs. Other
cation of customers who pay with best case scenario, to the convic- examples include business support
checks or credit cards is too time tion, sentencing, and restitution for agency resource requirements
consuming, especially at the peak of phase. and bond issues.
the Christmas holiday shopping Further, implementing the ad-
season. This manager openly hy- vice and practices learned at the CONCLUSION
pothesized to investigators that BPA reduces the likelihood of busi- Business police academies
profits would compensate for losses nesses being victimized; increases bring the business community and
even if his store suffered $100,000 the probability that business own- police agency together. The acad-
in losses per month due to fraud ers, managers, and staff members emy’s educational environment

January 2003 / 13
gives law enforcement personnel an and convince business owners, Enforcement Bulletin, September 1985, 5-7;
Martin Alan Greenburg, “Citizen Police
ideal opportunity to communicate managers, and staff about the multi-
Academies,” FBI Law Enforcement Bulletin,
with members of local businesses. tude of mutual rewards that both August 1991, 10-13; Giant Abutalebi Aryani,
Agencies carefully should select sides will derive from greater coop- Terry D. Garrett, and Carl L. Alsabrook, “The
their target audience, provide a cur- eration in fighting crimes against Citizen Police Academy: Success Through
riculum that covers topics specific businesses. In the end, the reduced Community Partnerships,” FBI Law Enforce-
ment Bulletin, May 2000, 16-21; and Elizabeth
to members of the business commu- crime rate proves beneficial to the M. Bonello and Joseph A. Schafer, “Citizen
nity, and choose instructors from whole community. Police Academies: Do They Do More Than
individuals outside of their depart- Entertain?” FBI Law Enforcement Bulletin,
ments to ensure that the BPA ac- November 2002, 19-23.
Endnotes 3
Supra note 1.
complishes its goal. Additionally, 1
See Dave Hurdle, Bunbury District
4
Supra note 2 (Aryani, Garrett, and
the costs of implementing and oper- Police, Western Australia, “Business Police Alsabrook).
ating a BPA are minimal compared Academy,” retrieved on July 25, 2002,
5
Ocala, Florida, Police Department,
retrieved on July 25, 2002, from Business
with its direct, as well as indirect, from http://www. ezefind.com.au/
Police%20Business%20Academy.htm. Police Academy, http://www.ocalapd.com/
benefits. 2 opd_programs.html.
For more information on CPAs, as well as
The BPA provides law enforce- their implementation, see Ronald E. Ferguson,
6
Supra note 2 (Aryani, Garrett, and
ment with an opportunity to teach “The Citizen Police Academy,” FBI Law Alsabrook).

Subscribe Now

14 / FBI Law Enforcement Bulletin


Book Review

American Values in Decline: What Can private industry, and individual fraud. He empha-
We Do? by William M. Fox, 1st Books Library, sizes that conscientious people of principle should be
Bloomington, Indiana, 2001. selected to serve without fear or favor from others in
American Values in Decline: What Can We Do? the political arena and that this standard of selection
reviews the trends contributing to America’s decline would impact many areas, ranging from welfare and
in values involving the ideas, customs, and institu- campaign donations to budgeting and contracts.
tions that define what is moral, as well as what con- Third, the author considers the core values in the
stitutes right and wrong behavior. It considers the administration of justice and what can be done,
conscious development of failure, the predisposition ranging from examining the ethical responsibilities
toward inappropriate behavior, and what can be done of prosecutors and defense attorneys to correcting
to maintain the greatness of America and its people the misdirection in the rehabilitation of criminals.
through obeying the laws and respecting the rights For example, in regards to lawsuits, he recommends
and property of others. placing caps on punitive damages to curb greed and
The author states that it is simplistic to assume protect people from unwanted penalties. Last, the
that by doing what is right is the result of knowing author examines the need for nurturing values in the
what is right, rather that various factors interact in business sector. He suggests developing and imple-
society to cause ethical behavior. He emphasizes menting adequate business policies and regulations,
that it does not take money or power to be kind to a eliminating deception and exploitation within and
friend or stranger, to stand by a loved one, or fight outside business, establishing attainable and work-
against injustice. It is not the big things in life that able programs, and creating and enforcing a strong
make up America’s history and freedoms as a nation, and positive code of business ethics.
but the small events, the everyday decisions that give Given the effectiveness of the numerous rem-
meaning to this nation’s future and the role that edies in each part of the book, many steps can be
values have on positive or negative behavior. taken to introduce and nurture core values. Some are
Genetic inheritance on the types of values acquired in the areas of the administration of justice, rehabili-
by people in the socialization process has impact on tation of criminals, political leadership, the chroni-
how basic core values are achieved. cally unemployed, and the strict ethical management
The book presents a candid approach to the of domestic and international business operations.
author’s research in tracing core values of honesty, Overall, the author asks, “Shall we have moral
loyalty, morals, and hard work in America from growth or future decline for our families, commu-
the time of the first settlers to the present day and nities, and nation?”
why these values have declined. As a free nation, All members at all levels in the criminal justice
America’s culture, beliefs, and way of life are being system should read this book because it offers a very
attacked and undercut by people indifferent or frank approach to many of the problems that Ameri-
actively hostile to the laws and core values that can society faces today. It also could benefit the mil-
make America a great and proud nation of people itary, research institutions, law and business schools,
willing to die for its protection. employment security commissions, and Congress, as
The power of values has a direct influence on well as behavioral and anger management training
positive behavior through first ensuring that all programs.
schools, public and private, are consistent with the
country’s core values and by reducing or eliminating Reviewed by
the erosion of standards and self-esteem in students Larry R. Moore
through the enhancement of teacher preparation and Certified Protection Professional
parental involvement. Second, the author addresses American Society for Industrial Security
ethics in political leadership, including government, Knoxville, Tennessee

January 2003 / 15
U.S. Immigration
Inspectors
Ambassadors and
Law Enforcers
By GENE M. SOPER

© PhotoDisc

T
he terrorist attacks of Sep- not only enforce the nation’s laws regulations. To accomplish these
tember 11, 2001, brought but also serve as the first Americans tasks, INS inspectors complete a
the importance of the U.S. many foreigners encounter. They rigorous 17-week training course
Immigration and Naturalization must determine the admissibility of that covers a variety of topics, such
Service (INS) to the forefront of the all persons at air, sea, and land ports as legal procedures (e.g., constitu-
American public’s attention. Prior of entry. They intercept human and tional law, conspiracy law, and U.S.
to that date, a great portion of the narcotic smugglers and can physi- Customs and U.S. Department of
general population had little knowl- cally search, without warrant, appli- Agriculture laws), behavioral scien-
edge of the brave men and women cants and their personal belongings. ces, physical and firearm training,
who protect U.S. borders. INS inspectors must ensure that for- and nonlethal control techniques.
Charged to, “in a timely and eign nationals enter the United
consistent manner, determine the States with proper documentation, Organizational Overview
admissibility of persons seeking en- verifying whether holders have au- The INS has many types of of-
try; deny entry to inadmissible thentic and current passports and fices located in the United States
aliens; enforce criminal provisions visas. They interpret laws and and abroad. 2 It has 33 district
against those who conspire to pro- clarify decisions to persons seeking offices in the United States and 3
mote illegal entry and stay; and de- entry into the country. They arrest, overseas. District offices, each
ter future illegal entry and stay in detain, parole, or deport persons ac- headed by a district director, en-
the United States,”1 INS inspectors cording to laws, instructions, or force immigration laws and provide

16 / FBI Law Enforcement Bulletin



certain immigration services and
benefits to residents of their spe-
cific geographic jurisdiction. INS ...INS inspectors
staff members collect applications, not only enforce the
conduct interviews, and answer nation’s laws but
questions at these offices. Some also serve as the
district offices have suboffices and
satellite offices determined, in part, first Americans
by the needs of INS customers. In many foreigners
addition to these offices, the INS encounter.


also divides the United States into
Border Patrol sectors responsible
for enforcing immigration laws.
Mr. Soper recently retired from the U.S. Immigration and Naturalization Service,
Three regional offices oversee where he served as an inspector, cares sustainment coordinator, and a member of
the work of the district offices and the Paso del Norte Port of Entry Collateral Intelligence Team in El Paso, Texas.
sectors. Three administrative cen-
ters, collocated with the regional of-
fices, implement administrative During the busiest days (Saturdays applicants requires alertness and at-
policy and deliver direct service to and holidays), more than 25,000 pe- tention to detail. Most applicants
their geographic areas. The INS es- destrians applied for admission into have lawful intentions, but some
tablished four service centers to the United States from Mexico at pose as impostors and others
handle mail, conduct data entry of the Paso del Norte port of entry, part present altered or counterfeit docu-
information, and process applica- of the total for the year of nearly 8 ments in their attempts to enter the
tions. It also has eight asylum of- million pedestrians for the entire United States. Because a need for
fices to help those individuals seek- district. The majority of these pe- unskilled laborers exists in the
ing shelter in the United States. To destrians entered the United States United States, many are lured by
facilitate the application process, to shop in stores in El Paso, but better-paying jobs. In addition, eco-
the INS uses application support others came with different agendas. nomical conditions, wars, and natu-
centers at various locations. On the Southwest land border, ral disasters cause many aliens to
All of these offices exist to sup- INS inspectors encounter several leave their homelands and seek ref-
port over 300 ports of entry in the different types of applicants uge in safer surroundings.
United States, including interna- throughout their normal tour of INS inspectors divide their
tional airports, land border ports, duty. Mexican nationals comprise duty time among processing immi-
and seaports. As an example, the the greater part of the applicants, grant visas, issuing permits, and
Paso del Norte port of entry in El but many other nationalities also questioning aliens. Inspectors
Paso, Texas, will illustrate how the apply for admittance, including handle prosecution cases and, due
INS protects America’s borders on U.S. citizens. With such large to changes in the law, remove or
a daily basis. amounts of people applying for en- deport certain aliens not admissible.
try, inspectors have just a few sec- Because several oppressive govern-
The Inspector’s Role onds to establish the validity and ments reign throughout the world,
Nearly 250 INS inspectors are genuineness of documents and pre- many people request political asy-
in the El Paso, Texas, district. senters. INS and U.S. Customs lum at American ports of entry.
During fiscal year 2000, these in- inspectors must make quick, on-the- These individuals fear that they will
spectors, along with U.S. Customs spot decisions pertaining to the ad- face jail, or worse, if forced to
personnel, conducted over 68 mil- missibility of applicants. Scrutiniz- return to their homeland. In the
lion inspections in 9 ports of entry.3 ing facial features and actions of El Paso district, the INS usually

January 2003 / 17
detains such applicants at its El check an individual’s name and must rely on their investigative and
Paso Processing Service Center un- date of birth for any prior criminal interviewing skills to ascertain the
til the individuals can speak with an history and also determine whether truth.
asylum officer. guns and vehicles are stolen. At pe-
In the El Paso district during destrian inspection lanes, an autho- Criminal Profile
fiscal year 2000, over 60 million rized person can log onto the IBIS The high volume of pedestrian
drivers and passengers crossed the and, together with a document traffic at major land ports of entry
border in their motor vehicles. With reader, guide an individual’s pass- offer cover to aliens attempting ille-
an emphasis on maintaining the port or alien card through the reader gal entry or reentry. Many criminal
flow of vehicular traffic north, in- to check for any illegal activity. aliens have prior arrests or convic-
spectors must check all vehicle oc- At vehicle inspection booths, INS tions for drug-related charges. INS
cupants and their documentation inspectors can query an individual’s inspectors generally intercept
promptly and accurately. Although name and date of birth or alien file criminal aliens, as well as U.S. citi-
watchfulness proves important, zens, by using the IBIS card readers
law enforcement computer systems and the IDENT. Law enforcement


also assist INS inspectors in their agencies throughout the United
daily efforts to protect America’s States input wanted persons and ju-
borders. venile runaways into these systems.
Concerns about INS inspectors at the Paso del Norte
Technological Resources terrorism continue port of entry consistently apprehend
INS has several computer data- to demonstrate the persons wanted by various law en-
bases available to authorized per- need for immigration forcement agencies and detain these
sonnel. The Central Index System, intelligence gathering subjects to confirm their extradi-
the master records management and analysis. tion. Once that occurs, the inspec-
system, collects and distributes bio- tors normally release the subjects


graphical information on aliens. It into the custody of the El Paso Po-
contains the physical status of alien lice Department.
files and is the foundation of infor- Danger lurks in every encoun-
mation for many functions pertain- number to check for any wanted no- ter as some of these criminals are
ing to the mission of the INS. The tifications or criminal activity. At armed. In addition, individuals un-
Interagency Border Inspection Sys- many land border entry points, INS der the influence of alcohol or other
tem (IBIS) represents the primary has installed license plate readers, drugs and people with mental
resource for apprehending criminal which speeds up the inspection illness can become uncooperative,
aliens. It resides on the Treasury process and gives advance warning argumentative, and sometimes
Enforcement Communications to inspectors (e.g., an alert banner violent. Inspectors have found
System, provides law enforcement flashes to indicate a stolen vehicle). weapons in vehicles and hidden
agencies access to the FBI’s Na- If the preliminary inspection war- on people attempting to enter the
tional Crime Information Center, rants further checks, INS personnel United States. Especially danger-
and permits users to interface with scan the suspect’s photograph and ous to inspectors and the general
all 50 states via the National Law fingerprints into the Automated public are the desperate port run-
Enforcement Telecommunications Biometric Fingerprint Identifica- ners who use their vehicles, usually
System. Besides the U.S. Customs tion System (IDENT), which loaded with illegal drugs, as lethal
Service, 19 other federal agencies searches two databases, Lookout weapons to barge past inspectors.
use the IBIS. and Recidivist, for a possible Bomb threats occur almost weekly
Through its terminals, ap- match. If the computer systems re- and result in closing the bridges un-
proved employees quickly can veal nothing, then the inspectors til bomb-sniffing dogs can examine

18 / FBI Law Enforcement Bulletin


the area. The El Paso Police Depart- members trying to help relatives at- high-quality documents that could
ment or the nearby military installa- tempt most of the alien smuggling. pass a cursory inspection to poor-
tion, Fort Bliss, normally supply INS inspectors generally find quality documents that contain ob-
these hardworking dogs and their people hiding in vehicles, behind vious flaws. However, increased
handlers. truck seats, and in trunks, but, computer technology makes docu-
sometimes, they locate individuals ment duplication better and easier
Drug and Human Smugglers in dashboards, gas tanks, under for counterfeiters.
Like many other American cit- floorboards, and in specially built The Internet offers bogus So-
ies, El Paso is a transportation hub. concealed compartments. cial Security cards, passports, and
It is a major crossing for railroads law enforcement identification.
and has several bus lines down- Document Fraud People can use these documents for
town. These means of transporta- Many criminals, terrorists, or immigration purposes or as substan-
tion provide quick and easy passage otherwise inadmissible subjects tiating evidence to support claims
for drug and human smugglers. The use fraudulent documents. INS in- of U.S. citizenship. In addition,
flow of illegal drugs into the United spectors encounter the illegitimate Web sites advertise information on
States persists. Traffickers will try how to order birth certificate tem-
any method to conceal the drugs © PhotoDisc
plates from all 50 states. The possi-
and attempt any means to avoid ap- bility of the Internet becoming a
prehension. Inspectors seize mari- major document supplier soon may
juana most often. Although inter- represent a real threat as people
cepting illegal drugs is a secondary learn of its potential. Moreover, in
function for INS inspectors, they the last few years, identity theft, or
commonly refer vehicles to U.S. assuming another person’s identity,
Customs personnel. Conversely, has become more prevalent and
not all drugs smuggled into this greatly concerns the INS.5 Obtain-
country arrive in vehicles. Inspec- ing a valid birth certificate repre-
tors find all sorts of illicit drugs sents the normal route to assuming
taped to people’s bodies. Some someone’s identity. Occasionally,
smugglers, known as body carriers, INS inspectors intercept an indi-
ingest drugs contained in protected vidual who possesses several docu-
pellets. Lured by the large potential ments issued under the assumed
profits, all sorts of people attempt to name, usually as some type of iden-
smuggle drugs into the United sale and rental of immigration tification bearing the subject’s pho-
States. Some smugglers bring their documents from Mexico and else- tograph and the assumed name.
families with them as cover, while where. Fraudulent documents gen- Many victims of identity theft have
others attempt entry alone. Faced erally fall into two categories, learned the hard way the impor-
with no readily identifiable portrait counterfeit or altered.4 Counterfeit- tance of protecting their Social Se-
of a drug smuggler, INS inspectors ing documents involves copying, curity number and other pertinent
must remain alert to the actions and forging, or imitating an original personal data. Identity thieves dam-
reactions of every person applying with the intent to deceive. Altering age credit ratings and cause finan-
for entry into this country. documents, on the other hand, cial hardships for their victims.
Alien smuggling also repre- entails changing one or more ele-
sents a lucrative business venture. ments of a genuine legitimate docu- INS Intelligence
Some reports put the price at be- ment without destroying the origi- Concerns about terrorism con-
tween $30,000 and $50,000 per per- nal document, again with the intent tinue to demonstrate the need for
son smuggled into the United to defraud. The quality of such immigration intelligence gathering
States. In the El Paso district, family documents varies greatly, from and analysis. Without performing

January 2003 / 19
intelligence activities, the INS can- Investigations Division, and the This dual and often-conflicting
not compete with organized crimi- New Mexico State Department of responsibility can burden even the
nals and terrorists. As the primary Safety. They attend these weekly most dedicated employee; however,
collectors of information, INS col- and monthly meetings to discuss a it also can provide a high-degree of
lateral intelligence officers as- variety of topics, including officer job satisfaction, whether introduc-
signed to ports of entry collect and safety, bomb threats, smuggling, ing a new arrival to the freedoms
disseminate information that per- and gang activities. and opportunities in the United
tains to terrorists, criminal aliens, Intelligence analysts evaluate States or intercepting a large quan-
smugglers, and identity thieves. the information gathered from the tity of illegal drugs bound for a
They produce alerts and distribute ports of entry for reliability and va- schoolyard. INS inspectors will-
reports documenting significant in- lidity. They also review the infor- ingly face both to protect not only
cidents, such as bomb threats, port mation for trends and patterns to U.S. citizens but also foreign
runners, and incidents involving provide INS managers with the visitors and new immigrants eager
weapons. They also compile quar- knowledge to make tactical, opera- to participate in the American
terly threat assessments that pro- tional, and strategic decisions. experience.
vide INS managers with the clarity
to formulate plans, policies, and At the time of publication, the status of


guidance for the future. The collat- the INS remained unknown. However,
eral intelligence officers predict because homeland security weighs
criminal activities and current and heavily upon all of America’s law
Without performing enforcement professionals, the FBI
future trends, create alerts on
wanted persons, and post advance
intelligence activities, Law Enforcement Bulletin offers this
the INS cannot article as a means of presenting the
warnings. They also conduct pre- crucial role that the INS has played in
liminary evaluations of information compete with the security of the United States and
and assist other law enforcement organized criminals to honor those officers killed and
agencies. For example, the officers and terrorists. assaulted while protecting this nation’s
disseminated a bulletin produced by borders.


the FBI that resulted in two INS
inspectors at the Paso del Norte port Endnotes
apprehending a suspected bank rob- 1
The INS mission statement, Inspections
ber. The intelligence officers also Conclusion Field Manual M-450.
2
For a complete description of the INS,
work closely with the local law en- The U.S. Immigration and access the agency’s Web site at http://
forcement community. Their assis- Naturalization Service has a long www.ins.usdoj.gov.
tance normally deals with alerts or and distinguished history of wel- 3
Annually, the INS compiles and publishes
posting “lookouts” of persons coming tourists, business travelers, data in the Statistical Yearbook of the
Immigration and Naturalization Service; view
wanted by the local authorities. In- and other temporary visitors to such reports at the agency’s Web site, http://
telligence officers assigned to the America at a variety of land, sea, www.ins.usdoj.gov.
Paso del Norte port of entry and air ports of entry. It also has 4
For additional information, see John M.
meet with representatives from the responsibility of administering Davis, “Passport Fraud,” FBI Law Enforcement
Bulletin, July 1998, 9-13.
the El Paso Police Department benefits, such as naturalization and 5
For additional information, see Matthew L.
intelligence unit, the El Paso permanent resident status on those Lease and Tod W. Burke, “Identity Theft: A
County Sheriff’s Office, the FBI, individuals lawfully applying to re- Fast-Growing Crime,” FBI Law Enforcement
the DEA, the Border Patrol, and the side in this country. Conversely, the Bulletin, August 2000, 8-13; and John Pollock
and James May, “Authentication Technology:
U.S. Customs. The officers also INS has the authority to apprehend New Levels in the Fight Against Identity Theft
meet with representatives from the and remove aliens who have en- and Account Takeover,” FBI Law Enforcement
U.S. Marshals Service, the Secret tered illegally or violated the re- Bulletin, June 2002, 1-4.
Service, the Army’s Criminal quirements of their stay.

20 / FBI Law Enforcement Bulletin


Bulletin Reports

Victims
Trafficking in persons is a crime in which foreign nationals are brought
to the United States under false premises to work in abhorrent conditions
with little or no compensation. Estimates suggest that as many as 50,000
victims are trafficked into the United States each year, but few actually are
detected. Isolated and vulnerable, victims often are coerced and intimidated
through physical detention and debt bondage, making it impossible for
them to report the crimes. Unfamiliar with U.S. laws, culture, and language
and relying on their traffickers’ accounts, victims often do not realize that
they can get help. Understanding the dynamics of trafficking, the available
resources, and the rights of trafficking victims can help organizations
identify victims and provide them with meaningful services. Trafficking in
Persons: A Guide for Non-Governmental Organizations (NGOs) discusses
benefits and services for which victims may be eligible, tools that NGOs
may use to assist victims in obtaining immigration relief, and federal
resources that can help victims of trafficking. This brochure, developed by
the U.S. Department of Justice in collaboration with the U.S. Department
of State, U.S. Department of Labor, and U.S. Department of Health and
Human Services, and a second brochure,
Information for Victims of Trafficking in
Persons and Forced Labor, are available
Juvenile Justice on the Office for Victims of Crime (OVC)
Web site at http://www.ojp.usdoj.gov/ovc/
The Bureau of Justice Assistance (BJA) intro-
publications/infores/tip.htm. A copy of
duces Promoting Safety in Schools: International
either brochure also is available from the
Experience and Action. This 68-page BJA mono-
OVC Resource Center at 800-627-6872.
graph (NCJ 186937) provides information on
school safety trends, policies, and projects from the
United States and abroad. It reports that successful
domestic and international approaches to school
safety tend to be built around four major principles: Bulletin Reports is an edited collection
a community-based approach; a focus on the school of criminal justice studies, reports, and
atmosphere, not just physical security or individual project findings. Send your material for
students; a partnership problem-solving model; and consideration to: FBI Law Enforcement
Bulletin, Room 209, Madison Building, FBI
the holistic use of multiple strategies, not just single
Academy, Quantico, VA 22135. (NOTE:
programs. It is available electronically at http:// The material in this section is intended
www.ncjrs.org/txtfiles1/bja/186937.txt or by con- to be strictly an information source and
tacting the National Criminal Justice Reference should not be considered an endorsement
Service at 800-851-3420. by the FBI for any product or service.)

January 2003 / 21
Research Forum
Ideation
Ideation motivates behavior for good or evil when
conscious or subconscious thoughts take precedence
as a result of intensity or frequency. Thoughts and
ideas do not constitute crimes, but they do serve as
the genesis for criminal behavior. However, not all
© Corbis
repetitive thoughts portend evil. Thoughts of becom-
ing a movie star, doctor, or firefighter inspire people
Universal Principles and can become self-fulfilling prophecies. Con-
of Criminal Behavior versely, compelling or nurtured thoughts of a nefari-
A Tool for Analyzing ous nature can result in criminal behavior.
Criminals ideate as they formulate and reformu-
Criminal Intent late plans to rob a bank, blow up a building, or avenge
By Joe Navarro, M.A. and John R. Schafer, M.A. a slight. Even criminals acting on impulse ideate,

A 39-year veteran detective of the Cleveland,


Ohio, Police Department watched two men
walk back and forth in front of a store window. They
however briefly. Ideation provides forethought that
enables people to regulate their behavior or serves to
rationalize criminal behavior. For the antisocial or
took turns peeking into the shop and walking away. psychopathic mind, ideation provides a value-free
After several passes, the two men huddled at the end forum within which to develop new ways to take
of the street and looked over their shoulders as they advantage of others or commit criminal acts. Ted
spoke to a third person. Concerned that the men Bundy, probably the most written-about psychopath,
intended to rob the store, the detective moved in, repeatedly ideated fantasies of sexual control and
patted down one of the men, and found a concealed domination. Bundy meticulously thought and re-
handgun. The detective arrested the three men, thought his plans to entice young women and subse-
thwarted a robbery, and averted the potential loss of quently murder them as he envisioned.3 Bank robbers,
life. This detective’s detailed observations became the embezzlers, street muggers, and other criminals plan
basis for the U.S. Supreme Court decision regarding and think about their crimes before they act. Ideation
stop and frisk.1 More important, the Court acknowl- manifests itself physiologically, verbally, nonverbally,
edged that criminals often communicate their inten- symbolically, and behaviorally.
tions prior to the commission of a crime. Ideation, a universal experience, presents itself
A broad analysis of unlawful activity reveals that differently for each individual depending on a variety
all criminal behavior shares a common set of univer- of internal and external factors, including personality
sal principles. These principles remain constant; traits and personality disorders. For example, such
however, they manifest differently for each individual criminals as John Wayne Gacey, the serial killer;4 Ted
depending on personality, criminal activity, and Kaczynski, the UNABOMBER;5 Timothy McVeigh,
extrinsic factors. The universal principles of the the Oklahoma City bomber; or Susan Smith, the
criminal behavior (UPCB)2 model does not focus on mother who drowned her own children,6 all shared
causal factors but, rather, provides a way to analyze one thing in common, ideation. They ideated con-
the constituent stages of criminal behavior. Investiga- sciously and subconsciously before they acted out
tors can use the UPCB model as a tool to analyze their crimes.
criminal behavior in its nascent stages. The UPCB,
a four-stage model, encompasses ideation, communi- Communication
cation, facilitation, and actualization. Understanding People continually communicate their conscious
the basic tenets of the UPCB model sensitizes law and subconscious thoughts physiologically, nonver-
enforcement personnel to the antecedent behaviors bally, and verbally. Calm thoughts lower the heart
that might signal future aberrant or criminal behavior. rate. Anxiety and fear cause the heart to race, speed

22 / FBI Law Enforcement Bulletin


up breathing, increase perspiration, or manifest in “colors” or monikers or by using complex hand
other forms of outward discomfort. Bored listeners signals. Skinheads shave their heads, render Nazi
nonverbally demonstrate inattentiveness, disregard, or salutes, and tout other white supremacist parapherna-
complete antipathy by rolling their eyes or crossing lia, outwardly communicating their hate. The em-
their arms while standing askance. Conversely, people blems and symbols that people choose or adopt
often tilt their heads to one side when they like provide bountiful insight into their thoughts long
someone or hear something favorable. Humans before the utterance of a single word.11
constantly emit nonverbal communications, which The written or spoken word also betrays inner
sometimes accurately betray innermost thoughts more thoughts and ideation. David Kaczynski recog-
often than the spoken word.7 “Casing” a store or nized the similarities between the personal corres-
stalking someone exemplifies behaviors that com- pondence he received from his brother and the
municate criminal intent. The same holds true for UNABOMBER’s published manifesto. This astute
terrorists who seclude themselves, conduct observation led to the arrest of Ted Kaczynski.12
countersurveillance, call from multiple pay phones, - Questions also betray the thoughts of the inquirer. For
or use only cash when operational. These behaviors example, the seemingly idle questions “What are the
communicate ideated thoughts. In the same manner, consequences of cheating?” “How much jail time do
individuals assigned to protection you get for shoplifting?” or “What
details look for the face in the are the ingredients of gunpow-
crowd that does not fit in or one der?” communicate ideation about
that suddenly changes expression.
Similarly, parents look for nonver-
bal “tells” when their children
misbehave.
“ A broad analysis
of unlawful activity
reveals that all
cheating, shoplifting, or making
bombs.
Facilitation
Psychopaths communicate criminal behavior Physical exertion provides the
ideation through their predatory shares a common set link between thought and action.
behavior. Perenially lying, con- Depending on the sophistication of
of universal
ning, manipulating, and changing the criminal and the complexity of
like a chameleon under varying principles. the criminal act, preparatory steps
circumstances, they live callously
shallow, glib lives and show little
stress and no remorse. They leave a
debris field of human suffering in their wake.8
” can range from simple to complex.
These actions, no matter how
stealthy, signal criminal intent to
an astute observer, such as the detective in the open-
Symbolic gestures and emblems also provide ing paragraph. Facilitation transforms ideation into
powerful communication. Raising the middle finger in behavior that draws criminals closer to acting out
the United States, a Nazi salute, or bearing one’s teeth their intentions. From purchasing explosives to
need no explanation. Symbolic emblems, such as stealing a car for a bank robbery to following the
clothing, hairstyles, jewelry, and cars, can reveal how travel routes of an intended assassination victim,
people feel about themselves and others.9 Some these all facilitate and communicate, in many ways,
people use such emblems as tattoos to communicate what the person is ideating. In some instances,
their thoughts, values, and lifestyles. John “Bill” criminals conduct formal or informal practice sessions
King, who dragged James Byrd, Jr., to his death before the actual commission of a crime, thus provid-
behind his truck in rural Texas, dramatically scripted ing an observer with additional opportunities to detect
his hatred of blacks in the form of tattoos on his arms criminal intent. Purchasing a weapon, testing explo-
for all to see.10 Others use bumper stickers to broad- sives, or taking steps to avoid detection after the
cast their beliefs on abortion, gun control, and other crime, such as alibi creation, further facilitate the
subjects. Gangs communicate loyalty by wearing intended criminal act.

January 2003 / 23
Actualization intervention. Police officers no longer need to rely
The criminal act completes the transmutation of solely on intuition to prevent crime. The UPCB
an idea to action and usually reflects the criminal’s model, when combined with good observation and
intellect and personality. Personality and psychologi- analysis, forms the foundation for effective crime
cal disorders often manifest during the criminal act prevention and intervention strategies.
and provide investigators with valuable clues to the By identifying the component parts of criminal
identity of the perpetrator.13 Throughout facilitation behavior, law enforcement officers and interested
and actualization, individuals continue to transmit observers more reliably can predict antecedent
thoughts physiologically, nonverbally, and even behavior before a crime takes place. The fruits of this
verbally depending on the circumstances. Under approach have beneficial and long-lasting conse-
stress, anxious criminals often fail to recognize their quences for all.
own nervous or odd behavior, which signals an
eminent criminal act to the knowledgeable observer. Endnotes
1
Terry v. Ohio, 392 U.S. 1 (1968).
Practical Application of the UPCB Model 2
SA Joe Navarro, M.A., “Utilizing the Universal Principles of
The UPCB model helps law enforcement officers Criminal Behavior,” lecture at Saint Leo’s University, Saint Leo, Florida,
School of Criminology, October 14, 2000.
analyze and prevent criminal behavior. Parents, 3
Robert K. Ressler and Tom Shachtman, Whoever Fights Monsters
teachers, coworkers, and friends often note behavior- (New York, NY: St. Martin’s Press, 1992), 72-73.
changing ideation before the 4
Eric W. Hickey, Serial Murderers and
commission of a crime. By apply- Their Victims, 2nd ed. (Belmont, CA:
Wadsworth Publishing Co., 1997), 170-72.
ing the UPCB model, individuals


5
Evan Thomas, et. al., “Probing the Mind
often can track the development of a Killer.” Newsweek, April 15, 1996, 32-39.
and progression of nefarious ...the UPCB model 6
The Washington Post, July 26, 1995, sec.
thoughts and ideas. Armed with can assist crime A, p.
7
7.
Mark L Knapp and Judith A. Hall,
this knowledge, school administra- scene analysts and Nonverbal Communication in Human
tors, workplace supervisors, and investigators when Interaction, 4th ed. (Orlando, FL: Harcourt
law enforcement authorities can Brace, 1997), 24-25.
take steps to intervene prior to the
retracing...the 8
Supra note 4, 66.
commission of the ideated criminal progression of a 9
David G. Givens, The Nonverbal

act. crime. Dictionary of Gestures, Signs & Body


Language Cues (Spokane, WA: Center for


From an analytical perspec- Nonverbal Studies, 1998-2002); http://
tive, the UPCB model can assist members.aol.com/nonverbal2/diction1.htm
10
Joseph L. Galloway and Bruce Selcraig,
crime scene analysts and investiga- “Into the Heart of Darkness,” U.S. News and
tors when retracing, step by step, the progression of a World Report, March 8, 1999, 18-20.
crime. The UPCB model also can assist investigators 11
Jack Schafer and Joe Navarro, “Hate Unmasked: A Practical Model
by providing a behavioral map to identify dormant for Understanding and Dealing with Hate Groups,” Chicano-Latino Law
Review, UCLA School of Law 21:201 (Spring 2000).
leads, witnesses, or even evidence. 12
Supra note 5.
13
Supra note 4, 256.
Conclusion
Criminals, regardless of their circumstances, think Special Agent Navarro serves in the FBI’s Tampa, Florida,
about the crime that they intend to commit, communi- office and also as a member of the FBI’s National Security
cate their ideations or intentions, prepare to carry out Division’s Behavioral Analysis Program. Special Agent
the crime, and, finally, commit the crime. Each stage John R. Schafer is assigned to the FBI’s Lancaster,
in the universal principles of criminal behavior California, office and also serves as a member of the FBI’s
National Security Division’s Behavioral Analysis Program.
model affords an opportunity for observation and

24 / FBI Law Enforcement Bulletin


Legal Digest

Warrantless Interception
of Communications
When, Where, and Why It Can Be Done
By RICHARD G. SCHOTT, J.D.
© Corbis

L aw enforcement officers of-


ten desire to intercept and
record conversations of the
subjects of their investigations. De-
of warrants or court orders.1 Two
points are important to remember.
First, when practicable, officers al-
ways should seek warrants or court
Fourth Amendment2 and statutory
ramifications must be considered.
INTERCEPTION
UNDERTAKEN WITH THE
fendants’ recorded words can be the orders authorizing their intercep-
strongest evidence obtained against tions of conversations. Second, CONSENT OF ONE PARTY
them. Law enforcement officials state and local officers must be The use of confidential infor-
are permitted to intercept, record, aware that constitutional and statu- mants, cooperating witnesses, and
and use these conversations as evi- tory requirements for interception undercover agents is one of the
dence, provided the interception is may be different (and more restric- most effective and controversial
accomplished lawfully. For this rea- tive) in their states. tools available to law enforcement.
son, it is important for criminal in- The warrantless recording of a Investigators frequently obtain oth-
vestigators to understand when, subject’s conversation falls into one erwise unobtainable evidence by
where, and, most important, why of two categories: those made with using these individuals. Often, the
conversations may be legally inter- the consent of at least one of the evidence obtained by informants,
cepted and recorded. This article parties involved in the conversation cooperating witnesses, and under-
addresses situations in which fed- and those recorded without the con- cover agents comes in the form of
eral agents are permitted to record sent of any of the parties involved in verbal statements made by criminal
conversations without the authority the conversation. In both cases, subjects. Investigators generally are

January 2003 / 25

statements.”8 However, in his ma-
jority opinion, Justice Potter
...officers always Stewart pointed out that Hoffa was
should seek not relying on the security of his
hotel room to keep information
warrants or court from the government; rather, “he
orders authorizing was relying upon his misplaced
their interceptions confidence that Partin would not re-
of conversations. veal his wrongdoing.” 9 Simply
stated, the Court declined to apply

Special Agent Schott is a legal instructor at the FBI Academy. ” Fourth Amendment protection to a
“wrongdoer’s misplaced belief that
a person to whom he voluntarily
confides his wrongdoing will not
reveal it.”10
Three years prior to the Hoffa
able to employ this method of evi- told federal agents that Hoffa was decision, the Supreme Court ad-
dence-gathering without violating attempting to bribe members of the dressed a similar issue involving a
either the subjects’ Fourth Amend- jury in his case, they asked him to subject’s misplaced confidence in
ment rights to be free from unrea- report any evidence of the bribery. an Internal Revenue Service agent
sonable searches and seizures,3 or Partin reported information to the whom he attempted to bribe. In
their statutorily created rights, re- agents that he was told, or over- Lopez v. United States,11 however,
gardless of where the intercepted heard, while in Hoffa’s hotel suite the agent not only testified at trial,
communications are uttered. during the course of the trial. When but also introduced surreptitious re-
Hoffa subsequently was prosecuted cordings of the conversations that
Fourth Amendment for bribing members of the prior he had with the defendant wherein
Considerations trial jury, he sought to suppress the defendant offered the bribes.
It has long been recognized that Partin’s testimony as a violation of, The issue confronting the Court in
the Fourth Amendment protects among other constitutional provi- 1963 was whether the recordings
people, rather than places.4 How- sions, his Fourth Amendment were admissible against the defen-
ever, the Fourth Amendment does rights. Hoffa argued that “Partin’s dant Lopez.
not apply to the situation in which failure to disclose his role as a gov- The Court distinguished the
subjects speak about criminal acti- ernment informer vitiated the con- surreptitious recordings made in
vity to, or in the presence of, in- sent that [Hoffa] gave to Partin’s this case from the more traditional
dividuals cooperating with law en- repeated entries into the suite and “‘electronic eavesdropping’...when
forcement. The Supreme Court that by listening to [Hoffa’s] state- devices have been used to enable
made clear in Hoffa v. United ments Partin conducted an illegal government agents to overhear con-
States5 that the use of informants to ‘search’ for verbal evidence.”6 versations which would have been
capture the contents of conversa- At the outset of its analysis, beyond the reach of the human
tions with the subjects of investiga- the Supreme Court recognized that ear.”12 Because the agent was a
tions does not violate those sub- a “hotel room can clearly be the party to the recorded conversations,
jects’ Fourth Amendment rights. object of Fourth Amendment there was no Fourth Amendment
In 1962, James Hoffa was on protection as much as a home or violation that would warrant exclu-
trial in Nashville, Tennessee, ac- an office.”7 Furthermore, “the pro- sion of the tapes. In 1971, the Su-
cused of violating a provision of the tections of the Fourth Amendment preme Court reiterated this point by
Taft-Hartley Act. When Eddie are surely not limited to tangibles holding that “[i]f the conduct and
Partin, an acquaintance of Hoffa, but can extend as well to oral revelations of an agent operating

26 / FBI Law Enforcement Bulletin


without electronic equipment do more important to the Tenth act governs the interception of
not invade the defendant’s constitu- Circuit’s rejection of Longoria’s wire, electronic, and oral communi-
tionally justifiable expectations of contention was the ever-increasing cations by the government and pri-
privacy, neither does a simulta- multilingual ability of American so- vate parties. Especially relevant to
neous recording of the same conver- ciety. The court recognized that law enforcement is the provision
sations made by the agent.”13 “the informant may very well have mandating that communications in-
It is apparent from Hoffa and concealed his ability to speak Span- tercepted in violation of Title III
Lopez that the recording of conver- ish the same as he concealed the may not be received in evidence
sations by governmental actors who recording equipment and his alle- during any trial, hearing, or other
are a party to, or are within earshot giance with law enforcement.”16 proceeding before any court. 19
of, those conversations does not The court found the fact that the However, not all oral and wire com-
violate the Fourth Amendment’s conversation was audible to the in- munications are entitled to Title III
ban against unreasonable searches. formant to be determinative, not protection.
In 1999, the U.S. Tenth Circuit whether the informant was able to For purposes of Title III, an
Court of Appeals extended this understand what he clearly heard. “‘oral communication’ means any
logic one step further. In United oral communication uttered by a
States v. Longoria,14 a confiden- person exhibiting an expectation


tial informant cooperating with that such communication is not sub-
FBI agents surreptitiously re- ject to interception under circum-
corded conversations involving Surreptitious stances justifying such expecta-
Abel Longoria. When Longoria was tion....”20 In other words, Title III
prosecuted, he did not contest the
recording of does not protect oral conversations
admissibility of the recorded con- telephone that occur under circumstances
versations between himself and the conversations is where the speaker has no reason-
informant. However, the informant not prohibited by able expectation of privacy as de-
also recorded conversations be- Title III when one fined in federal case law. As the
tween Longoria and others while party consents. analysis regarding the Fourth
the informant was present, but that Amendment made clear, a person


were in Spanish. Longoria argued who misplaces his confidence in
that those particular recordings someone who is cooperating with
should not be admissible because the government does not have a rea-
the informant did not understand Federal case law makes clear sonable expectation of privacy.
Spanish. Therefore, according to that law enforcement may use indi- Consequently, oral communica-
Longoria, he had not knowingly ex- viduals working for the government tions recorded by a consenting party
posed his conversations to the infor- to record conversations to which do not fall within the definition of
mant; rather, he exhibited a reason- they are a party, or overhear (even communications entitled to Title III
able expectation of privacy in them. if they do not understand what protection.
The U.S. Tenth Circuit Court of they are hearing), without violating Surreptitious recording of tele-
Appeals disagreed with Longoria. the Fourth Amendment to the phone conversations is not pro-
First, the appellate court Constitution. hibited by Title III when one party
pointed out that “comprehension is consents. Although the communi-
a malleable,”15 subjective concept. Statutory Considerations cations satisfy the statutory de-
Rather than requiring judges or ju- On the heels of the Supreme finition of “wire communication,”21
ries to ascertain whether an indi- Court’s Katz decision,17 Congress another provision of Title III explic-
vidual understood a particular lan- passed the Omnibus Crime Control itly exempts such communications
guage, the court preferred to and Safe Streets Act of 1968. Title from protection. Title III states that
eliminate the guesswork. Even III18 (hereinafter “Title III”) of that “[i]t shall not be unlawful under this

January 2003 / 27
chapter for a person acting under reasonable expectation of privacy.23 prisoner might have in his prison
color of law to intercept a wire... However, there are places where a cell....”27 Based on Katz, of course,
communication, where such person person does not have a reasonable in order for a person’s expectation
is a party to the communication or expectation of privacy. If the gov- of privacy to enjoy Fourth Amend-
one of the parties to the communi- ernment records conversations in an ment protection, that expectation
cation has given prior consent to area where no expectation of pri- must be both subjectively28 and ob-
such interception.”22 vacy exists, it is not conducting a jectively reasonable.29 Although
Clearly, consensual recording search, and the Fourth Amendment Hudson did not present a surveil-
of a subject’s telephone or personal is not implicated. These areas in- lance or electronic monitoring is-
communications runs afoul of nei- clude prisons, patrol cars, and inter- sue, the Court pointed out that “[a]
ther constitutional nor statutory rogation rooms. right of privacy in traditional Fourth
provisions. Consequently, this tech- Amendment terms is fundamentally


nique remains a legal option for law incompatible with the close and
enforcement to gain invaluable continual surveillance of inmates
information. and their cells required to ensure
The Supreme Court institutional security and internal
INTERCEPTION has made clear that order.”30 While Hudson involved
UNDERTAKEN WITHOUT prison inmates do not the physical search of an inmate’s
THE CONSENT OF ANY cell and property, other court opin-
PARTY have areasonable
ions provide guidance on whether
The antithesis of recording
expectation of privacy warrantless electronic surveillance
someone’s conversations with the in their prison cells. is permissible in the prison setting
consent of one of the parties in- and against whom such evidence is


volved is the recording of conversa- admissible.
tions in which none of the parties A case involving the intercep-
involved has explicitly authorized Prison Cells tion of a prison inmate’s oral com-
the interception. At first glance, The Supreme Court has made munications reached the Supreme
it seems that this type of intercep- clear that prison inmates do not Court in 1962, well before its
tion would violate individuals’ pri- have a reasonable expectation of Hudson decision. In Lanza v. New
vacy rights in their spoken word. privacy in their prison cells. In York, 31 the Court addressed a
Upon closer examination, however, Hudson v. Palmer, 24 the Court Fourth Amendment challenge to the
there are several circumstances that recognized that “prisons are not be- surreptitious recording of a conver-
allow for such warrantless, non- yond the reach of the Constitu- sation between a prisoner and a visi-
consensual interception. The same tion.”25 However, the Court contin- tor, the prisoner’s brother (Lanza).
constitutional and statutory consid- ued, “while persons imprisoned for Interestingly, the challenge to the
erations must be examined to deter- crime enjoy many of the protections recording came from the visiting
mine whether the warrantless inter- of the Constitution, it is also clear brother, not the inmate. The record
ception is lawful. that imprisonment carries with it is unclear as to the circumstances
the circumscription or loss of that led to the brothers’ conversa-
Fourth Amendment many significant rights.”26 Fourth tion being recorded, but that issue
Considerations Amendment protections are among did not influence the outcome. The
The Fourth Amendment pro- those rights lost by prison in- Court quickly dismissed Lanza’s
hibits unreasonable government mates. In the words of the Supreme challenge to the use of the recorded
searches. A Fourth Amendment Court, “society is not prepared to statements in his subsequent pros-
search only occurs when the gov- recognize as legitimate any subjec- ecution. In this pre-Katz decision,
ernment intrudes into a person’s tive expectation of privacy that a the Court dismissed the notion that

28 / FBI Law Enforcement Bulletin


the Fourth Amendment applied in- cells or in jail visiting facilities do based on the Fourth Amendment. In
side a prison by noting that “to say not violate the Fourth Amendment. addition to the Hudson and Lanza
that a public jail is the equivalent of While Lanza and Hearst in- decisions—which dictate that
a man’s ‘house’ or that it is a place volved recording of inmate-visitor Moody had no reasonable expecta-
where he can claim constitutional conversations, the U.S. Eleventh tion of privacy in his cell—court
immunity from search or seizure...is Circuit Court of Appeals was pre- authorization for this wiretap had
at best a novel argument.”32 Rather, sented with a situation that merged been secured. Thus, even his most
the Court reasoned, “[i]n prison, of- the Hudson issue of jail cell privacy remote Fourth Amendment chal-
ficial surveillance has traditionally with the Lanza issue of surrepti- lenges had been eliminated.
been the order of the day.”33 tious recording. In Moody v. United Possibly the best explanation of
Arguably, the 1967 Katz deci- States, 38 Walter Leroy Moody why prisoners and their visitors
sion changed the Court’s view of a sought to suppress all evidence ob- have no reasonable expectation of
challenge similar to that made in tained as a result of electronic privacy was expressed by Judge
Lanza. Because Katz clearly pro- monitoring of his prison cell. The Gee of the U.S. Fifth Circuit Court
vides Fourth Amendment pro- © John Foxx Images of Appeals in 1985. In United
tection to people rather than States v. Harrelson,40 Charles
places,34 this would appear to Harrelson attempted to sup-
be a valid argument. How- press recorded conversations
ever, later court decisions between himself and his wife
demonstrate that the Katz de- made while Harrelson was a
cision did not change the prin- prison inmate. The conver-
ciple set forth in Lanza. sations were recorded by
In United States v. an inmate in the cell next
Hearst,35 a 1977 case wherein to Harrelson’s, using equip-
Patricia Hearst sought to sup- ment provided by the FBI. In
press recorded conversations denying Harrelson’s motion
between herself (at the time an to suppress the evidence,
inmate of the San Mateo Judge Gee stated that “one
County jail) and a childhood friend monitoring commenced while who expects privacy under the cir-
who visited her in the jail, Hearst Moody was jailed in the high-secu- cumstances of prison visiting is, if
argued that Katz “effectively over- rity unit of the Atlanta Federal Peni- not actually foolish, exceptionally
ruled Lanza or at the very least sig- tentiary. The unique aspect of this naive.”41
nificantly reduced its precedential case is that Moody was alone in his
value.”36 The Ninth Circuit dis- cell, talking only to himself. At his Patrol Cars
agreed. It cited numerous opinions subsequent trial, the government Another place where law en-
dealing with jailhouse searches and wished to introduce incriminating forcement officers are free to sur-
seizures that found Katz and Lanza comments Moody made to himself reptitiously record conversations is
compatible.37 The Supreme Court while in his cell. The Eleventh Cir- inside a police patrol car. Like jail,
refused to hear an appeal of either cuit affirmed the lower court’s re- individuals do not have a reason-
the Hearst case or any of the cases jection of Moody’s attempts to sup- able expectation of privacy in a pa-
cited therein. This refusal makes it press the evidence. While the lower trol car and, therefore, are not pro-
apparent that the Supreme Court court acknowledged that the “basis tected by the Fourth Amendment
agrees with the continuing validity for [Moody’s] attack upon the elec- while there. What an individual
of its Lanza pronouncement. There- tronic monitoring of his prison cell placed in a patrol car subjectively
fore, monitoring and recording of is somewhat unclear,”39 it certainly believes does not establish a pri-
conversations that take place in jail could not have been successfully vacy right.

January 2003 / 29
In a novel suppression argu- reason...to believe that it is a sanc- remarks, the California court noted
ment, one subject maintained that tuary for private discussions.”46 that “no representations or inquiries
the nonexistence of an expectation The analogy of the police car to a were made as to privacy or confi-
of privacy in a patrol car should not temporary jail slams the door on dentiality.”48 A recent Virginia case
be a blanket rule. In United States v. any argument that an expectation of agreed with the Ahmad A. opinion.
McKinnon,42 Steve McKinnon was privacy exists in a police vehicle as In Belmar v. Commonwealth,49
placed in the back of a patrol car long as officers do or say nothing to Akeim Belmar was arrested and
with Theodore Pressley, the driver establish that expectation. taken to police headquarters. He en-
of the vehicle in which McKinnon tered through the rear door of the
had been a passenger. McKinnon detective bureau and did not pass a


and Pressley were recorded surrep- sign posted in the front lobby advis-
titiously while conversing in the ing those who entered that “inter-
back of the patrol car. They made ...surreptitious view rooms were ‘electronically
incriminating statements, and co- recording of monitored and may be recorded.’”50
caine was located during a consent individuals in a Belmar, therefore, had a subjec-
search of their vehicle. McKinnon police agency’s tively reasonable expectation that
argued that his subjective expecta- his conversation in the interrogation
tion of privacy was one that “soci-
interrogation room would be private. However, the Vir-
ety is willing to recognize because is not prohibited ginia court decided that his subjec-
the government violated his rights by the Fourth tive expectation of privacy was not
because it did not have probable Amendment. objectively reasonable. First, the
cause to conduct this secret appellate court noted that “federal


search.”43 McKinnon’s most cre- courts continue to find a suspect has
ative argument, though, was that no reasonable expectation of pri-
“the front seat of a police car is vacy in areas controlled by the po-
equivalent to the officer’s office, Interrogation Rooms lice.”51 Specifically addressing in-
but the back seat is the office of the Finally, surreptitious recording terrogation rooms at police stations,
arrestee.”44 The U.S. Eleventh Cir- of individuals in a police agency’s the court pointed out that such
cuit Court of Appeals, following the interrogation room is not prohibited rooms are “designed for disclosure,
logic of one federal district court by the Fourth Amendment. There is not the hiding, of information.”52
and several state courts, found that simply no reasonable expectation of Finally, it recognized that the detec-
McKinnon’s arguments failed and privacy in an interrogation room. tive involved in the investigation
that “no reasonable expectation of However, officials should do or say did nothing to “lull” Belmar into
privacy exists in the back seat area nothing that creates a reasonable believing his conversation would
of a police car.”45 expectation of privacy. For ex- not be monitored.53 Clearly, officers
In 1994, the year following the ample, in Ahmad A. v. Superior should not make assurances to
McKinnon decision, the U.S. Eighth Court,47 an arrested juvenile re- people that will give them an expec-
Circuit Court of Appeals also held quested to speak with his mother at tation of privacy in a police interro-
that individuals have no reasonable the police station. They were al- gation room. With no assurances to
expectation of privacy in police ve- lowed to converse in an interroga- the contrary, individuals in police
hicles. That federal court found that tion room, where the juvenile made interrogation rooms enjoy no rea-
a police car is “essentially the incriminating statements about a sonable expectation of privacy,
[officer’s] office, and is frequently murder. The statements were sur- leaving their conversations open to
used as a temporary jail for housing reptitiously recorded by the police. warrantless electronic surveillance.
and transporting arrestees and sus- In denying his Fourth Amendment In all three of the preceding
pects. The general public has no challenge to the admissibility of the areas, courts have found that no

30 / FBI Law Enforcement Bulletin


reasonable expectation of privacy Because Title III provides that “[i]t consider a myriad of issues:
exists. Where no expectation of shall not be unlawful...for a person whether entrapment could be suc-
privacy exists, no Fourth Amend- acting under color of law to inter- cessfully argued, whether the con-
ment search can occur. Therefore, cept a wire...communication, versations involve privileged com-
under the U.S. Constitution, no war- where...one of the parties to the munications, and whether Fifth or
rant is required to surreptitiously communication has given prior con- Sixth Amendment rights are im-
record conversations in prisons, pa- sent to the interception,”58 these pacted. Fourth Amendment and
trol cars, or interrogation rooms, courts have found that this intercep- statutory issues also must be con-
even when no one has consented to tion does not violate Title III. sidered. This article has explained
the recording. One federal circuit court of ap- why, in several different situations,
peals does not recognize the im- neither the Fourth Amendment nor
Statutory Considerations plied consent rationale, but allows Title III prevents the interception
For the same reasons as in the interception for a different reason. and recording of conversations. Of
case of consensual surreptitious re- The U.S. Seventh Circuit Court of course, some state laws will pro-
cordings, Title III challenges fail Appeals, in United States v. hibit this technique even when fed-
when aimed at nonconsensual re- Daniels,59 refused to suppress FBI eral law clearly would not.62 Twelve
cordings that are not protected by recordings of a prisoner’s phone states have statutes more restrictive
the Fourth Amendment. Title III de- than the federal Title III statute in
fines oral communications as “any that they require all parties to a con-
oral communication uttered by a versation to consent to its recording
person exhibiting an expectation before it may be lawfully re-
that such communication is not sub- corded.63 For all practical purposes,
ject to interception under circum- this requirement eliminates any
stances justifying such expecta- warrantless consensual recording in
tion....”54 Because this definition those states.
was intended to incorporate the rea- It is vital for law enforcement
sonable expectation of privacy test officials to recognize when, where,
set forth by the Supreme Court in and why the warrantless intercep-
Katz,55 nonconsensual recordings tion of communications is a viable
made in jails, patrol cars, and inter- investigative technique to employ.
rogation rooms also satisfy Title III Not all situations are obvious; yet,
restrictions because there is no calls because the surveillance was this technique can provide incred-
justifiable expectation that those permitted by the “law enforcement ibly valuable and perfectly legal
conversations will not be subject to officer in the ordinary course of his evidence for prosecutions.
interception. duties exception”60 of Title III.61
Telephone conversations made The logic may vary, but, generally, Endnotes
from jail or police stations normally Title III does not prohibit the sur- 1
This article addresses only warrantless
enjoy no Title III protection either. reptitious recording of oral or tele- interceptions. Court authorized interception
Clearly, these phone calls satisfy phonic conversations occurring in must be accomplished in accordance with es-
tablished restrictions and procedures. See, e.g.,
the statutory definition of wire com- jails, patrol cars, or police interro- 18 U.S.C. § 2510 et seq., for the requirements
munication,56 but are not covered gation rooms. to obtain a federal Title III court order.
for one of two reasons. Some courts 2
For an in-depth discussion of Fifth and
have held that individuals making CONCLUSION Sixth Amendment constraints on this technique,
see K. Crawford, “Surreptitious Recording of
phone calls from these locations Law enforcement officers who Suspects’ Conversations,” FBI Law Enforce-
have given their implied consent to contemplate the interception of ment Bulletin, September 1993, 26-32; and
have the conversations recorded.57 their subjects’ conversations must “A Constitutional Guide to the Use of Cellmate

January 2003 / 31
36
Informants,” FBI Law Enforcement Bulletin, Id. at 1345.
December 1995, 18-23.
3
U.S. CONST. AMEND. IV states, in
37
563 F.2d at 1345, citing United States v.
Dawson, 516 F.2d 796, 805 (9th Cir.), cert.
Wanted:
pertinent part, “The right of the people to be denied, 423 U.S. 855 (1975); United States Notable Speeches
secure in their persons, houses, papers, and v. Hitchcock, 467 F.2d 1107, 1108 (9th Cir.
effects, against unreasonable searches and 1972), cert. denied, 410 U.S. 916 (1973).
38
seizures, shall not be violated....” 977 F.2d 1425 (11th Cir. 1992), cert.
4
Katz v. United States, 389 U.S. 347 denied, 507 U.S. 1052 (1993). he FBI Law Enforcement
(1967).
5

6
385 U.S. 293 (1966).
Id. at 300.
39
United States v. Moody, 762 F.Supp.
1491, 1498 (N.D. Ga. 1991).
40
754 F.2d 1153 (5th Cir.), cert. denied,
T Bulletin seeks transcripts
of presentations made by crim-
7
385 U.S. at 301, citing United States v. 474 U.S. 908 (1985). inal justice professionals for
41
Jeffers, 342 U.S. 48 (1951). Id. at 1169. its Notable Speech depart-
8 42
385 U.S. at 301(emphasis added), citing 985 F.2d 525 (11th Cir.), cert. denied,
Silverman v. United States, 365 U.S. 505 510 U.S. 843 (1993).
ment. Anyone who has
(1961). 43
Id. at 527. delivered a speech recently
9
385 U.S. at 302. 44
985 F.2d at 527. and would like to share the
10 45
385 U.S. at 302. Id. information with a wider
11 46
373 U.S. 427 (1963). United States v. Clark, 22 F.3d 799,
12
Id. at 438. 801-802 (8th Cir. 1994).
audience may submit a trans-
13
United States v. White, 401 U.S. 745, 751 47
263 Cal. Rptr. 747 (Cal. App. 2 Dist. cript of the presentation to the
(1971). 1989), cert. denied, 498 U.S. 834 (1990). Bulletin for consideration.
14 48
177 F.3d 1179. Id. at 751. As with article submis-
15 49
Id. at 1183. 553 S.E.2d 123 (Va. App. Ct. 2001).
16
177 F.3d at 1183. 50
Id. at 125.
sions, the Bulletin staff will
17
Supra note 4. 51
553 S.E.2d at 128. edit the speech for length and
18
18 U.S.C. § 2510 et seq. 52
553 S.E.2d at 129. clarity, but, realizing that the
19 53
18 U.S.C. § 2515. Id. information was presented
20 54
18 U.S.C. § 2510(2). Supra note 20.
21
18 U.S.C. § 2510(1) defines wire 55
See, e.g., Longoria, note 14.
orally, maintain as much of
communication as any aural transfer made in 56
Supra note 21. the original flavor as possible.
whole or in part through the use of facilities for 57
See, e.g., Gilday v. Dubois, 124 F.3d 277, Presenters should submit their
the transmission of communications by the aid 289 (1st Cir. 1997); U.S. v. Workman, 80 F.3d transcripts typed and double-
of wire, cable, or other like connection between 688, 692-694 (2nd Cir. 1996).
the point of origin and the point of reception 58
58. Title 18 U.S.C. § 2511(c).
spaced on 8 1/2- by 11-inch
(including the use of such connection in a 59
902 F.2d 1238 (7th Cir. 1990). white paper with all pages
switching station) furnished or operated by any 60
Id. at 1245. numbered. When possible, an
61
person engaged in providing or operating such 18 U.S.C. § 2510(a)(ii). electronic version of the tran-
62
facilities for the transmission of interstate or See, e.g., State v. Geraw, 795 A.2d 1219
foreign communications or communications (Vt. 2002), where the Vermont Supreme Court
script saved on computer disk
affecting interstate or foreign commerce. found that the warrantless and surreptitious should accompany the docu-
22
18 U.S.C. § 2511(2)(c). electronic recording of a face-to-face conversa- ment. Send the material to:
23
Supra note 4. tion by a known police officer in a defendant’s
24
468 U.S. 517 (1984). home violated his right to privacy under the
25
Id. at 523. state constitution.
Editor, FBI Law
26
468 U.S. at 524. 63
Kermit L. Hall, The Oxford Companion to Enforcement Bulletin
27
468 U.S. at 526. American Law, 841 (2002). FBI Academy
28
Katz, 389 U.S. at 361 (Harlan, J., Madison Building,
concurring). Law enforcement officers of other than
29
Id. federal jurisdiction who are interested Room 209
30
468 U.S. at 527-528 (emphasis added). in this article should consult their legal Quantico, VA 22135
31
370 U.S. 139 (1962). advisors. Some police procedures telephone: 703-632-1952,
32
Id. at 143. ruled permissible under federal e-mail: leb@fbiacademy.edu
33
370 U.S. 143. constitutional law are of questionable
34
Katz, 389 U.S. at 351.
35 legality under state law or are not
563 F.2d 1331 (9th Cir. 1977), cert.
denied, 435 U.S. 1000 (1978). permitted at all.

32 / FBI Law Enforcement Bulletin


The Bulletin Notes
Law enforcement officers are challenged daily in the performance of their duties; they face each
challenge freely and unselfishly while answering the call to duty. In certain instances, their actions
warrant special attention from their respective departments. The Bulletin also wants to recognize
those situations that transcend the normal rigors of the law enforcement profession.

Officer Frank W. Jackson of the Village of Goshen, New York, Police


Department responded to a call of a vehicle that had crashed through the show-
room window of a local car dealership. On arrival, he found that a hysterical,
distraught woman intentionally had slammed her sport utility vehicle into two
new cars, drove through the showroom window, and then crashed it into several
new vehicles on the showroom floor, narrowly missing several employees and
customers. The woman had locked herself in the vehicle and was threatening to
commit suicide by slashing her wrists and neck with a razor knife. Officer
Jackson immediately tried to calm the woman and convince her to shut the
vehicle off and open the window. The woman did not respond to negotiations
Officer Jackson
and continued to cut herself. When the woman put the vehicle in gear and
attempted to move away, Officer Jackson immediately smashed the driver’s side
window with his baton and tried to shut off the vehicle. The woman attempted to slash Officer Jackson
with the razor knife. He immediately disarmed her, removed her from the vehicle, and took her into
custody. Officer Jackson’s selfless actions prevented the woman from taking her own life and from
further endangering the lives of other individuals at the scene.

A citizen stopped Officer Alex Salazar of the Missouri City, Texas, Police
Department to advise that a house was on fire in the area. After arriving at the
location of the fire, Officer Salazar saw a light haze of smoke in the dwelling
through the open front door. He found one elderly male on the sofa and a second
male standing in the same room. Officer Salazar realized that the house was a
facility for individuals with mental illnesses and that they were either unaware
of the danger or in shock. He escorted both men outside to safety and immedi-
ately reentered the residence. He went to the bedroom in the back of the house to
search for other people and tripped over a female lying on the floor. She did not
respond verbally and appeared to be in shock. He noticed a wheel chair in the
Officer Salazar
room, took it to the hallway by the front door, dragged the woman to the chair,
and wheeled her outside. Officer Salazar went back into the house a third time to
check for other people. Because the smoke was extremely thick at that point, he had to crawl to check
closets and rooms, primarily by touch due to
limited visibility. He completed his search and
exited the house. Officer Salazar showed Nominations for the Bulletin Notes should be based
professionalism and courage by risking his own on either the rescue of one or more citizens or arrest(s)
safety to evacuate the burning residence. His made at unusual risk to an officer’s safety. Submissions
should include a short write-up (maximum of 250
actions saved the lives of these individuals. words), a separate photograph of each nominee, and a
letter from the department’s ranking officer endorsing
the nomination. Submissions should be sent to the
Editor, FBI Law Enforcement Bulletin, FBI Academy,
Madison Building, Room 209, Quantico, VA 22135.
U.S. Department of Justice Periodicals
Federal Bureau of Investigation Postage and Fees Paid
Federal Bureau of Investigation
FBI Law Enforcement Bulletin ISSN 0014-5688
935 Pennsylvania Avenue, N.W.
Washington, DC 20535-0001

Official Business
Penalty for Private Use $300

Patch Call

The patch of the Harriman, Tennessee, Police The body of water in the foreground of the
Department features the Temperance Building, Blaine, Washington, Police Department patch is
formerly The American Temperance University, Drayton Harbor. On the left is Semiahmoo, named
founded in 1893. Chartered May 25, 1890, Harriman after Native Americans once living there, along with
was a utopian community built on social temperance its historic inn and water tower. On the right is the
where “no manufacture, storage, or sales of intoxicat- Peace Arch, located on the U.S./Canadian border,
ing liquor or beverages” would take place. Much has denoting the open-door friendship between the two
changed in modern times; alcohol now is sold in the countries. The boat depicts the Plover, a historic ferry
community, but the Temperance Building stills stands between Blaine and Semiahmoo, with the Semiahmoo
as a constant reminder of the city’s illustrious past. Bay and the Canadian Cascade mountain range in the
background.

You might also like