You are on page 1of 35

March 2003

Volume 72
Number 3
United States
Department of Justice
Federal Bureau of Investigation
Washington, DC 20535-0001

Robert S. Mueller III


Director
Features
Contributors' opinions and statements
should not be considered an
endorsement by the FBI for any policy,
program, or service.
The Seven-Stage Hate Model Investigators must understand the hate
The attorney general has determined
that the publication of this periodical is
necessary in the transaction of the
By John R. Schafer, M.A. 1 process to deal successfully with hate
groups.
public business required by law. Use
and Joe Navarro, M.A.
of funds for printing this periodical has
been approved by the director of the
Office of Management and Budget. A Study on Cyberstalking To successfully investigate cyberstalking

The FBI Law Enforcement Bulletin By Robert D’Ovidio, M.S. 10 cases, law enforcement must
understand how offenders use the
(ISSN-0014-5688) is published
monthly by the Federal Bureau of
and James Doyle Internet to stalk victims.
Investigation, 935 Pennsylvania
Avenue, N.W., Washington, D.C. Rendering hate/bias crimes the special
20535-0001. Periodicals postage paid Best Practices of a Hate/Bias
at Washington, D.C., and additional
mailing offices. Postmaster: Send
Crime Investigation 21 attention they deserve will help law
enforcement agencies treat victims,
address changes to Editor, FBI Law By Walter Bouman relate to communities, and prosecute
Enforcement Bulletin, FBI Academy,
Madison Building, Room 209, offenders.
Quantico, VA 22135.

Editor Obtaining Written Courts analyze a number of significant


John E. Ott
Associate Editors
Consent to Search 26 issues regarding written consent
searches.
By Jayme Walker
Cynthia L. Lewis
David W. MacWha
Holcomb, J.D.
Bunny S. Morris
Art Director
Denise Bennett Smith
Assistant Art Director Departments
Stephanie L. Lowe
Staff Assistant
Linda W. Szumilo
9 Bulletin Reports 18 Police Practice
This publication is produced by Web-Based Resources Recruitment Strategies
members of the Law Enforcement Law Enforcement
Communication Unit,
Training Division.

Internet Address
leb@fbiacademy.edu

Send article submissions to Editor,


FBI Law Enforcement Bulletin, FBI
Academy, Madison Building, Room
209, Quantico, VA 22135.

ISSN 0014-5688 USPS 383-310


The Seven-Stage Hate Model
The Psychopathology of Hate Groups
By JOHN R. SCHAFER, M.A., and JOE NAVARRO, M.A.

T he manifestations of hate DEFINITION OF HATE pursuits give meaning and value to


are legion, but the hate pro- Hate, a complex subject, di- life.2 Nonetheless, irrational hate
cess itself remains elusive. vides into two general categories: bleeds through day-to-day activities
Limited research in this field pre- rational and irrational. Unjust acts in the form of racial barbs and eth-
cluded the development of a com- inspire rational hate. Hatred of a nic humor. Not all insecure people
prehensive hate model. Under- person based on race, religion, are haters, but all haters are insecure
standing hate groups is essential for sexual orientation, ethnicity, or na- people.
the development and implementa- tional origin constitutes irrational With respect to rational hate,
tion of successful intervention strat- hate. haters do not focus as much on the
egies, which depend on an under- Both rational and irrational hate wrong done to them or others, but,
standing of the hate process. The mask personal insecurities. Every- rather, on their own helplessness,
proposed hate model consists of one experiences personal insecuri- guilt, or inability to effect change.
seven stages, including how hate ties in varying degrees throughout The object of rational hate often is
groups define themselves, how hate their lives. The more insecure a per- despised or pitied.3 In the same way,
groups target their victims and taunt son feels, the larger the hate mask. irrational hate elevates the hater
them with verbal insults and offen- Most people concentrate on the im- above the hated.4 Many insecure
sive gestures, and how hate groups portant issues in life, such as earn- people feel a sense of self-worth by
attack their victims with or without ing a living, rearing a family, and relegating a person or group of
weapons.1 achieving personal goals. These people to a lower status.5

March 2003 / 1
as drug sales and burglaries. Inci-
dental to their criminal activity,
they commit hate crimes. The San
Fernando Valley Peckerwoods
(SVP) in California was a crimi-
nally motivated skinhead group.
SVP members primarily sold meth-
amphetamines and committed resi-
dential burglaries. Periodically,
SVP members attacked minorities
with weapons and, on one occasion,
placed packages resembling bombs
Special Agent Schafer is Special Agent Navarro serves in near an apartment complex where
assigned to the FBI’s Lancaster, the FBI’s Tampa, Florida, office African-Americans lived. Members
California, resident office and and also is a member of the FBI’s intended for the fake bombs
also serves as a member of the National Security Division’s
FBI’s National Security Division’s Behavioral Analysis Program.
to frighten current residents to
Behavioral Analysis Program. relocate and to discourage other
African-American families from
moving into the complex.
SKINHEAD GROUPS lack the leadership structure found Conversely, hate-motivated
During a 7-year FBI investiga- in the majority of street gangs en- skinhead groups dedicate the ma-
tion of skinhead groups in South- gaged in “for-profit” criminal ac- jority of their time to hate crimes.6
ern California between 1992 and tivities. However, the Western Incidental to hate crimes, these
1999, specific patterns emerged. Hammerskins group has a stronger hard-core skinheads commit petty
Skinhead groups typically consist leadership hierarchy than most thefts or sell small amounts of nar-
of uneducated, young, white males skinhead groups, and it boasts a cotics to support daily needs, such
between the ages of 13 and 24 who very active recruitment program. as food, cigarettes, and alcohol and
have no long-term prospects for Potential members receive a re- other drugs. The Nazi Low Riders
success. Although many come from cruitment package, which includes (NLR) skinhead group located in
single-parent, dysfunctional fami- a swastika armband, a T-shirt with Lancaster, California, exemplifies a
lies, some exceptions exist. For ex- white supremacist slogans, white hate-motivated skinhead group. At
ample, members of the Western supremacist literature and band one time, NLR members spent their
Hammerskins in Hemet, California, stickers, and other supremacist time prowling the streets of
had high school educations and materials. Recruiters also pass out Lancaster looking for minorities to
came from two-parent, middle-class business cards embossed with the attack. The NLR matured to the
families. Further examination re- Western Hammerskins’ logo and point where their members rou-
vealed that both parents made long, the recruiter’s name and telephone tinely beat and stabbed minorities,
daily commutes to work in Los An- number. The group’s higher and, in one instance, murdered an
geles and left their teenage children educational level may explain the African-American.
unsupervised. The lack of parental sophistication of its recruitment Haters cannot stop hating with-
supervision and guidance spawned techniques. out exposing their personal insecu-
personal insecurities similar to Skinhead groups subdivide into rities. For example, at the onset of
those found in skinheads who come two categories: criminally moti- the FBI investigation, FBI authori-
from dysfunctional, single-parent vated and hate motivated. Crimi- ties told hard-core members of the
environments. nally motivated skinhead groups NLR that they would arrest them if
Fortunately, most skinhead spend most of their time engaged in their hate violence continued; yet,
groups are not well organized and for-profit criminal activities, such the hate violence persisted. The FBI

2 / FBI Law Enforcement Bulletin


similarly warned the members of hate crimes. One hate-motivated fact that they acted as the instiga-
the SVP who, however, stopped or skinhead put it best when he stated, tors. Secondary justification is dif-
were more surreptitious concerning “We don’t look for trouble but ficult to detect because skinheads
criminal activities, and their hate somehow trouble always finds us, can interpret a simple glance as ag-
violence ceased. The reaction of the and we’re ready to deal with it when gressive behavior.
SVP members comported with gen- it comes.” Secondary justification also ex-
eral criminal deterrence literature.7 ists on a larger scale. When a com-
The reaction of the NLR members THE HATE MODEL munity reacts to a hate crime,
did not, however, because hate, not Several academic authorities on skinheads perceive that reaction as
criminal acts, was their primary hate crimes in America identified aggressive, which reinforces the no-
motive. three types of bias crime offenders: tion that skinheads must defend
Interviews of both criminally the thrill seeker, the reactive of- themselves against a common en-
motivated and hate-motivated fender, and the hard-core offender.8 emy. Secondary justification places
skinheads may explain this phe- They described the reactive of- the skinheads in a victim status and
nomenon. Criminally motivated fender as one “who grounds his at- rationalizes continued violence. To
skinheads identified themselves as tack on a perceived transgression, further illustrate this principle, a
criminals first and haters second. skinhead, with a swastika tattooed


They also expressed a degree of on his cheek, walked into a jewelry
personal security in their status as store to buy a ring for his girlfriend.
criminals. The criminally motivated The skinhead became incensed
skinheads possess a certain sense of when the Jewish clerk treated him
self-worth; hence, they have fewer Skinhead groups poorly. The skinhead later com-
insecurities. However, this was not subdivide into mented that if Jews treated him with
the case with hate-motivated two categories.... more respect he would not hate
skinheads. The explanation by one them so much. The skinhead clearly
15-year-old NLR member typified saw himself as a victim, although he


the thought process of hate-moti- openly displayed a provocative
vated skinheads. He said, in effect, symbol of hate on his face.
“I dropped out of school in the such as an insult, interracial dating, Empirical observations show
eighth grade, but I stopped learning or a neighborhood integration.”9 that hate groups go through seven
midway through the sixth grade. I The authors’ model incorporates stages in the hate process. Haters, if
covered my body with hate tattoos. I the thrill seeker and the hard-core unimpeded, pass through these
couldn’t get a good job if I wanted offender, but redefines the concept seven successive stages without
to. No one would hire me. Once, I of the reactive offender. This phe- skipping a stage. In the first four
tried to get a job at a fast food res- nomenon can be described as sec- stages, haters vocalize their beliefs.
taurant, but the manager refused to ondary justification; skinheads rou- In the last three stages, haters act on
hire me because the restaurant tinely use this technique to instigate their beliefs. A transition period ex-
served multiracial customers. If I attacks. For example, a group of ists between vocalization and acting
quit being a skinhead, I have noth- skinheads encounter a mixed-race out. In this transition period, vio-
ing. I am nothing. I have no choice couple and shout racial slurs. If the lence separates hard-core haters
but to be a skinhead. I expect to die couple reacts in a manner other than from rhetorical haters.
a young, violent death.” a submissive one, the skinheads
Skinheads converge, get drunk, perceive that behavior as an act of Stage 1: The Haters Gather
take drugs, and, at some point, aggression. The skinheads later tell Irrational haters seldom hate
spontaneously seek out hate targets the police they merely defended alone.10 They feel compelled, al-
to attack. They conduct little, if themselves against aggressors. The most driven, to entreat others to
any, planning before committing skinheads, of course, leave out the hate as they do. Peer validation

March 2003 / 3
bolsters a sense of self-worth and, aggressive impulses increases with Stage 5: The Hate Group
at the same time, prevents intro- ideation.14 In other words, the more Attacks the Target Without
spection, which reveals personal in- often a person thinks about aggres- Weapons
securities.11 Further, individuals sion, the greater the chance for ag- This stage is critical because it
otherwise ineffective become em- gressive behavior to occur. Thus, differentiates vocally abusive hat-
powered when they join groups, after constant verbal denigration, ers from physically abusive ones. In
which also provide anonymity and haters progress to the next more ac- this stage, hate groups become more
diminished accountability. rimonious stage. aggressive, prowling their turf seek-
ing vulnerable targets. Violence
Stage 2: The Hate Stage 4: The Hate Group Taunts coalesces hate groups and further
Group Defines Itself the Target isolates them from mainstream so-
Hate groups form identities Hate, by its nature, changes in- ciety. Skinheads, almost without
through symbols, rituals, and my- crementally. Time cools the fire of exception, attack in groups and tar-
thologies, which enhance the mem- hate, thus forcing the hater to look get single victims. Research has
bers’ status and, at the same time, inward. To avoid introspection, hat- shown that bias crimes are twice as
degrade the object of their hate. For ers use ever-increasing degrees of likely to cause injury and four times
example, skinhead groups may rhetoric and violence to maintain as likely to result in hospitalization
adopt the swastika, the iron cross, high levels of agitation. Taunts and as compared to nonbias crimes.16
the Confederate flag, and other su- In addition to physical vio-
premacist symbols. Group-specific


lence, the element of thrill seeking
symbols or clothing often differen- is introduced in Stage 5. Two ex-
tiate hate groups. Group rituals, perts found that 60 percent of hate
such as hand signals and secret Empirical offenders were “thrill seekers.”17
greetings, further fortify members. The adrenaline “high” intoxicates
Hate groups, especially skinhead
observations show
that hate groups go the attackers. The initial adrenaline
groups, usually incorporate some surge lasts for several minutes;
form of self-sacrifice, which allows through seven however, the effects of adrenaline
haters to willingly jeopardize their stages in the hate keep the body in a state of height-
well-being for the greater good of process. ened alert for up to several days.18
the cause. Giving one’s life to a Each successive anger-provoking


cause provides the ultimate sense of thought or action builds on residual
value and worth to life.12 Skinheads adrenaline and triggers a more vio-
often see themselves as soldiers in a lent response than the one that origi-
race war. offensive gestures serve this pur- nally initiated the sequence.19 An-
pose. In this stage, skinheads typi- ger builds on anger. The adrenaline
Stage 3: The Hate Group cally shout racial slurs from moving high combined with hate becomes a
Disparages the Target cars or from afar. Nazi salutes and deadly combination. Hard-core
Hate is the glue that binds hat- other hand signals often accompany skinheads keep themselves at a
ers to one another and to a common racial epithets. Racist graffiti also level where the slightest provoca-
cause.13 By verbally debasing the begins to appear in areas where tion triggers aggression.
object of their hate, haters enhance skinheads loiter. Most skinhead
their self-image, as well as their groups claim turf proximate to the Stage 6: The Hate Group
group status. In skinhead groups, neighborhoods in which they live. Attacks the Target with
racist song lyrics and hate literature One study indicated that a majority Weapons
provide an environment wherein of hate crimes occur when the hate Several studies confirm that
hate flourishes. In fact, researchers target migrates through the hate a large number of bias attacks in-
have found that the life span of group’s turf.15 volve weapons.20 Some attackers

4 / FBI Law Enforcement Bulletin


use firearms to commit hate crimes, use a lifted eyebrow, a code word to ASSESSMENT
but skinheads prefer weapons, such exclude the hated coworker from a Assessing and analyzing
as broken bottles, baseball bats, lunch invitation, or any number of skinhead groups can help investiga-
blunt objects, screwdrivers, and other actions to demean and isolate. tors tailor intervention strategies to
belt buckles. These types of weap- The haters even may adopt a name each hate group, thus increasing the
ons require the attacker to be close for their group (Stage 2). At this probability of successful interven-
to the victim, which further demon- point, the haters only disparage the tion and rehabilitation. Law en-
strates the depth of personal anger. hated coworker within their group forcement can assess a skinhead
Attackers can discharge firearms at (Stage 3). As time passes, the haters group by first determining if the
a distance, thus precluding personal openly insult the hated coworker ei- group is hate motivated or crimi-
contact. Close-in onslaughts require ther directly or indirectly by allow- nally motivated. The best method to
the assailants to see their victims ing disparaging remarks to be over- establish motivation is through one-
eye-to-eye and to become bloodied heard from afar (Stage 4). One on-one interviews, although re-
during the assault. Hands-on vio- morning, the hated coworker dis- viewing police reports and criminal
lence allows skinheads to express covers his desk rearranged and histories prove adequate determin-
their hate in a way a gun cannot. ing factors as well.
Personal contact empowers and Second, investigators should
fulfills a deep-seated need to have measure the maturity of the group,
dominance over others. which is not determined by the
chronological age of the group’s
Stage 7: The Hate Group members but by the collective ac-
Destroys the Target tions of the group. Violence consti-
The ultimate goal of haters is to tutes an important maturation indi-
destroy the object of their hate. cator. Comparing the group’s
Mastery over life and death imbues activities to the stages in the hate
the hater with godlike power and model can determine the maturity
omnipotence, which, in turn, facili- of a skinhead group. Mature groups
tate further acts of violence. With commit more violent acts than im-
this power comes a great sense of mature groups.
self-worth and value, the very quali- © Corbis An additional step in the assess-
ties haters lack. However, in reality, ment process involves gauging the
hate physically and psychologically offensive images pasted over a pic- strength of the group’s mythology.
destroys both the hater and the ture depicting his wife and children Immature groups have simple my-
hated. (Stage 5). From the sophomoric to thologies, whereas mature groups
the terroristic, acts of hate have the have more complex and stubborn
Model Application same effect. Eventually, the haters mythologies. Studying group my-
Anecdotal evidence suggests sabotage the hated coworker’s thologies proves difficult because
that this hate model has a wider projects and attempt to ruin the they represent the aggregate of a
application. For example, when a individual’s reputation through group’s common beliefs, experi-
coworker becomes a hate target for rumors and innuendoes (Stage 6). In ences, symbols, and rituals.
reasons other than race, sex, or na- so doing, the haters make the work
tional origin, the hater immediately environment intolerable for the hate SYMBOLS, RITUALS, AND
seeks out others in the office who target (Stage 7). Scenarios like this MYTHOLOGY
dislike, or can be persuaded to dis- occur every day across America Fully understanding hate
like, the hated coworker (Stage 1). and, indeed, around the world. The groups involves identifying and
The group establishes an identity targets of hate may change, but the defining their unique symbols, ritu-
using symbols and behaviors. They hate process remains constant. als, and mythologies. Symbols give

March 2003 / 5
greater meaning to irrational hate. Mythologies nurtured, reinforced, questions, such as “Why do you
Haters use symbols for self-identifi- and protected from outside ideas hate?” “Can’t you see what you’re
cation and to form common bonds provide a forum where group doing is wrong?” “How would you
with other group members. Addi- members can escape individual like it if someone picked on you
tionally, they often swear alle- responsibility. “When we lose our because of your race?” Skinheads
giance to these symbols. For ex- individual independence in the answer smugly; they feel secure as
ample, the swastika, a simple corporateness of a mass movement skinheads. Because hate masks per-
symbol, served as a powerful rally- we find a new freedom–freedom to sonal insecurities, interviewers
ing point for the Nazi movement hate.”24 should temporarily forego ques-
and helped mobilize an entire tions about why skinheads hate and
country.21 strive to identify the skinheads’ per-


Each hate group adopts its own sonal insecurities. Interviewers
symbols or borrows them from oth- should begin this probe by asking
ers. Symbolic words and nonverbal An accurate skinheads about their family rela-
behaviors reflect individual disdain assessment of tionships, which probably represent
and serve as advertisements to at- the source of the skinhead’s insecu-
tract fellow sympathizers. Offen-
skinhead groups is rities because a sense of who people
sive language is the most common critical to developing are and where they fit in society
expression of dislike for others. intervention typically develops within the family
Hate groups also display contempt strategies. structure. Interviewers also should
by using nonverbal gestures, such explore skinheads’ future plans,


as a Nazi salute. Clothes, short hair- educational goals, and desired em-
cuts, military boots, tattoos, and ployment. This forces skinheads to
bumper stickers also represent sym- see themselves as they really are. If
bols that can effectively communi- INTERVIEWING forced to look at themselves,
cate hate. TECHNIQUES skinheads become vulnerable, less
Symbols, however, are not Ironically, skinheads, espe- resistant to rehabilitation, and, in
enough to unify a group; therefore, cially hate-motivated skinheads, law enforcement settings, more
more organized hate groups incor- talk to anyone who will listen, in- likely to confess. This process
porate rituals, which serve two cluding law enforcement officers. could take several hours or many
functions. First, they relieve indi- One investigator who knew little months depending on the resistance
vidual group members from deep about white-supremacist ideology level of the skinhead.
thought and self-examination. Sec- simply asked skinheads why they This strategy proves less effec-
ond, rituals reinforce beliefs and hated, what their tattoos meant, and tive when interviewing criminally
fortify group unity. how skinhead groups were orga- motivated skinheads because they
The hate group’s experiences, nized. Numerous interviews and view themselves as criminals who
beliefs, and use of symbols and observations substantiated the ini- hate, rather than haters who commit
rituals combine to create group my- tial information obtained by the in- criminal acts. More traditional in-
thologies. Mythologies unify dis- vestigator. On the other hand, terviewing strategies have proven
parate thoughts and act as filters criminally motivated skinheads are successful with criminally moti-
through which group members in- less likely to talk because they act vated skinheads.
terpret reality.22 Group mythologies more like criminals. Investigators
can have profound effects on its should determine the motivation of INTERVENTION
members.23 A group with a power- skinheads when planning interview STRATEGIES
ful mythology results in one resis- strategies. An accurate assessment of
tant to ideological challenges, and, Hate-motivated skinheads skinhead groups is critical to
therefore, it is more dangerous. have well-rehearsed answers for developing intervention strategies.

6 / FBI Law Enforcement Bulletin


Dismantling immature skinhead at the African-American patrons. operating provides valuable infor-
groups proves easier than breaking Instead of leniency for the first-time mation to determine how dangerous
down sophisticated skinhead offenders, the Los Angeles County the group is and what type of inter-
groups. Skinheads not solidly com- District Attorney’s Hate Crimes vention strategies to employ. Early
mitted to supremacist ideology Unit recommended harsh sanctions, intervention increases the probabil-
more likely will respond to rehabili- including jail sentences. The effect ity of success, especially before the
tation attempts than hard-core was immediate. The group dis- transition period from rhetoric
skinheads.25 Skinheads who have banded and no other similar prob- (Stage 4) to violence (Stage 5).
not passed from Stage 4 (rhetoric) lems occurred in the neighborhood. These strategies can range from in-
to Stage 5 (violence) will prove The incident, in and of itself, could formal sensitivity instruction to
more receptive to rehabilitation have been interpreted as a prank, more formal programs, such as the
strategies than those skinheads who but, in reality, the group was pass- Juvenile Offenders Learning Toler-
commit violence. ing from Stage 3 to Stage 4 in the ance (JOLT) program adminis-
Investigators should approach hate model. trated by the Los Angeles County
criminally motivated skinhead District Attorney’s Office Hate
groups by using tactics similar to Crimes Unit. JOLT is a model inter-
those used against criminal street vention program intended for first-
gangs. Disrupting the activities of time, low-level offenders who face
mature, hate-motivated skinhead potential criminal prosecution and
groups requires time and more school disciplinary action.
elaborate interdiction strategies be-
cause such groups are more unified CONCLUSION
and committed to their beliefs. Con- To develop and implement suc-
versely, aggressive prosecution cessful intervention strategies to
constitutes an efficient means to deal with hate groups, law enforce-
disrupt immature, hate-motivated ment personnel first must under-
skinhead groups. stand the hate process. The hate
© Digital Stock
Law enforcement used this model identifies the multiple stages
technique to dismantle Peer Pride, of the hate process. Investigators
an immature, hate-motivated In contrast, the Lancaster NLR can use this model to identify haters
skinhead group in Palmdale, Cali- group was a mature, hate-motivated who have not yet transitioned from
fornia. The FBI learned about Peer skinhead group. Four NLR mem- hate rhetoric to hate violence and
Pride when the group hung a noose bers beat an African-American tran- target them with intervention pro-
from a tree in front of the home of sient to death to earn the right to grams, which have a higher prob-
an African-American family. Five wear lightning-bolt tattoos. Accord- ability of success. Likewise, law
Peer Pride members taunted the ing to the group’s ritual, members enforcement personnel can identify
family with racial slurs and de- only can earn lightning-bolt tattoos and target hard-core haters with ap-
manded that they move out of the by killing minorities. A review of propriate interdiction strategies.
neighborhood. Local law enforce- police reports related to NLR crimi- Knowing how the hate process
ment initially treated this incident nal activities clearly showed the works helps interviewers penetrate
as a prank because hanging the NLR group progressing through the the hate mask and address the
noose was the only reported hate seven stages of the hate model. hater’s underlying personal insecu-
activity by the group. However, a School administrators and rities. If investigators can attenuate
neighborhood canvass determined teachers can use the hate model to these personal insecurities, haters
that Peer Pride members periodi- informally assess hate group will become more receptive to reha-
cally sat in front of a local fast food activities on campus. Identifying bilitation. Identifying and under-
restaurant and shouted racial slurs the stage in which a hate group is standing the stages of the hate

March 2003 / 7
process constitute the first steps in 2000 (Washington, DC, 2001). For more Induced Mediators of Aggressive Behavior,”
information on collecting hate crime, see Journal of Personality and Social Psychology
controlling hate violence. 33 (1976): 755-763.
U.S. Department of Justice, Federal Bureau
15
of Investigation, Uniform Crime Reporting Supra note 8, 10.
Endnotes 16
1
Program, Training Guide for Hate Crime Data Supra note 8, 9.
The authors based this article on their Collection (Washington, DC, 1997). 17
Supra note 8, 10.
observations and interviews of several hundred 7
Raymond Paternoster and Alex Piquero, 18
Dolf Zillerman’s research is described in
self-described skinheads, defined as “usually “Reconceptualizing Deterrence: An Empirical Daniel Goleman, Emotional Intelligence (New
white males belonging to any of various, Test of Personal and Vicarious Experiences,” York, NY: Bantam Press, 1997), 60-62.
sometimes violent, youth gangs whose members Journal of Research in Crime and Delinquency 19
Ibid.
have close-shaven hair and often espouse white- 32 (August 1995): 251-286. 20
Supra note 8, 8.
supremacist beliefs,” Merriam Webster’s 8
See Brian Levin, “A Dream Deferred: The 21
William L. Shirer, The Rise and Fall
Collegiate Dictionary, 10th ed. (1996), s.v. Social and Legal Implications of Hate Crimes in of the Third Reich: A History of Nazi
“skinhead.” the 1990s,” The Journal of Intergroup Germany (New York, NY: Fawcett Crest,
2
See Eric Hoffer, The True Believer: Relations 20, no. 3 (Fall 1993): 10, citing Jack 1960), 71.
Thoughts on the Nature of Mass Movements Levin and Jack McDevitt, Hate Crimes: The 22
Daniel C. Maguire and A. Nicholas
(New York, NY: Harper and Row, 1989). Rising Tide of Bigotry and Bloodshed (New Farnoli, On Moral Grounds: The Art, Science
3
Ibid. York, NY: Plenum Press, 1993). of Ethics (New York, NY: The Crossroads
4
Ibid. 9
Ibid. Publishing Co., 1991), 164-167.
5
Ibid. 10
Supra note 2, 93-94. 23
Joseph Campbell and Bill Moyers, The
6
Statistics, however, reveal that most 11
Supra note 2, 93-94. Power of Myth (New York, NY: Doubleday,
hate crimes are not committed by hate groups. 12
Supra note 2, 99. 1988), 31.
See U.S. Department of Justice, Federal 13
Supra note 2, 92. 24
Supra note 2, 100.
Bureau of Investigation, Uniform Crime 14
Charles W. Turner and John F. Layton, 25
Supra note 8, 10.
Reporting Program, Hate Crime Statistics “Verbal Imagery and Connotation as Memory

The Bulletin’s
E-mail Address

T he FBI Law Enforcement Bulletin staff invites


you to communicate with us via e-mail. Our
Internet address is leb@fbiacademy.edu.
We would like to know your thoughts on
contemporary law enforcement issues. We
welcome your comments, questions, and
suggestions about the magazine. Please
include your name, title, and agency
on all e-mail messages.
Also, the Bulletin is available
for viewing or downloading on a
number of computer services,
as well as the FBI’s home page.
The home page address is
http://www.fbi.gov.

8/ FBI Law Enforcement Bulletin


Bulletin Reports

Web-Based Resources
Biometrics Catalog On-line
The Biometrics Catalog, a federally funded database, is a service of the National Institute of
Justice for the biometrics community and potential users of biometric technology. The catalog is
designed to provide multiple search options so that browsers can find information quickly and easily.
This catalog can be accessed at http://www.biometricscatalog.org.
Crime Mapping Research Center (CMRC)
The CMRC Web site is the primary source of information from the National Institute of Justice’s
(NIJ) Crime Mapping Research Center. It serves as an international clearinghouse for information
about the development of crime mapping and spatial analysis. It includes a list of CMRC staff, NIJ-
funded grants that pertain to crime mapping, descriptions of upcoming conferences, a list of mapping-
related software, a bibliography of crime-mapping resources, and descriptions of CMRC’s current
initiatives. CRIMEMAP, CMRC’s listserv, is one of the center’s main information dissemination tools.
CRIMEMAP facilitates communication among crime analysts, researchers, geographers, and other
interested parties about justice-related computerized mapping technologies. CMRC can be accessed at
http://www.ojp.usdoj.gov/nij/maps.

Law Enforcement
The National Institute of Justice (NIJ) and the Office of Community Oriented Policing Services
(COPS) sponsored a study on the combined effects of pepper spray exposure and positional restraint
on respiratory functions. Pepper Spray’s Effects on a Suspect’s Ability to Breathe presents the results
of this study. This NIJ Research in Brief (NCJ 188069) summarizes the issues that gave rise to the
study, the study’s major findings, and their implications for law enforcement. Findings suggest that
inhalation of pepper spray does not pose a significant risk
to subjects in terms of respiratory and pulmonary functions,
even when it occurs with positional restraint. However, Bulletin Reports is an edited collection
pepper spray exposure did result in a small but statistically of criminal justice studies, reports, and
significant increase in blood pressure, the origins and project findings. Send your material for
implications of which remain unclear. This report is consideration to: FBI Law Enforcement
available electronically at http://www.ojp.usdoj.gov/nij/ Bulletin, Room 209, Madison Building,
pubs-sum/188069.htm or by contacting the National FBI Academy, Quantico, VA 22135.
Criminal Justice Reference Service at 800-851-3420. (NOTE: The material in this section is
intended to be strictly an information
source and should not be considered an
endorsement by the FBI for any product
or service.)

March 2003 / 9
© John Foxx Images

criminal intimidation, harassment,


fear, and suggestive violence where
individuals use the Internet as a tool
to stalk another person. The term
cyberstalking has emerged to de-
scribe the use of such technology to
harass or stalk.3 Cyberstalking is
defined as the repeated use of
the Internet, e-mail, or related
digital electronic communication
devices to annoy, alarm, or threaten
a specific individual or group of
individuals.
All 50 states and the federal
government have enacted statutes
aimed at protecting the victims of
stalking. Many of these statutes
have existed for a long time, while
others have originated recently.

A Study on Some of the older statutes were


broad enough to cover any type
of stalking behavior, including
Cyberstalking cyberstalking; others had to be
amended to do so. In some jurisdic-
Understanding tions, new laws specifically ad-
dressing the problem of cyber-
Investigative Hurdles stalking have been enacted. In
adapting general stalking and ha-
By ROBERT D’OVIDIO, M.S., and JAMES DOYLE rassment statutes to cover instances
of cyberstalking, legislators have
expanded the means by which

B y enabling human interac- enforcement officers with solutions offenders commit this crime to
tion without the constraints when they encounter impediments include electronic communication
of physical barriers and with investigating these types of cases. devices.
the perception of anonymity, the Several states currently include
Internet has become the ideal in- DEFINITION OF specific protections against threat-
strument for individuals who wish CYBERSTALKING ening electronically transmitted
to intimidate, threaten, and harass As the Internet becomes the communications in their stalking
others. A stalker can use the communication device of choice for or harassment statutes.4 Addition-
Internet to send alarming messages millions of people worldwide, news ally, Title 18, Section 875, U.S.
anywhere, within a matter of headlines, such as “Killer Keeps Code, criminalizes threatening
moments, under the guise of a ficti- Web Pages on Victim, Stalks Her messages transmitted electronically
tious screen name or pseudonym. Through Internet” 1 and “Penn in interstate or foreign commerce.
Understanding how offenders Opens Hate E-mail Inquiry,”2 have The use of federal legislation to
use the Internet to stalk victims begun to appear more frequently. prosecute cases of cyberstalking,
in cyberspace can provide law These headlines depict stories of however, is limited, by law, to

10 / FBI Law Enforcement Bulletin


instances where the harassing mes- computer or the Internet as an in- contained within standardized
sages are transmitted across state strument to commit a crime or forms filed by the complainant at
lines or outside the United States. where a computer represents the the time of the initial complaint and
Despite the existence of Title 18, target of a crime or constitutes a standardized investigative forms
Section 875, the federal govern- source of evidence relating to a that detail the progress of the inves-
ment historically has limited its in- crime. The unit also performs out- tigation from beginning to end.
volvement in prosecuting cases re- reach services to business and com- Data were gathered using all closed
lated to electronically transmitted munity groups to educate people on cases of aggravated harassment5 in-
threatening messages to cases in- computer ethics, safe Internet prac- vestigated by NYPD from January
volving special circumstances, such tices, and data security issues re- 1996 through August 2000 in which
as threats made against the presi- lated to the most current practices criminals used a computer or the
dent of the United States. As with of computer hackers. Additionally, Internet as the instrument of the of-
stalking that does not involve the CITU provides training and techni- fense. In addition to the date of the
Internet, local authorities investi- cal assistance to local, state, and offense, descriptive information
gate and prosecute most cyber- federal law enforcement and was gathered on the victim, the of-
stalking cases in either the jurisdic- prosecutorial agencies. fender, the outcome of the case, the
tion where the victim resides or in method used to harass, and whether
the jurisdiction where the messages Methodology the victim and suspect resided in the
originated. The authors used official police same jurisdiction.
With the rapid pace of techno- records from NYPD’s CITU to
logical advancement that exists capture data on the extent and Extent of the Problem
in today’s society, legislation nature of cyberstalking for this When compared to other
should take an evolutionary ap- study. Specifically, the data for this cybercrimes, cyberstalking has
proach toward defining electronic study were drawn from information been the most prevalent crime
communication devices and sys-
tems of transmission. Legislation
that limits electronic devices and
transmission systems to specific
technologies, such as telephones
and land-based wires, risk becom-
ing antiquated with the emergence
of new technologies, such as com-
puters and wireless transmission
systems.
THE STUDY

Background
Anticipating the significant
role computers would play in the
commission of crimes in the future, Mr. D’Ovidio is a Ph.D. student Mr. Doyle serves as president
the New York City Police Depart- and instructor at Temple of a private company that
University in Philadelphia, trains law enforcement and
ment (NYPD) developed the Com- consults in the area of high-
Pennsylvania.
puter Investigation & Technology tech crime.
Unit (CITU) in 1995. CITU investi-
gates cases where offenders use a

March 2003 / 11
reported to and investigated by all investigative leads without where investigators determined that
CITU since the unit’s inception. positively identifying a specific a threatening or alarming message6
During the 56-month period from offender. was transmitted using a computer or
January 1996 through August 2000, the Internet (excluding cases with
42.8 percent of the cases investi- The Offender unfounded outcomes). Females, the
gated by CITU involved aggravated Offender characteristics were most likely recipients, were victim-
harassment by means of a computer examined using the 134 closed ized in about 52 percent of the
or the Internet. Additional CITU in- cases where a suspect was arrested cases, whereas males were the vic-
vestigations during this period in- or where evidence to support an ar- tims of aggravated harassment in
volved grand larceny, computer and rest existed but a suspect was not approximately 35 percent. Educa-
network trespassing, forgery, petty arrested because of an uncoopera- tional institutions represented the
larceny, criminal impersonation, tive complainant or a jurisdictional next most likely target with 8 per-
child pornography, crimes against issue. The results revealed that cent. Offenders chose private cor-
children, and schemes to defraud. porations in almost 5 percent of the


Understanding the distribution cases. Public-sector agencies were
of cybercrimes is essential to allo- targeted in about 1 percent of the
cating a computer crime unit’s cases.
resources in a cost-efficient man- ...computer crime Approximately 85 percent of
ner. Training that provides investi- investigation units victims were white, 6 percent
gators with the technical know- should develop Asian, 5 percent black, and 4 per-
ledge and procedural experience working relationships cent Hispanic. The average age of
needed to successfully investigate with their counterparts the victims was 32, with the young-
cyberstalking should be a priority in other jurisdictions. est victim being 10 years old and the
for a computer crime unit. Agencies oldest being 62 years of age.
should note that the technical train-


ing needed to successfully investi- Technological Methods
gate cases of cyberstalking is not In 92 percent of the cases,
entirely crime specific and will males (approximately 80 percent of offenders used only one method
prove useful when investigating the cases) were more likely than fe- to stalk their victims. E-mail was
other types of computer-related males to commit aggravated harass- used most often. Offenders used e-
crime. ment using a computer or the mail to harass their victims in ap-
An examination of case out- Internet. Approximately 74 percent proximately 79 percent of the cases.
comes revealed that 192 of the 201 of the offenders were white, 13 per- The second method most often
cyberstalking cases investigated cent Asian, 8 percent Hispanic, and used by offenders was the instant
by CITU were closed during the 5 percent black. The average age of messenger. Offenders used instant
56-month period of this study. the offender was 24, with the oldest messengers to harass their victims
Approximately 40 percent of the offender being 53 years old and the in about 13 percent of the cases.
cases were closed with an arrest, youngest being 10 years old. Ap- Chat rooms were used in approxi-
and almost 11 percent of the cases proximately 26 percent of offenders mately 8 percent of the cases,
failed to produce evidence that a were juveniles, according to New while message boards and Web
crime was committed. CITU closed York State law, or under the age of sites were used respectively in
the remaining cases after finding 16. 4 percent and 2 percent of the
evidence to support the victim’s cases. Last, offenders employed
complaint due to a jurisdictional The Victim newsgroups and false user profiles
issue, an uncooperative complain- Victim characteristics were ex- in approximately 1 percent of the
ant, a case transfer, or exhausting amined using the 171 closed cases cases.

12 / FBI Law Enforcement Bulletin


Cyberstalking Methods
Cyberstalkers have employed various methods of • Chat rooms: A method of communication that enables
Internet communication to harass their victims. Although real-time text, audio, and video-based group interaction.
Chat rooms, or chat channels, usually are organized
not exhaustive, the following list describes some of the
around specific topics of conversation. Topics include,
methods that cyberstalkers may use: but are not limited to, such issues as politics, religion,
• E-mail: A method of communication that allows relationships, and sex. When communicating in a chat
an individual to transfer text, picture, video, and room, a participant’s messages are broadcast to
audio files to another person’s electronic mailbox. In everyone signed into the particular chat room. Several
using e-mail to harass, the cyberstalker creates a text- types of chat services have emerged since the develop-
based, graphic-based, or audio-based message of a ment of the Internet. Chat services can be public or
threatening, alarming, or otherwise harassing nature private. Public chat services are open to everyone with
and sends it to the e-mail account of the intended access to the Internet. For example, Internet relay chat
victim. (IRC) and I seek you (ICQ) chat are open to all Internet
• Newsgroups: A method of communication that amounts users. Both IRC and ICQ chat rooms have hundreds of
to an ongoing discussion about a particular topic. chat channels that cover a diverse range of subjects and
Internet users contribute to the ongoing discussion by enable the transfer of files between active participants.
posting their opinions, comments, or related experi- Unlike public chat services, private services limit access
ences about a particular subject. These postings are to their chat channels and are hosted by specific on-line
linked together and can be retrieved by querying a service providers. Chat rooms provide cyberstalkers
database of newsgroup topics. Cyberstalkers can use with different options to harass their victims. A stalker
these forums to post threatening or defamatory can send alarming messages directly to the victim while
statements directed at a specific individual or group of conversing in a chat room. The message is delivered to
individuals. In New York v. Munn (688 N.Y. S.2d 384; the intended victim, as well as to all those users who
1999), the court found the defendant guilty of aggra- currently are logged into the chat room. In addition, the
vated harassment for posting a message to an Internet cyberstalker can pose as the victim in a chat room and
newsgroup that instructed people to kill police officers provide personal information to participants, thereby
from the NYPD. resulting in the intended victim being directly contacted
in person, by e-mail, or by phone.
• Message boards/guest books: A method of communica-
tion similar to a newsgroup in that its contents amount • Third-party instant messengers: A method of communi-
to comments about a particular topic. Internet sites cation that enables real-time text, audio, and video-
often have guest books where visitors can enter based interaction between two individuals over the
their names and make comments about the site. The Internet or a computer network. Users program their
visitor’s name and comments are subsequently avail- instant messenger software to notify them when
able to be viewed by others visiting the Web site. A designated individuals log on to the network. With
person who wants to threaten or harass the owner of a instant messaging software, users have the ability to
Web page easily can leave alarming messages in a engage in real-time dialogue with a designated person as
guest book. long as both parties are connected to the network.
Stalkers with prior knowledge of a victim’s screen name
• Internet sites: A method of communication that can use an instant messenger to send harassing
involves posting information to a unique uniform messages in real time when both parties are logged onto
resource locator (URL). Internet users later can retrieve the Internet.
this information by directing their Web browser to the
corresponding URL. An Internet site becomes the • Commercial service user profiles: A method of
method of harassment when a cyberstalker posts communication that involves posting descriptive
information on a Web page about an individual that information about oneself to the membership directory
causes them to become alarmed or frightened. For of a commercial Internet service. Service subscribers
example, a cyberstalker could create an Internet site can query this directory so that they may find other
that advertises sexual services for hire and includes the members who share similar hobbies, interests, or
victim’s picture, phone number, and address. Subse- backgrounds. People who want to harass others may
quently, the victim is bombarded with telephone calls establish a false user profile that will direct unwanted
or personal visits from individuals inquiring about the communication toward their victim in the form of
advertised sexual services. repeated telephone calls, e-mails, or in-person contact.

March 2003 / 13
Resources
U.S. Department of Justice Cybercrime Web Site: http://www.cybercrime.gov
High Technology Crime Investigation Association: http://www.htcia.org/
SEARCH—The National Consortium for Justice Information & Statistics: http://www.search.org/
National Center for Missing & Exploited Children: http://www.ncmec.org/
International Association of Computer Investigative Specialists: http://www.cops.org/
Compuforensics: http://www.compuforensics.com/
National Law Enforcement & Corrections Technology Center: http://www.nlectc.org/
National White-Collar Crime Center: http://www.iir.com/nwccc/nwccc.htm

Knowing the type of Internet computer-mediated communication outcome of a case. In New York
technology used most often by present law enforcement with City, the District Attorney’s Office
cyberstalkers can prove beneficial jurisdictional issues that could is less inclined to prosecute aggra-
to law enforcement administrators negatively impact the investigation vated harassment cases if the arrest
who must decide how to allocate and the subsequent prosecution of of the suspect requires extradition
the training budget for computer computer crimes. 7 With the from another jurisdiction. Such
crime investigators. Because e-mail Internet, stalkers no longer need policies have prevented the appre-
constitutes the method most often physical proximity to have contact hension of offenders by the NYPD
used by cyberstalkers, unit adminis- with their victims. They just as in cases where investigations by
trators should prioritize technical easily can harass a person in CITU have produced evidence sup-
training that provides investigators another state or country as they porting their arrests. In 20 aggra-
with the knowledge needed to can a person who lives in close vated harassment cases investigated
perform e-mail-related forensics. proximity. by CITU, the NYPD did not arrest
The majority of CITU’s aggra- the suspects, despite supporting evi-
ISSUES FACING LAW vated harassment cases involved in- dence, because their arrests would
ENFORCEMENT AND vestigations where both the of- require extradition from another ju-
POTENTIAL SOLUTIONS fender and victim resided within the risdiction. In these cases, the NYPD
Technical features of the jurisdiction of the NYPD. In ap- made referrals to the police depart-
Internet and procedural issues proximately 72 percent of the cases, ments that had jurisdiction over the
with the law present problems for the offender and the victim resided offenders.
criminal justice agencies when within the five boroughs of New Differences in statutory defini-
investigating and prosecuting York City. In comparison, 26 per- tions of stalking across states
cyberstalking cases. These prob- cent of the cases involved either an may complicate the investigation
lems, however, are not crime spe- offender or a victim who resided and prosecution processes when
cific and generally occur when outside the jurisdiction of the offenders reside outside the
agencies investigate and prosecute NYPD but within the United States, jurisdiction of the investigating
cases involving any type of com- while 2 percent of the cases in- agency. Jurisdictions that do not
puter crime. volved an offender from a foreign recognize Internet communication
country. as a viable method to stalk or
Jurisdiction An offender residing outside harass may deny or ignore the
The global reach of the Internet the jurisdiction of the investigating extradition request, search warrant,
and the instantaneous nature of agency can negatively impact the or subpoena of a jurisdiction where

14 / FBI Law Enforcement Bulletin


such methods do constitute a crimi- cyberstalking or when revising ex- and time an investigator spends on a
nal offense. isting stalking legislation to include case.
To minimize the negative im- Internet communication, states Out-of-date and missing ac-
pact jurisdictional issues have on should define the venue of the of- count, subscriber, or user informa-
the successful investigation and fense in a manner that includes both tion also presents problems to law
prosecution of cyberstalking cases, the place where the communication enforcement agencies when investi-
computer crime investigation units was received and the place where gating cases of cyberstalking. With-
should develop working relation- the communication originated. out toll records or transactional
ships with their counterparts in data, investigators can have a diffi-


other jurisdictions. Such relation- cult time establishing an electronic
ships can prove essential to secur- link between the suspect and the
ing the arrest of out-of-state or for- victim. The financial and human
eign offenders in their home ...administrators costs associated with gathering and
jurisdictions when the victim’s ju- maintaining account information
risdiction will not arrest if extradi-
should prioritize decreases the possibility that
tion is required. In addition, cross- technical training Internet service providers will vol-
jurisdictional relationships between that provides untarily collect and maintain such
computer crime investigation units investigators with the data for a useful period of time.
can help secure the execution of knowledge needed to Missing toll records, transactional
out-of-state subpoenas and search perform e-mail- data, user information, or account
warrants and facilitate relationships content resulted in a negative case
with out-of-state Internet service
related forensics. clearance in approximately 18 per-
providers, computer manufacturers, cent of the cyberstalking cases in-


and software developers. Over the vestigated by CITU. In these cases,
past decade, various professional the content of the communication
organizations have formed for those contained a threatening message,
involved with the investigation of Account and User but no arrest occurred because de-
computer-related crimes. Participa- Information tectives could not gain access to the
tion in these organizations can The unwillingness of some electronic evidence to legally sup-
provide law enforcement with in- Internet service providers to readily port apprehending a specific indi-
valuable links to out-of-state grant law enforcement access to vidual. To ensure that account, sub-
resources. subscriber records further compli- scriber, and user information are
Because of the ease with which cates the investigation of a collected and saved long enough to
cyberstalkers may attack across ju- cyberstalking case. Not all Internet help law enforcement, legislation
risdictional lines, legislatures service providers agree on what that regulates Internet service pro-
should carefully define the venue of constitutes subscriber records, viders should include data collec-
the offense. In cases where threat- which are obtainable by subpoena, tion requirements.
ening communication originates as opposed to transactional records,
from another state or country and which require a search warrant.8 Anonymizing Tools
the statute of the investigating juris- When compared to obtaining tele- The continued development
diction defines the venue of the of- phone records from a telephone and increased availability of
fense in terms of where the commu- company, obtaining a suspect’s anonymizing Internet tools (i.e., de-
nication originated, the criminal Internet account information from a vices that ensure a person’s ano-
justice community will not be able service provider can prove far more nymity when using the Internet) can
to properly serve the victim. When complicated and involve an in- complicate the investigation of
creating legislation to combat crease in the amount of paperwork cyberstalking cases. Anonymous

March 2003 / 15
remailers allow individuals to send investigated by CITU. Investiga- offenders used anonymous Web-
electronic mail without transmitting tors, however, could not trace the browsing services to stalk their
any information that would enable harassing e-mail messages sent victims.
others to determine the identity of through the anonymous remailers The widespread availability of
the author. Remailers strip identify- back to their authors in all four anonymizing tools can increase the
ing information from the e-mail cases where these tools were used. amount of cyberstalking and
header and erase any transactional Anonymous Web-browsing Internet deviance in general. Theo-
data from servers that would enable services also offer cyberstalkers the retically, deviance will result from
law enforcement to trace the mes- opportunity to harass or threaten the use of anonymizing tools
sage back to the author. Conse- victims while remaining virtually because people will feel less
quently, cyberstalkers who use an untraceable to law enforcement. restrained when not faced with the
anonymous remailer as the sole Some companies provide users fear of detection by their victim or
means to send threatening or ha- with the ability to surf the Inter- the police. The absence of a legally
rassing e-mail messages will remain net, participate in public chat chan- binding international body to regu-
virtually undetectable to the victim nels, send instant messages, and late the Internet leaves little hope
and law enforcement. The danger post messages to newsgroups that the deployment of anonymizing
raised by the use of anonymous without transmitting any identify- tools will be stopped. Even if a
remailers, as depicted by CITU’s ing information. The exclusive country did succeed in banning the
caseload, does not stem from the use of such services to send harass- distribution of anonymizing tools,
frequency in which these tools ing messages would prevent inves- the global reach of the Internet
are used, but from the effect tigators from establishing an would enable people to seek out
these tools have on the investigative electronic link between the such tools in countries that allow
process. Anonymous remailers victim and the offender. An exami- their use. Consequently, citizens
were used in only 4, or 2.1 percent, nation of CITU’s cyberstalking must learn to survive on an Internet
of the 192 cyberstalking cases caseload found no instances where where people can act without ac-
countability. In the absence of a
regulatory solution to safeguard
Internet users against those who
Distribution of Cybercrimes Investigated by employ anonymizing tools to ha-
the New York City Police Department rass, Internet service providers and
January 1996 through August 2000 related software companies should
seek a technological solution aimed
Number of Percent at blocking unwanted anonymous
Crime Cases of Cases communication.
Aggravated harassment 201 42.8
Grand larceny 102 21.7 CONCLUSION
Hacking (e.g., computer trespass) 46 9.8 Because the Internet allows hu-
Forgery 23 4.9 man interaction without physical
Petit larceny 22 4.7 barriers and with the perception of
Criminal impersonation 20 4.3 anonymity, it has become the ideal
Child pornography 19 4.0 instrument for individuals who
Crimes against children 14 3.0 wish to intimidate, threaten, or ha-
Scheme to defraud 10 2.1 rass. Federal and state legislation
Other crimes 13 2.8 have emerged to criminalize such
Total 470 100 behavior. Legislatures aiming to
criminalize cyberstalking should

16 / FBI Law Enforcement Bulletin


take an evolutionary approach to- electronic link between the suspect (November 7, 1999), retrieved June 21, 2001,
from http://www.phillynews.com/inquirer/99/
ward defining the means of commu- and the victim. To offset this
Nov/7/front_page.
nication covered by the law to negative effect, legislative action 3
U. S. Department of Justice, “1999 Report
ensure protection against harassing should establish data collection on Cyberstalking: A New Challenge for Law
communications sent using newly standards for Internet service pro- Enforcement and Industry,” August 1999;
retrieved November 6, 2001, from http://
developed technologies. viders that meet the needs of com-
www.usdoj.gov/criminal/cybercrime/
An examination of all computer puter crime investigators. cyberstalking.htm.
crimes investigated by the New 4
American Prosecutors Research Institute,
York City Police Department from The Status of Cyberstalking in the Context of


Violence Against Women (Arlington, VA:
January 1996 through August 2000
American Prosecutors Research Institute,
found cyberstalking to be the most 1999). For instance, section 240.30 of the New
prevalent computer crime investi- All 50 states and the York State Penal Law finds a person guilty of
gated by the department. Thus, po- federal government aggravated harassment if the individual
purposely intends to harass, annoy, threaten, or
lice personnel administrating com- have enacted statutes alarm another person by means of mechanical,
puter crime units should prioritize
staffing and training initiatives that
aimed at protecting the electronic, or written communication.
Additionally, New York revised its antistalking
properly equip their units to deal victims of stalking. statutes in December 1999 to cover electronic
communication, such as e-mail, that is likely to
with the cyberstalking problem.


cause fear or harm. In defining the actions that
Additionally, because cyberstalkers constitute stalking, section 646.9 of the
use e-mail as the communication California State Penal Code includes verbal,
method of choice, computer crime written, or electronic communications that are
unit administrators should prioritize Finally, the infrequent use of intended to place individuals in reasonable fear

technical training that provides in- anonymous remailers by cyber- for their safety. In defining electronic
stalkers should not pull attention communications, California has relied upon the
vestigators with the knowledge definition used in the U.S. Code for regulating
needed to perform e-mail-related from the negative effect that these behavior related to communication devices.
forensics. tools can have on the law enforce- Specifically, the term electronic communication

Out-of-date and missing ac- ment process. The increased avail- means “any transfer of signs, signals, writing,
ability and continued development images, sounds, data, or intelligence of any
count, subscriber, and user informa- nature transmitted in whole or in part by a wire,
tion, as well as anonymizing tools, of anonymizing Internet tools that radio, electromagnetic, photo-electronic or
presented problems for law en- are easier to use than previous photo-optical system.” According to the

forcement during cyberstalking in- versions likely will increase the use California State Penal Code, the devices used to
of these options by criminals. When transmit electronic communications include,
vestigations. Working relationships but are not limited to, telephones, cellular
between computer crime units in all used, anonymous remailers suc- phones, computers, video recorders, fax
agencies can minimize the negative cessfully prevented law enforce- machines, and pagers.

effects that jurisdictional issues ment from tracing e-mail messages 5


New York Penal Law § 240.30
6
back to the offender. A technologi- As defined by New York Penal Law §
have on the investigation and 240.30.
prosecutorial processes. These re- cal solution aimed at blocking 7
Neil Barrett, Digital Crime: Policing the
lationships can help facilitate the anonymous communication will Cybernation (London, England: Kogan Page,

execution of out-of-state subpoenas offset the threat to users posed by 1997).


8
anonymous remailers. The legal requirements for obtaining such
and search warrants and provide records are contained in the Electronic
law enforcement with an open door Communications Privacy Act (ECPA), codified
in 18 U.S.C. §§ 2701-2711.
to out-of-state Internet service Endnotes
providers. 1
“Killer Keeps Web Pages on Victim,
Mr. D’Ovidio can be reached via
Out-of-date and missing ac- Stalks Her Through Internet,” (November 29,
1999), retrieved June 21, 2001 from http:// e-mail at dovidio@temple.edu.
count, subscriber, and user informa- www.canoe.ca/technews9911/30_killer.html. Mr. Doyle can be reached via e-mail at
tion also have prevented law en- 2
Sudarsan Raghavan, “Penn Opens Hate jrdoyle@internetcrimes.com.
forcement from establishing an E-mail Inquiry,” Philadelphia Inquirer on-line

March 2003 / 17
Police Practice
examination for the police officer position, and, of
Recruitment Strategies those, 100 individuals passed. When the department
A Case Study in Police offered the police test again in 1999, 47 applicants
took the test and 36 (76 percent) passed.
Recruitment The next stage in the testing process consists of
By Mark A. Spawn the physical agility test. The department tests candi-
dates for flexibility, the amount of push-ups and sit-
ups performed in a certain time frame, and the
completion of a 1.5-mile run. In 1999, more than 58
percent of the applicants could not pass the agility
test, which left a short list of candidates. After the
remaining group completed background investigations
and psychological and polygraph testing, seven more
applicants were excluded from the list leaving only 12
percent of those who had taken the written test
eligible for appointment. The shortage of eligible
candidates seriously concerned the department. In
particular, candidates did not seem prepared for the
agility test. The written examination had not changed
significantly in recent years, but neither had the
agility standards. To rectify the problem of a seriously
short candidate list, the Fulton Police Department
announced another written test in 2000 to garner more
candidates.
Recruitment
For the written test in 2000, the department
embarked on a serious recruitment campaign. The

F or years, an official advertisement in a local


newspaper constituted the only police recruit-
ment efforts of the Fulton, New York, Police Depart-
ment. The simple announcement usually provided a
department sent posters to area colleges and press
releases to local newspapers and radio and television
stations. The department highlighted the recruitment
drive, as well as the physical standards, on a special
sufficient number of applicants for screening and page on its Web site. The department’s officers and
hiring purposes. However, the department recently their families, as well as the department staff, assisted
encountered a problem—even though applicants with the production of a television commercial that
passed the written civil service test, many of them aired in the region and drew the most attention. It
failed the physical agility test. showcased Fulton and its police department by
starting with a community theme, then leading to a
Background police officer talking with a citizen, investigating an
Fulton, New York, a small city in the central part accident, and examining crime scene evidence. At the
of the state, employs 35 sworn officers to serve the end of the commercial, viewers saw a telephone
community. The Fulton Police Department maintains number and heard a voice that asked them, “Are you
an active police candidate list for at least 2 years and, up to the challenge?” For 2 months, the agency
often, up to 4 years. But, because of an insufficient continued a barrage of media releases and aired the
number of candidates several years ago, the agency television commercial. This proved an unusual
offered the civil service test, the first phase of the recruitment approach in the area, and it drew the
testing process, for police officers for the second time attention of all three local network affiliates, which
in 2 years. In 1996, 144 applicants took the written increased publicity even more. During this time, the

18 / FBI Law Enforcement Bulletin


Recruitment Strategy

1999 2000
No Strategy Aggressive Strategy

Candidates taking
47 160
written test

Candidates passing
36 111
written test

Top-scoring candidates
42% 71%
passing all screenings*

*includes written exam, physical agility test, and background investigation

department made applications available not only and, particularly, the emphasis on the physical agility
through the civil service office during business hours component.
but also from the police department. All of these During the written examination in 2000, the
efforts proved so successful that the department had department surveyed candidates to elicit responses
to use a high school gymnasium as a testing center. concerning recruitment efforts. It designed the survey
To help candidates meet the required physical to measure best practices for recruitment, availability
fitness standards, each applicant received a summary of application packages, number of police tests taken,
of the requirements. Even though the standards and applicants’ knowledge of physical agility stan-
constitute a part of the basic application package, the dards. A summary of the survey results indicated that
department added emphasis by attaching a simplified newspaper advertising proved the most prominent
chart, which showed applicants what the department medium from which candidates learned about the
would require if they passed the written examination. police test, followed closely by the television adver-
Candidates received the fitness standards once again tising. Candidates suggested that newspaper and
prior to agility testing, several weeks before the test. television were the best mediums to notify them of
By providing this information to the candidates well future tests. The availability of police test packages
in advance, the department hoped that the elimination was important—45 percent of candidates obtained
rate would decrease significantly. them from the police station and 33 percent from the
personnel office.
Results The most critical survey question evaluated
The results of candidate testing showed that the whether the department delivered the message on
department’s efforts paid off. A record 160 candidates agility standards. Surveys asked if candidates knew
took the written examination and 111 (69 percent) about the physical agility requirements. An over-
passed. A segment of those applicants with a passing whelming 94 percent said that they knew, and 5
score underwent the physical agility testing. Of that percent answered that they “somewhat” knew about
group, 71 percent passed, a 29 percent increase from them. Only 1 percent answered “no.” The best
the previous year. Even though a 7 percent greater analysis occurred when top-scoring candidates
failure rate existed with the written examination underwent physical agility testing. At that time, the
compared to the previous year’s exam, the significant pass rate for the agility test reached 71 percent, a 13
increase of those who successfully completed the percent increase from the previous year.
agility test gave the department a much larger candi- In New York, the entrance exam is standardized
date pool. It also validated the recruitment campaign and given on the same day statewide. This allows

March 2003 / 19
applicants to sit for one test and have their scores record number of candidates took the written exami-
filed with other jurisdictions in the state. In 2000, 82 nation, and the number of applicants who passed the
percent of the applicants sitting for the Fulton exam physical agility test increased dramatically from the
tested only for the Fulton Police Department. previous year.
A recurrent emphasis on fitness throughout the
Conclusion testing process is a message to candidates of the
The officer candidate selection process—from the importance of the standards. While some law enforce-
written test to the agility test, to background investi- ment administrators might view a high failure rate for
gations, psychological evaluations, and polygraph physical testing as a problem beyond their control, an
examinations—is intensive and expensive. After intense recruitment program highlighting the mini-
many applicants failed the physical agility test in mum requirements is one method to increase results
1999, the Fulton Police Department implemented an and yield more candidates.
aggressive recruitment campaign to attract larger
numbers of candidates. The department used a variety Chief Spawn heads the Fulton, New York, Police
of resources to recruit local residents and to advise Department.
them of required physical fitness levels. As a result, a

Subscribe Now

20 / FBI Law Enforcement Bulletin


Best Practices of a Hate/Bias
Crime Investigation
By WALTER BOUMAN

© Mark C. Ide

O n April 23, 1990, the U. S. The FBI defines a hate/bias truths to be self-evident, that all
Congress signed the Hate crime as “a criminal offense com- men are created equal, that they are
Crime Statistics Act into mitted against a person, property, or endowed by their Creator with cer-
law.1 Previous to this act, hate/bias society which is motivated, in tain unalienable Rights, that among
crimes existed, but were not whole or in part, by the offender’s these are Life, Liberty, and the pur-
tracked or focused on as a specific bias against a race, religion, disabil- suit of Happiness.”
type of crime. For example, Adolf ity, sexual orientation, or ethnicity/ Law enforcement agencies and
Hitler’s attempted genocide in the national origin.”2 Hate/bias crimes officers need to know the issues,
1930s and 1940s registers as one destroy communities, as well as guidelines, and action steps that
of the most heinous acts in history hoard resources from law enforce- comprise an effective hate/bias
and the abomination that all hate/ ment agencies. Hate/bias crimes crime response and investigation.3
bias crimes are measured against, tear at the very fabric of American Law enforcement agencies also
but, at the time of its discovery and society—a society based on clear should ensure that investigators re-
investigation, no act or specific and certain truths intended for all ceive training in such critical ele-
guideline for investigating and citizens and communities and dis- ments as understanding the role of
classifying hate/bias crimes tinctly stated in the Declaration of the investigator, identifying a hate/
existed. Independence. “We hold these bias crime, classifying an offender,

March 2003 / 21
interviewing a victim, relating to a hate/bias crime must be caring and away. Driving a victim away, even
community, and prosecuting an of- compassionate persons. They must unintentionally, will slow an inves-
fender. When hate/bias crimes oc- tolerate all races, religions, national tigation and cause the victim to feel
cur, they deserve investigators’ origins, sexes, sexual orientations, even more alienated. Responding to
timely response, understanding, and disabilities to maintain a a potential hate/bias crime in the
and vigilance to ensure an accurate nonjudgmental attitude throughout correct fashion can open the lines of
and successful investigation. While an investigation. Investigators must communication between the victim
veteran investigators of hate/bias have comprehensive knowledge of and the investigator, but it also can
crimes recognize these basic tenets, the general elements and motiva- ensure that the search for offenders
they also know the importance of tions behind hate/bias crimes. In- begins in the right direction.
revisiting them periodically to re- vestigators also need to recognize
mind law enforcement officers how the potential of such crimes to Identifying Hate/Bias Crimes
to handle fragile victims, families, affect the primary victim, the A common, but critical, mis-
and communities that have been victim’s family, other members of take in a hate/bias crime investiga-
traumatized by the hateful act of a the victim’s group, or the larger tion is the misidentification of the
criminal. Furthermore, the events of community. crime. Attempting to correct a
September 11, 2001, require the law When working with the victims misidentification with a victim,
enforcement community to render of a hate/bias crime, the role of the community, or within a law en-
special attention to these crimes be- first responder is critical.4 In many forcement agency is time consum-
cause the hated community was the instances, the investigator is the ing and difficult at best. Officers
entire United States and its way of first contact with law enforcement, unsure about identifying a potential
life. the government, or the justice sys- hate/bias crime should consult with
tem that the victim may have expe- a supervisor or an expert on the
Understanding rienced. Investigators become rep- topic. They should use the depart-
the Investigator’s Role resentatives of their entire agency, ment chain of command to inform
All investigators responding to and, without a good first impres- the department of the incident and
or helping in the investigation of a sion, the victim may feel driven to update key members throughout
the investigation. Questions similar
to the following will help investiga-
tors identify hate/bias crimes and


begin an investigation.
Investigators • Was the victim a member of a
become targeted class?
representatives of • Was the victim outnumbered
their entire agency, by the perpetrators?
and, without a good • Did the victim and offender
first impression, the belong to different groups?
victim may feel • Would the incident have taken
driven away. place if the victim and of-


fender were of the same
group?
Mr. Bouman currently trains federal officers in California and New
• Have other incidents occurred
Mexico in cooperation with the Federal Law Enforcement Training in the same locality or in a
Center (FLETC) based in Glynco, Georgia. similar place?

22 / FBI Law Enforcement Bulletin


• Have other incidents happened for the most part, minority assault targets with whom they
at similar times? groups, these offenders look share common traits or charac-
• Is the time significant to hate- for a role model or leader who teristics. A homosexual person
motivated groups? will organize and encourage targeting or assaulting other
them to act. Skinheads and homosexuals epitomizes this
• Were the victims of these their activities exemplify this classification.
incidents members of a classification. Once a crime has been re-
targeted group?
3) Missionary: Usually identi- sponded to, recognized as a hate/
• Was the victim a member of a fying with a specific leader or bias crime, and classified as such,
protected class that is outnum- higher power, these offenders investigators should conduct a
bered by members of another seek to rid the world of evil by timely and comprehensive follow-
group in the neighborhood? disposing of the members of up investigation. Knowing and un-
• Did the offender use biased an identified and despised derstanding the five typical classifi-
oral comments, written state- group. Those led by Hitler cations, as well as remaining aware
ments, or gestures? typify this classification. of meaningful calendar and anni-
versary dates (e.g., Hitler’s birth-
• Were bias-related objects,
day), key symbols (e.g., tattoos,
items, or symbols used or left


mantras), or previous patterns of ac-
at the crime scene?
tivity significant for these groups
and their agendas, can assist in an
Classifying Offenders Hate/bias crimes effective investigation. Investiga-
Equipped with the answers to destroy communities, tors must proceed promptly to keep
these questions, investigators as well as hoard the incident from escalating, appre-
should be able to determine if the
crime was committed based upon
resources from law hend the perpetrator, and diligently
enforcement process all physical evidence, all
hate or bias and, if so, begin to in- while remaining sensitive to the
vestigate the motivations of the of- agencies. feelings and needs of the victim or
fender. Hate/bias crimes, offenders, surrounding community.


and their motivations all typically
fit within five basic classifications. Interviewing Victims
1) Thrill seeking: Generally Hate/bias crimes are uniquely
groups of young people, these 4) Reactive: Typically show- violent and traumatic. Victims of
offenders are motivated by the ing a lack of tolerance for these crimes feel degraded, iso-
experiences of psychological individuals of other groups, lated, frightened, suspicious of oth-
or social excitement, mere these offenders protect and ers, powerless, and depressed.
pleasure, or the gain of brag- defend what belongs to them Some victims experience severe
ging rights. Their targets often (a country, community, trauma and denial about the inci-
are unknown outside the neighborhood, school, or dent, and some victims and families
groups they represent. Hate/ church) from outsiders. may feel emotionally disturbed for
bias-based graffiti or verbal or Average citizens defending extended periods of time. This
physical assault represent their race against another race long-term stress can take a substan-
offenses of this classification. characterize this classification. tial toll on a family and the sur-
2) Organized: Motivated by 5) Identity conflicted: Moti- rounding community. Effective in-
the need to express their vated by self-hatred or self- vestigators know and understand
profound resentment against, protection, these offenders these elements of hate/bias crimes.

March 2003 / 23
the response to other such crimes,
and the prevention of hate/bias
crimes in the future.
Relating to Communities
Many citizens do not under-
stand hate/bias crime laws, investi-
gation procedures, or the time re-
quired to complete a successful
investigation. Thus, investigators
need to work as liaisons between
their agency and the community.
Educating victims and others about
hate/bias crimes should become a
priority and coincide with an inves-
tigation. Victims and communities
© Peter Hendrie will then better understand probing
and inquisition regarding the inci-
Responsive and sensitive comfortable with, an interpreter. dent. Moreover, education could
investigators also understand Investigators should ask ques- become a valuable investment in
how important their communi- tions slowly and allow the victim future prevention or response to
cation skills are in these cases plenty of time to think or recall im- such crimes.
and that, in many cases, portant details. Some questions will Investigators can use many tac-
listening is more important be difficult to ask and answer; tics to educate, train, and empower
than talking. therefore, investigators never communities to fight hate/bias
When interviewing the victim should become impatient or argu- crimes. Establishing and training
of a hate/bias crime, investigators mentative with the victim. Investi- Neighborhood Watch groups, en-
must pay attention to the victim’s gators need to collect critical infor- couraging community meetings and
state of mind and do everything in mation about specific acts or words community problem-solving activi-
their power to gain useful informa- used by the perpetrator, as well as ties, and supporting community ef-
tion while creating a nonstressful record and compile anything else forts by involving local law en-
environment for the victim. Investi- that can help establish a motivation forcement agencies are just a few of
gators should interview victims in of hate or bias. Victims also will the ways investigators can make a
private. This will help calm victims need time to vent frustration and good first impression with the com-
and remove them from any distrac- display emotions. To help facilitate munity. Investigators also can train
tions. Investigators who allow a this, investigators should express a targets and victims of hate/bias
close friend or family member to genuine sense of care and concern crimes as responsive and preventive
join the interview will experience throughout the investigation. Last, advocates; engage members of local
calmer victims. These people will investigators must help victims con- community organizations to help
provide support, keep the victims nect to sources of support in the with the response, investigation,
focused, and help them relax. community. The critical informa- and prevention of hate/bias crimes;
However, official statements can- tion gathered during these inter- and help coordinate critical support
not be made for victims by friends views will be advantageous to a services for primary and secondary
and family, and investigators thorough and expeditious investiga- victims. Vigorously responding to
should make this clear. Some vic- tion, the apprehension of perpetra- and investigating hate/bias crimes
tims also may require, or be more tors, the prosecution of the crime, in the local community and using

24 / FBI Law Enforcement Bulletin


the media proactively to inform and with the U.S. Attorney’s Office will respond to or investigate hate/bias
educate the community also will constitute the correct avenue for in- crimes must understand the com-
generate trust for investigators vestigators. Also pertinent to inves- plexities that define such acts. In
within a community. On a larger tigations is the fact that some states turn, they will benefit from in-
scale, using national resources, pro- do not have hate/bias crime laws. formed choices and actions that can
grams, and models for prevention, Departments and investigators in help keep or return a community to
response, and healing will help re- these states must be willing to assist a safe, secure, and peaceful state.
vive communities. the federal agencies and unite with Before the goal of returning a com-
Working with the families, the U.S. Attorney’s Office to ensure munity to normalcy can be
friends, neighbors, and communi- the prosecution of suspects. A achieved, however, investigators
ties that surround a hate/bias inci- working relationship with any state have the task of dealing with fami-
dent becomes as important as work- or federal attorney’s office and its lies, the community, and the local
ing with the victim. Secondary investigators can help develop a media, in addition to the victim and
victimization induces blame, out- joint road map to a successful inves- offender. Furthermore, multiple
rage, or fear in a family, group of tigation and prosecution, secure law enforcement agencies must be
friends, or community. These needed search warrants, establish included in the investigation to en-
groups may be motivated to act in sure that every logical question is
response to a hate/bias crime and asked and every practical scenario


retaliate in their own ways unless is investigated. Law enforcement
they are educated and provided agencies and departments that un-
other options for response or heal- ...no better derstand the connections between
ing. Moreover, no better advocates these actions and results will
exist in a community than victims
advocates exist in a promote the sensitive, timely,
of a hate/bias crime. Training vic- community than and effective response and investi-
tims and communities to cooperate victims of a hate/ gation of hate/bias crimes in their
with law enforcement and other bias crime. communities.
community programs takes the con-
Endnotes


trol out of the hands of the perpetra- 1
U.S. Department of Justice, Federal
tor, instills confidence in the victim Bureau of Investigation, Uniform Crime
and community, and prevents future Reporting Program, Hate Crime Statistics 2000
crimes. rapport between the victim and the (Washington, DC, 2001). For more information
prosecutor, and introduce the victim on collecting hate crime, see U.S. Department
Prosecuting Offenders of Justice, Federal Bureau of Investigation,
and community to the inner-work- Uniform Crime Reporting Program, Training
To instill even more confidence ings of the justice system. Guide for Hate Crime Data Collection
in an affected community, investi- The goal of an investigation is (Washington, DC, 1997), 60.
2
gators must help with the prosecu- to bring the criminal to justice. Ibid., Training Guide for Hate Crime Data
Collection, 59.
tion of offenders. Keeping the state Prosecution of the perpetrator will 3
The author reached the conclusions in
district attorney’s office informed help the victim and community this article by drawing on his 15 years of
and involved is absolutely neces- bring closure to the horrid events teaching experience on hate/bias crimes, as
sary for effective prosecution of in- and will bring law enforcement and well as his 33 years of experience with the
Los Angeles County, California, Sheriff’s
dividuals involved in hate/bias the community more into harmony, Department.
crimes. Federal violations will re- thus creating a safer place for 4
In some agencies, the first responder is
quire the involvement of federal people to live and work. also the lead investigator, while in other
agencies. In these cases, establish- agencies the lead investigator is a different
Conclusion officer. For the purpose of this article, the
ing rapport with the federal agency roles of the first responder and the lead
assisting in the investigation and Law enforcement officers who investigator are combined and referred to as
the investigator.

March 2003 / 25
Legal Digest

Obtaining Written the circumstances surrounding the


consent. An individual need not
Consent to provide written consent for a search
of his or her person or property to a
Search law enforcement officer for a con-
sent search to be valid. Even though
a writing is not legally required, law
By JAYME WALKER HOLCOMB, J.D.
enforcement officers often will ask
an individual for written consent to
search to provide evidence of
voluntariness.
This article considers the par-
ticular issues that courts analyze re-
garding written consent to search.
These issues include the evidentiary
significance of a written consent to
search form, the presentation of a
consent to search form to an indi-
vidual, the impact of a person’s re-
fusal to sign a written consent to
search, and the content of consent to
search forms.
Evidentiary Significance
The government has the burden
of proving that an individual volun-
tarily consented to a search.5 The
presence of a writing reflecting that
an individual consented is, there-
fore, quite significant,6 and evi-
dence that an individual signed a
statement of consent to a search has
been found to be a clear indication
© Mark C. Ide
of voluntariness.7 The lack of a
writing memorializing a consent to

T he Fourth Amendment established and well-delineated ex- search also may be noted by a
preserves the “right of ceptions.” 2 The U.S. Supreme court,8 as may the failure of an of-
the people to be secure Court has stated that a search con- ficer to use an available written con-
in their persons, houses, papers, ducted pursuant to lawfully given sent form.9 One court has stated,
and effects, against unreasonable consent is an exception to the war- “[o]f course, a written consent to a
searches and seizures.”1 It is well rant and probable cause require- search is not a legal requirement,
settled that “searches conducted ments of the Fourth Amendment.3 but law enforcement officers fail to
outside the judicial process, without In Schenkloth v. Bustamonte,4 obtain a written consent when one
prior approval by judge or magis- the U.S. Supreme Court ruled that a readily could be obtained at the risk
trate, are per se unreasonable court reviewing whether an indi- that the government’s ability to
under the Fourth Amendment— vidual voluntarily consented to a prove the voluntariness of a consent
subject only to a few specifically search must consider the totality of will be seriously compromised.”10

26 / FBI Law Enforcement Bulletin


The decision by the U.S. Court evidence discovered could be used The extent to which law en-
of Appeals for the Seventh Circuit against her put her on par with an forcement officers maintain a non-
in United States v. Duran11 is an experienced arrestee in terms of coercive environment in which a
excellent example of the role a what she needed to know. The court written consent to search is ob-
signed written consent can play in a stated, “[t]hat the form contained tained also is significant.15 For ex-
court’s analysis. In Duran, Cesar these warnings, in fact, weighs ample, what is said if the individual
Duran’s wife, Karen, took a pair of heavily toward finding that her con- asks questions or makes statements
new tennis shoes back to a shoe sent was voluntary.”12 about the form or while signing it16
store to obtain help lacing them. and how many law enforcement of-
Karen left the shoes with a store Signing the Form ficers are present when the form is
employee and went shopping Circumstances surrounding the signed will be factors considered by
elsewhere in the mall. The store signing of a written consent will be a court.17 Moreover, courts also
employee discovered three pack- analyzed carefully by a court. Even have examined the following fac-
ages of what appeared to be though an individual signed a con- tors when deciding if a person has
marijuana in the shoes and called sent to search form, the consent to given voluntary written consent:
the police. The police arrived search still may be found invalid. whether the officer ascertained the
at the store and determined that Factors that courts will consider in ability of the individual to read,18
the packages did contain marijuana. determining if the consent was vol- whether the officer saw the indi-
The police arrested Karen when untary include the characteristics vidual read the form,19 whether the
she returned to the store. The offic- of the subject giving the consent, officer read the form out loud to the
ers also found $3,000, a small the environment in which the con- individual,20 whether the officer ex-
amount of cocaine, and drug para- sent is given, the actions taken or plained the content of the form to
phernalia in her purse. The officers statements made by the subject giv- the individual,21 whether there was
read Karen her Miranda warnings ing the consent,13 and the actions adequate light in which to read the
and took her to the police station. taken or statements made by law form,22 whether there was enough
At the police station, Karen told enforcement officers during the time to read the form,23 whether the
the officers where she lived and ad- course of asking for consent to officer accurately translated the
mitted that her husband sold large search.14 form while reading it out loud,24
quantities of marijuana in the local
area. Karen also signed a form con-
senting to a search of the Duran


residence, an old farmhouse on the
property, and several outbuildings.
The police arrested Cesar after find- Officers who obtain
ing 28 pounds of marijuana and a written consent to
number of weapons during the
search.
search from an
In considering Cesar’s chal- individual should
lenge to Karen’s consent to search, document in detail the
the Duran court specifically facts and circumstances
pointed to the consent form signed under which the consent
by Karen. The court rejected was given.


Cesar’s argument that the fact that
this was Karen’s first arrest should
be given weight, noting that the Ms. Holcomb serves as the chief of the Legal
form’s language stating that she Instruction Section, DEA Training Academy.
could refuse to consent and that any

March 2003 / 27
whether the form adequately indi- table. One of the officers asked In the 1999 case of United
cated that the individual is consent- Tovar for permission to search the States v. Rodriguez,31 the court held
ing to the search if it is in another entire apartment. The officer told that the defendant did not voluntar-
language,25 whether the individual Tovar that she did not have to allow ily consent to a search of his car.
was allowed to change the language the search, but that if she did not, Agents in Rodriguez obtained a
of the form,26 whether the indi- they would come back with a search search warrant to search the
vidual made a phone call prior to warrant. Tovar agreed to the search defendant’s residence. Between 10
signing the form,27 and whether the and signed a written consent form. and 15 agents participated in the
form was signed before or after the The court rejected the argument execution of the warrant, but no evi-
search occurred.28 that there were exigent circum- dence was found during the 3-hour
The 1995 decision of the U.S. stances that would permit a war- search. At the end of the search, an
Court of Appeals for the Eleventh rantless entry. The court also cited agent asked the defendant about a
Circuit in United States v. Tovar- another case stating that the govern- car parked in front of the house,
Rico29 is an example of a case in ment does not carry its burden of which the defendant denied own-
which an individual signed a con- © Mark C. Ide ing. He remained silent even when
sent to search form where the search shown a bill of sale for the vehicle
was found invalid. In Tovar-Rico, with his name on it.
officers followed two persons who The agent presented a written
had just obtained a substantial consent form printed in English for
amount of cocaine from two under- the defendant to sign. The defen-
cover officers. The individuals en- dant did not speak English, and,
tered an apartment building without therefore, the form had to be trans-
carrying anything and were seen lated into Spanish. The agent then
leaving apartment 901 a short time proceeded to literally translate the
later. Neither person carried any- form as he read it to the defendant.
thing. The individuals returned to Notably, the agent never had ob-
the apartment and left 10 to 15 min- tained a person’s consent to search
utes later with a third person. in Spanish before, and there were
One individual then removed a Spanish-speaking officers present
large amount of cocaine from the at the home who may have done a
trunk of a car parked at the building proving that a consent is voluntary better job in translating. The defen-
and took it inside. An officer ob- by showing that someone merely dant agreed to sign the consent
served that individual exit unit 901. submitted to a claim of lawful au- form. As the agent filled out the
Officers arrested all of the individu- thority. The court found Tovar’s form and the defendant was about to
als involved in the transaction who consent was involuntary and stated sign it, the “defendant asked [the
were around the apartment building that, “Tovar had already observed agent] ‘whether they [agents] were
and then proceeded to unit 901. officers explore every room in the going to search the vehicle any-
Five officers knocked on the apartment and could not reasonably way,’ to which the latter responded
door to unit 901, announced their have known that she could still affirmatively.” 32 The defendant
identity, and requested permission refuse a search....We entertain no signed the form. The agents found
to enter. When Tovar answered the doubt that Tovar opened the door in weapons in the car, which the de-
door, the officers quickly entered response to a ‘show of official au- fendant sought to suppress.
with weapons drawn and conducted thority’ and cannot be deemed to In determining whether the de-
a protective sweep. The officers en- have consented to the agents’ entry fendant voluntarily consented to
tered each room of the apartment or to have voluntarily consented to the search, the court considered
while Tovar sat at the dining room the search.”30 the defendant’s age and criminal

28 / FBI Law Enforcement Bulletin


history and noted that there was no ill-advised of his constitutional court held that the prior verbal con-
information in the record regarding rights.... The translation was sent of a suspect was sufficient even
the defendant’s education, experi- literal and clumsy, almost though the individual failed to read,
ence, intelligence, or whether he awkward sounding. While but signed, a consent form that had
was mentally deficient. The defen- under more relaxed circum- been incorrectly translated into
dant argued that he was not told that stances it would not be implau- Spanish.36
he could refuse consent, while the sible to find that [the agent’s] Officers who encounter indi-
government stated that the consent translation sufficiently in- viduals who refuse to consent to a
to search form signed by the defen- formed defendant about some search in writing but who consent
dant advised him of his right to basic concepts (e.g., his right verbally should document their re-
refuse. The court stated that to refuse consent, his right to fusal to provide written consent.
whether the defendant is informed consult an attorney), the Additionally, as with any verbal
of the right to refuse consent to implicitly coercive environ- consent to search, officers should
search is one factor to be taken into ment created by...agents at carefully document exactly what
account in determining voluntar- defendant’s home precludes the person said to the officers to
iness, but indicated that the critical such a finding.33 indicate his or her consent. For
issue to be addressed in this case example, in United States v.
was the agent’s ability to accurately Boukater,37 the U.S. Court of Ap-


translate the consent form. peals for the Fifth Circuit found that
The court concluded that the Boukater voluntarily consented to a
defendant had not voluntarily con- ...officers should be search of his briefcase. After being
sented to the search of the vehicle. advised of his constitutional rights
The court stated that the environ-
extremely careful in and being told that he was free to
ment created by the agents in the making sure that the leave, Boukater stated that he
home at the time the defendant’s language in the form wanted to know what was going on.
consent was obtained was implic- accurately describes The agents advised Boukater that
itly coercive. More particularly, the what will be searched. he was suspected of carrying coun-
court found it significant that when terfeit bills and was asked if he


the agents obtained consent, the de- would consent to a search. Boukater
fendant was handcuffed, unlawfully then stated, “It looks like you
seized, separated from the rest of got me. You can search my bags.”
his family while his crying 3-year- After refusing to give written
old daughter was left alone with one Refusal to Sign Form consent, he was asked if he was
of the 10 to 15 agents in the house, In many cases, an individual withdrawing his consent. At that
and it was strongly implied that the will be willing to verbally consent point, one agent stated that
car would be searched even if he did to a search but will refuse to sign a Boukater said, “No, go ahead,” and
not consent. At the suppression consent to search form. In such the other agent stated that he said,
hearing, the agent was asked to cases, as long as the consent to “Well, go ahead. You got me. It’s in
translate the consent form into search is voluntary, the verbal con- there.”38
Spanish as he had on the day in sent will be sufficient to allow the
question. The court stated the fol- search.34 Significantly, it has been Form Content
lowing with regard to the agent’s held that “the refusal to execute a There is no prescribed language
translation: written consent form subsequent to that federal courts have held that
Assuming that the former a voluntary oral consent does not must be placed into a consent to
translation replicated the latter, act as an effective withdrawal of the search form. A written consent to
we find that defendant was prior oral consent.”35 In one case, a search may be handwritten39 or be

March 2003 / 29
on a preprinted form. While there is given this authorization...vol- Appellant Kapperman argued
no specific language that must be untarily and without threats, prom- that the consent form signed by
included in a written consent, the ises, pressures, or coercion of any Cervantes did not authorize open-
language that is used is extremely kind.” 46 Even though it is well ing the suitcase in the trunk. The
important. For example, there is a settled that an individual does not consent form authorized officers to
vast difference between a writing have to be informed by an officer of search the car and remove “what-
stating, “I have been asked to permit the right to refuse to consent to a ever documents or items of property
special agents...to search...”40 and search, 47 because courts will whatsoever, which they deem perti-
“it has been required of me that I consider this as a factor in deter- nent to the investigation.”52 The
give my consent to a search....”41 mining the voluntariness of the con- Kapperman court found that this
The first of these statements indi- sent, many forms include such a language permitted searching
cates that the individual had a statement.48 within containers in the car, as it
choice in whether to agree to a would be unlikely that papers and
search, while the latter implies that other items would be loosely strewn


there was none. about the inside of a vehicle. The
In most situations, officers use court also noted that the U.S. Court
a preprinted form when obtaining a ...the critical issue of Appeals for the Seventh Circuit
written consent. The officer will to be addressed in rejected an identical challenge in
fill in the particular details on the United States v. Covello 53 and
form relating to the item or location
this case was the stated that in Covello
to be searched and the individual agent’s ability to [t]he Seventh Circuit rejected
consenting to the search. The use of accurately translate a challenge identical to the
a preprinted form may prevent an the consent form. one presented here. Reviewing
officer from inadvertently using po- a district court opinion that


tentially coercive language, but us- held that an individual’s
ing such forms may lead to con- consent to search his car did
tested issues related to descriptions not include authorization to
of items or property due to a failure Most of the challenges made to search luggage found inside
to change boilerplate language.42 the language found in written con- of the car, the court reversed,
There are a number of standard sent forms concern the scope of the noting that the interpretation
items included in valid written con- search49 permitted by the language of the signed consent form
sent to search forms. First, the form in the form.50 For example, in the was crucial to the case. The
will indicate to whom the individual U.S. Court of Appeals for the Elev- form authorized the agents
is giving consent to search, for ex- enth Circuit decision United States “to conduct a complete search”
ample, Officer Smith of the High- v. Kapperman,51 officers stopped of the car, and permitted the
way Patrol or agents of the Drug Cervantes’ car based upon a reason- searching agents to remove
Enforcement Administration. 43 able suspicion that the passenger in from the vehicle any property
Second, the form will identify the his car was fugitive Kapperman. contained therein. Thus, the
item or location that the individual After determining that the passen- court concluded, the signed
is consenting to be searched, for ger was Kapperman, the officers consent form authorized the
example, a 1986 blue Ford pickup asked Cervantes for consent to questioned conduct. To bolster
truck, VA license 123 ABC. 44 search his car. Cervantes provided its decision, the court evalu-
Third, the form will state that the both oral and written consent to ated the circumstances sur-
individual is voluntarily consenting search. The police arrested rounding the property owner’s
to the search, for example, “I freely Cervantes after finding cocaine in a decision to consent, conclud-
consent to this search”45 or “I have suitcase in the trunk. ing that they were consistent

30 / FBI Law Enforcement Bulletin


with a complete search of consent to search forms. Consent 17
See, e.g., United States v. Rodriguez, 68
F. Supp. 2d 104 (D. Puerto Rico 1999).
the vehicle.54 to search forms should be re- 18
See, e.g., United States v. Fryer, 974 F.2d
Challenges by defendants to the viewed by department counsel for 813, 820 (7th Cir. 1992).
language in standardized consent legal sufficiency, and foreign lan- 19
See, e.g., United States v. Santurio, 29
forms are usually unsuccessful. guage consent forms should be F.2d 550, 558 (10th Cir. 1994); United States
v. Fryer, 974 F.2d 813, 820 (7th Cir. 1992).
Nonetheless, officers should be ex- reviewed by certified or otherwise 20
See, e.g., United States v. Botello, 991
tremely careful in making sure that qualified interpreters prior to F.2d 189, 194 (5th Cir. 1993); United States v.
the language in the form accurately use.55 Careful attention to the details Fryer, 974 F.2d 813, 820 (7th Cir. 1992);
describes what will be searched. associated with the use of written United States v. Ramirez, 963 F.2d 693, 704
(5th Cir. 1992).
consent to search forms will help 21
See, e.g., United States v. Murillo, 255
Conclusion ensure that the use of the form F.3d 1169, 1172 (9th Cir. 2001); United States
Obtaining an individual’s con- provides valuable proof of vol- v. Garza, 118 F.3d 278 (5th Cir. 1997); United
sent to search in writing provides untariness, instead of providing States v. Ramirez, 963 F.2d 693, 704 (5th Cir.
1992); United States v. Tibbs, 49 F. Supp. 2d
substantial evidence that an indi- a source for defense counsel
47, 54 (D. Mass. 1999).
vidual voluntarily consented. How- challenge. 22
See, e.g., United States v. Fryer, 974 F.2d
ever, even though an individual 813, 820 (7th Cir. 1992).
23
consents to a search in writing, Endnotes See, e.g., United States v. Chaidez, 906
F.2d 377, 379 (8th Cir. 1990).
courts still will scrutinize all of the 1
U.S. CONST. Amend. IV. 24
See, e.g., United States v. Iribe, 11 F.3d
2
facts surrounding the signing of the Katz v. United States, 389 U.S. 347, 357
1553, 1555 (10th Cir. 1993); United States v.
(1967).
consent form when deciding 3
Id.
Rodriguez, 68 F. Supp. 2d 104 (D. Puerto Rico
whether, under the totality of the 4 1999).
412 U.S. 218 (1973). 25
See, e.g., United States v. Perez, 37 F.3d
circumstances, the consent was 5
Bumper v. North Carolina, 391 U.S. 543
510, 515 (9th Cir. 1994); United States v.
voluntary. (1968).
6 Jamarillo, 841 F. Supp. 490 (E.D.N.Y. 1994).
United States v. Moreno, 280 F.3d 898,
Officers who obtain written 901 (8th Cir. 2002).
26
See, e.g., United States v. Twomey, 884
consent to search from an indi- 7
United States v. Navarro, 90 F.3d 1245, F.2d 46 (1st Cir. 1989).
27
See, e.g., United States v. Fryer, 974 F.2d
vidual should document in detail 1257 (7th Cir. 1996).
813, 820 (7th Cir. 1992).
8
the facts and circumstances under See United States v. Marc, 1997 W.L. 28
129324 (D. Del. 1997). See, e.g., United States v. Tibbs, 49 F.
which the consent was given. Offi- 9
United States v. Forbes, 181 F.3d 1, 8 (1st Supp. 2d 47, 54 (D. Mass. 1999).
29
cers should pay particular attention Cir. 1999). 61 F.3d 1529 (11th Cir. 1995).
30
Id. at 1536.
to actions and statements made by 10
United States v. Rodriguez-Diaz, 161 F. 31
68 F. Supp. 2d 104 (D. Puerto Rico
both the officer and the individual Supp. 2d 627, 631 n.7 (D. Md. 2001).
11
957 F.2d 499 (7th Cir. 1992). 1999).
when the form is signed. Similarly, 12
Id. at 502.
32
Id. at 108.
33
in situations where an individual re- 13
For example, actions, such as signing a Id. at 112.
34
See, e.g., United States v. Pereira-Munoz,
fuses to sign a written consent to consent to search form, volunteering the
59 F.3d 788 (8th Cir. 1995); United States v.
search but verbally consents to a possession of an apartment key, and showing
officers how the key worked, are important. Thompson, 876 F.2d 1381 (8th Cir. 1989).
search, officers should document United States v. Genao, 281 F.3d 305, 310
35
See United States v. Lattimore, 87 F.3d
meticulously both what the officer (1st Cir. 2002). 647, 650 (4th Cir. 1996)(citing United
States v. Thompson, 876 F.2d 1381, 1384
said when asking for consent and 14
See J.W. Holcomb, “Consent Searches:
(8th Cir. 1989)); United States v. Castillo, 866
what the individual said when giv- Factors Courts Consider in Determining
Voluntariness,” FBI Law Enforcement Bulletin, F.2d 1071, 1081-82 (9th Cir. 1988); United
ing consent. May 2002, 25-32. States v. Boukater, 409 F.2d 537, 539 (5th Cir.
Officers also should be familiar 15
United States v. Ramirez, 963 F.2d 693, 1969).
36
United States v. Garza, 118 F.3d 278 (5th
with the content of any preprinted 704 (5th Cir. 1992); United States v. Twomey,
Cir. 1997).
consent forms used by their 884 F.2d 46, 51 (1st Cir. 1989). 37
16
See, e.g., United States v. Moreno, 409 F.2d 537 (5th Cir. 1969).
department and any departmental 280 F.3d 898, 900 (8th Cir. 2002); United
38
Id. at 538.
39
policies related to obtaining consent States v. Saadeh, 61 F.3d 510, 517 (7th Cir. See, e.g., United States v. Twomey, 884
F.2d 46 (1st Cir. 1989).
to search and the use of written 1995).

March 2003 / 31
40
United States v. Saadeh, 61 F.3d 510,
517 (7th Cir. 1995).
41
United States v. Jamarillo, 841 F. Supp.
490, 491 (E.D.N.Y. 1994).
42
See, e.g., United States v. Ramirez, 963
Wanted:
F.2d 693, 704 (5th Cir. 1992).
43
Notable Speeches
See, e.g., United States v. Saadeh, 61
F.3d 510, 517 (7th Cir. 1995).
44
See, e.g., United States v. Torres, 32 F.3d
225, 228 (7th Cir. 1994).
he FBI Law Enforcement
45
United States v. Saadeh, 61 F.3d 510,
517 (7th Cir. 1995).
46
United States v. Reeves, 6 F.3d 660, 661
T Bulletin seeks transcripts
of presentations made by crim-
(9th Cir. 1993).
47
inal justice professionals for
See United States v. Drayton, 536 U.S.
194 (2002).
its Notable Speech depart-
48
See, e.g., United States v. Torres, 32 F.3d ment. Anyone who has
225 (7th Cir. 1994); United States v. Reeves, 6 delivered a speech recently
F.3d 660 (9th Cir. 1993).
49
and would like to share the
For additional information regarding the
scope of a suspect’s consent to search, see
information with a wider
Florida v. Jimeno, 500 U.S. 248, 251 (1991), in audience may submit a trans-
which the Court stated that “The standard for cript of the presentation to the
measuring the scope of a suspect’s consent Bulletin for consideration.
under the Fourth Amendment is that of
‘objective’ reasonableness–what would the
As with article submis-
typical reasonable person have understood by sions, the Bulletin staff will
the exchange between the officer and the edit the speech for length and
suspect?”
50
clarity, but, realizing that the
See, e.g., United States v. Stribling, 94
F.3d 321 (7th Cir. 1996); United States v.
information was presented
Torres, 32 F.3d 225 (7th Cir. 1994); United orally, maintain as much of
States v. Reeves, 6 F.3d 660 (9th Cir. 1993); the original flavor as possible.
United States v. Covello, 657 F.2d 151 (7th Cir. Presenters should submit their
1981).
51
764 F.2d 786 (11th Cir. 1985).
transcripts typed and double-
52
Id. at 794. spaced on 81/2- by 11-inch
53
657 F.2d 151 (7th Cir. 1981). white paper with all pages
54
United States v. Kapperman, 764 F.2d numbered. When possible, an
786, 794 (11th Cir. 1985).
55
See generally United States v Jamarillo,
electronic version of the tran-
841 F. Supp. 490 (E.D.N.Y. 1994); 28 U.S.C. § script saved on computer disk
1827 (2002). should accompany the docu-
ment. Send the material to:

Law enforcement officers of other than Editor, FBI Law


federal jurisdiction who are interested Enforcement Bulletin
in this article should consult their legal FBI Academy
advisors. Some police procedures
ruled permissible under federal
Madison Building,
constitutional law are of questionable Room 209
legality under state law or are not Quantico, VA 22135
permitted at all. telephone: 703-632-1952,
e-mail: leb@fbiacademy.edu

32 / FBI Law Enforcement Bulletin


The Bulletin Notes
Law enforcement officers are challenged daily in the performance of their duties; they face each
challenge freely and unselfishly while answering the call to duty. In certain instances, their actions
warrant special attention from their respective departments. The Bulletin also wants to recognize
those situations that transcend the normal rigors of the law enforcement profession.

Deputy Ramage Deputy Warner Sergeant Tatum Officer Carter

Deputies Devant Ramage and David Responding to a call about a drowned


Warner of the Graves County, Kentucky, individual, Sergeant Chris Tatum and
Sheriff’s Department received a call of an Officer Debbie Carter of the Waycross,
unconscious man in a rural part of Graves Georgia, Police Department found a small
County whose breathing had ceased. Due child at the bottom of a pool. Officer
to the large size of the county, the depu- Carter entered the pool and retrieved the
ties were dispatched because they could child. Sergeant Tatum also noticed a male
respond more quickly than an emergency adult at the bottom of the pool and
medical services (EMS) team. Upon immediately dove in to retrieve the
arrival, the deputies found an elderly man individual who happened to be the child’s
on the floor of his home. The man was father. With the assistance of an emer-
unconscious, not breathing, and lacked a gency medical technician, the father was
pulse. Deputies Ramage and Warner removed from the pool and CPR was
immediately began CPR. They were able started on both individuals. The child was
to resuscitate the man prior to the arrival revived and recovered completely.
of EMS personnel, who stated that the Unfortunately, the child’s father could not
man probably would not have survived be revived. The skill and prompt action of
had it not been for the quick response and Sergeant Tatum and Officer Carter saved
judgment of the deputies. the life of the young child and brought a
blessing out of a terrible tragedy.

Nominations for the Bulletin Notes should be based on either the rescue of one or more
citizens or arrest(s) made at unusual risk to an officer’s safety. Submissions should include a
short write-up (maximum of 250 words), a separate photograph of each nominee, and a letter
from the department’s ranking officer endorsing the nomination. Submissions should be sent
to the Editor, FBI Law Enforcement Bulletin, FBI Academy, Madison Building, Room 209,
Quantico, VA 22135.
U.S. Department of Justice Periodicals
Federal Bureau of Investigation Postage and Fees Paid
Federal Bureau of Investigation
FBI Law Enforcement Bulletin ISSN 0014-5688
935 Pennsylvania Avenue, N.W.
Washington, DC 20535-0001

Official Business
Penalty for Private Use $300

Patch Call

The mission of the University of Vermont Police The patch of the North Salt Lake, Utah, Police
Services, established as a full-time police agency with Department depicts the year that Utah became a state.
statewide authority in 1991, is represented by its patch. The center of the patch features a beehive, which is the
The green mountains, overlooking Lake Champlain, state symbol for industry. The city of North Salt Lake
speak to the natural beauty and rugged individualism of was incorporated in 1946. It has a population of 8,500
Vermont and are the namesake for the university. The and currently is served by 11 sworn police officers.
Latin words represent three keys to the agency’s
success: excellence, integrity, and service.

You might also like