Professional Documents
Culture Documents
Volume 72
Number 3
United States
Department of Justice
Federal Bureau of Investigation
Washington, DC 20535-0001
The FBI Law Enforcement Bulletin By Robert D’Ovidio, M.S. 10 cases, law enforcement must
understand how offenders use the
(ISSN-0014-5688) is published
monthly by the Federal Bureau of
and James Doyle Internet to stalk victims.
Investigation, 935 Pennsylvania
Avenue, N.W., Washington, D.C. Rendering hate/bias crimes the special
20535-0001. Periodicals postage paid Best Practices of a Hate/Bias
at Washington, D.C., and additional
mailing offices. Postmaster: Send
Crime Investigation 21 attention they deserve will help law
enforcement agencies treat victims,
address changes to Editor, FBI Law By Walter Bouman relate to communities, and prosecute
Enforcement Bulletin, FBI Academy,
Madison Building, Room 209, offenders.
Quantico, VA 22135.
Internet Address
leb@fbiacademy.edu
March 2003 / 1
as drug sales and burglaries. Inci-
dental to their criminal activity,
they commit hate crimes. The San
Fernando Valley Peckerwoods
(SVP) in California was a crimi-
nally motivated skinhead group.
SVP members primarily sold meth-
amphetamines and committed resi-
dential burglaries. Periodically,
SVP members attacked minorities
with weapons and, on one occasion,
placed packages resembling bombs
Special Agent Schafer is Special Agent Navarro serves in near an apartment complex where
assigned to the FBI’s Lancaster, the FBI’s Tampa, Florida, office African-Americans lived. Members
California, resident office and and also is a member of the FBI’s intended for the fake bombs
also serves as a member of the National Security Division’s
FBI’s National Security Division’s Behavioral Analysis Program.
to frighten current residents to
Behavioral Analysis Program. relocate and to discourage other
African-American families from
moving into the complex.
SKINHEAD GROUPS lack the leadership structure found Conversely, hate-motivated
During a 7-year FBI investiga- in the majority of street gangs en- skinhead groups dedicate the ma-
tion of skinhead groups in South- gaged in “for-profit” criminal ac- jority of their time to hate crimes.6
ern California between 1992 and tivities. However, the Western Incidental to hate crimes, these
1999, specific patterns emerged. Hammerskins group has a stronger hard-core skinheads commit petty
Skinhead groups typically consist leadership hierarchy than most thefts or sell small amounts of nar-
of uneducated, young, white males skinhead groups, and it boasts a cotics to support daily needs, such
between the ages of 13 and 24 who very active recruitment program. as food, cigarettes, and alcohol and
have no long-term prospects for Potential members receive a re- other drugs. The Nazi Low Riders
success. Although many come from cruitment package, which includes (NLR) skinhead group located in
single-parent, dysfunctional fami- a swastika armband, a T-shirt with Lancaster, California, exemplifies a
lies, some exceptions exist. For ex- white supremacist slogans, white hate-motivated skinhead group. At
ample, members of the Western supremacist literature and band one time, NLR members spent their
Hammerskins in Hemet, California, stickers, and other supremacist time prowling the streets of
had high school educations and materials. Recruiters also pass out Lancaster looking for minorities to
came from two-parent, middle-class business cards embossed with the attack. The NLR matured to the
families. Further examination re- Western Hammerskins’ logo and point where their members rou-
vealed that both parents made long, the recruiter’s name and telephone tinely beat and stabbed minorities,
daily commutes to work in Los An- number. The group’s higher and, in one instance, murdered an
geles and left their teenage children educational level may explain the African-American.
unsupervised. The lack of parental sophistication of its recruitment Haters cannot stop hating with-
supervision and guidance spawned techniques. out exposing their personal insecu-
personal insecurities similar to Skinhead groups subdivide into rities. For example, at the onset of
those found in skinheads who come two categories: criminally moti- the FBI investigation, FBI authori-
from dysfunctional, single-parent vated and hate motivated. Crimi- ties told hard-core members of the
environments. nally motivated skinhead groups NLR that they would arrest them if
Fortunately, most skinhead spend most of their time engaged in their hate violence continued; yet,
groups are not well organized and for-profit criminal activities, such the hate violence persisted. The FBI
“
They also expressed a degree of on his cheek, walked into a jewelry
personal security in their status as store to buy a ring for his girlfriend.
criminals. The criminally motivated The skinhead became incensed
skinheads possess a certain sense of when the Jewish clerk treated him
self-worth; hence, they have fewer Skinhead groups poorly. The skinhead later com-
insecurities. However, this was not subdivide into mented that if Jews treated him with
the case with hate-motivated two categories.... more respect he would not hate
skinheads. The explanation by one them so much. The skinhead clearly
15-year-old NLR member typified saw himself as a victim, although he
”
the thought process of hate-moti- openly displayed a provocative
vated skinheads. He said, in effect, symbol of hate on his face.
“I dropped out of school in the such as an insult, interracial dating, Empirical observations show
eighth grade, but I stopped learning or a neighborhood integration.”9 that hate groups go through seven
midway through the sixth grade. I The authors’ model incorporates stages in the hate process. Haters, if
covered my body with hate tattoos. I the thrill seeker and the hard-core unimpeded, pass through these
couldn’t get a good job if I wanted offender, but redefines the concept seven successive stages without
to. No one would hire me. Once, I of the reactive offender. This phe- skipping a stage. In the first four
tried to get a job at a fast food res- nomenon can be described as sec- stages, haters vocalize their beliefs.
taurant, but the manager refused to ondary justification; skinheads rou- In the last three stages, haters act on
hire me because the restaurant tinely use this technique to instigate their beliefs. A transition period ex-
served multiracial customers. If I attacks. For example, a group of ists between vocalization and acting
quit being a skinhead, I have noth- skinheads encounter a mixed-race out. In this transition period, vio-
ing. I am nothing. I have no choice couple and shout racial slurs. If the lence separates hard-core haters
but to be a skinhead. I expect to die couple reacts in a manner other than from rhetorical haters.
a young, violent death.” a submissive one, the skinheads
Skinheads converge, get drunk, perceive that behavior as an act of Stage 1: The Haters Gather
take drugs, and, at some point, aggression. The skinheads later tell Irrational haters seldom hate
spontaneously seek out hate targets the police they merely defended alone.10 They feel compelled, al-
to attack. They conduct little, if themselves against aggressors. The most driven, to entreat others to
any, planning before committing skinheads, of course, leave out the hate as they do. Peer validation
March 2003 / 3
bolsters a sense of self-worth and, aggressive impulses increases with Stage 5: The Hate Group
at the same time, prevents intro- ideation.14 In other words, the more Attacks the Target Without
spection, which reveals personal in- often a person thinks about aggres- Weapons
securities.11 Further, individuals sion, the greater the chance for ag- This stage is critical because it
otherwise ineffective become em- gressive behavior to occur. Thus, differentiates vocally abusive hat-
powered when they join groups, after constant verbal denigration, ers from physically abusive ones. In
which also provide anonymity and haters progress to the next more ac- this stage, hate groups become more
diminished accountability. rimonious stage. aggressive, prowling their turf seek-
ing vulnerable targets. Violence
Stage 2: The Hate Stage 4: The Hate Group Taunts coalesces hate groups and further
Group Defines Itself the Target isolates them from mainstream so-
Hate groups form identities Hate, by its nature, changes in- ciety. Skinheads, almost without
through symbols, rituals, and my- crementally. Time cools the fire of exception, attack in groups and tar-
thologies, which enhance the mem- hate, thus forcing the hater to look get single victims. Research has
bers’ status and, at the same time, inward. To avoid introspection, hat- shown that bias crimes are twice as
degrade the object of their hate. For ers use ever-increasing degrees of likely to cause injury and four times
example, skinhead groups may rhetoric and violence to maintain as likely to result in hospitalization
adopt the swastika, the iron cross, high levels of agitation. Taunts and as compared to nonbias crimes.16
the Confederate flag, and other su- In addition to physical vio-
premacist symbols. Group-specific
“
lence, the element of thrill seeking
symbols or clothing often differen- is introduced in Stage 5. Two ex-
tiate hate groups. Group rituals, perts found that 60 percent of hate
such as hand signals and secret Empirical offenders were “thrill seekers.”17
greetings, further fortify members. The adrenaline “high” intoxicates
Hate groups, especially skinhead
observations show
that hate groups go the attackers. The initial adrenaline
groups, usually incorporate some surge lasts for several minutes;
form of self-sacrifice, which allows through seven however, the effects of adrenaline
haters to willingly jeopardize their stages in the hate keep the body in a state of height-
well-being for the greater good of process. ened alert for up to several days.18
the cause. Giving one’s life to a Each successive anger-provoking
”
cause provides the ultimate sense of thought or action builds on residual
value and worth to life.12 Skinheads adrenaline and triggers a more vio-
often see themselves as soldiers in a lent response than the one that origi-
race war. offensive gestures serve this pur- nally initiated the sequence.19 An-
pose. In this stage, skinheads typi- ger builds on anger. The adrenaline
Stage 3: The Hate Group cally shout racial slurs from moving high combined with hate becomes a
Disparages the Target cars or from afar. Nazi salutes and deadly combination. Hard-core
Hate is the glue that binds hat- other hand signals often accompany skinheads keep themselves at a
ers to one another and to a common racial epithets. Racist graffiti also level where the slightest provoca-
cause.13 By verbally debasing the begins to appear in areas where tion triggers aggression.
object of their hate, haters enhance skinheads loiter. Most skinhead
their self-image, as well as their groups claim turf proximate to the Stage 6: The Hate Group
group status. In skinhead groups, neighborhoods in which they live. Attacks the Target with
racist song lyrics and hate literature One study indicated that a majority Weapons
provide an environment wherein of hate crimes occur when the hate Several studies confirm that
hate flourishes. In fact, researchers target migrates through the hate a large number of bias attacks in-
have found that the life span of group’s turf.15 volve weapons.20 Some attackers
March 2003 / 5
greater meaning to irrational hate. Mythologies nurtured, reinforced, questions, such as “Why do you
Haters use symbols for self-identifi- and protected from outside ideas hate?” “Can’t you see what you’re
cation and to form common bonds provide a forum where group doing is wrong?” “How would you
with other group members. Addi- members can escape individual like it if someone picked on you
tionally, they often swear alle- responsibility. “When we lose our because of your race?” Skinheads
giance to these symbols. For ex- individual independence in the answer smugly; they feel secure as
ample, the swastika, a simple corporateness of a mass movement skinheads. Because hate masks per-
symbol, served as a powerful rally- we find a new freedom–freedom to sonal insecurities, interviewers
ing point for the Nazi movement hate.”24 should temporarily forego ques-
and helped mobilize an entire tions about why skinheads hate and
country.21 strive to identify the skinheads’ per-
“
Each hate group adopts its own sonal insecurities. Interviewers
symbols or borrows them from oth- should begin this probe by asking
ers. Symbolic words and nonverbal An accurate skinheads about their family rela-
behaviors reflect individual disdain assessment of tionships, which probably represent
and serve as advertisements to at- the source of the skinhead’s insecu-
tract fellow sympathizers. Offen-
skinhead groups is rities because a sense of who people
sive language is the most common critical to developing are and where they fit in society
expression of dislike for others. intervention typically develops within the family
Hate groups also display contempt strategies. structure. Interviewers also should
by using nonverbal gestures, such explore skinheads’ future plans,
”
as a Nazi salute. Clothes, short hair- educational goals, and desired em-
cuts, military boots, tattoos, and ployment. This forces skinheads to
bumper stickers also represent sym- see themselves as they really are. If
bols that can effectively communi- INTERVIEWING forced to look at themselves,
cate hate. TECHNIQUES skinheads become vulnerable, less
Symbols, however, are not Ironically, skinheads, espe- resistant to rehabilitation, and, in
enough to unify a group; therefore, cially hate-motivated skinheads, law enforcement settings, more
more organized hate groups incor- talk to anyone who will listen, in- likely to confess. This process
porate rituals, which serve two cluding law enforcement officers. could take several hours or many
functions. First, they relieve indi- One investigator who knew little months depending on the resistance
vidual group members from deep about white-supremacist ideology level of the skinhead.
thought and self-examination. Sec- simply asked skinheads why they This strategy proves less effec-
ond, rituals reinforce beliefs and hated, what their tattoos meant, and tive when interviewing criminally
fortify group unity. how skinhead groups were orga- motivated skinheads because they
The hate group’s experiences, nized. Numerous interviews and view themselves as criminals who
beliefs, and use of symbols and observations substantiated the ini- hate, rather than haters who commit
rituals combine to create group my- tial information obtained by the in- criminal acts. More traditional in-
thologies. Mythologies unify dis- vestigator. On the other hand, terviewing strategies have proven
parate thoughts and act as filters criminally motivated skinheads are successful with criminally moti-
through which group members in- less likely to talk because they act vated skinheads.
terpret reality.22 Group mythologies more like criminals. Investigators
can have profound effects on its should determine the motivation of INTERVENTION
members.23 A group with a power- skinheads when planning interview STRATEGIES
ful mythology results in one resis- strategies. An accurate assessment of
tant to ideological challenges, and, Hate-motivated skinheads skinhead groups is critical to
therefore, it is more dangerous. have well-rehearsed answers for developing intervention strategies.
March 2003 / 7
process constitute the first steps in 2000 (Washington, DC, 2001). For more Induced Mediators of Aggressive Behavior,”
information on collecting hate crime, see Journal of Personality and Social Psychology
controlling hate violence. 33 (1976): 755-763.
U.S. Department of Justice, Federal Bureau
15
of Investigation, Uniform Crime Reporting Supra note 8, 10.
Endnotes 16
1
Program, Training Guide for Hate Crime Data Supra note 8, 9.
The authors based this article on their Collection (Washington, DC, 1997). 17
Supra note 8, 10.
observations and interviews of several hundred 7
Raymond Paternoster and Alex Piquero, 18
Dolf Zillerman’s research is described in
self-described skinheads, defined as “usually “Reconceptualizing Deterrence: An Empirical Daniel Goleman, Emotional Intelligence (New
white males belonging to any of various, Test of Personal and Vicarious Experiences,” York, NY: Bantam Press, 1997), 60-62.
sometimes violent, youth gangs whose members Journal of Research in Crime and Delinquency 19
Ibid.
have close-shaven hair and often espouse white- 32 (August 1995): 251-286. 20
Supra note 8, 8.
supremacist beliefs,” Merriam Webster’s 8
See Brian Levin, “A Dream Deferred: The 21
William L. Shirer, The Rise and Fall
Collegiate Dictionary, 10th ed. (1996), s.v. Social and Legal Implications of Hate Crimes in of the Third Reich: A History of Nazi
“skinhead.” the 1990s,” The Journal of Intergroup Germany (New York, NY: Fawcett Crest,
2
See Eric Hoffer, The True Believer: Relations 20, no. 3 (Fall 1993): 10, citing Jack 1960), 71.
Thoughts on the Nature of Mass Movements Levin and Jack McDevitt, Hate Crimes: The 22
Daniel C. Maguire and A. Nicholas
(New York, NY: Harper and Row, 1989). Rising Tide of Bigotry and Bloodshed (New Farnoli, On Moral Grounds: The Art, Science
3
Ibid. York, NY: Plenum Press, 1993). of Ethics (New York, NY: The Crossroads
4
Ibid. 9
Ibid. Publishing Co., 1991), 164-167.
5
Ibid. 10
Supra note 2, 93-94. 23
Joseph Campbell and Bill Moyers, The
6
Statistics, however, reveal that most 11
Supra note 2, 93-94. Power of Myth (New York, NY: Doubleday,
hate crimes are not committed by hate groups. 12
Supra note 2, 99. 1988), 31.
See U.S. Department of Justice, Federal 13
Supra note 2, 92. 24
Supra note 2, 100.
Bureau of Investigation, Uniform Crime 14
Charles W. Turner and John F. Layton, 25
Supra note 8, 10.
Reporting Program, Hate Crime Statistics “Verbal Imagery and Connotation as Memory
The Bulletin’s
E-mail Address
Web-Based Resources
Biometrics Catalog On-line
The Biometrics Catalog, a federally funded database, is a service of the National Institute of
Justice for the biometrics community and potential users of biometric technology. The catalog is
designed to provide multiple search options so that browsers can find information quickly and easily.
This catalog can be accessed at http://www.biometricscatalog.org.
Crime Mapping Research Center (CMRC)
The CMRC Web site is the primary source of information from the National Institute of Justice’s
(NIJ) Crime Mapping Research Center. It serves as an international clearinghouse for information
about the development of crime mapping and spatial analysis. It includes a list of CMRC staff, NIJ-
funded grants that pertain to crime mapping, descriptions of upcoming conferences, a list of mapping-
related software, a bibliography of crime-mapping resources, and descriptions of CMRC’s current
initiatives. CRIMEMAP, CMRC’s listserv, is one of the center’s main information dissemination tools.
CRIMEMAP facilitates communication among crime analysts, researchers, geographers, and other
interested parties about justice-related computerized mapping technologies. CMRC can be accessed at
http://www.ojp.usdoj.gov/nij/maps.
Law Enforcement
The National Institute of Justice (NIJ) and the Office of Community Oriented Policing Services
(COPS) sponsored a study on the combined effects of pepper spray exposure and positional restraint
on respiratory functions. Pepper Spray’s Effects on a Suspect’s Ability to Breathe presents the results
of this study. This NIJ Research in Brief (NCJ 188069) summarizes the issues that gave rise to the
study, the study’s major findings, and their implications for law enforcement. Findings suggest that
inhalation of pepper spray does not pose a significant risk
to subjects in terms of respiratory and pulmonary functions,
even when it occurs with positional restraint. However, Bulletin Reports is an edited collection
pepper spray exposure did result in a small but statistically of criminal justice studies, reports, and
significant increase in blood pressure, the origins and project findings. Send your material for
implications of which remain unclear. This report is consideration to: FBI Law Enforcement
available electronically at http://www.ojp.usdoj.gov/nij/ Bulletin, Room 209, Madison Building,
pubs-sum/188069.htm or by contacting the National FBI Academy, Quantico, VA 22135.
Criminal Justice Reference Service at 800-851-3420. (NOTE: The material in this section is
intended to be strictly an information
source and should not be considered an
endorsement by the FBI for any product
or service.)
March 2003 / 9
© John Foxx Images
B y enabling human interac- enforcement officers with solutions offenders commit this crime to
tion without the constraints when they encounter impediments include electronic communication
of physical barriers and with investigating these types of cases. devices.
the perception of anonymity, the Several states currently include
Internet has become the ideal in- DEFINITION OF specific protections against threat-
strument for individuals who wish CYBERSTALKING ening electronically transmitted
to intimidate, threaten, and harass As the Internet becomes the communications in their stalking
others. A stalker can use the communication device of choice for or harassment statutes.4 Addition-
Internet to send alarming messages millions of people worldwide, news ally, Title 18, Section 875, U.S.
anywhere, within a matter of headlines, such as “Killer Keeps Code, criminalizes threatening
moments, under the guise of a ficti- Web Pages on Victim, Stalks Her messages transmitted electronically
tious screen name or pseudonym. Through Internet” 1 and “Penn in interstate or foreign commerce.
Understanding how offenders Opens Hate E-mail Inquiry,”2 have The use of federal legislation to
use the Internet to stalk victims begun to appear more frequently. prosecute cases of cyberstalking,
in cyberspace can provide law These headlines depict stories of however, is limited, by law, to
Background
Anticipating the significant
role computers would play in the
commission of crimes in the future, Mr. D’Ovidio is a Ph.D. student Mr. Doyle serves as president
the New York City Police Depart- and instructor at Temple of a private company that
University in Philadelphia, trains law enforcement and
ment (NYPD) developed the Com- consults in the area of high-
Pennsylvania.
puter Investigation & Technology tech crime.
Unit (CITU) in 1995. CITU investi-
gates cases where offenders use a
March 2003 / 11
reported to and investigated by all investigative leads without where investigators determined that
CITU since the unit’s inception. positively identifying a specific a threatening or alarming message6
During the 56-month period from offender. was transmitted using a computer or
January 1996 through August 2000, the Internet (excluding cases with
42.8 percent of the cases investi- The Offender unfounded outcomes). Females, the
gated by CITU involved aggravated Offender characteristics were most likely recipients, were victim-
harassment by means of a computer examined using the 134 closed ized in about 52 percent of the
or the Internet. Additional CITU in- cases where a suspect was arrested cases, whereas males were the vic-
vestigations during this period in- or where evidence to support an ar- tims of aggravated harassment in
volved grand larceny, computer and rest existed but a suspect was not approximately 35 percent. Educa-
network trespassing, forgery, petty arrested because of an uncoopera- tional institutions represented the
larceny, criminal impersonation, tive complainant or a jurisdictional next most likely target with 8 per-
child pornography, crimes against issue. The results revealed that cent. Offenders chose private cor-
children, and schemes to defraud. porations in almost 5 percent of the
“
Understanding the distribution cases. Public-sector agencies were
of cybercrimes is essential to allo- targeted in about 1 percent of the
cating a computer crime unit’s cases.
resources in a cost-efficient man- ...computer crime Approximately 85 percent of
ner. Training that provides investi- investigation units victims were white, 6 percent
gators with the technical know- should develop Asian, 5 percent black, and 4 per-
ledge and procedural experience working relationships cent Hispanic. The average age of
needed to successfully investigate with their counterparts the victims was 32, with the young-
cyberstalking should be a priority in other jurisdictions. est victim being 10 years old and the
for a computer crime unit. Agencies oldest being 62 years of age.
should note that the technical train-
”
ing needed to successfully investi- Technological Methods
gate cases of cyberstalking is not In 92 percent of the cases,
entirely crime specific and will males (approximately 80 percent of offenders used only one method
prove useful when investigating the cases) were more likely than fe- to stalk their victims. E-mail was
other types of computer-related males to commit aggravated harass- used most often. Offenders used e-
crime. ment using a computer or the mail to harass their victims in ap-
An examination of case out- Internet. Approximately 74 percent proximately 79 percent of the cases.
comes revealed that 192 of the 201 of the offenders were white, 13 per- The second method most often
cyberstalking cases investigated cent Asian, 8 percent Hispanic, and used by offenders was the instant
by CITU were closed during the 5 percent black. The average age of messenger. Offenders used instant
56-month period of this study. the offender was 24, with the oldest messengers to harass their victims
Approximately 40 percent of the offender being 53 years old and the in about 13 percent of the cases.
cases were closed with an arrest, youngest being 10 years old. Ap- Chat rooms were used in approxi-
and almost 11 percent of the cases proximately 26 percent of offenders mately 8 percent of the cases,
failed to produce evidence that a were juveniles, according to New while message boards and Web
crime was committed. CITU closed York State law, or under the age of sites were used respectively in
the remaining cases after finding 16. 4 percent and 2 percent of the
evidence to support the victim’s cases. Last, offenders employed
complaint due to a jurisdictional The Victim newsgroups and false user profiles
issue, an uncooperative complain- Victim characteristics were ex- in approximately 1 percent of the
ant, a case transfer, or exhausting amined using the 171 closed cases cases.
March 2003 / 13
Resources
U.S. Department of Justice Cybercrime Web Site: http://www.cybercrime.gov
High Technology Crime Investigation Association: http://www.htcia.org/
SEARCH—The National Consortium for Justice Information & Statistics: http://www.search.org/
National Center for Missing & Exploited Children: http://www.ncmec.org/
International Association of Computer Investigative Specialists: http://www.cops.org/
Compuforensics: http://www.compuforensics.com/
National Law Enforcement & Corrections Technology Center: http://www.nlectc.org/
National White-Collar Crime Center: http://www.iir.com/nwccc/nwccc.htm
Knowing the type of Internet computer-mediated communication outcome of a case. In New York
technology used most often by present law enforcement with City, the District Attorney’s Office
cyberstalkers can prove beneficial jurisdictional issues that could is less inclined to prosecute aggra-
to law enforcement administrators negatively impact the investigation vated harassment cases if the arrest
who must decide how to allocate and the subsequent prosecution of of the suspect requires extradition
the training budget for computer computer crimes. 7 With the from another jurisdiction. Such
crime investigators. Because e-mail Internet, stalkers no longer need policies have prevented the appre-
constitutes the method most often physical proximity to have contact hension of offenders by the NYPD
used by cyberstalkers, unit adminis- with their victims. They just as in cases where investigations by
trators should prioritize technical easily can harass a person in CITU have produced evidence sup-
training that provides investigators another state or country as they porting their arrests. In 20 aggra-
with the knowledge needed to can a person who lives in close vated harassment cases investigated
perform e-mail-related forensics. proximity. by CITU, the NYPD did not arrest
The majority of CITU’s aggra- the suspects, despite supporting evi-
ISSUES FACING LAW vated harassment cases involved in- dence, because their arrests would
ENFORCEMENT AND vestigations where both the of- require extradition from another ju-
POTENTIAL SOLUTIONS fender and victim resided within the risdiction. In these cases, the NYPD
Technical features of the jurisdiction of the NYPD. In ap- made referrals to the police depart-
Internet and procedural issues proximately 72 percent of the cases, ments that had jurisdiction over the
with the law present problems for the offender and the victim resided offenders.
criminal justice agencies when within the five boroughs of New Differences in statutory defini-
investigating and prosecuting York City. In comparison, 26 per- tions of stalking across states
cyberstalking cases. These prob- cent of the cases involved either an may complicate the investigation
lems, however, are not crime spe- offender or a victim who resided and prosecution processes when
cific and generally occur when outside the jurisdiction of the offenders reside outside the
agencies investigate and prosecute NYPD but within the United States, jurisdiction of the investigating
cases involving any type of com- while 2 percent of the cases in- agency. Jurisdictions that do not
puter crime. volved an offender from a foreign recognize Internet communication
country. as a viable method to stalk or
Jurisdiction An offender residing outside harass may deny or ignore the
The global reach of the Internet the jurisdiction of the investigating extradition request, search warrant,
and the instantaneous nature of agency can negatively impact the or subpoena of a jurisdiction where
“
other jurisdictions. Such relation- cult time establishing an electronic
ships can prove essential to secur- link between the suspect and the
ing the arrest of out-of-state or for- victim. The financial and human
eign offenders in their home ...administrators costs associated with gathering and
jurisdictions when the victim’s ju- maintaining account information
risdiction will not arrest if extradi-
should prioritize decreases the possibility that
tion is required. In addition, cross- technical training Internet service providers will vol-
jurisdictional relationships between that provides untarily collect and maintain such
computer crime investigation units investigators with the data for a useful period of time.
can help secure the execution of knowledge needed to Missing toll records, transactional
out-of-state subpoenas and search perform e-mail- data, user information, or account
warrants and facilitate relationships content resulted in a negative case
with out-of-state Internet service
related forensics. clearance in approximately 18 per-
providers, computer manufacturers, cent of the cyberstalking cases in-
”
and software developers. Over the vestigated by CITU. In these cases,
past decade, various professional the content of the communication
organizations have formed for those contained a threatening message,
involved with the investigation of Account and User but no arrest occurred because de-
computer-related crimes. Participa- Information tectives could not gain access to the
tion in these organizations can The unwillingness of some electronic evidence to legally sup-
provide law enforcement with in- Internet service providers to readily port apprehending a specific indi-
valuable links to out-of-state grant law enforcement access to vidual. To ensure that account, sub-
resources. subscriber records further compli- scriber, and user information are
Because of the ease with which cates the investigation of a collected and saved long enough to
cyberstalkers may attack across ju- cyberstalking case. Not all Internet help law enforcement, legislation
risdictional lines, legislatures service providers agree on what that regulates Internet service pro-
should carefully define the venue of constitutes subscriber records, viders should include data collec-
the offense. In cases where threat- which are obtainable by subpoena, tion requirements.
ening communication originates as opposed to transactional records,
from another state or country and which require a search warrant.8 Anonymizing Tools
the statute of the investigating juris- When compared to obtaining tele- The continued development
diction defines the venue of the of- phone records from a telephone and increased availability of
fense in terms of where the commu- company, obtaining a suspect’s anonymizing Internet tools (i.e., de-
nication originated, the criminal Internet account information from a vices that ensure a person’s ano-
justice community will not be able service provider can prove far more nymity when using the Internet) can
to properly serve the victim. When complicated and involve an in- complicate the investigation of
creating legislation to combat crease in the amount of paperwork cyberstalking cases. Anonymous
March 2003 / 15
remailers allow individuals to send investigated by CITU. Investiga- offenders used anonymous Web-
electronic mail without transmitting tors, however, could not trace the browsing services to stalk their
any information that would enable harassing e-mail messages sent victims.
others to determine the identity of through the anonymous remailers The widespread availability of
the author. Remailers strip identify- back to their authors in all four anonymizing tools can increase the
ing information from the e-mail cases where these tools were used. amount of cyberstalking and
header and erase any transactional Anonymous Web-browsing Internet deviance in general. Theo-
data from servers that would enable services also offer cyberstalkers the retically, deviance will result from
law enforcement to trace the mes- opportunity to harass or threaten the use of anonymizing tools
sage back to the author. Conse- victims while remaining virtually because people will feel less
quently, cyberstalkers who use an untraceable to law enforcement. restrained when not faced with the
anonymous remailer as the sole Some companies provide users fear of detection by their victim or
means to send threatening or ha- with the ability to surf the Inter- the police. The absence of a legally
rassing e-mail messages will remain net, participate in public chat chan- binding international body to regu-
virtually undetectable to the victim nels, send instant messages, and late the Internet leaves little hope
and law enforcement. The danger post messages to newsgroups that the deployment of anonymizing
raised by the use of anonymous without transmitting any identify- tools will be stopped. Even if a
remailers, as depicted by CITU’s ing information. The exclusive country did succeed in banning the
caseload, does not stem from the use of such services to send harass- distribution of anonymizing tools,
frequency in which these tools ing messages would prevent inves- the global reach of the Internet
are used, but from the effect tigators from establishing an would enable people to seek out
these tools have on the investigative electronic link between the such tools in countries that allow
process. Anonymous remailers victim and the offender. An exami- their use. Consequently, citizens
were used in only 4, or 2.1 percent, nation of CITU’s cyberstalking must learn to survive on an Internet
of the 192 cyberstalking cases caseload found no instances where where people can act without ac-
countability. In the absence of a
regulatory solution to safeguard
Internet users against those who
Distribution of Cybercrimes Investigated by employ anonymizing tools to ha-
the New York City Police Department rass, Internet service providers and
January 1996 through August 2000 related software companies should
seek a technological solution aimed
Number of Percent at blocking unwanted anonymous
Crime Cases of Cases communication.
Aggravated harassment 201 42.8
Grand larceny 102 21.7 CONCLUSION
Hacking (e.g., computer trespass) 46 9.8 Because the Internet allows hu-
Forgery 23 4.9 man interaction without physical
Petit larceny 22 4.7 barriers and with the perception of
Criminal impersonation 20 4.3 anonymity, it has become the ideal
Child pornography 19 4.0 instrument for individuals who
Crimes against children 14 3.0 wish to intimidate, threaten, or ha-
Scheme to defraud 10 2.1 rass. Federal and state legislation
Other crimes 13 2.8 have emerged to criminalize such
Total 470 100 behavior. Legislatures aiming to
criminalize cyberstalking should
“
Violence Against Women (Arlington, VA:
January 1996 through August 2000
American Prosecutors Research Institute,
found cyberstalking to be the most 1999). For instance, section 240.30 of the New
prevalent computer crime investi- All 50 states and the York State Penal Law finds a person guilty of
gated by the department. Thus, po- federal government aggravated harassment if the individual
purposely intends to harass, annoy, threaten, or
lice personnel administrating com- have enacted statutes alarm another person by means of mechanical,
puter crime units should prioritize
staffing and training initiatives that
aimed at protecting the electronic, or written communication.
Additionally, New York revised its antistalking
properly equip their units to deal victims of stalking. statutes in December 1999 to cover electronic
communication, such as e-mail, that is likely to
with the cyberstalking problem.
”
cause fear or harm. In defining the actions that
Additionally, because cyberstalkers constitute stalking, section 646.9 of the
use e-mail as the communication California State Penal Code includes verbal,
method of choice, computer crime written, or electronic communications that are
unit administrators should prioritize Finally, the infrequent use of intended to place individuals in reasonable fear
technical training that provides in- anonymous remailers by cyber- for their safety. In defining electronic
stalkers should not pull attention communications, California has relied upon the
vestigators with the knowledge definition used in the U.S. Code for regulating
needed to perform e-mail-related from the negative effect that these behavior related to communication devices.
forensics. tools can have on the law enforce- Specifically, the term electronic communication
Out-of-date and missing ac- ment process. The increased avail- means “any transfer of signs, signals, writing,
ability and continued development images, sounds, data, or intelligence of any
count, subscriber, and user informa- nature transmitted in whole or in part by a wire,
tion, as well as anonymizing tools, of anonymizing Internet tools that radio, electromagnetic, photo-electronic or
presented problems for law en- are easier to use than previous photo-optical system.” According to the
forcement during cyberstalking in- versions likely will increase the use California State Penal Code, the devices used to
of these options by criminals. When transmit electronic communications include,
vestigations. Working relationships but are not limited to, telephones, cellular
between computer crime units in all used, anonymous remailers suc- phones, computers, video recorders, fax
agencies can minimize the negative cessfully prevented law enforce- machines, and pagers.
March 2003 / 17
Police Practice
examination for the police officer position, and, of
Recruitment Strategies those, 100 individuals passed. When the department
A Case Study in Police offered the police test again in 1999, 47 applicants
took the test and 36 (76 percent) passed.
Recruitment The next stage in the testing process consists of
By Mark A. Spawn the physical agility test. The department tests candi-
dates for flexibility, the amount of push-ups and sit-
ups performed in a certain time frame, and the
completion of a 1.5-mile run. In 1999, more than 58
percent of the applicants could not pass the agility
test, which left a short list of candidates. After the
remaining group completed background investigations
and psychological and polygraph testing, seven more
applicants were excluded from the list leaving only 12
percent of those who had taken the written test
eligible for appointment. The shortage of eligible
candidates seriously concerned the department. In
particular, candidates did not seem prepared for the
agility test. The written examination had not changed
significantly in recent years, but neither had the
agility standards. To rectify the problem of a seriously
short candidate list, the Fulton Police Department
announced another written test in 2000 to garner more
candidates.
Recruitment
For the written test in 2000, the department
embarked on a serious recruitment campaign. The
1999 2000
No Strategy Aggressive Strategy
Candidates taking
47 160
written test
Candidates passing
36 111
written test
Top-scoring candidates
42% 71%
passing all screenings*
department made applications available not only and, particularly, the emphasis on the physical agility
through the civil service office during business hours component.
but also from the police department. All of these During the written examination in 2000, the
efforts proved so successful that the department had department surveyed candidates to elicit responses
to use a high school gymnasium as a testing center. concerning recruitment efforts. It designed the survey
To help candidates meet the required physical to measure best practices for recruitment, availability
fitness standards, each applicant received a summary of application packages, number of police tests taken,
of the requirements. Even though the standards and applicants’ knowledge of physical agility stan-
constitute a part of the basic application package, the dards. A summary of the survey results indicated that
department added emphasis by attaching a simplified newspaper advertising proved the most prominent
chart, which showed applicants what the department medium from which candidates learned about the
would require if they passed the written examination. police test, followed closely by the television adver-
Candidates received the fitness standards once again tising. Candidates suggested that newspaper and
prior to agility testing, several weeks before the test. television were the best mediums to notify them of
By providing this information to the candidates well future tests. The availability of police test packages
in advance, the department hoped that the elimination was important—45 percent of candidates obtained
rate would decrease significantly. them from the police station and 33 percent from the
personnel office.
Results The most critical survey question evaluated
The results of candidate testing showed that the whether the department delivered the message on
department’s efforts paid off. A record 160 candidates agility standards. Surveys asked if candidates knew
took the written examination and 111 (69 percent) about the physical agility requirements. An over-
passed. A segment of those applicants with a passing whelming 94 percent said that they knew, and 5
score underwent the physical agility testing. Of that percent answered that they “somewhat” knew about
group, 71 percent passed, a 29 percent increase from them. Only 1 percent answered “no.” The best
the previous year. Even though a 7 percent greater analysis occurred when top-scoring candidates
failure rate existed with the written examination underwent physical agility testing. At that time, the
compared to the previous year’s exam, the significant pass rate for the agility test reached 71 percent, a 13
increase of those who successfully completed the percent increase from the previous year.
agility test gave the department a much larger candi- In New York, the entrance exam is standardized
date pool. It also validated the recruitment campaign and given on the same day statewide. This allows
March 2003 / 19
applicants to sit for one test and have their scores record number of candidates took the written exami-
filed with other jurisdictions in the state. In 2000, 82 nation, and the number of applicants who passed the
percent of the applicants sitting for the Fulton exam physical agility test increased dramatically from the
tested only for the Fulton Police Department. previous year.
A recurrent emphasis on fitness throughout the
Conclusion testing process is a message to candidates of the
The officer candidate selection process—from the importance of the standards. While some law enforce-
written test to the agility test, to background investi- ment administrators might view a high failure rate for
gations, psychological evaluations, and polygraph physical testing as a problem beyond their control, an
examinations—is intensive and expensive. After intense recruitment program highlighting the mini-
many applicants failed the physical agility test in mum requirements is one method to increase results
1999, the Fulton Police Department implemented an and yield more candidates.
aggressive recruitment campaign to attract larger
numbers of candidates. The department used a variety Chief Spawn heads the Fulton, New York, Police
of resources to recruit local residents and to advise Department.
them of required physical fitness levels. As a result, a
Subscribe Now
© Mark C. Ide
O n April 23, 1990, the U. S. The FBI defines a hate/bias truths to be self-evident, that all
Congress signed the Hate crime as “a criminal offense com- men are created equal, that they are
Crime Statistics Act into mitted against a person, property, or endowed by their Creator with cer-
law.1 Previous to this act, hate/bias society which is motivated, in tain unalienable Rights, that among
crimes existed, but were not whole or in part, by the offender’s these are Life, Liberty, and the pur-
tracked or focused on as a specific bias against a race, religion, disabil- suit of Happiness.”
type of crime. For example, Adolf ity, sexual orientation, or ethnicity/ Law enforcement agencies and
Hitler’s attempted genocide in the national origin.”2 Hate/bias crimes officers need to know the issues,
1930s and 1940s registers as one destroy communities, as well as guidelines, and action steps that
of the most heinous acts in history hoard resources from law enforce- comprise an effective hate/bias
and the abomination that all hate/ ment agencies. Hate/bias crimes crime response and investigation.3
bias crimes are measured against, tear at the very fabric of American Law enforcement agencies also
but, at the time of its discovery and society—a society based on clear should ensure that investigators re-
investigation, no act or specific and certain truths intended for all ceive training in such critical ele-
guideline for investigating and citizens and communities and dis- ments as understanding the role of
classifying hate/bias crimes tinctly stated in the Declaration of the investigator, identifying a hate/
existed. Independence. “We hold these bias crime, classifying an offender,
March 2003 / 21
interviewing a victim, relating to a hate/bias crime must be caring and away. Driving a victim away, even
community, and prosecuting an of- compassionate persons. They must unintentionally, will slow an inves-
fender. When hate/bias crimes oc- tolerate all races, religions, national tigation and cause the victim to feel
cur, they deserve investigators’ origins, sexes, sexual orientations, even more alienated. Responding to
timely response, understanding, and disabilities to maintain a a potential hate/bias crime in the
and vigilance to ensure an accurate nonjudgmental attitude throughout correct fashion can open the lines of
and successful investigation. While an investigation. Investigators must communication between the victim
veteran investigators of hate/bias have comprehensive knowledge of and the investigator, but it also can
crimes recognize these basic tenets, the general elements and motiva- ensure that the search for offenders
they also know the importance of tions behind hate/bias crimes. In- begins in the right direction.
revisiting them periodically to re- vestigators also need to recognize
mind law enforcement officers how the potential of such crimes to Identifying Hate/Bias Crimes
to handle fragile victims, families, affect the primary victim, the A common, but critical, mis-
and communities that have been victim’s family, other members of take in a hate/bias crime investiga-
traumatized by the hateful act of a the victim’s group, or the larger tion is the misidentification of the
criminal. Furthermore, the events of community. crime. Attempting to correct a
September 11, 2001, require the law When working with the victims misidentification with a victim,
enforcement community to render of a hate/bias crime, the role of the community, or within a law en-
special attention to these crimes be- first responder is critical.4 In many forcement agency is time consum-
cause the hated community was the instances, the investigator is the ing and difficult at best. Officers
entire United States and its way of first contact with law enforcement, unsure about identifying a potential
life. the government, or the justice sys- hate/bias crime should consult with
tem that the victim may have expe- a supervisor or an expert on the
Understanding rienced. Investigators become rep- topic. They should use the depart-
the Investigator’s Role resentatives of their entire agency, ment chain of command to inform
All investigators responding to and, without a good first impres- the department of the incident and
or helping in the investigation of a sion, the victim may feel driven to update key members throughout
the investigation. Questions similar
to the following will help investiga-
tors identify hate/bias crimes and
“
begin an investigation.
Investigators • Was the victim a member of a
become targeted class?
representatives of • Was the victim outnumbered
their entire agency, by the perpetrators?
and, without a good • Did the victim and offender
first impression, the belong to different groups?
victim may feel • Would the incident have taken
driven away. place if the victim and of-
”
fender were of the same
group?
Mr. Bouman currently trains federal officers in California and New
• Have other incidents occurred
Mexico in cooperation with the Federal Law Enforcement Training in the same locality or in a
Center (FLETC) based in Glynco, Georgia. similar place?
“
mantras), or previous patterns of ac-
at the crime scene?
tivity significant for these groups
and their agendas, can assist in an
Classifying Offenders Hate/bias crimes effective investigation. Investiga-
Equipped with the answers to destroy communities, tors must proceed promptly to keep
these questions, investigators as well as hoard the incident from escalating, appre-
should be able to determine if the
crime was committed based upon
resources from law hend the perpetrator, and diligently
enforcement process all physical evidence, all
hate or bias and, if so, begin to in- while remaining sensitive to the
vestigate the motivations of the of- agencies. feelings and needs of the victim or
fender. Hate/bias crimes, offenders, surrounding community.
”
and their motivations all typically
fit within five basic classifications. Interviewing Victims
1) Thrill seeking: Generally Hate/bias crimes are uniquely
groups of young people, these 4) Reactive: Typically show- violent and traumatic. Victims of
offenders are motivated by the ing a lack of tolerance for these crimes feel degraded, iso-
experiences of psychological individuals of other groups, lated, frightened, suspicious of oth-
or social excitement, mere these offenders protect and ers, powerless, and depressed.
pleasure, or the gain of brag- defend what belongs to them Some victims experience severe
ging rights. Their targets often (a country, community, trauma and denial about the inci-
are unknown outside the neighborhood, school, or dent, and some victims and families
groups they represent. Hate/ church) from outsiders. may feel emotionally disturbed for
bias-based graffiti or verbal or Average citizens defending extended periods of time. This
physical assault represent their race against another race long-term stress can take a substan-
offenses of this classification. characterize this classification. tial toll on a family and the sur-
2) Organized: Motivated by 5) Identity conflicted: Moti- rounding community. Effective in-
the need to express their vated by self-hatred or self- vestigators know and understand
profound resentment against, protection, these offenders these elements of hate/bias crimes.
March 2003 / 23
the response to other such crimes,
and the prevention of hate/bias
crimes in the future.
Relating to Communities
Many citizens do not under-
stand hate/bias crime laws, investi-
gation procedures, or the time re-
quired to complete a successful
investigation. Thus, investigators
need to work as liaisons between
their agency and the community.
Educating victims and others about
hate/bias crimes should become a
priority and coincide with an inves-
tigation. Victims and communities
© Peter Hendrie will then better understand probing
and inquisition regarding the inci-
Responsive and sensitive comfortable with, an interpreter. dent. Moreover, education could
investigators also understand Investigators should ask ques- become a valuable investment in
how important their communi- tions slowly and allow the victim future prevention or response to
cation skills are in these cases plenty of time to think or recall im- such crimes.
and that, in many cases, portant details. Some questions will Investigators can use many tac-
listening is more important be difficult to ask and answer; tics to educate, train, and empower
than talking. therefore, investigators never communities to fight hate/bias
When interviewing the victim should become impatient or argu- crimes. Establishing and training
of a hate/bias crime, investigators mentative with the victim. Investi- Neighborhood Watch groups, en-
must pay attention to the victim’s gators need to collect critical infor- couraging community meetings and
state of mind and do everything in mation about specific acts or words community problem-solving activi-
their power to gain useful informa- used by the perpetrator, as well as ties, and supporting community ef-
tion while creating a nonstressful record and compile anything else forts by involving local law en-
environment for the victim. Investi- that can help establish a motivation forcement agencies are just a few of
gators should interview victims in of hate or bias. Victims also will the ways investigators can make a
private. This will help calm victims need time to vent frustration and good first impression with the com-
and remove them from any distrac- display emotions. To help facilitate munity. Investigators also can train
tions. Investigators who allow a this, investigators should express a targets and victims of hate/bias
close friend or family member to genuine sense of care and concern crimes as responsive and preventive
join the interview will experience throughout the investigation. Last, advocates; engage members of local
calmer victims. These people will investigators must help victims con- community organizations to help
provide support, keep the victims nect to sources of support in the with the response, investigation,
focused, and help them relax. community. The critical informa- and prevention of hate/bias crimes;
However, official statements can- tion gathered during these inter- and help coordinate critical support
not be made for victims by friends views will be advantageous to a services for primary and secondary
and family, and investigators thorough and expeditious investiga- victims. Vigorously responding to
should make this clear. Some vic- tion, the apprehension of perpetra- and investigating hate/bias crimes
tims also may require, or be more tors, the prosecution of the crime, in the local community and using
“
retaliate in their own ways unless is investigated. Law enforcement
they are educated and provided agencies and departments that un-
other options for response or heal- ...no better derstand the connections between
ing. Moreover, no better advocates these actions and results will
exist in a community than victims
advocates exist in a promote the sensitive, timely,
of a hate/bias crime. Training vic- community than and effective response and investi-
tims and communities to cooperate victims of a hate/ gation of hate/bias crimes in their
with law enforcement and other bias crime. communities.
community programs takes the con-
Endnotes
”
trol out of the hands of the perpetra- 1
U.S. Department of Justice, Federal
tor, instills confidence in the victim Bureau of Investigation, Uniform Crime
and community, and prevents future Reporting Program, Hate Crime Statistics 2000
crimes. rapport between the victim and the (Washington, DC, 2001). For more information
prosecutor, and introduce the victim on collecting hate crime, see U.S. Department
Prosecuting Offenders of Justice, Federal Bureau of Investigation,
and community to the inner-work- Uniform Crime Reporting Program, Training
To instill even more confidence ings of the justice system. Guide for Hate Crime Data Collection
in an affected community, investi- The goal of an investigation is (Washington, DC, 1997), 60.
2
gators must help with the prosecu- to bring the criminal to justice. Ibid., Training Guide for Hate Crime Data
Collection, 59.
tion of offenders. Keeping the state Prosecution of the perpetrator will 3
The author reached the conclusions in
district attorney’s office informed help the victim and community this article by drawing on his 15 years of
and involved is absolutely neces- bring closure to the horrid events teaching experience on hate/bias crimes, as
sary for effective prosecution of in- and will bring law enforcement and well as his 33 years of experience with the
Los Angeles County, California, Sheriff’s
dividuals involved in hate/bias the community more into harmony, Department.
crimes. Federal violations will re- thus creating a safer place for 4
In some agencies, the first responder is
quire the involvement of federal people to live and work. also the lead investigator, while in other
agencies. In these cases, establish- agencies the lead investigator is a different
Conclusion officer. For the purpose of this article, the
ing rapport with the federal agency roles of the first responder and the lead
assisting in the investigation and Law enforcement officers who investigator are combined and referred to as
the investigator.
March 2003 / 25
Legal Digest
T he Fourth Amendment established and well-delineated ex- search also may be noted by a
preserves the “right of ceptions.” 2 The U.S. Supreme court,8 as may the failure of an of-
the people to be secure Court has stated that a search con- ficer to use an available written con-
in their persons, houses, papers, ducted pursuant to lawfully given sent form.9 One court has stated,
and effects, against unreasonable consent is an exception to the war- “[o]f course, a written consent to a
searches and seizures.”1 It is well rant and probable cause require- search is not a legal requirement,
settled that “searches conducted ments of the Fourth Amendment.3 but law enforcement officers fail to
outside the judicial process, without In Schenkloth v. Bustamonte,4 obtain a written consent when one
prior approval by judge or magis- the U.S. Supreme Court ruled that a readily could be obtained at the risk
trate, are per se unreasonable court reviewing whether an indi- that the government’s ability to
under the Fourth Amendment— vidual voluntarily consented to a prove the voluntariness of a consent
subject only to a few specifically search must consider the totality of will be seriously compromised.”10
“
residence, an old farmhouse on the
property, and several outbuildings.
The police arrested Cesar after find- Officers who obtain
ing 28 pounds of marijuana and a written consent to
number of weapons during the
search.
search from an
In considering Cesar’s chal- individual should
lenge to Karen’s consent to search, document in detail the
the Duran court specifically facts and circumstances
pointed to the consent form signed under which the consent
by Karen. The court rejected was given.
”
Cesar’s argument that the fact that
this was Karen’s first arrest should
be given weight, noting that the Ms. Holcomb serves as the chief of the Legal
form’s language stating that she Instruction Section, DEA Training Academy.
could refuse to consent and that any
March 2003 / 27
whether the form adequately indi- table. One of the officers asked In the 1999 case of United
cated that the individual is consent- Tovar for permission to search the States v. Rodriguez,31 the court held
ing to the search if it is in another entire apartment. The officer told that the defendant did not voluntar-
language,25 whether the individual Tovar that she did not have to allow ily consent to a search of his car.
was allowed to change the language the search, but that if she did not, Agents in Rodriguez obtained a
of the form,26 whether the indi- they would come back with a search search warrant to search the
vidual made a phone call prior to warrant. Tovar agreed to the search defendant’s residence. Between 10
signing the form,27 and whether the and signed a written consent form. and 15 agents participated in the
form was signed before or after the The court rejected the argument execution of the warrant, but no evi-
search occurred.28 that there were exigent circum- dence was found during the 3-hour
The 1995 decision of the U.S. stances that would permit a war- search. At the end of the search, an
Court of Appeals for the Eleventh rantless entry. The court also cited agent asked the defendant about a
Circuit in United States v. Tovar- another case stating that the govern- car parked in front of the house,
Rico29 is an example of a case in ment does not carry its burden of which the defendant denied own-
which an individual signed a con- © Mark C. Ide ing. He remained silent even when
sent to search form where the search shown a bill of sale for the vehicle
was found invalid. In Tovar-Rico, with his name on it.
officers followed two persons who The agent presented a written
had just obtained a substantial consent form printed in English for
amount of cocaine from two under- the defendant to sign. The defen-
cover officers. The individuals en- dant did not speak English, and,
tered an apartment building without therefore, the form had to be trans-
carrying anything and were seen lated into Spanish. The agent then
leaving apartment 901 a short time proceeded to literally translate the
later. Neither person carried any- form as he read it to the defendant.
thing. The individuals returned to Notably, the agent never had ob-
the apartment and left 10 to 15 min- tained a person’s consent to search
utes later with a third person. in Spanish before, and there were
One individual then removed a Spanish-speaking officers present
large amount of cocaine from the at the home who may have done a
trunk of a car parked at the building proving that a consent is voluntary better job in translating. The defen-
and took it inside. An officer ob- by showing that someone merely dant agreed to sign the consent
served that individual exit unit 901. submitted to a claim of lawful au- form. As the agent filled out the
Officers arrested all of the individu- thority. The court found Tovar’s form and the defendant was about to
als involved in the transaction who consent was involuntary and stated sign it, the “defendant asked [the
were around the apartment building that, “Tovar had already observed agent] ‘whether they [agents] were
and then proceeded to unit 901. officers explore every room in the going to search the vehicle any-
Five officers knocked on the apartment and could not reasonably way,’ to which the latter responded
door to unit 901, announced their have known that she could still affirmatively.” 32 The defendant
identity, and requested permission refuse a search....We entertain no signed the form. The agents found
to enter. When Tovar answered the doubt that Tovar opened the door in weapons in the car, which the de-
door, the officers quickly entered response to a ‘show of official au- fendant sought to suppress.
with weapons drawn and conducted thority’ and cannot be deemed to In determining whether the de-
a protective sweep. The officers en- have consented to the agents’ entry fendant voluntarily consented to
tered each room of the apartment or to have voluntarily consented to the search, the court considered
while Tovar sat at the dining room the search.”30 the defendant’s age and criminal
“
translate the consent form. peals for the Fifth Circuit found that
The court concluded that the Boukater voluntarily consented to a
defendant had not voluntarily con- ...officers should be search of his briefcase. After being
sented to the search of the vehicle. advised of his constitutional rights
The court stated that the environ-
extremely careful in and being told that he was free to
ment created by the agents in the making sure that the leave, Boukater stated that he
home at the time the defendant’s language in the form wanted to know what was going on.
consent was obtained was implic- accurately describes The agents advised Boukater that
itly coercive. More particularly, the what will be searched. he was suspected of carrying coun-
court found it significant that when terfeit bills and was asked if he
”
the agents obtained consent, the de- would consent to a search. Boukater
fendant was handcuffed, unlawfully then stated, “It looks like you
seized, separated from the rest of got me. You can search my bags.”
his family while his crying 3-year- After refusing to give written
old daughter was left alone with one Refusal to Sign Form consent, he was asked if he was
of the 10 to 15 agents in the house, In many cases, an individual withdrawing his consent. At that
and it was strongly implied that the will be willing to verbally consent point, one agent stated that
car would be searched even if he did to a search but will refuse to sign a Boukater said, “No, go ahead,” and
not consent. At the suppression consent to search form. In such the other agent stated that he said,
hearing, the agent was asked to cases, as long as the consent to “Well, go ahead. You got me. It’s in
translate the consent form into search is voluntary, the verbal con- there.”38
Spanish as he had on the day in sent will be sufficient to allow the
question. The court stated the fol- search.34 Significantly, it has been Form Content
lowing with regard to the agent’s held that “the refusal to execute a There is no prescribed language
translation: written consent form subsequent to that federal courts have held that
Assuming that the former a voluntary oral consent does not must be placed into a consent to
translation replicated the latter, act as an effective withdrawal of the search form. A written consent to
we find that defendant was prior oral consent.”35 In one case, a search may be handwritten39 or be
March 2003 / 29
on a preprinted form. While there is given this authorization...vol- Appellant Kapperman argued
no specific language that must be untarily and without threats, prom- that the consent form signed by
included in a written consent, the ises, pressures, or coercion of any Cervantes did not authorize open-
language that is used is extremely kind.” 46 Even though it is well ing the suitcase in the trunk. The
important. For example, there is a settled that an individual does not consent form authorized officers to
vast difference between a writing have to be informed by an officer of search the car and remove “what-
stating, “I have been asked to permit the right to refuse to consent to a ever documents or items of property
special agents...to search...”40 and search, 47 because courts will whatsoever, which they deem perti-
“it has been required of me that I consider this as a factor in deter- nent to the investigation.”52 The
give my consent to a search....”41 mining the voluntariness of the con- Kapperman court found that this
The first of these statements indi- sent, many forms include such a language permitted searching
cates that the individual had a statement.48 within containers in the car, as it
choice in whether to agree to a would be unlikely that papers and
search, while the latter implies that other items would be loosely strewn
“
there was none. about the inside of a vehicle. The
In most situations, officers use court also noted that the U.S. Court
a preprinted form when obtaining a ...the critical issue of Appeals for the Seventh Circuit
written consent. The officer will to be addressed in rejected an identical challenge in
fill in the particular details on the United States v. Covello 53 and
form relating to the item or location
this case was the stated that in Covello
to be searched and the individual agent’s ability to [t]he Seventh Circuit rejected
consenting to the search. The use of accurately translate a challenge identical to the
a preprinted form may prevent an the consent form. one presented here. Reviewing
officer from inadvertently using po- a district court opinion that
”
tentially coercive language, but us- held that an individual’s
ing such forms may lead to con- consent to search his car did
tested issues related to descriptions not include authorization to
of items or property due to a failure Most of the challenges made to search luggage found inside
to change boilerplate language.42 the language found in written con- of the car, the court reversed,
There are a number of standard sent forms concern the scope of the noting that the interpretation
items included in valid written con- search49 permitted by the language of the signed consent form
sent to search forms. First, the form in the form.50 For example, in the was crucial to the case. The
will indicate to whom the individual U.S. Court of Appeals for the Elev- form authorized the agents
is giving consent to search, for ex- enth Circuit decision United States “to conduct a complete search”
ample, Officer Smith of the High- v. Kapperman,51 officers stopped of the car, and permitted the
way Patrol or agents of the Drug Cervantes’ car based upon a reason- searching agents to remove
Enforcement Administration. 43 able suspicion that the passenger in from the vehicle any property
Second, the form will identify the his car was fugitive Kapperman. contained therein. Thus, the
item or location that the individual After determining that the passen- court concluded, the signed
is consenting to be searched, for ger was Kapperman, the officers consent form authorized the
example, a 1986 blue Ford pickup asked Cervantes for consent to questioned conduct. To bolster
truck, VA license 123 ABC. 44 search his car. Cervantes provided its decision, the court evalu-
Third, the form will state that the both oral and written consent to ated the circumstances sur-
individual is voluntarily consenting search. The police arrested rounding the property owner’s
to the search, for example, “I freely Cervantes after finding cocaine in a decision to consent, conclud-
consent to this search”45 or “I have suitcase in the trunk. ing that they were consistent
March 2003 / 31
40
United States v. Saadeh, 61 F.3d 510,
517 (7th Cir. 1995).
41
United States v. Jamarillo, 841 F. Supp.
490, 491 (E.D.N.Y. 1994).
42
See, e.g., United States v. Ramirez, 963
Wanted:
F.2d 693, 704 (5th Cir. 1992).
43
Notable Speeches
See, e.g., United States v. Saadeh, 61
F.3d 510, 517 (7th Cir. 1995).
44
See, e.g., United States v. Torres, 32 F.3d
225, 228 (7th Cir. 1994).
he FBI Law Enforcement
45
United States v. Saadeh, 61 F.3d 510,
517 (7th Cir. 1995).
46
United States v. Reeves, 6 F.3d 660, 661
T Bulletin seeks transcripts
of presentations made by crim-
(9th Cir. 1993).
47
inal justice professionals for
See United States v. Drayton, 536 U.S.
194 (2002).
its Notable Speech depart-
48
See, e.g., United States v. Torres, 32 F.3d ment. Anyone who has
225 (7th Cir. 1994); United States v. Reeves, 6 delivered a speech recently
F.3d 660 (9th Cir. 1993).
49
and would like to share the
For additional information regarding the
scope of a suspect’s consent to search, see
information with a wider
Florida v. Jimeno, 500 U.S. 248, 251 (1991), in audience may submit a trans-
which the Court stated that “The standard for cript of the presentation to the
measuring the scope of a suspect’s consent Bulletin for consideration.
under the Fourth Amendment is that of
‘objective’ reasonableness–what would the
As with article submis-
typical reasonable person have understood by sions, the Bulletin staff will
the exchange between the officer and the edit the speech for length and
suspect?”
50
clarity, but, realizing that the
See, e.g., United States v. Stribling, 94
F.3d 321 (7th Cir. 1996); United States v.
information was presented
Torres, 32 F.3d 225 (7th Cir. 1994); United orally, maintain as much of
States v. Reeves, 6 F.3d 660 (9th Cir. 1993); the original flavor as possible.
United States v. Covello, 657 F.2d 151 (7th Cir. Presenters should submit their
1981).
51
764 F.2d 786 (11th Cir. 1985).
transcripts typed and double-
52
Id. at 794. spaced on 81/2- by 11-inch
53
657 F.2d 151 (7th Cir. 1981). white paper with all pages
54
United States v. Kapperman, 764 F.2d numbered. When possible, an
786, 794 (11th Cir. 1985).
55
See generally United States v Jamarillo,
electronic version of the tran-
841 F. Supp. 490 (E.D.N.Y. 1994); 28 U.S.C. § script saved on computer disk
1827 (2002). should accompany the docu-
ment. Send the material to:
Nominations for the Bulletin Notes should be based on either the rescue of one or more
citizens or arrest(s) made at unusual risk to an officer’s safety. Submissions should include a
short write-up (maximum of 250 words), a separate photograph of each nominee, and a letter
from the department’s ranking officer endorsing the nomination. Submissions should be sent
to the Editor, FBI Law Enforcement Bulletin, FBI Academy, Madison Building, Room 209,
Quantico, VA 22135.
U.S. Department of Justice Periodicals
Federal Bureau of Investigation Postage and Fees Paid
Federal Bureau of Investigation
FBI Law Enforcement Bulletin ISSN 0014-5688
935 Pennsylvania Avenue, N.W.
Washington, DC 20535-0001
Official Business
Penalty for Private Use $300
Patch Call
The mission of the University of Vermont Police The patch of the North Salt Lake, Utah, Police
Services, established as a full-time police agency with Department depicts the year that Utah became a state.
statewide authority in 1991, is represented by its patch. The center of the patch features a beehive, which is the
The green mountains, overlooking Lake Champlain, state symbol for industry. The city of North Salt Lake
speak to the natural beauty and rugged individualism of was incorporated in 1946. It has a population of 8,500
Vermont and are the namesake for the university. The and currently is served by 11 sworn police officers.
Latin words represent three keys to the agency’s
success: excellence, integrity, and service.