You are on page 1of 35

July 2005

Volume 74
Number 7
United States
Department of Justice
Federal Bureau of Investigation
Washington, DC 20535-0001
Robert S. Mueller III
Director

Contributors’ opinions and statements Features


should not be considered an
endorsement by the FBI for any policy,
program, or service.

The attorney general has determined Risk Assessments and Today’s law enforcement agencies face
that the publication of this periodical is
necessary in the transaction of the
Future Challenges 1 emerging threats that require a higher
level of preparedness.
public business required by law. Use By W. Dean Lee
of funds for printing this periodical has
been approved by the director of the
Office of Management and Budget.
The FBI Law Enforcement Bulletin Preparing Law This program offers a proven method
(ISSN-0014-5688) is published
monthly by the Federal Bureau of
Investigation, 935 Pennsylvania
Enforcement Leaders 20 for preparing law enforcement
leaders.
Avenue, N.W., Washington, D.C.
By Scott L. Salley
20535-0001. Periodicals postage paid
at Washington, D.C., and additional
mailing offices. Postmaster: Send
address changes to Editor, FBI Law Serving Their Country and Both law enforcement employers and
Enforcement Bulletin, FBI Academy,
Madison Building, Room 201,
Quantico, VA 22135.
Their Communities 25 employees who leave to perform military
duty need to have an understanding of
By Lisa A. Baker their rights and obligations.

Editor
John E. Ott
Associate Editors
Cynthia L. Lewis
David W. MacWha
Bunny S. Morris
Departments
Art Director
Denise Bennett Smith
Assistant Art Director 14 Focus on Personnel 24 Bulletin Reports
Stephanie L. Lowe Early Detection of the Victims
Problem Officer Human Trafficking
This publication is produced by
members of the Law Enforcement 18 ViCAP Alert 32 Bulletin Honors
Communication Unit, Training and
Development Division. Robert Mark Edwards Paso Robles, California

Internet Address
leb@fbiacademy.edu

Cover Photo
© Digital Juice

Send article submissions to Editor,


FBI Law Enforcement Bulletin,
FBI Academy, Madison Building,
Room 201, Quantico, VA 22135.

ISSN 0014-5688 USPS 383-310


Risk Assessments and
Future Challenges
By W. DEAN LEE, Ph.D.

© Digital Vision

B
y recognizing existing to better security and opera- department’s risk managers
and emerging threats, tional decision making. determine the risks, then they
law enforcement agen- The analytical risk manage- can select appropriate counter-
cies can improve their risk ment (ARM) process is a measure options to mitigate
assessment and management systematic and interactive them. Most important, ARM
programs. Too often, for ex- approach for identifying and can service both security and
ample, security risk assessments evaluating assets, potential operational assessments.
focus mostly on identifying threats, and existing vulnerabili- The ARM process expresses
flaws in physical security (e.g., ties, along with calculating risks risk, defined as the potential
perimeter barriers and screening and determining requisite destruction, disruption, or
visitors) without fully recogniz- countermeasures.1 Departments denial of essential assets, in the
ing the impact of other security can view the ARM process as formula Risk = Impact of Loss
challenges (e.g., internal people three interacting spheres of of Asset x Threat x Vulnerabil-
problems and cyberthreats). assets, threats, and vulnerabili- ity or R = I x T x V. In other
Applying a systematic approach ties. Where these three areas words, a risk assessment (R)
of fact finding and balancing merge, or overlap, are the determines the possibility of an
costs and benefits should lead calculated risks. Once a adversary’s (T) successful

July 2005 / 1
“ Applying a
systematic approach
of fact finding and
Third, the risk managers as-
sign a linguistic rating (value/
criticality) to each asset based
on the impact of loss or dam-
balancing costs and age. This means that risk man-
benefits should lead gers first assess an asset accord-
to better security ing to one of the four defined
and operational criticality ratings of critical,
decision making. high, medium, and low and then


further refine the resource into
three values of low, medium,
Dr. Lee, the architect of the FBI’s Security Risk Management or high.
Program and Continuity Assurance Planning Strategy, leads • Critical: grave effects lead-
the Bureau’s Security Risk Analysis Staff.
ing to loss of life, serious
injury, or mission failure.
• High: serious effects result-
exploitation of an identified from that traditionally used ing in loss of highly sensi-
vulnerability (V) and the in law enforcement and intelli- tive resources that would
resulting degree of damage or gence circles. Assets include impair operations affecting
impact (I) on the asset. Basi- people, information, operations, public safety and commu-
cally, risk management consti- equipment, facilities, and nity interests for an ex-
tutes the continuing process of social-psychological resources tended period of time.
selecting and applying explicit (PIOEFS).
countermeasures to achieve Assessing assets involves • Medium: moderate effects
optimum results while balanc- three sequential actions. First, resulting in loss of sensitive
ing acceptable risks and costs. a department’s risk managers resources that could impair
By developing a full-spectrum identify all important local operations affecting public
risk assessment and manage- organizational and operational safety and community in-
ment program, a department PIOEFS resources requiring terests for a limited period
can discover its security and protection. Second, they write a of time.
operational strengths and brief statement for each describ- • Low: little or no effects
weaknesses. In addition, it can ing the worst undesirable event impacting human life or the
determine how best to maxi- should some adverse situation continuation of operations
mize asset usage. affect that asset. For example, affecting public safety and
within the people category, a community interests.
ASSETS department should include law In the example of officers as
For the ARM process, enforcement officers as a a critical asset, the department
assets comprise resources of critical asset, and an applicable might assign an impact rating
essential value that a depart- undesirable event would be of low/critical, meaning that it
ment must protect to effectively criminals or terrorists attacking deemed the resource as overall
fulfill its essential public safety with improvised explosive critical but at the lower end of
and law enforcement responsi- devices that could result in the that category. Finally, the risk
bilities, a definition that differs loss or injury of the officers. managers convert the linguistic

2 / FBI Law Enforcement Bulletin


ratings into numeric impact diplomats; state-sponsored could comprise spouses en-
values. The numeric value will entities attempting to influence gaged in chronic and escalating
be impact (I) in the equation I x the American public through domestic violence. Next, the
T x V = R. Chart 1 and Table A the media and select organiza- risk managers write a brief
illustrate this process. tions and to acquire U.S. re- statement highlighting each
search and development tech- adversary’s intent, capability,
THREATS nology; and foreign economic and history of violence. Then,
Threats are general situa- menaces endeavoring to control they assign a linguistic rating
tions with the potential to cause U.S. industrial, banking, and (value/criticality) to each danger
loss or harm to essential assets, commercial interests. based on the adversary’s overall
whereas adversaries constitute Assessing threats involves intent, capability, and history.
specific hostile individuals or identifying and assessing all of The risk managers assess a
groups with the intentions, the threats associated with each threat according to one of the
capabilities, and histories to asset. For example, law enforce- following four defined critical-
conduct detrimental activities ment officers might face two ity ratings and then further
against law enforcement agen- main street hazards: criminals refine it into three values of
cies and public safety. Conven- and irate citizens. First, a low, medium, or high. The
tional external threats involve department identifies the spe- definitions for threats differ
individuals, domestic groups, cific potential adversaries for greatly from those for assets
and sometimes foreign entities. each threat. Criminal adversar- and vulnerabilities.
Individual dangers include ies could include local street • Critical: a definite danger as
street criminals of varying gangs and organized crime the adversary has both the
sophistication; computer hack- figures, whereas irate citizens intent and capability to
ers intent on penetrating, steal-
ing, altering, controlling, or
deleting law enforcement
data; insiders, such as corrupt Common Threats Facing Law
officers, supervisors, and Enforcement Agencies
administrators; and people
with personal, emotional, or • Criminal: menacing, assaults, vandalism, thefts,
psychiatric crises. Group threats arson, and computer hacking
can involve regional and inter-
national organized crime fig- • Natural: fires, floods, power failures, and storms
ures; left-wing, right-wing, • Domestic: civil disturbances and special event
and special interest extremists; problems
and foreign, domestic, and • Terrorist: bombings, sabotage, hostage taking,
transnational terrorists. Foreign kidnappings, and homicides
perils can comprise foreign
• Internal: corrupt officers, misuse of authority or
intelligence services masquer-
resources, and malicious acts by disgruntled workers
ading as business persons,
visiting delegations, false-front
companies, travelers, journal-
ists, scientists, students, and

July 2005 / 3
Chart 1 - Asset Assessment Example
Linguistic
Impact Numeric
Critical Asset UDE Undesirable Event (UDE) Rating Impact
Code Degree / Value
Criticality
People

(P-1) Departmental P1A Terrorist or criminal attacks (e.g., vehicle & package IEDs, Low / High 14
Personnel (full-time hazardous mail, & physical assaults) causing loss of LEA lives.
officers, auxiliaries, JTF
members, technicians, & P1B (Insert additional items & blank lines as needed).
administrators).
Information

(I-1) LEA sensitive I1A Internal & external thefts compromising law enforcement Medium / 5
information in various sensitive resources & operations. Medium
media.
Operations

(O-1) Ongoing O1A Detection of LEA UC operations causing loss of lives, CI assets, High / High 49
investigations & and jeopardize officers and cases.
operations.
O1B Improper security discipline and security lapses causing Low / 50
compromised operations Critical
Equipment

(E-1) Communication E1A Loss of electrical power or communications causing disruptions High / High 49
devices. of operations.

(E-2) Weapons, E2B Thefts causing loss of weapons, radios, & equipment. Medium / 71
ammunition, radios, & Critical
specialized gear.
Facilities

(F-1) Main Headquarters F1A Unrestricted publicly accessible pathways in adjacent property Low / 50
& substations causing penetrations and attacks. Critical
Socio-Psychological

(S-1) Community public M1A Loss of public trust and community support may result in Medium / 71
relations. increased crimes. Critical

Conversion Table A (Assets & Risks)

Low Medium High Critical

L/L M/L H/L L/M M/M H/M L/H M/H H/H L/C M/C H/C

1 2 3 4 4 5 13 25 49 50 71 100

For converting linguistic ratings into numeric impact values for assets and for con-
verting numeric values into linguistic ratings for risks.

4 / FBI Law Enforcement Bulletin


launch an assault and a can exploit to gain access to an ratings and further refine the
history of conducting asset. In essence, vulnerabilities vulnerability into three values
similar incidents. are pathways leading to of low, medium, or high, which
• High: a credible danger as PIOEFS assets that include differ significantly from those
the adversary has either people, information and infor- for assessing assets and threats.
the intent or capability to mation systems, operational • Critical: no effective coun-
launch an assault and a procedures and personnel termeasures currently are in
history of conducting practices, equipment character- place, and known adversar-
similar incidents. istics, facility locations and ies would be capable of
building features, and social- exploiting weaknesses to
• Medium: a potential danger psychological weaknesses.
as the adversary has the reach the asset.
intent and the potential to • High: some effective


receive the capability countermeasures exist,
through a third party to but the asset has multiple
launch an assault and has a Vulnerabilities weaknesses that adversaries
history of similar incidents. represent could exploit to their
advantage.
• Low: little or no credible weaknesses that
evidence of the adversary’s an adversary can • Medium: some effective
intent or capability to exploit to gain countermeasures exist,
launch an assault and no access to an asset. but the asset has at least
history of conducting one weakness that adversar-
similar incidents. ies could exploit to their


In the example of street advantage.
gangs as a threat, the depart- • Low: multiple layers of
ment might assign a threat Assessing vulnerabilities effective countermeasures
rating of medium/critical, involves first identifying the exist, and few or no known
meaning that a department specific potential weaknesses adversaries could exploit to
considers the threat as overall for each asset. For example, their advantage.
critical and at the center of the law enforcement officers might Finally, the risk managers
category. Finally, the risk experience human temptations convert the linguistic ratings
managers convert the linguistic to misbehave or become ham- into numeric vulnerability val-
ratings into numeric threat pered by obsolete departmental ues and record the results for
values and record the results for policies and procedures. Next, each identified weakness. The
each identified adversary. The the risk managers determine the numeric value will be vulner-
numeric value will be threat (T) existing countermeasures for ability (V) in the equation I x T
in the equation I x T x V = R. each asset and their level of x V = R. Table B and Chart 3
Table B and Chart 2 illustrate effectiveness in reducing vul- present examples of this step.
this process. nerabilities. Then, the risk
managers assign a linguistic RISK
VULNERABILITIES rating (value/criticality) for each CALCULATION
Vulnerabilities represent according to one of the follow- Risk is the likelihood that an
weaknesses that an adversary ing four defined criticality undesirable event will occur. By

July 2005 / 5
Chart 2 - Threat Assessment Example
Linguistic
Critical UDE Threat Threat Numeric
Asset Code Category Adversary Intent Capability History Rating Impact
Degree / Value
Criticality

LEA P1A Criminals Local & Street gangs Gangs Six-year Medium / .87
personnel I1B transient ABC & XYZ possess history of Critical
O1A criminals intend to assorted violence
LEA O1B merge to weapons. since arrest
information attack police. of T.J.
Kooker.
Active
investigations Prisoners Unpredictable Prisoners Weekend High / High .74
processing intoxicated on PCP arrests are
Equip. & prisoners become most
weapons powerful. dangerous.

HQ & sub- I1A Extremists Terrorists, Left-wing & Both groups Outside Low / .75
stations E2B radicals, right-wing trained & agitators Critical
S1A fundamenta group intent equipped in arrive
lists on creating civil during
havoc during disorder major
convention. tactics. events.

F1A Disoriented Deranged Mentally Deranged Problem Low / .25


F1B & displaced individuals disturbed people use patients Medium
people persons intent multiple released
on self-harm. objects as from county
weapons. asylum.

Transients, Trespassers Transients Difficult Medium / .62


homeless, intent on capable of trespassers High
trespassers stealing for causing since
money. offenses. shelter
closing.

Conversion Table B (Threat and Vulnerabilities)

Low Medium High Critical

L/L M/L H/L L/M M/M H/M L/H M/H H/H L/C M/C H/C

.01 .12 .24 .25 .37 .49 .50 .62 .74 .75 .87 1.00

For converting linguistic ratings into numeric threat values and for converting linguis-
tic ratings into numeric vulnerability values.

6 / FBI Law Enforcement Bulletin


calculating the risk, the depart- values into ratings and prioritize procedures, practicing and
ment may obtain an estimate of the risks based on findings, enforcing discipline, controlling
the potential severity or out- remembering that higher values and monitoring accesses,
come of an undesirable event. indicate higher risks. Table A installing new security or
Calculating the risk for each and Chart 4 illustrate this operational measures, improv-
identified asset involves record- process. ing overall conditions, and
ing the degree of impact relative realigning efforts. Departments
to each asset (value of I), the COUNTERMEASURES can identify and assess many
probability of attack by a poten- Countermeasures are actions potential countermeasures that
tial adversary (value of T), and taken to prevent, mitigate, or they may use to reduce vulner-
the possibility of a vulnerability eliminate vulnerabilities and to abilities by exploring as many
being exploited (value of V) enhance security or operations. solutions as possible; by devel-
and then multiplying I x T x V. Universal methods include oping a comprehensive strategy
After this, the risk managers improving training and aware- toward risk reduction; by
would convert the numeric ness, modifying policies and discovering countermeasure

Chart 3 - Vulnerability Assessment Example


Linguistic
Critical Asset UDE Vulnerability Numeric
Code Vulnerability Description Rating Impact
Degree / Value
Criticality
People

LEA personnel P1A Established daily routines & schedules of law enforcement officers & Low / Critical .75
supervisors.

P1A Intimidations & physical assaults. High / Critical 1.00


Information

LEA I1B Inadequate compliance to established security policies, programs, & Low / Medium .25
information procedures.
Operations

Active O1B Public building with inadequate monitoring, allowing penetration and Medium / .37
investigations exposure to investigations. Medium

F1A Operations center co-located in high-risk facility. Medium / High .62


Equipment

Weapons, E1A Inadequate radio communication systems. High / High .74


radios, &
equipment E2B Inadequate doors, locks, and alarms to properly safeguard contents. Low / Medium .25
Facilities

Headquarters & F1B Presence of publicly accessible underground facilities (e.g., parking lots, High / Critical 1.00
substations loading docks, & fuel sites).
Socio-Psych

Community PR M1A Insufficient public relations staffing and funding reduces positive contacts High / High .74
programs with the community.

July 2005 / 7
Chart 4 - Risk Assessment Example

Impact Threat Vulnerability Numeric Linguistic


Value Risk
Rating
Rating Value Rating Value Rating Value Degree /
Criticality
People

Departmental personnel L/H 14 M/C .87 H/C 1.00 12.18 H/M


Information

LEA sensitive information in M/M 5 L/C .75 L/M .25 .94 L/L
various media
Operations

Ongoing LEA investigations H/H 49 M/C .87 M/M .37 15.77 L/H

Equipment

Communication devices H/H 49 L/C .75 H/H .74 27.20 M/ H

Weapons, ammunition, radios, M/C 71 L/C .75 L/M .25 13.31 H/M
& equipment
Facilities

Main Headquarters & L/C 50 M/H .62 H/C 1.00 31.00 M/H
Substations
Socio-Psychological

Community public relations M/C 71 L/C .75 H/H .74 39.41 H/H
programs

costs, including tangible train- People comprehensive indoctrination


ing, additional personnel, Members of the law en- and recurring refresher training
materials, installation, opera- forcement community (e.g., vital to proactively preventing
tions, maintenance, and replace- officers, joint task force mem- violations, detecting abnormali-
ment requirements; by conduct- bers, technicians, support ties, and minimizing damages;
ing cost-to-benefit analysis for personnel, administrators, by gaining positive leadership
each option and comparing and their families) comprise involvement and group support
appropriate alternatives; and by the primary asset. But, history for all programs; and by scruti-
prioritizing options based on has shown that some people nizing all individuals who have
one or a combination of factors, also may pose prominent direct and indirect access to
such as cost, time, effort, organ- threats and vulnerabilities. The essential PIOEFS assets.
izational impact, resources more people an organization
available, and other specified Information
employs, the higher the prob-
criteria. Chart 5 presents an ability of more security and The increasing proliferation
example and the following are operational challenges. How- and circulation of large volumes
universal countermeasure ever, law enforcement agencies of sensitive law enforcement
options to enhance the security can mitigate people-gener- data from multiple channels has
of PIOEFS assets. ated problems by providing grown progressively more

8 / FBI Law Enforcement Bulletin


susceptible to exploitation by become obsolete in countering protection; by assessing adja-
adversaries using human, elec- new and evolving multidimen- cent establishments as pathways
tronic, and cyber-based means. sional threats. To reduce secu- for attacks and correcting gaps
To reduce these threats, depart- rity and operational failures, where possible; by protecting
ments should promote security departments can integrate off-site locations with comple-
awareness to decrease careless- multiple resources to enhance menting security measures;
ness; identify and eliminate all security (e.g., physical barriers, and by providing separate
known susceptible points of electronic sensors, monitors, visitor- and package-screening
intercept in the communication alarms, and human systems); accommodations.
network; and provide and program into future budgets the
enforce secure storage and cumulative expenses for backup Social-Psychological
proper disposal of accumulating Factors


information material, media Adversarial manipulations
devices, and sensitive trash. of public and organizational
perceptions affect community
Operations By calculating the support and internal morale.
Law enforcement opera- risk, the department Departments may lessen social-
tions, such as active investiga- may obtain an psychological threats by recog-
tions, security at high-profile estimate of the nizing the importance of com-
events, and surveillance assign- potential severity or munity and individual concerns;
ments, have become more outcome of an by earning and preserving the
geographically dispersed and undesirable event. public’s trust and confidence;
increasingly reliant on comput- by understanding the impact of


ers and cellular communication social, cultural, political, reli-
connections, which then creates gious, and psychological influ-
greater vulnerabilities for ences in daily operational
adversarial espionage and equipment, supplies, mainte- security practices; and by
sabotage. Departments can nance, repair, upgrades, and deterring, detecting, and defeat-
lessen such dangers by incul- replacement systems; and ing internal security and opera-
cating operational security exploit available off-the-shelf tional problems promptly and
(OPSEC) early into all facets equipment to reduce internal decisively.
of individual daily affairs and research and development
special activities; enforcing expenses. RISK ASSESSMENT
strict need-to-know require- REPORTING
ments; practicing OPSEC, Facilities Producing a comprehensive
especially at off-site and under- Centralized facilities and security risk assessment (SRA)
cover locations; and integrating decentralized law enforcement report highlighting all findings
security compliance into all activities present unique coop- and recommendations can
plans, policies, procedures, erative security and operational enable senior officials to make
and performance reviews. challenges. Departments can well-informed mitigation
mitigate these by improving decisions. Accurate judgments
Equipment three-dimensional security pe- are based on methodical assess-
Screening, accessing, and rimeters with multiple rings and ments of known factors and on
monitoring systems rapidly layers of mutually supporting harnessing the collective input

July 2005 / 9
Chart 5 - Countermeasure Assessment Example
(E) Existing / (O) Ordered /

Improper security discipline


Detection of UC operations

Theft of weapons & equip.


Undesirable Event
(in order of priority)

Internal & external thefts

Loss power & commo.


(R) Requested

Cyber-based attacks

Facility penetrations

Loss of public trust


Inadequate parking
Terrorist attacks
Notes
Number & CM
Countermeasure Cost Effect

E #1 Provide semi-annual No extra Deter Conduct


security refresher
training to all.
cost. Defend * * * * * * * March &
Sept.

E #2 Increase operational No extra Detect Increase


security into all
investigations.
cost. Defeat * * * * * * * ASAP

O #1 Increase community $ 3,000. Deter Conduct


relations & public
affairs projects.
Detect
Defeat
* * ASAP

O #2 Purchase secure 22 x $350. Deter Ordered.


containers for all
removable media.
= $7,700. Deny * * * * ETA Sep.
2005

R #1 Purchase secure $225,000. Deter Request


radio & phone
systems.
* * * ASAP

R #2 Install securer doors 10 x $300. Deny Request


& locks on arms,
gear, & evidence
= $3,000. Delay * * * * * next
month
rooms.

R #3 Construct detached $ 92,500. Deny Request


prisoner processing
facility next to HQ.
Defend * * * * * next year

CM Effect: Deter, Detect, Deny, Delay, Defend, or Defeat.

from subject-matter experts to may accept risk conditions • Background information


derive acceptable levels of risk based on existing priorities, defining the purpose of
and courses of action. resources, and threat status. the assessment
Based on available and An SRA report should contain • Overview describing ARM
projected resources, decision several components. to familiarize readers with
makers may implement counter- • Executive summary high- the process
measures in varying intensities lighting the major findings, • Status of any related assess-
or at select locations, or they requests, and suggestions ment reports received

10 / FBI Law Enforcement Bulletin


from other agencies and white-collar crimes, cyber- adversaries require a holistic
substations based offenses, transient agita- approach by assembling sepa-
• Detailed findings of tors, public corruption, and rate pieces of the puzzle to see
assessed assets, threats, assorted threats of terrorism. the big picture of the hostile
and vulnerabilities Emerging threats include old, forces (e.g., criminals, extrem-
reemerging dangers, such as ists, and terrorists). Common
• Review of calculated secu- increasing street gang violence profiles of antagonists include
rity or operational risks and the influence of incarcer- a thorough understanding of
• Countermeasure options, ated criminals continuing to the following:
including the types and conduct unlawful enterprises • Goals: What specific objec-
quantities desired from prisons; the use of as- tives are the adversaries
• Critical concerns and priori- sorted improvised explosive trying to achieve (e.g.,
tized specific problems devices (IEDs); the increasing to influence, disrupt, or
menace of weapons of mass destroy)?
• Detailed recommendations
and external support • Motivation: What stimulates


requests them to do what they do
• A security program plan (e.g., for domination, fear,
describing the department’s Conventional greed, or prestige)?
plan of action (e.g., goals, external threats • History: What are their
objectives, and actions) to involve individuals, social, cultural, political,
mitigate risks domestic groups, and religious, and psychological
• Discussion of planning, sometimes foreign influences (e.g., based on
programming, and budget- entities. animosity, vengeance, or
ing requirements ideology)?


Overall lessons learned and
information for sharing
Predictive risk analysis
discussing future risks
and preventive measures
Summary and conclusion
recapping major findings

destruction potentially involv-
ing chemical, biological, radio-
logical, nuclear, and high-explo-
sive devices; new alliances and
symbiotic relationships between
criminals, terrorists, and foreign
• Funding: What are their
sources of monetary re-
sources (e.g., foreign spon-
sors, criminal enterprises,
or false fronts)?
• Support structure: What
basic framework supports
their operations and daily
and recommendations governments, in which crimi-
nals and foreign intelligence living activities (e.g., lodg-
FUTURE CHALLENGES services exchange resources ing, training, transporting,
The character of emerging (e.g., weapons, information, and sustaining)?
threats is changing rapidly. money, and hostages) with • Skills: What are their
Today, law enforcement agen- terrorists; and still-undetected technical and tactical skills
cies are challenged by multiple hidden dangers. (e.g., weapons, explosives,
asymmetric perils: domestic Detecting, identifying, specialized training, and
violence, criminal enterprises, and neutralizing threats and language)?

July 2005 / 11
• Collection: What are their available to strike (e.g., meticulous planning and prepa-
intelligence collection mass public gatherings, ration; attempts to control
sources and methods (e.g., visiting dignitaries, building circumstances and timing of
insiders, visitors, or open repairs, or open gaps)? when operations will com-
sources)? • Action: What are their mence; use of multiple indepen-
• Knowledge: What do action capabilities (e.g., dent cells with the same target;
they know about their Are they motivated, simultaneous attacks of soft-
targets (e.g., their assets, organized, equipped, target and high-payoff objec-
vulnerabilities, and trained, supported, knowl- tives to create mass fear, havoc,
countermeasures)? edgeable, and readied and casualties; and increased
attackers?)? support networks for funds,
• Tools: What specific tools recruitment, contacts, safe
do they possess (e.g., iden- In assessing emerging
threats, law enforcement agen- houses, false identities and
tity papers, vehicles, and cover stories, training, weapons,
computers)? cies can target and exploit some
of an adversary’s common explosives, intelligence, com-
• Weapons: What specific operating methods and tech- munications, transportation, and
weapons do they have (e.g., niques. These include increased escape plans or death benefits
small arms, IEDs, or weap- use of physical, imagery, and for surviving family members.
ons of mass destruction)? technical surveillance to iden- First and foremost, mitiga-
• Opportunities: What oppor- tify the target’s vulnerabilities; tion of emerging threats re-
tunities may be or become applied use of long-term quires the ability to think and

A New Generation of Adversaries

The acronym CAS-DRI-VARS may characterize some fundamental operating methods


that free-ranging adversaries exploit throughout the world.
• Creative: applying innovative use of the ancient arts of unconventional warfare
• Asymmetrical: launching multifaceted physical, political, informational, and cyberattacks
• Secretive: cloaking in multiple layers and compartmented cells
• Deceptive: misleading and manipulative in their intent and behavior
• Resourceful: maximizing the use of available resources to achieve their objectives
• Intelligent: capitalizing on detailed planning and orchestration
• Visionary: foreseeing the third and fourth order of effects of their actions
• Adaptable: evolving and adjusting with each new countermeasure
• Ruthless: striking with brute violence against the innocents
• Sophisticated: employing intricate ploys and strategies

12 / FBI Law Enforcement Bulletin


act beyond conventional wis- able to recognize potential in developing comprehensive
dom. That is, risk managers threats and have plans of action security programs to mitigate
and key decision makers must to counter a myriad of internal risks, justify budget and re-
assess the last attack, but not and external risks. source requests, and identify
plan exclusively for the same Assessments can provide ways to improve security
attack. Law enforcement offi- risk managers and decision departmentwide.
cials should enhance their makers with a baseline of vital ARM assessments and SRA
abilities to be— information and collective reports are a snapshot of current
• receptive to both new inno- trends that ultimately impacts assets, threats, vulnerabilities,
vations and old solutions; strategic planning efforts. and risks. ARM offers a flexible
• thorough in assessment, method for examining security


planning, and execution; and operational readiness and
for developing cost-effective
• resourceful in synergizing countermeasure options,
use of all assets; Assessing threats whereas SRA reports provide
• unpredictable in overt involves identifying a formal audit trail leading to
behavior; and assessing all well-informed decision making.
of the threats Together, these tools can help
• uncompromising in main-
taining the highest security
associated with the law enforcement community
and operational standards; each asset. enhance its ability to face the
rigors of tomorrow’s world of


• practical in applying preven- uncertainty.
tive measures; and
• flexible and bold in counter- Reports give focus for future Endnotes
ing new challenges. security and operational initia- 1
The FBI recently completed an
tives via the opportunity to assessment to evaluate its own security
CONCLUSION realign priorities, update mon- posture using ARM, which the U.S.
Identifying and thoroughly etary funding, and share lessons Security Policy Board’s Risk Management
Training Group developed. The FBI’s
understanding local and re- learned with the public safety version of ARM involves a six-step
gional threats give law enforce- community. process that identifies an organization’s
ment agencies a distinct advan- Law enforcement agencies assets, threats, vulnerabilities, risks, and
tage in better preparing for a should perform risk assessments needed countermeasures and then develops
wide range of risks and chal- annually and whenever a major a security risk assessment (SRA) report.
lenges. Today’s criminals, adverse incident occurs, key
extremists, and terrorists con- leadership changes, operations Please forward questions, comments,
tinue to practice the ancient relocate, and physical or proce- and suggestions to deanlee@leo.gov
principles of lawlessness: dural security modifications or phone Dr. Lee at 202-324-3173.
striking when and where they transpire. Analytical risk man- The FBI’s Security Division fully
supports the dedicated law enforce-
are most ready and when they agement (ARM) assessments ment professionals serving communi-
perceive that the law is absent and accompanying security risk ties throughout the United States and
or its enforcers are least pre- assessment (SRA) reports the free world.
pared. Departments must be support planners and managers

July 2005 / 13
Focus on Personnel
Early Detection of the Intervention Approach
Problem Officer According to the U.S. Department of Justice,
By Dino DeCrescenzo early warning systems take the form of databases
that contain personnel information designed to

S adly, a disturbing trend has begun to emerge


concerning the law enforcement profession.
That is, allegations against those officers facing
identify problem behavior and allow early inter-
vention to correct the misconduct. Generally
nonpunitive, the systems include peer review, ad-
ditional training, and counseling. They can provide
suspension or termination rarely seem to surprise supervisors and managers with information relat-
members of their departments and, at times, many ing to potential patterns of at-risk conduct. Most
residents of their communities. Over the past sev- systems require intervention after recording a cer-
eral decades, investigative journalists have found tain number of complaints of a particular type
that in some agencies, as few as 2 percent of within a specified time frame.6 Although a few
officers held responsibility for 50 percent of citizen departments use only citizen complaints to select
complaints.1 In addition, numer- officers for intervention, most
© Mark C. Ide
ous police chiefs reported that rely on a combination of behav-
10 percent of their sworn per- ior indicators.7 Early warning
sonnel caused 90 percent of systems should consider the to-
the problems.2 Also, studies on tality of officer work histories,
the issue repeatedly indicated including accidents, pursuits,
that an extremely small and transfers, training, grievances,
disproportionate number of education, drug usage, civil suits,
officers incurred most of the truthfulness, property damage,
accusations.3 discourtesy, false arrest claims,
In reality, the majority of law and insubordination. 8 They
enforcement officers are su- should track all complaints, sick
premely dedicated individuals time used, resisting arrest inci-
severely offended by the behav- dents, assaults on officers, ob-
ior and acts committed by those few who have struction of officer arrests, and disorderly conduct
tarnished the image of their profession.4 These arrests made by officers.9 These last four behavior
officers and the citizens they serve have begun to indicators appear to be significant measuring de-
demand reasons for why such employees have re- vices of potential problem employees. A higher
mained on the job, even though they have violated number of these types of arrests when compared
departmental and societal rules. The awareness of with those of other officers may reveal personnel
these problem officers has existed for some time. acting beyond their scope of authority.
In 1981, the U.S. Commission on Civil Rights The theory behind an early warning system
recommended that all police departments create an is that such incidents individually may mean
early warning system to identify problem employ- nothing, but the combined totality of behaviors
ees who often receive the highest number of com- may signal a developing problem that needs atten-
plaints or display patterns of inappropriate behav- tion.10 These indicators, compiled into a single
ior.5 In today’s world of terrorists and increasingly place, can flag a potential pattern of problematic
violent criminals, such efforts may prove more behavior and identify an officer at risk of engaging
important than ever before. in misconduct.

14 / FBI Law Enforcement Bulletin


The phenomenon of early detection or early early detection system not only can identify nega-
warning systems within law enforcement agencies tive behavior but also can recognize conduct wor-
is a fairly new concept that has begun to spread thy of commendation.15 The study further indicated
more rapidly since Congress passed the Violent that early warning systems substantially reduced
Crime Control and Law Enforcement Act, which citizen complaints and other problematic behavior.
empowered the federal government to investigate For example, three large police departments with
and bring suit against those officers who routinely early warning systems in effect for at least 4 years
abused their authority.11 For the most part, when had substantially fewer citizen complaints and use-
departments have suits brought against them, they of-force incidents after the intervention. A suc-
enter into a consent decree with the government cessful system can benefit the entire agency, the
agency agreeing on the changes required and to community, and the troubled or problem officer
being monitored until the judge with prompt intervention admin-
lifts the decree. 12 More often istered properly. Experts stress
than not, the recommendations that using an early warning sys-
stemming from such investiga-
tions include implementation “ Generally
tem to punish officers will un-
dermine its effectiveness, but
of an early warning or detection
system as a first step in the
process of abolishing the pattern
and practice of conduct by the
“ nonpunitive, the
systems include peer
review, additional
training, and
applying the information learned
from the data to counsel and
train them will expand its
value.16
officers. counseling. Some departments have suc-
cessfully employed early warn-
Research Findings


ing systems for over a decade
The first in-depth study of with beneficial results.17 How-
early warning systems found that ever, these programs still may
27 percent of the agencies sur- not accurately identify every
veyed in 1999 had such a mechanism in place specific pattern of behavior that may ultimately
while another 12 percent planned on implementing lead to misconduct. In addition, the study found
one.13 The participating agencies were police de- that no standards had been established for identify-
partments employing a minimum of 80 officers ing officers in the early warning systems exam-
and serving populations of at least 50,000. How- ined. Instead, only a general agreement existed on
ever, 87 percent of police departments in the some of the criteria that should influence their
United States have fewer than 25 sworn officers.14 selection.18 These issues demonstrate that agencies
So, while less than 40 percent of the large agencies must carefully analyze the information compiled
surveyed either had or planned to have an early on their personnel and establish strict selection
warning system in 1999, the majority of police guidelines to ensure that they correctly determine
departments in the country most likely did not have those officers in need of intervention.
nor plan on implementing such a system at the Finally, the study noted that the implementa-
time. tion of an early warning system can prove compat-
If administered properly, an early warning and ible with both problem-oriented and community
detection system should allow the department to policing. The law enforcement administrator
quickly intervene and help modify the behavior of can incorporate the warning system into
the officers identified. Moreover, a successful the department’s overall philosophy and goals,

July 2005 / 15
recognizing that the new system must involve conduct.21 They also must seriously discipline such
counseling and training as the main objective in personnel, not merely reassign them to other du-
modifying the behaviors of the officers selected ties. Finally, agencies must provide troubled offi-
and flagged for intervention. The administrator, cers with counseling and other services. As one
however, must remember that the police union and official said, “We have a tendency to go from zero
the officers may suspect a new warning system and to 60, by focusing only on the egregious, but not
possibly resist its implementa- having a system to correct or
tion. One early warning disci- discipline the behavior that is


pline system stressed the police nonegregious.”22
union’s involvement in the pro- Officers who have exhibited
cess prior to implementation of a Some departments less than stellar behavior need
program that provided predict-
able sanctions agreed upon by
management and the union.19 Be-
cause most complaints by unions
“ have successfully
employed early warning
systems for over a
decade with beneficial
help to return to their former
standards of professionalism.
Departments should endeavor to
find out what these officers need
involve the unequal treatment of results. to overcome their problems and,
personnel and ambiguous, un- once again, become valuable,
known, or unpredictable punish-
ments, this system established a ” contributing members of their
profession. To this end, an early
disciplinary matrix with minimum and maximum warning system can offer an effective approach for
penalties and ensured that the administration and agencies to use.
the collective bargaining unit agreed upon predict-
able, reliable, equitable, and valid sanctions. Such Conclusion
involvement by the union or collective bargaining Today’s law enforcement administrators must
unit can greatly increase the success of an early identify problem officers and intervene appropri-
warning system. ately with counseling, training, and other methods
in an attempt to modify and change their behavior.
Positive Change Managers will benefit their departments, commu-
Law enforcement agencies throughout this nities, and problem officers with the implementa-
country generally have pursued a traditional ap- tion of a properly administered early warning sys-
proach when dealing with officer misconduct.20 tem. Such an approach can help agencies combat
Most have dealt with this issue through reactive the disturbing trend that seems to indicate that they
as opposed to proactive efforts, primarily using disregard officer misconduct.
citizen and internal complaints to identify such Early warning systems demonstrate that de-
behavior. In addition, most departments impose partments and administrators have developed a
corrective action only after the misconduct has clear policy regarding misconduct, have put a pro-
occurred. gram in place to correct negative behavior, and
To effect positive change in the behavior of the have made a good-faith effort to identify employ-
few officers that create the majority of problems, ees whose performance is less than satisfactory.23
departments must begin to take sufficient action The majority of their officers who valiantly place
against those repeatedly accused of excessive themselves in harm’s way every day to protect the
force and continually look for patterns in officer citizens of their communities deserve no less.

16 / FBI Law Enforcement Bulletin


Endnotes
1
C.R. Swanson, L. Territo, and R.W. Taylor, Police Adminis- Wanted:
tration: Structures, Processes, and Behavior, 6th ed. (Upper
Saddle River, NJ: Prentice Hall, 2004).
Photographs
2
S. Walker, G.P. Alpert, and D.J. Kenney, “Early Warning
Systems: Responding to the Problem Police Officer,” National
Institute of Justice Journal (July 2001); retrieved on January 28,
2005, from http://www.ncjrs.org/pdffiles1/nij/188565.pdf.
3
S. Slahor, “Earlier Is Better When Solving Problems,”
Law and Order, June 2004, 6.
4
J. Arnold, “Special Report II: Ethics—Early Misconduct
Detection,” Law and Order, August 2001, 8.
5
Supra note 2.
6
Supra note 4.
7

9
Supra note 2.
Supra note 3.
T.F. Kennedy, Preventing, Detecting, and Investigating
T he Bulletin staff is
always on the lookout
for dynamic, law enforce-
Employee Misconduct, paper presented at a Roger Williams ment-related photos for
University Conference, Bristol, RI, October 2003. possible publication in the
10
R.G. Dunlop and J. Adams, “System to Spot Troubled magazine. We are interested
Officers Not Fully Used: Goal Is to Detect Small Problems,
Prevent Big Ones,” Louisville Courier Journal, April 2, 2000.
in photos that visually depict
11
“Pittsburgh’s Experience with Police Monitoring,” Vera the many aspects of the law
Institute of Justice, June 17, 2004; retrieved on January 28, 2005, enforcement profession and
from http://www.vera.org/project/project1_1.asp?section_id= illustrate the various tasks
7&project_id=13. law enforcement personnel
12
Ibid. perform.
13
Supra note 2. We can use either black-
14
S.F. Kelly, “Internal Affairs: Issues for Small Police and-white glossy or color
Departments,” FBI Law Enforcement Bulletin, July 2003, 1-6. prints or slides, although we
15
Supra note 3.
16
“Best Early Warning Tool Is Informative,” Organized Crime
prefer prints (5x7 or 8x10).
Digest 22, no. 13 (August 10, 2001). We will give appropriate
17
Supra note 4. credit to photographers when
18
Supra note 2. their work appears in the
19
R.W. Serpas, J.W. Olson, and B.D. Jones, “An Employee magazine. Contributors
Disciplinary System That Makes Sense,” The Police Chief, should send duplicate, not
September 2003. original, prints as we do not
20
Supra note 4. accept responsibility for
21
D. Washburn, D. Hasemyer, and M. Arner, “A Question of damaged or lost prints. Send
Force: Dealing with Multiple Shooters Has Been a ‘Huge’ Issue,”
The San Diego Union-Tribune, January 19, 2003; retrieved from
photographs to:
http://www.signonsandiego.comnews/reports/shootings/
20030122-9999_mz1n19questn.htm. Art Director
22
Supra note 3. FBI Law Enforcement
23
Supra note 2. Bulletin, FBI Academy,
Madison Building,
Room 201, Quantico,
Detective Sergeant DeCrescenzo serves with the
VA 22135.
Barrington, Rhode Island, Police Department.

July 2005 / 17
ViCAP Alert

Robert Mark Edwards


DOBs Edwards used: 6/14/61, 6/15/60,
6/14/58, 6/15/61
Edwards’ FBI number: 41518W11
SSANs Edwards used:
552-43-8728, 553-47-2874
Edwards’ physical description:
Height: 5’8" Weight: 150 lbs.
Any agency that believes Edwards’ modus
Hair: Brown Eyes: Blue operandi might match their cold cases should
Aliases Edwards used: Kirk Edward Bell, contact SSA Jim McNamara, Federal Bureau
Paul Robert Smith, Mark Edward Robert, of Investigation, Critical Incident Response
Mark R. Edwards, Bobby Edwards, Jim Group, Behavioral Analysis Unit-2, at 703-632-
Portillo, James Mark Portillo, Rob Edwards 4325 for additional information.

C urrently incarcerated in California on a


first-degree murder conviction, Robert
Mark Edwards also was convicted of second-
degree murder and five other felony counts in
torn. She had been sexually assaulted vaginally
with a mousse can at some point. Some items of
jewelry were missing from her residence. Edwards
was dating Marjorie’s daughter at the time.
Hawaii. Law enforcement authorities believe he In January 1993, 67-year-old Muriel Delbecq,
may have committed other homicides, attempted a realtor who lived in Alaska but spent 2 to 3
homicides, or violent sexual assaults. months each year in Hawaii, was found murdered
in her apartment in Kihei, Maui. She had been
Crime Scenes strangled and beaten about the head and face. Her
In May 1986, Edwards murdered 55-year-old pubic hair appeared to have been shaved or cut,
realtor Marjorie Deeble in her apartment in Los and there were contusions and abrasions on her
Alamitos, California. Marjorie had been beaten breasts. Muriel had been sexually assaulted vagi-
about the head, and her nose was broken. She was nally with a hair spray can with such force that it
found in a nightgown on the floor with her hands penetrated her abdominal cavity. The insertion oc-
tied behind her back with part of her nightgown curred ante- or perimortem. Muriel’s wedding ring
and a telephone cord. Her head, neck, and shoul- and purse were taken. Numerous items from the
ders were suspended about 6 inches off the floor by victim’s house, including panties and bras, were
a noose formed by a belt and tied to the top drawer found in a trash bin across the street from the
of a chest. Marks on her ankles indicated she may murder site. One of the bras was cut between the
have had her legs tied at one time, and adhesive cups and the tips of the cups had been removed,
tape residue was found on her cheeks, suggesting a and one pair of panties was cut open. Edwards
gag. Both of Marjorie’s eardrums were lacerated or lived within a block of Muriel’s residence.

18 / FBI Law Enforcement Bulletin


Modus Operandi employment, and he threatened to kill her if she
Both of Edwards’ known victims have been discontinued their relationship.
older white females who were low- to moderate-
Alert to Law Enforcement
risk victims living alone in ground-floor apart-
ments. It appears they were sleeping or preparing Edwards has an extensive criminal history in
to go to bed when attacked, apparently by a sur- California, including such charges as burglary,
prise assault. Ante- or perimortem foreign object grand theft auto, drunk driving, possession of a
insertion, both vaginally and anally, was present in controlled substance, trespassing, peeping, and re-
both cases, although a lack of penile-vaginal pen- ceiving stolen property. He was in custody in Cali-
etration existed. fornia from July 1984 to December 1985, from
A former girlfriend reported that Edwards December 1988 to November 1989, and was ar-
liked to tie her up during sex and at least twice rested for the murder of Muriel Delbecq in Hawaii
attempted to sodomize her with a bottle. She said on February 2, 1993. He has been in custody since
he would follow her and park near her place of that time.

Subscribe Now

July 2005 / 19
Preparing Law
Enforcement Leaders
The FBI Academy’s Leadership
Fellows Program
By SCOTT L. SALLEY, M.S.

© Kurt Crawford

H ow do law enforce-
ment agencies prepare
their command staff
members for the challenges
should consider the FBI
Academy’s Leadership Fellows
Program located in Quantico,
Virginia.
both the domestic and interna-
tional law enforcement commu-
nities. Fellows spend 6 months
at the academy and the remain-
that will confront them as they ing 6 at their respective agen-
assume additional responsibili- Program Overview cies or at Quantico for addi-
ties? While no magic formula Started in 2000 and super- tional research and study.
exists, there is a method to vised by the Leadership Devel- What separates this program
expedite the problem-solving opment Institute (LDI),1 this 1- from others that emphasize
experience that will help mold year program serves to enhance leadership development? First
these individuals into successful the leadership skills of individu- of all, participants find that
leaders. To this end, chiefs, als in command-level positions living at the academy while
sheriffs, and senior agents and broaden their exposure to interacting with the staff, FBI

20 / FBI Law Enforcement Bulletin


National Academy (NA) stu-
dents, and new agent trainees
and experiencing a wide selec-
tion of training with law en-
forcement members from
“ As departments
seek to prepare leaders
in their ranks, they
around the world provide tre- realize that no easy
mendous value. Additionally, method exists.
the close proximity to Washing- However, this program
ton, D.C., offers access to an offers a proven


enormous selection of re- method....
sources, including museums,
federal law enforcement agen-
cies, historic sites, government Captain Salley serves with the Collier County, Florida, Sheriff’s Office.
institutions, and seemingly end-
less educational opportunities.
Also important is the path, or a list of goals with is needed, and a signed state-
program’s “trilogy”; partici- anticipated outcomes. These ment by the department head
pants complete these three could include earning a “yellow constitutes one of the require-
components at the end of the brick”2 for physical improve- ments for admission. While
fellowship. One, the individual ment with the FBI NA, reading making this important decision,
works on projects for the FBI, a certain number of books individuals can gain additional
such as instructing certain pertaining to management information about the program
classes, organizing training topics, learning new computer and its advantages by contacting
sessions, assisting academy skills, devising a personal or the FBI Academy and talking
staff with a variety of tasks, and agency wellness plan, or attend- with any of the current fellows
teaching overseas at the Interna- ing leadership development or obtaining a list of alumni and
tional Law Enforcement Acad- training, such as the Law En- communicating with former
emy (ILEA) in Budapest, forcement Executive Develop- participants.
Hungary. ment Seminar (LEEDS). For consideration, prospec-
Two, the participant con- tive fellows submit a completed
ducts a research project for the Application Process application3 to LDI. Each
sponsoring agency that brings Interested officers must becomes rated on a point system
immediate value to the training. understand the time and dedica- based on several factors, such
For the assignment, the depart- tion the fellowship demands. as law enforcement experience,
ment head identifies a need for The program involves a partner- community involvement,
the agency; in addressing this, ship between the applicant, education, and position. Also
the fellow has some of the best immediate family members, the required as part of the package
resources in the world available. head of the sponsoring agency, is supporting documentation,
The department, the FBI, and and the FBI Academy. Some- such as newspaper articles
the individual all derive sub- times, this also includes friends, and transcripts—the more the
stantial benefit from this study. other relatives, and the commu- applicant includes, the better
Three, the participant nity where the fellow resides. the chances for acceptance.
follows a personal development Support from all affected parties Organization and clarity help

July 2005 / 21
ensure an effective overall with a presentation at one of can use it to ensure that com-
presentation. the regional command colleges mand staff members have the
Prospects can call the pro- in the United States. Fellows necessary tools for maintaining
gram manager regarding status will find a lot of flexibility for or improving the current status
for approximately 30 days after optimizing their involvement of law enforcement in the
submission of an application. in the program. communities they serve. The
Upon acceptance, individuals How does participation in fellowship has graduated indi-
will receive a formal letter from the fellowship benefit the spon- viduals that live in areas located
the FBI; the agency head also soring agency? Its command- across the United States and
will get a copy. Then, the tasks level personnel enjoy enrich- abroad, and the concentrated
of scheduling and preparing for ment through the interaction studies and hands-on involve-
this 1-year journey begin. with the course material, in- ment by participants have been
structors, and students; strength- observed as a significant benefit
Outcome Achieved ening of their organizational to agencies both large and
Fellows will share many skills; enhanced networking, small.
of the same experiences and through which they gain valu-
educational benefits, but each able relationships that will aid Conclusion
also will take away something them upon their return to duty; Law enforcement agencies
different. Largely, this is deter- and improved confidence, ex- continually face new challenges
mined by individual choice. For perience, and professionalism. in an ever-changing world.
example, one participant may Also, the program can help Department leaders need prepa-
travel to Europe to instruct at department heads prepare for ration to address them. To this
ILEA, while another may assist the future. In this regard, chiefs end, the FBI Academy’s Lead-
ership Fellows Program can
help. For example, as one
fellow stated, “Law enforce-
Expectations of Fellows ment has changed radically
since September 11, 2001,
Fellows, either independently or in cooperation with and having a command staff
other participants and FBI Academy faculty, must— member familiar with the FBI
Academy and the associated
• teach and attend classes; services that the FBI provides
• conduct research; has been an important link for
• manage projects; obtaining information regarding
domestic and international
• facilitate meetings;
terrorism.”
• coordinate programs; As departments seek to
• attend professional conferences; prepare leaders in their ranks,
• write publishable articles or documents; and they realize that no easy
method exists. However, this
• establish professional networks. program offers a proven meth-
od for accomplishing this goal
and represents an important

22 / FBI Law Enforcement Bulletin


Requirements for Admission
The FBI awards 5 to 10 fellowships each year to candidates who must—
• be sworn officers serving in a command staff position;
• hold a bachelor’s degree (advanced degree preferred);
• come highly recommended by their agency’s chief executive; and
• be available to serve as a fellow for 12 months, with at least 6 continuous months
spent in residence at the academy.

consideration for agencies in municipal, county, state, and international 2


See Patti Ebling, “Physical Fitness
this country and abroad. law enforcement leaders through the in Law Enforcement: Follow the Yellow
design and administration of programs Brick Road,” FBI Law Enforcement
Endnotes and developmental experiences that foster Bulletin, October 2002, 1-5.
1
LDI strives to enhance effective, growth and lifelong learning. For addi- 3
Candidates may obtain an application
practical, and creative leadership and tional information on the unit, as well as from the Leadership Development Insti-
management practices and encourage a the programs mentioned throughout this tute, Attn: Leadership Fellows Program,
spirit of cooperation among FBI, article, visit http://www.fbi.gov. FBI Academy, Quantico, VA 22135.

The Bulletin’s
E-mail Address
© Digital Vision

T he FBI Law Enforcement Bulle-


tin staff invites you to communi-
cate with us via e-mail. Our Internet
address is leb@fbiacademy.edu.
We would like to know your
thoughts on contemporary law en-
forcement issues. We welcome your
comments, questions, and suggestions
about the magazine. Please include
your name, title, and agency on all
e-mail messages.
Also, the Bulletin is available for
viewing or downloading on a number
of computer services, as well as the
FBI’s home page. The home page
address is http://www.fbi.gov.

July 2005 / 23
Bulletin Reports

Victims
Crimes Against Persons Age 65 or Older, 1993-2002 presents data
from the National Crime Victimization Survey and the Uniform Crime
Reports comparing incidents targeting persons 65 years of age or older
with those involving younger age groups. Crime rates are presented for
murder, rape/sexual assault, robbery, aggravated and simple assault,
purse snatching/pocket picking, household burglary, and motor ve-
hicle theft and property theft. The report describes trends in violent
and property crimes between 1993 and 2002 and discusses characteris-
tics of the incidents, including injury to victims, self-protective
measures used, whether weapons were present, time and place
of occurrences, and victim-offender relationships. Crimes include both
reported and nonreported.
This publication is available
online at http://www.ojp.
usdoj.gov/bjs/abstract/ Human Trafficking
cpa6502.htm or by contact- The National Institute of Justice (NIJ) offers Charac-
ing the National Criminal teristics of Chinese Human Smugglers, which presents
Justice Reference Service at findings of a study that uncovered the inner workings of
800-851-3420. Chinese human smuggling organizations by going right to
the source—the smugglers themselves. Researchers found
that most of these individuals are ordinary citizens whose
social networks provide the necessary connections and
resources to profit from human trade. Enforcement efforts
require consideration of the unique organization of smug-
gling enterprises and how smugglers are perceived
by themselves and their clients. This report is available
electronically at http://www.ncjrs.org/pdffiles1/nij/
204989.pdf or by calling the National Criminal Justice
Reference Service at 800-851-3420.

Bulletin Reports is an edited collection of criminal justice studies, reports, and


project findings. Send your material for consideration to: FBI Law Enforcement
Bulletin, Room 201, Madison Building, FBI Academy, Quantico, VA 22135. (NOTE:
The material in this section is intended to be strictly an information source and
should not be considered an endorsement by the FBI for any product or service.)

24 / FBI Law Enforcement Bulletin


Legal Digest

Serving Their Country


and Their Communities
The Uniformed Services Employment
and Reemployment Rights
Act of 1994
By LISA A. BAKER, J.D.

© Digital Stock

H undreds of thousands what responsibilities they owe employees who leave to per-
of “citizen soldiers” the departing employees during form military duty have an
have been called to their absence and upon return to understanding of the rights
active duty in the military since civilian life. Not surprisingly, and obligations under the Uni-
the events of September 11, the law enforcement community formed Services Employment
2001. These citizen soldiers presently is dealing quite often and Reemployment Rights Act
leave their families and jobs with these issues given the of 1994 (USERRA).2
behind, often leaving with significant representation of This article provides a
questions about their future prior military in law enforce- general overview of the back-
employment security when they ment. Given the impact contin- ground and purpose behind
return, as well as benefits, such ued military service can have on USERRA in addition to the
as health insurance and their the personal and professional rights and obligations of the
pensions, while they are away.1 lives of law enforcement per- employee and employer and the
In addition, many employers sonnel, it is important that both prohibition against discrimina-
find themselves wondering law enforcement employers and tion based on active duty. Issues

July 2005 / 25
addressed include the right to purpose of prohibiting discrimi- “uniformed services.” This is
reemployment, the impact nation against individuals defined to include employees
active duty has on benefits, such because of their voluntary or who serve in the Army, Navy,
as health insurance and pen- involuntary military service and Air Force, Marine Corps, Coast
sions, and notice requirements encouraging military service by Guard, as well as all Reserve
imposed on both employers and lessening the disadvantages components of each, the Army
employees. The article is in- associated with such service or Air National Guard, and the
tended only as a general over- when a civilian career is im- Commissioned Corps of the
view of key aspects of pacted.4 USERRA has broad Public Health Service. In
USERRA. For more specific application, covering nearly all addition, the president has the
information, the reader may employees, including part-time authority to identify any other
want to refer to the U.S. Depart- and probationary employees, as category of persons as covered
ment of Labor (DOL) at http:// well as all U.S. employers, by USERRA during time of war
www.dol.gov. In this Web site, whether in the private or public or emergency.
the DOL’s Veterans’ Employ- sector and regardless of size.5 Congress also clarified the
ment and Training Services The term “employer” also type of “uniform service” which
(VETS) has published extensive includes individuals.6 This has triggers the rights and responsi-
information regarding been interpreted as allowing an bilities provided for in
USERRA, including proposed individual seeking enforcement USERRA.8 Included within the
regulations interpreting of USERRA to pursue an action covered service is duty per-
USERRA, published on Sep- not just against the employing formed, regardless of whether
tember 20, 2004.3 entity but also against individu- it is voluntary or involuntary,
als who have authority within while in active duty, active duty
BACKGROUND the employing entity regarding for training, as well as inactive
AND SCOPE the employment decision.7 duty training, and full-time
USERRA was enacted Congress also provided a National Guard duty. In addi-
by Congress in 1994 for the comprehensive definition of tion, an employee’s absence
from work to assess the
employee’s fitness to take


part in any of the above activi-
ties also is covered by
USERRA was USERRA. In 2002, Congress
enacted…for the expanded USERRA’s reach to
include public service per-
purpose of prohibiting formed in a crisis situation by
discrimination against including within the definition
individuals because of of “uniform service” duty
their voluntary or performed by intermittent
involuntary military disaster personnel for the Public


service…. Health Service, as well as time
for taking part in training for
such activities. Funeral honor
Special Agent Baker is chief of the Legal Instruction Unit at the FBI Academy.
duty performed by National

26 / FBI Law Enforcement Bulletin


Guard or reserve members also in extreme…community Employer discrimination
is included. hardship.”11 is established by showing the
In addition, to be eligible applicant or employee’s mili-
for reemployment, the uni- PROHIBITION tary-based activity, whether in
form service must be under ON DISCRIMINATION the form of an application for
the authority of the military. In USERRA contains an anti- membership, performance of
other words, the absences must discrimination provision de- service or some obligation of
be connected to actual military signed to protect those who service, was a “motivating
service. For example, in Leisek have served, as well as those factor” in the employer’s
v. Brightwood Corp.,9 John who remain in the military in decision as opposed to the sole
Leisek, a former employee of some capacity, from discrimina- factor.14 The roadmap for a
a company and a member of tion. The prohibition against lawsuit under USERRA calls
the National Guard, sued after discrimination protects not only for the initial burden to be on
he was denied reemployment the plaintiff, who must provide


following his absence to partici- sufficient information to sup-
pate in National Guard activi- port an allegation of discrimina-
ties. The Court concluded that Employer tion or retaliation on the basis of
he had no right to be reem- discrimination is military service.15 The employer
ployed as he was not engaged in established by then may demonstrate that it
“uniformed service” at the time showing...military- would have taken the action
of his absence from his em- anyway, without regard to
ployer. Prior to his absence for
based activity...was anything protected by
the guard, Leisek indicated that a “motivating USERRA. If the employer
he would be engaged in Guard factor....” successfully demonstrates this
duties at various locations and nonprohibited reason for the
various dates and asked for time
off accordingly. He eventually
did receive military orders for
some of the dates and locations,
but not for all of them. The
Court held that he was not
serving in the “uniformed
services” as to those dates for

on-board employees but appli-
cants for employers as well. An
employer is prohibited from
denying any person initial
employment, reemployment,
retention in employment,
employment action, the plaintiff
must then establish that the
reason offered really is pre-
textual and the employment
action actually was based on
military service. This same
litigation roadmap is set forth
in USERRA for litigating
which he was not under orders promotion or any benefit of claims of retaliation.16
to serve. employment based on an
While USERRA applies to individual’s membership or ELIGIBILITY
all employers, the units com- application for membership FOR REEMPLOYMENT
prising the Ready Reserve10 by and the activities associated USERRA extends reem-
statute must be screened to therewith, in the uniformed ployment rights to most em-
ensure that there are not large services.12 The statute also ployees17 who have been absent
numbers of members with prohibits retaliation against from their positions because of
“critical civilian skills,” and an individual for seeking en- “service in the uniformed
that there are no members who, forcement of any right secured services.” To be eligible for
if mobilized, would “...result under USERRA.13 reemployment, the service

July 2005 / 27
member must meet the follow- position closest to the position employer also must provide
ing basic requirements: described above for which the reasonable opportunities for
• notice must have been given employees are able to perform.19 training to qualify for the higher
to the employer of service In other words, the deployed positions unless to do so would
in the uniformed services; reservist employees progress as pose an undue hardship to the
if they had remained in continu- employer.22
• cumulative period of service
ous employment.
must not have exceeded 5 Time Limits on Service
For employees on military
years, unless an exception to
leave for 91 days or more, To qualify for reemploy-
the 5-year rule applies;
USERRA provides a hierarchy ment, the cumulative service
• departure from the uni- generally cannot exceed 5 years.
formed services was not However, exceptions to this 5-


dishonorable or under other year prohibition exist. These
punitive conditions; and exceptions include:
• the requestor must have USERRA • situations in which the
submitted a timely request provides for service member cannot
for reemployment and enhanced obtain a release through
reported back to their protections for no fault of their own;
civilian employer in a disabled veterans. • involuntary service during
timely manner. a domestic emergency or
USERRA does not require national security crisis;
the employer to return employ-
ees to the exact same position
that they occupied before
leaving for military service. The
manner that the employer places
the employees back into the
workforce is structured accord-
ing to the amount of time the

for the employer to follow. The
employer must first consider
placement in the job the em-
ployees would have held had
they remained continuously
employed, provided the employ-
• service pursuant to an order
to remain on active duty
because of war or national
emergency;
• active duty by volunteers
supporting “operational
missions” for which
members of the Select
employees were on military ees are qualified for a position
Reserve have been ordered
leave. If the employees were of like seniority and pay, or if
to active duty without
absent for 1 to 90 days, they not qualified for such a position,
their consent;
must be promptly reemployed in in the position the employees
the position that they would occupied before deployment • service by volunteers in
have occupied had they re- or one of like seniority and support of a “critical
mained in continuous employ- pay.20 If the employees are not mission”;
ment, provided they are quali- qualified to perform any of the • federal service by members
fied for that position or can above positions, then the em- of the National Guard called
become qualified after a rela- ployer must place the employ- into service to suppress
tively short training period.18 If ees in another position of lesser insurrection; and
the employees are not qualified status and pay, but it must be • service connected to
for that position, then the em- closest to the above-described training.23
ployees must be placed in a positions as possible.21 The

28 / FBI Law Enforcement Bulletin


USERRA and 31 days up to 180 days, the Health Benefits
Disabled Veterans employees must submit an A common concern for
USERRA provides for application for reemployment reservists activated and de-
enhanced protections for dis- no later than 14 days after ployed is the impact their
abled veterans. When seeking completion of service. For absence from their civilian job
reemployment, employers are service beyond 180 days, the will have on employer-provided
required to undertake reason- application must be submitted health benefits. Generally, if the
able efforts to accommodate no more than 90 days after the period of leave is 30 days or
their disabilities so they can be end of service. For employees less, the employer’s health in-
placed in a position they would injured or disabled as a result of surance benefits remain intact.
have occupied had they re- their service, the reporting If the leave is for more than 30
mained in continuous employ- deadline may be extended.27 days, employees and their
ment.24 If an employee, despite © Digital Stock
dependants should be covered
the efforts to provide training, is by military-provided health care
unable to perform the functions benefits. In addition, other
required of that position, then federal provisions offer reserv-
the employer must place the ists protection by enabling them
employee in a position of to continue their health care
equivalent seniority, status and insurance. The Consolidated
pay, provided the employee is Omnibus Budget Reconciliation
qualified to perform that job. If Act (COBRA) and USERRA
that fails, then the employee allow for health care coverage
must be placed in a position as rights to employees after an
close to the above as the em- event in employment such as a
ployee may be able to perform.25 reduction in hours worked due
to military deployment. This
Time Limits for extended coverage is good for a
Reporting Back to period of up to 18 months.
Civilian Employment USERRA AND In addition, the Health
Once the deployment ends, SALARY, HEALTH Insurance Portability and Ac-
USERRA provides a timetable BENEFITS AND PENSION countability Act (HIPPA) also
for employees to report back to recognizes the ability of some
work.26 If the service was less No Requirement individuals to enroll in another
than 30 days or for purposes of to Provide Paid Leave health insurance plan if one is
taking a fitness exam, the USERRA does not require available. For example, spouses
employees must report back to employers to pay employees may have a health insurance
work no later than the first wages during any period of plan available through their
regularly scheduled workday military leave. An employer, of employer that they may wish to
that would fall 8 hours after the course, may choose to do so, or take advantage of during the
end of the calendar day. This may opt to pay, for example, time of deployment. HIPPA
may be delayed if circumstances the difference between the allows for access to this plan
arise out of the control of the military pay and the employee’s regardless of the existence of
employees. If the service is for regular salary. set enrollment periods.28

July 2005 / 29
Pensions and other if they had remained in civilian language to be used by employ-
Employer Benefits employment. The time spent ers to comply with the notice
When in leave status for serving in the military is to be requirement.34 Generally, the
military service, employees counted for FMLA purposes as notice includes a description of
are to be viewed as though they if the employees never broke the reemployment rights of
are continuously employed for service. those who voluntarily or invol-
purposes of seniority and pen- untarily leave employment for
NOTICE UNDER military service, as well as the
sion benefits.29 In addition, em-
USERRA prohibition against discrimina-
ployees exercising their rights
under USERRA are entitled to USERRA requires employ- tion on the basis of military
the same benefits as those ees to provide notice to their service and the right to be free
generally provided to other employers of their intent to take from retaliation for seeking
employees on unpaid leave. military leave, unless to do so is enforcement of USERRA. The
notice also contains a brief


USERRA and the Family summary on the health benefits
Medical Leave Act attendant to military deploy-
The Family Medical Leave Generally, if the ment and a description of the
Act (FMLA) provides for 12 period of leave is 30 enforcement mechanism.35
workweeks of unpaid leave to days or less, the ENFORCEMENT AND
address a serious health condi-
employer’s health REMEDIES
tion of an employee or a family
member or to take time off to insurance benefits The statute offers different
care for a newborn or adoptee. remain intact. avenues for an individual to
To be eligible, employees must pursue relief. Administrative


have worked for the employer recourse may be sought through
for a minium of 12 months and VETS within the Department of
at least 1,250 hours for that not feasible or precluded by Labor. VETS offers guidance
employer.30 Questions regarding military necessity.31 The em- on the interpretation and appli-
the right to use FMLA leave ployer may require written cation of USERRA and will
shortly after returning to the documentation regarding the investigate complaints, although
workforce from active duty military leave if it is for more a complainant has the option of
have arisen in light of the than 30 days.32 pursing administrative re-
requirements regarding employ- In 2004, Congress passed course.36 A complainant also
ment for the employer preced- the Veterans Benefits Improve- has the ability to request that the
ing the request for FMLA leave. ment Act (VBIA), which U.S. attorney general consider
In a DOL Memorandum dated amended USERRA by adding a their complaint. If determined
July 22, 2002, available on requirement that employers to be meritorious, the attorney
the DOL Web site at http:// provide notice of the rights, general may pursue the case for
www.dol.gov/vets, the DOL privileges, and obligations of the complainant. Individuals
advised that individuals reem- employees and employers under also have the right to pursue
ployed following military duty USERRA.33 On March 10, the matter in civil court them-
are entitled to the rights and 2005, the DOL published an selves if they choose not to file
benefits they would have earned interim final rule, setting forth with VETS or if the attorney

30 / FBI Law Enforcement Bulletin


general refuses to pursue the 2
38 U.S.C. §§ 4301-4333. 9
278 F.3d 895 (9th Cir. 2002).
matter.
3
69 Fed. Reg., No. 181, pp. 56265- 10
The reserves are composed of three
56301 (to be codified at 20 C.F.R., Part organizational units, the Ready Reserve,
USERRA allows for the 1002). the Standby Reserve, and the Retired
awarding of double dam-ages 4
Id. at § 4301. USERRA replaced what Reserve. See 10 U.S.C. § 1014(a). The
(double the amount of wages was Congress’ original effort to offer some training and service commitments vary
and back pay) if the employer’s measure of protection. The original depending on the nature of the reserve
actions in violating USERRA provision was passed in 1940 and was unit an individual serves within.
named the Selective Training and Service 11
10 U.S.C. § 10149(a). See Dow v.
are “willful.” In addition to Act of 1940, codified at 50 U.S.C. 301, et U.S., 192 F.3d 366 (2d Cir. 1999)
wage-related damages, the court seq. This was replaced by the Vietnam Era (Ninety-six FBI agents sued, alleging that
also may grant attorney fees, Veterans’ Readjustment Assistance Act of the FBI’s policy prohibiting agents from
expert witness fees, and other 1974, codified at 38 U.S.C. §§ 2021-2027, serving in the Ready Reserve violated their
similar types of expenses. often referred to as the Veterans’ rights under USERRA. By statute, the
Reemployment Rights Act. President is vested with the authority to
CONCLUSION screen the Ready Reserve. The president
delegated this authority to the secretary of
Recognizing the significant


defense, who issued regulations noting that
role our citizen soldiers have in certain positions within the federal service
protecting this country, Con- cannot be vacated during critical times
gress has acted to provide job USERRA requires without jeopardizing the nation’s security.
The secretary of defense directed each
security in their civilian life so employees to provide federal agency head to identify “key
that they do not have to choose notice to their em- positions” which are not to be filled by
between serving their country ployers of their intent individuals in the Ready Reserve. For
and serving their community. to take military leave…. decades, the FBI director has determined
that agents may not serve in the Ready
While a civilian employer may
Reserve. In reviewing this position, the
face challenges upon the de-


Court determined that Congress did not
ployment of employees who intend for courts to interfere with determi-
serve in the reserves, Congress nations of this nature in the federal
has favored protecting job
5
38 U.S.C. §§ 4301-4333. USERRA intelligence agencies.) For more informa-
was enacted pursuant to the War Powers tion regarding the designation of certain
security upon deployment while Clause of the Constitution. Art I, § 8. cl. federal employees as “key employees,”
attempting to do so in a fair 11. Many of the other federal statutes that employers should refer to regulations
manner to the employer. When address employment matters have their published at 10 C.F.R. § 44.5(b).
assessing the rights and obliga- origins in Congress’ ability to regulate 12
38 U.S.C. § 4311 (a).
tions of reservists, employers commerce among the states. In basing 13
Id. at § 4311(b).
such actions on a presumption of nexus 14
Id. at § 3411(c). See Fink v. City
also should be aware of state to interstate commerce, thresholds on the of New York, 129 F.Supp. 511, 520
laws that may offer even more size of the workforce have been included (E.D.N.Y.) (motivating factor if the em-
protections to reservists within within many such federal statutes. ployer “... took into account, considered,
that state. 6
38 U.S.C. § 4303(3) and (4). or conditioned its decision on that
7
Brandsasse v. City of Suffolk, 72 consideration.”); Sheehan v. Department
F.Supp.2d 608 (E.D. Va. 1999) (City of Navy, 240 F.3d 1009 (Fed. Cir. 2001);
Endnotes and director of personnel for the police Gummo v. Village of Depew, 75 F.3d 98
1
The Department of Labor recently department were subject to liability under (2d Cir. 1996), cert. denied, 517 U.S.
indicated that over 460,000 members of USERRA as city paid the wages and 1190 (1996) (Police officer/reservists’
the National Guard and Reserve have been controlled the hours. The director of claim allowed to go to jury after court
mobilized since September 11, 2001. personnel was responsible for employ- determined that officer established his
See 7 Fed. Reg. 46, pp. 12105-12109 ment actions). participation in military training was a
(3/10/2005). 8
38 U.S.C. § 4303. motivating factor for his termination and

July 2005 / 31
18 30
sufficient evidence of animus toward 38 U.S.C. § 4313(a)(1)(A) The FMLA is codified at 29 U.S.C. §
reservists existed to overcome city’s claim and (B). 2601 et. seq. The DOL issued implement-
19
that his termination was based on grounds Id. at § 4313(a)(4). ing regulations located at 29 C.F.R. §
20
unrelated to his absence for military Id. at § 4313(a)(2). 825.100 et. seq.
21 31
training). Id. at § 4313(a)(4). 38 U.S.C. § 4312(a)(1) and (b).
15 22 32
38 U.S.C. § 4311(b). See Brandsasse Id. at § 4313(a). 38 U.S.C. § 4312(f).
23 33
v. City of Suffolk, 72 F.Supp.2d 608 Id. at § 4312(c)(1) - (c)(4). Pub. Law No. 108-454 (Dec 10,
24
(E.D.Va. 1999) (Police officer met burden Id. at § 4313(a)(3). 2004). The notice requirement will be
25
necessary for case to continue against city Id. codified at 38 U.S.C. § 4224. The VBIA
26
for denying him an opportunity to take a Id. at § 4312(e). required the secretary of labor to make the
27
promotional exam when he was ordered Id. text of the notice available by March 10,
28
to participate in military training and See Pub. L. No. 104-191 and 29 2005.
34
retaliating against him for asserting rights U.S.C. §§ 1181 et. seq. For more informa- FR. Doc. 05-4871, p. 12108. to be
protected under USERRA). tion on protections afforded reservists published at 20 C.F.R., Appendix to Part
16
38 U.S.C. § 4311 (c)(2). under HIPPA, refer to the DOL Web site 1002, titled “Your Rights Under
17
USERRA was amended to create an at http://www.dol.gov, under “Frequently USERRA.”
35
exemption from reemployment for pre- Asked Questions for Reservists Being Id.
36
service positions “brief and recurrent” and Called to Active Duty.” 38 U.S.C. §§ 4321- 4322.
29
not likely to continue indefinitely. 38 Id. at § 4316(a).
U.S.C. § 412(de)(1)(C).

The Bulletin Honors

T he Paso Robles, California, Po-


lice Department presents “Re-
ward for Valor,” which includes an 8-
foot-tall bronze statue depicting a
firefighter and a police officer rescuing
a small child. Behind it stands a brick
wall with the etched names of public
safety servants who have lost their lives
in the line of duty in San Luis Obispo
County since its incorporation in 1850.
Dedicated on the same day as the Paso
Robles Public Safety Center, where it
sits near the entrance, the monument
was privately funded by individuals
and businesses throughout the county.

32 / FBI Law Enforcement Bulletin


The Bulletin Notes
Law enforcement officers are challenged daily in the performance of their duties; they face each
challenge freely and unselfishly while answering the call to duty. In certain instances, their actions
warrant special attention from their respective departments. The Bulletin also wants to recognize
those situations that transcend the normal rigors of the law enforcement profession.

While working special duty at a car show and swap meet, Officer
Daniel Johnson of the Jefferson, Wisconsin, Police Department saw a
person collapse near the front gate. When he got to the individual, Officer
Johnson found no pulse or signs of respiration. Immediately, he checked
the victim’s airway and began rescue breathing. With the assistance of
another citizen, Officer Johnson continued to perform CPR until the arrival
of rescue personnel, who used a defibrillator to revive the individual. The
victim then received hospital treatment and ultimately survived. The quick
and decisive actions of Officer Johnson saved the person’s life.
Officer Johnson

Officers Jeff Larsh and Joel Mast of the Forest


Park, Ohio, Police Department responded to a call
pertaining to an attempted suicide at a residence. Upon
arrival, they found the house locked. No one answered
the door and the officers could not make contact with
anyone inside. After receiving authorization, Officers
Larsh and Mast kicked in the front door and entered the
residence. Once inside, the officers noticed the smell of
exhaust fumes. Officer Mast located a 4-month-old
Officer Larsh Officer Mast
baby lying on a couch with a suicide note nearby that
was written by the mother. Officer Larsh found the
woman in her car in the garage with the doors closed and the motor running. The officers turned
off the engine and the opened the doors. Officer Larsh moved the mother to the front yard and
Officer Mast brought the child outside. The officers got medical help for the two victims and also
made arrangements for the baby and mother’s other three children, who had not yet arrived home
from school. The quick, decisive actions of Officers Larsh and Mast saved two lives and
prevented a horrible
tragedy.
Nominations for the Bulletin Notes should be based on either the rescue of one or
more citizens or arrest(s) made at unusual risk to an officer’s safety. Submissions
should include a short write-up (maximum of 250 words), a separate photograph of
each nominee, and a letter from the department’s ranking officer endorsing the
nomination. Submissions should be sent to the Editor, FBI Law Enforcement Bulletin,
FBI Academy, Madison Building, Room 201, Quantico, VA 22135.
U.S. Department of Justice Periodicals
Federal Bureau of Investigation Postage and Fees Paid
Federal Bureau of Investigation
FBI Law Enforcement Bulletin ISSN 0014-5688
935 Pennsylvania Avenue, N.W.
Washington, DC 20535-0001

Official Business
Penalty for Private Use $300

Patch Call

The town of New Castle, New York, was The patch of the Fort Kent, Maine, Police De-
founded by the Quakers in 1790. The overall shape partment depicts a brown fort situated at the cor-
of its police department’s patch is modeled after an ners of the St. John and Fish Rivers with Clair,
arrowhead. At the center is a scene depicting a New Brunswick, Canada, in the background. The
Quaker and a Native American with the Hudson fort was established in 1839 for monitoring lum-
River in the background. bering activities on both rivers to keep out foreign
trespassers. In 1842, the St. John River became the
international border.

You might also like