Professional Documents
Culture Documents
Volume 74
Number 7
United States
Department of Justice
Federal Bureau of Investigation
Washington, DC 20535-0001
Robert S. Mueller III
Director
The attorney general has determined Risk Assessments and Today’s law enforcement agencies face
that the publication of this periodical is
necessary in the transaction of the
Future Challenges 1 emerging threats that require a higher
level of preparedness.
public business required by law. Use By W. Dean Lee
of funds for printing this periodical has
been approved by the director of the
Office of Management and Budget.
The FBI Law Enforcement Bulletin Preparing Law This program offers a proven method
(ISSN-0014-5688) is published
monthly by the Federal Bureau of
Investigation, 935 Pennsylvania
Enforcement Leaders 20 for preparing law enforcement
leaders.
Avenue, N.W., Washington, D.C.
By Scott L. Salley
20535-0001. Periodicals postage paid
at Washington, D.C., and additional
mailing offices. Postmaster: Send
address changes to Editor, FBI Law Serving Their Country and Both law enforcement employers and
Enforcement Bulletin, FBI Academy,
Madison Building, Room 201,
Quantico, VA 22135.
Their Communities 25 employees who leave to perform military
duty need to have an understanding of
By Lisa A. Baker their rights and obligations.
Editor
John E. Ott
Associate Editors
Cynthia L. Lewis
David W. MacWha
Bunny S. Morris
Departments
Art Director
Denise Bennett Smith
Assistant Art Director 14 Focus on Personnel 24 Bulletin Reports
Stephanie L. Lowe Early Detection of the Victims
Problem Officer Human Trafficking
This publication is produced by
members of the Law Enforcement 18 ViCAP Alert 32 Bulletin Honors
Communication Unit, Training and
Development Division. Robert Mark Edwards Paso Robles, California
Internet Address
leb@fbiacademy.edu
Cover Photo
© Digital Juice
© Digital Vision
B
y recognizing existing to better security and opera- department’s risk managers
and emerging threats, tional decision making. determine the risks, then they
law enforcement agen- The analytical risk manage- can select appropriate counter-
cies can improve their risk ment (ARM) process is a measure options to mitigate
assessment and management systematic and interactive them. Most important, ARM
programs. Too often, for ex- approach for identifying and can service both security and
ample, security risk assessments evaluating assets, potential operational assessments.
focus mostly on identifying threats, and existing vulnerabili- The ARM process expresses
flaws in physical security (e.g., ties, along with calculating risks risk, defined as the potential
perimeter barriers and screening and determining requisite destruction, disruption, or
visitors) without fully recogniz- countermeasures.1 Departments denial of essential assets, in the
ing the impact of other security can view the ARM process as formula Risk = Impact of Loss
challenges (e.g., internal people three interacting spheres of of Asset x Threat x Vulnerabil-
problems and cyberthreats). assets, threats, and vulnerabili- ity or R = I x T x V. In other
Applying a systematic approach ties. Where these three areas words, a risk assessment (R)
of fact finding and balancing merge, or overlap, are the determines the possibility of an
costs and benefits should lead calculated risks. Once a adversary’s (T) successful
July 2005 / 1
“ Applying a
systematic approach
of fact finding and
Third, the risk managers as-
sign a linguistic rating (value/
criticality) to each asset based
on the impact of loss or dam-
balancing costs and age. This means that risk man-
benefits should lead gers first assess an asset accord-
to better security ing to one of the four defined
and operational criticality ratings of critical,
decision making. high, medium, and low and then
”
further refine the resource into
three values of low, medium,
Dr. Lee, the architect of the FBI’s Security Risk Management or high.
Program and Continuity Assurance Planning Strategy, leads • Critical: grave effects lead-
the Bureau’s Security Risk Analysis Staff.
ing to loss of life, serious
injury, or mission failure.
• High: serious effects result-
exploitation of an identified from that traditionally used ing in loss of highly sensi-
vulnerability (V) and the in law enforcement and intelli- tive resources that would
resulting degree of damage or gence circles. Assets include impair operations affecting
impact (I) on the asset. Basi- people, information, operations, public safety and commu-
cally, risk management consti- equipment, facilities, and nity interests for an ex-
tutes the continuing process of social-psychological resources tended period of time.
selecting and applying explicit (PIOEFS).
countermeasures to achieve Assessing assets involves • Medium: moderate effects
optimum results while balanc- three sequential actions. First, resulting in loss of sensitive
ing acceptable risks and costs. a department’s risk managers resources that could impair
By developing a full-spectrum identify all important local operations affecting public
risk assessment and manage- organizational and operational safety and community in-
ment program, a department PIOEFS resources requiring terests for a limited period
can discover its security and protection. Second, they write a of time.
operational strengths and brief statement for each describ- • Low: little or no effects
weaknesses. In addition, it can ing the worst undesirable event impacting human life or the
determine how best to maxi- should some adverse situation continuation of operations
mize asset usage. affect that asset. For example, affecting public safety and
within the people category, a community interests.
ASSETS department should include law In the example of officers as
For the ARM process, enforcement officers as a a critical asset, the department
assets comprise resources of critical asset, and an applicable might assign an impact rating
essential value that a depart- undesirable event would be of low/critical, meaning that it
ment must protect to effectively criminals or terrorists attacking deemed the resource as overall
fulfill its essential public safety with improvised explosive critical but at the lower end of
and law enforcement responsi- devices that could result in the that category. Finally, the risk
bilities, a definition that differs loss or injury of the officers. managers convert the linguistic
July 2005 / 3
Chart 1 - Asset Assessment Example
Linguistic
Impact Numeric
Critical Asset UDE Undesirable Event (UDE) Rating Impact
Code Degree / Value
Criticality
People
(P-1) Departmental P1A Terrorist or criminal attacks (e.g., vehicle & package IEDs, Low / High 14
Personnel (full-time hazardous mail, & physical assaults) causing loss of LEA lives.
officers, auxiliaries, JTF
members, technicians, & P1B (Insert additional items & blank lines as needed).
administrators).
Information
(I-1) LEA sensitive I1A Internal & external thefts compromising law enforcement Medium / 5
information in various sensitive resources & operations. Medium
media.
Operations
(O-1) Ongoing O1A Detection of LEA UC operations causing loss of lives, CI assets, High / High 49
investigations & and jeopardize officers and cases.
operations.
O1B Improper security discipline and security lapses causing Low / 50
compromised operations Critical
Equipment
(E-1) Communication E1A Loss of electrical power or communications causing disruptions High / High 49
devices. of operations.
(E-2) Weapons, E2B Thefts causing loss of weapons, radios, & equipment. Medium / 71
ammunition, radios, & Critical
specialized gear.
Facilities
(F-1) Main Headquarters F1A Unrestricted publicly accessible pathways in adjacent property Low / 50
& substations causing penetrations and attacks. Critical
Socio-Psychological
(S-1) Community public M1A Loss of public trust and community support may result in Medium / 71
relations. increased crimes. Critical
L/L M/L H/L L/M M/M H/M L/H M/H H/H L/C M/C H/C
1 2 3 4 4 5 13 25 49 50 71 100
For converting linguistic ratings into numeric impact values for assets and for con-
verting numeric values into linguistic ratings for risks.
“
receive the capability countermeasures exist,
through a third party to but the asset has multiple
launch an assault and has a Vulnerabilities weaknesses that adversaries
history of similar incidents. represent could exploit to their
advantage.
• Low: little or no credible weaknesses that
evidence of the adversary’s an adversary can • Medium: some effective
intent or capability to exploit to gain countermeasures exist,
launch an assault and no access to an asset. but the asset has at least
history of conducting one weakness that adversar-
similar incidents. ies could exploit to their
”
In the example of street advantage.
gangs as a threat, the depart- • Low: multiple layers of
ment might assign a threat Assessing vulnerabilities effective countermeasures
rating of medium/critical, involves first identifying the exist, and few or no known
meaning that a department specific potential weaknesses adversaries could exploit to
considers the threat as overall for each asset. For example, their advantage.
critical and at the center of the law enforcement officers might Finally, the risk managers
category. Finally, the risk experience human temptations convert the linguistic ratings
managers convert the linguistic to misbehave or become ham- into numeric vulnerability val-
ratings into numeric threat pered by obsolete departmental ues and record the results for
values and record the results for policies and procedures. Next, each identified weakness. The
each identified adversary. The the risk managers determine the numeric value will be vulner-
numeric value will be threat (T) existing countermeasures for ability (V) in the equation I x T
in the equation I x T x V = R. each asset and their level of x V = R. Table B and Chart 3
Table B and Chart 2 illustrate effectiveness in reducing vul- present examples of this step.
this process. nerabilities. Then, the risk
managers assign a linguistic RISK
VULNERABILITIES rating (value/criticality) for each CALCULATION
Vulnerabilities represent according to one of the follow- Risk is the likelihood that an
weaknesses that an adversary ing four defined criticality undesirable event will occur. By
July 2005 / 5
Chart 2 - Threat Assessment Example
Linguistic
Critical UDE Threat Threat Numeric
Asset Code Category Adversary Intent Capability History Rating Impact
Degree / Value
Criticality
LEA P1A Criminals Local & Street gangs Gangs Six-year Medium / .87
personnel I1B transient ABC & XYZ possess history of Critical
O1A criminals intend to assorted violence
LEA O1B merge to weapons. since arrest
information attack police. of T.J.
Kooker.
Active
investigations Prisoners Unpredictable Prisoners Weekend High / High .74
processing intoxicated on PCP arrests are
Equip. & prisoners become most
weapons powerful. dangerous.
HQ & sub- I1A Extremists Terrorists, Left-wing & Both groups Outside Low / .75
stations E2B radicals, right-wing trained & agitators Critical
S1A fundamenta group intent equipped in arrive
lists on creating civil during
havoc during disorder major
convention. tactics. events.
L/L M/L H/L L/M M/M H/M L/H M/H H/H L/C M/C H/C
.01 .12 .24 .25 .37 .49 .50 .62 .74 .75 .87 1.00
For converting linguistic ratings into numeric threat values and for converting linguis-
tic ratings into numeric vulnerability values.
LEA personnel P1A Established daily routines & schedules of law enforcement officers & Low / Critical .75
supervisors.
LEA I1B Inadequate compliance to established security policies, programs, & Low / Medium .25
information procedures.
Operations
Active O1B Public building with inadequate monitoring, allowing penetration and Medium / .37
investigations exposure to investigations. Medium
Headquarters & F1B Presence of publicly accessible underground facilities (e.g., parking lots, High / Critical 1.00
substations loading docks, & fuel sites).
Socio-Psych
Community PR M1A Insufficient public relations staffing and funding reduces positive contacts High / High .74
programs with the community.
July 2005 / 7
Chart 4 - Risk Assessment Example
LEA sensitive information in M/M 5 L/C .75 L/M .25 .94 L/L
various media
Operations
Ongoing LEA investigations H/H 49 M/C .87 M/M .37 15.77 L/H
Equipment
Weapons, ammunition, radios, M/C 71 L/C .75 L/M .25 13.31 H/M
& equipment
Facilities
Main Headquarters & L/C 50 M/H .62 H/C 1.00 31.00 M/H
Substations
Socio-Psychological
Community public relations M/C 71 L/C .75 H/H .74 39.41 H/H
programs
“
information material, media Adversarial manipulations
devices, and sensitive trash. of public and organizational
perceptions affect community
Operations By calculating the support and internal morale.
Law enforcement opera- risk, the department Departments may lessen social-
tions, such as active investiga- may obtain an psychological threats by recog-
tions, security at high-profile estimate of the nizing the importance of com-
events, and surveillance assign- potential severity or munity and individual concerns;
ments, have become more outcome of an by earning and preserving the
geographically dispersed and undesirable event. public’s trust and confidence;
increasingly reliant on comput- by understanding the impact of
”
ers and cellular communication social, cultural, political, reli-
connections, which then creates gious, and psychological influ-
greater vulnerabilities for ences in daily operational
adversarial espionage and equipment, supplies, mainte- security practices; and by
sabotage. Departments can nance, repair, upgrades, and deterring, detecting, and defeat-
lessen such dangers by incul- replacement systems; and ing internal security and opera-
cating operational security exploit available off-the-shelf tional problems promptly and
(OPSEC) early into all facets equipment to reduce internal decisively.
of individual daily affairs and research and development
special activities; enforcing expenses. RISK ASSESSMENT
strict need-to-know require- REPORTING
ments; practicing OPSEC, Facilities Producing a comprehensive
especially at off-site and under- Centralized facilities and security risk assessment (SRA)
cover locations; and integrating decentralized law enforcement report highlighting all findings
security compliance into all activities present unique coop- and recommendations can
plans, policies, procedures, erative security and operational enable senior officials to make
and performance reviews. challenges. Departments can well-informed mitigation
mitigate these by improving decisions. Accurate judgments
Equipment three-dimensional security pe- are based on methodical assess-
Screening, accessing, and rimeters with multiple rings and ments of known factors and on
monitoring systems rapidly layers of mutually supporting harnessing the collective input
July 2005 / 9
Chart 5 - Countermeasure Assessment Example
(E) Existing / (O) Ordered /
Cyber-based attacks
Facility penetrations
“
requests them to do what they do
• A security program plan (e.g., for domination, fear,
describing the department’s Conventional greed, or prestige)?
plan of action (e.g., goals, external threats • History: What are their
objectives, and actions) to involve individuals, social, cultural, political,
mitigate risks domestic groups, and religious, and psychological
• Discussion of planning, sometimes foreign influences (e.g., based on
programming, and budget- entities. animosity, vengeance, or
ing requirements ideology)?
•
•
Overall lessons learned and
information for sharing
Predictive risk analysis
discussing future risks
and preventive measures
Summary and conclusion
recapping major findings
”
destruction potentially involv-
ing chemical, biological, radio-
logical, nuclear, and high-explo-
sive devices; new alliances and
symbiotic relationships between
criminals, terrorists, and foreign
• Funding: What are their
sources of monetary re-
sources (e.g., foreign spon-
sors, criminal enterprises,
or false fronts)?
• Support structure: What
basic framework supports
their operations and daily
and recommendations governments, in which crimi-
nals and foreign intelligence living activities (e.g., lodg-
FUTURE CHALLENGES services exchange resources ing, training, transporting,
The character of emerging (e.g., weapons, information, and sustaining)?
threats is changing rapidly. money, and hostages) with • Skills: What are their
Today, law enforcement agen- terrorists; and still-undetected technical and tactical skills
cies are challenged by multiple hidden dangers. (e.g., weapons, explosives,
asymmetric perils: domestic Detecting, identifying, specialized training, and
violence, criminal enterprises, and neutralizing threats and language)?
July 2005 / 11
• Collection: What are their available to strike (e.g., meticulous planning and prepa-
intelligence collection mass public gatherings, ration; attempts to control
sources and methods (e.g., visiting dignitaries, building circumstances and timing of
insiders, visitors, or open repairs, or open gaps)? when operations will com-
sources)? • Action: What are their mence; use of multiple indepen-
• Knowledge: What do action capabilities (e.g., dent cells with the same target;
they know about their Are they motivated, simultaneous attacks of soft-
targets (e.g., their assets, organized, equipped, target and high-payoff objec-
vulnerabilities, and trained, supported, knowl- tives to create mass fear, havoc,
countermeasures)? edgeable, and readied and casualties; and increased
attackers?)? support networks for funds,
• Tools: What specific tools recruitment, contacts, safe
do they possess (e.g., iden- In assessing emerging
threats, law enforcement agen- houses, false identities and
tity papers, vehicles, and cover stories, training, weapons,
computers)? cies can target and exploit some
of an adversary’s common explosives, intelligence, com-
• Weapons: What specific operating methods and tech- munications, transportation, and
weapons do they have (e.g., niques. These include increased escape plans or death benefits
small arms, IEDs, or weap- use of physical, imagery, and for surviving family members.
ons of mass destruction)? technical surveillance to iden- First and foremost, mitiga-
• Opportunities: What oppor- tify the target’s vulnerabilities; tion of emerging threats re-
tunities may be or become applied use of long-term quires the ability to think and
“
planning, and execution; and operational readiness and
for developing cost-effective
• resourceful in synergizing countermeasure options,
use of all assets; Assessing threats whereas SRA reports provide
• unpredictable in overt involves identifying a formal audit trail leading to
behavior; and assessing all well-informed decision making.
of the threats Together, these tools can help
• uncompromising in main-
taining the highest security
associated with the law enforcement community
and operational standards; each asset. enhance its ability to face the
rigors of tomorrow’s world of
”
• practical in applying preven- uncertainty.
tive measures; and
• flexible and bold in counter- Reports give focus for future Endnotes
ing new challenges. security and operational initia- 1
The FBI recently completed an
tives via the opportunity to assessment to evaluate its own security
CONCLUSION realign priorities, update mon- posture using ARM, which the U.S.
Identifying and thoroughly etary funding, and share lessons Security Policy Board’s Risk Management
Training Group developed. The FBI’s
understanding local and re- learned with the public safety version of ARM involves a six-step
gional threats give law enforce- community. process that identifies an organization’s
ment agencies a distinct advan- Law enforcement agencies assets, threats, vulnerabilities, risks, and
tage in better preparing for a should perform risk assessments needed countermeasures and then develops
wide range of risks and chal- annually and whenever a major a security risk assessment (SRA) report.
lenges. Today’s criminals, adverse incident occurs, key
extremists, and terrorists con- leadership changes, operations Please forward questions, comments,
tinue to practice the ancient relocate, and physical or proce- and suggestions to deanlee@leo.gov
principles of lawlessness: dural security modifications or phone Dr. Lee at 202-324-3173.
striking when and where they transpire. Analytical risk man- The FBI’s Security Division fully
supports the dedicated law enforce-
are most ready and when they agement (ARM) assessments ment professionals serving communi-
perceive that the law is absent and accompanying security risk ties throughout the United States and
or its enforcers are least pre- assessment (SRA) reports the free world.
pared. Departments must be support planners and managers
July 2005 / 13
Focus on Personnel
Early Detection of the Intervention Approach
Problem Officer According to the U.S. Department of Justice,
By Dino DeCrescenzo early warning systems take the form of databases
that contain personnel information designed to
”
ing systems for over a decade
The first in-depth study of with beneficial results.17 How-
early warning systems found that ever, these programs still may
27 percent of the agencies sur- not accurately identify every
veyed in 1999 had such a mechanism in place specific pattern of behavior that may ultimately
while another 12 percent planned on implementing lead to misconduct. In addition, the study found
one.13 The participating agencies were police de- that no standards had been established for identify-
partments employing a minimum of 80 officers ing officers in the early warning systems exam-
and serving populations of at least 50,000. How- ined. Instead, only a general agreement existed on
ever, 87 percent of police departments in the some of the criteria that should influence their
United States have fewer than 25 sworn officers.14 selection.18 These issues demonstrate that agencies
So, while less than 40 percent of the large agencies must carefully analyze the information compiled
surveyed either had or planned to have an early on their personnel and establish strict selection
warning system in 1999, the majority of police guidelines to ensure that they correctly determine
departments in the country most likely did not have those officers in need of intervention.
nor plan on implementing such a system at the Finally, the study noted that the implementa-
time. tion of an early warning system can prove compat-
If administered properly, an early warning and ible with both problem-oriented and community
detection system should allow the department to policing. The law enforcement administrator
quickly intervene and help modify the behavior of can incorporate the warning system into
the officers identified. Moreover, a successful the department’s overall philosophy and goals,
July 2005 / 15
recognizing that the new system must involve conduct.21 They also must seriously discipline such
counseling and training as the main objective in personnel, not merely reassign them to other du-
modifying the behaviors of the officers selected ties. Finally, agencies must provide troubled offi-
and flagged for intervention. The administrator, cers with counseling and other services. As one
however, must remember that the police union and official said, “We have a tendency to go from zero
the officers may suspect a new warning system and to 60, by focusing only on the egregious, but not
possibly resist its implementa- having a system to correct or
tion. One early warning disci- discipline the behavior that is
“
pline system stressed the police nonegregious.”22
union’s involvement in the pro- Officers who have exhibited
cess prior to implementation of a Some departments less than stellar behavior need
program that provided predict-
able sanctions agreed upon by
management and the union.19 Be-
cause most complaints by unions
“ have successfully
employed early warning
systems for over a
decade with beneficial
help to return to their former
standards of professionalism.
Departments should endeavor to
find out what these officers need
involve the unequal treatment of results. to overcome their problems and,
personnel and ambiguous, un- once again, become valuable,
known, or unpredictable punish-
ments, this system established a ” contributing members of their
profession. To this end, an early
disciplinary matrix with minimum and maximum warning system can offer an effective approach for
penalties and ensured that the administration and agencies to use.
the collective bargaining unit agreed upon predict-
able, reliable, equitable, and valid sanctions. Such Conclusion
involvement by the union or collective bargaining Today’s law enforcement administrators must
unit can greatly increase the success of an early identify problem officers and intervene appropri-
warning system. ately with counseling, training, and other methods
in an attempt to modify and change their behavior.
Positive Change Managers will benefit their departments, commu-
Law enforcement agencies throughout this nities, and problem officers with the implementa-
country generally have pursued a traditional ap- tion of a properly administered early warning sys-
proach when dealing with officer misconduct.20 tem. Such an approach can help agencies combat
Most have dealt with this issue through reactive the disturbing trend that seems to indicate that they
as opposed to proactive efforts, primarily using disregard officer misconduct.
citizen and internal complaints to identify such Early warning systems demonstrate that de-
behavior. In addition, most departments impose partments and administrators have developed a
corrective action only after the misconduct has clear policy regarding misconduct, have put a pro-
occurred. gram in place to correct negative behavior, and
To effect positive change in the behavior of the have made a good-faith effort to identify employ-
few officers that create the majority of problems, ees whose performance is less than satisfactory.23
departments must begin to take sufficient action The majority of their officers who valiantly place
against those repeatedly accused of excessive themselves in harm’s way every day to protect the
force and continually look for patterns in officer citizens of their communities deserve no less.
9
Supra note 2.
Supra note 3.
T.F. Kennedy, Preventing, Detecting, and Investigating
T he Bulletin staff is
always on the lookout
for dynamic, law enforce-
Employee Misconduct, paper presented at a Roger Williams ment-related photos for
University Conference, Bristol, RI, October 2003. possible publication in the
10
R.G. Dunlop and J. Adams, “System to Spot Troubled magazine. We are interested
Officers Not Fully Used: Goal Is to Detect Small Problems,
Prevent Big Ones,” Louisville Courier Journal, April 2, 2000.
in photos that visually depict
11
“Pittsburgh’s Experience with Police Monitoring,” Vera the many aspects of the law
Institute of Justice, June 17, 2004; retrieved on January 28, 2005, enforcement profession and
from http://www.vera.org/project/project1_1.asp?section_id= illustrate the various tasks
7&project_id=13. law enforcement personnel
12
Ibid. perform.
13
Supra note 2. We can use either black-
14
S.F. Kelly, “Internal Affairs: Issues for Small Police and-white glossy or color
Departments,” FBI Law Enforcement Bulletin, July 2003, 1-6. prints or slides, although we
15
Supra note 3.
16
“Best Early Warning Tool Is Informative,” Organized Crime
prefer prints (5x7 or 8x10).
Digest 22, no. 13 (August 10, 2001). We will give appropriate
17
Supra note 4. credit to photographers when
18
Supra note 2. their work appears in the
19
R.W. Serpas, J.W. Olson, and B.D. Jones, “An Employee magazine. Contributors
Disciplinary System That Makes Sense,” The Police Chief, should send duplicate, not
September 2003. original, prints as we do not
20
Supra note 4. accept responsibility for
21
D. Washburn, D. Hasemyer, and M. Arner, “A Question of damaged or lost prints. Send
Force: Dealing with Multiple Shooters Has Been a ‘Huge’ Issue,”
The San Diego Union-Tribune, January 19, 2003; retrieved from
photographs to:
http://www.signonsandiego.comnews/reports/shootings/
20030122-9999_mz1n19questn.htm. Art Director
22
Supra note 3. FBI Law Enforcement
23
Supra note 2. Bulletin, FBI Academy,
Madison Building,
Room 201, Quantico,
Detective Sergeant DeCrescenzo serves with the
VA 22135.
Barrington, Rhode Island, Police Department.
July 2005 / 17
ViCAP Alert
Subscribe Now
July 2005 / 19
Preparing Law
Enforcement Leaders
The FBI Academy’s Leadership
Fellows Program
By SCOTT L. SALLEY, M.S.
© Kurt Crawford
H ow do law enforce-
ment agencies prepare
their command staff
members for the challenges
should consider the FBI
Academy’s Leadership Fellows
Program located in Quantico,
Virginia.
both the domestic and interna-
tional law enforcement commu-
nities. Fellows spend 6 months
at the academy and the remain-
that will confront them as they ing 6 at their respective agen-
assume additional responsibili- Program Overview cies or at Quantico for addi-
ties? While no magic formula Started in 2000 and super- tional research and study.
exists, there is a method to vised by the Leadership Devel- What separates this program
expedite the problem-solving opment Institute (LDI),1 this 1- from others that emphasize
experience that will help mold year program serves to enhance leadership development? First
these individuals into successful the leadership skills of individu- of all, participants find that
leaders. To this end, chiefs, als in command-level positions living at the academy while
sheriffs, and senior agents and broaden their exposure to interacting with the staff, FBI
”
enormous selection of re- method....
sources, including museums,
federal law enforcement agen-
cies, historic sites, government Captain Salley serves with the Collier County, Florida, Sheriff’s Office.
institutions, and seemingly end-
less educational opportunities.
Also important is the path, or a list of goals with is needed, and a signed state-
program’s “trilogy”; partici- anticipated outcomes. These ment by the department head
pants complete these three could include earning a “yellow constitutes one of the require-
components at the end of the brick”2 for physical improve- ments for admission. While
fellowship. One, the individual ment with the FBI NA, reading making this important decision,
works on projects for the FBI, a certain number of books individuals can gain additional
such as instructing certain pertaining to management information about the program
classes, organizing training topics, learning new computer and its advantages by contacting
sessions, assisting academy skills, devising a personal or the FBI Academy and talking
staff with a variety of tasks, and agency wellness plan, or attend- with any of the current fellows
teaching overseas at the Interna- ing leadership development or obtaining a list of alumni and
tional Law Enforcement Acad- training, such as the Law En- communicating with former
emy (ILEA) in Budapest, forcement Executive Develop- participants.
Hungary. ment Seminar (LEEDS). For consideration, prospec-
Two, the participant con- tive fellows submit a completed
ducts a research project for the Application Process application3 to LDI. Each
sponsoring agency that brings Interested officers must becomes rated on a point system
immediate value to the training. understand the time and dedica- based on several factors, such
For the assignment, the depart- tion the fellowship demands. as law enforcement experience,
ment head identifies a need for The program involves a partner- community involvement,
the agency; in addressing this, ship between the applicant, education, and position. Also
the fellow has some of the best immediate family members, the required as part of the package
resources in the world available. head of the sponsoring agency, is supporting documentation,
The department, the FBI, and and the FBI Academy. Some- such as newspaper articles
the individual all derive sub- times, this also includes friends, and transcripts—the more the
stantial benefit from this study. other relatives, and the commu- applicant includes, the better
Three, the participant nity where the fellow resides. the chances for acceptance.
follows a personal development Support from all affected parties Organization and clarity help
July 2005 / 21
ensure an effective overall with a presentation at one of can use it to ensure that com-
presentation. the regional command colleges mand staff members have the
Prospects can call the pro- in the United States. Fellows necessary tools for maintaining
gram manager regarding status will find a lot of flexibility for or improving the current status
for approximately 30 days after optimizing their involvement of law enforcement in the
submission of an application. in the program. communities they serve. The
Upon acceptance, individuals How does participation in fellowship has graduated indi-
will receive a formal letter from the fellowship benefit the spon- viduals that live in areas located
the FBI; the agency head also soring agency? Its command- across the United States and
will get a copy. Then, the tasks level personnel enjoy enrich- abroad, and the concentrated
of scheduling and preparing for ment through the interaction studies and hands-on involve-
this 1-year journey begin. with the course material, in- ment by participants have been
structors, and students; strength- observed as a significant benefit
Outcome Achieved ening of their organizational to agencies both large and
Fellows will share many skills; enhanced networking, small.
of the same experiences and through which they gain valu-
educational benefits, but each able relationships that will aid Conclusion
also will take away something them upon their return to duty; Law enforcement agencies
different. Largely, this is deter- and improved confidence, ex- continually face new challenges
mined by individual choice. For perience, and professionalism. in an ever-changing world.
example, one participant may Also, the program can help Department leaders need prepa-
travel to Europe to instruct at department heads prepare for ration to address them. To this
ILEA, while another may assist the future. In this regard, chiefs end, the FBI Academy’s Lead-
ership Fellows Program can
help. For example, as one
fellow stated, “Law enforce-
Expectations of Fellows ment has changed radically
since September 11, 2001,
Fellows, either independently or in cooperation with and having a command staff
other participants and FBI Academy faculty, must— member familiar with the FBI
Academy and the associated
• teach and attend classes; services that the FBI provides
• conduct research; has been an important link for
• manage projects; obtaining information regarding
domestic and international
• facilitate meetings;
terrorism.”
• coordinate programs; As departments seek to
• attend professional conferences; prepare leaders in their ranks,
• write publishable articles or documents; and they realize that no easy
method exists. However, this
• establish professional networks. program offers a proven meth-
od for accomplishing this goal
and represents an important
The Bulletin’s
E-mail Address
© Digital Vision
July 2005 / 23
Bulletin Reports
Victims
Crimes Against Persons Age 65 or Older, 1993-2002 presents data
from the National Crime Victimization Survey and the Uniform Crime
Reports comparing incidents targeting persons 65 years of age or older
with those involving younger age groups. Crime rates are presented for
murder, rape/sexual assault, robbery, aggravated and simple assault,
purse snatching/pocket picking, household burglary, and motor ve-
hicle theft and property theft. The report describes trends in violent
and property crimes between 1993 and 2002 and discusses characteris-
tics of the incidents, including injury to victims, self-protective
measures used, whether weapons were present, time and place
of occurrences, and victim-offender relationships. Crimes include both
reported and nonreported.
This publication is available
online at http://www.ojp.
usdoj.gov/bjs/abstract/ Human Trafficking
cpa6502.htm or by contact- The National Institute of Justice (NIJ) offers Charac-
ing the National Criminal teristics of Chinese Human Smugglers, which presents
Justice Reference Service at findings of a study that uncovered the inner workings of
800-851-3420. Chinese human smuggling organizations by going right to
the source—the smugglers themselves. Researchers found
that most of these individuals are ordinary citizens whose
social networks provide the necessary connections and
resources to profit from human trade. Enforcement efforts
require consideration of the unique organization of smug-
gling enterprises and how smugglers are perceived
by themselves and their clients. This report is available
electronically at http://www.ncjrs.org/pdffiles1/nij/
204989.pdf or by calling the National Criminal Justice
Reference Service at 800-851-3420.
© Digital Stock
H undreds of thousands what responsibilities they owe employees who leave to per-
of “citizen soldiers” the departing employees during form military duty have an
have been called to their absence and upon return to understanding of the rights
active duty in the military since civilian life. Not surprisingly, and obligations under the Uni-
the events of September 11, the law enforcement community formed Services Employment
2001. These citizen soldiers presently is dealing quite often and Reemployment Rights Act
leave their families and jobs with these issues given the of 1994 (USERRA).2
behind, often leaving with significant representation of This article provides a
questions about their future prior military in law enforce- general overview of the back-
employment security when they ment. Given the impact contin- ground and purpose behind
return, as well as benefits, such ued military service can have on USERRA in addition to the
as health insurance and their the personal and professional rights and obligations of the
pensions, while they are away.1 lives of law enforcement per- employee and employer and the
In addition, many employers sonnel, it is important that both prohibition against discrimina-
find themselves wondering law enforcement employers and tion based on active duty. Issues
July 2005 / 25
addressed include the right to purpose of prohibiting discrimi- “uniformed services.” This is
reemployment, the impact nation against individuals defined to include employees
active duty has on benefits, such because of their voluntary or who serve in the Army, Navy,
as health insurance and pen- involuntary military service and Air Force, Marine Corps, Coast
sions, and notice requirements encouraging military service by Guard, as well as all Reserve
imposed on both employers and lessening the disadvantages components of each, the Army
employees. The article is in- associated with such service or Air National Guard, and the
tended only as a general over- when a civilian career is im- Commissioned Corps of the
view of key aspects of pacted.4 USERRA has broad Public Health Service. In
USERRA. For more specific application, covering nearly all addition, the president has the
information, the reader may employees, including part-time authority to identify any other
want to refer to the U.S. Depart- and probationary employees, as category of persons as covered
ment of Labor (DOL) at http:// well as all U.S. employers, by USERRA during time of war
www.dol.gov. In this Web site, whether in the private or public or emergency.
the DOL’s Veterans’ Employ- sector and regardless of size.5 Congress also clarified the
ment and Training Services The term “employer” also type of “uniform service” which
(VETS) has published extensive includes individuals.6 This has triggers the rights and responsi-
information regarding been interpreted as allowing an bilities provided for in
USERRA, including proposed individual seeking enforcement USERRA.8 Included within the
regulations interpreting of USERRA to pursue an action covered service is duty per-
USERRA, published on Sep- not just against the employing formed, regardless of whether
tember 20, 2004.3 entity but also against individu- it is voluntary or involuntary,
als who have authority within while in active duty, active duty
BACKGROUND the employing entity regarding for training, as well as inactive
AND SCOPE the employment decision.7 duty training, and full-time
USERRA was enacted Congress also provided a National Guard duty. In addi-
by Congress in 1994 for the comprehensive definition of tion, an employee’s absence
from work to assess the
employee’s fitness to take
“
part in any of the above activi-
ties also is covered by
USERRA was USERRA. In 2002, Congress
enacted…for the expanded USERRA’s reach to
include public service per-
purpose of prohibiting formed in a crisis situation by
discrimination against including within the definition
individuals because of of “uniform service” duty
their voluntary or performed by intermittent
involuntary military disaster personnel for the Public
”
service…. Health Service, as well as time
for taking part in training for
such activities. Funeral honor
Special Agent Baker is chief of the Legal Instruction Unit at the FBI Academy.
duty performed by National
“
following his absence to partici- sufficient information to sup-
pate in National Guard activi- port an allegation of discrimina-
ties. The Court concluded that Employer tion or retaliation on the basis of
he had no right to be reem- discrimination is military service.15 The employer
ployed as he was not engaged in established by then may demonstrate that it
uniformed service at the time showing...military- would have taken the action
of his absence from his em- anyway, without regard to
ployer. Prior to his absence for
based activity...was anything protected by
the guard, Leisek indicated that a “motivating USERRA. If the employer
he would be engaged in Guard factor....” successfully demonstrates this
duties at various locations and nonprohibited reason for the
various dates and asked for time
off accordingly. He eventually
did receive military orders for
some of the dates and locations,
but not for all of them. The
Court held that he was not
serving in the uniformed
services as to those dates for
”
on-board employees but appli-
cants for employers as well. An
employer is prohibited from
denying any person initial
employment, reemployment,
retention in employment,
employment action, the plaintiff
must then establish that the
reason offered really is pre-
textual and the employment
action actually was based on
military service. This same
litigation roadmap is set forth
in USERRA for litigating
which he was not under orders promotion or any benefit of claims of retaliation.16
to serve. employment based on an
While USERRA applies to individuals membership or ELIGIBILITY
all employers, the units com- application for membership FOR REEMPLOYMENT
prising the Ready Reserve10 by and the activities associated USERRA extends reem-
statute must be screened to therewith, in the uniformed ployment rights to most em-
ensure that there are not large services.12 The statute also ployees17 who have been absent
numbers of members with prohibits retaliation against from their positions because of
critical civilian skills, and an individual for seeking en- service in the uniformed
that there are no members who, forcement of any right secured services. To be eligible for
if mobilized, would ...result under USERRA.13 reemployment, the service
July 2005 / 27
member must meet the follow- position closest to the position employer also must provide
ing basic requirements: described above for which the reasonable opportunities for
notice must have been given employees are able to perform.19 training to qualify for the higher
to the employer of service In other words, the deployed positions unless to do so would
in the uniformed services; reservist employees progress as pose an undue hardship to the
if they had remained in continu- employer.22
cumulative period of service
ous employment.
must not have exceeded 5 Time Limits on Service
For employees on military
years, unless an exception to
leave for 91 days or more, To qualify for reemploy-
the 5-year rule applies;
USERRA provides a hierarchy ment, the cumulative service
departure from the uni- generally cannot exceed 5 years.
formed services was not However, exceptions to this 5-
“
dishonorable or under other year prohibition exist. These
punitive conditions; and exceptions include:
the requestor must have USERRA situations in which the
submitted a timely request provides for service member cannot
for reemployment and enhanced obtain a release through
reported back to their protections for no fault of their own;
civilian employer in a disabled veterans. involuntary service during
timely manner. a domestic emergency or
USERRA does not require national security crisis;
the employer to return employ-
ees to the exact same position
that they occupied before
leaving for military service. The
manner that the employer places
the employees back into the
workforce is structured accord-
ing to the amount of time the
”
for the employer to follow. The
employer must first consider
placement in the job the em-
ployees would have held had
they remained continuously
employed, provided the employ-
service pursuant to an order
to remain on active duty
because of war or national
emergency;
active duty by volunteers
supporting operational
missions for which
members of the Select
employees were on military ees are qualified for a position
Reserve have been ordered
leave. If the employees were of like seniority and pay, or if
to active duty without
absent for 1 to 90 days, they not qualified for such a position,
their consent;
must be promptly reemployed in in the position the employees
the position that they would occupied before deployment service by volunteers in
have occupied had they re- or one of like seniority and support of a critical
mained in continuous employ- pay.20 If the employees are not mission;
ment, provided they are quali- qualified to perform any of the federal service by members
fied for that position or can above positions, then the em- of the National Guard called
become qualified after a rela- ployer must place the employ- into service to suppress
tively short training period.18 If ees in another position of lesser insurrection; and
the employees are not qualified status and pay, but it must be service connected to
for that position, then the em- closest to the above-described training.23
ployees must be placed in a positions as possible.21 The
July 2005 / 29
Pensions and other if they had remained in civilian language to be used by employ-
Employer Benefits employment. The time spent ers to comply with the notice
When in leave status for serving in the military is to be requirement.34 Generally, the
military service, employees counted for FMLA purposes as notice includes a description of
are to be viewed as though they if the employees never broke the reemployment rights of
are continuously employed for service. those who voluntarily or invol-
purposes of seniority and pen- untarily leave employment for
NOTICE UNDER military service, as well as the
sion benefits.29 In addition, em-
USERRA prohibition against discrimina-
ployees exercising their rights
under USERRA are entitled to USERRA requires employ- tion on the basis of military
the same benefits as those ees to provide notice to their service and the right to be free
generally provided to other employers of their intent to take from retaliation for seeking
employees on unpaid leave. military leave, unless to do so is enforcement of USERRA. The
notice also contains a brief
“
USERRA and the Family summary on the health benefits
Medical Leave Act attendant to military deploy-
The Family Medical Leave Generally, if the ment and a description of the
Act (FMLA) provides for 12 period of leave is 30 enforcement mechanism.35
workweeks of unpaid leave to days or less, the ENFORCEMENT AND
address a serious health condi-
employer’s health REMEDIES
tion of an employee or a family
member or to take time off to insurance benefits The statute offers different
care for a newborn or adoptee. remain intact. avenues for an individual to
To be eligible, employees must pursue relief. Administrative
”
have worked for the employer recourse may be sought through
for a minium of 12 months and VETS within the Department of
at least 1,250 hours for that not feasible or precluded by Labor. VETS offers guidance
employer.30 Questions regarding military necessity.31 The em- on the interpretation and appli-
the right to use FMLA leave ployer may require written cation of USERRA and will
shortly after returning to the documentation regarding the investigate complaints, although
workforce from active duty military leave if it is for more a complainant has the option of
have arisen in light of the than 30 days.32 pursing administrative re-
requirements regarding employ- In 2004, Congress passed course.36 A complainant also
ment for the employer preced- the Veterans Benefits Improve- has the ability to request that the
ing the request for FMLA leave. ment Act (VBIA), which U.S. attorney general consider
In a DOL Memorandum dated amended USERRA by adding a their complaint. If determined
July 22, 2002, available on requirement that employers to be meritorious, the attorney
the DOL Web site at http:// provide notice of the rights, general may pursue the case for
www.dol.gov/vets, the DOL privileges, and obligations of the complainant. Individuals
advised that individuals reem- employees and employers under also have the right to pursue
ployed following military duty USERRA.33 On March 10, the matter in civil court them-
are entitled to the rights and 2005, the DOL published an selves if they choose not to file
benefits they would have earned interim final rule, setting forth with VETS or if the attorney
“
defense, who issued regulations noting that
role our citizen soldiers have in certain positions within the federal service
protecting this country, Con- cannot be vacated during critical times
gress has acted to provide job USERRA requires without jeopardizing the nations security.
The secretary of defense directed each
security in their civilian life so employees to provide federal agency head to identify key
that they do not have to choose notice to their em- positions which are not to be filled by
between serving their country ployers of their intent individuals in the Ready Reserve. For
and serving their community. to take military leave…. decades, the FBI director has determined
that agents may not serve in the Ready
While a civilian employer may
Reserve. In reviewing this position, the
face challenges upon the de-
”
Court determined that Congress did not
ployment of employees who intend for courts to interfere with determi-
serve in the reserves, Congress nations of this nature in the federal
has favored protecting job
5
38 U.S.C. §§ 4301-4333. USERRA intelligence agencies.) For more informa-
was enacted pursuant to the War Powers tion regarding the designation of certain
security upon deployment while Clause of the Constitution. Art I, § 8. cl. federal employees as key employees,
attempting to do so in a fair 11. Many of the other federal statutes that employers should refer to regulations
manner to the employer. When address employment matters have their published at 10 C.F.R. § 44.5(b).
assessing the rights and obliga- origins in Congress ability to regulate 12
38 U.S.C. § 4311 (a).
tions of reservists, employers commerce among the states. In basing 13
Id. at § 4311(b).
such actions on a presumption of nexus 14
Id. at § 3411(c). See Fink v. City
also should be aware of state to interstate commerce, thresholds on the of New York, 129 F.Supp. 511, 520
laws that may offer even more size of the workforce have been included (E.D.N.Y.) (motivating factor if the em-
protections to reservists within within many such federal statutes. ployer ... took into account, considered,
that state. 6
38 U.S.C. § 4303(3) and (4). or conditioned its decision on that
7
Brandsasse v. City of Suffolk, 72 consideration.); Sheehan v. Department
F.Supp.2d 608 (E.D. Va. 1999) (City of Navy, 240 F.3d 1009 (Fed. Cir. 2001);
Endnotes and director of personnel for the police Gummo v. Village of Depew, 75 F.3d 98
1
The Department of Labor recently department were subject to liability under (2d Cir. 1996), cert. denied, 517 U.S.
indicated that over 460,000 members of USERRA as city paid the wages and 1190 (1996) (Police officer/reservists
the National Guard and Reserve have been controlled the hours. The director of claim allowed to go to jury after court
mobilized since September 11, 2001. personnel was responsible for employ- determined that officer established his
See 7 Fed. Reg. 46, pp. 12105-12109 ment actions). participation in military training was a
(3/10/2005). 8
38 U.S.C. § 4303. motivating factor for his termination and
July 2005 / 31
18 30
sufficient evidence of animus toward 38 U.S.C. § 4313(a)(1)(A) The FMLA is codified at 29 U.S.C. §
reservists existed to overcome city’s claim and (B). 2601 et. seq. The DOL issued implement-
19
that his termination was based on grounds Id. at § 4313(a)(4). ing regulations located at 29 C.F.R. §
20
unrelated to his absence for military Id. at § 4313(a)(2). 825.100 et. seq.
21 31
training). Id. at § 4313(a)(4). 38 U.S.C. § 4312(a)(1) and (b).
15 22 32
38 U.S.C. § 4311(b). See Brandsasse Id. at § 4313(a). 38 U.S.C. § 4312(f).
23 33
v. City of Suffolk, 72 F.Supp.2d 608 Id. at § 4312(c)(1) - (c)(4). Pub. Law No. 108-454 (Dec 10,
24
(E.D.Va. 1999) (Police officer met burden Id. at § 4313(a)(3). 2004). The notice requirement will be
25
necessary for case to continue against city Id. codified at 38 U.S.C. § 4224. The VBIA
26
for denying him an opportunity to take a Id. at § 4312(e). required the secretary of labor to make the
27
promotional exam when he was ordered Id. text of the notice available by March 10,
28
to participate in military training and See Pub. L. No. 104-191 and 29 2005.
34
retaliating against him for asserting rights U.S.C. §§ 1181 et. seq. For more informa- FR. Doc. 05-4871, p. 12108. to be
protected under USERRA). tion on protections afforded reservists published at 20 C.F.R., Appendix to Part
16
38 U.S.C. § 4311 (c)(2). under HIPPA, refer to the DOL Web site 1002, titled “Your Rights Under
17
USERRA was amended to create an at http://www.dol.gov, under “Frequently USERRA.”
35
exemption from reemployment for pre- Asked Questions for Reservists Being Id.
36
service positions “brief and recurrent” and Called to Active Duty.” 38 U.S.C. §§ 4321- 4322.
29
not likely to continue indefinitely. 38 Id. at § 4316(a).
U.S.C. § 412(de)(1)(C).
While working special duty at a car show and swap meet, Officer
Daniel Johnson of the Jefferson, Wisconsin, Police Department saw a
person collapse near the front gate. When he got to the individual, Officer
Johnson found no pulse or signs of respiration. Immediately, he checked
the victim’s airway and began rescue breathing. With the assistance of
another citizen, Officer Johnson continued to perform CPR until the arrival
of rescue personnel, who used a defibrillator to revive the individual. The
victim then received hospital treatment and ultimately survived. The quick
and decisive actions of Officer Johnson saved the person’s life.
Officer Johnson
Official Business
Penalty for Private Use $300
Patch Call
The town of New Castle, New York, was The patch of the Fort Kent, Maine, Police De-
founded by the Quakers in 1790. The overall shape partment depicts a brown fort situated at the cor-
of its police department’s patch is modeled after an ners of the St. John and Fish Rivers with Clair,
arrowhead. At the center is a scene depicting a New Brunswick, Canada, in the background. The
Quaker and a Native American with the Hudson fort was established in 1839 for monitoring lum-
River in the background. bering activities on both rivers to keep out foreign
trespassers. In 1842, the St. John River became the
international border.