Você está na página 1de 34

June 1999

Volume 68
Number 6
United States
Department of Justice
Federal Bureau of
Investigation
Washington, DC
20535-0001
Louis J. Freeh
Director Features
Contributors' opinions and
statements should not be
considered an endorsement by
the FBI for any policy, program,
or service. Offenders’ Law enforcement officers need to
The Attorney General has
determined that the publication
Perceptual Shorthand 1 recognize that the nonverbal signals
they exhibit can impact their survival.
of this periodical is necessary in
By Anthony J. Pinizzotto
the transaction of the public and Edward F. Davis
business required by law. Use of
funds for printing this periodical
has been approved by the
Director of the Office of Blind Reporting Victims can report sensitive crimes more
Management and Budget. of Sexual Violence 12 safely and still provide law enforcement
agencies with important crime
The FBI Law Enforcement By Sabrina Garcia and
Bulletin (ISSN-0014-5688) is information.
published monthly by the Margaret Henderson
Federal Bureau of Investigation,
935 Pennsylvania Avenue,
N.W., Washington, D.C. Policing the Internet Law enforcement officers need to patrol
20535-0001. Periodical postage
paid at Washington, D.C., and
additional mailing offices.
By Scott Sullivan 18 the Information Superhighway to keep
citizens safe.
Postmaster: Send address
changes to Editor, FBI Law
Enforcement Bulletin, FBI
Academy, Madison Building, Drug Conspiracies To combat drug trafficking, law
Room 209, Quantico, VA 22135. By Edward M. Hendrie 26 enforcement officers and prosecutors
need a thorough knowledge of
Editor conspiracy law.
John E. Ott
Managing Editor
Kim Waggoner
Associate Editors Departments
Glen Bartolomei
Cynthia L. Lewis
Bunny S. Morris
Art Director 5 Research Forum 22 Focus on Investigations
Brian K. Parnell Citizen Resistance Investigative Planning
Assistant Art Director
Denise K. Bennett
16 Book Review
Staff Assistant
Linda W. Szumilo
Teaching Criminal
Justice Ethics
Internet Address
leb@fbiacademy.edu

Cover photo
© George Godoy
Send article submissions to
Editor, FBI Law Enforcement
Bulletin, FBI Academy, Madison
Building, Room 209, Quantico,
VA 22135.

ISSN 0014-5688 USPS 383-310


Offenders’ Perceptual Shorthand
What Messages Are Law Enforcement
Officers Sending to Offenders?
By ANTHONY J. PINIZZOTTO, Ph.D., and EDWARD F. DAVIS, M.S.

© Mark Ide
or unconsciously, for some weak-
ness. Unlike the leopard who kills
only for physical nourishment,
however, human predators pick
their prey for a variety of reasons.
Law enforcement officers know all
too well the unpredictability of the
human predator, but do they realize
that they, the public’s protectors,
can become victims through their
own actions?
ANALYZING
THE RESEARCH
Over the past 10 years, the FBI
has researched various aspects of
law enforcement safety. From this
research and from studies on law
enforcement training, several im-
portant issues have emerged. One
issue relates to the perceptions that
offenders have of police officers.
The research illustrates that the way
offenders perceive officers impacts
how they interact with them.1

P redatory animals always its very existence depends on the


have displayed certain adap- ability to perceive slight weak- To begin with, studies in social
tive behaviors. For example, nesses in otherwise-unremark- psychology have indicated that the
the leopard possesses an amazing able behavior, a predator’s actions way humans carry themselves—in-
ability to look into a large grazing must remain definitive, quick, and cluding how they walk, speak, ges-
herd of gazelle and instantaneously effective. ture, move, and look—communi-
single out from this vast gathering Much like the predators found cates various messages. 2 These
the one most vulnerable to attack. tracking the untamed jungles for messages range from signaling their
The leopard may observe a slight easy victims, human predators stalk apparent happiness to their preoc-
limp, indiscernible to the human urban jungles for equally vulner- cupation, at any given time, with
eye, or some other equally suscep- able targets. Similar to the beasts of what they consider “weighty mat-
tible characteristic unrecognizable the jungle, human predators look ters.” This preoccupation may
to anyone but a predator. Because into crowds and search, consciously make them appear awkward in their

June 1999 / 1
footing or hesitant in their move- means of preparing themselves for convenience store at gunpoint and
ments. Whatever is going on with- potential threats to their safety. fled on foot. During the suspect’s
in the individual is played out in According to the FBI’s research escape, a uniformed officer noticed
external behavior. These internal and studies by other professionals, that he fit the description of the sus-
struggles may prove easily recog- offenders also engage in perceptual pect given in a radio broadcast. The
nizable or well hidden, but they shorthand during the commission of officer called to the young man to
nonetheless affect behavior in some their crimes.4 This discovery war- stop. The offender stated that the
way. rants closer examination for two officer “was not authoritarian, was
Additionally, criminal justice main reasons. First, officers should very polite, and did not take control
literature has attempted to examine become more aware of the nonver- of me or make any attempt to con-
situations where officers can detect bal signals and messages they send trol my actions.” The offender re-
deception based on the verbal and to suspects with whom they inter- marked that as the officer ap-
nonverbal cues suspects and of- act. Second, a greater degree of in- proached him—a suspected armed
fenders exhibit.3 Further, law en- terest within the law enforcement robber—the officer’s gun remained
forcement training academies teach research community may prompt in his holster. The offender stated
officers to observe the body ges- additional study into this important that after ignoring commands from
tures and movements of individuals area of officer safety. Three major the officer to stop and put his hands
they question. For example, watch- cases from the FBI’s research illus- up, he turned and shot him.
ing for potential “runners” while trate the need for such scrutiny. The offender stated that he be-
questioning suspects alerts officers lieved the officer “did not perceive
to those suspects possibly preparing The Articulate Robber Case me as a threat, and so [he] made no
to escape. Through such indicators The first murderer of a police attempt to protect himself.” After
as shifting their feet, moving their officer to bring this matter of the evaluating the officer’s behavior
eyes, and tilting their bodies, sus- offender’s perceptual shorthand to and tone of voice during this en-
pects may suggest their intentions the FBI’s attention was an articulate counter, the offender decided that
to flee. This “perceptual shorthand” young man, only 18 years old at the he had the edge, which resulted in
gives officers a quick and effective time of the killing. He had robbed a the officer’s death. By his own ad-
mission, the offender perceived a
vulnerability in the officer’s actions
and took advantage of it.
The Voice of God Case
In another case, an offender
stated that he had “planned to kill an
officer” on the day he actually mur-
dered one. This offender was a
small-time drug dealer and a major
drug abuser. He stated that he had
received a message from God that
he should kill a police officer be-
cause the police were ruining his
drug business. To accomplish this,
he proceeded to a busy intersection
Dr. Pinizzotto is an instructor in Mr. Davis is an instructor in the near his home to find an officer
the Behavioral Science Unit at Behavioral Science Unit at the to kill. Because of his degree of
the FBI Academy. FBI Academy. drug abuse, his plan lacked clear

2 / FBI Law Enforcement Bulletin


and precise thinking. He neither easy.” What the offender did not moved through the crowd. After ob-
considered how he would confront know was that the victim officer, serving the next officer he came
an officer at this particular location, with 10 years of law enforcement upon, the offender removed his gun
nor did he obtain a weapon to use. experience, had refused to wear his from his pants pocket and shot the
However, arriving at his prede- department-issued soft body armor officer in the head. This officer
termined location, he observed a and recently had received a substan- stated that he saw the offender’s
uniformed sergeant at a service sta- dard performance evaluation. In gun “at the last second...just prior to
tion having a tire repaired on his addition, in another incident the the shot.” His quick hand move-
marked patrol vehicle. By his ad- year before, a subject had taken ment shifted the weapon from be-
mission, the offender approached the officer’s service weapon, but tween his eyes, deflected the path of
the sergeant intending to kill him. the officer’s partner had shot and the bullet, and saved his life.
However, he stated that “by looking killed the subject. Apparently, the The first officer never realized
at him, I could tell that he would be victim officer had sent assorted that the offender had targeted him.
too difficult to overcome.” When nonverbal messages to a variety of Nor did he know that whatever he
questioned about how the sergeant individuals—officials, fellow offi- was doing—whether the way he
looked or what aspects of his ap- cers, and offenders—before his looked, the way he walked, or the
pearance or demeanor caused the death. way he spoke to those around
offender to believe that he could not him—had sent a message that he
“overcome” the sergeant, he was was in control. Further, the offender


unable to say anything except “he stated that he had no prior contact
looked too difficult to take.” When with either of these officers before
questioned further about his percep- ...nonverbal behaviors the incident. As in the other cases,
tion of the sergeant’s appearance, and actions can this offender had difficulty articu-
the offender stated that he was not lating exactly what cues he per-
particularly large in size or menac-
communicate the ceived from these two officers that
ing in appearance but “just looked internal disposition affected his decision.
like he could handle himself.” of an individual.
The offender remained at this IMPLEMENTING


location for approximately 2 hours THE FINDINGS
until a traffic accident occurred, and In many of the cases examined,
a one-officer patrol vehicle re- the offenders could not articulate
sponded to the scene. The offender The “Dope Boys” Case the exact cues they perceived re-
observed the officer for only a short The last incident involves an garding the targeted officer’s ap-
time before he “knew this was my individual who assaulted a law en- pearance, gait, or behavior. How-
victim.” Having made that decision, forcement officer in order to “send a ever, killers and assaulters alike
the offender casually walked over message to the cops in my city.” stated that if their victims generally
to the officer and struck him with He decided to deliver his mes- gave the impression that they ap-
his fist. As the officer fell to the sage, “quit messing with the ‘dope peared authoritative (not authoritar-
ground, the offender removed the boys’,” by killing an officer. During ian), seemed resolute, or acted pro-
officer’s service weapon and shot a community celebration, the armed fessionally, then the offenders were
him six times. offender approached one of several reluctant to initiate an assault.5 This
When asked what criteria he officers assigned to the parade route statement does not mean that offi-
had used to evaluate the officer, the for traffic and crowd control, in- cers should not have a personable
offender again had difficulty put- tending to shoot him. However, he approach with the public or that
ting his thought process into words. stated that after looking at the first they should not employ community
He could recall only that the officer officer he approached, “I knew he’d policing practices. It does mean,
appeared “overweight and looked be a difficult target,” so the offender however, that all officers must

June 1999 / 3
consider the messages that their ac- community should conduct addi- officers no longer fall victim to
tions and behaviors send. Also, they tional research to find the key to predatory offenders using percep-
must maintain a high level of vigi- unlock the cues that offenders tual shorthand to select the most
lance and preparedness in carrying observe in officers they choose to vulnerable targets.
out their assigned duties. Two rules attack.
remain true: officers should treat Endnotes
everyone the way they would like to CONCLUSION 1
A.J. Pinizzotto and E.F. Davis, “Cop
be treated, and they should protect Just as predatory animals Killers and Their Victims,” FBI Law Enforce-
themselves so they can continue to search out the weakest prey, human ment Bulletin, December 1992, 9; “Killed in the
Line of Duty: Procedural and Training Issues,”
protect their communities. predators employ the same tactic. FBI Law Enforcement Bulletin, March 1995, 1;
Moreover, these findings dem- Law enforcement officers must re- “Above and Beyond the Call of Duty:
onstrate the need for greater re- member that while they observe Preventing Off-duty Officer Deaths,” FBI Law
search in the area of perceptual Enforcement Bulletin, April 1996, 1; “Inter-
viewing Methods: A Specialized Approach Is
shorthand used by offenders when


Needed When Investigating Police Deaths,”
they encounter law enforcement of- Law and Order 44 (1996): 68; and U.S.
ficers. Existing research indicates Department of Justice, Federal Bureau of
Investigation, Killed in the Line of Duty: A
that nonverbal behaviors and ac- ...research Study of Selected Felonious Killings of Law
tions can communicate the internal illustrates that Enforcement Officers (Washington, DC, 1992)
disposition of an individual. For ex- and In the Line of Fire: Violence Against Law
ample, a depressed individual often
the way offenders Enforcement (Washington, DC, 1997).
exhibits slow body movements, a perceive officers 2
R.A. Hinde, ed., Nonverbal Communica-
lack of energy, and the inability to impacts how they tion (Cambridge, MA: Cambridge University
Press, 1972); E.E. Jones, Interpersonal
concentrate or focus. These exter- interact with them. Perception (New York: Freeman, 1990); S.T.
nal behaviors send certain mes- Fiske and S.E. Taylor, Social Cognition (New


sages, and observers receive those York: McGraw-Hill, 1991); and W.B. Pearce,
Nonverbal Communication (New York: Harper
messages for good or ill. An Collins, 1994).
officer’s casual, “routine” approach 3
C.G. Brougham, “Nonverbal Communica-
to a vehicle during a traffic stop nonverbal messages from the indi- tion: Can What They Don’t Say Give Them
may communicate to the offender a viduals they question, these indi- Away?” FBI Law Enforcement Bulletin, July
1992, 15; J.P. Buckley and P.A. Mullenix, “Use
possible mental or emotional dis- viduals also gather information of Behavioral Symptoms in the Search for the
tractibility. Further, the absence of from them. Subtle nuances that oth- Truth: A Tool for the Prosecutor,” Polygraph
certain appropriate behaviors on the ers would not view as weaknesses 15 (1986): 40; D.K. Mills, “Deception,”
officer’s part also might communi- become opportunities for human American Probation and Parole Association
Perspectives 15 (1991): 6; and F.W. Winkel, L.
cate dangerous messages to the predators to exploit. Law enforce- Koppelaar, and L. Greuel, “Police Officers’
offender. For example, situations ment officers must protect them- Beliefs About Cues Associated with Deception
in which officers neglect to follow selves against such individuals who in Rape Cases,” in Psychology and the Law:
suspects’ body movements during search for easy prey and strike with International Perspectives, ed. F. Losel, D.
Bender, et al. (Germany: Walter de Gruyter &
questioning, especially hand move- little or no warning. Company, 1992).
ments or shifts in body positions, The law enforcement commu- 4
B.A. Jacobs, “Undercover Deception
may communicate their lack of nity must ban together to make of- Clues: A Case of Restrictive Deterrence,”
readiness to act. When received ficers aware of the importance of Criminology 31 (1993): 281 and “Crack
Dealers and Restrictive Deterrence: Identifying
by human predators, such messages understanding how their behaviors Narcs,” Criminology 34 (1996): 409.
could prove deadly to officers and actions impact their survival 5
Supra note 1.
who remain unaware of the impact even when performing the most
of their behaviors and actions. basic, and sometimes mundane,
Therefore, the law enforcement official duties. Only then will

4 / FBI Law Enforcement Bulletin


Research Forum
Assessing the Patterns 4) Was the suspect attempting to evade arrest by
flight?
of Citizen Resistance
5) Was the suspect actively resisting arrest?1
During Arrests Recognizing the importance of these factors and
By Darrell L. Ross, Ph.D.
© Mark Ide using the fifth factor as the basis for research, the
author analyzed various types of citizen resistance
against officers during common types of arrest
circumstances. Officers define resistance as verbal or
physical behavior that opposes, hinders, prohibits or
diminishes the capacity of the officer to verbally or
physically control that individual during a lawful
arrest. During an arrest, citizens may manifest a range
of overt resistive behaviors, including verbal abuse;
hostile and threatening demeanor; passive actions
(such as actions taken during a protest); actions that
allow the suspect to escape the officer’s physical
control; and physical actions of assault, including
serious bodily injury or death.
Research on the use of force has increased
significantly over the last two decades. Past research-
ers primarily focused their efforts toward deadly force
and firearm issues due to their high profile, potential
for liability, and more accurate record-keeping
capabilities that simplified data collection.2 In com-

W hether it entails stopping a speeding car,


moving a group of rowdy youths on a
street-side, quieting a family dispute, or arresting a
parison, limited research exists on the nature and
extent of less-than-lethal police force.3 Even less
research has been conducted into the dynamics of
dangerous felon, police work frequently involves police-citizen encounters and the types of resistive
actual or potential resistance. In seconds, officers behavior police officers routinely confront during
interpret the behavior of the individuals they confront arrest.4 Identifying common types of resistance may
and select an appropriate level of force in response. enhance an officer’s ability to better assess an arrest
Deciding whether the use of force is objectively situation and an individual’s demeanor in order to
reasonable requires careful balancing of the nature of determine and justify the appropriate degree of force.
the intrusion on the suspect’s Fourth Amendment
rights against the countervailing interests of the state METHODOLOGY
to maintain order. Noting that no precise definition or
mechanical application for this test of reasonableness Instrumentation and Data Collection
exists, the U.S. Supreme Court established five In order to analyze the variables found in police-
important factors to evaluate the facts in alleged cases citizen encounters, the author designed a subject
of excessive force. resistance inventory (SRI). The author used this
1) What is the severity of the crime at issue? inventory to collect data on the citizen and the officer
and to address three research questions, specifically,
2) Was the suspect an immediate threat to the during what type of arrest circumstance most officers
officers or others? can expect resistance, what types of resistance
3) Were the circumstances tense, uncertain, and officers encounter in these arrest circumstances,
rapidly evolving? and whether the citizen was under the influence or

June 1999 / 5
suspected to be under the influence of alcohol or 6) Aggravated active aggression—actions in-
drugs during the arrest. tended to cause serious bodily harm or death to
The author used six components of subject the officer (e.g., attacks usually involving a
resistance to identify the types of resistance encoun- weapon).
tered during arrest. Designed to assist police in The police departments participating in this study
assessing citizen resistance during arrest,5 a force used this resistance continuum as a matter of practice
continuum gives officers a clearer picture of the force and policy to help officers select a level of force in
that they lawfully may use in a given situation, which either an arrest or confrontation. All patrol officers
they cannot glean by reading statutes or case law.6 and their supervisors received at least 4 hours of
B. K. Siddle designed a resistance continuum annual training by certified instructors in the force
using six generic levels of subject resistance. This continuum for 2 years prior to the study. Officers
continuum assists police administrators in designing a completed a use of force form when they employed
use of force policy and guides force during an arrest. These forms
officers in making justifiable listed the six levels of resistance
decisions regarding appropriate from the resistance continuum,
levels of force. The resistance


and reporting officers checked the
continuum also recommends appropriate level of resistance on
various types of control measures The use of force the form, as well as provided a
to employ, ranging from verbal by the police narrative description of the force
control to lethal force. This study incident.
remains a critical
compared the FBI’s eight arrest The SRI used these six types
circumstance variables7 with the issue for both
the police and of resistance to identify types of
following six variables of the SRI: citizen resistance. A supervisor
1) Psychological intimida- the public.
from each department transferred
tion—nonverbal cues from


the information from the use of
citizens that indicate their force report to the database. This
behavior, appearance, body information included citizen and
language, and physical readi- officer characteristics, all types of
ness (e.g., stance, arms folded across chest, resistance encountered by the officer, the circum-
clenched fists, etc.). stances under which the arrest occurred, and whether
2) Verbal noncompliance—verbal expressions or the citizen appeared to be under the influence of
responses that indicate the suspect’s unwilling- alcohol or other drugs.
ness to comply with the officer’s commands. The reporting officers, due to their perceptions,
3) Passive resistance—physical actions that do may have reported some arrests in a biased manner.
not prevent the officer’s attempt to control (e.g., Additionally, for similar reasons, the individuals
sitting in protest, becoming physically limp, etc.). entering the information could have coded it in a
biased manner. Therefore, the findings reflect re-
4) Defensive resistance—physical actions that ported arrest or resistance situations based on the
attempt to prevent the officer’s control without officer’s perception of the incident, the reporting
harming the officer (e.g., pulling away from the accuracy of the arresting officer(s), and the level of
officer’s grip, twisting away, running away, etc.). accuracy ensured by the individual entering the
5) Active aggression—physical actions of assault information. At the end of the study, the author
with the intent of harming the officer physically analyzed all of the submissions from each of the
(e.g., assaults using personal weapons). departments.

6 / FBI Law Enforcement Bulletin


Other Variables incidents, one officer encountered one citizen; in 24
In 1995, the FBI reported eight common types of percent of the incidents, two officers encountered one
circumstances in which officers are assaulted.8 The citizen; and in 8 percent of the incidents, three or
author used these eight arrest circumstances as the more officers encountered one citizen.
variables in which the six types of resistance were
examined. The FBI’s eight circumstances include Characteristics of Citizens
arrest situations (i.e., both misdemeanor and felony Analysis showed that patrol officers encountered
arrests); disturbance calls; traffic stops; suspicious resistance predominately from male citizens approxi-
person calls; calls involving individuals who are mately 22 years old. In approximately 89 percent of
mentally unstable; prisoner handling, transport, and the incidents, the officer encountered citizens under
custody; ambush situations; and civil disorder. The the influence, or suspected to be under the influence,
author also analyzed the variable of chemical influ- of alcohol or drugs. Fifty-one percent of the resisting
ence (i.e., under the influence or presumed to be suspects were white, 43 percent were black, and 6
under the influence of alcohol or other drugs) to percent were Hispanic. One officer encountered more
determine its relationship between © Mark Ide
than one individual in fewer than
the type of arrest circumstance and 10 percent of the incidents.
the type of resistance. The study found that officers
experienced defensive resistance
Sample more than any other type. Resis-
Fifty police departments use tance during handcuffing and
Siddle’s resistance continuum as a active aggression, where citizens
matter of policy. The author made physical contact with the
selected a random sample of 25 of officer, accounted for other
these agencies to participate in the significant types of resistance.
study and sent a letter to each The most common form of active
department explaining the nature aggression toward the officer was
of the research and requesting their a punch, followed by a push and a
voluntary participation. Seventeen kick. In approximately 46 percent
of the agencies agreed to partici- of the incidents, the subject
pate, including 12 municipalities, 4 county sheriff’s confronted the officer with verbal noncompliance to
offices, and 1 state police agency. Geographically the arrest orders.
dispersed, these agencies employ from 100 to 1,000 The data indicated that during an arrest, an officer
sworn patrol officers with a majority of the depart- may experience more than one type of resistance with
ments employing 326 officers. no order or pattern. At any time during the arrest, the
officer may confront resistance, and depending on the
FINDINGS dynamics of the arrest, the resistance may escalate in
severity or de-escalate into complete cooperation.
Characteristics of Patrol Officers
Analysis revealed that white officers who are Resistance and Arrest Associations
male and have served an average of 7.6 years as The author also analyzed the relationships
police officers remain more likely to experience between the arrest circumstance, the six types of
resistance as compared to other officers. Additionally, resistance, and the influence of alcohol or drugs. The
white officers accounted for approximately 76 percent results show that five of the resistance types are
of the incidents reported, compared to 22 percent associated with six of the eight arrest circumstances.
involving black officers and 2 percent involving In 27 percent of the arrest circumstances, misde-
Hispanic officers. In approximately 68 percent of the meanor arrests (e.g., disorderly persons, moving

June 1999 / 7
violations, etc.) remained the most common types of and active aggression. While alcohol and drugs
arrest circumstances in which patrol officers encoun- showed a significant relationship with several types of
tered resistance. The study revealed that the second resistance and arrest circumstances, these findings
most common type of arrest circumstances were were based on the perception of the reporting officer.
disturbance calls (24 percent), which can involve bar Officers seldom administered a blood or chemical test
fights, domestic disputes, person with a gun, and the to measure the actual amount of substance in the
like, followed by traffic stops (15 percent) and felony body.
arrests (14␣ percent). These four arrest circumstances
accounted for 80 percent of citizen resistance. DISCUSSION
The author excluded resistance in the form of The influence, or suspicion of influence, of either
psychological intimidation from the analysis because alcohol or drugs was strongly associated with citizen
it was reported in only eight of the resistance. This factor becomes
incidents. Disturbance calls important because in 68 percent of
proved the strongest correlation the incidents of resistance, one
with verbal resistance, defensive patrol officer encountered one
resistance, and active aggression.
This combination suggests that
officers will encounter an escala-
tion from verbal statements to
“ The influence, or
suspicion of influence,
of either alcohol or
suspect, and the likelihood of
potential resistance increases.
Strong relationships existed be-
tween responding to disturbance
higher forms of physical resis- drugs was strongly calls, conducting traffic stops, and
tance when responding to these associated with investigating suspicious persons or
calls. The research also revealed circumstances and the citizen’s
strong associations between
citizen resistance. being under the influence of
defensive resistance and verbal alcohol or drugs. These three arrest
noncompliance and misdemeanor
arrests, disturbance calls, and
traffic stops. A moderate associa-
tion existed between these types of behavior and
” circumstances accounted for 47
percent of the arrest situations
where severe forms of resistance
(defensive resistance and active aggression) occurred.
felony arrests. Not only can these types of arrest situations
The study found that people who are mentally ill produce higher levels of physical resistance, but they
frequently do not resist verbally but exhibit higher also can necessitate higher forms of control measures
levels of physical resistance. This type of arrest than other arrest circumstances. Therefore, patrol
circumstance involved defensive resistance, active officers should remain aware of the arrest environ-
aggression, and aggravated active aggression and ment and citizen behaviors under these circumstances,
revealed a moderate association with alcohol or drug cuing in on the demeanor of the suspect.
influence. Felony arrests showed higher levels of Resistance also may occur when officers confront
physical resistance, including active aggression and a sober person. On many occasions, sober individuals
aggravated active aggression. offer resistance, and officers must remain cognizant
The influence of alcohol or drugs affects the of their demeanor, stance, and proximity, as well.
nature of citizen resistance during arrest. Disturbance This research has found that the types of resis-
calls and traffic stops represent two of the most tance police commonly encounter occur in combina-
common types of arrest circumstances associated tions or patterns, although not in any sequential order.
with alcohol or drugs and resistance. Investigating The most common pattern of resistance involves
suspicious persons or circumstances also may be verbal noncompliance, escalating to defensive resis-
associated with subjects under the influence, particu- tance, and proceeding to active aggression. This
larly when the subject exhibits defensive resistance behavior pattern occurred in approximately two-thirds

8 / FBI Law Enforcement Bulletin


of the arrest circumstances. The influence of alcohol dynamic and rapidly evolving and involves various
or drugs increases the possibility that a citizen will combinations of resistance in a significant percentage
resist physically, challenge verbally, or use profanity of incidents. Therefore, justifying the most appropri-
against the officer prior to, during, and/or after the ate course of action must start with the nature of the
officer makes the arrest. Combining these four factors arrest, the actions of the suspect, the perception of
(i.e.,␣ verbal noncompliance, defensive hostility, active threat by the officer, and the resources available to the
aggression, and intoxication) in an arrest circum- officer to make the arrest. Principles of escalation and
stance will require that the officer escalate the amount de-escalation of force—including verbal diffusion and
of force needed to control the resistant individual. restraint techniques and the use of proper equip-
However, not every arrest circumstance will progress ment—remain instrumental to the officer in control-
in this fashion. Officers may encounter active aggres- ling various forms of resistance.
sion or other forms of resistance in any manner as Interestingly, veteran officers may be more likely
different variables enter the arrest circumstance. to encounter resistance from a citizen under the
Officers must realize that the nature of resistance is influence of alcohol or drugs. It appears that over

Types of Resistance and Forms of Active Aggression

Resistance Type Percentage of Incidents (N=567)


Psychological intimidation 1.4 (8)
Verbal noncompliance 46.2 (262)
Passive resistance 19.6 (111)

Defensive resistance 65.3 (370)


Active aggression 47.6 (270)
Punch 28.1 (76)

Push 24.4 (66)


Kick 21.5 (58)
Slap 17.0 (46)

Headbutt 6.3 (17)


Attempt to disarm 2.6 (7)

Aggravated active aggression 8.6 (49)


(The percentages do not total 100 because one incident could involve different types of resistance.)

June 1999 / 9
time, some veteran officers have become somewhat The development or revision of use of force
lax in recognizing and remaining alert to certain body policies remains a significant concern for the police
language manifested by suspects prior to physical administrator. Administrators should develop policies
resistance. In slightly fewer than 50 percent of the that direct officers to use reasonable force based on
incidents, subjects physically attacked officers prior the resistant behavior of citizens. Police administra-
to arrest. Patrol officers who encountered resistance tors can redesign their current use of force policy by
predominately worked alone and may have deviated integrating a resistance continuum into the policy. A
from established patrol and arrest procedures, which written policy cannot cover every situation an officer
could increase the vulnerability of the officer in the may face, but this study revealed that officers will
mind of the resisting individual. Citizen resistance encounter combinations of resistance patterns in
and officer seniority also may reflect different pa- varying arrest circumstances. By integrating a resis-
trol assignments and may result from an officer’s tance continuum into a force policy, officers can
ability or inability to defuse a potentially resistant recognize types of resistance that will guide them
encounter.9 toward the appropriate force response in an arrest
Although incidents of handling a suspect with a situation. This type of policy also can assist in setting
mental illness accounted for 12 percent of the resist- the standard for administrators to use in evaluating
ing circumstances, officers more proper decision making when
likely encountered more severe officers decide to use force.
physical resistance—such as Beyond policy implications,
defensive resistance, active study findings demonstrate that
aggression, and aggravated active
aggression—with such suspects.
Drugs or alcohol can have a
significant influence in these
“ ...an officer may
experience more than
veteran officers should receive
refresher training in departmental
force policy that emphasizes
resistance, threat recognition, and
one type of resistance
encounters, as well. Patrol appropriate force methods for
with no order or pattern
officers working alone who controlling resistance. Adminis-
respond to calls of this nature during an arrest. trators, as a matter of policy,
must remain alert to the behav- should conduct annual or bian-
ioral cues of the person and
request backup when practical.
These types of arrest situations
remain unpredictable due to the
” nual training for all veteran
officers (in a resistance con-
tinuum) that will enhance offic-
ers’ perceptions of resistance and,
emotional state of the individual, the potential for in turn, direct them toward appropriate force decision
higher levels of physical resistance, and the presence making. Police trainers should design classroom
of alcohol or drugs. training based on prior arrest reports or actual video-
taped confrontations, using this material to evaluate
RECOMMENDATIONS and recognize various types of arrest resistance
Upon initial contact, officers should keep a safe patterns. Trainers, at a minimum, should structure
distance between themselves and the suspect in order safe role-playing exercises around resistance encoun-
to determine the behavior of the individual and to tered during traffic stops, disturbances, and misde-
decide a proper course of action if the suspect sud- meanor or felony arrests. This type of realistic
denly attacks them. Due to the unpredictable nature of training will enhance officers’ abilities when respond-
suspects under the influence and the likelihood that ing to resistance situations, allowing them to apply
resistance may occur, paying attention to the behavior objective, reasonable force measures based on the
of the suspect and the dynamics of the arrest circum- situation. Instructors should videotape the training
stance becomes paramount for officer safety. for later evaluation and discussion in the classroom.

10 / FBI Law Enforcement Bulletin


CONCLUSION Abstracts International 46 (1985): no. 2449A, University Microfilms
No. DA8-519744; D.H. Bayley and J. Garofalo, “The Management of
The use of force by the police remains a critical Violence by Police Patrol Officers,” Criminology 27 (1989): 1-27; R.J.
issue for both the police and the public. Inappropriate Friedrich, “Police Use of Force: Individuals, Situations, and Organiza-
responses by the police to perceived resistance have tions,” Annals of the American of Political and Social Science 452
led to deaths, citizen and officer injuries, riots, a (1980): 82-97; J. Garner, et al., “Understanding the Use of Force by and
Against the Police,” Research Brief (Washington, DC: National Institute
widening gap of distrust between communities and of Justice, 1996); R.E. Worden, “The Causes of Police Brutality: Theory
police agencies, and an increase in criminal and civil and Evidence on Police Use of Force,” in And Justice For All: Under-
liability. Officers must base their use of physical force standing and Controlling Police Abuse of Force, ed. W.A. Geller and H.
response on verbal threats and physical behaviors Toch (Washington, DC: Police Executive Research Forum, 1995).
4
D.H. Bayley and J. Garofalo, “Patrol Officer Effectiveness in
demonstrated by the suspects they Managing Conflict During Police-Citizen
encounter. © Mark Ide Encounters,” in the Report to the New York
By implementing a force State Commission on Criminal Justice and the
policy that integrates a resistance Use of Force, New York State Commission on
Criminal Justice, 1987, 3, B1-88; R.G.
continuum and by providing Greenleaf and L. Lanza-Kaduce, “Sophistica-
regular training for their officers, tion, Organization, and Authority-Subject
departments provide guidance to Conflict: Rediscovering and Unraveling
officers. This two-pronged Turk’s Theory of Norm Resistance,”
Criminology 33, no. 4 (1995): 565-585; J.D.
approach can enhance law Hirschel, et al., “The Relative Contribution of
enforcement officers’ abilities to Domestic Violence to Assault and Injury to
identify types of citizen resistance Police Officers,” Justice Quarterly 11 (1994):
and determine appropriate force 99-117; V.␣ McLauglin, Police and the Use of
Force: The Savannah Study (Westport, CT:
options. By developing applicable Praeger Publishers, 1992); A. Reiss, Jr., The
policies and training programs, Police and the Public (New Haven, CT: Yale
departments demonstrate their University Press, 1971).
5
concern for their officers’ safety G. Connor, “Use of Force Continuum,”
Law and Order, March 1991, 30-32; J.C.
while preparing them to make the Desmedt, “Use of Force Paradigm,” Journal of
best choices possible. Police Science and Administration 12, no. 2 (1984): 170-176; Federal
Law Enforcement Training Center, 1990 Use of Force Model: Orientation
Booklet, (Glynco, GA: Federal Law Enforcement Training Center,1990);
Endnotes K.␣ Parsons, The Confrontational Continuum (Appleton, WI: Kevin
1
Graham v. Conner, 109 S. Ct. 1865 (1989). Parsons and Associates, 1980); R. L. Parsons, “Police Use of Force
2
A. Binder and L.A. Fridell, “Lethal Force as a Police Response,” Matrix,” (Lansing, MI: Michigan Law Enforcement Officer Training
Criminal Justice Abstracts 16 (1984): 250-280; A. Binder and P. Scharf, Council, 1984); B.K. Siddle, Defensive Tactics Instructor Manual
“The Violent Police Citizen Encounter,” Annals of the American (Millstadt, IL: PPCT Publications, 1984).
6
Academy of Political and Social Science 452 (1980): 111-121; J.J. Fyfe, V. McLaughlin, Police and the Use of Force: The Savannah Study
“Shots Fired: An Examination of New York City Police Firearms (Westport, CT: Praeger Publishers, 1992).
7
Discharges,” (Ph.D. diss., State University of New York, 1978); J.J. Fyfe, U.S. Department of Justice, Federal Bureau of Investigation, Law
“Administrative Interventions on Police Shooting Discretion,” Journal of Enforcement Officers Killed and Assaulted (Washington, DC, 1995).
8
Criminal Justice 7 (1979): 309-323; J.J. Fyfe, “Police Use of Deadly Ibid.
9
Force: Research and Reform,” Justice Quarterly 5 (1988): 165-205; W.A. M. Blumberg, “The Use of Firearms by Officers: The Impact of
Geller, “Deadly Force: What We Know,” Journal of Police Science and Individuals, Communities, and Race,” (Ph.D. diss., State University of
Administration 10 (1982): 151-177; W.A. Geller, “Officer Restraint in the New York, 1983); and V. McLaughlin, Police and the Use of Force: The
Use of Deadly Force: The Next Frontier in Police Shooting Research,” Savannah Study (Westport, CT: Praeger Publishers, 1992).
Journal of Police Science and Administration 13 (2) (1985): 152-171; D.
Jacobs and D. Britt, “Inequality and Police Use of Deadly Force: An Dr. Ross is an associate professor in the criminal justice
Empirical Assessment of a Conflict Hypothesis,” Social Problems 26 program at East Carolina University in Greenville, North
(1978): 401-411; and K. Matulia, “A Balance of Forces,” (Alexandria,
Carolina.
VA: International Association of Chiefs of Police, 1982).
3
E.B. Croft, “Police Use of Force: An Empirical Analysis,” (Ph.D.
diss., State University of New York, 1985), abstract in Dissertation

June 1999 / 11
© Don Ennis

Blind Reporting
of Sexual Violence
By SABRINA GARCIA, M.A., and
MARGARET HENDERSON, M.P.A.

I magine a woman having car What if she never tells anyone sacrifice the confidentiality she de-
trouble. She accepts a ride with about the assault? What if the as- serves. In fact, an anonymous re-
a man, and he rapes her. Af- sailant rapes again? Indeed, up to 84 porting system enables law enforce-
terward, she feels foolish, hurt, percent of all sexual assaults go un- ment investigators to gain
ashamed, vulnerable, and fright- reported,1 leaving victims with un- information about crimes of sexual
ened. She questions her judgment. resolved trauma, assailants unac- violence that likely otherwise will
Perhaps the rapist threatened to hurt countable for their crimes, and law go unreported, while it allows vic-
her if she told anyone; perhaps she enforcement officials uninformed tims an opportunity to gather legal
fears the reaction of her friends or about the complete picture of sexual information from law enforcement
family if they find out about it. Per- violence in their communities. without having to commit immedi-
haps she has followed enough rape Now imagine that she has an ately to an investigation. Victims
cases in the media to know that vic- option that allows her to share have a chance to find out what the
tims often are revictimized by the critical information with law en- process is like, what chance they
legal and judicial processes. forcement without requiring her to have of filing successful charges,

12 / FBI Law Enforcement Bulletin


and what it will be like to work with
the investigator. In the long run, vic-
tims, investigators, and the commu-
nity all benefit from blind reporting.
Benefiting from a
Blind Reporting System
According to the FBI, only 16
percent of sexual violence victims
report the crime to law enforce-
ment.2 Victims of stranger rape re-
main more likely to report the crime
Ms. Garcia serves as a crisis Ms. Henderson serves as
than victims who get raped by counselor for the Chapel Hill, executive director for the Orange
people they know. Even victims North Carolina, Police County Rape Crisis Center in
who report the crime often choose Department. Chapel Hill, North Carolina.
not to report the circumstances of
the assault, the identity of the assail-
ant, or the nature of the violence. As
a result, when law enforcement of- talking to an investigator with los- investigator gains the opportunity
ficers review the reported incidents ing control again, a repeat of what to provide the appropriate commu-
within the community, the numbers happened during the sexual assault. nity services of sharing informa-
reflect only a fraction of the vio- Having evidence collected, risking tion, answering questions, and mak-
lence that actually occurs. Law en- a breach of confidentiality, being ing referrals for services to such
forcement may not have the most disbelieved or criticized by others, agencies as health clinics or rape
important information about local or enduring a cross-examination by crisis centers.
offenders’ patterns of behaviors or a hostile defense attorney all may In some states, victims who file
the characteristics of emerging blend together as one potential blind reports can receive rape
high-risk situations or locations. threat to the victim. Yet, if the pro- victim’s assistance, which provides
Therefore, law enforcement ben- cess feels safe to victims, they will compensation for the costs associ-
efits from accepting blind reports be more likely to cooperate with a ated with an emergency rape exami-
because investigators have a clearer formal investigation. Blind report- nation or other related expenses.3
picture of sexual violence in their ing lets victims take the investiga- Some victims may be reluctant to
communities. Moreover, when in- tive process one step at a time, al- have medical evidence collected be-
vestigators can pinpoint dangerous lowing time to build trust between cause they cannot afford the $600–
scenarios, they can better educate the investigator and the victim and 850 expense for the emergency
the public, thus improving commu- making the whole process feel more room or because they do not want
nity relations and possibly garner- manageable. the treatment to show up on insur-
ing information on other neighbor- Describing the assault to a law ance and billing records.
hood crime problems. enforcement professional gives the Even victims who decide not to
Blind reporting also provides victim an opportunity to affirm that pursue legal charges alone may
other benefits. In the immediate af- the assailant did, in fact, commit a come forward willingly to support
termath of a trauma, a victim simply crime, which helps in the personal other victims of the same assailant.
may not have the emotional or process of healing from the trauma Victims who initially hesitate to file
physical capacity to make a com- and can help build the victim’s a formal report at the time of the
mitment to a full investigation and a confidence in filing charges against assault may change their minds
court trial. The victim may equate the rapist. At the same time, the when given the option of supporting

June 1999 / 13
or being supported by other victims investigator prefers, represents may be so afraid of losing
of the same assailant. The testi- more than would otherwise confidentiality that they will
mony of a prior victim can help the be available and may prove disclose information only
investigator build the case and the useful in building other through a third party, such as
district attorney prove it by estab- cases. a rape crisis center or battered
lishing a pattern of behavior by the 3) accept the information women’s shelter. This option
accused. whenever the victim might allows the victim to maintain
offer it. A delay in disclosure a comfortable distance from
Establishing a Blind the law enforcement process
Reporting System is not an indicator of the
validity of the statement. while still conveying informa-
A blind report requires the Rather, feelings of self-blame, tion to the appropriate
same sensitivity and patience from shame, isolation, fear, or officials.
officers that a formal police report denial may motivate victims 5) clarify options for future
does. Investigators achieve success- to remain silent about their contact. Victims may prefer to
ful reporting by granting victims the assaults. Yet, when victims be contacted again under
respect and dignity given to any have support from people specific conditions or not at
crime victim and, in this case, ano- who validate that the assault all. For example, if the of-
nymity, as well. To develop a suc- was, in fact, a crime, they fender later is charged with
cessful blind reporting system, law become more likely to choose another assault, would the
enforcement agencies should victim want to be notified to


1) establish a policy of consider filing a formal
confidentiality. The key to a report? Would the victim offer
successful blind reporting additional clarification if
system is building trust
The key to a doing so became critical for
between the rape victim and successful blind another case? On the blind
the investigator, who must reporting system is report, investigators should
understand that the assailant building trust between document where, how, and
betrayed the victim’s trust in the rape victim and the under what circumstances
people. The law enforcement investigator.... the victim may be contacted.
agency must define clearly and The report should specify


uphold unconditionally its clearly whether officers
policy of confidentiality. can leave messages on answer-
2) accept the amount of ing machines or with other
to report the assault immedi- people who may answer the
information offered. Investiga-
ately. Otherwise, victims may phone.
tors must allow victims to
wait until they begin to heal 6) maintain blind reports in
disclose as little or as much
or until they gather the per- separate files. The blind report
information as they desire. By
sonal strength necessary to is not an official police report.
asking victims to clarify
trust law enforcement with Keeping it in a separate file
particular points, investigators
their disclosures. Other victims within the investigative
let them choose to do so. In
may come forward only when division or with a designated
contrast, putting pressure on
they hear of a similar crime sexual assault investigator
victims to convey more
occurring or of the same avoids inappropriate use of the
information than they want
assailant hurting someone else. information it contains and
may cause a breakdown.
Any amount of information 4) accept information from maintains the confidentiality
given, even if less than the third parties. Some victims promised the victim. The blind

14 / FBI Law Enforcement Bulletin


The Benefits of Blind Reporting—
report should not become
available to the records • builds trust between officers and victims, who may decide to
division until the victim proceed with a full investigation;
chooses to file a formal report. • provides information about the patterns of behavior of repeat
Until that time, only officers offenders, which can be used to identify assailants or build
assigned specifically to sexual cases for court;
assault cases should have • presents a better view of the degree of sexual violence in the
access to the blind report. community by providing more information on more assaults;
7) categorize the information • may help prevent crime by educating the public about high-
contained within the blind risk scenarios or locations gleaned from both blind and full
report. Analyzing the informa- reports; and
tion in the report helps the
investigator identify specific • garners trust in the community, possibly allowing officers to
case and offender characteris- gain vital information on other cases.
tics—such as names of perpe-
trators, locations and times of
assaults, types of lures, traits
of offenders, and processes of victim who provides identifying verbal expressions he used indi-
victim selection—and catego- information. cated he had spent time in the mili-
rize this information in a way The following real-life example tary or law enforcement.
that eases retrieval and helps demonstrates how a blind report About the same time, the victim
match case aspects to other may aid an investigation of this of an acquaintance rape came in to
investigations. type. Law enforcement became make a blind report. She was afraid
aware of a series of rapes in town. to prosecute, primarily out of fear of
Overcoming Resistance The assailant selected his victims retaliation from the assailant, but
to Blind Reporting carefully. He preferred white, blond also because she did not want her
Law enforcement agencies ini- college students in their 20s. Climb- family to learn that she had used
tially may feel inclined to dismiss ing through windows in their drugs with the assailant. She made
the benefits of establishing a blind homes, he assaulted the women the blind report, providing identify-
reporting system solely because of while they slept. After overpower- ing information on the suspect, in-
the time investment it requires. Yet, ing the victims and raping them, he cluding his name and where he
the 1 hour or so that it takes to talk wiped away his seminal fluid with worked.
to a victim and complete a 2-page any towel available, then ordered He did shift work in the medical
report pales in comparison to the the victims to shower, keeping their field, his background included a
potential benefits. Sex offenders faces directed away from him, stint in the military, and his age fell
tend to be repeat offenders. De- while he supervised the process. within the range suggested by the
pending on the typology of the of- The victims identified him as a man serial rape victims. He had no crimi-
fender, behavior may escalate in in- in his late 20s to mid-30s. nal record. Police officers did not
tensity and frequency over time. The time of the assaults (5 to 7 have a photograph of the subject, so
Building a case against an assailant a.m.) suggested that the rapist did they took one of the serial rape vic-
becomes much easier when officers shift work. His careful actions to tims to the suspect’s place of em-
have information about three remove bodily fluids and hair indi- ployment, and she picked him out in
incidents instead of one or if of- cated that he had knowledge of evi- the parking lot during a shift
ficers recognize that the actions of dence-collection techniques, sug- change. Police then brought the
a nameless stranger seem similar gesting a background in a medical suspect in for questioning. He
to those described by another field. The personal mannerisms and denied committing the rapes.

June 1999 / 15
Unfortunately, insufficient DNA to file a report at the same time that
existed to confirm or deny a match it removes that refuge from their Teaching Criminal Justice Ethics:
and not enough other evidence was assailants. Strategic Issues, edited by John Kleinig
available to support prosecution. In- All officers want to close out and Margaret Leland Smith, published by
terestingly, the rapes stopped after their cases, both for their own satis- Anderson Publishing Co., Cincinnati,
this confrontation, despite the lack faction and to meet the depart- Ohio, 1997.
of confirmation that he was, indeed, ment’s need to document its work-
the assailant. Although this suspect load. Investigators who work in an The results of a recent International
got away, the blind reporting pro- environment in which effectiveness Association of Chiefs of Police needs
cess can help capture others in a is measured only by immediate assessment regarding the perceived
similar manner. quantifiable gain may be reluctant justification for and effectiveness of ethics
to institute a blind reporting system. training for law enforcement officers
Conclusion In reality, they will spend time tak- indicated that significant interest exists in
Sexual violence cases require ing blind reports that will not result the topic. Yet, some critics of ethics
special handling. Victims may be in anything more than witnessing training express the belief that “tigers
hypersensitive to real or perceived the victims’ accounts of their as- can’t change their stripes,” or they wonder
threats to their safety or their confi- saults. Not only is it of no immedi- why law enforcement agencies hire
dentiality. At the same time, inves- ate benefit to them, but the experi- supposedly ethical individuals then
tigation and prosecution invite ence may disturb them as much as it presume to teach them ethics.
threats to confidentiality and the does the victim. The editors of Teaching Criminal
physical and emotional safety of the However, some blind reports Justice Ethics: Strategic Issues address
victim, and victims who disclose become full reports and lead to in- these and related questions and concerns
their experience open themselves vestigations and successful pros- using relevant research and academic
up for additional violations. As a ecutions. Others provide useful in- analysis. Many of the questions addressed
result, many victims choose to fo- formation for investigation in other and answered—often from both sides of
cus on their own healing rather than cases. All of them help officers the issue so that readers may choose—
on trying to achieve justice in sys- build relationships and gain a true remain important for law enforcement
tems that historically have not been picture of sexually violent crimes practitioners, academy trainers, and
supportive of victims of sexual vio- executive managers alike. Some of the
committed in the community.
lence. To overcome the threat that questions addressed include: why teach
Officers who accept the poten-
reporting represents to victims, of- ethics to individuals hired to police ranks
tial for delayed gratification may
ficers have to work harder to make because, among other reasons, back-
become the most ardent supporters ground investigations show them to have
the reporting process feel safe. of blind reporting systems. The pay-
In addition, ensuring the safety reputations for ethical behavior? Does a
off for the effort eventually will be sufficient distinction exist between basic
of the community represents the demonstrated through improved morality and law enforcement ethics to
primary goal of law enforcement. community relations and, over time, justify expenditures of time, money, and
Law enforcement agencies that re- more effective investigations and effort by already-burdened agencies
main ill-informed about the true prosecutions. toward an understanding and genuine
crime picture in their communities practice of the latter? Will such emphasis
are ill-equipped to provide appro- Endnotes make a difference? Once adapted within
priate services. In order for the legal 1
U.S. Department of Justice, National curricula, how should law enforcement
system to hold criminals account- Crime Statistics (Washington, DC: 1993). ethics be structured, what should be pre-
able for their actions, it first must 2
In J. Timberlake, “Profile, Congress- supposed and emphasized, and to what
discover the crimes that they have women, and the New Bills,” Women’s Self-
Defense, May 1994, 48. end?
committed. Blind reporting can 3
North Carolina Assistance Program for Admittedly, Teaching Criminal
give victims of sexual violence, and Victims of Rape and Sex Offenses, 1981. Justice Ethics analyzes most of these
other sensitive crimes, a safe haven

16 / FBI Law Enforcement Bulletin


Book Review

issues from the point of view of college/ approach that the FBI and other agencies have
university departments that have a bit more adopted already. In addition, Professor Joan C.
luxury of time and reflection than fast-paced, Callahan’s important contribution to this
results-oriented law enforcement academy collection provides insight for those setting up
programs. The issues and proposed resolutions or refining academic ethics components in their
are nonetheless extremely well reasoned and academies.
explicated and, therefore, should be reviewed Many recent law enforcement ethics
by managers and practitioners within law initiatives, to include those structured by the
enforcement academies. FBI, U.S. Customs, and the New York Police
The editors set the tone for this collection Department, are developing instructional
by stating that “a well-executed course [in law techniques and curricula in concert with
enforcement ethics] could provide measurably behavioral science perspectives and findings.
heightened sensitivity, improved reflection, Teaching Criminal Justice Ethics speaks, albeit
and better performance” (emphasis added). indirectly, to this trend. Serious police manag-
This is precisely what the public rightly ers who want the best results from their integ-
demands of its officers and agents, what the rity initiatives should read carefully Professor
media and oversight groups pounce on if they Elizabeth Reynolds Welfel’s “Psychology’s
fail, and what the contributors to this edition Contribution to Effective Models of Ethics
provide with varying degrees of success. For Education in Criminal Justice.” Her treatment
example, although law enforcement relies of mistakes by professionals, especially those in
heavily on informants, some of whom have law enforcement, is excellent: “Truly ethical
criminal backgrounds, officers cannot merely professionals will not be perfect persons, but
use and discard them or otherwise violate their they should be equipped to take responsibility
dignity. Although this book does not draw the for their mistakes.” On first reading, a truism,
line between such important performance perhaps, but Welfel chooses her words care-
issues and the more significant moral concerns fully and then unpacks them. How does law
of informant handling, it can help practitioners enforcement “equip” its ranks to tell the truth
better understand how to structure police and to understand the limits of dedication and
ethics courses so that students, officers, and loyalty, while not “denying or running away
agents will come to know, for example, what from their problems?”
constitutes appropriately aggressive, produc- Indeed, this collection examines what are
tive, and ethical informant development. perhaps the two most important factors that
Some of the book’s more abstract discus- contribute to ethical conduct in law enforce-
sions may be of little benefit to the academy ment, how agencies ethically equip their
instructor. However, without exception, the personnel and how they ethically structure their
thematic articles warrant close review. organizations. Law enforcement administrators
Michael Davis’ “Teaching Police Ethics: What owe it to the profession to seek out and put
to Aim At?” offers particular insight into such into practice much that this timely release
issues as what the FBI (borrowing from the offers.
Australians) refers to as the “golden thread”
approach to teaching ethics, which requires Reviewed by
weaving an ethical emphasis or scenario, Special Agent Frank L. Perry, Ph.D.
practicum, or something of the sort into each Unit Chief
instructional component. This “pervasive Law Enforcement Ethics Unit
method,” as Davis calls it, coupled with a FBI Academy
freestanding ethics course, represents a dual Quantico, Virginia

June 1999 / 17
© DigitalVision
Policing the Internet
By SCOTT SULLIVAN, J.D.

C hildren grow up hearing potential exposure to Internet crime From a criminal’s point of
the warning “Don’t talk increases. view, the Web offers anonym-
to strangers,” and as adults, When computer users connect ity and a buffer from getting
they usually remain wary of people to the Internet, they link their com- caught, which, in turn, creates an
they do not know. Yet, every day, puters to a server’s computer, opportunity for the “perfect” crime.
adults and children alike invite which, in turn, connects to thou- Indeed, the Internet has become a
strangers into their home. By sign- sands of other servers. These com- breeding ground for crime. Thieves
ing on to the Internet, they give puters provide the framework of the transfer funds from victims’ bank
strangers the opportunity to crash Internet. As millions of users sign accounts to their own. Vandals send
their computers, access and misuse on to their respective servers and computer viruses to destroy com-
personal information, manipulate transmit and receive bits of infor- puters. Pedophiles exchange child
their finances, and threaten their mation, they create a maze of con- pornography with others or chat
safety. Moreover, as the Internet nections comparable to a web. From with minors, building their trust so
grows and becomes more a part this analogy comes the concept of they can set up meetings under false
of individuals’ daily routines, their the World Wide Web. pretenses. These offenses represent

18 / FBI Law Enforcement Bulletin


merely a few of the crimes currently degree of punishment, the culpable When the federal bank robbery
being committed on the Internet. behavior remains the same. statute does not cover Internet lar-
Media headlines such as “The Pi- For example, larceny repre- ceny, federal prosecutors can
rates of the Internet,”1 “Prosecutors sents a crime in every criminal choose from an arsenal of appli-
Put Sting into Online Search for code. Accordingly, whether the ob- cable criminal statutes. For ex-
Pedophiles,”2 and “Defense Drops ject of desire is a car, money, or an ample, the federal Wire Fraud Act
Bombshell in Cybersex Case,”3 article of clothing, the theft repre- proscribes using the wires to further
serve as evidence of the peril com- sents a violation of a larceny statute. a fraudulent scheme.6 This statute
puter users face daily. The perpetra- But what if the thief steals money applies to most Internet larcenies.
tors are men and women from all from a bank account using the Although the interstate nature of
walks of life. All they need to com- Internet? Vladimir Levin did just Internet crime usually lends itself to
mit their acts is a computer, an that when he used the Internet to federal prosecution, federal pros-
online service, and a victim. access Citibank customers’ identifi- ecutors still may decline to pros-
As history has proven, freedom cation codes and passwords and ecute. When they do, state prosecu-
and technological and societal ad- transfer $10 million dollars to his tors need to take the lead in fighting
vances usually come with a price. own accounts.4 Internet crime.
For example, the advent of the auto- Although no criminal statute Congress has created many
mobile offered a new freedom of expressly prohibits Internet larceny, laws designed to protect organiza-
travel and connected the nation like the FBI investigated the crime and tions engaged in interstate com-
never before. However, along with tracked down Levin. Federal pros- merce, and federal law enforcement
these advantages came many new, ecutors for the Southern District of uses its resources to investigate and
unforeseen risks and dangers. To New York indicted him under a prosecute criminals who violate
address these problems, the govern- criminal statute that long predates these laws. With the advent of the
ment created volumes of laws and the Internet—bank robbery. After Internet, federal law enforcement’s
regulations and a myriad of com- an international effort to bring him responsibilities have increased sig-
missions and bureaucracies. to justice, Levin was extradited to nificantly. And, increasingly, the
Similarly, the popularity of the the United States from Great Britain federal government has had to pro-
Internet has spawned online dan- and pleaded guilty.5 tect itself from cyber criminals. For
gers not previously foreseen. While
the debate continues on whether
new laws and commissions should


address Internet crime, law enforce-
ment does not need to wait. Instead,
law enforcement agencies can at- Many law
tack new high-tech crimes with fa- enforcement
miliar, well-established laws. agencies have
recognized the
COMBATING
INTERNET CRIME
increased
Based on a common belief sys-
responsibility that
tem, state and federal criminal laws the Internet has
often overlap and complement one bestowed on them
another. Accordingly, every state
penal code and many federal stat-
utes address most crimes. While
crimes differ in name, threshold, or ”
Patrolman Sullivan serves with the Westchester
County, New York, Police Department and also is
an associate with a private law firm in White Plains.

June 1999 / 19
example, in February 1998, the U.S. increased sentences where the ha- Many law enforcement agen-
Department of Defense admitted rassment occurs electronically.10 cies have recognized the increased
that unclassified computer net- Although such laws predate the responsibility that the Internet has
works had been under attack by Internet, they can be applied to bestowed on them. At the same
cyber hackers. The deputy secretary online harassment. When individu- time, they find that they can use the
of defense characterized these als receive online threats, they can Internet as a tool for fighting not
recent cyber assaults as “the most file harassment complaints with the only Internet crime but other
organized and systematic attack the local police. If the threats are seri- crimes, as well. The law enforce-
Pentagon has seen to date.”7 ous and credible, the police, if they ment Web page represents perhaps
As the number and types of have Internet capabilities, can in- the best and most common example
crimes committed online and facili- vestigate the source of the threat of this trend. Online users can con-
tated by the Internet continue to and charge the perpetrator with the nect to the Web page to report both
grow, state and local law enforce- crime of aggravated harassment. Internet and other criminal activity.
ment must join the fight against Unfortunately, in jurisdictions In turn, law enforcement agencies
cyber crime. Like their federal where departments are unprepared can post public safety information
counterparts, state and local offic- to handle Internet crime, offenders and communicate with online users.
ers can apply their penal codes to remain unpunished. Moreover, law enforcement’s vis-
prosecute Internet criminals. In ible presence on the Internet en-
some cases, applying these laws to hances public safety awareness and


the Internet becomes simply a mat- may deter crime.
ter of creative analysis. For ex- Internet officers also can use
ample, a crime such as criminal ...in jurisdictions traditional law enforcement tools to
mischief, which prohibits a person where departments conduct Internet crime investiga-
from intentionally damaging an- tions. Search warrants can serve as
other person’s property,8 does not
are unprepared to an effective means to track down
specifically address electronic handle Internet online users. Commercial Internet
means. Still, online vandals who crime, offenders providers keep records of all online
send individuals viruses that dam- remain unpunished. transactions that come through their
age their computer hardware or servers. So, when one user sends an


software are guilty of criminal mis- e-mail message to another user, the
chief, with the value of the com- service provider of each user will
puter or the extent of the damage have a record of where the e-mail
caused determining the extent of Patrolling the Internet came from and where it was sent.
culpability. Just as the law would Officers on the beat do a great Depending on the law in their
hold a person responsible for deal more than merely make arrests. states, officers can obtain consent
smashing someone’s computer with They take and investigate com- from the sender and/or the recipient
a sledgehammer, it would do the plaints and reports of suspicious ac- or obtain a warrant or grand jury
same if someone destroyed a com- tivity, provide public safety infor- subpoena to access the records. In
puter with a virus—the equivalent mation, and act as deterrents against one case, both the prosecutor and
of an electronic sledgehammer. crime. Accordingly, the Internet the defense attorney sought access
On the other hand, some laws needs beat officers. Contrary to the to e-mail messages to support their
apply directly to Internet crime. For Orwellian image of Big Brother, of- arguments. The prosecutor wanted
example, the crime of harassment, ficers on the Internet would act as to use the e-mail to help prove that
in its most basic form, proscribes the liaison between the online pub- the defendant sexually assaulted
intentional harassing, annoying, lic and the law enforcement agency, a Bernard College student. The
threatening, or alarming behavior,9 policing the Internet in much the defense wanted to use the e-mail to
and legislators have provided for same way as they police the streets. prove consent.11

20 / FBI Law Enforcement Bulletin


In some states, Internet ser-
vice providers are obligated by
law to turn over records to law
enforcement upon request or when
they become aware of online crimi-
nal activity.12 Either way, Internet
officers can rely on a number of
methods to track down the perpetra-
tors of illicit Internet activities.
In addition, Internet officers
must patrol the Information Super-
highway, and a number of agencies
are doing just that. Still, according
to one source, only federal law en-
forcement agencies and the New
York City Police Department
“maintain squads of investigators
to ferret out computer crimes.”13 training. However, the true effort (Gannett Surburban Newspapers), April 13,
These full-time units investigate comes from agencies that have 1998, 1.
3
and surf the Web for crime 24 hours Ann V. Bollinger, “Defense Drops
dedicated resources to maintaining Bombshell in Cybersex Case,” New York Daily
a day. online crime-fighting units. They News, February 16, 1998, 16.
Child pornography and pedo- have acknowledged that law en- 4
“Internet Robber Sentenced,” February 24,
philia represent a mere sampling of forcement must enter the 21st cen- 1998, [online article]; available from http://
the crimes that these squads target. cnnfn.com/digitaljam/9802/24/robber; Internet;
tury as an online force. accessed February 25, 1998.
In one instance, investigators from The future of the Internet holds 5
Ibid. See also United States v. Loney, 959
the district attorney’s office in many uncertainties. Who, if any- F.2d 1332 (5th Cir. 1992) (defendants guilty of
Westchester County, New York, one, will control it, how online us- wire fraud for adding unearned frequent flyer
posed as young teens in online chat miles to their accounts electronically).
ers will pay for their access, and to 6
18 U.S.C. 1343.
rooms. Their interaction with adults what degree society will incorpo- 7
Deputy Secretary of Defense John Hamre,
led to solicitations and arranged rate the Internet into everyday life in Associated Press, “Pentagon Computers
meetings. As a result of this online remain unclear. But one thing is cer- Targeted by Hackers,” February 26, 1998,
law enforcement effort, investiga- [newspaper online]; available from http://
tain, Internet crime represents a real www.usatoday.com/life/cyber/tech/ctc202.htm;
tors arrested four pedophiles and and serious threat to the well-being Internet; accessed August 3, 1998.
are investigating more.14 of the public. Ultimately, the extent 8
See New York State Penal Law, Section
of the threat posed by Internet crime 145.00.
CONCLUSION 9
See New York State Penal Law, Section
will be measured by the abilities 240.25.
Law enforcement is springing and successes of the officers 10
See New York Penal Law, Section
into action to fight Internet crime. charged with combating it. 240.30.
Federal agencies have set the tone, 11
Supra note 3.
12
with the FBI , U.S. Secret Service, See New York State Penal Law, Section
Endnotes 250.35.
and U.S. Customs Service heading 1
Adam S. Bauman, “The Pirates of the 13
Daniel Wise, “Local Agencies Get Tough
the Internet crime-fighting initia- Internet,” Los Angeles Times, November 3, on Cyber-Crime,” New York Law Journal
tive. Many state and local agencies 1994, [newspaper online]; available from http:// (October 1997): 1.
are joining in by implementing www2.arnes.si/home/piracy.html; Internet; 14
Supra note 2.
accessed February 24, 1998.
Internet programs and giving their 2
Bruce Golding, “Prosecutors Put Sting into
personnel online law enforcement Online Search for Pedophiles,” The Daily Item

June 1999 / 21
Focus on Investigations

Investigative Planning
Creating a Strong Foundation
for White-collar Crime Cases
By Arthur L. Bowker, M.A.

F ew individuals would feel comfortable


constructing a building without blueprints or
plans. This holds particularly true when the structure
take a polygraph and interviewing the suspect’s
boyfriend, who is rumored to have received money
from the suspect. The statute of limitations finally
is complex, will take years to construct, and will be tolls on the crime.
expected to stand the test of time. Construction Another detective has spent 6 months investigat-
experts know that without thorough planning, they ing an insurance fraud case. She has interviewed
may miss or unnecessarily repeat important steps. hundreds of victims of an unscrupulous insurance
Ironically, many law enforcement officers have agent. She has written up many of the interviews,
no qualms about hastily building cases with little or while others remain in dictation, and still others only
no planning, expecting their investigations to weather exist as her rough notes. Unexpectedly, she dies, and
attacks by defense counsels and survive years of the case gets assigned to another detective. Before
appellate review. And, given their complexity, white- proceeding, the new detective first must determine
collar crime cases especially require thorough, what records still need to be examined and who needs
documented investigative plans. to be interviewed. The investigation is delayed several
months during this transition period.
THE NEED FOR AN INVESTIGATIVE PLAN A third detective investigates a kickback case. For
Consider the following scenarios: 3 months, he interviews witnesses and examines
A detective receives an embezzlement allegation financial records. He writes a final report and refers
from a company’s officers. He promptly submits the matter for prosecution. He subsequently receives
suspected checks for analysis. Over the next 2 years, a call from the prosecuting attorney, who notes that
he directs his efforts only at getting the suspect to witness interviews and financial records examined do

22 / FBI Law Enforcement Bulletin


not fully substantiate the major offense cited in the Predication
report. The detective must reinterview all witnesses An investigative plan must include a predication,
regarding the unsubstantiated issues. or brief statement justifying why the case initially was
Had these fictional detectives devised written opened. Predications have three features: the basic
investigative plans, many of these problems could allegation, the source of the allegation, and the date
have been minimized, if not eliminated entirely. the allegation was received. For example, after
Documented plans provide a frame of reference for receiving an embezzlement allegation, the investigator
the investigation to ensure that all aspects of the crime might write this predication: “On June 1, 1998,
are covered in a timely manner. Specifically, a received information from ABC Union Auditor Jane
properly formulated plan Smith that she discovered that former bookkeeper
• focuses the investigative process to ensure that Tom Roberts had written $20,000 in unauthorized
all offense elements are addressed; checks to himself during 1997.”
• limits unnecessary procedures In short, predications clearly identify what
and step duplication; particular offense(s) may have
been committed. This initial step
• coordinates the investigative gives investigators a foothold for
activities of numerous person-
nel on large cases;
• provides stability to the
investigation if staff changes
“ ...a properly formulated
plan focuses the
investigative process
the elements they must prove in
order to establish that a criminal
act has occurred.

occur; Elements to Prove


to ensure that all
• enhances communication with offense elements The plan must reflect all of the
prosecuting officials by elements that the investigator
are addressed....
providing an outline of the needs to prove for the case to be
investigation and identifying
strengths and weaknesses in
the case;
• provides a framework for the final report; and
” prosecuted
component
successfully.
must clearly
This
reflect
what is needed to establish a
criminal violation, thus focusing
the investigation and providing a framework for the
• becomes a training aid for inexperienced staff steps that follow. At a minimum, this component
members. should contain all of the statutory elements and any
It takes no special skill to create and follow an special jurisdictional issues, such as venue and
investigative plan; rather, investigators must have a statutes of limitations. Special penalty enhancements
working knowledge of the statutory elements of the represent another area that this component might
crimes under their agency’s purview; any special include, particularly for federal offenses.1
penalty enhancements for certain offenders, offenses, The following example illustrates the possible
or victimizations; and basic investigative techniques. elements to prove for a federal investigation of union
2
Investigators must keep the plan objective and not embezzlement.
reflect that they already have established the suspect’s 1) The victim was a labor organization as defined
guilt. by the Labor Management Reporting and Disclo-
sure Act of 1959 (as amended).
COMPONENTS OF AN
INVESTIGATIVE PLAN 2) The suspects were officers and/or employees
A written investigative plan contains four basic of the labor organization.
components. These are the predication, elements to 3) The suspects unlawfully took funds and/or
prove, preliminary steps, and investigative steps. assets belonging to the victim.

June 1999 / 23
Functions of an Investigative Plan—
• focuses the investigative process to ensure • enhances communication with prosecuting
that all offense elements are addressed; officials by providing an outline of the
• limits unnecessary procedures and step investigation and identifying strengths
duplication; and weaknesses in the case;
• coordinates the investigative activities of • provides a framework for the final report;
numerous personnel on large cases; and
• provides stability to the investigation if staff • becomes a training aid for inexperienced
changes occur; staff members.

4) The suspects converted the assets or funds under this component does not require a great expen-
taken to their own, or someone else’s, personal diture of time or personnel.
use.
Investigative Steps
5) The violation was willful.
The investigative plan also must include the steps
6) The violation occurred within the last 5 years. necessary to resolve the issues and complete the
The plan must clearly reflect the issues that must investigation. These investigative steps lay out the
be proven but remain fluid enough to change if the general parameters needed to establish that a crime
investigation leads in another direction. Thus, any has occurred and include who will be interviewed and
modification to the initial plan should not be a major what records will be obtained and examined. Investi-
overhaul but merely should represent a refinement as gative steps should parallel the elements that need to
the investigation develops. be proven. For example, in an embezzlement case, the
For cases involving multiple violations, investiga- investigator would need to examine bank records and
tors should outline only the most serious offenses and interview bank tellers to prove that the suspect
refer to the others as violations that also may be converted agency funds to personal use. For other
considered during the investigation. In any case, investigations, a partial list of applicable steps in-
delineating the elements to prove and other important cludes interviewing victims; serving subpoenas;
issues, such as sentencing enhancements, helps obtaining and serving search warrants; gaining access
investigators identify the steps they need to take to to financial records; examining records; identifying
complete the investigation. These steps encompass and interviewing key witnesses; obtaining exemplars;
two types: preliminary and investigative. forwarding questionable documents for analysis;
identifying and interviewing suspects; briefing
Preliminary Steps prosecuting officials; and preparing a final report.
Preliminary steps represent the methods the In large cases involving multiple investigators,
investigator will employ to obtain basic background individual steps could be assigned to specific indi-
information on the victim, the complainant, and the viduals, who become responsible for their completion.
suspects. These include such procedures as reviewing In addition, when investigators need to interview
files on prior allegations or investigations; conducting numerous witnesses, they can compile an itemized
an in-depth interview of the complainant; obtaining list, keep it separate from the investigative plan, and
and reviewing public records, such as incorporation merely refer to the list in the plan. Specifically, the
papers or financial reports filed with government investigative step would read “identify and interview
agencies; and conducting a criminal background key witnesses (see list).” As a general rule, the plan
check of pertinent parties. Typically, step completion lists the steps to be completed in generic terms

24 / FBI Law Enforcement Bulletin


without including such specifics as names. However,
the investigator could modify the plan later to incor- Wanted:
porate such information. Photographs
HELPFUL HINTS
Investigators should seriously consider keeping
copies of investigative plans on computer. Once they
develop a plan for a particular case, they can continue
to use it as a model, or boilerplate, for similar cases.
Good boilerplate plans greatly reduce the initial time
needed to develop new plans for offenses investigated
frequently. Storing the plan on computer also allows
investigators to easily note when they complete or
modify steps or procedures.
Still, a hard copy of the plan should remain in the T he Bulletin staff is
always on the lookout
for dynamic, law enforce-
case file. By consulting the plan on a periodic basis,
the case officer keeps the investigation on the right ment-related photos for
track. As important, anyone reviewing the file can possible publication in the
determine the status of the investigation. magazine. We are interested
in photos that visually depict
CONCLUSION the many aspects of the law
The word “routine” is fast disappearing from the enforcement profession and
law enforcement lexicon. Even investigations that illustrate the various tasks
once seemed simple are growing increasingly com- law enforcement personnel
plex, especially in the area of white-collar crime. perform.
Without a frame of reference, investigators may We can use either black-
find themselves becoming overwhelmed by these and-white glossy or color
often-complicated investigations. Documented plans prints or slides, although we
focus an investigation from the start while providing a prefer prints (5x7 or 8x10).
blueprint for investigators to follow. Using written Appropriate credit will be
plans, law enforcement officers provide a firm given to contributing photog-
foundation for the investigation and prosecution of raphers when their work
white-collar offenders. appears in the magazine. We
suggest that you send dupli-
Endnotes
cate, not original, prints as
1
Felony sentencing in the federal system is governed to a large extent
we do not accept responsibil-
by the U.S. Sentencing Guidelines. Each offense has a base offense level ity for prints that may be
assigned to it, with points being added or subtracted for aggravating or damaged or lost. Send your
mitigating circumstances present in the offense conduct. For example, photographs to:
pursuant to section 3B1.3, two points are added to the base offense level
for offenders who violate a position of trust during the commission of Brian Parnell, Art
their crimes. The higher the offense level, the more severe the penalty the
individual faces. The second part of the equation factors in criminal
Director, FBI Law
history. Also, the more points assigned for criminal history, the harsher Enforcement Bulletin,
the penalty. FBI Academy, Madison
2
Union embezzlement violates 29 U.S.C. § 501(c). Building 209, Quantico,
Mr. Bowker is a U.S. probation officer for the Northern VA 22135.
District of Ohio in Cleveland.

June 1999 / 25
Legal Digest

Drug Conspiracies
By EDWARD M. HENDRIE, J.D.
©Don Ennis
drug laws. 1 Where there is an
ap-parent agreement between a po-
lice informant and a suspect to vio-
late the drug laws, such an agree-
ment will not constitute a
conspiracy because the informant is
not being sincere.2 In that case,
there is not a true meeting of the
minds between the informant and
the suspect; the informant actually
is trying to thwart the criminal en-
terprise. There must be at least two
suspects who have criminal intent
entering into an agreement in order
for that agreement to be a con-
spiracy.
If a suspect is involved in a con-
spiracy and then decides to cooper-
ate with the police, perhaps because
he or she has been arrested, the pre-
arrest agreement with the other sus-
pects would constitute a con-
spiracy.3 Any future agreements, on
the other hand, between the newly
cooperative informant and any
single suspect would not constitute
a conspiracy but could be used as
evidence to prove a past or present
conspiracy between the suspect and
other conspirators. Increasingly
though, states are enacting unilat-
eral conspiracy statutes that allow a
suspect to be charged with con-
spiracy if the suspect agrees with an

A n agreement between two and prosecutors must recognize and informant or undercover agent to
or more people to commit a properly charge drug conspiracies. commit a crime.4
crime constitutes a con-
spiracy. Illegal drug trafficking Sincere Agreement Impossibility
commonly involves the agreement Most states follow the federal Drug traffickers can be charged
of several people working in con- rule that in order for suspects to and convicted of conspiracy even
cert to manufacture and distribute be properly charged with a drug though they have not completed the
drugs. In order to best address the conspiracy, they must sincerely drug crime they agreed to commit.
problem of drug trafficking, police agree with each other to violate the This is true even if the police, by

26 / FBI Law Enforcement Bulletin


arresting the conspirators, make it
impossible for them to complete
the offense. The courts have de-
fined two types of impossibility—
factual impossibility and legal
“ Drug traffickers can
be charged and
convicted of
impossibility. A crime is factually conspiracy even
impossible if the conspirators though they have
would be thwarted by the prior in- not completed the
tervention of the police. It is not a drug crime they
defense to conspiracy that the crime
that the conspirators agree to com- agreed to commit.


mit was factually impossible to
complete.5 Special Agent Hendrie, DEA, is a
A crime is legally impossible to legal instructor at the FBI Academy.
commit if the planned conduct of
the conspirators is not a crime. The
general rule is that legal impossibil-
ity is a complete defense to a charge they agree to commit. In United that a conspiracy cannot be charged
of attempt. There is a split in the States v. Shabani,7 the U.S. Su- if the commission of the substantive
courts, however, as to whether legal preme Court ruled that because offense requires concert of action
impossibility is a defense to con- § 846 does not expressly require between two people.8 For example,
spiracy.6 Of course, it would be a evidence of an overt act in order to in order to distribute illegal drugs,
manifest injustice if a court con- prove a drug conspiracy, the U.S. there must be both a deliverer and a
victed someone of conspiracy for Congress intended to codify the recipient of the drugs. Under
agreeing to do something that is not common law standard that an agree- Wharton’s Rule, if two people en-
a violation of the law. ment alone is sufficient to prove gage in a one-time sale of a small
conspiracy. The general federal quantity of an illegal drug, the
Overt Acts conspiracy statute, 18 U.S.C. § 371, buyer and seller cannot be charged
In most cases, persons involved on the other hand, expressly re- with conspiracy.9
in a conspiracy will take steps to quires proof of an overt act in fur- There is, however, an exception
commit the agreed-upon crime. The therance of the conspiracy. Regard- to Wharton’s Rule. If an additional
common law rule, however, is that less of the language in a particular party who is not necessary for the
it is not required that the govern- statute, as a practical matter, overt commission of the offense is in-
ment prove that the suspects com- acts are the most convincing evi- volved in the transaction, then the
mitted an overt act in furtherance of dence of the sincerity of an agree- rule will not preclude a conspiracy
the conspiracy in order to prove the ment. It would be a rare conspiracy charge.10 For example, if a drug traf-
crime of conspiracy. If a conspiracy prosecution that did not involve ficker employs another to assist him
statute does not expressly require an overt acts in furtherance of the in a drug sale to a buyer, Wharton’s
overt act, then a court likely will conspiracy. Rule would not preclude the assis-
follow the common law rule that an tant from being convicted for
agreement alone will be sufficient Wharton’s Rule conspiracy.11
to prove the conspiracy. For ex- As a general rule, individuals Another way to defeat a
ample, the federal drug conspiracy can be charged and convicted of Wharton’s Rule defense is to estab-
statute, 21 U.S.C. § 846, simply both conspiracy and the completed lish sufficient evidence that the
provides that those who conspire to crime that they agreed to commit. buyer and seller have a long stand-
violate the federal drug laws are to There is, however, an exception to ing criminal relationship that in-
be punished to the same degree as that general rule. The exception, volves repeated sales of large quan-
they could be for the drug crime known as Wharton’s Rule, provides tities of illegal drugs. Such facts

June 1999 / 27
would be circumstantial evidence kilograms of cocaine wrapped in them. The Alvarez court ruled that
that there is an agreement beyond a white burlap bags. The court found absent Alvarez’s head nod, there
simple one-time transaction. Con- that sufficient evidence existed to would have been insufficient evi-
sequently, the buyer and seller support the defendant’s conviction dence that Alvarez was involved in
could be charged with conspiracy in for conspiracy to possess with in- the conspiracy. His agreement,
addition to the substantive drug tent to distribute cocaine. however, to be available to off-load
charge.12 In United States v. Alvarez,17 a plane at a remote airfield indi-
Some courts do not apply the entire bench of the U.S. Court of cated that he knew of the illegal
Wharton’s Rule at all to drug cases; Appeals for the Fifth Circuit ruled enterprise and was a willing partici-
they permit a buyer and seller to be that, based on circumstantial evi- pant.
convicted of conspiracy even dence, the defendant, Alvarez, was Those courts that follow
though there is not a third party guilty of conspiracy to import mari- Wharton’s Rule ordinarily would
present or any other exception to the juana into the United States. An il- not permit a single act of purchasing
rule.13 Those courts rely on the U.S. legal drug supplier arrived in Miami or selling illegal drugs to be the
Supreme Court decision of Iannelli from Colombia and stayed at basis for a charge of conspiracy un-
v. United States,14 in which the less there is some additional cir-
Court stated that Wharton’s Rule is cumstantial evidence from which it


merely a judicial presumption that can be inferred that the actor is part
is to be applied in the absence of of a larger conspiracy. The addi-
legislative intent to the contrary. Mere presence tional evidence must establish that
For instance, in United States v. during conspiracy the suspect had knowledge of the
Bommarito,15 the U. S. Court of Ap- larger conspiracy and intended to
peals for the Second Circuit deter- discussions is join it.18 For example, in United
mined that because the federal drug not sufficient to States v. Barlin,19 the defendant was
conspiracy statute, 21 U.S.C. § 846, implicate a person found in possession of approxi-
provides that it is a violation to con- in the conspiracy. mately 1/4 kilogram of 86 percent
spire to commit any of the crimes pure cocaine and $5,000 in cash.


under Title 21, the U.S. Congress She had just left an apartment that
did not intend that conspiracy served as the center of a drug distri-
charges under § 846 were to be lim- bution network and her name was
ited by Wharton’s Rule. Alvarez’s house. Alvarez arrived found on a list of names of people in
with the supplier at a meeting with the network prepared by one of her
Circumstantial Evidence undercover DEA agents. As fellow conspirators. The court held
In order to prove a conspiracy, Alvarez was loading some appli- that sufficient evidence existed, in
it is not necessary to have direct ances onto the undercover plane, addition to the possession of co-
evidence from a witness who was one of the DEA agents asked caine, to infer that the defendant
present and actually heard the Alvarez if he would be present at a was part of a larger conspiracy.
criminal agreement. A conspiracy remote landing strip to help unload A key fact in determining
can be established through circum- the plane when it returned. Alvarez whether a single transaction is an
stantial evidence. For example, in nodded his head indicating that he isolated purchase or actually part of
United States v. Iglesias,16 the de- would be there. The plane was to an established conspiracy to distrib-
fendant handed a white object to a return with the marijuana from Co- ute illegal drugs is the quantity of
person on a dry docked boat as oth- lombia, but no mention of the ille- the drugs involved in the transac-
ers on the boat craned their necks gal cargo was made to Alvarez by tion. The larger the quantity of
and looked around. A later search the DEA agent who asked him the drugs, the more reasonable it is to
of the boat by U.S. Customs question. As Alvarez and the others infer that the transaction is not an
agents found that it contained 521 were leaving, DEA agents arrested isolated sale, but an act that is part

28 / FBI Law Enforcement Bulletin


of a larger conspiracy. In United participant in the conspiracy rather the service bays. The court ruled
States v. Boone,20 the court ruled than a mere bystander. that the three subjects who had no
that a single transaction involving In Baptista-Rodriguez, the de- previous dealings with the infor-
383 grams of cocaine along with fendant was found to be a conspira- mant merely were present in the sta-
conversations between the pur- tor because he was at a meeting ar- tion and were not guilty of con-
chaser and wholesaler indicating ranged for the sole purpose of spiracy. There was no evidence that
there would be future sales was planning the crime. If, on the other they had agreed to assist in the de-
enough to infer a conspiracy be- hand, a suspect is present with drug livery of the drugs. The court felt
tween the buyer and the seller. Such conspirators, but there is a plausible that there was no evidence that the
evidence suggested that the whole- innocent explanation for his pres- three even knew that the drugs were
saler had a direct interest in seeing ence, then his mere presence would in the station, even though two of
that the buyer successfully resold not be enough to infer that he is part the three tried to run when the
the drugs. of the conspiracy. For example, in DEA raided the garage to make the
United States v. Pantoja-Soto,23 arrests.
Mere Presence five subjects were in a gas station
Mere presence during con- after business hours. DEA agents Mere Knowledge
spiracy discussions is not sufficient © Peter Hendrie
Even if the suspects in Pantoja-
to implicate a person in the con- Soto knew that the drugs were in the
spiracy. On the other hand, it is not station, that knowledge alone would
necessary that a person actually say not be sufficient to prove either con-
anything at a conspiracy meeting in spiracy or possession. In order to
order to be charged with conspiracy prove a conspiracy charge, there
if other circumstantial evidence in- must be some evidence, either di-
dicates that the silent person tacitly rect or circumstantial, that the per-
has agreed to participate in the con- son joined in an agreement with
spiracy. For example, in United others to violate drug laws. Mere
States v. Baptista-Rodriguez,21 the association with criminals without
defendant was at several meetings agreeing to assist in the commission
set up in order to plan a cocaine of a crime is not enough to prove
importation operation between Co- conspiracy. For instance, in United
lombian cocaine traffickers and States v. Vasquez-Chan,24 the de-
boat drug transporters. The defen- fendant was a live-in housekeeper
dant was identified at one of those who knew that the homeowner was
meetings as one of the “boat had probable cause to believe that involved in large-scale drug traf-
people.” The court affirmed the there was methaqualone inside the ficking. The police found approxi-
defendant’s conspiracy conviction station. A DEA undercover officer mately 600 kilograms of cocaine in
after making the commonsense ob- and an informant had previously the house. The housekeeper admit-
servation that “[i]t is highly un- negotiated with two of the five ted that she knew the drugs were in
likely that conspirators attempting a people in the station for the delivery the house. The court reversed her
500 kilogram smuggling operation of 50,000 methaqualone tablets. conspiracy conviction because the
would have tolerated the recurrent The informant went into the station evidence proved only that she was a
presence of a mere bystander, and returned with a sample of three housekeeper and there was insuffi-
especially during the operational methaqualone tablets. When the cient evidence that she had agreed
stage of the scheme.”22 Even though agents entered the station to make to assist in the illegal venture.
the defendant never said any- the arrests, two of the subjects tried In fact, a subject who knows
thing during the meetings, it was to run but were caught. The illegal that another person possesses ille-
reasonable to infer that he was a drugs were found in a box in one of gal drugs is not in a conspiracy with

June 1999 / 29
the possessor, even if he discusses sugar to a member of an illegal small-town doctor in large quanti-
the drugs with the criminal pos- distilling conspiracy. The U.S. Su- ties with great frequency and over a
sessor, as long as he does not offer preme Court in Falcone found that, long a period of time. The sales con-
assistance or advice on how to dis- while the evidence showed that the sisted almost exclusively of mor-
tribute the drugs or commit other suppliers knew that the recipient of phine and had increased to an aver-
crimes. For example, in United the yeast and sugar was making ille- age monthly quantity sufficient for
States v. Kelly,25 the court ruled that gal alcohol, that alone did not put 400 average doses a day. Finally,
an attorney had not conspired with them in a conspiracy with the boot- the drug wholesaler offered special
his client to violate the federal drug legger. While the government must inducements to the doctor to pur-
laws even though the attorney knew prove that a person knew of the con- chase large quantities. The U.S. Su-
that the client had a kilogram of spiracy in order to prove a con- preme Court ruled that the mail-
cocaine and advised him not to meet spiracy charge, such knowledge by order wholesaler and the doctor
with others who wanted to take de- were in a conspiracy to violate fed-
livery of it. The attorney feared that eral drug laws. The conspiracy was


his client was being “set up” to be established even though none of the
arrested. wholesaler’s representatives had
The court felt that once the at- The secretive nature personal communication with the
torney in Kelly knew about the co- physician. The supplier had more
caine, he was in a Catch-22. If he
of conspiracies often than mere knowledge of illegal ac-
told his client to deliver the cocaine, necessitates that tivity; a continuous pattern of con-
he would be guilty of conspiracy; the evidence be duct established a tacit agreement
but if he told him not to deliver it, he circumstantial. between the doctor and the whole-
could be (and he was) accused of saler to illegally distribute a con-


conspiring to assist the client in trolled substance.
concealing the substance from the The difference between the Di-
government. The court also ruled rect Sales case and the Falcone case
that the attorney was not guilty of itself is insufficient to establish that is that the commodities sold in
aiding and abetting the possession a person is guilty of conspiracy. To Falcone were articles of free com-
with intent to distribute the illegal sustain a conspiracy conviction, merce, whereas the morphine in Di-
drugs. In order for the government there must be evidence of an agree- rect Sales was a restricted commod-
to prove that a person is in a con- ment. The Falcone Court stated ity that was incapable of further
spiracy it is not sufficient for the that there was no evidence of an legal use except by compliance with
government to prove that the sus- agreement between the suppliers rigid regulations. In addition, the
pect knew of the planned crime or and the bootlegger. Direct Sales wholesaler was sup-
even that the suspect discussed the In another U.S. Supreme Court plying a controlled commodity in
crime; the government must prove case, Direct Sales v. United such large quantities, and he was
that the suspect agreed with another States,27 the evidence showed that a encouraging future large purchases.
person to play a role in the success- mail-order wholesaler continued to Circumstantial evidence showed
ful completion of the crime. supply a small-town doctor with that the supplier had more than
Individuals who know about a morphine after the Bureau of Nar- mere knowledge of the illegal re-
conspiracy and supply commodities cotics warned the wholesaler that sales; the wholesaler actually had a
that flow without restriction in com- the doctor illegally was supplying stake in the success of the illegal
merce to a confederate of the the morphine to addicts. In addition distribution of the drugs.
conspiracy would not themselves to the government warning, the cir- The Direct Sales Court stated
be members of the conspiracy. For cumstances indicated that the mor- that it made no difference that no
example, in United States v. phine was being dispensed unlaw- express agreement existed between
Falcone,26 suppliers sold yeast and fully. The morphine was sold to the the wholesaler and the doctor. The

30 / FBI Law Enforcement Bulletin


secretive nature of conspiracies under Pinkerton, conspirators are the major participants in that same
often necessitates that the evidence vicariously guilty of crimes com- conspiracy.35
be circumstantial. It is the fact of the mitted by any of the other conspira- The Connecticut Supreme
illegal agreement and not the form tors that are reasonably foreseeable Court case of State v. Diaz36 pro-
of the agreement that matters.28 consequences of the conspiracy. vides an example of the application
Therefore, where suppliers en- The Pinkerton Rule is the law in the of the Pinkerton Rule. In Diaz, the
courage the purchase of supplies federal courts and in many state defendant was one of five street-
that ordinarily are difficult to obtain courts,31 but some states have cho- side drug dealers who opened fire
and often are used in the production sen not to adopt the rule.32 with a hail of 33 nine millimeter
of illegal drugs, it can be reasonably If a person joins a conspiracy rounds and seven .45 caliber rounds
inferred that they are implicitly pro- well after its inception, such a late at a car that was driving past them.
moting the illegal drug enterprise. joiner is guilty of conspiracy to the One of the rounds killed a customer
For example, in United States v. same degree as the early joiners, who had stopped to buy illegal
Grunsfield,29 the court ruled that a even if the late joiner only played a drugs. The Supreme Court of Con-
chemist was in a conspiracy with minor role in the conspiracy.33 A necticut ruled that under Pinkerton,
illegal drug manufacturers because late joiner, however, would only once Diaz and the others entered
he supplied large amounts of chemi- face vicarious guilt under Pinkerton into the conspiracy to murder, all of
cals and equipment on three to four for substantive offenses committed them were guilty of conspiracy to
occasions to individuals who the by other conspirators after he joined commit murder, and in addition,
chemist knew were illegal PCP the conspiracy. each was also vicariously guilty of
manufacturers. The supplier in © K.L. Morrison
the murder itself, regardless of who
Grunsfield, like the defendant in actually fired the round that killed
Direct Sales, did more than merely the victim.
supply the conspiracy; in fact, he In Diaz, the defendant was
promoted the illegal enterprise and found vicariously guilty of a murder
made large profits on the sales of that was the object crime of the con-
the chemicals. Unlike the defend- spiracy. What if a conspirator com-
ant in Falcone, the chemist in mits an unplanned murder during
Grunsfield supplied materials that the course of a drug crime? Would
were difficult to obtain and often such an unplanned murder be a rea-
were used in the production of ille- sonably foreseeable consequence of
gal drugs. the drug conspiracy that could be
pinned to each of the drug conspira-
Vicarious Guilt (Pinkerton Rule) tors? In United States v. Alvarez,37
The criminal jeopardy suffered the U.S. Court of Appeals for the
by a person who enters an agree- Eleventh Circuit ruled that the mur-
ment with another to commit a One factor in determining the der of an undercover federal agent
crime goes beyond simply the foreseeability of a substantive during a shootout at a motel drug
charge of conspiracy. In Pinkerton crime for which a suspect is to be bust was a reasonably foreseeable
v. United States,30 the U.S. Supreme held vicariously accountable under consequence of drug trafficking.
Court held that if individuals enter Pinkerton is the degree of the While the court limited the liability
into a conspiracy, they are not only suspect’s involvement in the con- for the murder under the Pinkerton
guilty of the conspiracy but each spiracy.34 A person who plays a mi- rule to those members that played
also are vicariously guilty of the nor role in a conspiracy is less likely major roles in the drug conspiracy,
object crimes committed in further- to be held vicariously accountable the court ruled that the three de-
ance of the conspiracy by any of for the substantive crimes commit- fendants in that case were, in
the other conspirators. In addition, ted during a conspiracy than would fact, major participants in the drug

June 1999 / 31
conspiracy. One defendant was an Endnotes 14

15
420 U.S. 770 (1975).
1 524 F.2d 140, 144 (2d Cir. 1975).
armed lookout; a second was the E.g., United States v. Lively, 803 F.2d
16
1124, 1126 (11th Cir. 1986); State v. Gruillon, 915 F.2d 1524 (11th Cir. 1990).
leader of the drug conspiracy, who 562 A.2d 481, 484-86 (Conn. 1989); State v.
17
625 F.2d 1196 (5th Cir. 1980) (en banc).
introduced the agent to the drug Pacheco, 882 P.2d 183, 185-88 (Wash. 1994).
18
United States v. Miranda-Ortiz, 926 F.2d
sellers; and a third was the motel 2
803 F.2d at 1126. 172, 176 (2d Cir. 1991).
19
3 686 F.2d 81, 90-91 (2d Cir. 1982).
manager, who acted as interpreter Id.
20
4
See e.g., New York v. Schwimmer, 394 641 F.2d 609, 611-12 (8th Cir. 1981).
for some of the drug negotiations. N.E.2d 288 (N.Y. 1979) (defendant conspired
21
17 F.3d 1354 (11th Cir. 1994).
The court ruled that all three with an undercover officer and an informant to
22
Id. at 1374.
were properly convicted of the steal diamonds); Ohio v. Marian, 405 N.E.2d
23

24
739 F.2d 1520 (11th Cir. 1984).
978 F.2d 546, 553 (9th Cir. 1992).
agent’s murder, even though none 267, 270 (Ohio 1980) (defendant conspired
25
with an informant to murder his wife); State v. 888 F.2d 732, 740-42 (11th Cir. 1989).
of them actually took part in the Null, 526 N.W.2d 220, 229 (Neb. 1995)
26
311 U.S. 205, 211 (1940).
shooting. (defendant was in conspiracy with party who
27
319 U.S. 703 (1943).
If a suspect is found vicariously feigned agreement).
28

29
Id. at 714.
5 558 F.2d 1231, 1236 (1977).
guilty of an unintended but foresee- United States v. Jannotti, 673 F.2d 578,
30
591 (3d Cir. 1982), cert. denied, 457 U.S. 328 U.S. 640 (1946).
able crime, the fact that the suspect 1106, overruled in part on other grounds by
31
E.g., State v. Tyler, 840 P.2d 413, 424
did not participate in the unforesee- Mathews v. United States, 485 U.S. 58 (1988). (Kan. 1992); State v. Romano, 456 A.2d 746,
able crime would be relevant when 6
See United States v. Bosch, 951 F.2d 761 (R.I. 1983); Commonwealth v. Roux, 350
A.2d 867, 871 (Pa. 1976); State v. Bridges, 628
determining the sentence. In 1546, 1550 (9th Cir. 1991) (rejecting legal
impossibility as a defense to conspiracy). A.2d 270, 281 (N.J. 1993).
Alvarez, for instance, the shooters Contra, Montana v. Houchin, 765 P.2d 178,
32
E.g., State ex. rel. Woods v. Cohen, 844
each received life imprisonment 180 (Mont. 1988) (legal impossibility is a P.2d 1147, 1151 (Ariz. 1992); People v.
plus 50 years, whereas the armed defense to conspiracy). See generally Jeffrey F. McGee, 399 N.E.2d 1177, 1182 (N.Y. 1979);
Commonwealth v. Stasiun, 206 N.E. 2d 672,
lookout received 22 years imprison- Ghent, Annotation, Impossibility of Consumma-
679 (Mass. 1965).
tion of Substantive Crime as Defense in Crim-
ment, the drug deal leader received inal Prosecution for Conspiracy or Attempt to
33
United States v. Alvarez, 625 F.2d 1196,
25 years imprisonment, and the Commit Crime, 37 A.L.R.3d 375 (1971). 1198 (5th Cir. 1980) (en banc).
hotel manager received 30 years 7
115 S. Ct. 382 (1994).
34
United States v. Christian, 942 F.3d 363,
8 367 (6th Cir. 1991); United States v. Johnson,
imprisonment. See United States v. Varelli, 407 F.2d 735,
886 F.2d 1120, 1123 (9th Cir. 1989); United
748 (7th Cir. 1969) (conviction for conspiracy
reversed because the single crime of purchasing States v. Moreno, 588 F.2d 490, 493 (5th Cir.
Conclusion 1979); United States v. Chorman, 910 F.2d
stolen goods required an agreement between the
Drug trafficking usually in- buyer and seller). 102, 112 (4th Cir. 1990).
35
volves an agreement between two 9
E.g., United States v. DeLutis, 722 F.2d See United States v. Castaneda, 9 F.3d
902, 905 (1st Cir. 1983); State v. Utterback, 761, 766-68 (9th Cir. 1993) (It was a violation
or more people to cooperate in an of due process to find the defendant vicariously
485 N.W.2d 760, 770 (Neb. 1992), overruled in
illegal drug enterprise. One effec- part on other grounds by State v. Johnson, 256 guilty of a 18 U.S.C. § 924(c) gun/drug
tive way to address the drug traf- Neb. 133, ___ N.W.2d ___ (Neb. 1999). But violation where she played only a slight role in
ficking problem is through the con- see Johnson v. State, 587 A.2d 444, 452 (Del. the drug conspiracy. The court ruled that
1991) (Wharton’s Rule does not prohibit the because of her minor role in the conspiracy, she
spiracy laws. Drug traffickers can could not have reasonably foreseen that the
charging of conspiracy in addition to a charge
be charged and convicted of con- of possession with intent to distribute drugs other conspirators would use firearms during
spiracy, even though they have not because possession with intent to distribute the drug conspiracy.).
36
completed the drug crime they have does not require concert of action between two 679 A.2d 902, 911-12 (Conn. 1996).
37
people in order to commit it). 755 F.2d 830, 849-51 (11th Cir. 1985).
agreed to commit. In addition, in 10
Curtis v. United States, 546 F.2d 1188,
many jurisdictions, a person who is 1190 (5th Cir. 1977). Law enforcement officers of other than
a member of a conspiracy is vicari- 11
United States v. Jones, 801 F.2d 304, 311 federal jurisdiction who are interested in
ously guilty of any reasonably fore- (8th Cir. 1986). this article should consult their legal
12
See United States v. Moran, 984 F.2d advisors. Some police procedures ruled
seeable crimes committed by the permissible under federal constitutional law
1299, 1302-04 (1st Cir. 1993). are of questionable legality under state law
members of the conspiracy even 13
E.g., United States v. Philips, 959 F.2d or are not permitted at all.
though those crimes were not part 1187, 1190 (3d Cir. 1992); Commonwealth v.
of the plan. Cantres, 540 N.E.2d 149, 152 (Mass. 1989).

32 / FBI Law Enforcement Bulletin


The Bulletin Notes
Law enforcement officers are challenged daily in the performance of their duties; they face each
challenge freely and unselfishly while answering the call to duty. In certain instances, their actions
warrant special attention from their respective departments. The Bulletin also wants to recognize
their exemplary service to the law enforcement profession.

While on patrol early one morning, Officer Mark Baker of the Moon
Township, Pennsylvania, Police Department was stopped by a truck driver.
Officer Baker observed an automobile had crashed into the back of a gasoline
tanker truck. Officer Baker told the driver to pull his truck off the car, which
was beginning to burn. Officer Baker found the driver of the car slumped over
the steering wheel still in his seat belt. The officer gained entry through the
passenger door, unbuckled the driver’s seat belt, and removed him from the
vehicle. Within minutes, the car became engulfed in flames. Officer Baker’s
quick, decisive actions saved the man’s life.
Officer Baker

Shortly after midnight, Officer Carl Ingram of the Glenns Ferry, Idaho,
Police Department responded to an apartment fire. Arriving before the fire
department, Officer Ingram entered the building and found the resident uncon-
scious and on fire. He rescued her and then reentered the apartment several
times to extinguish the fire. The victim suffered third-degree burns over 30
percent of her body and had to have one arm amputated. However, without
Officer Ingram’s prompt, unselfish intervention, she probably would have died,
and the entire apartment complex may have burned, resulting in additional
injuries.

Officer Ingram

Durham, New Hampshire, Police Department Officer Thomas Dronsfield


responded to an assistance call from officers of the Lee Police Department, who
were at the scene of an accident. A motor vehicle had crashed into a utility pole
and was submerged in a local pond. Upon arrival, Officer Dronsfield observed
one officer in the water attempting to free a man trapped in the window of the
vehicle. Officer Dronsfield immediately dove into the cold water and helped
rescue the man. Officers then learned that another man was in the submerged
vehicle. Officer Dronsfield repeatedly dove into the murky water, finally
locating the man, but he was unable to remove him. Minutes later, however, the
Lee Cold Water Rescue Team arrived, and Officer Dronsfield’s efforts enabled
Officer Dronsfield them to locate and rescue the second victim. Without Officer Dronsfield’s
persistent and brave actions, both men may not have survived.

Você também pode gostar