Escolar Documentos
Profissional Documentos
Cultura Documentos
Volume 68
Number 6
United States
Department of Justice
Federal Bureau of
Investigation
Washington, DC
20535-0001
Louis J. Freeh
Director Features
Contributors' opinions and
statements should not be
considered an endorsement by
the FBI for any policy, program,
or service. Offenders’ Law enforcement officers need to
The Attorney General has
determined that the publication
Perceptual Shorthand 1 recognize that the nonverbal signals
they exhibit can impact their survival.
of this periodical is necessary in
By Anthony J. Pinizzotto
the transaction of the public and Edward F. Davis
business required by law. Use of
funds for printing this periodical
has been approved by the
Director of the Office of Blind Reporting Victims can report sensitive crimes more
Management and Budget. of Sexual Violence 12 safely and still provide law enforcement
agencies with important crime
The FBI Law Enforcement By Sabrina Garcia and
Bulletin (ISSN-0014-5688) is information.
published monthly by the Margaret Henderson
Federal Bureau of Investigation,
935 Pennsylvania Avenue,
N.W., Washington, D.C. Policing the Internet Law enforcement officers need to patrol
20535-0001. Periodical postage
paid at Washington, D.C., and
additional mailing offices.
By Scott Sullivan 18 the Information Superhighway to keep
citizens safe.
Postmaster: Send address
changes to Editor, FBI Law
Enforcement Bulletin, FBI
Academy, Madison Building, Drug Conspiracies To combat drug trafficking, law
Room 209, Quantico, VA 22135. By Edward M. Hendrie 26 enforcement officers and prosecutors
need a thorough knowledge of
Editor conspiracy law.
John E. Ott
Managing Editor
Kim Waggoner
Associate Editors Departments
Glen Bartolomei
Cynthia L. Lewis
Bunny S. Morris
Art Director 5 Research Forum 22 Focus on Investigations
Brian K. Parnell Citizen Resistance Investigative Planning
Assistant Art Director
Denise K. Bennett
16 Book Review
Staff Assistant
Linda W. Szumilo
Teaching Criminal
Justice Ethics
Internet Address
leb@fbiacademy.edu
Cover photo
© George Godoy
Send article submissions to
Editor, FBI Law Enforcement
Bulletin, FBI Academy, Madison
Building, Room 209, Quantico,
VA 22135.
© Mark Ide
or unconsciously, for some weak-
ness. Unlike the leopard who kills
only for physical nourishment,
however, human predators pick
their prey for a variety of reasons.
Law enforcement officers know all
too well the unpredictability of the
human predator, but do they realize
that they, the public’s protectors,
can become victims through their
own actions?
ANALYZING
THE RESEARCH
Over the past 10 years, the FBI
has researched various aspects of
law enforcement safety. From this
research and from studies on law
enforcement training, several im-
portant issues have emerged. One
issue relates to the perceptions that
offenders have of police officers.
The research illustrates that the way
offenders perceive officers impacts
how they interact with them.1
June 1999 / 1
footing or hesitant in their move- means of preparing themselves for convenience store at gunpoint and
ments. Whatever is going on with- potential threats to their safety. fled on foot. During the suspect’s
in the individual is played out in According to the FBI’s research escape, a uniformed officer noticed
external behavior. These internal and studies by other professionals, that he fit the description of the sus-
struggles may prove easily recog- offenders also engage in perceptual pect given in a radio broadcast. The
nizable or well hidden, but they shorthand during the commission of officer called to the young man to
nonetheless affect behavior in some their crimes.4 This discovery war- stop. The offender stated that the
way. rants closer examination for two officer “was not authoritarian, was
Additionally, criminal justice main reasons. First, officers should very polite, and did not take control
literature has attempted to examine become more aware of the nonver- of me or make any attempt to con-
situations where officers can detect bal signals and messages they send trol my actions.” The offender re-
deception based on the verbal and to suspects with whom they inter- marked that as the officer ap-
nonverbal cues suspects and of- act. Second, a greater degree of in- proached him—a suspected armed
fenders exhibit.3 Further, law en- terest within the law enforcement robber—the officer’s gun remained
forcement training academies teach research community may prompt in his holster. The offender stated
officers to observe the body ges- additional study into this important that after ignoring commands from
tures and movements of individuals area of officer safety. Three major the officer to stop and put his hands
they question. For example, watch- cases from the FBI’s research illus- up, he turned and shot him.
ing for potential “runners” while trate the need for such scrutiny. The offender stated that he be-
questioning suspects alerts officers lieved the officer “did not perceive
to those suspects possibly preparing The Articulate Robber Case me as a threat, and so [he] made no
to escape. Through such indicators The first murderer of a police attempt to protect himself.” After
as shifting their feet, moving their officer to bring this matter of the evaluating the officer’s behavior
eyes, and tilting their bodies, sus- offender’s perceptual shorthand to and tone of voice during this en-
pects may suggest their intentions the FBI’s attention was an articulate counter, the offender decided that
to flee. This “perceptual shorthand” young man, only 18 years old at the he had the edge, which resulted in
gives officers a quick and effective time of the killing. He had robbed a the officer’s death. By his own ad-
mission, the offender perceived a
vulnerability in the officer’s actions
and took advantage of it.
The Voice of God Case
In another case, an offender
stated that he had “planned to kill an
officer” on the day he actually mur-
dered one. This offender was a
small-time drug dealer and a major
drug abuser. He stated that he had
received a message from God that
he should kill a police officer be-
cause the police were ruining his
drug business. To accomplish this,
he proceeded to a busy intersection
Dr. Pinizzotto is an instructor in Mr. Davis is an instructor in the near his home to find an officer
the Behavioral Science Unit at Behavioral Science Unit at the to kill. Because of his degree of
the FBI Academy. FBI Academy. drug abuse, his plan lacked clear
“
unable to say anything except “he stated that he had no prior contact
looked too difficult to take.” When with either of these officers before
questioned further about his percep- ...nonverbal behaviors the incident. As in the other cases,
tion of the sergeant’s appearance, and actions can this offender had difficulty articu-
the offender stated that he was not lating exactly what cues he per-
particularly large in size or menac-
communicate the ceived from these two officers that
ing in appearance but “just looked internal disposition affected his decision.
like he could handle himself.” of an individual.
The offender remained at this IMPLEMENTING
”
location for approximately 2 hours THE FINDINGS
until a traffic accident occurred, and In many of the cases examined,
a one-officer patrol vehicle re- the offenders could not articulate
sponded to the scene. The offender The “Dope Boys” Case the exact cues they perceived re-
observed the officer for only a short The last incident involves an garding the targeted officer’s ap-
time before he “knew this was my individual who assaulted a law en- pearance, gait, or behavior. How-
victim.” Having made that decision, forcement officer in order to “send a ever, killers and assaulters alike
the offender casually walked over message to the cops in my city.” stated that if their victims generally
to the officer and struck him with He decided to deliver his mes- gave the impression that they ap-
his fist. As the officer fell to the sage, “quit messing with the ‘dope peared authoritative (not authoritar-
ground, the offender removed the boys’,” by killing an officer. During ian), seemed resolute, or acted pro-
officer’s service weapon and shot a community celebration, the armed fessionally, then the offenders were
him six times. offender approached one of several reluctant to initiate an assault.5 This
When asked what criteria he officers assigned to the parade route statement does not mean that offi-
had used to evaluate the officer, the for traffic and crowd control, in- cers should not have a personable
offender again had difficulty put- tending to shoot him. However, he approach with the public or that
ting his thought process into words. stated that after looking at the first they should not employ community
He could recall only that the officer officer he approached, “I knew he’d policing practices. It does mean,
appeared “overweight and looked be a difficult target,” so the offender however, that all officers must
June 1999 / 3
consider the messages that their ac- community should conduct addi- officers no longer fall victim to
tions and behaviors send. Also, they tional research to find the key to predatory offenders using percep-
must maintain a high level of vigi- unlock the cues that offenders tual shorthand to select the most
lance and preparedness in carrying observe in officers they choose to vulnerable targets.
out their assigned duties. Two rules attack.
remain true: officers should treat Endnotes
everyone the way they would like to CONCLUSION 1
A.J. Pinizzotto and E.F. Davis, “Cop
be treated, and they should protect Just as predatory animals Killers and Their Victims,” FBI Law Enforce-
themselves so they can continue to search out the weakest prey, human ment Bulletin, December 1992, 9; “Killed in the
Line of Duty: Procedural and Training Issues,”
protect their communities. predators employ the same tactic. FBI Law Enforcement Bulletin, March 1995, 1;
Moreover, these findings dem- Law enforcement officers must re- “Above and Beyond the Call of Duty:
onstrate the need for greater re- member that while they observe Preventing Off-duty Officer Deaths,” FBI Law
search in the area of perceptual Enforcement Bulletin, April 1996, 1; “Inter-
viewing Methods: A Specialized Approach Is
shorthand used by offenders when
“
Needed When Investigating Police Deaths,”
they encounter law enforcement of- Law and Order 44 (1996): 68; and U.S.
ficers. Existing research indicates Department of Justice, Federal Bureau of
Investigation, Killed in the Line of Duty: A
that nonverbal behaviors and ac- ...research Study of Selected Felonious Killings of Law
tions can communicate the internal illustrates that Enforcement Officers (Washington, DC, 1992)
disposition of an individual. For ex- and In the Line of Fire: Violence Against Law
ample, a depressed individual often
the way offenders Enforcement (Washington, DC, 1997).
exhibits slow body movements, a perceive officers 2
R.A. Hinde, ed., Nonverbal Communica-
lack of energy, and the inability to impacts how they tion (Cambridge, MA: Cambridge University
Press, 1972); E.E. Jones, Interpersonal
concentrate or focus. These exter- interact with them. Perception (New York: Freeman, 1990); S.T.
nal behaviors send certain mes- Fiske and S.E. Taylor, Social Cognition (New
”
sages, and observers receive those York: McGraw-Hill, 1991); and W.B. Pearce,
Nonverbal Communication (New York: Harper
messages for good or ill. An Collins, 1994).
officer’s casual, “routine” approach 3
C.G. Brougham, “Nonverbal Communica-
to a vehicle during a traffic stop nonverbal messages from the indi- tion: Can What They Don’t Say Give Them
may communicate to the offender a viduals they question, these indi- Away?” FBI Law Enforcement Bulletin, July
1992, 15; J.P. Buckley and P.A. Mullenix, “Use
possible mental or emotional dis- viduals also gather information of Behavioral Symptoms in the Search for the
tractibility. Further, the absence of from them. Subtle nuances that oth- Truth: A Tool for the Prosecutor,” Polygraph
certain appropriate behaviors on the ers would not view as weaknesses 15 (1986): 40; D.K. Mills, “Deception,”
officer’s part also might communi- become opportunities for human American Probation and Parole Association
Perspectives 15 (1991): 6; and F.W. Winkel, L.
cate dangerous messages to the predators to exploit. Law enforce- Koppelaar, and L. Greuel, “Police Officers’
offender. For example, situations ment officers must protect them- Beliefs About Cues Associated with Deception
in which officers neglect to follow selves against such individuals who in Rape Cases,” in Psychology and the Law:
suspects’ body movements during search for easy prey and strike with International Perspectives, ed. F. Losel, D.
Bender, et al. (Germany: Walter de Gruyter &
questioning, especially hand move- little or no warning. Company, 1992).
ments or shifts in body positions, The law enforcement commu- 4
B.A. Jacobs, “Undercover Deception
may communicate their lack of nity must ban together to make of- Clues: A Case of Restrictive Deterrence,”
readiness to act. When received ficers aware of the importance of Criminology 31 (1993): 281 and “Crack
Dealers and Restrictive Deterrence: Identifying
by human predators, such messages understanding how their behaviors Narcs,” Criminology 34 (1996): 409.
could prove deadly to officers and actions impact their survival 5
Supra note 1.
who remain unaware of the impact even when performing the most
of their behaviors and actions. basic, and sometimes mundane,
Therefore, the law enforcement official duties. Only then will
June 1999 / 5
suspected to be under the influence of alcohol or 6) Aggravated active aggression—actions in-
drugs during the arrest. tended to cause serious bodily harm or death to
The author used six components of subject the officer (e.g., attacks usually involving a
resistance to identify the types of resistance encoun- weapon).
tered during arrest. Designed to assist police in The police departments participating in this study
assessing citizen resistance during arrest,5 a force used this resistance continuum as a matter of practice
continuum gives officers a clearer picture of the force and policy to help officers select a level of force in
that they lawfully may use in a given situation, which either an arrest or confrontation. All patrol officers
they cannot glean by reading statutes or case law.6 and their supervisors received at least 4 hours of
B. K. Siddle designed a resistance continuum annual training by certified instructors in the force
using six generic levels of subject resistance. This continuum for 2 years prior to the study. Officers
continuum assists police administrators in designing a completed a use of force form when they employed
use of force policy and guides force during an arrest. These forms
officers in making justifiable listed the six levels of resistance
decisions regarding appropriate from the resistance continuum,
levels of force. The resistance
“
and reporting officers checked the
continuum also recommends appropriate level of resistance on
various types of control measures The use of force the form, as well as provided a
to employ, ranging from verbal by the police narrative description of the force
control to lethal force. This study incident.
remains a critical
compared the FBI’s eight arrest The SRI used these six types
circumstance variables7 with the issue for both
the police and of resistance to identify types of
following six variables of the SRI: citizen resistance. A supervisor
1) Psychological intimida- the public.
from each department transferred
tion—nonverbal cues from
”
the information from the use of
citizens that indicate their force report to the database. This
behavior, appearance, body information included citizen and
language, and physical readi- officer characteristics, all types of
ness (e.g., stance, arms folded across chest, resistance encountered by the officer, the circum-
clenched fists, etc.). stances under which the arrest occurred, and whether
2) Verbal noncompliance—verbal expressions or the citizen appeared to be under the influence of
responses that indicate the suspect’s unwilling- alcohol or other drugs.
ness to comply with the officer’s commands. The reporting officers, due to their perceptions,
3) Passive resistance—physical actions that do may have reported some arrests in a biased manner.
not prevent the officer’s attempt to control (e.g., Additionally, for similar reasons, the individuals
sitting in protest, becoming physically limp, etc.). entering the information could have coded it in a
biased manner. Therefore, the findings reflect re-
4) Defensive resistance—physical actions that ported arrest or resistance situations based on the
attempt to prevent the officer’s control without officer’s perception of the incident, the reporting
harming the officer (e.g., pulling away from the accuracy of the arresting officer(s), and the level of
officer’s grip, twisting away, running away, etc.). accuracy ensured by the individual entering the
5) Active aggression—physical actions of assault information. At the end of the study, the author
with the intent of harming the officer physically analyzed all of the submissions from each of the
(e.g., assaults using personal weapons). departments.
June 1999 / 7
violations, etc.) remained the most common types of and active aggression. While alcohol and drugs
arrest circumstances in which patrol officers encoun- showed a significant relationship with several types of
tered resistance. The study revealed that the second resistance and arrest circumstances, these findings
most common type of arrest circumstances were were based on the perception of the reporting officer.
disturbance calls (24 percent), which can involve bar Officers seldom administered a blood or chemical test
fights, domestic disputes, person with a gun, and the to measure the actual amount of substance in the
like, followed by traffic stops (15 percent) and felony body.
arrests (14␣ percent). These four arrest circumstances
accounted for 80 percent of citizen resistance. DISCUSSION
The author excluded resistance in the form of The influence, or suspicion of influence, of either
psychological intimidation from the analysis because alcohol or drugs was strongly associated with citizen
it was reported in only eight of the resistance. This factor becomes
incidents. Disturbance calls important because in 68 percent of
proved the strongest correlation the incidents of resistance, one
with verbal resistance, defensive patrol officer encountered one
resistance, and active aggression.
This combination suggests that
officers will encounter an escala-
tion from verbal statements to
“ The influence, or
suspicion of influence,
of either alcohol or
suspect, and the likelihood of
potential resistance increases.
Strong relationships existed be-
tween responding to disturbance
higher forms of physical resis- drugs was strongly calls, conducting traffic stops, and
tance when responding to these associated with investigating suspicious persons or
calls. The research also revealed circumstances and the citizen’s
strong associations between
citizen resistance. being under the influence of
defensive resistance and verbal alcohol or drugs. These three arrest
noncompliance and misdemeanor
arrests, disturbance calls, and
traffic stops. A moderate associa-
tion existed between these types of behavior and
” circumstances accounted for 47
percent of the arrest situations
where severe forms of resistance
(defensive resistance and active aggression) occurred.
felony arrests. Not only can these types of arrest situations
The study found that people who are mentally ill produce higher levels of physical resistance, but they
frequently do not resist verbally but exhibit higher also can necessitate higher forms of control measures
levels of physical resistance. This type of arrest than other arrest circumstances. Therefore, patrol
circumstance involved defensive resistance, active officers should remain aware of the arrest environ-
aggression, and aggravated active aggression and ment and citizen behaviors under these circumstances,
revealed a moderate association with alcohol or drug cuing in on the demeanor of the suspect.
influence. Felony arrests showed higher levels of Resistance also may occur when officers confront
physical resistance, including active aggression and a sober person. On many occasions, sober individuals
aggravated active aggression. offer resistance, and officers must remain cognizant
The influence of alcohol or drugs affects the of their demeanor, stance, and proximity, as well.
nature of citizen resistance during arrest. Disturbance This research has found that the types of resis-
calls and traffic stops represent two of the most tance police commonly encounter occur in combina-
common types of arrest circumstances associated tions or patterns, although not in any sequential order.
with alcohol or drugs and resistance. Investigating The most common pattern of resistance involves
suspicious persons or circumstances also may be verbal noncompliance, escalating to defensive resis-
associated with subjects under the influence, particu- tance, and proceeding to active aggression. This
larly when the subject exhibits defensive resistance behavior pattern occurred in approximately two-thirds
June 1999 / 9
time, some veteran officers have become somewhat The development or revision of use of force
lax in recognizing and remaining alert to certain body policies remains a significant concern for the police
language manifested by suspects prior to physical administrator. Administrators should develop policies
resistance. In slightly fewer than 50 percent of the that direct officers to use reasonable force based on
incidents, subjects physically attacked officers prior the resistant behavior of citizens. Police administra-
to arrest. Patrol officers who encountered resistance tors can redesign their current use of force policy by
predominately worked alone and may have deviated integrating a resistance continuum into the policy. A
from established patrol and arrest procedures, which written policy cannot cover every situation an officer
could increase the vulnerability of the officer in the may face, but this study revealed that officers will
mind of the resisting individual. Citizen resistance encounter combinations of resistance patterns in
and officer seniority also may reflect different pa- varying arrest circumstances. By integrating a resis-
trol assignments and may result from an officer’s tance continuum into a force policy, officers can
ability or inability to defuse a potentially resistant recognize types of resistance that will guide them
encounter.9 toward the appropriate force response in an arrest
Although incidents of handling a suspect with a situation. This type of policy also can assist in setting
mental illness accounted for 12 percent of the resist- the standard for administrators to use in evaluating
ing circumstances, officers more proper decision making when
likely encountered more severe officers decide to use force.
physical resistance—such as Beyond policy implications,
defensive resistance, active study findings demonstrate that
aggression, and aggravated active
aggression—with such suspects.
Drugs or alcohol can have a
significant influence in these
“ ...an officer may
experience more than
veteran officers should receive
refresher training in departmental
force policy that emphasizes
resistance, threat recognition, and
one type of resistance
encounters, as well. Patrol appropriate force methods for
with no order or pattern
officers working alone who controlling resistance. Adminis-
respond to calls of this nature during an arrest. trators, as a matter of policy,
must remain alert to the behav- should conduct annual or bian-
ioral cues of the person and
request backup when practical.
These types of arrest situations
remain unpredictable due to the
” nual training for all veteran
officers (in a resistance con-
tinuum) that will enhance offic-
ers’ perceptions of resistance and,
emotional state of the individual, the potential for in turn, direct them toward appropriate force decision
higher levels of physical resistance, and the presence making. Police trainers should design classroom
of alcohol or drugs. training based on prior arrest reports or actual video-
taped confrontations, using this material to evaluate
RECOMMENDATIONS and recognize various types of arrest resistance
Upon initial contact, officers should keep a safe patterns. Trainers, at a minimum, should structure
distance between themselves and the suspect in order safe role-playing exercises around resistance encoun-
to determine the behavior of the individual and to tered during traffic stops, disturbances, and misde-
decide a proper course of action if the suspect sud- meanor or felony arrests. This type of realistic
denly attacks them. Due to the unpredictable nature of training will enhance officers’ abilities when respond-
suspects under the influence and the likelihood that ing to resistance situations, allowing them to apply
resistance may occur, paying attention to the behavior objective, reasonable force measures based on the
of the suspect and the dynamics of the arrest circum- situation. Instructors should videotape the training
stance becomes paramount for officer safety. for later evaluation and discussion in the classroom.
June 1999 / 11
© Don Ennis
Blind Reporting
of Sexual Violence
By SABRINA GARCIA, M.A., and
MARGARET HENDERSON, M.P.A.
I magine a woman having car What if she never tells anyone sacrifice the confidentiality she de-
trouble. She accepts a ride with about the assault? What if the as- serves. In fact, an anonymous re-
a man, and he rapes her. Af- sailant rapes again? Indeed, up to 84 porting system enables law enforce-
terward, she feels foolish, hurt, percent of all sexual assaults go un- ment investigators to gain
ashamed, vulnerable, and fright- reported,1 leaving victims with un- information about crimes of sexual
ened. She questions her judgment. resolved trauma, assailants unac- violence that likely otherwise will
Perhaps the rapist threatened to hurt countable for their crimes, and law go unreported, while it allows vic-
her if she told anyone; perhaps she enforcement officials uninformed tims an opportunity to gather legal
fears the reaction of her friends or about the complete picture of sexual information from law enforcement
family if they find out about it. Per- violence in their communities. without having to commit immedi-
haps she has followed enough rape Now imagine that she has an ately to an investigation. Victims
cases in the media to know that vic- option that allows her to share have a chance to find out what the
tims often are revictimized by the critical information with law en- process is like, what chance they
legal and judicial processes. forcement without requiring her to have of filing successful charges,
June 1999 / 13
or being supported by other victims investigator prefers, represents may be so afraid of losing
of the same assailant. The testi- more than would otherwise confidentiality that they will
mony of a prior victim can help the be available and may prove disclose information only
investigator build the case and the useful in building other through a third party, such as
district attorney prove it by estab- cases. a rape crisis center or battered
lishing a pattern of behavior by the 3) accept the information women’s shelter. This option
accused. whenever the victim might allows the victim to maintain
offer it. A delay in disclosure a comfortable distance from
Establishing a Blind the law enforcement process
Reporting System is not an indicator of the
validity of the statement. while still conveying informa-
A blind report requires the Rather, feelings of self-blame, tion to the appropriate
same sensitivity and patience from shame, isolation, fear, or officials.
officers that a formal police report denial may motivate victims 5) clarify options for future
does. Investigators achieve success- to remain silent about their contact. Victims may prefer to
ful reporting by granting victims the assaults. Yet, when victims be contacted again under
respect and dignity given to any have support from people specific conditions or not at
crime victim and, in this case, ano- who validate that the assault all. For example, if the of-
nymity, as well. To develop a suc- was, in fact, a crime, they fender later is charged with
cessful blind reporting system, law become more likely to choose another assault, would the
enforcement agencies should victim want to be notified to
“
1) establish a policy of consider filing a formal
confidentiality. The key to a report? Would the victim offer
successful blind reporting additional clarification if
system is building trust
The key to a doing so became critical for
between the rape victim and successful blind another case? On the blind
the investigator, who must reporting system is report, investigators should
understand that the assailant building trust between document where, how, and
betrayed the victim’s trust in the rape victim and the under what circumstances
people. The law enforcement investigator.... the victim may be contacted.
agency must define clearly and The report should specify
”
uphold unconditionally its clearly whether officers
policy of confidentiality. can leave messages on answer-
2) accept the amount of ing machines or with other
to report the assault immedi- people who may answer the
information offered. Investiga-
ately. Otherwise, victims may phone.
tors must allow victims to
wait until they begin to heal 6) maintain blind reports in
disclose as little or as much
or until they gather the per- separate files. The blind report
information as they desire. By
sonal strength necessary to is not an official police report.
asking victims to clarify
trust law enforcement with Keeping it in a separate file
particular points, investigators
their disclosures. Other victims within the investigative
let them choose to do so. In
may come forward only when division or with a designated
contrast, putting pressure on
they hear of a similar crime sexual assault investigator
victims to convey more
occurring or of the same avoids inappropriate use of the
information than they want
assailant hurting someone else. information it contains and
may cause a breakdown.
Any amount of information 4) accept information from maintains the confidentiality
given, even if less than the third parties. Some victims promised the victim. The blind
June 1999 / 15
Unfortunately, insufficient DNA to file a report at the same time that
existed to confirm or deny a match it removes that refuge from their Teaching Criminal Justice Ethics:
and not enough other evidence was assailants. Strategic Issues, edited by John Kleinig
available to support prosecution. In- All officers want to close out and Margaret Leland Smith, published by
terestingly, the rapes stopped after their cases, both for their own satis- Anderson Publishing Co., Cincinnati,
this confrontation, despite the lack faction and to meet the depart- Ohio, 1997.
of confirmation that he was, indeed, ment’s need to document its work-
the assailant. Although this suspect load. Investigators who work in an The results of a recent International
got away, the blind reporting pro- environment in which effectiveness Association of Chiefs of Police needs
cess can help capture others in a is measured only by immediate assessment regarding the perceived
similar manner. quantifiable gain may be reluctant justification for and effectiveness of ethics
to institute a blind reporting system. training for law enforcement officers
Conclusion In reality, they will spend time tak- indicated that significant interest exists in
Sexual violence cases require ing blind reports that will not result the topic. Yet, some critics of ethics
special handling. Victims may be in anything more than witnessing training express the belief that “tigers
hypersensitive to real or perceived the victims’ accounts of their as- can’t change their stripes,” or they wonder
threats to their safety or their confi- saults. Not only is it of no immedi- why law enforcement agencies hire
dentiality. At the same time, inves- ate benefit to them, but the experi- supposedly ethical individuals then
tigation and prosecution invite ence may disturb them as much as it presume to teach them ethics.
threats to confidentiality and the does the victim. The editors of Teaching Criminal
physical and emotional safety of the However, some blind reports Justice Ethics: Strategic Issues address
victim, and victims who disclose become full reports and lead to in- these and related questions and concerns
their experience open themselves vestigations and successful pros- using relevant research and academic
up for additional violations. As a ecutions. Others provide useful in- analysis. Many of the questions addressed
result, many victims choose to fo- formation for investigation in other and answered—often from both sides of
cus on their own healing rather than cases. All of them help officers the issue so that readers may choose—
on trying to achieve justice in sys- build relationships and gain a true remain important for law enforcement
tems that historically have not been picture of sexually violent crimes practitioners, academy trainers, and
supportive of victims of sexual vio- executive managers alike. Some of the
committed in the community.
lence. To overcome the threat that questions addressed include: why teach
Officers who accept the poten-
reporting represents to victims, of- ethics to individuals hired to police ranks
tial for delayed gratification may
ficers have to work harder to make because, among other reasons, back-
become the most ardent supporters ground investigations show them to have
the reporting process feel safe. of blind reporting systems. The pay-
In addition, ensuring the safety reputations for ethical behavior? Does a
off for the effort eventually will be sufficient distinction exist between basic
of the community represents the demonstrated through improved morality and law enforcement ethics to
primary goal of law enforcement. community relations and, over time, justify expenditures of time, money, and
Law enforcement agencies that re- more effective investigations and effort by already-burdened agencies
main ill-informed about the true prosecutions. toward an understanding and genuine
crime picture in their communities practice of the latter? Will such emphasis
are ill-equipped to provide appro- Endnotes make a difference? Once adapted within
priate services. In order for the legal 1
U.S. Department of Justice, National curricula, how should law enforcement
system to hold criminals account- Crime Statistics (Washington, DC: 1993). ethics be structured, what should be pre-
able for their actions, it first must 2
In J. Timberlake, “Profile, Congress- supposed and emphasized, and to what
discover the crimes that they have women, and the New Bills,” Women’s Self-
Defense, May 1994, 48. end?
committed. Blind reporting can 3
North Carolina Assistance Program for Admittedly, Teaching Criminal
give victims of sexual violence, and Victims of Rape and Sex Offenses, 1981. Justice Ethics analyzes most of these
other sensitive crimes, a safe haven
issues from the point of view of college/ approach that the FBI and other agencies have
university departments that have a bit more adopted already. In addition, Professor Joan C.
luxury of time and reflection than fast-paced, Callahan’s important contribution to this
results-oriented law enforcement academy collection provides insight for those setting up
programs. The issues and proposed resolutions or refining academic ethics components in their
are nonetheless extremely well reasoned and academies.
explicated and, therefore, should be reviewed Many recent law enforcement ethics
by managers and practitioners within law initiatives, to include those structured by the
enforcement academies. FBI, U.S. Customs, and the New York Police
The editors set the tone for this collection Department, are developing instructional
by stating that “a well-executed course [in law techniques and curricula in concert with
enforcement ethics] could provide measurably behavioral science perspectives and findings.
heightened sensitivity, improved reflection, Teaching Criminal Justice Ethics speaks, albeit
and better performance” (emphasis added). indirectly, to this trend. Serious police manag-
This is precisely what the public rightly ers who want the best results from their integ-
demands of its officers and agents, what the rity initiatives should read carefully Professor
media and oversight groups pounce on if they Elizabeth Reynolds Welfel’s “Psychology’s
fail, and what the contributors to this edition Contribution to Effective Models of Ethics
provide with varying degrees of success. For Education in Criminal Justice.” Her treatment
example, although law enforcement relies of mistakes by professionals, especially those in
heavily on informants, some of whom have law enforcement, is excellent: “Truly ethical
criminal backgrounds, officers cannot merely professionals will not be perfect persons, but
use and discard them or otherwise violate their they should be equipped to take responsibility
dignity. Although this book does not draw the for their mistakes.” On first reading, a truism,
line between such important performance perhaps, but Welfel chooses her words care-
issues and the more significant moral concerns fully and then unpacks them. How does law
of informant handling, it can help practitioners enforcement “equip” its ranks to tell the truth
better understand how to structure police and to understand the limits of dedication and
ethics courses so that students, officers, and loyalty, while not “denying or running away
agents will come to know, for example, what from their problems?”
constitutes appropriately aggressive, produc- Indeed, this collection examines what are
tive, and ethical informant development. perhaps the two most important factors that
Some of the book’s more abstract discus- contribute to ethical conduct in law enforce-
sions may be of little benefit to the academy ment, how agencies ethically equip their
instructor. However, without exception, the personnel and how they ethically structure their
thematic articles warrant close review. organizations. Law enforcement administrators
Michael Davis’ “Teaching Police Ethics: What owe it to the profession to seek out and put
to Aim At?” offers particular insight into such into practice much that this timely release
issues as what the FBI (borrowing from the offers.
Australians) refers to as the “golden thread”
approach to teaching ethics, which requires Reviewed by
weaving an ethical emphasis or scenario, Special Agent Frank L. Perry, Ph.D.
practicum, or something of the sort into each Unit Chief
instructional component. This “pervasive Law Enforcement Ethics Unit
method,” as Davis calls it, coupled with a FBI Academy
freestanding ethics course, represents a dual Quantico, Virginia
June 1999 / 17
© DigitalVision
Policing the Internet
By SCOTT SULLIVAN, J.D.
C hildren grow up hearing potential exposure to Internet crime From a criminal’s point of
the warning “Don’t talk increases. view, the Web offers anonym-
to strangers,” and as adults, When computer users connect ity and a buffer from getting
they usually remain wary of people to the Internet, they link their com- caught, which, in turn, creates an
they do not know. Yet, every day, puters to a server’s computer, opportunity for the “perfect” crime.
adults and children alike invite which, in turn, connects to thou- Indeed, the Internet has become a
strangers into their home. By sign- sands of other servers. These com- breeding ground for crime. Thieves
ing on to the Internet, they give puters provide the framework of the transfer funds from victims’ bank
strangers the opportunity to crash Internet. As millions of users sign accounts to their own. Vandals send
their computers, access and misuse on to their respective servers and computer viruses to destroy com-
personal information, manipulate transmit and receive bits of infor- puters. Pedophiles exchange child
their finances, and threaten their mation, they create a maze of con- pornography with others or chat
safety. Moreover, as the Internet nections comparable to a web. From with minors, building their trust so
grows and becomes more a part this analogy comes the concept of they can set up meetings under false
of individuals’ daily routines, their the World Wide Web. pretenses. These offenses represent
“
address Internet crime, law enforce-
ment does not need to wait. Instead,
law enforcement agencies can at- Many law
tack new high-tech crimes with fa- enforcement
miliar, well-established laws. agencies have
recognized the
COMBATING
INTERNET CRIME
increased
Based on a common belief sys-
responsibility that
tem, state and federal criminal laws the Internet has
often overlap and complement one bestowed on them
another. Accordingly, every state
penal code and many federal stat-
utes address most crimes. While
crimes differ in name, threshold, or ”
Patrolman Sullivan serves with the Westchester
County, New York, Police Department and also is
an associate with a private law firm in White Plains.
June 1999 / 19
example, in February 1998, the U.S. increased sentences where the ha- Many law enforcement agen-
Department of Defense admitted rassment occurs electronically.10 cies have recognized the increased
that unclassified computer net- Although such laws predate the responsibility that the Internet has
works had been under attack by Internet, they can be applied to bestowed on them. At the same
cyber hackers. The deputy secretary online harassment. When individu- time, they find that they can use the
of defense characterized these als receive online threats, they can Internet as a tool for fighting not
recent cyber assaults as “the most file harassment complaints with the only Internet crime but other
organized and systematic attack the local police. If the threats are seri- crimes, as well. The law enforce-
Pentagon has seen to date.”7 ous and credible, the police, if they ment Web page represents perhaps
As the number and types of have Internet capabilities, can in- the best and most common example
crimes committed online and facili- vestigate the source of the threat of this trend. Online users can con-
tated by the Internet continue to and charge the perpetrator with the nect to the Web page to report both
grow, state and local law enforce- crime of aggravated harassment. Internet and other criminal activity.
ment must join the fight against Unfortunately, in jurisdictions In turn, law enforcement agencies
cyber crime. Like their federal where departments are unprepared can post public safety information
counterparts, state and local offic- to handle Internet crime, offenders and communicate with online users.
ers can apply their penal codes to remain unpunished. Moreover, law enforcement’s vis-
prosecute Internet criminals. In ible presence on the Internet en-
some cases, applying these laws to hances public safety awareness and
“
the Internet becomes simply a mat- may deter crime.
ter of creative analysis. For ex- Internet officers also can use
ample, a crime such as criminal ...in jurisdictions traditional law enforcement tools to
mischief, which prohibits a person where departments conduct Internet crime investiga-
from intentionally damaging an- tions. Search warrants can serve as
other person’s property,8 does not
are unprepared to an effective means to track down
specifically address electronic handle Internet online users. Commercial Internet
means. Still, online vandals who crime, offenders providers keep records of all online
send individuals viruses that dam- remain unpunished. transactions that come through their
age their computer hardware or servers. So, when one user sends an
”
software are guilty of criminal mis- e-mail message to another user, the
chief, with the value of the com- service provider of each user will
puter or the extent of the damage have a record of where the e-mail
caused determining the extent of Patrolling the Internet came from and where it was sent.
culpability. Just as the law would Officers on the beat do a great Depending on the law in their
hold a person responsible for deal more than merely make arrests. states, officers can obtain consent
smashing someone’s computer with They take and investigate com- from the sender and/or the recipient
a sledgehammer, it would do the plaints and reports of suspicious ac- or obtain a warrant or grand jury
same if someone destroyed a com- tivity, provide public safety infor- subpoena to access the records. In
puter with a virus—the equivalent mation, and act as deterrents against one case, both the prosecutor and
of an electronic sledgehammer. crime. Accordingly, the Internet the defense attorney sought access
On the other hand, some laws needs beat officers. Contrary to the to e-mail messages to support their
apply directly to Internet crime. For Orwellian image of Big Brother, of- arguments. The prosecutor wanted
example, the crime of harassment, ficers on the Internet would act as to use the e-mail to help prove that
in its most basic form, proscribes the liaison between the online pub- the defendant sexually assaulted
intentional harassing, annoying, lic and the law enforcement agency, a Bernard College student. The
threatening, or alarming behavior,9 policing the Internet in much the defense wanted to use the e-mail to
and legislators have provided for same way as they police the streets. prove consent.11
June 1999 / 21
Focus on Investigations
Investigative Planning
Creating a Strong Foundation
for White-collar Crime Cases
By Arthur L. Bowker, M.A.
June 1999 / 23
Functions of an Investigative Plan—
• focuses the investigative process to ensure • enhances communication with prosecuting
that all offense elements are addressed; officials by providing an outline of the
• limits unnecessary procedures and step investigation and identifying strengths
duplication; and weaknesses in the case;
• coordinates the investigative activities of • provides a framework for the final report;
numerous personnel on large cases; and
• provides stability to the investigation if staff • becomes a training aid for inexperienced
changes occur; staff members.
4) The suspects converted the assets or funds under this component does not require a great expen-
taken to their own, or someone else’s, personal diture of time or personnel.
use.
Investigative Steps
5) The violation was willful.
The investigative plan also must include the steps
6) The violation occurred within the last 5 years. necessary to resolve the issues and complete the
The plan must clearly reflect the issues that must investigation. These investigative steps lay out the
be proven but remain fluid enough to change if the general parameters needed to establish that a crime
investigation leads in another direction. Thus, any has occurred and include who will be interviewed and
modification to the initial plan should not be a major what records will be obtained and examined. Investi-
overhaul but merely should represent a refinement as gative steps should parallel the elements that need to
the investigation develops. be proven. For example, in an embezzlement case, the
For cases involving multiple violations, investiga- investigator would need to examine bank records and
tors should outline only the most serious offenses and interview bank tellers to prove that the suspect
refer to the others as violations that also may be converted agency funds to personal use. For other
considered during the investigation. In any case, investigations, a partial list of applicable steps in-
delineating the elements to prove and other important cludes interviewing victims; serving subpoenas;
issues, such as sentencing enhancements, helps obtaining and serving search warrants; gaining access
investigators identify the steps they need to take to to financial records; examining records; identifying
complete the investigation. These steps encompass and interviewing key witnesses; obtaining exemplars;
two types: preliminary and investigative. forwarding questionable documents for analysis;
identifying and interviewing suspects; briefing
Preliminary Steps prosecuting officials; and preparing a final report.
Preliminary steps represent the methods the In large cases involving multiple investigators,
investigator will employ to obtain basic background individual steps could be assigned to specific indi-
information on the victim, the complainant, and the viduals, who become responsible for their completion.
suspects. These include such procedures as reviewing In addition, when investigators need to interview
files on prior allegations or investigations; conducting numerous witnesses, they can compile an itemized
an in-depth interview of the complainant; obtaining list, keep it separate from the investigative plan, and
and reviewing public records, such as incorporation merely refer to the list in the plan. Specifically, the
papers or financial reports filed with government investigative step would read “identify and interview
agencies; and conducting a criminal background key witnesses (see list).” As a general rule, the plan
check of pertinent parties. Typically, step completion lists the steps to be completed in generic terms
June 1999 / 25
Legal Digest
Drug Conspiracies
By EDWARD M. HENDRIE, J.D.
©Don Ennis
drug laws. 1 Where there is an
ap-parent agreement between a po-
lice informant and a suspect to vio-
late the drug laws, such an agree-
ment will not constitute a
conspiracy because the informant is
not being sincere.2 In that case,
there is not a true meeting of the
minds between the informant and
the suspect; the informant actually
is trying to thwart the criminal en-
terprise. There must be at least two
suspects who have criminal intent
entering into an agreement in order
for that agreement to be a con-
spiracy.
If a suspect is involved in a con-
spiracy and then decides to cooper-
ate with the police, perhaps because
he or she has been arrested, the pre-
arrest agreement with the other sus-
pects would constitute a con-
spiracy.3 Any future agreements, on
the other hand, between the newly
cooperative informant and any
single suspect would not constitute
a conspiracy but could be used as
evidence to prove a past or present
conspiracy between the suspect and
other conspirators. Increasingly
though, states are enacting unilat-
eral conspiracy statutes that allow a
suspect to be charged with con-
spiracy if the suspect agrees with an
A n agreement between two and prosecutors must recognize and informant or undercover agent to
or more people to commit a properly charge drug conspiracies. commit a crime.4
crime constitutes a con-
spiracy. Illegal drug trafficking Sincere Agreement Impossibility
commonly involves the agreement Most states follow the federal Drug traffickers can be charged
of several people working in con- rule that in order for suspects to and convicted of conspiracy even
cert to manufacture and distribute be properly charged with a drug though they have not completed the
drugs. In order to best address the conspiracy, they must sincerely drug crime they agreed to commit.
problem of drug trafficking, police agree with each other to violate the This is true even if the police, by
”
mit was factually impossible to
complete.5 Special Agent Hendrie, DEA, is a
A crime is legally impossible to legal instructor at the FBI Academy.
commit if the planned conduct of
the conspirators is not a crime. The
general rule is that legal impossibil-
ity is a complete defense to a charge they agree to commit. In United that a conspiracy cannot be charged
of attempt. There is a split in the States v. Shabani,7 the U.S. Su- if the commission of the substantive
courts, however, as to whether legal preme Court ruled that because offense requires concert of action
impossibility is a defense to con- § 846 does not expressly require between two people.8 For example,
spiracy.6 Of course, it would be a evidence of an overt act in order to in order to distribute illegal drugs,
manifest injustice if a court con- prove a drug conspiracy, the U.S. there must be both a deliverer and a
victed someone of conspiracy for Congress intended to codify the recipient of the drugs. Under
agreeing to do something that is not common law standard that an agree- Wharton’s Rule, if two people en-
a violation of the law. ment alone is sufficient to prove gage in a one-time sale of a small
conspiracy. The general federal quantity of an illegal drug, the
Overt Acts conspiracy statute, 18 U.S.C. § 371, buyer and seller cannot be charged
In most cases, persons involved on the other hand, expressly re- with conspiracy.9
in a conspiracy will take steps to quires proof of an overt act in fur- There is, however, an exception
commit the agreed-upon crime. The therance of the conspiracy. Regard- to Wharton’s Rule. If an additional
common law rule, however, is that less of the language in a particular party who is not necessary for the
it is not required that the govern- statute, as a practical matter, overt commission of the offense is in-
ment prove that the suspects com- acts are the most convincing evi- volved in the transaction, then the
mitted an overt act in furtherance of dence of the sincerity of an agree- rule will not preclude a conspiracy
the conspiracy in order to prove the ment. It would be a rare conspiracy charge.10 For example, if a drug traf-
crime of conspiracy. If a conspiracy prosecution that did not involve ficker employs another to assist him
statute does not expressly require an overt acts in furtherance of the in a drug sale to a buyer, Wharton’s
overt act, then a court likely will conspiracy. Rule would not preclude the assis-
follow the common law rule that an tant from being convicted for
agreement alone will be sufficient Wharton’s Rule conspiracy.11
to prove the conspiracy. For ex- As a general rule, individuals Another way to defeat a
ample, the federal drug conspiracy can be charged and convicted of Wharton’s Rule defense is to estab-
statute, 21 U.S.C. § 846, simply both conspiracy and the completed lish sufficient evidence that the
provides that those who conspire to crime that they agreed to commit. buyer and seller have a long stand-
violate the federal drug laws are to There is, however, an exception to ing criminal relationship that in-
be punished to the same degree as that general rule. The exception, volves repeated sales of large quan-
they could be for the drug crime known as Wharton’s Rule, provides tities of illegal drugs. Such facts
June 1999 / 27
would be circumstantial evidence kilograms of cocaine wrapped in them. The Alvarez court ruled that
that there is an agreement beyond a white burlap bags. The court found absent Alvarez’s head nod, there
simple one-time transaction. Con- that sufficient evidence existed to would have been insufficient evi-
sequently, the buyer and seller support the defendant’s conviction dence that Alvarez was involved in
could be charged with conspiracy in for conspiracy to possess with in- the conspiracy. His agreement,
addition to the substantive drug tent to distribute cocaine. however, to be available to off-load
charge.12 In United States v. Alvarez,17 a plane at a remote airfield indi-
Some courts do not apply the entire bench of the U.S. Court of cated that he knew of the illegal
Wharton’s Rule at all to drug cases; Appeals for the Fifth Circuit ruled enterprise and was a willing partici-
they permit a buyer and seller to be that, based on circumstantial evi- pant.
convicted of conspiracy even dence, the defendant, Alvarez, was Those courts that follow
though there is not a third party guilty of conspiracy to import mari- Wharton’s Rule ordinarily would
present or any other exception to the juana into the United States. An il- not permit a single act of purchasing
rule.13 Those courts rely on the U.S. legal drug supplier arrived in Miami or selling illegal drugs to be the
Supreme Court decision of Iannelli from Colombia and stayed at basis for a charge of conspiracy un-
v. United States,14 in which the less there is some additional cir-
Court stated that Wharton’s Rule is cumstantial evidence from which it
“
merely a judicial presumption that can be inferred that the actor is part
is to be applied in the absence of of a larger conspiracy. The addi-
legislative intent to the contrary. Mere presence tional evidence must establish that
For instance, in United States v. during conspiracy the suspect had knowledge of the
Bommarito,15 the U. S. Court of Ap- larger conspiracy and intended to
peals for the Second Circuit deter- discussions is join it.18 For example, in United
mined that because the federal drug not sufficient to States v. Barlin,19 the defendant was
conspiracy statute, 21 U.S.C. § 846, implicate a person found in possession of approxi-
provides that it is a violation to con- in the conspiracy. mately 1/4 kilogram of 86 percent
spire to commit any of the crimes pure cocaine and $5,000 in cash.
”
under Title 21, the U.S. Congress She had just left an apartment that
did not intend that conspiracy served as the center of a drug distri-
charges under § 846 were to be lim- bution network and her name was
ited by Wharton’s Rule. Alvarez’s house. Alvarez arrived found on a list of names of people in
with the supplier at a meeting with the network prepared by one of her
Circumstantial Evidence undercover DEA agents. As fellow conspirators. The court held
In order to prove a conspiracy, Alvarez was loading some appli- that sufficient evidence existed, in
it is not necessary to have direct ances onto the undercover plane, addition to the possession of co-
evidence from a witness who was one of the DEA agents asked caine, to infer that the defendant
present and actually heard the Alvarez if he would be present at a was part of a larger conspiracy.
criminal agreement. A conspiracy remote landing strip to help unload A key fact in determining
can be established through circum- the plane when it returned. Alvarez whether a single transaction is an
stantial evidence. For example, in nodded his head indicating that he isolated purchase or actually part of
United States v. Iglesias,16 the de- would be there. The plane was to an established conspiracy to distrib-
fendant handed a white object to a return with the marijuana from Co- ute illegal drugs is the quantity of
person on a dry docked boat as oth- lombia, but no mention of the ille- the drugs involved in the transac-
ers on the boat craned their necks gal cargo was made to Alvarez by tion. The larger the quantity of
and looked around. A later search the DEA agent who asked him the drugs, the more reasonable it is to
of the boat by U.S. Customs question. As Alvarez and the others infer that the transaction is not an
agents found that it contained 521 were leaving, DEA agents arrested isolated sale, but an act that is part
June 1999 / 29
the possessor, even if he discusses sugar to a member of an illegal small-town doctor in large quanti-
the drugs with the criminal pos- distilling conspiracy. The U.S. Su- ties with great frequency and over a
sessor, as long as he does not offer preme Court in Falcone found that, long a period of time. The sales con-
assistance or advice on how to dis- while the evidence showed that the sisted almost exclusively of mor-
tribute the drugs or commit other suppliers knew that the recipient of phine and had increased to an aver-
crimes. For example, in United the yeast and sugar was making ille- age monthly quantity sufficient for
States v. Kelly,25 the court ruled that gal alcohol, that alone did not put 400 average doses a day. Finally,
an attorney had not conspired with them in a conspiracy with the boot- the drug wholesaler offered special
his client to violate the federal drug legger. While the government must inducements to the doctor to pur-
laws even though the attorney knew prove that a person knew of the con- chase large quantities. The U.S. Su-
that the client had a kilogram of spiracy in order to prove a con- preme Court ruled that the mail-
cocaine and advised him not to meet spiracy charge, such knowledge by order wholesaler and the doctor
with others who wanted to take de- were in a conspiracy to violate fed-
livery of it. The attorney feared that eral drug laws. The conspiracy was
“
his client was being “set up” to be established even though none of the
arrested. wholesaler’s representatives had
The court felt that once the at- The secretive nature personal communication with the
torney in Kelly knew about the co- physician. The supplier had more
caine, he was in a Catch-22. If he
of conspiracies often than mere knowledge of illegal ac-
told his client to deliver the cocaine, necessitates that tivity; a continuous pattern of con-
he would be guilty of conspiracy; the evidence be duct established a tacit agreement
but if he told him not to deliver it, he circumstantial. between the doctor and the whole-
could be (and he was) accused of saler to illegally distribute a con-
”
conspiring to assist the client in trolled substance.
concealing the substance from the The difference between the Di-
government. The court also ruled rect Sales case and the Falcone case
that the attorney was not guilty of itself is insufficient to establish that is that the commodities sold in
aiding and abetting the possession a person is guilty of conspiracy. To Falcone were articles of free com-
with intent to distribute the illegal sustain a conspiracy conviction, merce, whereas the morphine in Di-
drugs. In order for the government there must be evidence of an agree- rect Sales was a restricted commod-
to prove that a person is in a con- ment. The Falcone Court stated ity that was incapable of further
spiracy it is not sufficient for the that there was no evidence of an legal use except by compliance with
government to prove that the sus- agreement between the suppliers rigid regulations. In addition, the
pect knew of the planned crime or and the bootlegger. Direct Sales wholesaler was sup-
even that the suspect discussed the In another U.S. Supreme Court plying a controlled commodity in
crime; the government must prove case, Direct Sales v. United such large quantities, and he was
that the suspect agreed with another States,27 the evidence showed that a encouraging future large purchases.
person to play a role in the success- mail-order wholesaler continued to Circumstantial evidence showed
ful completion of the crime. supply a small-town doctor with that the supplier had more than
Individuals who know about a morphine after the Bureau of Nar- mere knowledge of the illegal re-
conspiracy and supply commodities cotics warned the wholesaler that sales; the wholesaler actually had a
that flow without restriction in com- the doctor illegally was supplying stake in the success of the illegal
merce to a confederate of the the morphine to addicts. In addition distribution of the drugs.
conspiracy would not themselves to the government warning, the cir- The Direct Sales Court stated
be members of the conspiracy. For cumstances indicated that the mor- that it made no difference that no
example, in United States v. phine was being dispensed unlaw- express agreement existed between
Falcone,26 suppliers sold yeast and fully. The morphine was sold to the the wholesaler and the doctor. The
June 1999 / 31
conspiracy. One defendant was an Endnotes 14
15
420 U.S. 770 (1975).
1 524 F.2d 140, 144 (2d Cir. 1975).
armed lookout; a second was the E.g., United States v. Lively, 803 F.2d
16
1124, 1126 (11th Cir. 1986); State v. Gruillon, 915 F.2d 1524 (11th Cir. 1990).
leader of the drug conspiracy, who 562 A.2d 481, 484-86 (Conn. 1989); State v.
17
625 F.2d 1196 (5th Cir. 1980) (en banc).
introduced the agent to the drug Pacheco, 882 P.2d 183, 185-88 (Wash. 1994).
18
United States v. Miranda-Ortiz, 926 F.2d
sellers; and a third was the motel 2
803 F.2d at 1126. 172, 176 (2d Cir. 1991).
19
3 686 F.2d 81, 90-91 (2d Cir. 1982).
manager, who acted as interpreter Id.
20
4
See e.g., New York v. Schwimmer, 394 641 F.2d 609, 611-12 (8th Cir. 1981).
for some of the drug negotiations. N.E.2d 288 (N.Y. 1979) (defendant conspired
21
17 F.3d 1354 (11th Cir. 1994).
The court ruled that all three with an undercover officer and an informant to
22
Id. at 1374.
were properly convicted of the steal diamonds); Ohio v. Marian, 405 N.E.2d
23
24
739 F.2d 1520 (11th Cir. 1984).
978 F.2d 546, 553 (9th Cir. 1992).
agent’s murder, even though none 267, 270 (Ohio 1980) (defendant conspired
25
with an informant to murder his wife); State v. 888 F.2d 732, 740-42 (11th Cir. 1989).
of them actually took part in the Null, 526 N.W.2d 220, 229 (Neb. 1995)
26
311 U.S. 205, 211 (1940).
shooting. (defendant was in conspiracy with party who
27
319 U.S. 703 (1943).
If a suspect is found vicariously feigned agreement).
28
29
Id. at 714.
5 558 F.2d 1231, 1236 (1977).
guilty of an unintended but foresee- United States v. Jannotti, 673 F.2d 578,
30
591 (3d Cir. 1982), cert. denied, 457 U.S. 328 U.S. 640 (1946).
able crime, the fact that the suspect 1106, overruled in part on other grounds by
31
E.g., State v. Tyler, 840 P.2d 413, 424
did not participate in the unforesee- Mathews v. United States, 485 U.S. 58 (1988). (Kan. 1992); State v. Romano, 456 A.2d 746,
able crime would be relevant when 6
See United States v. Bosch, 951 F.2d 761 (R.I. 1983); Commonwealth v. Roux, 350
A.2d 867, 871 (Pa. 1976); State v. Bridges, 628
determining the sentence. In 1546, 1550 (9th Cir. 1991) (rejecting legal
impossibility as a defense to conspiracy). A.2d 270, 281 (N.J. 1993).
Alvarez, for instance, the shooters Contra, Montana v. Houchin, 765 P.2d 178,
32
E.g., State ex. rel. Woods v. Cohen, 844
each received life imprisonment 180 (Mont. 1988) (legal impossibility is a P.2d 1147, 1151 (Ariz. 1992); People v.
plus 50 years, whereas the armed defense to conspiracy). See generally Jeffrey F. McGee, 399 N.E.2d 1177, 1182 (N.Y. 1979);
Commonwealth v. Stasiun, 206 N.E. 2d 672,
lookout received 22 years imprison- Ghent, Annotation, Impossibility of Consumma-
679 (Mass. 1965).
tion of Substantive Crime as Defense in Crim-
ment, the drug deal leader received inal Prosecution for Conspiracy or Attempt to
33
United States v. Alvarez, 625 F.2d 1196,
25 years imprisonment, and the Commit Crime, 37 A.L.R.3d 375 (1971). 1198 (5th Cir. 1980) (en banc).
hotel manager received 30 years 7
115 S. Ct. 382 (1994).
34
United States v. Christian, 942 F.3d 363,
8 367 (6th Cir. 1991); United States v. Johnson,
imprisonment. See United States v. Varelli, 407 F.2d 735,
886 F.2d 1120, 1123 (9th Cir. 1989); United
748 (7th Cir. 1969) (conviction for conspiracy
reversed because the single crime of purchasing States v. Moreno, 588 F.2d 490, 493 (5th Cir.
Conclusion 1979); United States v. Chorman, 910 F.2d
stolen goods required an agreement between the
Drug trafficking usually in- buyer and seller). 102, 112 (4th Cir. 1990).
35
volves an agreement between two 9
E.g., United States v. DeLutis, 722 F.2d See United States v. Castaneda, 9 F.3d
902, 905 (1st Cir. 1983); State v. Utterback, 761, 766-68 (9th Cir. 1993) (It was a violation
or more people to cooperate in an of due process to find the defendant vicariously
485 N.W.2d 760, 770 (Neb. 1992), overruled in
illegal drug enterprise. One effec- part on other grounds by State v. Johnson, 256 guilty of a 18 U.S.C. § 924(c) gun/drug
tive way to address the drug traf- Neb. 133, ___ N.W.2d ___ (Neb. 1999). But violation where she played only a slight role in
ficking problem is through the con- see Johnson v. State, 587 A.2d 444, 452 (Del. the drug conspiracy. The court ruled that
1991) (Wharton’s Rule does not prohibit the because of her minor role in the conspiracy, she
spiracy laws. Drug traffickers can could not have reasonably foreseen that the
charging of conspiracy in addition to a charge
be charged and convicted of con- of possession with intent to distribute drugs other conspirators would use firearms during
spiracy, even though they have not because possession with intent to distribute the drug conspiracy.).
36
completed the drug crime they have does not require concert of action between two 679 A.2d 902, 911-12 (Conn. 1996).
37
people in order to commit it). 755 F.2d 830, 849-51 (11th Cir. 1985).
agreed to commit. In addition, in 10
Curtis v. United States, 546 F.2d 1188,
many jurisdictions, a person who is 1190 (5th Cir. 1977). Law enforcement officers of other than
a member of a conspiracy is vicari- 11
United States v. Jones, 801 F.2d 304, 311 federal jurisdiction who are interested in
ously guilty of any reasonably fore- (8th Cir. 1986). this article should consult their legal
12
See United States v. Moran, 984 F.2d advisors. Some police procedures ruled
seeable crimes committed by the permissible under federal constitutional law
1299, 1302-04 (1st Cir. 1993). are of questionable legality under state law
members of the conspiracy even 13
E.g., United States v. Philips, 959 F.2d or are not permitted at all.
though those crimes were not part 1187, 1190 (3d Cir. 1992); Commonwealth v.
of the plan. Cantres, 540 N.E.2d 149, 152 (Mass. 1989).
While on patrol early one morning, Officer Mark Baker of the Moon
Township, Pennsylvania, Police Department was stopped by a truck driver.
Officer Baker observed an automobile had crashed into the back of a gasoline
tanker truck. Officer Baker told the driver to pull his truck off the car, which
was beginning to burn. Officer Baker found the driver of the car slumped over
the steering wheel still in his seat belt. The officer gained entry through the
passenger door, unbuckled the driver’s seat belt, and removed him from the
vehicle. Within minutes, the car became engulfed in flames. Officer Baker’s
quick, decisive actions saved the man’s life.
Officer Baker
Shortly after midnight, Officer Carl Ingram of the Glenns Ferry, Idaho,
Police Department responded to an apartment fire. Arriving before the fire
department, Officer Ingram entered the building and found the resident uncon-
scious and on fire. He rescued her and then reentered the apartment several
times to extinguish the fire. The victim suffered third-degree burns over 30
percent of her body and had to have one arm amputated. However, without
Officer Ingram’s prompt, unselfish intervention, she probably would have died,
and the entire apartment complex may have burned, resulting in additional
injuries.
Officer Ingram