Escolar Documentos
Profissional Documentos
Cultura Documentos
Volume 71
Number 6
United States
Department of Justice
Federal Bureau of Investigation
Washington, DC 20535-0001
Cover Photo
© Digital Stock
Authentication Technology
Identity Theft and Account Takeover
By JOHN POLLOCK and JAMES MAY
I n Miami, Florida, a woman example, that law enforcement fraudulent purchases against them,
wrote personal checks to pay agencies take a more active role in also known as account takeover, or
her bills, then dropped them reporting all incidents of identity to open new accounts. A recent sur-
into a mailbox. Criminals stole her theft. Additionally, the IACP re- vey indicated that 38 percent of
bills from the mailbox, and, within quested that departments refer vic- individuals have been victims of
hours, a gang of identity thieves tims to the Federal Trade Commis- account takeover.3
dipped her checks into chemicals sion (FTC) or the Identity Theft
and rewrote the checks to them- Clearinghouse.2 FIGHTING THE INCREASE
selves for up to $450 each.1 Identity theft, considered one
Such stories are common to law DEFINING IDENTITY THEFT of the fastest growing crimes in the
enforcement authorities, who, al- Identity theft is the criminal United States, affects an estimated
most daily, receive calls and act of assuming someone else’s 900,000 new victims every year.4
complaints pertaining to identity identity for some type of gain, The FTC is the lead agency in coor-
theft across the country. Recently, normally financial, and it can hap- dinating with other law enforce-
the International Association pen in different ways. For example, ment organizations in the fight to-
of Chiefs of Police (IACP) adopted a thief can use a victim’s personal ward reducing identity theft.
a resolution to help curb identity identifying information to gain ac- Recently, testifying before mem-
theft. The IACP requested, for cess to current accounts and make bers of the U.S. Senate Judiciary
June 2002 / 1
Subcommittee on Technology, Ter- individuals or businesses to obtain they authenticate their identity by
rorism, and Government Informa- account numbers, addresses, and entering a personal identification
tion, the FTC estimated that it will other personal information.8 Al- number (PIN) into the keypad ter-
receive approximately 200,000 though thieves use a variety of minal, also known as a payment ter-
identity theft calls on its newly in- methods to commit identity theft, minal or automatic teller machine
stalled identity theft hotline.5 A authentication techniques are (ATM) device. Although credit
General Accounting Office (GAO) improving. cards use the same keypad, a PIN
investigation revealed that inquiries currently is not required to authenti-
by consumers to the TransUnion IDENTIFYING LEVELS cate the account holder during this
Credit Bureau’s Fraud Victim As- OF AUTHENTICATION type of transaction. However, many
sistant Department increased from Technology will continue to credit cards already have a PIN, al-
approximately 35,000 in 1992 to al- play a vital role in overcoming iden- lowing individuals to use them to
most 523,000 in 1997.6 Also, in tity theft by improving ways that obtain cash advances.
1999, the Social Security Adminis- individuals and organizations con- Personal checks also could
tration, Office of the Inspector duct financial transactions and by function in connection with key-
General’s telephone hotline re- increasing authentication methods. pads. When individuals present a
ceived approximately 39,000 re- © PhotoDisc personal check at the point-of-sale,
ports of social security number companies could require the cus-
misuses.7 tomer to provide a PIN prior to
the completion of the financial
UNDERSTANDING ACCOUNT transaction.
TAKEOVER METHODS Credit, debit, and ATM trans-
Thieves easily can obtain and actions are authenticated differently
use an individual’s personal checks than personal checks. Financial or-
and credit cards to initiate an ganizations that provide ATM and
account takeover. For example, credit or debit card transaction ser-
criminals can steal original personal vices are built upon the electronic
checks in transit at a mailbox funds transfer (EFT) network and
or mail distribution center. They processing platform.9 The network
can copy information about an platform involves the routing of
individual’s financial accounts as it financial transactions through the
appears on checks and then request ATM computer network. The pro-
duplicate checks from a mail order Authentication can help verify the cessing platform involves the au-
or Internet company. Further, identity of the individual processing thorization processing of financial
thieves can copy an individual’s the access device (credit or debit accounts and terminal/ATM con-
credit card number during or after card) or personal check. Because nections.10 Financial organizations
a financial transaction or they account takeovers make up a large can perform these functions them-
can steal a credit card database. percentage of identity theft, several selves, or they can belong to an
Also, thieves can record an potential authentication techniques electronic payment company that
individual’s credit card number us- appear possible now or in the near will conduct one or both of these
ing a skimming device during future. services for them.
or after a financial transaction. Personal checks do not use the
Some criminals resort to “dumpster Point-of-Sale Transactions EFT platform. Merchants authenti-
diving” to obtain an individual’s fi- When individuals use a debit cate personal checks through check
nancial information. These offend- card to complete point-of-sale verification companies.11 Check
ers retrieve material discarded by transactions with a merchant, verification methods are constantly
“
Consumers want to know the authentication will occur, known as
credibility of merchants. Check a one-to-one search.19 A one-to-
verification companies and finan- many search occurs when an ac-
cial enterprises that provide EFT count holder is not required to have
platforms might be able to move
...38 percent of a user ID.20
toward a PIN authentication sys- individuals have Various government entities
tem. If merchants and the PIN au- been victims of have begun using biometric authen-
thentication system remain separate account takeover. tication techniques. For example,
entities, conducting business will social service agencies in several
be more secure. states have installed finger-
”
Many individuals still consider printing devices,21 and at least one
on-line payments in an area of state offers its residents the op-
immaturity.12 They have concerns tion of having their fingerprints
about the privacy of both the data Further, check verification scanned when they apply for their
transmitted and the purchaser en- companies have begun to pro- drivers’ licenses.22 Further, one fed-
gaging in a valid on-line transac- vide business owners with secure eral agency uses hand geometry at
tion.13 Even though companies can payment methods. When someone airports.23
secure the data transmitted, verify- places an order telephonically or Biometrics research also is ex-
ing the customer remains a prob- over the Internet, these companies panding. For example, Michigan
lem. Today, many merchants accept verify the validity of the check to State University’s Pattern Recogni-
the true credit card account holder the merchant. But, once again, the tion and Image Processing Lab is
on face value. When an electronic true account holder may not be the studying this type of identification24
commerce transaction takes place, individual placing the order. and one research testing lab esti-
the purchaser provides the type of mates that, by 2005, all personal
credit card, as well as the account Biometric Authentication computers will have at least one
number, name, and expiration date The next generation of authen- type of biometric technology.25
on the card. But, the individual tication most likely will occur in Biometrics can serve as good
placing the order may not be the the area of biometrics; future authentication mechanisms when
true account holder. infrastructure is moving toward used properly.26 This technique
June 2002 / 3
works if the biometric (an indi- and time. Victims of identify theft 11
U.S. Department of Justice, “Identity
Theft and Fraud,” http://www.usdoj.gov/
vidual’s physical attributes) came deserve nothing less.
criminal/fraud/idtheft.html; accessed October 9,
from the actual person being veri- 2001.
fied, and it matches the biometric Endnotes
12
“Reducing On-line Credit Card Fraud,”
master file.27 As with any new tech- 1
Mark Soupiset, “13 Ways to Protect
Web Developers Journal, http://
www.webdevelopersjournal.com/articles/
nology, the infrastructure must Yourself From Financial Fraud,” USAA card_fraud.html; accessed October 9, 2001.
support it. Whatever is developed to Magazine, January/February 1999, 10-14. 13
Ibid.
2
satisfy future needs, it must be the The International Association of Chiefs of 14
Nessa Feddis, American Bankers
Police, “IACP Resolutions: 2000,” http://
best solution for merchants, finan- www.theiacp.org/leg_policy/Resolutions/
Association, telephone interview by author on
May 26, 2001.
cial institutions, and the con- resolutions2000.htm; accessed September 7, 15
Ibid.
sumer.28 Some states have tried to 2001. 16
M. J. Zuckerman, “Agencies Test
3
use biometrics; however, privacy Privacy Rights Clearinghouse, “Nowhere ‘Certified’ E-Mail,” The Detroit News, May 28,
to Turn: Victims Speak Out on Identity Theft,”
advocate groups have persuaded http://www.privacyrights.org/ar/
2001, sec. A., p. 10.
17
Ibid, 14. For more information, see
some government officials to think idtheft2000.htm; accessed October 9, 2001. Stephen Coleman, “Biometrics: Solving Cases
twice about what they are doing. of Mistaken Identity and More,” FBI Law
Opponents are concerned that per- © PhotoDisc Enforcement Bulletin, June 2000, 9-16.
sonal information stored in data- 18
Michael R. Amour, “Biometrics for the
Financial Industry,” Business Security Advisor,
bases will fall into the wrong
June 2001, 14 and 19.
hands.29 19
Sally Weiner Grotta, “Biometric Security-
Bio-Keys,” PC Magazine, June 12, 2001,
CONCLUSION 162-174.
20
Identity theft remains a major Ibid.
21
Melissa Stewart, “Fingerprinting,”
problem. Various levels of technol- American Heritage of Innovation and
ogy can help prevent identity theft Technology, Summer 2001, 23-30.
and account takeover. The more 22
Ibid.
23
options that become available to au- Supra note 19.
24
Michigan State University Pattern
thenticate financial transactions by Recognition and Image Processing Lab,
verifying the account holder’s iden- “Abstracts of Current Projects,” http://
tity, the less likely individuals will biometrics.cse.msu.edu/abstracts.html;
become victims of identity theft. accessed October 9, 2001.
25
Ibid.
The ability to use a PIN during 26
Bruce Schneier, Secrets & Lies: Digital
credit card and check transactions Security in a Networked World (New York,
can help stop account takeover. All 4
Mari J. Frank, Esq., “Identity Theft NY: John Wiley & Sons, Inc., 2000).
27
levels of technology might not be Prevention and Survival,” http:// Ibid.
28
www.identitytheft.org; accessed October 9, Ibid., 13.
able to exist within the current in- 29
Ibid., 22.
2001.
frastructure; however, with ongoing 5
Federal Trade Commission, “FTC
research, it will be only a matter of Testifies: Identity Theft on the Rise,” http:// Special Agent Pollock serves with the
time before they can. www.ftc.gov/opa/2000/03/idtest.htm; accessed Social Security Administration, Office
To fight identity theft, law en- October 9, 2001. of the Inspector General, in Detroit,
6
Ibid. Michigan, and is a member of the
forcement personnel must commit 7
Ibid.
to forming alliances with financial 8
FBI's Joint Terrorism Task Force.
For more information, see Matthew L.
organizations, merchants, and de- Lease and Tod W. Burke, “Identity Theft: A
Sergeant May serves with the Detroit,
velopers of computer hardware and Fast-Growing Crime,” FBI Law Enforcement
Bulletin, August 2000, 8-13. Michigan, Police Department's Major
software. Stopping identity theft 9
Ralph Calvano, NYCE Corporation, Crimes Division and currently is
saves everyone from financial hard- telephone interview by author on May 24, 2001. assigned to the Michigan Attorney
ships, insecurity, grief, aggravation, 10
Ibid. General's High Tech Crime Unit.
June 2002 / 5
Policing
and the
Global
Paradox
By DANIEL ALEXANDER
”
support globalization. Changes in
the economy, communication, tech- Assistant Chief Alexander serves with the
nology, and transportation will Boca Raton, Florida, Police Department.
force law enforcement practitioners
at all levels to deal with the global-
ization of crime. Consider the fol-
reluctance of law-abiding immi- as a result of the piracy of software
lowing recent events:
grant citizens to communicate with and other electronic products, and
• International crime rings have the police. This reluctance is based the theft of intellectual property by
been formed around the trade on fear of retribution and mistrust trusted employees may amount to
in illegal Chinese immigrants. of authorities due to their experi- over $250 billion per year.9 With
• The number of immigrants ences in their countries of origin. over 14 million on-line traders, the
sold or forced into prostitution The increasing number of fed- U.S. Security and Exchange Com-
has increased in recent years. eral prosecutions of noncitizens mission handles close to 100 inves-
highlights the challenge of dealing tigations each day.10 Additionally,
• In North Carolina, two white with immigrants in the criminal unknown numbers of pedophiles at-
men beat a Chinese man to justice system. From 1984 to 1994, tempt to prey on children over the
death, mistaking him for a the number of noncitizens pros- Internet.
Vietnamese man. ecuted in federal courts rose from The actual reporting of cyber-
• In New York, federal agents 3,462 to 10,000.7 Some experts esti- crime is very low. Only 17 percent
uncovered an international mate that illegal immigrant trade is of companies report losses related
drug smuggling ring that used a $3.2 billion dollar business. In to electronic crime to law enforce-
Hasidic Jews as couriers. addition, Russian, South American, ment.11 Researchers investigated fi-
• Chinese gangs imported more Nigerian, Asian, Jamaican, Afri- nancial institutions, universities,
than 100,000 slave labor can, Middle Eastern, and Italian or- government agencies, and corpora-
immigrants. ganized crime groups have had a tions to determine the estimated
significant influence on crime in the number of illegal intrusions. Of the
• Russian gangs trade in a United States.8 entities surveyed, 62 percent
variety of contraband, from reported intrusions, and the FBI
gasoline to nuclear material.6 Technology reports that offenders have pen-
Many of these criminals either Emerging technology also has etrated almost all of the Fortune 500
take up residence or seek temporary generated a new genre of crime, companies.12
shelter in ethnic communities. Ad- dubbed “cybercrime.” Criminals
ditionally, they often prey on resi- launder billions of dollars each year FUTURE LOCAL CONCERNS
dents in segregated communities. through electronic transfers. An es- The global issues of immigra-
This problem is compounded by the timated $23 billion per year are lost tion and advances in technology
June 2002 / 7
also have impacted many local con- electing to isolate themselves be- stated, “It will be nice to have them
cerns. Mostly, these issues have in- hind gates and walls? Aside from in a close-knit type of commu-
fluenced how Americans have be- the historical desire for prestige and nity.”20 Developers argue that gates
gun to view where they want to live distinction, other reasons com- help enhance the sense of commu-
and how they choose to interact monly cited for choosing a gated nity and quality of living in a subdi-
with their neighbors. Traditionally, alternative include higher property vision. Advertising includes terms,
golf courses, swimming pools, ten- values, improved standard of living, such as “village,” “community,”
nis courts, and clubhouses repre- and increased security. Gated com- and “cozy,” suggesting a cordiality
sented amenities at the top of the list munities no longer are developed not found in traditional, nongated
for developers planning new resi- exclusively for the retired or neighborhoods.21 Many planners
dential communities. Recently, wealthy. Instead, the majority of the and residents of free-access locali-
most advertisements for new subdi- new gated subdivisions are mar- ties categorize gated communities
visions include gated entrances as a keted to the middle and upper as divisive.
primary feature for the prospective middle class.17 Often, the cost of Unquestionably, the primary
home buyer. Gates represent both a gated access is dispersed among a driving force behind the recent
friendly “welcome home” to resi- large subdivision of single family growth in gated communities is the
dents and, most important for and multiunit dwellings. fear of crime. Interestingly, declin-
homeowners in the subdivision, a ing crime statistics do not impact
warning to uninvited outsiders to this appetite for the security
“
stay away. supposedly offered by gates. Sensa-
tional media coverage of crime
Planned Communities Gated communities continues to color the perception
Retirement developments will present unique of individual safety.22 In a survey
brought gated-community living to challenges to of gated community residents,
the average American in the late policing in a number two-thirds of the respondents be-
1960s and 1970s. Gates then be- lieved less crime occurred in their
came popular for resorts and
of different ways. area. Of the two-thirds, 80 percent
”
middle-class neighborhoods. Opu- attributed the difference to the
lence and a growing fear of crime gates.23 Little evidence supports the
helped drive the proliferation of contention that gates have a dis-
gated communities in the 1980s.13 While estimates vary consider- cernible effect on the crime rate.
Although gates are more prevalent ably, security gates have a positive On the other hand, many pri-
in upper-class communities, some impact on property values in a vate communities bring residents
government housing authorities are community. For example, in one closer together only in appearance.
considering gates.14 Additionally, area of California, residents antici- For example, in 1996, residents
some central Los Angeles commu- pate almost a 40 percent increase moved into a community near Or-
nities have erected barriers.15 in value. 18 More conservative lando, Florida. The turn-of-the-
Americans deliberately are iso- estimates put the figure between century homes have large front
lating themselves from their neigh- 5 to 20 percent.19 Although a nar- porches facing central parks and are
bors at an alarming pace. Eight out row estimate currently is elusive, designed to foster close interaction
of 10 new projects involve gated experts believe that property values among residents. Hidden beneath
communities and close to four inside the gated communities are pleasant facades, these homes
million Americans live in them,16 higher than comparable properties are wired for the 21st century. Resi-
with California and Florida leading in free-access areas. Commenting dents aim to build community
the way. Why are people of vari- on her interest in a new gated through the local intranet. The
ous backgrounds and persuasions development, a mother of two school, community groups, and
Source: R. Putnam, “Bowling Alone: America’s Declining Social Capital,” Journal of Democracy 6 (1) 1995, 65-78.
private individuals use the intranet Challenges to Policing • The unrealistic perception
to communicate with each other. While gated communities have of invulnerability on the
Describing an electronic town become prominent features on the part of residents in gated
meeting, the community’s general American landscape, law enforce- communities.
manager said, “The question and ment leaders have done little to
answer flow was organized and Paying Twice
gauge the impact of this phenom-
people didn’t have to get dressed enon on the future of policing. A growing furor exists in gated
and come down and get in the meet- Gated communities will present communities over the issue of
ing hall and listen to a bunch of unique challenges to policing in a paying twice for some services.
conversation.” A Cub Scout den number of different ways. Generally, cities will not sweep
mother was thrilled about posting the streets or test hydrants in gated
scout information on the intranet • Tax relief for services already communities because officials
because she was able to avoid “call- provided by private entities contend that public money only
ing each boy on the phone every 3 may result in the threat of can be spent on services that benefit
weeks to explain what we were do- diminished public financial the general public. In 1990, the New
ing.”24 Residents tout their interac- resources. Jersey legislature passed the Mu-
tive television capabilities that al- • The private status of a sub- nicipal Services Act. This law al-
low viewers to “participate” in division may reduce access lowed residents who pay home-
community activities without leav- to areas and people within owner’s association dues to get
ing their homes. police jurisdictions. rebates on property taxes paid to
June 2002 / 9
support trash collection, street ignitions of their unlocked automo- police agencies. Ultimately, a very
lighting, and snow removal. In the biles, placed unsecured valuables in fragmented system of federal, state,
first year following its passage, the plain view, and failed to lock their and local law enforcement has
act cost New Jersey’s cities ap- homes. Following a rash of burglar- evolved.
proximately $62 million.25 ies and thefts, the police department
In the near future, citizens may attached door hangars to targets The Global View
argue that gated communities potentially attractive to thieves. The Law enforcement officials at all
should not have to pay double for card warned, “An opportunity for levels of government will need to
police protection. Private security crime exists here. The city police adjust to the increasing globaliza-
guards often perform the uniform department is concerned about your tion of crime. The federal govern-
patrol function. Current complaints safety. We have observed a poten- ment must work to strengthen trea-
about inadequate police protection tial problem on your property and ties, conventions, multilateral
in gated communities may develop have filed a copy of this information agreements, and memorandums of
into rebate demands for services al- with our crime prevention practitio- understanding to effectively collect
ready provided by private compa- ner. The crime prevention practitio- evidence and extradite offenders for
nies. Ultimately, this could result in ner is trained in the area of security prosecution.
the loss of valuable funding for surveys and will be happy to visit With current technology, the
police agencies. with you to recommend ways in concept of conducting the criminal
which your home or business can be process from different venues may
Handling Access Problems made safer.”27 become reality. Short of full extra-
Gated communities also create dition, one country could try a de-
access problems for police depart- fendant who is physically in another
“
ments. Many subdivisions have un- country. Using video conferencing
manned gates, requiring a remote technology, U.S. federal prosecu-
controller, card, or other device to The ultimate goal tors could try a defendant in France
open the gates. of any police agency under French law. Witnesses to the
In Florida, police departments offense who reside in Italy could
cannot enforce traffic laws should be to lead testify without having to leave their
in private subdivisions without a the community in home country.28
written formal agreement. Because policing itself. Local law enforcement agen-
the roads in gated communities cies also must prepare for a future
”
are private, police officers do not where issues related to globaliza-
have automatic authorization to tion become increasingly impor-
enter and perform routine patrol tant. The control of international
functions. Although the instances LAW ENFORCEMENT crime will involve dealing with
have not been well documented, RESPONSE issues ranging from street crimes
some communities actually have Unlike most countries, law to highly organized criminal
turned away officers. enforcement in the United States is enterprises.29
rooted in the local tradition. The relationship between fed-
Protecting Themselves U.S. marshals who served the eral and local agencies must im-
Convincing residents in gated western territories represented prove to successfully resolve cases.
communities of the need for pro- the only federal law enforcement The task force concept likely will
tecting themselves against criminal authority. The improvements in help this occur. Continuity must ex-
activity can present problems.26 transportation and subsequent in- ist between states in terms of inter-
Residents in one gated community crease in mobility were a catalyst state criminal investigations and
consistently left keys in the for the development of federal procedures. Once again, the need
June 2002 / 11
access to reporting and to crime board) to resolve problems. Some The bedrock of the OCSO’s
analysis based on geographic infor- of the issues that have received at- community-policing effort in these
mation systems based crime analy- tention include vandalism, vehicle areas is the Citizen Volunteer Road
sis will be more widely available to burglaries, school-crossing safety, Patrol Program, which establishes a
the public. The content of the mes- and parking problems. partnership with citizens by ac-
sages that police administrators de- Aside from daily contact with tively involving them in the day-to-
liver electronically should serve as the public while on patrol, the of- day operations of the sheriff’s
a catalyst for increased social inter- ficer attends homeowner’s associa- office. Prospective candidates com-
action and move people out of their tion meetings and publishes a news- plete an extensive application, re-
technological isolation and into in- letter to inform residents and stay ceive training in a citizen’s police
teracting with each other. abreast of issues in each commu- academy program, and use marked
Future challenges should not nity. Immediately, the officer rec- vehicles and equipment provided by
change the model that police use for ognized the need to engage citizens the OCSO. Citizens patrol their
local service delivery. In fact, the in the four gated communities. communities for a certain number
need to acquire knowledge quickly Previously, residents called their of hours each month.
and build social networks will private security companies and Can most agencies afford this
strengthen the COPS model. The homeowner’s association represen- level of commitment to exclusive
tools departments use to accom- tatives to report suspicious activity communities? Can they afford not
plish this mission definitely will and police-related problems. The to commit? Too often, police offi-
change. Police and the public must cials are working to catch up to a
“
avoid becoming isolated and para- particular problem, such as a crime
lyzed by the tools to the point that trend that has developed and flour-
they abandon the mission. ished in an area. The problem may
Law enforcement be as simple as emergency vehicles
One Agency’s Answer officials at all levels gaining physical access to the front
Some forward-thinking agen- of government will gate. If residents make a commit-
cies have expanded their customer need to adjust to ment to communicate with all seg-
service efforts to include ex- the increasing ments of a jurisdiction, officers can
clusive communities. The Okaloosa
County Sheriff’s Office (OCSO) globalization of crime. foresee certain concerns and mar-
shal the necessary resources to ad-
”
serves a Florida panhandle commu- dress other more complex prob-
nity. Deputies sought to apply the lems. In terms of old-fashioned
COPS model to four gated commu- prevention, an open dialogue will
nities located in a larger residential community-policing officer edu- allow the police and citizens to
development. The OCSO assigned cated the residents about the impor- share a realistic perspective of the
a community police officer to the tance of calling the OCSO to ad- nature of crime in a specific geo-
gated communities. This officer re- vance the sharing of information graphical area.
ceived specific community-ori- and to ensure a prompt response to
ented training and became respon- emergencies. Members of the CONCLUSION
sible for coordinating problem- OCSO have established positive re- Historically, police practitio-
solving activities within the subdi- lationships with the private security ners have been skilled at dealing
visions. The OCSO encouraged the personnel and have recognized the with paradoxes. They balance the
officer to tap into internal resources guards as valuable participants in protection of rights with the neces-
(e.g., special response team or drug the problem-solving process. To ex- sity to remove those rights at times.
unit) or collaborate with external pedite access, the officer received They are driven by rules, but they
agencies (e.g., the U.S. Department remote entry devices for the gated value discretion in the application
of Transportation or local school community’s entry gates. of the trade. In the future, police
18
Supra note 13.
Edward J. Blakely, “The Gated Commu-
if the group members participate in Endnotes nity Debate,” Urban Land Magazine, June
meaningful civic engagement. Po- 1
John Naisbitt, Global Paradox (New 1999.
lice officials must use old and new York, NY: William Morrow and Company, 19
D. Wilkening, “Guarded Profits:
tools to acquire knowledge about 1994). Developers Like Economics of Gated
2
Ibid. Communities,” The Florida Real Estate
segments of their jurisdictions and 3
Ibid. Journal, January 15, 1998, 1-4.
then motivate their residents to par- 4
D. Massey, “To Study Migration Today, 20
F. Shen, “Middle Class Homing in on
ticipate in the betterment of their Look to a Parallel Era,” The Chronicle of Gated Enclaves: In Maryland, a New Clientele
communities. Higher Education, August 18, 2000. for a Fashionable Concept,” The Washington
5
Ibid. Post, April 14, 1997, sec. B, p. 1.
The ultimate goal of any police 21
D. Dillon, “Fortress America: More and
agency should be to lead the © Digital Stock
More of Us Are Living Behind Locked Gates,”
community in policing itself. While Planning 60, (1994): 8-14.
community-oriented, problem- 22
K. Menzie, “Home, Safe Home: Security
Is a High Priority for Homeowners These Days
solving programs tout “partner-
and They’ve Got the Deadbolts, Motion-
ships,” the actual intent of any detectors and Gated Communities to Prove It,
local strategy is for citizens to re- The Baltimore Sun, March 15, 1998, sec. J, p.
solve the problem and collectively 9.
23
Supra note 13.
create an environment where crime 24
J. Naisbitt, High Tech/High Touch (New
cannot take root and flourish. The York, NY: Random House, Inc., 1999).
assumption that private gated com- 25
A. Stark, “America the Gated?” The
munities provide a recipe for form- Wilson Quarterly 22 (1998), 58-80.
26
J. Stark, “The New Security Blanket,” The
ing “close-knit” groups of people
St. Petersburg Times, September 20, 1997, sec.
who are well organized and socially D, p. 1.
committed to each other may not be 27
N. Woitas, “Crooks, Police Keep Eye on
accurate. 6
R. Ward, (2000). “The Internationalization
Walden Lake Homes,” The Tampa Tribune,
January 17, 1998, 8.
On a much larger scale, federal, of Criminal Justice,” http://www.ojp.usdoj.gov/ 28
For more information, see Stephen P.
state, and local police officials nij/international/internat.pdf; accessed June 29,
Cutler, “Building International Cases: Tools for
2001.
must piece together a fragmented 7 Successful Investigations,” FBI Law Enforce-
Ibid.
justice system to protect their cli- 8
Ibid.
ment Bulletin, December 1999, 1-5.
29
Supra note 6.
ents from threats on the global 9
Ibid. 30
Supra note 6.
level. Similar to the local commu- 10
11
Ibid.
R. Baker, D. Beaupre, W. Cassaday, D.
nity-oriented, problem-solving ap-
Icove, H. Stambaugh, and W. Williams, State This article is not an attempt to reflect
proach, law enforcement adminis- and Local Law Enforcement Needs to Combat the impact that the tragic events of
trators must identify problems of an Electronic Crime, U.S. Department of Justice, September 11, 2001, will have on the
international nature, involve all ef- National Institute of Justice Research in Brief law enforcement community. Rather,
(Washington, DC, August 2000), 1-6. it deals with the challenges that this
fected parties in a search for solu- 12
Ibid. profession faces concerning the
tions, and collectively evaluate the 13
E. J. Blakely and Mary G. Snyder, globalization of all types of crimes.
potency of their responses. Fortress America: Gated Communities in the
June 2002 / 13
Perspective
Force Continuums pyramids, tables, and ladders. For better or worse, the
terms escalation and de-escalation have become
A Liability to Law Enforcement? inextricably linked with force continuums.
By George T. Williams Force continuum theory states that officers should
begin at the lowest levels of force necessary to effect
P
an arrest (e.g., command presence and oral commands
erhaps, no more important and potentially represent the lowest level on the force continuum
inflammatory issue faces the law enforcement ladder). Failing to gain compliance, officers then
community today than the use of force. Because of attempt a progression of graduating force options,
this, force continuums have become such an accepted each increasing in severity and probability of injury to
part of the culture that many do not question their the suspect. This, in effect, requires officers to
existence or utility. Is this wise? Should law enforce- experiment to see what level of force finally will
ment professionals begin to challenge the strict succeed, eventually concluding with deadly force
adherence to and propagation of force continuums? should the other “lower” efforts fail. In short,
Should agencies continue to require their officers to continuums require officers to escalate progressively
start at the lowest level of force and escalate to higher from one level to another until they have control of
levels without considering the effectiveness such the suspect. Then, once the suspect decreases resis-
action has in serving the law enforcement mission? tance, officers must de-escalate their actions to an
Such questions call for serious, reflective, and appropriate level of force.
frank discussions among the entire criminal justice
community.1 These deliberations should center on the FORCE CONTINUUM REALITY
rational examination of the theory of force continuum Rather than reflecting the real world of confusion,
versus its reality, the legal requirements of the use of fear, and sometimes an overwhelming sense of
force, the consequences of force continuums to the urgency that officers face in any violent confrontation
law enforcement profession and the public it serves, with offenders, force continuums often represent an
and the available alternatives to force continuums. unrealistic, almost wishful ideal. Apparently, law
enforcement trainers developed the continuum theory
FORCE CONTINUUM THEORY based on the premise that officers take resisting
Prior to the 1960s, little organization existed suspects into custody through an orderly, sterile, and
within most law enforcement agencies regarding
training officers in the use of force against suspects.
Most officers received their service weapons and Mr. Williams is the
other equipment and then spent a month or two riding director of training for a
with veteran officers before going out on their own to private training institute in
do their best to enforce the law. Agencies expected Bellingham, Washington.
their officers to use common sense in their arrests and
to maintain a safe environment for the citizens they
served.
A growing understanding of constitutional limits
to force created the need to train officers in when and
how much force they legally can employ during an
arrest. Therefore, in the late 1960s, law enforcement
trainers who sincerely desired to assist officers in
properly employing force developed force
continuums. The first continuums provided officers
with guidelines for the use of force. The most recent,
however, define the concept in the form of stairs,
“
ment tools and tactics. In reality, “a use of force?
series of mistakes corrected as they Legally, officers do not have to
are made,”3 generally defines most Self-imposed consider less intrusive alternatives
physical confrontations. Struggling requirements of a of force in a fight, something that
with or sometimes fighting a suspect force continuum can inherently is subjective and creates
is not sterile, orderly, or clean; cause various endless second-guessing of the
rather, it often is ugly, chaotic, consequences. officer’s use of force.8 To create the
desperate, and bloody. When requirement of escalating and de-
fighting with offenders, officers escalating according to a progres-
must react to the suspects’ actions.
In addition, officers have various
weapons and tools that offenders
can gain control of and use against them. Even more
” sive scale limits the spontaneity and
flexibility of officers in the field to
protect themselves and the public.
Moreover, it does not reflect the real world where
important, officers cannot be certain of the motiva- officers who hesitate during use-of-force incidents
tions and goals of aggressive suspects. Such issues often are injured or even killed, demonstrating the
emphasize the disparity between theory and reality grave consequences of adhering too closely to force
when examining force continuums and bring to mind continuum policies.
the necessity of understanding the legal requirements
regarding the use of force. CONSEQUENCES OF FORCE CONTINUUMS
Self-imposed requirements of a force continuum
LEGAL REQUIREMENTS can cause various consequences. While sincerely
Since 1989, courts have evaluated the constitu- attempting to adhere to the policies and training that
tional limits to the use of force based on the Fourth they have received about employing force
Amendment to the U.S. Constitution.4 Graham v. continuums, officers can encounter threats to their
Connor requires officers to use force based on the personal safety and can face departmental, as well as
“reasonable officer standard”5 given the totality of the civil, liability.
facts known to the officer at the time. The officer
must use objectively reasonable force given the Officer Safety
severity of the crime at issue, the immediate threat of When officers respond to a call, they frequently
the suspect to officers and the public, and the active arrive knowing little more than an address, a reporting
resistance of the suspect to arrest or to attempts to party’s name, a vague description of the suspect, and
evade arrest. an even more general description of the problem they
This requirement by the U.S. Supreme Court must resolve. More often than not, officers must make
states nothing about “escalating” or “de-escalating” quick threat assessments based on limited informa-
force. The Court does not require de-escalating, or tion. Furthermore, when they make an arrest, officers
June 2002 / 15
often know little about the capabilities, goals, or level Physical confrontations with dangerous offenders do
of intensity with which an offender will respond and not allow the officer the luxury of considering and
usually possess limited knowledge as to whether, or then implementing a complex strategy. The time it
to what extent, the individual is armed. takes to observe, orient, decide, and act upon the
If an officer effects an arrest, the suspect might lesser-force alternative may make whatever option the
resist in some manner. Suffering from the human officer elects moot and could translate into needless
performance limitations of stress, attention, and injury and death.
reaction times, the officer begins to decide what to do By definition, force continuums represent com-
upon interpreting that something is happening. Often, plex systems. While proponents may say that
the officer is a second, or sometimes several seconds, continuums easily allow officers to instantly respond
behind the offender whose motives and goals remain with higher levels of force, they also, by definition,
unknown. If operating under the dictates of a force require officers to instantly de-escalate whenever
continuum, the officer now must consider whether to possible. This creates a state of doubt in the mind of
escalate to muscular force, an officer who then becomes
attempt a pain-compliance hold, constantly worried not only about
or use a chemical irritant. In a being injured but also about
very real sense, the officer must being disciplined or sued due to a
experiment with some type of
force and wait to discover
whether the suspect responds
positively and whether the
“ ...continuums require
officers to escalate
progressively from
failure to properly de-escalate, a
highly subjective matter. Officers
with doubts about the force they
employ in a fight are neither
situation requires escalation or one level to another effective nor desirable. In fact,
de-escalation. until they have control they can become a liability to the
Within this formal equation, safety of all involved.10
of the suspect.
discussion rarely occurs about the Therefore, officers must
physical and emotional reaction employ force confidently to be
of an officer under threat. At the
beginning of any physical con-
flict, all of those involved likely
are frightened and nervous. Adrenaline flows and all
” effective. An effective applica-
tion of force results in fewer
injuries to both officers and
offenders by quickly ending the confrontation.11 This
of the well-known physical and emotional effects can occur only when officers are required to engage
occur, most of which prove detrimental to the suspects with reasonable force, per Graham v.
officer’s ability to cognitively choose the path of least Connor. Officers are permitted to use reasonable
intrusiveness. The inability to make complex deci- force to overcome a suspect’s resistance, among other
sions when under threat represents the most important reasons.12 The courts do not require officers to ponder
of these effects. As the complexity of any decision the level of force that they use nor to consider
increases, especially when under threat, an officer’s whether the force is slightly higher than that which
ability to decide quickly and efficiently erodes. someone else might use (and may second-guess later).
Because of the natural human will to survive, an The law asks, Was the force reasonable given the
officer’s ability to select less-injurious alternatives totality of the circumstances at that moment? While it
may dissolve. calls for officers to use reasonable force given the
Moreover, in a fight, an officer must react to what situation, it does not ask, What was the best level of
the offender did nearly a second, or more, before— force an officer could have used at that moment?
that is, when the officer first perceived the action. The Being involved in a fight is hard enough without
more options the officer must consider, the slower the being required to consider the best and most appropri-
reaction9 and the more likely that the officer is ate choice at the moment. The law does not require
making a decision no longer relevant to the situation. this, but continuums do.
June 2002 / 17
continuums, how will it train its members in the In this type of training, no need exists for the
proper and reasonable use of force? “escalation” or “de-escalation” of force. When the
Officers regularly receive training in common officer’s perception of the offender’s behavior meets
skill and knowledge domains involving tactical the requirements that the officer has been trained to
communications; methods of empty-hand control and observe, the officer may employ the tools, tactics, or
strikes; aerosol restraints; various impact, electrical, methods that are appropriate and reasonable.
and less-than-lethal weapons; several tools and other
devices; and firearms. They even learn about employ- Legal Aspects
ing service dogs, although perhaps not technically Training also must include the legal aspects of the
weapons, as force in limited circumstances. Regard- use of force. Officers must have thorough knowledge
less, officers must learn not only how to use force but of the federal laws, as well as their own state laws,
when. They also must become thoroughly conversant relative to the use of force. During training, whether
with the legal aspects of the use of force. on the firing range, the defensive tactics training
floor, or in front of the impact weapon mannequin,
Parameters
instructors constantly should remind officers of the
During each training session, officers should context in which they should use the force being
receive instruction in the param- presented. Then, instructors
eters of force. For each type of should test the officers on this
weapon and degree of force, knowledge. Moreover, agencies
officers should answer four main
questions, illustrated here with the
baton as the weapon.
1) When is it proper to employ
“ ...an open and honest
discussion of the
continued employment
should impose regular examina-
tions requiring officers to articu-
late their knowledge of the force
laws and departmental policies as
an impact weapon? a condition of employment.
of force continuums
2) What offender behavior and should occur Overall, well-trained officers
actions should an officer are confident officers, and confi-
throughout the criminal dent officers know the law and
perceive prior to striking justice community.
various targets with a baton? the context in which they can use
”
force. In the end, confident
3) What level of imminent
officers employ force reasonably
danger must the officer
and sustain fewer injuries and less
perceive prior to using a baton
liability exposure.
as deadly force?
4) What type and degree of injury can an officer CONCLUSION
expect from this type of tool and duration of force While use of force stands as a difficult issue for
during typical employment scenarios? all law enforcement agencies, force continuums often
Such parameters create a “threshold requirement” represent an additional obstacle in the overall debate.
for every degree of force. As a subject meets the Policies that require officers to strictly adhere to
threshold for the type of weapon or degree of force, force continuums can cause problems not only for
the officer then can decide to employ that amount of the officers but also for the public they serve. Now
force reasonably suited to overcome the suspect’s may be the time to begin an earnest look at the
resistance given the offender’s conduct at the mo- concept of gradual force response that many agencies
ment. This places the onus for reasonable force on the require.
officer to justify the type or level of force used given While the law enforcement community must not
the suspect’s behavior and, most important, mirrors overstate the problems associated with force
the legal requirements of the use of force. continuums, it must not understate them either.
Endnotes
1
The author based this article on his 10 years of experience as a
police defense expert in civil cases and his 20 years of teaching force
skills to law enforcement officers. He has found that most officers have
great difficulty in explaining their actions when relying exclusively on the
defense of “I followed the force continuum.” His experience has led to his
strong belief in the need for agencies to avoid relying on the strict
interpretation of a force continuum as a means of policy for their officers
T he Bulletin staff is
always on the lookout
for dynamic, law enforce-
who confront the issue of using force on a daily basis. To discuss the ment-related photos for
matter further, contact the author at 360-671-2007 or at possible publication in the
gtwilliams@cuttingedgetraining.org.
2
National Institute of Justice, Understanding the Use of Force By magazine. We are interested
and Against the Police (Washington, DC, November 1996). in photos that visually depict
3
Police Close Defense and Ground Fighting seminar presented by the many aspects of the law
Cutting Edge Training, Bellingham, Washington. enforcement profession and
4
Graham v. Connor, (1989) 490 U.S. 386, 109 S.Ct. 1865.
5
Reasonable officer standard is defined as: Would another officer illustrate the various tasks
with the same or similar training and experience, given the same or law enforcement personnel
similar circumstances as presented to the officer being evaluated, do the perform.
same thing or use similar judgment? We can use either black-
6
In an attempt to provide officers with an alternative to the force
continuums, as well as an explanation of how to employ “objectively and-white glossy or color
reasonable force,” the author developed the use-of-force wheel. See prints or slides, although we
George T. Williams, “Use-of-Force Wheel,” The Police Marksman, July/ prefer prints (5x7 or 8x10).
August 1994. Appropriate credit will be
7
Bruce D. Praet, “An Alternative Use of Force Policy Without an
Escalation Scale,” handout material for training session about investigat- given to contributing photog-
ing the officer-involved shooting, Cutting Edge Training, Bellingham, raphers when their work
Washington. appears in the magazine. We
8
Scott v. Heinrich, (9th Cir. 1994) 39 F. 3d 912. suggest that you send dupli-
9
Richard A. Schmidt, Motor Learning and Performance: A
Behavioral Emphasis, 2d ed. (Champaign, IL: Human Kinetics, 1991). cate, not original, prints as
10
The author interviewed numerous officers who voiced doubts or we do not accept responsibil-
concerns about their responses in the middle of a difficult, sometimes ity for prints that may be
desperate, struggle with a suspect because they were not “sure” about damaged or lost. Send your
whether to escalate or de-escalate. One officer, paralyzed from the waist
down after being shot by an assailant he was grappling with, stated that photographs to:
he hesitated to make a contact shot to the head to end the fight because he
was concerned about administrative issues relative to the continuum. Art Director, FBI Law
Many officers revealed that they are not comfortable with the Enforcement Bulletin,
continuum’s artificial requirements to de-escalate in the middle of a fight. FBI Academy, Madison
This can lead to hesitation and possible officer injury or death.
11
Greg Meyers, “Nonlethal Weapons Versus Conventional Police
Building, Room 209,
Tactics: The Los Angeles Police Department Experience,” (master’s Quantico, VA 22135.
thesis).
12
Reed v. Hoy, (9th Cir. 1989) 909 F. 2d 324.
13
Supra note 7.
June 2002 / 19
© Digital Stock
A
U.S. law enforcement officials, particularly when seeking lestation, forcible rape, kidnapping,
agency received a report of justice in exceptional cases, should robbery, and aggravated assault.
a serious violent crime. In- consider exploring another legal Article IV is similar to an extradi-
vestigating officers determined process called domestic prosecu- tion in that the fugitive must be
from witnesses that the suspect, a tion, foreign prosecution, or, sim- found in Mexico. Unlike extradi-
Mexican national, returned to his ply, Article IV. tion, however, defendants (Mexi-
homeland to avoid arrest. The in- can nationals) are prosecuted in
vestigators subsequently uncovered Defining Article IV Mexico and, if convicted, serve
a Mexican address for the fugitive. Article IV refers to the law un- their sentences there.
Now, they want to bring him to jus- der the Mexican Federal Penal
tice. What course of action should Code that permits Mexican federal Using Article IV
they take? authorities to prosecute Mexican To use Article IV, U.S. law en-
Traditionally, law enforcement nationals who commit crimes in for- forcement officials, first and fore-
authorities seek to extradite Mexi- eign countries or to prosecute other most, must prove that either the sus-
can national fugitives who flee the nationals who commit crimes pect or victim is a Mexican
United States to evade justice and against Mexican citizens outside of national. Without this proof,
take refuge in Mexico. While extra- Mexico.1 Usually, law enforcement Mexico lacks jurisdiction to pros-
dition represents a viable option officials in the United States (e.g., ecute. During the investigative
and the clear preference for most state and local county prosecutors) stage of the crime, officers can ob-
jurisdictions, U.S. law enforcement seek recourse under the mechanism tain information from witnesses or
“
can initiate and begin an Article IV
prosecution. First, U.S. law en-
forcement agencies requesting Ar- Article IV...permits
ticle IV prosecution must provide
the fugitive’s address in Mexico.
Mexican federal
Generally, the majority of the fugi- authorities to
tives who flee from U.S. prosecu- prosecute Mexican
tion return to their hometowns. Ad- nationals who commit
dresses in Mexico are very different crimes in foreign
from those in the United States, par- countries....
ticularly in the rural areas. Often,
”
rural addresses are listed as
ranchitos (ranches) or ejidos (com-
munal properties) or designated by Special Agent Duran heads the Division of Gambling Control
the kilometer of that area of the of the California Department of Justice in San Diego.
June 2002 / 21
and violent crimes represents an- address the arrest and prosecution Assisting Local Agencies
other difference between the United of Mexican nationals in Mexico ac- When FPU receives an Article
States and Mexico that arises from cused of committing violent crimes IV request from a local, county, or
time to time. In the United States, in California. state law enforcement agency for an
juveniles who commit serious and In that same year, the California evaluation of a case, an FPU agent
violent crimes can be tried as adults attorney general authorized the reviews the facts and circumstances
at the federal level, if not in all MLU agent to travel to the Republic of the particular case to determine if
states. Under Mexican penal law, of Mexico and file Article IV crimi- it satisfies the legal requirements to
juveniles cannot be tried as adults. nal complaints for California police file the complaint in Mexico. To
In general, however, most violent departments, sheriffs’ offices, and arrive at a decision, the FPU agent
crimes committed by adults fall un- district attorneys. From 1975 to will confirm with the requesting
der the dual criminality require- 1987, the agent handled, on aver- jurisdiction’s investigator the na-
ments of Article IV. age, three Article IV filings a year. tionality of the fugitive, whether an
address has been established in the
Creating Liaison
“
Republic of Mexico, if the crime
In the early 1970s, filing Article has dual criminality in both coun-
IV cases with the Mexican Federal tries, and the prosecutor’s interest
Attorney General’s Office (PGR) ...the case must in surrendering jurisdiction. Many
constituted a new frontier for Cali- meet three law enforcement officials favor ex-
fornia law enforcement, and spe- conditions...before tradition as it is a matter of policy
cific guidelines did not exist. The Mexican federal that a defendant should be tried
number of violent crimes being prosecutors can in the jurisdiction where the crime
committed by Mexican nationals occurred.3
were proliferating significantly
initiate...prosecution.
After discussing the underlying
”
throughout the state, and many fugi- facts of a case with an FPU agent,
tives wanted in the United States law enforcement officials may be-
sought safe haven or refuge in their lieve that the case will not reach the
hometowns in the Republic of Renamed the Foreign Prosecution exceptional circumstances thresh-
Mexico. Concerned with this devel- Unit (FPU) in 1991, the program’s old of an extradition required under
oping trend, in 1975, the California mission remained the same: to as- Mexican law. After law enforce-
Department of Justice established a sist California law enforcement of- ment officials concur with the filing
Mexican Liaison Unit (MLU), ficials with identifying, developing, of an Article IV complaint, rather
staffed by one bilingual agent, preparing, and presenting Article than extradition, FPU agents ex-
within the California Bureau of In- IV cases in Mexico. FPU has grown plain the costs to file the case.
vestigation to assist California law to include two special agent super- These include travel expenses and
enforcement agencies in addressing visors, two special agents, and a other ancillary costs that the U.S.
Article IV cases and other liaison full-time professional translator agency must pay to file the case
requests. at the California Bureau of with Mexico’s Federal Attorney
Next, the California attorney Investigation’s San Diego regional General’s Office in Mexico City or
general asked the MLU agent to ex- office. With this current staff, FPU at Mexican state delegation offices
plore alternative solutions with averages approximately 15 Article in other areas of the country.
Mexico’s federal prosecutors. IV filings each year. Due to achiev-
Meeting in Tijuana in the Mexican ing numerous successful Article IV Preparing the Article IV
state of Baja California, Mexican filings in Mexico, FPU now re- Package
federal prosecutors and the MLU ceives requests for Article IV assis- Once a jurisdiction has decided
agent soon focused on Article IV of tance from law enforcement agen- to seek prosecution of a fugitive un-
the Mexican Federal Penal Code to cies outside of California.2 der Article IV, the law enforcement
June 2002 / 23
and the defendant serves the sen- through Article IV of the Mexican Endnotes
1
tence in Mexico. FPU has received Federal Penal Code. The California To obtain information about other
countries that have similar laws, with varying
Article IV homicide sentences Department of Justice, California guidelines and criteria, contact the U.S.
ranging from 15 to 50 years in the Bureau of Investigation, Foreign Department of Justice, Office of International
Mexican penal system. Prosecution Unit can assist U.S. law Affairs in Washington, D.C., at 202-514-0000
enforcement agencies initiate, pre- or at the agency’s Web site at http://
Conclusion pare, and file Article IV criminal ww.usdoj.gov/criminal/oia.html.
2
Agencies can contact the California
For many U.S. law enforcement complaints against Mexican citi- Department of Justice, California Bureau of
officials, extradition stands as the zens who commit violent crimes Investigation, Foreign Prosecution Unit at 858-
traditional and preferred method to in the United States. Article IV 268-5400.
3
seek justice when a wanted suspect If agencies need extradition information,
constitutes another tool for the they should contact the U.S. Department of
flees their jurisdiction after com- criminal justice community to em- Justice, Office of International Affairs (OIA) in
mitting a serious or violent crime. ploy in its fight against criminals Washington, D.C., at 202-514-0000. OIA trial
In cases where a Mexican national who prey on Americans and then attorneys can answer questions about extra-
returns to Mexico, U.S. law en- dition issues, as well as provide information on
seek refuge from justice in their international law and foreign prosecution.
forcement officers may seek justice home country.
Subscribe Now
June 2002 / 25
Legal Digest
© PhotoDisc
T he self-incrimination clause when the statement resulted from receiving this warning and subse-
of the Fifth Amendment to his being told that he might lose his quently were tried in state criminal
the U.S. Constitution pro- job if he failed to answer the ques- court where their answers were
hibits forcing individuals to provide tions. In Garrity, local New Jersey used against them. Upon convic-
evidence against themselves in a police officers who were the sub- tion, these officers appealed to the
criminal matter. The due process jects of a public corruption probe New Jersey Supreme Court that
clause of the Fourteenth Amend- were interviewed by state investiga- affirmed that the officers’ state-
ment makes this requirement appli- tors. The officers were told that they ments were made voluntarily and,
cable to the states. However, indi- did not have to answer any ques- therefore, were admissible under
viduals always can voluntarily tions, but, if they did, their answers both the New Jersey and the U.S.
decide to provide information to could be used against them in crimi- Constitutions.2
authorities that subsequently is ad- nal proceedings. The officers also Justice Douglas wrote in
missible against them in a criminal were informed that New Jersey law Garrity that a person who chooses
proceeding. provides that a failure to answer self-incrimination over job forfei-
The U.S. Supreme Court ruled questions concerning their duties ture is not waiving a constitutional
in Garrity v. New Jersey1 that a vio- during a criminal probe, even when right voluntarily. He rejected New
lation of the Fourteenth Amend- the answers might incriminate Jersey’s argument that because
ment occurs when the government them, could result in their removal there is no constitutional right to be
uses a police officer’s statement in a from office. Several officers an- a police officer, the state should be
criminal trial against that officer swered questions put to them after allowed to obtain the cooperation of
”
questions and, then later, be found
to have exercised their free will vol-
untarily, allowing their answers to Special Agent Brooks is a legal
be used against them in a criminal instructor at the FBI Academy.
proceeding.3
The Supreme Court has subse-
quently held that a police officer an employee refuses to voluntarily force to uniformed duty after he had
can be threatened with job loss for answer questions during an internal invoked his Fifth Amendment
failure to answer questions or other- investigation.6 rights before a grand jury investi-
wise cooperate with investigators. gating corruption. In his task force
However, any answers given under Sanctions that Trigger Garrity assignment, Chan regularly re-
such circumstances cannot be used All law enforcement officers ceived overtime pay and had the use
against the officer in a criminal regularly file reports of investiga- of an official vehicle. After his
trial.4 This ruling has led to the cre- tive activity. An officer who fails to transfer, he did not have either of
ation of the so-called “Garrity do so in a particular case could be these benefits, and he claimed that
warning” used in internal investiga- subject to administrative sanctions. the transfer caused him a loss of
tions. This warning, in various An officer who never files reports prestige. He sued, arguing that the
forms, advises law enforcement eventually would be fired for non- transfer was in retaliation for his
employees that they must answer performance. An officer who re- refusal to testify before the grand
questions posed by investigators or fuses a superior’s order to file a jury.8 The U. S. Circuit Court of
face the possibility of administra- report concerning a specific inci- Appeals, Seventh Circuit noted that
tive sanction, including job loss. dent could be dismissed for insub- the Garrity decision prohibits a
The warning also advises that an- ordination. Does this mean that any government agency from threaten-
swers provided by the employees investigative report is subject to ing job loss to obtain a statement
cannot be used against them in a Garrity protection because the of- from a public employee without
criminal proceeding. In cases where ficer filing the report is subject to first granting the employee immu-
criminal prosecution against law administrative sanctions, which nity. However, in upholding a di-
enforcement employees is contem- might include termination, for fail- rected verdict for the officer’s supe-
plated, the employees are advised ure to file the report? rior, the court held that, “...not
that they do not have to answer The case law since the Garrity every consequence of invoking the
questions but that any answers can decision clearly holds that only Fifth Amendment is considered suf-
be used against the employee in a the threat of severe administrative ficiently severe to amount to coer-
criminal proceeding.5 sanctions will trigger the Garrity cion to waive the right. Rather, the
This article addresses what trig- protection. For example, in Chan v. effect must be sufficiently severe to
gers Garrity protection. It also dis- Wodnicki,7 a Chicago police officer, be ‘capable of forcing the self-in-
cusses what administrative options Chan, sued a superior who had crimination which the amendment
a law enforcement manager has if transferred him from a terrorist task forbids.’ ”9 The court found that
June 2002 / 27
Chan’s transfer did not result in any police rules. Upon being found state police rules did not specifi-
loss of base pay. It further noted that guilty by a trial board, an officer cally mandate that the officer an-
there were no reported cases where could be dismissed. Because of this, swer questions or be dismissed. The
anything short of the threat of job the officer claimed to reasonably court held that, “the subjective fears
loss or suspension constituted a se- believe at the time of the interviews of [the] defendant as to what might
vere enough threat to trigger that he was being ordered to provide happen if he refused to answer his
Garrity.10 information based on common superior officers [were not] suffi-
practice. During one of the inter- cient to bring him within Garrity’s
Overt Versus Implied views, a superior overtly ordered cloak of protection.”13
Threats of Sanctions the officer to divulge the name of an Other courts have not been as
What is not clear, however, is informant the officer claimed to restrictive as the First Circuit was in
how overt the threat must be to trig- have met at the scene of the theft. Indorato. For example, in United
ger the Garrity protection. Is the Therefore, in the officer’s mind, his States v. Friedrick,14 the Circuit
implied threat of severe administra- superiors were ordering him to pro- Court of Appeals for the District of
tive sanction sufficient? In United vide information or face possible Columbia ruled that where a sus-
States v. Indorato,11 the U.S. Circuit job loss. The officer argued that this pect agent has an objectively rea-
Court of Appeals, First Circuit con- belief was objectively reasonable.12 sonable belief that failure to answer
sidered the appeal of a Massachu- questions will cause him to lose his
setts State Police officer who had job, his statement in response to the
“
been convicted of the theft of a questions is “compelled” under
trailer and its contents. Shortly after Garrity. In Friedrick, an FBI agent,
the theft, the officer was inter- ...nothing in Garrity suspected of making false official
viewed by his superiors and by FBI prohibits forcing statements, was summoned to
agents. Prior to one of the inter- Washington for interviews by U.S.
views, a superior began to read the
cooperation by Department of Justice attorneys.
officer his Miranda rights. The of- law enforcement These interviews continued
ficer stopped his superior by saying employees with over several days, and the agent was
that he already knew them. None of internal investigators. never told that his answers were
the other interviews were pro- “compelled.” The District of Co-
”
ceeded by warnings of any kind, lumbia Circuit Court ruled that such
and the officer was never in custody an overt warning was not required
at the time of any of the interviews. to make the agent’s statements
The officer answered all of the The First Circuit ruled that to “compelled” under Garrity in light
questions put to him during the in- trigger Garrity, a public employee of the facts surrounding the inter-
terviews, and some of his answers must show that he was ordered to views. Instead, the court ruled that
were used against him at trial. The waive his Fifth Amendment right the agent was objectively reason-
officer, a lieutenant with over 20 against self-incrimination and that able in believing that he would lose
years of experience, argued that he a statute or municipal ordinance his job if he did not answer the at-
was aware that state police rules must mandate the dismissal of an torneys’ questions. This rendered
provided for the dismissal of an of- employee who fails to do so. In this his statements inadmissible against
ficer who refuses to follow the case, the court noted that neither him in a criminal trial.15
lawful order of a superior. In fact, criteria was present and, for that
the state police rules provided that reason, held that the officer’s state- Routine Investigative Reports
officers must follow lawful orders ments were admissible. The court Routine reports prepared by
promptly and that failure to do so found that the officer was never told law enforcement employees will
could result in the convening of a that refusal to answer would sub- not be considered “compelled”
trial board for failure to follow state ject him to dismissal and that the under Garrity regardless of which
June 2002 / 29
the exercise of a constitutional after being told that his answers including employment termination,
right.21 In light of Gardiner, what is could not be used against him crimi- against individuals who lie during
the impact of a refusal to cooperate nally. Upon learning at the adminis- an administrative investigation.
in an administrative investigation trative hearing that he was not being This is true regardless of whether
when the employee is not “com- compelled, the deputy’s attorney subjects were told, or objectively
pelled” to cooperate pursuant to advised him not to answer any ques- believed, their statements were
Garrity? tions and assert his Fifth Amend- compelled. In LaChance v.
The U.S. Supreme Court has ment privilege against self-incrimi- Erickson,27 a unanimous Supreme
ruled that a refusal to voluntarily nation. The deputy followed this Court rejected a lower court ruling
waive the Fifth Amendment right advise and was subsequently that there is a due process right to
against self-incrimination can be fired.25 The Eleventh Circuit re- make false statements during an ad-
considered when determining an jected the deputy’s claim that his ministrative inquiry. Federal em-
appropriate administrative punish- ployees who were suspected of mis-
ment. In Baxter v. Palmigiano,22 the conduct were compelled upon
“
Court held that telling a prisoner at threat of job loss to answer ques-
a disciplinary hearing that he could tions concerning the misconduct.
remain silent but that his silence ...the law enforcement The employees argued that being
would be considered when impos- administrators should placed in the position of answering
ing administrative punishment did not be concerned that questions where truthful responses
not amount to compulsion trigger- routine investigative result in a severe administrative
ing Garrity immunity protection. penalty violated the due process
The Court held that while the exer-
reports will be cloaked clause of the Fifth Amendment
cise of a right to silence can never with any Garrity when they were disciplined for their
be considered by a criminal court, immunity. false answers. The Supreme Court
”
there is no such prohibition to its emphatically rejected this argument
consideration during an administra- holding, “The core of due process is
tive proceeding. The Court ruled the right to notice and a meaningful
that as long as the silence is not superiors could not consider his as- opportunity to be heard (citations
used, in and of itself, to justify an sertion of his Fifth Amendment omitted). But we reject, on the basis
adverse finding, there is no viola- right in deciding to fire him. The of both precedent and principle, the
tion of the Constitution when con- court ruled that all Broderick re- view expressed by the Court of Ap-
sidering the exercise of the right quires is that a termination cannot peals in this action that a ‘meaning-
against self-incrimination in a non- be based solely on the exercise ful opportunity to be heard’ in-
criminal proceeding.23 of the constitutional right. There cludes a right to make false
In Harrison v. Wille,24 the U.S. is nothing that prohibits an agency statements with respect to the
Circuit Court of Appeals, Eleventh from drawing an adverse inference charged conduct.”28 This ruling is
Circuit reviewed a case where a from the exercise of the right especially important to the law en-
Florida deputy sheriff was fired against self-incrimination and con- forcement administrator who must
after refusing to answer questions at sidering it along with other factors ensure the integrity of the organiza-
an administrative hearing where in deciding on an appropriate ad- tion by taking swift and severe ad-
he had been advised that he was ministrative action, which can in- ministrative action against any em-
not being compelled to answer any clude termination.26 ployee who engages in a lack of
questions. The deputy, who was candor.
suspected of involvement in thefts Obligation to Tell the Truth
from an evidence room, had It equally is clear that nothing Conclusion
previously answered investigators in the U.S. Constitution prohibits The Garrity ruling imposes
questions concerning the thefts taking severe administrative action, significant restraints on law
June 2002 / 31
FBI Law Enforcement Bulletin
Author Guidelines
GENERAL INFORMATION additional specifications, detailed examples, and
The FBI Law Enforcement Bulletin is an effective writing techniques.
official publication of the Federal Bureau of PHOTOGRAPHS AND GRAPHICS
Investigation and the U.S. Department of Justice.
Frequency of Publication: Monthly. A photograph of the author(s) should
Purpose: To provide a forum for the ex- accompany the manuscript. Authors can submit
change of information on law enforcement-related photos and illustrations that visually enhance
topics. and support the text. Black-and-white glossy
Audience: Criminal justice professionals, prints (3- by 5-inch to 5- by 7-inch) reproduce
primarily law enforcement managers. best. The Bulletin does not accept responsibility
for lost or damaged photos or illustrations.
MANUSCRIPT SPECIFICATIONS PUBLICATION
Length: Feature articles should contain 2,000 Judging Manuscripts: The Bulletin judges
to 3,500 words (8 to 14 pages, double-spaced). articles on relevance to the audience, factual
Submissions for specialized departments, such as accuracy, analysis of the information, structure
Police Practice and Case Study, should contain and logical flow, style and ease of reading, and
1,200 to 2,000 words (5 to 8 pages, double- length. The Bulletin generally does not publish
spaced). articles on similar topics within a 12-month
Format: Authors should submit three copies period or accept articles previously published or
of their articles typed and double-spaced on 8 1/2- currently under consideration by other maga-
by 11-inch white paper with all pages numbered. zines. Because it is a government publication,
When possible, an electronic version of the article the Bulletin cannot accept articles that advertise
saved on computer disk should accompany the a product or service.
typed manuscript. Query Letters: Authors may submit a
Authors should supply references when query letter along with a 1- to 2-page outline
quoting a source exactly, citing or paraphrasing before writing an article. Although designed to
another person’s work or ideas, or referring to help authors, this process does not guarantee
information that generally is not well known. For acceptance of any article.
proper footnote format, authors should refer to A Author Notification: The Bulletin staff
Manual for Writers of Term Papers, Theses, and will review queries and articles and advise the
Dissertations, 6th ed., by Kate L. Turabian. authors of acceptance or rejection. The maga-
Writing Style and Grammar: The Bulletin zine cannot guarantee a publication date for
prefers to publish articles in the third person accepted articles.
(Point of View and Perspective submissions Editing: The Bulletin staff edits all manu-
are exceptions) using active voice. Authors scripts for length, clarity, format, and style.
should follow The New York Public Library
Writer’s Guide to Style and Usage and should SUBMISSION
study several issues of the magazine to ensure Authors should mail their submissions to:
that their writing style meets the Bulletin’s Editor, FBI Law Enforcement Bulletin, FBI
requirements. Academy, Madison Bldg., Room 209, Quantico,
Authors also should contact the Bulletin staff VA 22135; telephone: 703-632-1952; fax:
for the expanded author guidelines, which contain 703-632-1968; e-mail: leb@fbiacademy.edu.
Official Business
Penalty for Private Use $300
Patch Call
The patch of the Bedford, Massachusetts, Police The New Orleans, Louisiana, Police Department
Department displays a replica of the Bedford flag, patch is a replica of the Seal of the City of New
which is the oldest flag carried into battle in the Orleans. The stars in the seal represent the states
United States. The Bedford Minutemen carried the admitted to the Union between 1787 and 1850. The
flag in their march to join Minutemen companies Indian man and woman signify the first inhabitants of
from surrounding towns to successfully stop the New Orleans, and the alligator represents the marshes
British at the North Bridge in Concord. and swamps common to this area.