Escolar Documentos
Profissional Documentos
Cultura Documentos
Digital Communication
July 2010
Volume 79
Number 7
United States
Department of Justice
Federal Bureau of Investigation
Washington, DC 20535-0001
The attorney general has determined The PIO and Today’s Today’s PIO must embrace modern
that the publication of this periodical
is necessary in the transaction of the
public business required by law. Use
Digital News Environment
By Patrick Davis
1 technology and the expanding abilities
and responsibilities it brings.
of funds for printing this periodical has
been approved by the director of the
Office of Management and Budget.
Cell Phones as Cell phone use by inmates can pose
The FBI Law Enforcement Bulletin
(ISSN-0014-5688) is published
monthly by the Federal Bureau of
Prison Contraband
By Tod W. Burke and
10 significant dangers.
Bunny S. Morris
Art Director
Denise Bennett Smith
Assistant Art Director
Stephanie L. Lowe Departments
The Training Division’s
Outreach and Communications Unit
produces this publication with
assistance from the division’s 9 Technology Update 19 Bulletin Honors
National Academy Unit.
Issues are available online at
The FBI and Social Media Fair Lawn, New Jersey
http://www.fbi.gov.
E-mail Address
15 Unusual Weapon 24 Bulletin Reports
leb@fbiacademy.edu Cigar Cutter OJJDP Initiatives
Cover Photograph
Mental Health Initiatives
© iStockphoto.com 16 Notable Speech
The Significance of 26 Leadership Spotlight
Send article submissions to Editor,
FBI Law Enforcement Bulletin, Personal Character Effective Leadership Through
FBI Academy, Quantico, VA 22135. Institutional Integrity
July 2010 / 1
ver the past 20 years, that journalists must turn around media representatives eager
“ …PIOs must
continue to embrace
technology and
to embrace technology and
its benefits or risk becoming
obsolete.2
“Organizations that…
control media images and
its benefits or risk promote issues consistent with
becoming obsolete. their own interests have power,
and losing this control is detri-
mental to their legitimacy….”3
“
editor or news director watching PIOs responsible for watch-
wires and rival television news- ing daily news clips will find
casts and reading Web logs and RSS feeds valuable. Web-based
feeds. Even non-24/7 outlets,
Effective PIOs know search engines, such as Yahoo!
such as alternative papers and how the media in and Google, allow users to cre-
weekly editions, still demand their community ate their own Internet searches
access to information about works and for specific terms. For instance,
incidents that occur outside how to release subscribing to Google Reader
normal business hours. PIOs information quickly allows PIOs to create feeds to
can exploit this by developing and accurately. continually scan and gener-
their own news-producing feeds ate alerts for terms, such as the
”
online that can become the name of their department and
official message of an agency chief or sheriff or any other
during routine days, as well as words they choose. These feeds
crises. feeds. This proves especially can turn up such items as news
helpful in large markets where stories, personal blogs com-
EMBRACING reporters with different assign- menting on the agency and its
TODAY’S TOOLS ments can subscribe to separate officers, community newsletters
feeds from the same Web site; a from neighborhood associa-
RSS Feeds crime reporter can opt to learn tions, and even some chat-room
Subscribers to Real Simple about arrests and investigations, posts. A reader who spots a blog
Syndication (RSS) feeds auto- while a school reporter may complaining about speeders in
matically receive notification select only new juvenile inter- a neighborhood could direct of-
when a Web site they follow vention programs. ficers to increase visibility and
is updated; they also choose Law enforcement agen- enforcement in that area, even
the type of content to which cies can use this valuable tool without submitting a formal
they want to be alerted.5 For to communicate information request.
July 2010 / 3
© Kyle Hartsock
“
media without ever leaving the time later expanded the message
office and without the trouble to include more information and
of calling everyone individu- more subscribers within a larger
ally with the same information.
Modern technology search area. The woman soon
Agencies using the Internet as offers both was found safe and returned to
part of their public informa- new capabilities her family.
tion strategy should incorporate and new challenges. Other agencies, particularly
Twitter into their Web sites to those in major metropolitan
”
provide live tweets without areas, will find Nixle useful dur-
requiring readers to subscribe. ing major events. For example,
during the 2009 G-20 meetings,
Nixle emergency messages to all users Pittsburgh, Pennsylvania, Police
Of all the social networking in a designated geographic ar- Department command staff used
Web sites, Nixle is the first to ea.6 This works well in commu- Nixle’s secure group text-mes-
target municipal agencies. That nicating directly to those who saging abilities to send secure
approach has earned it some need the information quickly. messages about developing in-
unique partners. In June 2008, Municipal users simply log in, cidents to partner agencies pro-
Nixle became the first public enter their message, and then viding security at multiple event
networking site to partner with select an area on a map affected locations. Because the messages
the National Law Enforcement by the incident. The message between municipal departments
Telecommunications System goes only to users who choose were routed through NLETS,
(NLETS). Because of this to accept alerts in those areas. they were secure enough for
relationship, Nixle can house its This ability to limit information sensitive information and could
servers in NLETS’ secure facili- distribution to only those who be targeted to specific law
ties, resulting in an enhanced need it offers a big advantage enforcement teams or agencies
July 2010 / 5
working at a single site.7 This where municipalities begin Popular Tools
flexibility proved critical to promoting their own use of the
their success and ensured that system.
persons receiving the messages Because it is so new, the full
did not tune out the informa- benefits of Nixle likely have not
tion, as often happens when been realized. But, its unique
officers monitor citywide alerts partnership with municipalities, http://www.facebook.com
not relevant to their individual particularly law enforcement, is
assignment, or that people did promising and has proven suc-
not change the message as they cessful. Because of its support
passed it through the grapevine. by private users and advertisers,
As many municipalities the service is generally free for http://www.nixle.com
begin to look for cost-effective agencies.
and reliable means of emer-
gency messaging, Nixle likely YouTube
will see increased attention. Its By far, YouTube is the most
extensive usage is growing prolific personal media site
rapidly. Schools, univer- available. Many departments http://twitter.com
sities, search and res- use it to publish recruiting vid-
cue teams, and other eos and news conferences. The
municipal agencies primary attraction to YouTube
increasingly look is that agencies can have a
to Nixle because department profile and create
of its security and post videos for free. This
and reliabili- allows large agencies to focus http://www.Youtube.com
ty during an media dollars on production and
emergency, smaller ones to establish a Web
and this presence. In addition, PIOs can
likely will use YouTube to promote new can integrate YouTube video
generate initiatives that are sometimes into other media strategies to
increased difficult to have covered in the create a better-controlled and
users in traditional media. more-thorough approach. You-
areas Because users control the Tube videos can be included in
content, departments can cre- department Web sites and Face-
ate their own videos book pages and linked to Twit-
profiling agency ter messages. Further, many
accomplishments, of- media outlets that have a Web
ficers of the year, and presence often will point view-
new initiatives with- ers to an agency’s YouTube
out time-constraint page so they can find more in-
limits imposed by formation on a particular story
television reporting. and, thus, the department as
© Photos.com Departments even well.
“
to other users who choose to tweets that a reporter plans a
follow by becoming a “friend.” story about the rise of juvenile
Especially important to orga- crime. A PIO could quickly call
PIOs must the station and suggest a story
nizations, friends can opt to re-
ceive instant notification when
remain accessible about a new truancy prevention
the agency posts new informa- to ensure their grant recently awarded to the
tion and content, and they can success. police department.
respond with comments. PIOs must remain acces-
”
For example, a law enforce- sible to ensure their success.
ment agency can post a Friday Not surprisingly, a recent study
afternoon status update remind- found that an accessible PIO or
ing friends of checkpoints Public agencies find Face- chief executive was the most
targeting drunk driving. Every book enticing because it costs important factor in creating a
friend will get this information nothing to create, edit, or main- positive image of an agency in
as they make plans for Friday tain a profile. It also provides the eyes of the media.8 Tech-
night activities and, thus, hope- real-time information about nology provides new ways for
fully will remember to use a who follows the department’s those who need to be acces-
designated driver. Similarly, a information, who shows the sible to remain in touch without
single posting can spread AM- most interest, and what types of actually being on the phone or
BER Alerts and other breaking comments followers have had. present in person.
news around the world, both to Agencies also can promote and
citizens and to the media. PIOs spread positive stories in the CONCLUSION
no longer need to e-mail, fax, press by linking to it; both the Clearly, public information
and call numerous news outlets department and the media outlet officers need to change with
to promote a story and then wait benefit from the publicity. the times. Modern technology
hours or days for them to air or offers both new capabilities and
publish it. CHANGING THE new challenges. As these in-
New features allow the PIO’S ROLE novations expand the amount
integration of Facebook status For on-the-move PIOs and of information available, PIOs
updates with Twitter, blogs, or journalists alike, most news must ensure they retain the
commonly used Web sites. This outlets now have a presence ability to control their agency’s
gives account managers the on Twitter and provide regular message.
July 2010 / 7
5
Departments and their PIOs Endnotes David Scott, The New Rules of
must ensure they “establish Marketing and PR: How to Use News Re-
1
Steven Chermak and Alexander leases, Blogs, Podcasts, Viral Marketing,
protected fronts…and commu- Weiss, “Maintaining Legitimacy Using and Online Media to Reach Your Buyers
nicate in ways allowing them External Communication Strategies: Directly (New York, NY: John Wiley and
to strategically control what is An Analysis of Police-Media Relations,” Sons, 2007), 191.
Journal of Criminal Justice 33 (2005): 6
known and asked.”9 Digital me- 510. 7
http://www.nixle.com
dia is a front that agencies must “Pittsburgh PD Uses Text Mes-
2
References to specific brands and saging During G-20 Protests,” http://
incorporate into their public products are for clarity and should not be www.policemag.com/Blog/Technology/
information strategy. By estab- considered endorsements by the FBI. Story/2009/10/Pittsburgh-Police-s-Text-
3
lishing themselves in the digital Chermak and Weiss, 510. Messages-Help-Quell-G-20-Protest-
4
R. G. Kasinsky, “Patrolling the Facts: Violence.aspx (accessed 12/2/09).
community, agencies can ensure Media, Cops, and Crime,” in Media, 8
Chermak and Weiss, 502.
they have the best possible rela- Process, and the Social Construction of 9
Chermak and Weiss, 509.
tionship with the media and the Crime, ed. G. Barak (New York, NY:
public. Garland, 1994), 203-234.
T he FBI Law Enforcement Bulletin has been available to our readers online
since March 1990. With the August 2009 issue, we began sending our readers
e-mails announcing the latest edition and providing a direct link to the FBI Law
Enforcement Bulletin on http://www.fbi.gov. There, you will be able to find the current
edition, as well as previous issues of the FBI Law Enforcement Bulletin going back
10 years.
To receive these e-mails each month, please access http://www.fbi.gov and click
on “Get FBI Alerts” at the upper right-hand corner of the FBI home page. Enter your
e-mail address and select any monthly alerts you are interested in receiving, including
the FBI Law Enforcement Bulletin. Once you have registered your e-mail address at
http://www.fbi.gov, please contact us at lebonline@fbiacademy.edu with your name,
position, organization, and e-mail address, as well as any thoughts you might have
on the magazine or this online e-mail announcement system. If you encounter any
difficulties, please let us know by e-mailing us at lebonline@fbiacademy.edu.
We look forward to hearing from you at lebonline@fbiacademy.edu. Please
continue to send comments, questions, or suggestions regarding articles to the FBI Law
Enforcement Bulletin editors at leb@fbiacademy.edu.
Editor
FBI Law Enforcement Bulletin
July 2010 / 9
Cell Phones as
Prison Contraband
By TOD W. BURKE, Ph.D., and STEPHEN S. OWEN, Ph.D.
© Thinkstock.com
n inmate escaped from a cell phones to facilitate criminal detection and proposed legisla-
July 2010 / 11
Concealment by Inmates inspections but perimeter devices,20 including even the
Prisoners have creative searches. In one case, officials small SIM cards, which is im-
methods of concealing cell discovered wireless devices portant because prisoners often
phones and related contraband, outside a perimeter fence and store them separately, “mini-
such as subscriber identity mod- determined that a makeshift mizing the loss in case a phone
ule (SIM) cards used to store launcher catapulted them over is seized.”21 The use of dogs to
phone numbers and text mes- the prison wall.17 Some institu- sniff out cell phones has proved
sages.14 For instance, authori- tions have used traditional quite successful. According to
ties have found devices hidden security measures, such as metal one report, “In fiscal year 2008,
under mattresses; concealed by detectors; X-ray technology; 849 cell phones were found
wrist watches; and contained and routine searches of staff, within the facility or intercepted
inside body cavities, rice and outside of the facility on prison
cereal containers, false bottoms grounds at 24 facilities….”22
“
of boxes, hollowed-out books, Some agencies have begun
toilets, televisions, radios, light to use electronic cell phone
fixtures, portable fans, socks, detection systems, which can
and duffle bags.15 Prisoners have indicate to security staff when
Visitors and employees creative methods a device is in use in a facil-
also smuggle wireless phones of concealing cell ity. Some such systems rely on
and related paraphernalia into phones and related wireless sensors to detect phone
prisons. In some cases, staff contraband…. signals.23 Others may be hard-
members have accepted bribes, wired within a facility. Although
usually for several hundred dol- effective, use of these technolo-
”
lars per device, from inmates to gies requires start-up costs.24
sneak cell phones into facilities.
For example, one correctional Jamming and
officer reported earning more visitors, and contractors, to Legal Considerations
than $100,000 by charging pris- detect cell phones.18 Officials “Jamming is a radio fre-
oners $100 to $400 per device. also have used body orifice quency (RF) technology used
Smuggled wireless phones also security scanner (BOSS) sys- to disrupt cell phone signals.”25
provide a source of additional tems to detect cell phones Along with denial of service
income to inmates who charge and parts concealed in body and passive interception, this
other prisoners up to $50 for cavities.19 may seem like an attractive
each call placed.16 An innovative proactive possibility; however, it is illegal
approach to detection is the unless done pursuant to specific
Detection by Authorities use of dogs. For instance, as authorization. As noted in sec-
As a result of the influx of part of their crackdown on cell tion 333 of the Federal Com-
wireless phones within facili- phone possession by inmates, munications Commission (FCC)
ties, officials have taken ag- the Maryland Department of Act of 1934, “[N]o person shall
gressive measures to detect Public Safety and Correctional willfully or maliciously inter-
them. Authorities have imple- Services uses canines trained fere with or cause interference
mented not only random cell specifically to detect wireless to any radio communications.”26
July 2010 / 13
7
correctional institutions need to Endnotes Lopez v. Reyes, 5th Circuit Court of
continue their vigilance toward 1
Don Thompson, “Prisons Press Fight Appeals, 692 F.2d 15 (1982).
8
Against Smuggled Cell Phones,” ABC Office of the Inspector General,
detection of smuggling and “Criminal Calls: A Review of the Bureau
News, http://abcnews.go.com/Technology/
possession of the devices by wireStory?id=7332293 (accessed Septem- of Prisons’ Management of Inmate Tele-
prisoners, using both traditional ber 8, 2009). phone Privileges,” U.S. Department of
and innovative methods (e.g., 2
Michael Graczyk, “Texas Prisons Justice, http://www.usdoj.gov/oig/
canines). Second, if jamming Locked Down After Death-Row Inmate special/9908 (accessed September 8,
Found with Phone,” CorrectionsOne, 2009).
becomes legal, research on the 9
Thompson.
http://www.correctionsone.com/correc-
usage of these technologies tions/articles/1747630-Texas-prisons-
10
Lisa Sandberg, “Texas Prison Of-
should continue. Third, jurisdic- locked-down-after-death-row-inmate- ficials Plan to Test Cell Phone Jammers,”
tions should consider criminal- found-with-phone/ (accessed September 8, CorrectionsOne, http://www.correction-
izing inmate cell phone posses- 2009). sone.com/news/1760767-Texas-prison-
officials-plan-to-test-cell-phone-jammers
sion, rather than treating it as (accessed September 8, 2009).
ordinary contraband; officials 11
Hilary Hylton, “Trying to Keep
“
in California have introduced Cell Phones Out of Prison,” Time
such a bill.35 Finally, authori- Inc., http://www.time.com/time/
ties should encourage the use printout/0,8816,1861553,00.html
of technology as a prevention This problem likely (accessed September 8, 2009).
12
and detection strategy for cell will not disappear Stan Lehman, “Pigeons Fly Cell
Phones into Brazilian Prison,” ABC News,
phones in prisons. in the near future. http://abcnews.go.com/International/
However, effective wireStory?id=7222002 (accessed
Conclusion prevention strategies September 8, 2009).
13
At one time, drugs and to- Rick Binetti, “Cell Phones Go to the
and workable policies Dogs: Maryland Uses Phone-Finding K-9s
bacco served as the contraband can help minimize it. to Step Up Security Efforts,” Corrections
of choice by prisoners. Now, Today, October 2008, 59.
”
wireless phones are becoming 14
Kristen Wyatt, “Prisons Cracking
popular. Correctional personnel Down on Wrong Types of Cells,” Cor-
must maintain excellent intel- rectionsOne, http://www.correctionsone.
ligence gathering and uphold com/corrections-training/articles/1711217-
3
Richard Tewksbury and Elizabeth Prisons-cracking-down-on-wrong-types-
effective practices to minimize of-cells/ (accessed September 8, 2009).
Mustaine, “Insiders’ Views of Prison
the dangers posed by inmate Amenities: Beliefs and Perceptions of 15
Thompson.
wireless phone possession. Correctional Staff Members,” Criminal 16
Thompson.
Prisoners have smuggled Justice Review 30, no. 2 (2005): 174-188. 17
Matt Clarke, “Entire Texas Prison
cell phones into institutions and 4
Johnson v. Galli, U.S. District Court System Locked Down to Search for
for the District of Nevada, 596 F. Supp. Phones,” Prison Legal News, https://www.
used them for various purposes, prisonlegalnews.org/21021_displayArticle.
135 (1984).
some illegal and even danger- 5
Pope v. Hightower, 11th Circuit Court aspx (accessed September 8, 2009).
ous. However, the authors feel of Appeals, 101 F.3d 1382 (1996). 18
William Scism and Bryan Sterling,
that authorities can implement 6
U.S. v. Paul, 6th Circuit Court of “Can Technology Address the Contraband
effective strategies that can suc- Appeals, 614 F.2d 115, 117 (1980). Prison Cell Phone Problem?” Corrections Today,
administrators should seek legal guid- October 2008, 48-49.
cessfully minimize the problem ance regarding the specific rules in their 19
Dominic Casciani, “Care to Sit on the
and help protect jail and prison jurisdictions that apply to monitoring Boss Chair?” BBC News, http://news.bbc.
personnel, other inmates, and telephones located in prisons and used by co.uk/1/hi/magazine/7152744.stm
the public. prisoners. (accessed September 8, 2009).
Unusual Weapon
Cigar Cutter
Offenders may attempt to use this type of cigar cutter as an unusual weapon. They may be
able to remove the metal blade from the cutter housing, posing a serious threat to the safety
of law enforcement officers.
July 2010 / 15
Notable Speech
The Significance of
Personal Character
By Richard D. Thomas
© iStockphoto.com
July 2010 / 17
engage the public in any number of varied solo the resolve to stand fast in the face of improper
encounters. There is no production schedule to influences that could damage you or your agency.
adhere to; there is no manual that can be written to Character is why you will be trusted with difficult
cover every situation and every contingency. It is and sensitive assignments. Character will set you
the officer’s wit, training, and desire to succeed and apart as a leader, irrespective of any rank you may
serve honorably that guide the majority of these have obtained. And, character, once lost, might
day-to-day engagements. The potential for abuse never again be regained.
always is present: the chance to gain personally As the great American author Ralph Waldo
at another’s expense, to wield power over another Emerson wrote so many years ago, “Self-trust
in an unscrupulous manner, to is the essence of heroism.” I
take advantage of the weak or would submit to you that to be
the wicked, to exact revenge, heroic, one must be able to trust
or to extort goods or services.
It is sound character that
thwarts such temptations, char-
“ Commit yourselves…
to make a positive
themselves to stand unyielding
in the face of temptation, no
matter the form it takes, and to
acter that individuals must always do the right thing.
bring on board when they
difference in You graduates are about
join the agency and hone and your agencies and to embark on a career that is
strengthen as they navigate the communities filled with so many great and
the treacherous waters of en- you will be serving. unique possibilities for you to
ticement. It is not a trait that serve your communities with
can be issued to new officers
or a technique they can learn
at some advanced school. As
” honor and distinction. Cherish
this time, make the most of the
opportunities that lie ahead
former Congresswoman Helen Douglas once said, of you. Commit yourselves, as I am sure most of
“Character isn’t inherited. One builds it daily by you already have, to make a positive difference in
the way one thinks and acts, thought by thought, your agencies and the communities you will be
action by action. If one lets fear or hate or anger serving.
take possession of the mind, they become self- I can assure you, the experience will pass all
forged chains.” Or, perhaps more succinctly, as the too quickly, and when you get to the end of this
educator and evangelist Dwight L. Moody once road, you are sure to find, as Walt Whitman wrote,
put it, “Character is what you are in the dark.” “Nothing endures but personal qualities.” Let it
Listen to me and believe me when I tell you then be said of you collectively that you were peo-
that it is during those crucial and pivotal times that ple of quality with abiding character who walked
lie ahead, when no one is looking and no one may the path less traveled and served in a manner com-
ever know what transpired, that it will be your manding the respect of the public.
irreproachable character that will allow you to To this class, I would entreat that you take to
stand tall and proud in the bright and penetrating heart the lessons of survival you were given during
light of public, judicial, and professional scrutiny. your many hours of instruction and add to those
Character will see you through hard and difficult my heartfelt desire that for all your tours of duty,
times. Character will draw others to you as they you return home safely and whole in body each
seek to follow your example and measure up to and every night. And, that your spirit remain pure
your standards. Character will allow you to admit and dedicated to the noble values that now guide
when you have made a mistake and will give you your course.
July 2010 / 19
Recruiting with Emotion
and Market Positioning
By CHRIS SKINNER
© shutterstock.com
July 2010 / 21
The second part of my re- Recruitment efforts and to achieve law enforcement
search focused on lateral police marketing campaigns through- “brand” as related to their
officers who decided to move out law enforcement often position in the marketplace, to
from one agency to another. center on rational, factual become the brand name when
When explaining their decision, information intended to lure people discuss law enforcement
they named greater opportunity potential applicants. Web sites, services in the area. More im-
as the primary reason for leav- brochures, and video images portant, each department should
ing. I asked them to elaborate, routinely show the organiza- strive to have prospective offi-
and the officers talked about the tional functions followed with cers consider it the brand name
potential for different special such information as salary and to work for.
assignments and promotions. benefits.2 These techniques aim Creating the brand name or
Then, I inquired as to how such to show aspiring officers a wide look is easy; the real challenge
opportunities would make them variety of opportunities within is creating a unique brand
feel. As with the first group, the agency while making a experience. When citizens
they struggled to express their competitive wage. interact with the police, they
feelings with words, and I pro- come away with an experience
vided them with the same list tied to emotion. Similarly, when
“
of emotions. Immediately, they a potential applicant has an
identified with such terms as encounter with an agency, it
contentment, confidence, inspi- With all things involves an emotional response.
ration, pride, respect, and hope. considered equal, Each relationship begins with
I then asked them if experienc- why do aspiring an initial transaction that repre-
ing specialty assignments or officers pick one sents the individual’s first direct
promotions would be the only organization personal experience with the
way to achieve these feelings. over another? brand.3 The key for each depart-
Significantly, they all stated that ment is to establish an emotion-
”
organizational culture would al connection with prospective
help regardless of assignment or officers; otherwise, applicants
promotion. will evaluate the agency based
Often, people do not con- Recruiting Effectively solely on the rational factual
sider emotion because it is so In a market where many law information that applies to
interwoven into their thinking. enforcement organizations offer every law enforcement organi-
This holds particularly true for largely the same opportunities zation. To sustain its brand
police officers as being emo- and benefits, agencies must experience, each department
tional is, in a sense, a sin in a recognize the need to separate first must commit to a credible
profession characterized by themselves from the others. brand promise to its community
logical thinking and decision Market position and differentia- and target group of applicants.
making. However, if an officer, tion will prove key to depart- An organization can create a
regardless of experience level, ments’ success as they compete brand promise by applying
has several choices of employ- with other organizations for the seven concepts; these should
ment that are technically the same quality applicants. be not only deeply rooted in its
same, the choice that “feels One way agencies can culture but the cornerstone of
better” rises to the top. differentiate themselves is its marketing plan.4
July 2010 / 23
Bulletin Reports
OJJDP Initiatives
The Office of Juvenile Justice and Delinquency Prevention (OJJDP) has released the In
Focus series of fact sheets, which highlight major agency programs and initiatives. The series
provides information on OJJDP resources, including funding, training, technical assistance,
and research activities on topics, such as disproportionate minority contact, the Community
Prevention Grants Program, and the Enforcing Underage Drinking Laws Program. To obtain
the complete reports, access the National Criminal Justice Reference Service’s Web site at
http://www.ncjrs.gov.
Juvenile Accountability Block Grants Program (NCJ 226357) provides an overview of
OJJDP’s Juvenile Accountability Block Grants (JABG) program, which helps states and
communities develop and implement programs that hold youth accountable for delinquent
behavior through the imposition of graduated sanctions that are consistent with the severity
of the offense. JABG also supports programs that strengthen the juvenile justice system’s
capacity to process cases efficiently and work with community partners to keep youth from
reoffending. The publication includes information about authorizing legislation, eligibility,
the award process, and performance measures.
Community Prevention Grants Program (NCJ 227345) offers an overview of OJJDP’s
Community Prevention Grants program, which funds collaborative, community-based delin-
quency prevention efforts. The program integrates six fundamental principles: comprehen-
sive and multidisciplinary approaches, research- and evidence-based strategies, community
control and decision making, leveraging of existing resources and systems, evaluation to
monitor the program’s progress and effectiveness, and a long-term perspective. The docu-
ment includes information about authorizing legislation, eligibility, the award process, per-
formance measures, and training and technical assistance.
Enforcing Underage Drinking Laws Program (NCJ 227469) presents an overview of
OJJDP’s Enforcing Underage Drinking Laws program, which supports and enhances efforts
by states and local jurisdictions to reduce the availability of alcohol to minors. The program
encourages close partnerships between law enforcement agencies and community groups
involved in preventing and intervening in underage drinking. OJJDP also offers comprehen-
sive training and technical assistance to guide states and communities in their efforts. The
initiative is the only federal program devoted exclusively to preventing alcohol consumption
by minors. The publication includes information about authorizing legislation, eligibility,
the block grants and discretionary grants programs, training and technical assistance, and
performance measures.
July 2010 / 25
Leadership Spotlight
© Thinkstock.com
July 2010 / 27
Sexting can result in tragic juvenile plaintiffs over the instance, the definition found in
circumstances, such as the images.8 Also problematic, the the federal child pornography
previously noted suicide. Ad- social implications for an inap- statute, 18 U.S.C. § 2256, refers
ditionally troubling, adults may propriate sex offender registra- to illegal images with minors as
participate in the activity. How- tion label resulting from juve- those involving sexually explic-
ever, aggressive prosecution of nile adjudication require careful it conduct.10 Does the picture
all juvenile sexting cases also consideration. The registration meet this definition or one in
can present problems. In one requirements can apply to a particular state statute? Ad-
instance, a local prosecutor was young people and, depending ditionally, investigators should
named as a federal defendant in upon the circumstances, can consider whether the commu-
a civil lawsuit after he attempt- extend well into adulthood.9 nication might be harassing or
ed to take corrective action over Investigators, with prosecutorial menacing to the party in the
images he considered question- direction, can develop appropri- image or the recipient of it.
able. Through their parents, the ate guidelines to chart a legal Second, did any illegal
involved juveniles brought the course to avoid extreme actions. use of a computer occur in the
suit to prevent their prosecution communication? For instance,
after they refused to complete Misconduct a youth involved in viewing,
the prosecutor’s suggested To determine the appropri- transmitting, or storing inappro-
diversion/education program. ate response, law enforcement priate pictures on school equip-
The U.S. District Court in officers must carefully consider ment might face legal difficulty
Pennsylvania granted a tempo- the alleged misconduct and de- for unauthorized use or dam-
rary restraining order to prevent termine if it falls into one of two ages. The cleanup and removal
the prosecutor from bringing categories. First, is the image of these images can be costly
criminal charges against the or communication illegal? For for schools.
Obviously, these categories
can overlap. However, this can
shed light on alternative charges
that may not be as apparent if
someone views the misconduct
solely as a sex offense. For
example, a 15-year-old male
posts an inappropriate image of
himself on the school computer
as a prank.11 Charging the youth
as a sex offender may be a gross
overstatement, possibly result-
ing in a sex-offender-registra-
tion issue. Perhaps, charging
him as a delinquent for damag-
Mr. Bowker is a cybercrime Assistant U.S. Attorney Sullivan
specialist with the U.S. Pretrial serves with the Office of the
ing school property due to the
Services and Probation Office, U.S. Attorney, Northern District cost of removing the offensive
Northern District of Ohio, in of Ohio, in Cleveland. image may be a more appropri-
Cleveland.
ate response.
Never take images of yourself that you wouldn’t want everyone—your classmates,
your teachers, your family, or your employers—to see.
Before hitting send, remember that you cannot control where this image may travel.
What you send to a boyfriend or girlfriend easily could end up with their friends,
and their friends, and their friends.
If you forward a sexual picture of someone underage, you are as responsible for this
image as the original sender. You could face child pornography charges, go to jail,
and have to register as a sex offender.
Report any nude pictures you receive on your cell phone to an adult you trust. Do not de-
lete the message. Instead, get your parents or guardians, teachers, and school counselors
involved immediately.
Source: National Center for Missing and Exploited Children, Tips to Prevent Sexting; http://ncmec.vo.llnwd.
net/o15/downloads/special/Sexting_Prevention.pdf (accessed July 6, 2009).
Offenders of any other person? Did she somehow took part in the juve-
While an adult’s active forward the picture to anyone? nile sexting. His actions could
involvement in juvenile sex- What is the age difference be- include soliciting the picture or
ting always should result in the tween the victim and the recipi- actively participating in creat-
strong consideration of charges, ent of the image? Does she now ing, possessing, receiving, or
cases involving only youths face harassment because of her distributing the image. Did
may call for a different, more inappropriate behavior? Who is he request the picture, or did
fluid approach. To this end, harassing her, and are charges someone just send it to him?
investigators should analyze warranted against them? The Did he keep it or forward it on?
the subject of the images, the answers to these questions can Why? To embarrass or harass
victim. How old is the victim? help indicate if the subject of the victim? What is or was the
Did she know about the pho- the image is a true victim in relationship between the youth
tograph? Did the victim take it every sense of the word. offender and victim? How old
herself without the encourage- Although, perhaps, not in are they, and what is the age
ment or direct participation the image, the youth offender difference between them?
July 2010 / 29
It may be a mitigating fac- and the repercussions of agencies concerning child
tor where there is little or no inappropriate online behavior. pornography victims. By for-
disparity in age. However, if the Digital images do not deterio- warding information regarding
offender is significantly older rate over time and easily can known victims, prosecutors can
(e.g., a 15 year old with pictures spread worldwide. Youths need obtain convictions of other per-
of an 8 year old), authorities to understand that what they do petrators who may possess these
have serious misconduct issues online may have a very long images long after the juvenile
to address. Has the perpetrator existence. Such presentations sexting case has been initially
participated in similar miscon- can help minimize or prevent investigated.
duct in the past? Consideration future occurrences of juvenile
of these factors can help inves- sexting. They also can be used Legislative Remedies
tigators and prosecutors decide as a component in developing In 2009, state law makers,
the proper course of action, diversion programs. most notably in Ohio, Utah, and
such as no charges, diversion, or Vermont, began considering
formal charges (sex or nonsex Additional Investigative Areas legislative solutions. One early
offense). In cases where the images proposal was a blanket decrimi-
clearly involve child pornogra- nalization of juvenile sexting.
Prevention phy, law enforcement needs to Such a questionable approach
As the first line of defense contact the National Center for has the real potential of putting
against this problem, law en- Missing and Exploited Chil- youths at risk by inadvertently
forcement personnel and edu- dren (NCMEC), which operates excluding sexting offenses
cators should provide regular the Child Victim Identification committed by older juveniles
presentations—and numerous Program, the national clear- against younger ones. Recently,
excellent information sources inghouse for child pornography Vermont stepped back from
exist to draw from—to young cases and the main point of this extreme, opting to reclas-
people on Internet safety contact for international sify juvenile sexting cases from
felony to misdemeanor offenses
as long as the acts were consen-
sual. The debate, no doubt, will
continue, but legislatures must
For Additional Information be careful to not enact laws that
put youths at risk.12
U.S. Department of Justice, Project Safe Childhood,
http://www.projectsafechildhood.gov/ Conclusion
Juvenile sexting poses a
National Center for Missing and Exploited Children,
challenge for numerous groups
http://www.ncmec.org/
to act responsibly with common
sense and sound discretion. Law
High Technology Crime Investigation Association
enforcement officers and pros-
Internet Safety for Children Campaign,
ecutors must keep in mind that
http://www.htcia.org/isfc/
juvenile sex and child pornogra-
phy laws exist to protect young
July 2010 / 31
FBI Law Enforcement Bulletin
Author Guidelines
Law enforcement officers are challenged daily in the performance of their duties; they face each
challenge freely and unselfishly while answering the call to duty. In certain instances, their actions
warrant special attention from their respective departments. The Bulletin also wants to recognize
those situations that transcend the normal rigors of the law enforcement profession.
While off duty, Officer Jeff Daniels of the Ector County, Texas,
Independent School District Police Department went to a local restaurant for
dinner with his family. Upon entering, he noticed that one of the patrons was
choking and that the other diners were unable to help. Immediately, Officer
Daniels performed the Heimlich maneuver and dislodged the food stuck in
the victim’s throat. However, the patron had lost consciousness and had no
pulse or respiration. Officer Daniels, with the assistance of an emergency
medical technician also dining at the restaurant, performed CPR. The victim
began breathing indepen-
Officer Daniels
dently prior to the arrival Nominations for the Bulletin Notes should be based
of the ambulance. on either the rescue of one or more citizens or arrest(s)
made at unusual risk to an officer’s safety. Submissions
should include a short write-up (maximum of 250 words),
a separate photograph of each nominee, and a letter
from the department’s ranking officer endorsing the
nomination. Submissions should be mailed to the Editor,
FBI Law Enforcement Bulletin, FBI Academy, Outreach
and Communications Unit, Quantico, VA 22135, or
e-mailed to leb@fbiacademy.edu.
U.S. Department of Justice Periodicals
Federal Bureau of Investigation Postage and Fees Paid
Federal Bureau of Investigation
FBI Law Enforcement Bulletin ISSN 0014-5688
935 Pennsylvania Avenue, N.W.
Washington, DC 20535-0001
Official Business
Penalty for Private Use $300
Patch Call
Yankton, South Dakota, Police Department’s The patch of the Merriam, Kansas, Police
patch reflects the city’s history as the first capitol Department features a depiction of a train, repre-
of Dakota Territory in 1861. The riverboat, chapel, senting both the beginning and the great success of
and hospital also serve as reminders of Yankton’s the city as the town grew upon the arrival of the
past, as does Discovery Bridge, representing the railroad. To the left of the train is a picture of the
trek of Lewis and Clark up the Missouri River. Merriam Depot. The tracks still operate today.