Sunteți pe pagina 1din 35

May 2004

Volume 73
Number 5
United States
Department of Justice
Federal Bureau of Investigation
Washington, DC 20535-0001

Robert S. Mueller III


Director

Contributors’ opinions and statements Features


should not be considered an
endorsement by the FBI for any policy,
program, or service.

The attorney general has determined Conducting Surveillance Preparation and attention to details can
that the publication of this periodical is
necessary in the transaction of the
public business required by law. Use
Operations 1 result in a productive, safe surveillance.
By John T. Nason
of funds for printing this periodical has
been approved by the director of the
Office of Management and Budget.

The FBI Law Enforcement Bulletin Compstat Design The second portion of a three-part
(ISSN-0014-5688) is published
monthly by the Federal Bureau of
Investigation, 935 Pennsylvania
By Jon M. Shane 12 article on Compstat, an information-
driven managerial process, addresses
Avenue, N.W., Washington, D.C. the design of the model.
20535-0001. Periodicals postage paid
at Washington, D.C., and additional
mailing offices. Postmaster: Send
address changes to Editor, FBI Law The Witness Security Program is a
Enforcement Bulletin, FBI Academy, Hiding in Plain Sight
Madison Building, Room 201,
Quantico, VA 22135.
By Douglas A. Kash 25 critical weapon in the war on crime.

Editor
John E. Ott
Associate Editors
Cynthia L. Lewis
David W. MacWha
Bunny S. Morris Departments
Art Director
Denise Bennett Smith
Assistant Art Director
Stephanie L. Lowe
8 Focus on Training 22 Perspective
Staff Assistant
Linda W. Szumilo Surviving Prisoner Searches The Need for School
Resource Officers
This publication is produced by 20 Book Review
members of the Law Enforcement
Communication Unit, Training Division. Police Assessment Testing

Internet Address
leb@fbiacademy.edu

Cover Photo
© Wayne Hertz

Send article submissions to Editor,


FBI Law Enforcement Bulletin, FBI
Academy, Madison Building, Room
201, Quantico, VA 22135.

ISSN 0014-5688 USPS 383-310


Conducting
Surveillance Operations
How to Get the Most Out of Them
By JOHN T. NASON

© Wayne Hertz

A
s the Hollywood detec- bringing the case to a successful concept. The considerable re-
tive sits in his four-door conclusion. sources required for a surveil-
sedan, he downs numer- While surveillances usually lance draw personnel away
ous cups of coffee to stay awake do not follow this scenario, those from other investigative func-
and occasionally speaks into a who have conducted such opera- tions, which can pose problems.
two-way radio to other officers tions will admit that participat- Also, the potential exists for
also maintaining the same stake- ing in a productive surveillance alerting the subject of the inves-
out ritual. Then, finally, in the can be a rewarding and, at times, tigation to law enforcement’s
predawn hours, the villain an exhilarating experience. Sec- interest, which conceivably
emerges from the location, ond only to operating confiden- could compromise the covert-
playing right into the hands of tial sources, surveillance is the ness of not only the surveillance
the seasoned and street-smart most frequently employed inves- but the entire case. Preparation
hero who tails him to where tigative technique in obtaining and some fine-tuning at the
he commits a crime, takes a arrests, indictments, and convic- onset can make the difference
hostage, or retrieves some tions for the FBI. between having a productive
stashed contraband. Then, in Unlike operating informants, surveillance and expending ex-
action-packed style, the detec- however, conducting a surveil- pensive resources and coming up
tive handles the entire situation, lance requires using the team empty-handed.

May 2004 / 1
Law enforcement agencies determine what levels of authori- a motor vehicle or utility check
primarily use surveillance to de-
zation are needed and how to and confidential source contacts
velop both intelligence and evi-allocate the necessary resources can save a lot of wasted time
dence to further investigations to the surveillance. Agencies by revealing that the intended
by identifying subjects, their should coordinate planned sur- subject recently relocated or sold
activities, and their associates,
veillances on a strict “need-to- a vehicle. All team members
along with their residences, know” basis. should receive pertinent details,
places of business, hangouts, and At the onset, case managers, easily contained on a preprinted
other related locations. Surveil-
in conjunction with the physical form, to include—
lance also can identify potential
surveillance, should consult • the case background;
sources, corroborate source in- technical services personnel to • the surveillance objective;
formation, provide security to explore the feasibility of em-
undercover operatives, and ploying various measures, such • the subject’s caution state-
gather data for site surveys. Inas the use of video concealments, ment (e.g., armed and
addition, information obtained remote video, or tracking de- dangerous or known to
from surveillance can provide vices. Employing technical cov- possess a firearm);
the probable cause for obtainingerage or aircraft can function as • the subject’s previous
authorization for other investiga-
force multipliers and enhance experience with surveillance
tive techniques, such as search overall effectiveness, which can and whether the subject
warrants and wiretaps. make the difference in obtaining appears surveillance
productive results. conscious; and
PLANNING AND Prior to initiating the surveil-
PREPARATION • the subject’s personal data
lance, investigators should up- (e.g., all descriptive data
Once investigators decide date subject information to en- with photo; criminal history;
that surveillance is appropri- sure that they have the most habits, such as martial arts
ate, their agency’s policy will current available. For example, practitioner or bodybuilder,
and associates; the vehicles
of the subject and associ-


ates; and the locations of
Preparation and residences, work, and
hangouts).
some fine-tuning at
the onset can make the SURVEILLANCE
difference between having COMPONENTS
a productive surveillance Realizing that staffing con-
and expending expensive straints often become an issue in
resources and coming determining the amount of mem-
up empty-handed. bers available for a surveillance,
a team of six generally proves

Special Agent Nason heads the FBI’s Special Operations Group, Aviation
and Surveillance Operations Section, Critical Incident Response Group. ” optimal for a moving surveil-
lance. Having a larger team re-
duces the chance of losing the
subject and limits exposure of

2 / FBI Law Enforcement Bulletin


individual team members, en- Surveillance Kit Checklist
abling the surveillance to remain
undetected. • Department two-way radio
• Handheld portable radio with harness and fully
Area Setup charged spare battery
Prior to setting up at a loca- • Mobile phone
tion, surveillance team members
should hold an operational brief- • Still camera with telephoto lens, adequate supply of
ing to disseminate last-minute film or other removable medium, and spare battery
updates and to conduct a roll • Video camera with supply of tapes and extra battery
call. Then, they should check • Stabilizing device, such as a portable tripod
their communications, including
primary and alternate radio fre- • Binoculars1 and portable infrared or thermal-imaging2
quencies; review their proce- devices
dures and assignments, ranging • Detailed road maps for the area
from team leader to log keeper; • Compass or Global Positioning System receiver
and inspect their equipment and
• Flashlight with extra batteries
vehicles, including topping off
fuel levels of all vehicles. One • Change of clothing with props, such as hats, to alter
unit should conduct a site recon- appearance and other personal items, including
naissance to assess the area toiletries
in general and to specifically • Food and water in a cooler
identify a location to set up the • Cash, including coins to use at toll lanes requiring
“eye” (i.e., the primary observa- exact change, and toll passes
tion point)—or, if necessary,
“eyes”—and to determine the • Extra set of car keys
likely routes of approach and de- • Towels and glass cleaner
parture, traffic patterns, and the • Equipment gear bag to hold above items
location of bus stops and train
stations, as well as areas to
avoid, such as known criminal
hangouts. presence. In addition, keeping surveillance detection or losses
Once the eye is in place with the radio volume low and con- of the subject generally occur
as unobstructed a view as pos- cealing law enforcement equip- shortly after initial movement,
sible of the subject location, the ment in vehicles can help team team members should remain
other team members should po- members remain undetected. alert and exercise extreme care at
sition themselves so they cover this point. While time, distance,
all potential departure routes. Mobile Surveillance and conditions determine how
They should minimize driving Once initial movement oc- long any team member stays
by the location and congregating curs, the eye calls out a descrip- with the subject, a rule of thumb
in the area as these practices can tion of the subject, always is to maintain one or two ve-
alert the subject or the subject’s keeping radio transmissions as hicles between the team member
associates to a law enforcement brief as possible. Because either and the subject and “hand off”

May 2004 / 3
surveillance. The mere existence
of photographs has resulted in
countless jury convictions and
guilty pleas being entered,
thereby saving prosecutor’s of-
fices and law enforcement agen-
cies months of trial preparation,
as well as the trial itself. For this
reason, investigators should
attempt to obtain the highest
quality surveillance photographs
whenever possible.

© Wayne Hertz
Digital Versus
Conventional
The conversion from con-
the subject to another team mem- utility vehicles, outfitted with ventional to digital photography
ber after taking one turn. closed-circuit television or has not posed any significant
If the subject is on foot or remote video. evidentiary problems to date.
uses public transportation, team While it is common knowledge
members designated as “legs” Documentation and Logs that digital photography images
should quickly exit and secure One team member maintains can be easily manipulated,
their vehicles to assume foot a chronological log to document this also holds true when
surveillance. On foot, the team observations made collectively using conventional photography.
adopts an ABC method, wherein by the team. Once completed, However, a variety of authenti-
the primary eye rotates between each team member initials each cation methods can maintain
team members with at least entry in the log, reporting obser- the integrity of a photo. In
one team member on the oppo- vations they personally wit- addition, adherence to an estab-
site side of the street from the nessed. The team leader reviews lished handling procedure,
subject. it for accuracy; afterwards, the such as the use of write-once
agency retains the original in the read-many (WORM) media, 3
Static Surveillance official file as evidence. Investi- further reduces vulnerability
In situations where the sur- gative personnel receive copies from a legal challenge.
veillance is static (i.e., immo- in a timely manner for analysis
bile) or for mobile surveillances and logical follow-up. Still Versus Video
that become stationary, staffed Which type of photos, still or
vehicles parked on the street are SURVEILLANCE video, is more desirable for sur-
effective for a limited time only. PHOTOGRAPHY veillance purposes? If possible,
Once team members realize that In addition to the written investigators should obtain both
a particular location will require logs, still photographs and video because both have advantages
surveillance for a protracted pe- footage provide visual documen- and drawbacks.
riod, they should use specialty tation of an occurrence and con- The overall picture quality
vehicles, such as vans or other stitute the work product of a of still photos generally proves

4 / FBI Law Enforcement Bulletin


superior to video, even when ob- should place a dark cloth as rapidly expend battery
taining a freeze-frame. Addition- behind them. life; and
ally, telephoto lenses needed in By contrast, video records • upon completion, label the
surveillance photography are the action occurring and can be tape as the original and
more readily available for still used in conjunction with audio. include their initials, time,
cameras. And, individuals can Video cameras are capable of date, and case identifier, as
view still photos more easily recording multiple frames per well as slide or remove the
without the need for a monitor or second and generally are easier write-protect tab to prevent
VCR. A few rules can assist accidental erasure and make
investigators in obtaining high- copies, labeling them as


quality still photos. such.
• Because most investigators SURVEILLANCE RISKS
are not professional photog- During surveillances,
raphers, they should famil- participants must Investigators always should
assume that subjects engaged in
iarize themselves with remain vigilant and operational, terrorist, or criminal
the features of a camera alert to the possibility
before taking it on a activity will attempt to detect
of countersurveillance surveillance by employing a va-
surveillance. techniques being riety of methods and techniques.
• Prior to taking photos, they employed against For example, as part of Al-Qaeda
should clean the camera lens them. specialized training, operatives
and vehicle windshield. are instructed to follow meticu-


• When taking photos from a lous operational security. Tactics
vehicle, they should turn include conducting dry runs
off the engine and film from to operate than some of the high- prior to becoming operational,
a stabilized position using a quality still cameras. To obtain using secondary roads and public
tripod or makeshift devices, quality footage when using transportation to flush out sur-
such as the steering wheel video, investigators should— veillance, and employing prear-
or dash board with a towel ranged signals to communicate
or beanbag for support. • set the video camera on the absence or presence of
manual focus; surveillance to other Al-Qaeda
• They should not delete any
photos taken. • clean the lens and vehicle members.
windshield; Criminal subjects, particu-
• When photographing from larly drug violators and orga-
behind tinted glass, they • video continuously, mini-
mizing camera movement nized crime figures, employ a
should remember that they variety of measures to detect sur-
will lose at least one f-stop and zooming;
veillance, including the use of
(i.e., the function that • activate the date and time neighborhood lookouts and tail
regulates the amount of feature and ensure that the cars. During surveillances, par-
light coming through a correct time and date are ticipants must remain vigilant
camera lens). displayed; and alert to the possibility of
• To prevent being revealed • use the eye piece as the LCD countersurveillance techniques
from back lighting, they can illuminate them, as well being employed against them.

May 2004 / 5
Of paramount importance, SURVEILLANCE • Considering that the longer
investigators must remember TERMINATION duration of the surveillance
that many in their profession Often, the decision to termi- coverage increases the
have been assaulted, injured, and nate a surveillance can prove as likelihood of detection,
even killed while performing difficult as the one to initiate it. does the potential for gains
surveillance duties. For this rea- Investigators should consider the outweigh the increased risk
son, those involved in a surveil- following factors when deciding of detection?
lance must remain constantly whether or not to terminate the • Would other investigative
aware of potential safety haz- surveillance: techniques or technical
ards. A dangerous situation can coverage prove more appro-
develop at any time, and investi- • Assuming that the resources
priate? After all, investiga-
gators never should take it still exist, do the present
tors always can cut back or
lightly. This becomes com- circumstances warrant
reinstitute the surveillance
pounded when the surveillance allocation of these consider-
if needed.
occurs in a high-crime area and able reserves at the expense
in hours of darkness. Risk as- of other cases or investiga- CONCLUSION
sessments should be carried out tive functions? Surveillance is a valuable
at every level on an ongoing • Is the surveillance still investigative tool and proves
basis, which may result in the providing intelligence similar to most other law en-
surveillance being terminated. or evidence? forcement endeavors in that

Safety and Security Measures

• During a mobile surveillance, do not take unnecessary risks to keep up with a subject
speeding, running red lights, or otherwise driving recklessly.
• While stationary, keep the vehicle windows closed and the doors locked.
• Regularly scan rear view mirrors to observe anyone or any activity to the rear.
• Alert other team members to any suspicious or unusual persons or activity in the area.
• In high-crime areas and in hours of darkness, remain in a heightened state of alert.
• Position vehicle to enable a rapid response to assist others if needed.
• Ensure vehicle has emergency equipment lights, siren, and first-aid kit.
• Keep identification, weapon, and ballistic vest assessable.
• Know and use challenge, password, and other appropriate safety measures to prevent
friendly fire situation from developing.
• When leaving a vehicle to go on foot surveillance, fully secure the vehicle and
equipment inside.

6 / FBI Law Enforcement Bulletin


prior planning can go a long way fulfilling experiences in a law 2
For additional information, see
toward increasing the chance enforcement officer’s career. Thomas D. Colbridge, “Thermal Imaging:
Much Heat but Little Light,” FBI Law
of success. Because surveillance Moreover, it can help law Enforcement Bulletin, December 1997,
is such a resource-intensive enforcement professionals ac- 18-24.
operation, it remains incumbent complish their sworn duty of 3
“Any type of storage medium to
upon those overseeing such preserving the peace and safe- which data can be written to only a single
efforts to ensure the efficient guarding the citizens of their time, but can be read from any number
of times. WORM media have a signifi-
and effective use of such limited communities. cantly longer shelf life than magnetic
resources. media and thus are used when data must
Endnotes
A successful surveillance not 1
be preserved for a long time.” Retrieved
For additional information, see
only can bring a case together but Carlyle Poindexter, “Surveillance Optics,”
on December 15, 2003, from http://
also can prove one of the most wombat.doc.ic.ac.uk.
FBI Law Enforcement Bulletin, March
professionally and personally 2001, 7-9.

Clarification

ome of the information in “Geologic


S Material as Physical Evidence” that ap-
peared in the March 2004 issue requires clarifi-
bags or glass vials” is problematic. Glass tends
to break during shipping, causing sample
contamination. There also are many other
cation. On page 4, the author stated “Minerals, appropriate sample containers that may be used
especially small-sized ones, commonly are for geologic evidence, the most preferable
identified using x-ray diffraction and spectro- being those made of rigid plastic. Metal canis-
graphic techniques. Other instruments of value ters never should be used. Additionally, on
to the forensic geologist exist, particularly the page 3, the author states the “...investigators
scanning electron microscope and the electron should ensure that they remove earth materials
microscope.” While x-ray diffraction is a useful from clothing...with extreme care....” To
tool in mineral identification, polarized light guarantee the best preservation of geologic
microscopy is the primary technique used by materials from clothing, the investigator should
trained geologists in mineral identification. submit, if possible, the entire object to the FBI
Forensic geologists in the FBI Laboratory have Laboratory, allowing the geologists to remove
a number of other instrumental techniques at the materials themselves. This ensures the lab
their disposal that they use on a limited basis examiner the best chance for preservation of
for the identification of unknown inorganic important structural information. For the most
materials. These include x-ray fluorescence up-to-date information on submitting geologic
spectroscopy, scanning electron microscopy samples, the investigator should refer to the
with energy dispersive spectrometry, Handbook of Forensic Services, revised in
cathodoluminescence, and Fourier transform 2003 and available in both hard copy and
infrared spectroscopy. online at: www.fbi.gov/hq/lab/handbook/
Also, on page 4, the suggestion that soil intro.htm.
samples be submitted in “only plastic locking

May 2004 / 7
Focus on Training
Cop 101 Sadly, these represent only two out of the
Surviving Prisoner Searches many actual incidents that cost law enforcement
By Todd Coleman
officers their lives every year. While tragic, these
two deaths reveal a more distressing fact: they,
© Tony Whitmore
like many others, could have been avoided. For
the 10-year period 1993 through 2002, 20 officers
were killed while handling or transporting prison-
ers.3 Although some incidents resulted from
prisoners overpowering and disarming the victim
officer, many others occurred due to weapons
missed during incomplete searches of suspects.
These numbers also do not include the “near
misses” or “could have beens” that happen each
year. A check with their local jail or holding
facility about the number of weapons removed
from prisoners each year should give law enforce-
ment officers something to think about. These
weapons do not include a James Bond laser-beam
watch or something concealed in a hollowed-out
boot heel. Rather, they involve a 9-mm or .45-
caliber semiautomatic handgun stuffed in a
waistband or a derringer, revolver, or other
handgun hidden inside of a boot, pocket, or

T
jacket. They are ordinary weapons that a thor-
wo officers arrested a suspect and secured ough search would have discovered.
him in the back seat of their patrol ve- Although these tragic incidents happen all too
hicle.1 One officer stood beside the car while the often, they can be avoided, or at least vastly
other sat in the front seat to use the radio. Sud- reduced, by paying attention to what I call “Cop
denly, despite being handcuffed behind his back 101.” Simply put, Cop 101 stresses the impor-
and belted into the seat, the suspect began shoot- tance of reinforcing the basic survival skills of
ing at the officers with a .45-caliber handgun law enforcement and not neglecting these in the
that he had concealed in his waistband. The quest for more glamorous or exciting training. It
officer standing beside the vehicle died at the seems that we never practice or refresh some of
scene. the most important techniques in law enforce-
The chief of police in a small town arrested ment after we leave the training academy. For
an individual and recovered a handgun from him some reason, these were deemed important
during a search.2 After transporting the suspect to enough to be included during the academy, but,
a holding facility, the chief turned her attention afterwards, they are viewed as too basic or simple
from the suspect to make a phone call. The to merit additional training time. During training,
suspect pulled a second gun that he had con- we often pay a great deal of attention to elaborate
cealed in a pouch in the front of his pants and self-defense training, tactical shooting, pursuit
shot the chief in the head, killing her. driving, and a myriad of high-risk scenarios. All

8 / FBI Law Enforcement Bulletin


of these are extremely important, and I am in the weapon, instructors should have them repeat
no way implying otherwise. However, a small the scenario until they find any and all concealed
investment of time during training could pay weapons. This reinforces the importance that
large dividends in the form of saving an officer’s their agency places on this skill. Moreover, by
life. By taking a few minutes and incorporating a incorporating prisoner searches as part of the
segment dedicated to proper prisoner searches existing training, instructors can avoid many of
during follow-up training, law enforcement the obstacles of setting up and implementing an
agencies can reiterate their importance. entirely new class.
Use Existing Scenarios Stress the Fundamentals
Unfortunately, as those of us who have stood Instructors should stress the fundamentals of
in front of a group of less than enthusiastic a complete and safe prisoner search. If the sus-
officers going through annual pect is under arrest, then
in-service training can attest, officers should conduct the
the idea of attending a class on
prisoner search techniques will
not be particularly well re- “ What an agency fails
search after handcuffing him.4
They always should handcuff
the suspect behind his back
ceived, not to mention how it
will impact the limited amount
of training time available for
the various topics of instruction
“ to train makes just as
much of a statement
about its attitude
toward officer safety
unless some definite reason,
such as physical impairments
or injury, exists.5 After hand-
cuffing the prisoner, officers
that we need to cover. How- as what it does train. should conduct the search
ever, I have found that includ- from a safe position, staying
ing prisoner searches in current
officer-survival training can
prove relatively painless. For
example, if agencies use practical scenarios,
” behind the prisoner at a 45-
degree angle from his body.
Officers should avoid placing
themselves in front of the prisoner because it
which many do and training experts recommend, makes them vulnerable to kicks, knee strikes,
they can add a prisoner search at the end of an head butts, spitting, biting, and other forms of
arrest scenario. In cases where instructors have violent behavior. From the rear, officers can use
scenarios set up where officers must subdue a one hand to maintain control of the prisoner and
role-player wearing some type of protective keep him off balance. Then, they can reach
suit, they can have a second role-player nearby around him to conduct the search. Officers should
wearing regular street clothes and a concealed be systematic during the search by sectioning
weapon. Instructors should alternate the type, the body into quadrants. For example, the front
number, and existence of a weapon on the role upper right quarter covers from the top of the
player so that officers do not fall into the routine head down to the groin and across to the center
of looking for the ever-present training weapon. line of the body. The front lower right quarter
After subduing the first role-player, officers can begins just above the belt of the right leg and
move to the second one and continue with the continues completely down the right leg. The
arrest. At this point, they can practice prisoner quarters should overlap, ensuring that when
searches as part of the scenario. If officers miss officers search all of the quadrants, they will have

May 2004 / 9
overlapped areas and not omitted any. They that person nor should they worry about offend-
should pay special attention to places where ing another officer by searching a prisoner they
weapons are commonly found, such as the waist have received. This commonly occurs when one
area, boots, and clothing with multiple pockets. officer transports a prisoner for another officer. I
Officers also need to keep in mind other strongly encourage officers to thoroughly search
safety issues. For example, they never should any prisoner they transport regardless of whether
thrust their hands into the suspect’s pockets. he already has been searched. In fact, while
Instead, they should lightly touch the outside working narcotics, I got to the point where I told
first, then squeeze and twist the pocket from transporting officers that the prisoner had not
the outside to lessen been searched, even if
the risk of cutting he had, because I
themselves on sharp noticed that if I told the
objects, such as Cop 101 Prisoner Search Tips transporting officers
needles or exposed that the prisoner
blades. If necessary, • Use caution with all prisoners, even already had been
they should slowly those in handcuffs. searched, many times
turn the suspect’s • Maintain a safe position. either they neglected
pockets inside out, • Be systematic and section the body to search him again
thus allowing them to into quadrants. or they conducted a
remove sharp objects minimal search at best.
• Touch pockets before reaching inside
safely. In addition,
or turn pockets inside out. Assess the Benefits
officers should carry
extra brown paper • Search all prisoners, even those By keeping these
bags in their vehicles received from other officers. points in mind and
to hold these items. incorporating them
This avoids inadvert- into established offi-
ently giving the pris- cer-survival classes,
oner back an item that may contain some type instructors can provide several benefits to both
of undiscovered concealed weapon, such as a their officers and their agencies. First and fore-
missed razor inside of a wallet. This also allows most, it will keep officers safer on the street. By
officers to go through each item at a more secure instilling the habit of conducting a proper and
and possibly well-lit area and makes it easy to safe prisoner search, instructors can reduce the
determine if they missed something during a re- occurrence of officers injured and killed by armed
search of the prisoner. I encourage officers to take prisoners. Second, it will allow instructors to
a few extra moments and conduct a re-search or, identify individual officers who may have diffi-
better yet, have a second officer do so. This helps culties in this area. In turn, instructors can give
ensure that the prisoner has been thoroughly these officers the additional training they need to
searched. ensure that they can safely and effectively search
This leads to my final point: searching a their prisoners. Finally, it makes a statement
prisoner when transferring custody to another about where an agency stands on issues of officer
officer. Instructors should stress to officers that safety. What an agency fails to train makes just as
they should not be offended if another officer much of a statement about its attitude toward
who assumes custody of their prisoner searches officer safety as what it does train.

10 / FBI Law Enforcement Bulletin


Conclusion Endnotes
1
Law enforcement officers search suspects U.S. Department of Justice, Federal Bureau of Investigation,
Law Enforcement Officers Killed and Assaulted, 2000 (Washing-
and prisoners on a daily basis. It stands as one ton, DC, 2001), 49.
of the most repeated tasks and, as such, can 2
U.S. Department of Justice, Federal Bureau of Investigation,
become a mundane chore. However, officers Law Enforcement Officers Killed and Assaulted, 1998 (Washing-
must remember that it also can prove deadly. ton, DC, 1999), 59.
3
To ensure that their officers understand the U.S. Department of Justice, Federal Bureau of Investigation,
Law Enforcement Officers Killed and Assaulted, 2002 (Washing-
dangers of conducting searches and the possible ton, DC, 2003), 25.
consequences of missed weapons, law enforce- 4
For illustrative purposes, the author refers to suspects as
ment agencies should include proper and safe males.
5
search techniques as part of officer-survival This demonstrates the importance of agencies investing in
training. By stressing the fundamentals and waist restraints if they currently do not have them.
reminding officers of the hazards associated
with searching suspects and prisoners, agencies Master Police Officer Coleman, a certified police instructor,
can improve officer safety and enhance their serves in the Special Operations Division of the Virginia
Beach, Virginia, Police Department.
effectiveness in protecting the general public.

The Bulletin’s
E-mail Address
© Digital Vision

T he FBI Law Enforcement Bulle-


tin staff invites you to communi-
cate with us via e-mail. Our Internet
address is leb@fbiacademy.edu.
We would like to know your
thoughts on contemporary law en-
forcement issues. We welcome your
comments, questions, and suggestions
about the magazine. Please include
your name, title, and agency on all
e-mail messages.
Also, the Bulletin is available for
viewing or downloading on a number
of computer services, as well as the
FBI’s home page. The home page
address is http://www.fbi.gov.

May 2004 / 11
Compstat
Design
By JON M. SHANE

© Mark C. Ide

© Mark C. Ide

T
he Compstat process, as THE COMPSTAT DESIGN in the [Compstat] process and be
described in the first part The chief is absolutely criti- committed to it.”3
of this article, hinges on cal to Compstat’s design and When designing the Comp-
four crime-reduction principles: success. He must sponsor and stat model for the organization,
accurate and timely intelligence, champion the process with the those involved in the process
effective tactics, rapid deploy- command staff.2 “Sponsoring must sort through a few adminis-
ment of personnel and resources, [Compstat] and championing trative details. These include or-
and relentless follow-up and as- it are different; sponsorship is ganizational placement, required
sessment.1 Coupled with these necessary to provide legitimacy attendees, the facilitator, the fa-
are accountability and discretion to the process, while champion- cility, the equipment, and, most
at all levels of the law enforce- ing provides the energy and important, data collection, analy-
ment agency. The design of the commitment to follow through. sis, and presentation.
Compstat model creates an at- [Compstat] does not just hap-
mosphere where both officers pen—involved, courageous, and Organizational Placement
and executives can remain fo- committed people make it hap- As a managerial function,
cused on the core mission of the pen. The department’s leaders Compstat should appear at the
agency, protecting the members must serve as process champi- top of the organization. Data
of their community. ons. These people must believe must flow to the chief and the

12 / FBI Law Enforcement Bulletin


executive staff without delay. within their commands. Com- since the last Compstat session.
As few lines of reporting as manders of speciality divisions The support staffs, particularly
possible should exist between (e.g., narcotics, warrants, the executive officers, must
the Compstat unit (or the indi- robbery, and homicide) must thoroughly attune themselves to
vidual responsible for collating report on the level of support their commanders’ intentions
the material) and the chief. they have committed to an and presentations.
This will ensure that the unit col- area to reduce a problem, such
lates, analyzes, and delivers as arrests effected, canvasses The Facilitator
the data to the chief for prelimi- conducted, street surveillances The chief or his executive-
nary review before preparing performed, warrants served, level designee must act as the
the final version for publication. and cases cleared, along Compstat facilitator. The chief
The Compstat unit should not with their command’s overall sets the tone: if Compstat is im-
have to negotiate several organi- performance. portant enough for him to take
zational layers before handing All commanders receive time out of his schedule, then
the chief the completed work, support from their staffs— participants should respect
particularly as the material is the executive officer, detective the process and take it seriously.
time sensitive. squad supervisor, and crime con- In the chief’s absence, an
trol officer4—during Compstat uninvolved member of the com-
Required Attendees meetings. Commanders sit at the mand staff, such as the chief of
As a managerial process, conference table with their sup- staff, assistant chief, or deputy
Compstat employs managers port staffs directly behind them. commissioner, must assume the
to assess the operational effec- The support staffs provide the role. Other command staff offi-
tiveness of the department commanders with notes, charts, cers have a biased interest be-
and how those entrusted with statistics, and performance data cause they are the ones facing
geographic or organizational on the strategies undertaken critique. The facilitator moves
command perform in response
to a set of given conditions (i.e.,
the Compstat data). Those
required to attend Compstat
include the department’s execu-
tives (chief, deputy chiefs,
captains, and division/section
commanders) and those decision
makers responsible for develop-
“ Compstat, a
process grounded
in data, begins with
ing deployment strategies or collecting, analyzing,
committing resources (personnel and mapping crime
or matériel). occurrences.
Command-rank personnel
must answer for the state of
their commands, including how
well they perform individually
and compared with other com-
mands and the total crime picture

Captain Shane is the commanding officer of the Policy and Planning
Division of the Newark, New Jersey, Police Department.

May 2004 / 13
Appropriate Statistics

Maximum Minimum Mean Median Mode


Descriptive
analysis Violent and nonviolent Aggregate increase Standard
crime summary or decrease deviation

Frequency Percentage Proportion Ratio and rates


distribution increase or across Incidents to population
decrease categories Performance to police officers

Pie charts (for Bar charts (for aggregate data or rate;


percentage of total) e.g., incidents per 100,000 people)
Organization
and presentation
of data Line charts (frequency Histograms with a nor-
Crosstab
polygon); add trend lines mal curve (e.g, response
charts
to establish direction time analysis)

Compstat along, questioning the overhead projector, a projection book (a collated, printed version
commanders, helping devise so- screen, computers, and an ampli- of the activity occurring in the
lutions, ordering information for fication system. Each com- previous Compstat period nor-
the recap (outstanding issues re- mander should have printed cop- mally beginning on Monday at
quiring follow-up), and issuing ies (the Compstat book) of all of 12:01 a.m. and ending the fol-
censure when necessary. To the visual aids (e.g., charts, lowing Sunday at 11:59 p.m.,
achieve success, the facilitator graphs, and data). This ensures except for speciality divisions,
should understand patrol and in- that everyone can follow along such as narcotics and criminal
vestigative strategies, know how and remain attentive during the investigations, which extend
to interpret statistics, and pos- discussion. the period to 2 weeks to produce
sess analytical skills concerning a better trend analysis). 5
linking conditions, performance, Data Collection, Analysis, The Compstat book will vary
and outcome. and Presentation in size based upon the jurisdic-
Compstat, a process ground- tion and how each chief wishes
The Compstat Facility ed in data, begins with collect- to display the material. The best
The Compstat facility need ing, analyzing, and mapping guiding principle for designing
not be elaborate, merely large crime occurrences. Usually, the the Compstat book is whatever
enough to comfortably accom- person or unit designated to issues are prevalent must be
modate all of the required per- gather and collate FBI Uniform captured and made part of
sonnel and, preferably, guests. Crime Reporting (UCR) and per- the book. A typical Compstat
The room should have audiovi- formance data handles these book includes certain elements
sual capabilities, such as an tasks and prepares the Compstat for the Compstat period, with the

14 / FBI Law Enforcement Bulletin


sections separated by numbered, previous week, aggregate serial number of recovered
lettered, or named tab dividers difference, and percentage guns or packaging descrip-
(e.g., precincts and divisions), change; tion and “brand name” of
such as— • crime maps with density illegal drugs);
• cover page with Compstat comparisons and thematic • pattern crimes with con-
period dates and conference layers with separate maps firmed or emerging crime
number and name of fea- for each corresponding patterns (e.g., commercial
tured command; crime; robberies, residential bur-
• recap of previous Compstat • narrative crime summary of glaries, or sexual assaults
period’s notes and issues; every incident under investi- of college students);
• numerical crime summary gation for Compstat period, • performance indicators with
of citywide data, such as sorted by date and described type of arrests by patrol and
aggregate number of inci- by sector, complaint num- detectives; summonses
dents, average number of ber, date, time, location, issued, both moving and
incidents, percentage type of premises, and means parking, by type; field
change, rate of violent and of attack (in speciality interviews by sector and
nonviolent crime, and commands, more data precinct; arrest and search
corresponding charts (e.g., specific to command or warrants issued and served;
pie chart representing crime operation, such as make, clearance rates for detective
rates for Part I offenses), model, color, caliber, and squads and individual
sorted by offense;
Hot-Spot Map of Homicides and Agg. Assaults with Guns
• violent crime summary by
offense in detail, sorted
by precinct and weapon
involved;
• property crime summary by
offense in detail, sorted by
precinct;
• precinct profile with identity
of commanding officer,
executive officer, detective
squad supervisor; demo-
graphics; personnel strength
by rank; and aggregate and
disaggregate crime data by
precinct;
• weekly sector analysis of
crime data and performance Figure 1
comparisons across catego-
ries and citywide analysis
Source: Philadelphia Police Department, 1997-1998
by current week versus

May 2004 / 15
detectives; sick time by priority code, number of residences (burglars, auto
precinct, tour, rank, and calls dispatched and self- thieves), and sex-offender
illness with ratio of sick to initiated, queue goals and registrants, that can help
well officers; investigations average queue time, and commanders identify a
and complaints against travel on-scene and service nexus between noncrime
personnel by division, times; and personnel griev- conditions and crime,
assignment, rank, sex, and ance by division, rank, and antecedents to existing
tour with ratio of investiga- category; problems, and who to
tions to complaints; over- • optional data, such as enlist to control them;
time by category, sorted by abandoned/unsecured • specialty commands, such
division; accidents with city buildings, vacant lots, as narcotics, traffic enforce-
vehicles by division, tour, confirmed gangland areas, ment, special investigations,
and contributing circum- “top ten lists,” truancy and and task force operations,
stances; response time by curfew violations, found with data depicting their
precinct and tour with property lists, offenders’ level of performance

Data Comparison
Diff. % +/-
Day to day One chart for each week of the Compstat period
Week to week Current week vs. Previous week +5 +3%
Month to month March 2003 vs. April 2003 -18 -27%
Quarter to quarter Jan, Feb, Mar vs. Apr, May, Jun +32 +44%
Half year to half year 1st 6 months vs. 2nd 6 months -63 -40%
Year to year 2002 vs. 2003 -27 -2%
Year to date January 1, 2003 to present date Aggregate
Last 12 months March 15, 2002 to March 14, 2003 Aggregate
Custom date Any time period (days, weeks, months, quarters, years, decades)

Comparisons for each period against the prior period

Week Current week 2003 vs. Same week 2002


Month Current month 2003 vs. Same month 2002
Quarter Jan, Feb, Mar 2003 vs. Jan, Feb, Mar 2002
Half year 1st 6 months 2003 vs. 1st 6 months 2002
Year Jan 1, 2003 to present vs. Jan 1, 2002 to present
12 months Jan 18, 2002 to Jan 17, 2003 vs. Jan 18, 2001 to Jan 17, 2002
Custom Any custom date period compared with the prior date period

16 / FBI Law Enforcement Bulletin


germane to their command make collating and analyzing the These statistics are very
and pertinent to the information quite easy. This, useful because they enable a
Compstat process; and coupled with the use of special [crime analyst] to investigate
• special programs, such as statistical programs for more two matters of practical
grant-funded initiatives, complex analysis, works well for importance: cause and predic-
with explanations of perfor- data reduction. tion. These techniques help a
mance measures specified in [crime analyst] disentangle
the program for monitoring and uncover the connections


purposes. between crimes. They help
The best method of capturing trace the ways in which some
calls-for-service and incident- As a managerial [crimes] might have causal
influences on others, and,
report data involves a computer- function, Compstat depending on the strength of
aided dispatch (CAD) and a should appear at
records-management system the relationship, they enable a
the top of the [crime analyst] to make
(RMS). A robust CAD and RMS organization.
can produce most of the predictions. The measures of
association cannot, by them-


Compstat book at the touch of a
button. Otherwise, a data-entry selves, prove that two
clerk or crime analyst must enter [crimes] are causally related.
the details of every incident re- However, these techniques
port, arrest effected, summons Describing the Data can provide valuable clues
issued, case cleared, and other In displaying the informa- about causation and are
pertinent information into a tion, the first step involves therefore extremely important
spreadsheet or database to pro- describing the data so that for [commanders to test their
duce the reports. Essentially, readers can quickly understand beliefs about crime at certain
every piece of data to be pre- relevant information.6 Descrip- locations].
sented must be collated in an tive statistics give commanders For example, suppose a
easy-to-read format, organized a comprehensive overview of [crime analyst] was interested
in a logical order, and assembled how their command is faring in the relationship between
into a coherent book. (see Appropriate Statistics [calls for drug sales] and
Absent CAD or RMS re- chart). [aggravated assault
ports, each command must cap- The second type of de- shootings] and had gathered
ture the essential data elements scriptive statistics is designed the appropriate data. By
each week and report them to to help [commanders] under- calculating the appropriate
the designated person or unit stand the relationship be- measure of association, the
who arranges the style and tween two or more [crimes]. [crime analyst] could deter-
format of the book. Desktop These statistics are called mine the strength of the
software applications with a measures of association, and relationship and its direction.
suite of products, such as spread- they enable [crime analysts] Suppose the [crime analyst]
sheets, databases, and word pro- to quantify the strength and found a strong, positive
cessing programs all in one, direction of a relationship. relationship between these

May 2004 / 17
Figure 2

compensate for shifts


in trends or patterns.
Appropriate charts
should display the in-
formation for each pre-
cinct, as well as city-
wide, including the
aggregate difference
and percentage change
in reported incidents
(see Data Comparison
chart). These charts
should be disaggre-
gated for each crime,
and a chart depicting
the temporal (time) dis-
tribution also should be
included so command-
ers can see when crimes
occur.
two variables. [A com- number of calls for drug sales Crime Mapping
mander] would infer that leads to (causes) more The final step, spatial analy-
[calls for drug sales] and shootings]. Such a conclusion sis or crime mapping, has gained
[aggravated assault might make a good deal of popularity over the last 10 years
shootings] were closely common sense and would as an inexpensive, valuable re-
related [strength of the certainly be supported statis-source for law enforcement
relationship] and that as one tically. However, the causal agencies to identify and plot the
increased in value, the other nature of the relationship is in
occurrence of crime. Crime ana-
also increased [direction of no way proven by the statisti-lysts can detect “nodes,” “paths,”
the relationship]. [A crime cal analysis. Measures of and “edges” along which crimi-
analyst] could make predic- association can be taken as nals travel.8 They can create
tions from one variable to important clues about causa- overlays of calls for service ver-
the other, for example, [the tion, but the mere existence sus arrests effected, unsolved
more calls for drug sales, of a relationship never shouldburglaries with known burglars’
the higher the shootings]. be taken as conclusive proof residences, or calls for service
Now, as a result of finding of causation.7 with abandoned buildings. Ana-
this strong, positive relation- lysts can create speciality maps,
Comparing the Data such as locating sex offenders’
ship, [a commander] might
be tempted to make causal The next step involves com- residences (Megan’s Law regis-
inferences. That is, [a com- paring the data, which enables trants), recovered guns, recov-
mander] might jump to the the chief and command staff to ered stolen autos, and thefts of
conclusion that [a high gauge progress and adjust or auto headlights. Most important,

18 / FBI Law Enforcement Bulletin


they can display aggregate data 2
For illustrative purposes and to (Thousand Oaks, CA: Pine Forge Press-
to show relationships among of- maintain clarity, the author refers to the Sage Publications, 1998), 58. See also
leaders of law enforcement organizations P.J. Brantingham and P.L. Brantingham,
fenses in time space, also known as chiefs and employs masculine pronouns Environmental Criminology (Prospect
as “hot-spot” analysis (see Fig- for these individuals, as well as other Heights, IL: Waveland, 1991); “Environ-
ure 1). Once agencies conduct command-level personnel, throughout ment, Route and Situation: Toward a
spatial and temporal analysis, the article as needed. Pattern Theory of Crime,” in R.V. Clarke
3
they can develop intervention John M. Bryson, Strategic Planning and M. Felson, eds., Routine Activity
for Public and Nonprofit Organizations: and Rational Choice: Advances in
strategies (see Figure 2).9 A Guide to Strengthening and Sustaining Criminological Theory (New Brunswick,
A variety of commercial Organizational Achievement (San NJ: Transaction Books, 1993); and
mapping software applications Francisco, CA: Jossey-Bass, 1995), 57. “Criminality of Place: Crime Generators
exist that integrate easily with and Crime Attractors,” European Journal
of Criminal Policy and Research 3,


the spreadsheet and database ap-
(1995): 5-26.
plications that harness the raw 9
J.H. Ratcliffe, “The Hot-Spot Matrix:
data. Personnel simply can im- A Framework for the Spatio-Temporal
port the data into the mapping Descriptive statistics Targeting of Crime Reduction,” Police
program and run the reports to give commanders Practice and Research, 5 (2004); and as
create the desired maps.10 an unpublished paper presented at the 11th
a comprehensive International Symposium on Environmen-
CONCLUSION overview of how their tal Criminology and Crime Analysis/

The design and success of command is faring. ECCA, June 20, 2003, Cincinnati, OH;
retrieved on June 26, 2003, from http://
the Compstat model rests with www.jratcliffe.net/conf/Ratcliffe%20


the commitment level of the (2004)%20Hotspot %20matrix%20
final%20draft.pdf.
leaders of the law enforcement 10
The Police Foundation’s Crime
agency. They must sponsor and 4 Mapping Laboratory in Washington,
The crime control officer (CCO) is
champion Compstat to their em- a division/district-based position that D.C., can provide excellent technical
ployees. They also must ensure monitors crime trends and patterns on a and crime-mapping assistance. The
that all administrative details are daily basis. The CCO advises the com- foundation “is an independent and unique
resource for policing. The Police Founda-
handled effectively and effi- mander of conditions on a daily basis,
captures crime data, analyzes trends and tion acts as a catalyst for change and an
ciently to produce the most im- advocate for new ideas, in restating and
patterns, and makes recommendations on
portant aspect of the process: deployment strategies and tactics. reminding ourselves about the funda-
data collection, analysis, and 5
Some departments use a 2-week mental purposes of policing, and in
presentation. Next month, the Compstat period with a 1-week overlap for ensuring that an important link remains
intact between the police and the public
FBI Law Enforcement Bulletin all commands because they feel that this
they serve”; access the Police Foundation
will feature the final part of this improves the ability to gauge trends and
emerging patterns. at http://www.policefoundation.org. For
article in which the author will 6
J.F. Healey, Statistics: A Tool for additional crime-mapping resources, see
discuss the implementation and Social Research, 6th ed. (Belmont, CA: http://www.cslj.net/links/
adaptability of the Compstat Wadsworth, 2002). CrimeMapping.htm.
7
model. 8
Ibid., 8-9.
Paul and Patricia Brantingham have The author thanks his friend and
conducted work on the “geometry of colleague Chief Anthony F. Ambrose
Endnotes crime,” suggesting that “each offender of the Newark, New Jersey, Police
1
“Compstat
Jon Shane, “The Process,”
Compstat Process,” tends to be somewhat lazy, sticking close Department for his inspiration and
FBI Law Enforcement
Enforcement Bulletin,
Bulletin,April
April to known places and routes” in Marcus insight concerning this article.
2004, 12-21. Felson, Crime and Everyday Life, 2d ed.

May 2004 / 19
Book Review

Police Assessment Testing: An candidate in the assessment process must


Assessment Center Handbook for Law display the dominant skills required during
Enforcement Personnel by John L. the in-basket exercise testing. The chapter
Coleman, Charles C. Thomas, Publisher, further identifies dominant skills and how
Springfield, Illinois, 2002. those skills should be displayed in critical
Selecting and maintaining competent areas while participating in leader and leader-
law enforcement personnel at all levels is a less group exercises. To assist in each exer-
never-ending and critical task. Law enforce- cise, the author has provided an example of
ment agencies focus testing of new hires and a written instruction sheet for the reader to
promotions of onboard personnel based on use to ensure proper assessment of the
methods, such as a written examination, time candidate.
in the department, and demonstrated perfor- Included in the handbook is an exercise
mance, all of which represent necessary that deals with effectively handling a coun-
criteria. Some departments use the assess- seling situation, with emphasis on the critical
ment center testing process integrated with dominant skills to be tested in each candi-
these other methods for a more comprehen- date. The author presents a chapter on effec-
sive assessment effort. tive documentation of a problem analysis
Police Assessment Testing: An Assess- exercise that covers a candidate’s perfor-
ment Center Handbook for Law Enforcement mance display, or lack thereof, while appear-
Personnel is an outstanding handbook for ing before the assessment center process.
departments using the assessment center Although this police assessment testing
process, planning to implement the integrated handbook contains several strong points,
concept, or in need of professional assistance three significant ones rise above all of the
in upgrading their current testing procedures. others. First, a total of 30 dimensional skills
The author commences the handbook with are identified that may or may not be domi-
assessment center testing evolution, advan- nant in current departments, supported with a
tages, and disadvantages, along with sound listing of seven sound tips that most depart-
performance strategies. The handbook identi- ments can implement. Second, one chapter
fies valuable information for the candidate of contains the principles of handling 16 differ-
any position, recruit or rank-and-file member, ent in-basket exercise examples that require
concerning the “how to” in developing the candidate responses with numerous identified
necessary attitude and approach to participate skills. Some of these skills include decision
in an assessment center testing challenge. making, development of subordinates, and
The work contains an analysis involving judgment and planning. Third, the handbook
previous legal actions against departments, has an in-basket dimension matrix that
including 10 actual case law summaries and identifies which of the dominant skills fall in
court rulings with an accompanying observa- specified overlapping areas, such as dealing
tion statement for each case. One chapter with people, analysis, problem solving,
addresses 14 key areas that assessment organizing, leadership, and accountability, in
centers should consider. It identifies how a and out of group situations.

20 / FBI Law Enforcement Bulletin


Police Assessment Testing: An Assess- members an idea of what to expect during the
ment Center Handbook for Law Enforcement process. As a handbook, it also contains
Personnel is essential for all law enforce- information for procedure and policy writers,
ment agencies at the city, county, state, and citizen review boards, and the university
federal levels that are using or needing to use classroom setting.
a well-designed and documented integrated
process of selection and promotion of per- Reviewed by
sonnel. It is a vital tool for law enforcement Major Larry R. Moore (Ret.)
commissioners, managers, administrators, U.S. Army Military Police Corps
and supervisors, as well as line and staff Certified Emergency Manager
members. Most elements of the handbook International Association of
may be considered for training in the acad- Emergency Managers
emy setting and in-service programs to give Knoxville, Tennessee

Wanted:
Book Reviews

T he Bulletin invites criminal justice professionals to submit reviews of recently published


nonfiction books they have read on topics relative to their field of expertise for possible
inclusion in its Book Review department. The magazine publishes only positive reviews of
between 350 and 500 words or 1 ½ to 2 pages double-spaced. As with article submissions,
the Bulletin staff will edit book reviews for style, length, clarity, and format.
Book reviewers should include two or three compelling points that the author makes,
along with the complete title of the work; the names of the authors or editors; and the pub-
lishing company, city and state, and publication date. As a guide, the staff suggests that
reviewers examine book reviews in past issues of the Bulletin to acquaint themselves with
the magazine’s requirements. Reviewers should submit their book reviews typed and double-
spaced on 8 ½- by 11-inch white paper with all pages numbered. When possible, an elec-
tronic version of the review saved on computer disk should accompany the document. Send
book reviews to:
Editor, FBI Law Enforcement Bulletin
FBI Academy
Madison Building, Room 201
Quantico, VA 22135
telephone: 703-632-1952
e-mail: leb@fbiacademy.edu

May 2004 / 21
Perspective
The Need for School in the mid-1990s mandated school districts to
Resource Officers take specific disciplinary actions for weapon
By Mark D. Benigni, Ed.D
violations. In 1995, Connecticut legislators
expanded the definition of a student possessing a
deadly weapon. As a result, these changes have

T he city of Meriden, Connecticut, is a


diverse community of about 58,000
residents approximately 20 miles north of New
increased the number of suspensions and expul-
sions. In 2001, the Connecticut General Assem-
bly adopted a new law to decrease the dropout
rates in schools by changing the legal dropout age
Haven and 20 miles south of the state capital from 16 to 18. Students under the age of 18 now
Hartford. As the current mayor of Meriden, a need the written consent of their parent or guard-
school administrator, and a former teacher, ian to drop out of school. But, what will all of
education is one of my top priorities. In the midst these legal changes do to keep kids actively
of the accountability movement, when school engaged in school? Federal and state legal re-
systems reveal standardized test results of student quirements often establish barriers that make it
progress to communities, not enough students difficult for schools to find alternative discipline
challenge themselves to meet school proficiency solutions.
standards. Further, increased suspensions and
expulsions in schools confirm the need for Behavior Management
discipline reform. Behavioral problems can be treated similar to
Educators and politicians continue to look for academic problems—in a nonpunitive atmo-
creative measures to keep children in school. sphere with understanding, respect, and patience.1
While some practitioners proclaim graduated This discipline process teaches students who are
systems of discipline, training for teachers, and acting as a disturbance in the school environment
modification of zero-tolerance policies, I recom- how to think of ways to reach their goals without
mend the federally funded program COPS (Com- violating the rights of others.2 When teachers and
munity Oriented Policing Services), which
provides school resource officers (SROs). These
certified police officers provide law enforcement Dr. Benigni serves as an
and law-related teaching and counseling to assistant principal at Berlin
High School in Meriden,
students at public high schools. This approach Connecticut, and is the
requires a fundamental belief that school violence current mayor of Meriden.
does not exist—all violence is community vio-
lence. Communities need collaboration between
schools, police, and the juvenile justice system.
Legal Concerns
Facing increased pressure from concerned
parents and educators regarding the need for
discipline reform, the federal government and
state legislators have changed existing laws and
created new ones that, in turn, have required
school districts to issue mandatory suspensions
and expulsions. For example, federal law changes

22 / FBI Law Enforcement Bulletin


school administrators develop strict discipline school violence prevention program.4 Further,
policies and pressure students to perform, many 65 percent of Americans surveyed thought that
students push back and exhibit counter control. stationing a police officer in schools would
We must treat people according to the way they reduce school violence.5 The presence of SROs
are designed; by presuming that we can deal with in schools makes students, teachers, and staff
all students in the same way, we ignore their members feel safer and deters acts of violence.6
individuality and, in essence, set them up for SROs should be involved with both in-school
failure. Educators and law enforcement must and out-of-school suspensions, and they should
work together to develop a new way of operat- work with school administrators to create alterna-
ing—a method of deterring tives to out-of-school suspen-
unnecessary disturbances. sions. SROs should monitor


school- and community-related
The Study service projects to acquaint
After I interviewed SROs ...respondents themselves with students and
and surveyed school superin-
tendents, police supervisors,
principals, and SROs from 10
communities, my results
“ believed that school
police officers offer
the most effective
school violence
assist school administrators
with discipline. Additionally,
SROs should meet with the
in-school suspension group
showed that the SRO helps prevention program. during the day for a period of
provide a safe environment in group law-related counseling.


today’s public high schools. In Students are less likely to get
particular, respondents believed in trouble if they understand
that a qualified SRO provides and appreciate the conse-
law enforcement, as well as law-related, counsel- quences of their behavior beforehand.
ing and teaching. All respondents in the study SRO programs offer an opportunity for school
perceived that SROs fill an important role in their officials to proactively protect their schools and
schools and all students can benefit from their improve their educational environment. School
presence. The community case studies revealed administrators should encourage parents to
that the role of the SRO and the support for the volunteer for community events, attend demon-
SRO does not vary between cities or towns or strations and workshops about neighborhood
affluent or economically deprived communities. safety and current activities, and watch for signs
While my research noted the importance of of trouble. Although SROs are the only individu-
SROs functioning as law enforcement officers in als in the school setting who have the authority
their schools, it did not address the SRO’s role in and ability to make arrests, an SRO’s primary
daily discipline. Disciplining high school students purpose is to deter students from trouble and
has become increasingly difficult. School admin- encourage them to be active, positive participants
istrators hire assistant principals and deans of in their school communities.
students to address daily discipline needs. Ac- My research revealed the need for the school,
cording to one poll of the public’s attitudes police, and parents to work together to prevent
toward public schools, violence, gangs, and a school violence, and the SRO proves an impor-
lack of discipline are schools’ biggest problems.3 tant link between the three entities. Schools
Seventy-five percent of respondents believed that reflect society; if crime is occurring on the street,
school police officers offer the most effective it also is happening in schools. Tragedies like

May 2004 / 23
Columbine can happen at any school; therefore, all-encompassing approach to student alienation
concerned citizens should take the necessary and school safety has become necessary.
proactive measures to include an SRO on their For many communities, school resource
school staff. officer programs constituted the first time schools
Data also revealed the need for police person- and police worked collaboratively to improve the
nel to see the SRO’s role in a new light. SROs quality of life in their neighborhoods. Educational
are community police officers who work in the professionals must realize that community agen-
school community. With this new setting comes cies, including law enforcement, often can offer
unique responsibilities and duties. “Having an expertise in many areas, including teaching and
officer in school can be a useful safety tool and counseling. Educators and police personnel must
offer a sense of security, but I think it’s essential view and use SROs as a resource because when
that the cops be trained to work they share their knowledge and
7
with children.” As a law expertise, students receive the
enforcement officer, law-
related counselor, and law-
related educator,8 SROs be- “ SRO programs offer
best possible services and
strengthen communities.
SRO programs present an
come proactive participants
in community efforts to ensure
safe and orderly schools.
Selected officers should col-
“ an opportunity for
school officials to
proactively protect their
schools and improve
opportunity for schools to open
their doors to other community
agencies and professionals.
Law enforcement administra-
laborate with school adminis- their educational tors and educational leaders
trators to create secure envi- environment. face the challenge of continu-
ronments in which teachers can
teach and students can learn.
Educators and law enforcement
personnel both maintain control of people and
” ing to search for creative
methods of collaboration with
other social systems in their
communities. We must ensure that our students
situations by enforcing rules/laws to keep our remain in school programs and stay out of
society (school or community) in order. Teachers trouble—effective SRO programs prove a viable
and SROs can teach collaborative lessons on means to accomplish this feat.
topics from the Bill of Rights to the importance
of physical fitness; together, they can coach Endnotes
athletic teams and head school clubs as well. 1
For more information on Edward E. Ford’s Responsible
Conclusion Thinking Process, visit http://www.responsiblethinking.com.
2
Ibid.
The growing number of SRO programs 3
The 28th Annual Phi Delta Kappa/Gallup Poll of the Public’s
indicates that communities are searching for Attitudes Toward the Public Schools, retrieved on July 15, 2003,
effective methods to maintain secure schools from http://www.pdkintl.org/kappan/kpoll285.htm.
and curb student violence. Deterrents, such as 4
Youth Violence in Connecticut Schools, The Connecticut
metal detectors and security guards, have proven Association of Schools Bulletin, May 1999.
5
insufficient in dealing with students who feel Dr. Steven Berkowitz “What Role for Cops in School?”
Record-Journal, December 28, 1999, 11.
alienated from their peers or adults or in prevent- 6
Center for the Prevention of School Violence.
ing intruders from disrupting schools. Boards 7
Supra note 5.
of education are realizing that a more long-term, 8
Supra note 6.

24 / FBI Law Enforcement Bulletin


Legal Digest

Hiding
in Plain Sight
A Peek into the
Witness Security Program
By DOUGLAS A. KASH, J.D.

© Mark C. Ide

I
n mid-July 2003, a fisher- members in jail, and word soon member were faced with a di-
man on the Shenandoah spread that she was an informant, lemma—using her unsworn
River in Northern Virginia which caused her to be “green- statements may violate the Sixth
found the body of Brenda lighted,” or targeted for murder Amendment guaranteeing a de-
“Smiley” Paz. She was an intelli- by fellow MS-13 gang mem- fendant the right to cross-exam-
gent, energetic 17-year-old who bers.3 Paz entered the Witness ine the witness. Prosecutors
was 17 weeks pregnant and a Security Program (Program) in availed themselves of this highly
former gang member.1 She had March 2003, but, due to the lure unusual tactic by arguing that
an “encyclopedic knowledge” of of gang life, Paz voluntarily left Denis Rivera, Paz’s former boy-
Mara Salvatrucha (MS-13), a the Program in June. Within 3 friend and member of MS-13,
violent Salvadoran gang, and weeks, her body was found in the may have ordered Paz’s execu-
educated investigators of its his- river.4 tion.5 Rivera was facing a murder
tory, structure, and operations.2 Prosecutors wanting to use trial in which the victim was
Paz knew her only viable way her testimony in the September stabbed several times, his head
out of MS-13 was to help put its 2001 murder of a rival gang nearly severed, and his throat

May 2004 / 25

the Program, including the iden-
tities of the protectors and wit-
The U.S. Supreme nesses, specific names and loca-
Court’s position on tions cannot be discussed in this
the constitutionality article. Indeed, no agency, entity,
of identification of or person associated with the
protected witnesses Program is permitted to release
began in 1931.... any information concerning spe-
cific operations of the Program


Mr. Kash serves as a senior attorney for the DEA in Arlington, Virginia, and
represents the United States in actions filed by confidential informants.
and its participants.9 With lim-
ited exceptions, release of Pro-
gram-related information, in-
cluding that which pertains to
current or former protected wit-
nesses, even to that very witness,
and esophagus removed.6 The September 11, 2001. The U.S. is prohibited except at the writ-
prosecution argued that because Department of Justice, Criminal ten direction of the director of
Rivera allegedly was involved in Division, Office of Enforcement the Program, the attorney gen-
the witness’ (Paz) execution, he Operations (OEO) oversees the eral, or the assistant attorney
cannot use the protection guaran- Program. The U.S. Marshals general.10
teeing him the right to examine Service (USMS) administers the
Paz. On October 7, 2003, the day-to-day operation of the Judicial Protections
judge ruled that Paz’s state- Program for witnesses relocated Somewhat ironically, the
ments, through the recollection in the community and the Fed- need to provide for the safety of
of the court appointed guardian, eral Bureau of Prisons adminis- witnesses results from the con-
ad litem (for purposes of the suit) ters the day-to-day operation of stitutional protections afforded
can be used, though the court had the Program for witnesses who criminal defendants. The Sixth
not determined other issues, such are incarcerated. Amendment of the U.S. Consti-
as relevancy.7 On November 20, Traditionally, the Program tution provides, in part, that “in
2003, Rivera and a fellow gang has been used to protect wit- all criminal prosecutions, the ac-
member were convicted of mur- nesses and their families in cases cused shall enjoy the right…to
der and later sentenced to life in involving organized crime, nar- confront the witness against
prison.8 This case demonstrates cotics, motorcycle gangs, prison him….” Such protections were
not only the necessity of the gangs, and public corruption. extended by the U.S. Supreme
Program but the real dangers Due to the September 11 attacks Court to defendants in state
facing those who choose to leave and the consequent investiga- prosecutions through the Due
its protective umbrella. tions into domestic and interna- Process Clause of the Fourteenth
The Program, also some- tional terrorist groups, people Amendment. Some states re-
times referred to as WITSEC with pertinent terrorist-related quire prosecutors to identify ev-
or the Witness Protection information have undoubtedly eryone “known by the govern-
Program, is one weapon in considered availing themselves ment [who has] knowledge of
the war on crime that has taken of the protection this Program the relevant facts, while other
even greater significance since offers. Due to the sensitivity of states limit such disclosure only

26 / FBI Law Enforcement Bulletin


to persons who will testify in the defense from asking the courts require the defense to
trial or pretrial proceedings.”11 “most rudimentary” questions of demonstrate the necessity and
Consequently, to protect wit- a witness’ name and address ef- materiality of witness informa-
nesses pre- and posttrial and pre- fectively] “emasculate[s] the tion as it relates to guilt or inno-
serve the integrity and effective- right of cross-examination it- cence. The court then weighs
ness of the criminal justice self.”16 In his concurrence, U.S. the right of cross examination
system, witnesses facing a threat Supreme Court Justice Byron and the witness’ safety con-
to their personal safety are either White opined that the examina- cerns.20 Further, some courts
incarcerated or placed under tion of a witness would be lim- raise the nondisclosure standard
government protection.12 How- ited when specific questions to whether the testimony is sig-
ever, other courts do not require “tend to endanger the personal nificant or crucial, while Califor-
that all witnesses reveal their nia prohibits the concealment of


identities. witness residential information
The U.S. Supreme Court’s as long as the witness is provid-
position on the constitutionality In federal courts, ing important information.21
of identification of protected Beyond judicial protection,
as a general rule, there is one notable statutory
witnesses began in 1931 with
its review of Alford v. United if the informant’s protective shield known as the
States13 in which the defense was identity is federal Victim and Witness Pro-
denied the opportunity to ques- essential or even tection Act of 1982, which pro-
tion the witness at his residence. relevant, it must vides for the punishment of any-
The Supreme Court opined, be provided. one who tampers with a witness,
without consideration of the wit- victim, or informant.22 This pro-


ness’ safety, that the defense tection begins from the reporting
must be able to place the witness stage of a crime to the conclusion
in his environment and that safety of the witness.”17 Al- of the trial testimony. All U.S.
“prejudice ensues from a denial though Justice White’s notation citizens inherit a legal obligation
of the opportunity to place the to a witness’ safety appears to be to provide testimony in criminal
witness in his proper setting and the first time this specific issue and civil proceedings, and the
put the weight of his testimony was raised, since that time, the U.S. Supreme Court has held
and his credibility to a test, with- balance between the need to that not even the fear of death
out which the jury cannot fairly protect a witness’ identity and can obviate this requirement.23
appraise them.”14 the right to confront a witness in Despite the chance that harm
In the next true test of this court has been considered by could result from such testi-
issue, the lower court, in Smith v. many federal and state courts and mony, the government does not
Illinois,15 refused to force the state legislatures. have any legal obligation to pro-
revelation of a witness’ true In federal courts, as a general vide any level of protection to a
identity. Upon appellate review, rule, if the informant’s identity iswitness.24
the U.S. Supreme Court stated essential or even relevant, it
that “the witness’ name and ad- must be provided.18 To refute Policies and Statutory
dress open countless avenues of this, the government must estab- Provisions
in-court examination and out-of- lish the existence of an actual Since the creation of the Pro-
court investigation…[forbidding threat.19 Similarly, New York gram by the Organized Crime

May 2004 / 27
Control Act of 1970 25 and witness would be eligible for application for such assistance.34
amended by the Comprehensive relocation consideration, the Once the witness is authorized to
Crime Control Act of 1984,26 OEO has received all of the in- participate in the Program, the
more than 7,500 witnesses and formation necessary to make a prosecutor must contact the
9,500 family members have been determination that the witness is OEO to arrange the appearance,
afforded protection, which in- essential to a significant pros- date, time, place, and anticipated
cludes establishing new identi- ecution and is endangered as a duration of appearances for all
ties in new locations.27 The attor- result, and no other alternative case-related matters. All pretrial
ney general has the sole authority exists but to enter the Program.32 conferences and briefings in-
to admit witnesses and their im- During the preliminary inter- volving witnesses in the Pro-
mediate families into the Pro- view, the witness will be given a gram are conducted at neutral
gram.28 Although many parts of general explanation of the ser- sites determined by the USMS
the governing statute and poli- vices provided in the Program.33 after OEO approval.35
cies refer to the attorney © PhotoDisc
For example, one federal in-
general’s authority, this author- vestigative agency, the DEA,
ity has been delegated by the at- recognizes two levels of protec-
torney general and is exercised tive status in the Program.36 Un-
by the senior associate director der the “Full Program Services,”
of the OEO who has been desig- name changes and relocations
nated the director of the Witness are provided for the witness and
Security Program and, in his ab- his family. The less often used is
sence, the director of the OEO.29 the “Special Limited Service”
While investigative agencies that was developed for foreign
maintain polices regarding the nationals who face deportation
use of the Program,30 the govern- and a threat in their own country.
ing policy is promulgated by Although this does not provide a
the OEO and can be found in new identity to the witness, it
the U.S. Attorney’s Manual suspends deportation proceed-
(USAM) 9-21.000 et seq. For Each investigative agency, ings against the witness.
time-critical situations involving whether federal, state or local, Prior to requesting a wit-
imminent danger where the in- must submit its initial request for ness’ admission into the Pro-
vestigative agency cannot pro- placing a witness into the Pro- gram, an investigative agency
vide the necessary security, the gram to the OEO. The investiga- must consider several issues. For
USAM sections 3-7.340 and 9- tive agency first must request example, the DEA sets forth the
21.220 provide guidance con- such assistance through the U.S. following criteria:
cerning the Emergency Witness Attorney’s Office for the district
• The witness must be an
Assistance Program and authori- in which the investigative activ-
ity is to occur or, alternatively, established (registered and
zation procedures for emergency
Program protection.31 Typically, where charges against the target vetted) DEA Confidential
Source of Information
Program protection will be au- will be filed. The U.S. Depart-
ment of Justice, Criminal Divi- before entering the Program.
thorized only after the USMS
has completed a preliminary in- sion Section Chiefs/Office Di- • The witness’ anticipated
terview to determine whether the rectors, also can submit an testimony must be essential

28 / FBI Law Enforcement Bulletin


in the prosecution of the • a summary of the defendants • alternatives to placing the
most significant violators. and the criminal organiza- witness in the Program and
• There exists a clear threat to tion; why there is no alternative,
the witness or his family or, • the witness’ involvement in or why they will not work;
alternatively, a documented the illegal activities being • whether the prosecution can
pattern of violence by the prosecuted; secure similar testimony
defendants/associates. from other sources;


• The witness must accept all • significance of the antici-
security precautions (includ- pated testimony;
ing a name change) man- • whether the need for the
dated by the USMS. State and local
agencies can request testimony outweighs the risk
• The witness cannot have any of danger he or his family
outstanding criminal
that a witness (and poses to the public;
charges against him. his family) involved
in an organized • any child custody issues and
• The witness understands criminal activity or history of spousal abuse;
that the Program is designed and
to make him legally
other serious offense
be placed into the • the witness’ income and the
self-sufficient.37 Program’s impact on this
The first step that an investi-
Program.
income.41


gative agency must undertake to There was a time when
request a witness for the Pro- courts held that “witness protec-
gram is to work with the pros- tion statutes contemplate only
ecuting U.S. Attorney’s Office • details of any direct or the protection of witnesses and
on completion of an OEO Wit- potential threats to the their families—not protection of
ness Security Unit application. witness or his family; and the public from the witnesses.”42
The application includes the an- The Witness Security Reform
ticipated witness testimony and • specific biographical infor- Act of 1984 changed this posi-
its necessity to a successful pros- mation as to the defendants,
the witness’ associates and tion by requiring the attorney
ecution, the witness’ cooperation general to consider the danger a
and criminal history, the threat family members, and those
who represent a threat to the protected witness poses to the
posed to the witness, and the risk relocation community.43 Once
the witness (and his family) may witness.40
the assessments are completed,
present to a new community.38 A risk assessment also is
the DEA Chief of Operations
The application is submitted to required and must address the Management forwards the report
OEO by the U.S. Attorney’s Of- following issues: to the OEO.44 DEA agents do not
fice.39 The investigative agency • significance of the investiga- have to prepare a risk assessment
also must prepare a threat as- tion or case in which the for an incarcerated witness un-
sessment to be sent to OEO. This witness is cooperating; less that witness will remain in
report includes— • possible danger the witness the Program after his release.
• a synopsis of the investiga- and his family poses to the However, all persons who may
tive records; new relocation community; pose a threat to the prisoner/

May 2004 / 29
witness must be identified and moving expenses from the crime results in death or serious
their biographical information previous residence, basic living bodily injury) to the victim or
provided to the USMS or the expenses, job search assistance, estate of the victim for medical
Federal Bureau of Prisons.45 and any other services to assist and funeral costs and loss of
In addition, the USAM re- the person to become legally wages.53 Before such payment is
quires the attorney general to self-sufficient.50 The USMS also made, however, the victim must
consider a psychological evalua- covers the costs (travel, housing,have tried to secure restitution
tion of the witness and all family meals) incurred when a witness and compensation under avail-
members to be relocated who are is scheduled to appear for trial or
able federal and state civil rem-
18 years of age or older.46 The briefings. For those Program edies.54 Any recovery, including
USAM also mandates that any witnesses who are entitled to re- insurance payments, may pre-
witnesses entering the Program ceive rewards for their participa-clude or mitigate compensation
will be required to satisfy any tion, the investigative agency under the Victims Compensation
known debt or judgment and all Fund.


outstanding criminal and civil Recently, Senator Charles
obligations (i.e., fines, restitu- Shumer (D-NY) introduced
tion).47 For those persons already legislation creating a “Short-
in the Program, however, the Despite a U.S. Term State Witness Protection
governing statute only requires population of Service” within the USMS.55
the attorney general to “urge the approximately 280 This new unit would be created
person to comply with the [civil] million people, covertly to provide protection for wit-
judgment (emphasis added).”48 relocating a person nesses in state and local trials
In the event the person does not and his family...is not involving major violent crimes.56
undertake reasonable efforts to an easy task. The legislation also would pro-
satisfy the judgment, the attorney vide grant money to state and


general has the discretion, after local prosecutors whose states
considering the danger posed had at least 100 murders per year
and at the request of a plaintiff must submit a report, with the during the previous 5-year
seeking civil relief, to release the concurrence of the prosecutor, to period.57
person’s identity and location to the USMS Witness Security Pro-
the plaintiff, enabling the plain- gram or Bureau of Prisons, In- State and Local
tiff to attempt to recover under mate Monitoring Section, along Agency Usage
the judgment directly. The stat- with the payment.51 State and local agencies can
ute also provides that the United Not all Program participants request that a witness (and his
States and its officers are exempt conduct themselves in a legal family) involved in an organized
from any liability resulting from manner. In certain situations in criminal activity or other serious
this disclosure.49 which a participant commits a offense be placed into the Pro-
The attorney general, crime, a Victims Compensation gram. The initial request is trans-
through the USMS, can provide Fund has been established for mitted to the U.S Attorneys Of-
the necessary support to all per- victims of those crimes.52 The fice which, after its own review,
sons in the Program. Such sup- OEO, as delegated by the attor- forwards the request to the OEO,
port includes new identities ney general, may make restitu- with its endorsement.58 The wit-
and documentation, housing and tion or compensation (if the ness’ placement is predicated on

30 / FBI Law Enforcement Bulletin


the attorney general’s finding cently introduced bills to in- for the Program. Indeed, it is
that the witness and his family crease the penalty to a felony for these very people and the pro-
may suffer a crime of violence in anyone who knowingly obstructs gram they administer that may
connection to the witness’ antici- justice or who, by threat or force, be the one viable option that can
pated testimony.59 In this sce- intimidates a witness.63 Simi- persuade a person with informa-
nario, the state or local agency larly, Maryland’s Congress in- tion about another September 11
must surrender its supervision of troduced legislation to increase type attack to provide that infor-
the witness to federal authorities penalties for intimidating a wit- mation and prevent the slaughter
and, according to the USAM, is ness to a felony and making first- of many innocent Americans and
requested to reimburse the fed- degree murder of a witness a punish those who seek to do this
eral government. However, pur- capitol crime.64 These changes country harm.
suant to the governing statute, may forecast a wave of legisla-
the attorney general may enter tive fixes to come throughout the Endnotes
into an agreement with a state United States due to this growing 1
Jerry Markon and Maria Glod,
government that requests the use problem. “Giving Up a New Life for a Gang Death,”
of the Program “in which that The Washington Post, August 10, 2003,
government agrees to reimburse Conclusion sec. A, p. 1.
the United States for expenses Since its inception more than 2
Id.
3
incurred in providing protec- 30 years ago, the Witness Secu- Id. at sec. A, p. 16.
4
rity Program has become an inte- Id.
tion….”60 The USMS will calcu- 5
Jerry Markon and Maria Glod,
late the terms of any reimburse- gral part in the war on crime with “Prosecutors Hope to Quote Dead
ment, which will be set forth in a newly found greater emphasis Witness,” The Washington Post, August
a Memorandum of Understand- on terrorism. Despite a U.S. 16, 2003, sec. B, p. 4.
6
ing. 61 Rarely are state cases population of approximately 280 7
Id.
million people, covertly relocat- Maria Glod, “Gang Trial to Allow
taken without reimbursement Statements of Deceased,” The Washington
unless there is a nexus to a fed- ing a person and his family, as Post, Oct. 7, 2003, sec. B. p. 1-2.
eral investigation. well as providing legal name 8
Maria Glod and Jerry Markon, “2
changes, employment and medi- MS-13 Members Convicted of Slaying,”
Recent State Developments cal assistance, personal protec- The Washington Post, November 21,
Individual states recently tion when necessary, and ensur- 2003, sec. B, p. 1. See also Jerry Markon,
“2 MS-13 Members Get Life in Prison,”
have undertaken legislative ing that the witness and his The Washington Post, February 18, 2004,
action to strengthen their family are respecting the Pro- sec. B. p. 1.
respective witness protection gram mandates, is not an easy 9
18 U.S.C. § 3521(b)(1) and (3)(2003),
programs. The U.S. attorney task. If history is any indication, 28 C.F.R. 0.111B(b)(2003).
10
for the District of Columbia, there will be problems with See “Release of Federal Witness
Security Program Information,” Stephen J.
who handles criminal matters participants in the Program com- T’Kach, Director Witness Security
throughout the federal district, mitting crimes. In light of the Program, July 15, 2002. See also 18
recently stated that the intimida- number of persons who have U.S.C. § 3521(b)(1) and (3) and 28 C.F.R.
tion of witnesses was the big- entered the Program, the com- 0.111B(b).
11
Nora V. Demeleitner, “Section V:
gest problem in prosecuting city paratively limited number of
Witness Protection in Criminal Cases:
gangs.62 Across the river, both such problems is a testament to Anonymity, Disguise or Other Options?”
Houses of Congress for the the dedication and professional- American J. of Comp. Law, 1998 Supp.
Commonwealth of Virginia re- ism of the persons responsible 641, 643.

May 2004 / 31
12
Id. danger a witness or his family may
13
282 U.S. 687 (1931). See also
Demeleitner, supra note 11, at 643.
present to the community. Id. at 9-21.330.
39
USAM 9-21.100 and DEA Special
Wanted:
14
Id. at 692. Agents Manual § 6612.82.B. Photographs
15 40
390 U.S. 129 (1968). DEA Special Agents Manual §
16
Id. at 131. 6612.82.E.1.
17 41
Id. at 133-34. (White, J., concurring). Id. at § 6612.82.E.2.
18 42
Roviaro v. United States, 353 U.S. Taitt v. United States, 770 F. 2d 890
53, 60-61 (1957). at 894 (10th Cir. 1985), citing Bergmann
19
Demeleitner, supra note 11, at 652. v. United States 689 F.2d 789 (8th Cir.
See 28 C.F.R. § 16.26(b)(4)(2003), the 1982).
43
agency and the informant must consent to 18 U.S.C. § 3521(c)(2003).
44
the disclosure. Note that typically mere DEA Special Agents Manual §
“tipsters” would not have their identities 6612.82.E.
45
revealed. Id. at § 6612.82.F.
20
Id. citing People v. Stanard, 365
N.E. 2d 857, 863 (NY 1977).
21
46

47

48
USAM 9-21.330.
USAM 9-21.100.
T he Bulletin staff is
always on the lookout
for dynamic, law enforce-
Id. citing Friedman, Annotation, 18 U.S.C. § 3523 (a)(2003).
Right to Cross-Examine Witness As to His 49
Id. ment-related photos for
Place of Residence, 85 A.L.R. 3d 541, 50
18 U.S.C. § 3521 (2003). possible publication in the
569-70 (1978 and Supp. 1997). 51
USAM 9-21.910 and 9-21.920. magazine. We are interested
22
18 U.S.C. § 1512 (2003). 52
18 U.S.C. § 3525 (2003). in photos that visually depict
23
Piemonte v. United States, 367 U.S. 53
Id. at § 3525(a) and USAM 9- the many aspects of the law
556, 559 (1961). 21.1020. enforcement profession and
24 54
Piechowicz v. United States, 885 Id. at § 3525(d). illustrate the various tasks
55
F.2d 1207 (4th Cir. 1989). S. 1982, 108th Cong. 1st Sess. law enforcement personnel
25
Organized Crime Control Act of (December 9, 2003).
56 perform.
1970, Pub.L. No. 91-452, 84 Stat. 938. Id. at § 570 (a).
26
Witness Security Reform Act of 57
Id. at § 570 (b). We can use either black-
1984, Pub.L. No. 98-473, 98 Stat. 1837 58
USAM at 9-21.140. and-white glossy or color
(1984). 59
18 U.S.C. § 3521(a)(1)(2003). prints or slides, although we
27
Retrieved on October 16, 2003, from 60
18 U.S.C. § 3526(b)(1)(2003). prefer prints (5x7 or 8x10).
http://www.usmarshals.gov/factsheets/ 61
USAM at 9-21.140. We will give appropriate
62
witsec. Neely Tucker, “Girl’s Slaying Opens credit to photographers when
28
18 U.S.C. § 3076 (2003). Window on Intimidation,” The Washing- their work appears in the
29
18 U.S.C. § 3521(d)(3)(2003). See ton Post, February 2, 2004, sec. A, p. 1 magazine. Contributors
also USAM 9-21.200 (citing A.G. Order and 10.
63 should send duplicate, not
No. 1072-84). H.B. 571, 2004 Sess., S.B. 321,
30
See e.g., DEA Special Agents Manual 2004 Sess. (VA 2004). original, prints as we do not
§ 6612.82. 64
H.B. 263, 418th Sess. (MD 2004), accept responsibility for
31
See also 18 U.S.C. § 3521(e)(2003). S.B. 181 and 185, 418th Sess. (MD damaged or lost prints. Send
32
USAM 9-21.100, 9-21.300, 9- 2004). photographs to:
21.330, 9-21.400.
33
USAM 9-21.300. Law enforcement officers of other
Art Director
34
USAM 9-21.400. than federal jurisdiction who are
35 interested in this article should
FBI Law Enforcement
USAM 9-21.700. Bulletin, FBI Academy,
36
DEA Special Agents Manual § consult their legal advisors. Some
police procedures ruled permissible Madison Building,
6612.82.H.
37
Id. at § 6612.82.A. under federal constitutional law are Room 201, Quantico,
38
USAM at 9-21.100. A psychological of questionable legality under state VA 22135.
profile will be conducted to assess the law or are not permitted at all.

32 / FBI Law Enforcement Bulletin


The Bulletin Notes

Law enforcement officers are challenged daily in the performance of their duties; they face each
challenge freely and unselfishly while answering the call to duty. In certain instances, their actions
warrant special attention from their respective departments. The Bulletin also wants to recognize
those situations that transcend the normal rigors of the law enforcement profession.

Deputy Clifton Talley of the Tulsa County,


Oklahoma, Sheriff’s Office was driving in his
personal vehicle with his family when he observed
Sergeant Mike Carter of the Sand Springs, Okla-
homa, Police Department respond to a vehicle
accident. A van had diverted from the roadway,
gone through a fence, and collided with a parked
truck; the injured driver was pinned beneath the
dash and steering wheel. Deputy Talley noticed that
Deputy Talley Sergeant Carter
a fire had ignited at the rear of the vehicle and
decided that there was no time to wait for fire rescue
to assist the driver. He quickly exited his vehicle and assisted Sergeant Carter in extracting
the woman from her van; due to the heavy smoke from the fire, they had to rely on touch to
free her. After removing the driver from the vehicle, they immediately took her to on-scene
medical personnel. The actions of Deputy Talley and Sergeant Carter prevented the serious
injury or death of the driver.

Officer Kelly Davenport of the Richmond, Michigan, Police Depart-


ment responded to a mobile home that was fully engulfed in flames.
After arriving at the residence, Officer Davenport approached the front
door, which was forced open by an off-duty firefighter and had thick,
black smoke pouring out of it. Officer Davenport located a man lying
inside the residence and, with the firefighter’s help, crawled into the
home and pulled the
individual outside
where he received
Officer Davenport
immediate medical Nominations for the Bulletin Notes should be based on
attention. Although either the rescue of one or more citizens or arrest(s)
the man later died from his injuries, made at unusual risk to an officer’s safety. Submissions
should include a short write-up (maximum of 250
Officer Davenport made a valiant effort words), a separate photograph of each nominee, and a
to save the individual’s life. letter from the department’s ranking officer endorsing
the nomination. Submissions should be sent to the
Editor, FBI Law Enforcement Bulletin, FBI Academy,
Madison Building, Room 201, Quantico, VA 22135.
U.S. Department of Justice Periodicals
Federal Bureau of Investigation Postage and Fees Paid
Federal Bureau of Investigation
FBI Law Enforcement Bulletin ISSN 0014-5688
935 Pennsylvania Avenue, N.W.
Washington, DC 20535-0001

Official Business
Penalty for Private Use $300

Subscribe Now

S-ar putea să vă placă și