Professional Documents
Culture Documents
Volume 70
Number 8
United States
Department of Justice
Federal Bureau of Investigation
Washington, DC 20535-0001
Features
Contributors' opinions and statements
should not be considered an
endorsement by the FBI for any policy,
program, or service.
Subtle Skills for Investigators can employ Neuro-
The Attorney General has determined
that the publication of this periodical is
Building Rapport 1 Linguistic Programming techniques
during interviews to help them build
necessary in the transaction of the By Vincent A. Sandoval rapport .
public business required by law. Use
of funds for printing this periodical has and Susan H. Adams
been approved by the Director of the
Office of Management and Budget.
Making Computer Law enforcement must build an internal
The FBI Law Enforcement Bulletin
(ISSN-0014-5688) is published
monthly by the Federal Bureau of
Crime Count 10 capacity to define, track, and analyze
computer crime.
Investigation, 935 Pennsylvania By Marc Goodman
Avenue, N.W., Washington, D.C.
20535-0001. Periodicals postage paid Communities can help reduce the
at Washington, D.C., and additional Addressing
mailing offices. Postmaster: Send
address changes to Editor, FBI Law
School Violence 18 impact of school violence by following
three simple steps.
Enforcement Bulletin, FBI Academy, By Francis Q. Hoang
Madison Building, Room 209,
Quantico, VA 22135.
Miranda Revisited In view of the decision in Dickerson
Editor
By Thomas D. Petrowski 25 v. United States, agencies should
reevaluate their policies regarding
John E. Ott Miranda.
Associate Editors
Glen Bartolomei
Cynthia L. Lewis
Bunny S. Morris
Art Director
Denise Bennett Smith Departments
Staff Assistant
Linda W. Szumilo
6 Focus on Technology 24 Book Review
This publication is produced by
members of the Law Enforcement Law Enforcement The Loss of Innocents
Communication Unit, Web Sites
William T. Guyton, Chief.
Internet Address
leb@fbiacademy.edu
Cover Photo
© Adobe Image Library
D
etective Hamilton is using her paralanguage (speech rate, vol-
Mark Hamilton, a seasoned techniques from Neuro- ume, and pitch). In so doing, Detec-
detective, slowly opens the door Linguistic Programming, a tive Hamilton builds rapport with
to the interview room. The communication model with a name the witness and, hence, increases
witness to the drive-by shooting
he might not even recognize. Yet, his chances of gathering pertinent
sits leaning forward in a chair
with her head in her hands. his years of interviewing have information during the interview.
Normally, Mark bellows out taught him the techniques. To estab- Detective Hamilton and other
his introduction to establish lish rapport with this witness, De- experienced investigators recog-
immediate control, but not tective Hamilton knows that he nize the crucial role that rapport
this time. He enters the room needs to match her nonverbal be- plays in an interview. Derived from
without speaking, pulls a chair havior, or kinesics, by sitting down the French verb rapporter meaning
close to the witness, leans and leaning forward. When the “to bring back,” the English word
forward, and, in a barely audible witness begins to talk, Detective rapport refers to a relationship
voice, slowly begins, “I’m
Hamilton listens carefully to her or communication characterized
Detective Mark Hamilton....”
words and intentionally uses similar by harmony.1 With this in mind,
language. He also pays close atten- the need for rapport applies to all
tion to how she talks and matches interviews, but especially to those
August 2001 / 1
involving a victim or witness who others through a model now known these differences correspond to in-
has experienced physical or psy- as Neuro-Linguistic Programming, dividual programming or process-
chological abuse. The interviewer’s or NLP.3 ing systems. People use their senses
task is similar to that of the clinical Neuro-Linguistic Programming outwardly to perceive the world and
psychologist, who must initially embraces three simple concepts. inwardly to “re-present” this expe-
develop a personal bond with his First, the neuro part of NLP recog- rience to themselves. In NLP, repre-
client before intimate feelings are nizes the fundamental idea that all sentational systems denote ways
shared. 2 Thus, investigators can human behavior originates from people take in, store, and code in-
enhance their rapport-building neurological processes, which in- formation in their minds.6 These
skills by examining some practical clude seeing, hearing, smelling, systems pertain to the principal hu-
recommendations derived from tasting, and feeling. In essence, man senses—seeing (visual), hear-
the behavior modification tech- people experience the world ing (auditory), and feeling (kines-
nique known as Neuro-Linguistic through their senses. Second, they thetic). To a lesser degree, they
Programming. communicate their experiences ver- involve tasting (gustatory) and
bally, through language;4 therefore, smelling (olfactory). People con-
UNDERSTANDING the linguistic part of NLP refers to stantly see, hear, and feel whatever
NEURO-LINGUISTIC this use of language to communi- transpires around them. When
PROGRAMMING cate thoughts. Finally, the program- individuals relate these experiences
In the early 1970s, John ming aspect of NLP recognizes that to others, they mentally access
Grinder, an assistant professor of individuals choose to organize their the sights, sounds, or feelings
linguistics at the University of Cali- ideas and actions to produce results. associated with these experiences
fornia in Santa Cruz, and Richard Each person also decides how to and communicate them through
Bandler, a student of psychology, organize these ideas in a specific their predominant representational
identified patterns used by success- manner.5 system.7
ful therapists. They packaged them The NLP founders theorize that
in a way that could be passed on to people think differently and that BUILDING RAPPORT
WITH NLP
Enhancing communication and,
hence, building rapport represents
the most applicable aspect of NLP
to investigators. The ability to com-
municate effectively and build rap-
port stands as one of the major con-
tributors to a police officer’s
success in dealing with the public.8
In an interview setting, effective
communication involves the
interviewer’s skill in establishing
rapport through specific actions and
words, thereby building trust and
encouraging the interviewee to pro-
vide information.
Special Agent Sandoval is Special Agent Adams is Others besides successful law
an instructor in the Law an instructor in the Law enforcement interviewers have
Enforcement Communication Enforcement Communication found NLP techniques helpful in
Unit at the FBI Academy. Unit at the FBI Academy. rapport building. For example,
“
provide information. As one re- dominant representational system is
searcher points out, “people like visual will say phrases, such as “I
people who are like themselves.”10 Once interviewers see what you mean,” “that looks
Once interviewers establish rap- establish rapport, good to me,” “we see eye to eye,” or
port, barriers disappear, trust barriers disappear, “I get the picture.” On the other
grows, and an exchange of informa- trust grows, and hand, a person whose preference is
tion follows. To achieve these re- auditory will use language, such as
sults, interviewers should match or
an exchange of “something tells me...,” “that rings
“mirror” the interviewee’s kinesics, information follows. a bell,” “we’re on the same wave
”
language, and paralanguage. length,” or “that sounds okay to
me.” Finally, a person who is kines-
Building Rapport thetic or “feeling” oriented will
by Matching Kinesics As Detective Hamilton intro- make statements, such as “I’ll get in
Matching another person’s duces himself, he pulls his chair touch with you,” “how does that
body language or kinesics probably close to the witness and, just like grab you?,” “you don’t have to get
is the easiest and most obvious tech- her, leans forward in his chair with pushy,” or “how do you think I
nique. Kinesic behavior typically his hands in front of him. As the feel?”13
includes gestures, posture, and witness begins to open up and speak Successful investigators listen
movements of the body, such as the about what she has seen, her non- closely to the choice of words wit-
hands, arms, feet, and legs.11 How- verbal behavior gradually follows nesses and suspects use. Then, they
ever, a difference exists between suit, as she opens herself up by sit- conform their language to match the
mimicry and matching. Interview- ting back. Eventually, as her trust in interviewee, using similar visual,
ers should match another person’s Detective Hamilton grows, she auditory, or kinesthetic phrases.
body language with subtlety and feels comfortable enough to relax. When Detective Hamilton’s
caution; otherwise, the person eas- She realigns her posture by sitting drive-by shooting witness finally
ily could become offended. People up and facing Detective Hamilton. begins to talk, she describes her
who have developed rapport tend to Through each succeeding change situation with phrases, such as “tre-
match each other in posture and in her body language, Detective mendous pressure,” “I feel like I’m
August 2001 / 3
going to pieces,” and “I can’t come If an investigator observes that feelings or emotions, such as “how
to grips with what’s happening.” a witness consistently looks up at an did all of this feel to you?” or “can
The detective responds to the wit- angle, particularly when responding you get a handle on what took
ness’ account by matching her to questions that require recall, the place?” By closely monitoring the
words. When she speaks of the interviewer can conclude, with a movements of a person’s eyes and
“tremendous pressure,” he explains measurable degree of confidence, aligning questions in accordance
ways to relieve the “pressure.” that the person is “seeing” a picture with the interviewee’s observed
He continues to use kinesthetic while remembering information. In preferences, investigators can build
phrases, such as “take this load off NLP terms, this individual’s pre- rapport, thereby enhancing commu-
your shoulders,” to communicate ferred representational system is vi- nication between themselves and
in her preferred representational sual. The investigator can facilitate the people they interview. While
system. the witness’ recollection of events NLP practitioners cite a direct neu-
Because individuals process in- rological connection between eye
formation in different ways, movements and representational
through distinct representational systems,17 other researchers recog-
systems, the investigator often ac- nize the need for additional
quires valuable insight into the empirical studies.18 Currently, in-
Pa
e
uag
ral
by paying close attention to the movements as another possible in-
ang
ng
uag
Rapport
cording to NLP, eye movements, communicating.
Building
e
referred to as “eye-accessing
cues,”14 reflect the manner in which with NLP Building Rapport by
an individual processes data. There- Matching Paralanguage
fore, the eyes move in specified di- Matching another person’s
rections, depending upon the Kinesics speech patterns, or paralanguage,
person’s preferred mode of think- constitutes the final, and perhaps
ing. The founders of NLP con- most effective, way to establish rap-
cluded that eye movements reflect by encouraging this visual recall port. Paralanguage involves how a
whether the person has a visual through such phrases as “how did it person says something or the rate,
preference (thinks in terms of pic- look to you?” or “show me what you volume, and pitch of a person’s
tures), an auditory preference mean.” If the witness looks to the speech. One researcher goes so far
(“hears” sounds), or a kinesthetic side when asked a question con- as to say that matching the other
preference (feels or experiences cerning what the person saw, the person’s voice tone or tempo is the
emotion) to process information.15 investigator can encourage the wit- best way to establish rapport in the
Typically, individuals move ness to remember by using ques- business world.19 What may hold
their eyes up at an angle as they tions designed to stimulate auditory true in the business realm applies in
remember a picture. Some people recall, such as “tell me what you the interview setting as well. Indi-
look directly to the side, which indi- heard” or “how did it sound to viduals can speak fast or slow, with
cates that they are using the audi- you?” Finally, if the witness looks or without pauses. They can talk in
tory mode to recall something that down at an angle when asked a a loud or soft volume and in a high
they probably heard before. Finally, question by the investigator, this or low pitch. However, most people
individuals who look down at an could indicate that the person has a are unaware of their own speech
angle appeal to kinesthetic sensa- kinesthetic preference. Therefore, rate or vocal tones. In fact, investi-
tions as they recollect what they felt the investigator can choose phrases gators do not have to match a
or experienced.16 that underscore the witness’ person’s voice exactly, just close
“
1990), 2.
Detective Hamilton also uses this 4
Ibid., 3.
aspect of NLP in his interview. 5
Ibid., 3.
The drive-by shooting witness Successful 6
Ibid., 26.
speaks slowly, as if searching for investigators listen 7
Richard Bandler and John Grinder, Frogs
Into Princes (Moab, UT: Real People Press,
the right words. Detective Hamilton closely to the 1979), 5.
slows the rate of his speech, giving choice of words 8
P.B. Kincade, “Are You Both Talking the
ample time for the witness to get her Same Language?” Journal of California Law
witnesses and Enforcement 20: 81.
point across without feeling rushed. suspects use. 9
Ibid., 19.
He lowers his voice to match her 10
Jerry Richardson, The Magic of Rapport,
”
soft volume and refrains from the How You Can Gain Personal Power in Any
urge to interrupt her. As the witness Situation (Cupertine, CA: Meta Publications,
1987), 21.
becomes more excitable, speeding 11
Judith A. Hall and Mark L. Knapp,
up her speech rate and increasing This scenario illustrates the Nonverbal Communication in Human
her volume, Detective Hamilton in- importance of carefully observ- Interaction (Fort Worth, TX: Harcourt Brace
creases his rate and volume as he ing how witnesses and suspects Jovanovich College Publishers, 1992), 14.
12
Supra note 3, 19.
attempts to mirror her. In so doing, communicate through nonverbal, 13
Supra note 7, 83.
he demonstrates to the witness that verbal, and vocal means. Neuro- 14
Supra note 7, 35.
he is interested in her as an indi- Linguistic Programming is not a 15
Supra note 7, 25.
vidual, and this allows her to com- new concept nor used rarely. In 16
17
Supra note 7, 25.
Supra note 7.
municate what she experienced in a fact, most successful interviewers 18
Aldert Vrij and Shara K. Lochun,
way that is comfortable for her. employ some variation of it to “Neuro-Linguistic Programming and the
gain rapport. However, by being Police: Worthwhile or Not?” Journal of Police
CONCLUSION conscious of the process and the and Criminal Psychology 12, no. 1 (1997).
19
Detective Mark Hamilton’s Supra note 1, 30.
benefits associated with NLP, inter- 20
Supra note 1, 31.
witness begins to feel support and viewers can use these techniques
August 2001 / 5
Focus on Technology
”
site and the Internet for little or no access to an agency’s data. ICE
fee. The cost of using a private also converts information from
host can range from as little as an agency’s database into Hyper
$20 to as much as several thousand dollars per month, Text Markup Language, commonly referred to as
based on the size of the Web site and the amount of HTML.2
traffic it transmits and receives. In Florida, the State’s
Attorney General’s Office provides free hosting to One Agency’s Experience
the Internet for law enforcement agencies. In 1994, the Hillsborough County Sheriff’s Office
A Web site can be as simple as a single page, (HCSO) in Tampa, Florida, launched its first Web
or it may contain several hundred pages, depending site. At its inception, the site consisted of only a few
on the scope of the information offered. When first pages, limited pictures, and some information about
creating a Web site, an agency must decide the the agency. The first venture into this new medium
purpose of the site. Will they use it simply as a public proved a learning experience for the HCSO; however,
relations tool, merely highlighting various facets of neither the agency nor the public gleaned much utility
the agency? Will it be self-contained or offer addi- from this site. In 1998, HCSO management realized
tional resource links? Will it provide interactive that having a Web site provided great potential, which
services to its visitors? led the way to a revision of the old site. HCSO
For those agencies that need outside assistance to wanted to furnish timely information about how the
develop and create a Web site, a plethora of compa- agency serves the public (e.g., various programs,
nies exist that offer these services for a fee, which agency organizational charts, location of departments)
can range from several hundred to several thousand and to provide a utility for the agency and the Web
dollars, depending on the size of the site and the site visitors (e.g., crime statistics, history, on-line
various options selected. However, because small forms).
Web sites are relatively easy to create, in-house Additionally, the update added state-of-the-art
personnel with above-average computer skills often features to the site, allowing greater access and ease
August 2001 / 7
of use. For example, the HCSO Detention Department reducing the number of walk-in requests. Addition-
receives hundreds of calls every day inquiring about ally, those individuals or businesses seeking informa-
the status of the inmates housed in the county correc- tion benefit by receiving more timely, convenient
tional system. The new Web site now interfaces with information.
the HCSO’s mainframe computer and, because the Law enforcement public information officers
arrest data is public information, anyone can access (PIOs) often spend a great deal of their time working
the information by querying either a name or a with reporters. A large agency typically will have one
booking number. or two full-time PIOs. The HCSO Public Information
Other law enforcement agencies also have gone Office handles approximately 1,200 requests from
on-line with inmate information. In March 2000, the the media and the public per month. By placing news-
Los Angeles County, California, Sheriff’s Department worthy press releases on a continually updated special
(LASD) went on-line allowing anyone with Internet press release Web page, the HCSO has significantly
access to search the department’s database of arrest reduced the telephone inquiries to its public informa-
records, including the names and dates of births of tion office. Additionally, this special Web page
individuals arrested in the last 30 days, along with the provides timely information to some smaller news
charges, bail amounts, and court dates. Additionally, agencies that may not have full-time reporters. At the
the LASD database includes information on the HCSO, most calls from the news media regard traffic
20,000 inmates in custody and the 2,400 inmates in conditions, particularly during the morning and
community-based programs.3 afternoon rush hours, which represent some of the
The HCSO warrants section currently has more busiest times in the communications section that
than 90,000 active warrants, which also are public handles those inquiries. To address this problem, the
information and accessible via the Web site. Previ- HCSO Web site has interfaced a traffic advisory Web
ously, the agency handled only wanted-person inquir- page with its computer-aided dispatch system. Tele-
ies from citizens, private investigators, or businesses vision and radio stations, citizens, and any other
conducting pre-employment screening in person at interested parties can visit that page to view real-time
the records section of the agency. These advances in dispatch information regarding vehicular accidents,
the HCSO site have proved useful to the agency by detours, and road obstructions. The display indicates
”
agencies will continue to find new an informative Web site, an agen-
ways to integrate their mission with cy, as well as the public it serves,
the Internet. For the last several can benefit by conserving time and
years, the Riverside County, California, Sheriff’s resources. More important, numerous categories of
Office has allowed citizens to file reports on-line. users would gain valuable, free information quickly
To file a report on-line with the Riverside County and with minimal cost to the community.
Sheriff’s Office, a complainant can access the River-
side Sheriff’s Office Web site, click on “Crime Endnotes
Report Form,” and complete the basic information on 1
See, http://www.nielsonnetratings.com; accessed January 23, 2001.
2
a user-friendly form. The complainant will receive an HTML is the computer language of the Internet-recognized Web
browsers.
acknowledgment within 3 days, via e-mail, and the 3
“Los Angeles Sheriff Puts Inmate Information On-line,” Government
assigned case number. The department has limited Technology vol. 13, no. 8 (June 2000): 11.
such on-line reporting to property crimes and miscel- 4
E. Tully, “ The Present and Future Use of the Internet by Law
laneous occurrences and does not allow a complainant Enforcement-Part One,” National Executive Institute Associates Research
Projects On-line, June 2000; www.neiassociates.org; accessed January
to file on-line if the crime involved known suspects, 22, 2001.
violence of any kind, or if it required officers to
collect physical evidence at the scene. Although this Sergeant Eisenberg serves with the Hillsborough County,
agency characterized the practice as a good learning Florida, Sheriff’s Office.
experience, they consistently have received only a Mr. Porter is a software specialist in the Data Operations
few on-line reports per month. Bureau of the Hillsborough County, Florida, Sheriff's Office.
August 2001 / 9
Making Computer
Crime Count
By MARC GOODMAN
August 2001 / 11
data not information based on me- information for communities in the officers and detectives use this data
dia sensationalism or a few notori- “real world,” the same is true in to prevent future crimes and to ap-
ous attacks. cyberspace. For individuals and or- prehend offenders. Therefore, to
Second, accurate statistics on ganizations to intelligently assess count computer crime, a general
computer crime are important for their level of risk, agencies must agreement on what constitutes a
public safety reasons. Computer provide accurate data about crimi- computer crime must exist.
crimes not only affect corporations nal threats. Access to reliable and In many police departments,
but hospitals, airports, and emer- timely computer crime statistics detectives often compile and report
gency dispatch systems as well. allows individuals to determine crime data. Thus, homicide detec-
Furthermore, surveys have indi- their own probability of victimiza- tives count the number of murders,
cated that many individuals fear tion and the threat level they face sexual assault investigators exam-
for their safety in the on-line and helps them begin to estimate ine the number of rapes, and auto
world and worry about criminal probable recovery costs.9 Law en- detectives count car thefts. Com-
victimization.8 forcement organizations tradition- puter crime, on the other hand,
Businesses and individuals rely ally have taken a leading role in comprises such an ill-defined list of
on law enforcement crime statistics providing crime data and crime pre- offenses that various units within a
when making important decisions vention education to the public, police department usually keep the
about their safety. Many citizens which now should be updated to related data separately, if they keep
contact a local police station prior include duties in cyberspace. them at all. For example, the child
to the purchase of a home in a Crime statistics facilitate abuse unit likely would maintain
particular neighborhood to inquire benchmarking and analysis of crime child pornography arrest data and
about the number of burglaries trends. Crime analysts use criminal identify the crime as the sexual ex-
and violent crimes in the area. Just statistics to spot emerging trends ploitation of a minor. A police
as these data provide important and unique modi operandi. Patrol department’s economic crimes unit
might recap an Internet fraud scam
as a simple fraud, and an agency’s
assault unit might count an on-line
stalking case as a criminal threat.
Attacks against DOD Computers (1992-1995) Because most police organizations
do not have a cohesive entity that
38,000 Attacks measures offenses where criminals
either criminally target a computer
13,300 Blocked (35%) or use one to perpetrate a crime,
accurate statistics remain difficult
Protection to obtain.
24,700 Succeeded (65%)
The Underreporting Problem
988 Detected (4%) 23,712 Undetected (96%) Generally, crime statistics can
provide approximations for crimi-
nal activity. Usually, people accu-
267 Reported (27%) 721 Not Reporter (73%) rately report serious crimes, such as
homicide, armed robbery, vehicle
theft, and major assaults. Many
Source: U.S. Department of Defense's Defense
other criminal offenses, however,
Information Systems Agency remain significantly underreported.
Police always have dealt with
some underreporting of crime. But,
“
Defense’s (DoD) Defense Informa- all statistics related to cybercrimes.
tion Systems Agency (DISA) has However, some less reputable com-
completed in-depth research on ...accurate puter security consulting compa-
computer crime. From 1992 to nies may overestimate computer
1995, DISA attacked their own
statistics on crime and security problems to
DoD computer systems using soft- computer crime scare business leaders who, they
ware available on the Internet. Sys- are important for hope, will turn to these organiza-
tem administrators did not detect public safety tions for consulting services and
the majority of attacks against DoD reasons. support.
computers. Of the 38,000 attacks An annual report compiled by
”
perpetrated, 96 percent of the the Computer Security Institute in
successful attacks went unde- San Francisco, California, and the
tected. Furthermore, of the detected FBI provides a variety of statistics
attacks, only 27 percent were In banking and financial sectors, on computer crime by surveying
reported. Thus, approximately 1 in reputation is everything. Informa- computer security practitioners in
140 attacks were both detected and tion that a criminal has infiltrated a both the private and public sec-
reported, representing only 0.7 per- bank’s computers and accounts po- tors.14 The anonymity offered to
cent of the total. If the detection and tentially could drive thousands of survey respondents may contribute
reporting of computer crime is less customers to its competitors. to the accuracy of their data. How-
than 1 percent in the nation’s mili- Businesses suffer a variety of ever, the report does not directly
tary systems, how often might these losses, both tangible and intangible poll law enforcement organizations
crimes go unreported when the in- when hackers attack them. They can about the number of computer
tended victim is an individual or a lose hundreds of millions of dollars crimes reported to police. Many ex-
small business owner? of value, brand equity, and corpo- perts believe that such a task should
Convincing victims who have rate reputation when a business be carried out by the government,
suffered a loss to report the crime to falls prey to a hacker.11 Most of the but to date, no single governmental
police constitutes another hurdle companies that suffer Web attacks body maintains responsibility for
August 2001 / 13
asking police forces about the impairment, or modification of These three types of crimes
prevalence of computer crimes re- computer information or equipment should form the basis for an interna-
ported and investigated. constitutes an attack against the in- tionally agreed-upon definition of
tegrity of that information. Many of computer crime. In reality, they al-
The Development of a Definition the malicious hacking activities, ready are becoming the definition
The development of a simple, such as computer viruses, worms, of computer crime because each
widely agreed-upon definition of and Trojan horses, fall within this state has some law that prohibits
computer crime among law en- category. The same is true for indi- these offenses. Furthermore, an
forcement may form the first step in viduals who purposefully change or analysis of penal legislation
counting computer crimes. This manipulate data either for profit or in nearly 50 nations suggests that
definition would help police to some other motivation, such as re- at least one-half of those countries
communicate more effectively venge, politics, terrorism, or merely surveyed—including most industri-
about these offenses and begin to for the challenge. alized nations—had laws in place or
accurately assess the prevalence of legislation pending that prohibited
criminal victimization. crimes affecting the confidentiality,
“
The earliest work in computer integrity, and availability of a com-
security provides a good foundation puter.16 A variety of international
upon which police can build such a ...computer crime organizations also support legisla-
definition. Traditionally, all com- has become tive efforts prohibiting pure-play
puter security efforts have sought to an increasing computer crimes. Groups, such as
protect the confidentiality, integ- problem. the United Nations, the G8, the
rity, and availability of information Council of Europe, the OECD, and
”
systems.15 Interpol, each have delineated con-
Confidentiality in computer fidentiality, integrity, and availabil-
systems prevents the disclosure of ity offenses as forming the mini-
information to unauthorized per- Availability of computer data mum basis of proscribed computer
sons. Individuals who trespass into indicates the accessibility of the criminal behavior. The Council of
another person’s computer system information and that its associated Europe, the 41-nation body of
or exceed their own authority in ac- programs remain functional when which the United States is an ob-
cessing certain information, violate needed by the intended user com- server, has been working on a draft
the legitimate owner’s right to keep munity. A variety of attacks, such treaty on cybercrime for several
private information secret. Crimes as the often-cited denial of ser- years. If adopted as currently
that violate the confidentiality of vice incidents, constitute a set of drafted, the treaty would ensure that
computer systems include “unau- criminal activities that interferes confidentiality, integrity, and avail-
thorized access crimes” as defined with the availability of computer ability offenses were outlawed in all
by Title 18, U.S.C. Section information. signatory nations to the treaty, an
1030(a)(2). Because breaking into a Together, computer crime inci- extremely significant step forward
computer begins with unauthorized dents that attack the confidentiality, in policing these crimes.17
access to an information system, integrity, or availability of digital
many believe this represents information or services constitute Computer-Mediated Offenses
the foundational computer crime an extremely precise and easily un- Defined broadly, the term com-
offense. derstood foundational definition of puter crime or even the more
Integrity of electronically computer crime. In effect, these of- common “computer-related crime”
stored information ensures that no fenses might represent “pure-play” has described a wide variety of
one has tampered with it or modi- computer crimes because they offenses. Traditional crimes, such
fied it without authorization. Thus, involve a computer system as the as fraud, counterfeiting, embezzle-
any nonsanctioned corruption, direct target of the attack. ment, telecommunications theft,
August 2001 / 15
offense?” Many agencies already sophisticated and well-developed police sensitivity about businesses’
include similar questions about the system to count computer crime, concerns, will help increase the
use of firearms or the occurrence of agencies still must overcome the number of these offenses brought to
hate crimes on their internal reports. public’s underreporting problem. the attention of the police.
In fact, hate crimes may provide a Underreporting these crimes results Most police agencies do not
useful lens through which to exam- from a failure on the part of the have the staff or funding to deal
ine computer-related crime. Hate victim to realize a crime has taken adequately with computer crime.
crimes often involve other crimes, place and an unwillingness to report Though the recent series of virus
such as assault, vandalism, and discovered incidents to police. and denial of service attacks have
even murder. But, knowing what To decrease the incidence of increased public awareness of the
percentage hate actually motivates computer crime, law enforce- problem, law enforcement organi-
vandalism becomes a useful tool for ment agencies must work with pri- zations must prepare for offenses by
police administrators attempting to vate organizations to ensure that developing a strategic and preventa-
understand and address community businesses become aware of poten- tive approach to deal with this
disorder problems. tial threats they face from computer problem.
Several efforts have begun to Law enforcement managers
promote law enforcement’s under- must ensure that they remain
“
standing of the prevalence and ef- capable of responding to the
fects of computer crime. The FBI changing faces of criminal activity
and the National White Collar Several efforts have in the 21st century. When compared
Crime Center recently took a big to murder, rape, or violent assaults,
step forward in counting computer-
begun to promote law computer crime may seem trivial.
related fraud. In 2000, these organi- enforcement’s But, a person who asks an executive
zations established the Internet understanding of the who loses his life savings due to the
Fraud Complaint Center (IFCC)22 prevalence and effects theft of intellectual property from
to create a national reporting of computer crime. his computer hard drive will get a
mechanism for tracking fraud on different answer. The teacher who
”
the Internet. The center will track receives daily calls from credit
statistics on the number and type of agencies because she was the victim
complaints and forward reported in- of on-line identity theft understands
cidents to the appropriate law en- crime. These partnerships could the importance of policing com-
forcement agency. While IFCC will include working with technical puter related crime as well. Simi-
prove helpful in tracking Internet experts from within and outside the larly, so does the AIDS researcher
fraud data, it does not deal directly government to develop solutions who has 5 years of work destroyed
with pure-play computer crimes that improve the prevention and de- by a computer virus. The mother of
that violate the confidentiality, in- tection of computer crimes. Of the 13-year-old girl who was lured
tegrity, and availability of data. course, even after detecting these across state lines by a pedophile
Therefore, federal, state, and local crimes, police still must convince will certainly demand a computer-
criminal justice agencies must take victims to report them. competent police force capable of
a more comprehensive approach. Police agencies must work with helping her. Each of these com-
the business community to gain puter or computer-related crimes
Conclusion trust. Many community and prob- and their victims are real. Law en-
To combat computer crime, law lem-oriented policing techniques forcement agencies have a responsi-
enforcement must build an internal can help law enforcement as they bility to protect and serve the pub-
capacity to define, track, and ana- deal increasingly with computer lic, regardless of advances in
lyze these criminal offenses. Even crime investigations. Government technology—a role that cannot be
if law enforcement has a highly and industry partnerships, and abdicated.
Clarification
August 2001 / 17
Addressing School Violence
Prevention, Planning, and Practice
By FRANCIS Q. HOANG, M.C.J.
W
ith these words, for-
“It is imperative that, community mer FBI director Louis school violence when it does occur?
by community, we find the ways Freeh captured the es- Should law enforcement include
to protect our children and exercises and training as a part of
sence of the challenge that commu-
secure for them the safe places
they need to learn the hard
nities face in addressing school vio- these preparations?
business of growing up, to learn lence. Recent high profile school
shootings have led to an atmo- DEFINING SCHOOL
right from wrong, to learn to be
good citizens.” 1 sphere of fear and apprehension VIOLENCE
among many communities about To address school violence,
the safety of their schools. While communities first must understand
statistics show that schools, in gen- what it is and who is involved.2 The
eral, remain safer than their sur- definition of school violence, an
rounding neighborhoods, every unacceptable social behavior rang-
community must take steps to ad- ing from aggression to violence that
dress school violence. In doing so, threatens or harms others, goes be-
many questions may arise. Where yond highly publicized incidents of
does a community begin the pro- mass bloodshed to include acts,
cess of addressing school vio- such as bullying, threats, and extor-
lence? How can schools prevent or tion. Therefore, school violence
reduce school violence? How can spans a broad range of antisocial
”
can be divided into two broader cat-
egories—sociopaths (e.g., bullies
who instigate fights and manipulate
Mr. Hoang, former deputy chief of police for the Fort Leavenworth,
others) and psychopaths (e.g., so- Kansas, Police Department currently serves as an advisor
cially inept loners who have the po- to the Rockland County, New York, Police Academy.
tential for great violence).3 The sec-
ond group involves visiting
“outsiders,” such as students from violence prevention programs and results) for their school violence
other schools or former students. offer various steps communities can prevention efforts.
Communities must prepare for take to help prevent violence in Last, communities should iden-
potential school violence from ei- their schools.4 First, communities tify appropriate research-based pro-
ther of these groups. No standard should establish partnerships be- grams and strategies. The key to
profile of a school violent offender tween schools and other public preventing and reducing school vio-
currently exists. At best, certain agencies. Because school violence lence combines long-term strategies
warning signs may indicate poten- remains a community problem, it with short-term interventions.
tial violence and specific factors requires collaboration from all resi- Community leaders and school ad-
may denote a greater likelihood of dents, agencies, and businesses. ministrators should research and
an individual carrying out violence. Schools, police, business leaders, examine various school violence
and elected officials all must coop- prevention options and select tech-
ADDRESSING SCHOOL erate to address school violence. niques most appropriate for their
VIOLENCE Next, communities should schools. Such options fall into three
Primarily, communities can ad- identify and measure the problem. broad categories.5
dress school violence through three School officials, working with law The first category involves en-
simple steps—prevention, plan- enforcement and other community vironmental modifications and sug-
ning, and practice. Prevention re- agencies, should collect informa- gests that police, trained in crime
fers to taking actions to reduce or tion that shows the size and scope prevention through environmental
prevent school violence from occur- of violence in their schools. This design, or school security manag-
ring, planning determines what ac- important step ensures that pre- ers, who have attended specialized
tions to take if school violence does vention efforts revolve around the courses in physical security, audit
occur, and practice entails rehears- community’s specific problems. or survey each school. These
ing plans and modifying them when Communities also should set personnel should examine a
needed. goals and measurable objectives. school’s physical environment and
School officials, collaborating with recommend modifications to pre-
Prevention parents and students, should set vent or reduce violence.
Various publications provide a goals (with broad results) and spe- The second category includes
comprehensive overview of school cific objectives (with measurable options for preventing and
August 2001 / 19
controlling violence based on instituting community-oriented safety efforts. These programs help
school management. For example, policing crime prevention efforts. prevent school violence by educat-
this may entail establishing behav- After reviewing the various op- ing parents, teachers, and students
ior and discipline codes, the use of tions, administrators should work about the signs of potential violence
criminal penalties against selected with the entire community to care- and, ultimately, allow the troubled
students, or the placement of prob- fully implement the selected pre- student to receive help before vio-
lem students into alternative educa- vention measures. Some preventive lence occurs.6
tional institutions. techniques may require additional Another critical element of a
The final category, education resources, outside approval, or school safety program involves a
and curriculum-based prevention long-term planning to prove threat management plan. While
techniques, could include teaching successful. not every school may have to deal
conflict resolution courses, estab- Every community should in- with a violent shooter, nearly
lishing mentoring programs, devel- clude an early identification and every school experiences violent
oping self-esteem initiatives, or intervention program in their school threats. Communities and school
“
plan in place, communities still communication procedures for a
must prepare for school violence in- multiagency response, as well as
cidents. Planning how to respond in general areas of responsibility for
the event of school violence re- Communities each agency.
quires a communitywide effort and must prepare for Because school violence inci-
includes numerous tasks. potential school dents generate media interest, agen-
Law enforcement should con- violence.... cies must develop a plan for han-
duct a tactical survey of schools.8 dling the media prior to an incident.
”
While the security audit serves to Police and schools should prepare
reduce or prevent school violence, to assist the media by providing
the tactical survey gathers informa- timely briefings, designating a me-
tion for use in planning a response. Developing first responder and dia representative for updates, and
The survey forms the foundation for immediate action drills also will establishing areas safe for filming,
all other planning efforts and should prove beneficial. Past incidents interviews, and other media
be accomplished before planning have shown the need for rapid, co- activities.
begins. Law enforcement, working ordinated response by the first of- School officials should develop
with school administrators, should ficers arriving at a school violence lock-down procedures to secure stu-
prepare and distribute tactical sur- incident. Patrol officers should es- dents and faculty in a school vio-
veys that include elements, such as tablish a perimeter, gather informa- lence situation. They also should
local maps, aerial photographs, tion, resolve disputes, and, depend- have procedures for evacuating stu-
property diagrams and floor plans, ing on the situation, locate and dents and faculty to safe areas, es-
and interior and exterior photo- neutralize shooters. Local police tablishing accountability, conduct-
graphs of the school. agencies should establish and ing immediate counseling or
School administrators should rehearse a mutual aid plan to ensure debriefings (if required), and coor-
develop emergency response plans. the use of the same response dinating the pickup of students by
Because faculty are often the first procedures. parents. Schools should work with
to respond to calls of school vio- Many school violence incidents police in developing these plans be-
lence, their initial actions can have do not require a tactical presence or cause tactical and investigative con-
tremendous impact on how safely may end before police tactical siderations may impact the evacua-
and quickly a situation is resolved. teams can deploy. However, tacti- tion or release of students.
Each school should have proce- cal teams still should develop pro- In a worst-case scenario, school
dures in place to handle different cedures for operating in a school violence can result in bloodshed—a
August 2001 / 21
Keys To Successful Exercises FACING CHALLENGES
• Identify clear training objectives In addressing school violence,
• Conduct coordination before the exercises communities face several key chal-
lenges. They must learn how to bal-
• Hold exercises after developing plans and completing training ance the need for a secure environ-
• Start with simple tasks and work progressively toward more ment with that of a learning
difficult ones environment. While many parents
• Conduct after-action reviews and schools welcome the increased
emphasis on security, others worry
• Link future training to results from past exercises that schools have become fortresses
that hamper learning. Communities
must examine their approach care-
fully and strike the right balance for
their students.
reality that officials must prepare to than justify the cost. Communities Communities must decide how
handle. School, police, and emer- that make planning a priority will to balance student and parental
gency response personnel should become prepared not only for rights with a community’s compel-
work together to develop a plan to school violence but also for lesser ling interest in safety. Many of the
triage, treat, and evacuate those in- situations that may require a coordi- techniques proposed to prevent
jured in a school violence situation. nated response. school violence may infringe upon
Even after the successful reso- student or parental rights. At the
lution of a school violence incident, Practice same time, administrators have a re-
much work remains. Communities The best-developed plans be- sponsibility to maintain safe
should develop a plan to provide come useless if they are never re- schools and must balance these
counseling and assistance to stu- hearsed or if no one knows they competing interests when develop-
dents, faculty, and emergency per- exist. Practice validates plans and ing a school safety plan.
sonnel. Police need to develop an identifies needed changes. It famil- Additionally, communities
investigative plan, establish evi- iarizes personnel with plans and must consider how to weigh the
dence recovery methods, and deter- partners, increases the confidence needs of many students against the
mine when they will return control of personnel involved, and gives the needs of a few students. Many
of the building to school officials. community a sense of security. teachers and parents applaud recent
School administrators should pre- Additionally, conducting drills can efforts at getting help for at-risk
pare to find an alternate location to help identify areas for future youth before violence erupts, yet
hold classes while police conduct training. Practice remains a critical some individuals criticize these ef-
their investigation. step in preparing for school vio- forts as putting the needs of a few
Due to the size and complexity lence and should include rehears- students ahead of the needs of the
of a school violence response, the ing school emergency response majority of the students. Communi-
various agencies involved should plans, first-responder action drills, ties must decide how far they
develop and sign mutual aid and tactical team actions, post-incident should go to address some students’
notification agreements. These command exercises, media plans, special needs and consider the
agreements should specify roles mass casualty plans, multiagency impact on other students.
and responsibilities for each exercises, and field exercises. Be-
agency. cause no substitute for practice CONCLUSION
School violence planning re- exists, this step remains critical Because every community is
quires a large investment of time, in addressing school violence and unique, individual approaches to
personnel, and resources. How- requires a strong commitment by addressing school violence should
ever, the possible benefits more communities. be slightly different. Communities
The Bulletin’s
E-mail Address
August 2001 / 23
Book Review
Miranda
Revisited
Dickerson v.
United States
By THOMAS D. PETROWSKI, J.D.
August 2001 / 25
“ The Dickerson
decision did
not alter the
not prefaced by complete Miranda
warnings also may result in sup-
pression. For a statement to be ad-
missible under Miranda, it has to be
both voluntary and prefaced by
complete Miranda warnings, which
requirements are intelligently, knowingly, and
Miranda placed on voluntarily waived. The Court also
law enforcement. has held that once individuals in-
voke their right to counsel, officers
immediately must cease interroga-
“
Miranda decision in confession after Dickerson was warned and
cases. waived his Miranda rights. The dis-
Departments must trict court judge suppressed his
THE DICKERSON CASE confession. The suppression of the
ensure that their
confession was appealed to the
The Facts officers do not U.S. Court of Appeals for the
On January 24, 1997, an indi- interrogate ‘outside Fourth Circuit.
vidual robbed the First Virginia Miranda,’ and The Fourth Circuit decided
Bank in Old Town, Alexandria, immediately abandon there was sufficient evidence in the
Virginia, of approximately $876. any condoned practice record to support the district court’s
An eyewitness saw the robber exit or policy of intentional finding that Dickerson had not been
the bank, run down the street, and given his Miranda rights prior to
get into a vehicle. Subsequent in-
violations of Miranda. confessing.22 However, the Fourth
”
vestigation into the bank robbery Circuit reversed the lower court’s
revealed that the getaway car was decision to suppress the confession,
registered to Charles T. Dickerson finding the lower court used the
of Takoma Park, Maryland. On Dickerson, the interviewing agents wrong standard to judge the
January 27, 1997, FBI agents and an made application for, and received, confession’s admissibility. The
Alexandria police detective trav- a telephonic search warrant for Fourth Circuit decided that by pass-
eled to Dickerson’s residence. The Dickerson’s apartment. The search ing § 3501, Congress had lawfully
agents knocked on Dickerson’s warrant was executed while the in- changed the test for the admission
door and identified themselves. terview continued. The agents con- of confessions in federal court from
After a short conversation, an ducting the search found substantial the stricter Miranda rule to the less
FBI agent asked Dickerson if he evidence implicating Dickerson in stringent totality-of-the-circum-
would accompany them to the several bank robberies. He was ar- stances test. Using that less strin-
FBI field office in Washington, rested and indicted on one count of gent standard, the Fourth Circuit
D.C. Dickerson agreed. While in conspiracy to commit bank robbery found that the government’s failure
Dickerson’s apartment, the agents in violation of 18 U.S.C. § 371, to give Miranda warnings was
saw evidence of the bank robbery in on three counts of bank robbery only one factor to be considered
plain view. in violation of 18 U.S.C. § 2113(a) when judging voluntariness of the
August 2001 / 27
confession. Because the lower court and a disappointment to many.28 Section 1983 requires inten-
already had found Dickerson’s con- The decision clearly elevates the tional conduct or gross negligence
fession to be voluntary, the Fourth warning requirements of Miranda by the government employee. Mere
Circuit reversed. The U.S. Supreme to Constitutional proportions; the negligence is not actionable under
Court agreed to finally decide the single most significant practical im- §1983.33 For example, if an interro-
issue. pact of which is potential civil li- gator were to negligently give de-
ability of individual law enforce- fective warnings, this would not
The Decision ment officers and their departments result in §1983 liability.
The U.S. Supreme Court issued resulting from intentional viola- In addition to the individual of-
its opinion on Dickerson on June tions of the warning requirements ficer being exposed to §1983 liabil-
26, 2000. In a 7-2 decision, the court mandated in Miranda. ity, the agency or department also
held that Miranda is a Constitu- can be sued for Constitutional vio-
tional decision and, therefore, could lations arising from official policy
“
not be overruled by an Act of Con- or other customs or practices of the
gress.23 The Court not only affirmed entity.34 Inadequate training also
Miranda but also declared it a Con- ...the Court held may be the basis for liability if the
stitutional rule.24 Aside from elabo- that Miranda is failure to train amounts to a deliber-
rating in great detail as to why its a Constitutional ate indifference to rights of per-
finding that Miranda is Constitu- decision and, sons with whom police come in
tionally required was consistent therefore, could not contact.35
with its original decision and its Prior to the Supreme Court’s
progeny, the Court gave two other
be overruled by an decision in Dickerson, the clear ma-
noteworthy justifications. The Act of Congress. jority view among the federal cir-
”
Court found that “Miranda has be- cuits was that no cause of action for
come embedded in routine police money damages existed under
practice to the point where the §1983 where police officers alleg-
warnings have become part of our Title 42 U.S.C. § 198329 (here- edly violated Miranda principles by
national culture.”25 The Court also after §1983) provides a federal rem- either failing to give Miranda warn-
said “...experience suggests that the edy for deprivations of federal Con- ings or by continuing to question a
totality-of-the-circumstances test stitutional rights by authorizing defendant in custody after his re-
which § 3501 seeks to revive is suits against public officials and quest for an attorney.36 The ratio-
more difficult than Miranda for government entities.30 To recover nale prior to Dickerson was that the
law enforcement officers to con- under § 1983, a civil rights plaintiff U.S. Constitution did not guarantee
form to, and for courts to apply must prove two elements: 1) inten- the right to Miranda warnings.
in a consistent manner.”26 Thus, tional deprivation of a federally Dickerson only can be read to have
32 years after enactment, § 3501 protected right “secured by the changed this and to have created
has been ruled unconstitutional, and Constitution and the laws of the the requisite Constitutional right
the precustodial interrogation United States,” and 2) state action that satisfies the previously void
requirements of Miranda have under color of law.31 Section 1983 §1983 element. While the Court in
been given “a permanent place in was applied to federal law enforce- Dickerson did not expressly address
our jurisprudence.”27 ment agencies in Bivens v. Six Un- the issue of civil liability and may at
known Federal Narcotics Agents.32 some future time limit §1983 liabil-
PRACTICAL A host of individual state causes of ity exposure in the Miranda con-
IMPLICATIONS: action mirror §1983 suits that can text, the only prudent course for law
CIVIL LIABILITY result in liability to the department enforcement officers today is to
The Supreme Court’s decision and personal liability to the indi- proceed assuming that this §1983
in Dickerson was both a surprise vidual officer. cause of action is now viable.
August 2001 / 29
Repeated warnings usually prosecution must be able to estab- Constitutional violation. Aside
happen when an officer contacts a lish that the Miranda requirements from exposing officers and depart-
suspect who recently has been prop- were met. Law enforcement manag- ments to civil liability, this may ex-
erly warned, but gives the warnings ers should reevaluate their policies acerbate the problem of unnecessar-
again to ensure compliance with regarding the use of written waiver ily providing Miranda warnings.
Miranda. While no Supreme Court forms and the number of officers Law enforcement managers
decision addresses how “fresh” a present during a rights warning and should reevaluate their existing
warning has to be, the common ap- waiver. They should consider vid- training and policies that address
proach is to re-advise only after an eotaping at least the rights warning the practices of their personnel con-
extended break in interrogation has and waiver, if not the entire inter- ducting interviews and interroga-
occurred. Unnecessary warnings view. The facts in Dickerson dem- tions. Now, more important than
occur when law enforcement offic- onstrate how a lawful and docu- ever, intentional violations of
ers fail to realize that the suspect is mented advice of rights and waiver Miranda must cease.
not in custody and/or not being in- still can result in a confession being
terrogated.45 Either of these sce- suppressed. Endnotes
narios is most likely to happen 1
Jacob W. Landyski, Search and Seizure
when the investigation involves a
“
and the Supreme Court: A Study in Constitu-
serious crime or is for some other tional Interpretation (Baltimore, MD: The
reason a high profile matter.46 Johns Hopkins Press, 1966), 42, commenting
Both “over-Mirandizing” sce- ...the Court not only on the Fourth Amendment.
2
Miranda v. Arizona, 384 U.S. 436 (1966).
narios were a problem prior to affirmed Miranda but 3
Dickerson v. United States, 530 U.S. 428
Dickerson.47 Now, in addition to also declared it a (2000).
apprehension about statements be- Constitutional rule. 4
Id. Also see generally United States v.
Dickerson, 166 F.3rd 667 (4th Cir. 1999).
ing suppressed, law enforcement
”
5
The King v. Rudd, 168 Eng. Rep. 160
officers will be further burdened (K.B.1783) (holding that “no credit ought to be
by the possibility of civil liability. given” to “a confession forced from the mind
The inevitable result will be an by the flattery of hope, or by the torture of
even greater tendency to “over- CONCLUSION fear”) and references thereto by the U.S. Court
The Dickerson decision el- of Appeals, Fourth Circuit in United States v.
Mirandize.” The answer for law Dickerson, 166 F.3rd 667 (4th Cir. 1999).
enforcement is more training. evated the warning requirements of 6
Regina v. Garner, 169 Eng. Rep. 267
Miranda to Constitutional propor- (Ct.Crim.App.1848); Regina v. Baldry, 169
The Need for Training tions. The decision has no practical Eng. Rep. 568 (Ct.Crim.App.1852) and
and Sound Policies impact on the requirements placed references thereto in United States v.
Dickerson, 166 F.3rd 667 (4th Cir. 1999).
A thorough understanding of all on law enforcement departments 7
110 U.S. 574 (1884).
aspects of Miranda by all members and agencies in complying with 8
Id. at 577 (citing Baldry, 169 Eng. Rep.
of a department is a substantial Miranda. The timing of the warn- 568 (Ct.Crim.App.1852)); see also Pierce v.
ings (i.e., before any interrogation United States, 160 U.S. 355, 357 (1896).
training task. That said, the only 9
168 U.S. 532 (1897).
way to minimize lost evidence and occurs of a subject who is in cus- 10
Id. at 542 (stating that whether a
potential civil liability caused by a tody) and the substance of the warn- confession is voluntary “is controlled by that
lack of understanding of Miranda is ings have remained unchanged. portion of the Fifth Amendment...commanding
The critical impact of the that no person ‘shall be compelled in any
training supported by solid depart-
criminal case to be a witness against himself’”
ment policies. Dickerson decision is that inten- (quoting the Fifth Amendment to the U.S.
Another aspect of interrogation tional violations of the require- Constitution)).
largely controlled by policy is the ments of Miranda, commonly 11
297 U.S. 278 (1936).
12
known as questioning “outside The Supreme Court first defined
documentation used to record
“compulsion” in Bram, stating that a confession
Miranda warnings and waivers. As Miranda,” now may provide the “must not be extracted by any sort of threat or
demonstrated in Dickerson, the basis for a lawsuit alleging a federal violence, nor obtained by any direct or implied
August 2001 / 31
26
Dickerson, 530 U.S. 444. statutory or constitutional rights of which a and, thus, the witness’ trial testimony would not
27
Id., (dissent of Justice Scalia). While 32 reasonable person would have known.” Harlow be viewed as “fruit-of-the-poisonous-tree.”
years seems a long time for an Act of Congress v. Fitzgerald, 457 U.S. 800, 818 (1982). See Michigan v. Tucker, 417 U.S. 433 (1974).
45
to be held unconstitutional, it is not the record. also Anderson v. Creighton, 483 U.S. 635, 640 A suspect must reasonably believe (from
Apparently, the longest such delay is the 122 (1987), in which the Court defined what the perspective of an objectively reasonable
years it took the Supreme Court to declare18 constitutes a clearly established right: innocent person) that he or she is in custody,
U.S.C. 474 (enacted in 1862) unconstitutional The contours of the right must be suffi- regardless of the intention of the interrogating
in Regan v. Time, Inc., 468 U.S. 641 (1984). ciently clear that a reasonable official would law enforcement officer. See Stansbury v.
28
To appreciate how controversial the understand that what he is doing violates that California, 114 S. Ct. 205 (1988). Also, there
Miranda through Dickerson line of cases are, right. This is not to say that an official action is must be interrogation. That is, questioning or its
one need look no further then the dissenting protected by qualified immunity unless the very “functional equivalent,” which is reasonably
opinion of Justice Scalia, with whom Justice action in question has previously been held likely to illicit incriminating information. See
Thomas joins, in Dickerson, 530 U.S. 444 unlawful,...but it is to say that in the light of Brewer v. Williams, 430 U.S. 387 (1977) and
29
Title 42 U.S.C. §1983 provides in pre-existing law the unlawfulness must be Rhode Island v. Innis, 446 U.S. 291 (1980). For
pertinent part: “Every person who, under color apparent. Miranda warnings to be legally required, both
of any statute, ordinance, regulation, custom, or custody and interrogation must be present. If
usage, of any State...subjects, or causes to be a suspect is in custody, warnings need not be
“
subjected, any citizen of the United States...to given until interrogation begins. Likewise, if
the deprivation of any rights, privileges, or a suspect is not in custody and is being
immunities secured by the Constitution and questioned by the police, warnings need not
laws, shall be liable to the party injured in an
...questioning ‘outside be given.
action at law, suit in equity, or other proper Miranda,’ now may 46
See Colorado v. Connelly, 107 S. Ct.
proceeding for redress.”
30
See Monroe v. Pape, 365 U.S. 167
provide the basis for 515 (1987) for an excellent example of this.
Connelly, who had brutally murdered a young
(1961). a lawsuit alleging a girl, walked up to a police officer on a street
31
Lugar v. Edmondson Oil Co., 457 U.S.
922, 930 (1982) (quoting Flagg Brothers v.
federal Constitutional corner in Denver and began explaining to the
officer what he had done. Connelly was clearly
Brooks, 436 U.S. 149, 155-56 (1978)). violation. neither in custody nor was the police officer
”
32
102 S.Ct. 2727 (1982). interrogating him. But as soon as the officer
33
Daniels v. Williams, 106 S. Ct. 662 understood this involved a possible murder he
(1986). See also Sacramento v. Lewis, 118 abruptly interrupted Connelly and gave
S.Ct.1708 (1998). Miranda warnings and continued to interrupt
34
Monell v. Department of Social Services 38
See Reser v. Las Vegas Metropolitan Connelly’s attempts at unburdening his
of the City of New York, 436 U.S. 658 (1978). Police Department, 242 F.3rd 383, 2000 WL conscience to ascertain if Connelly was insane
35
City of Canton, Ohio v. Harris, 489 U.S. 1585648 (9th Cir.(Nev.)) (October 20, 2000) or under the influence of something. The officer
378 (1989). where the court affirmed entitlement of was unwary as to the requirements of Miranda
36
Examples of federal circuit courts qualified immunity in a §1983 lawsuit to a and attempted to compensate by grossly
expressly finding no such (preDickerson) §1983 detective for actions occurring during an exceeding the requirements. See also Judge
liability include: Giuffre v. Bissell, 31 F.3d interrogation that occurred prior to the Harold J. Rothwax, Guilty - The Collapse of the
1241, 1256 (3d Cir.1994), Bennett v. Passic, Dickerson decision. The court explicitly said Criminal Justice System, (New York, NY:
545 F.2d 1260, 1263 (10th Cir.1976), Warren that because the interrogation occurred before Warner Books, 1997), 66-69, for poignant
v. City of Lincoln, Neb., 864 F.2d 1436, 1442 the Dickerson decision, the Constitutionality of commentary on this case.
47
(8th Cir.1989), and Thornton v. Buchmann, 392 Miranda warnings had not been clearly The Court in Dickerson, as noted above,
F.2d 870, 874 (7th Cir.1968). The only federal established at the time of the interrogation. opined that Miranda is easier for law enforce-
circuit that allowed such §1983 actions was the 39
42 U.S.C. §1983, at subsection LVII. ment officers to conform to, and for courts to
Ninth Circuit. See Cooper v. Dupnik, 963 F.2d 40
42 U.S.C. §1988(b). apply in a consistent manner, than the totality-
1220 (9th Cir.1992), and California Attorneys 41
Sun Tzu, The Art of War (Boston, MA: of-the-circumstances test. They make no
for Criminal Justice v. Butts, 195 F.3d 1039 Shambhala, 1991). This is a translation of an mention of countless incriminating statements
(9th Cir. 1999) (holding that not only was the ancient Chinese work of unknown original date. that were never made because of unnecessary or
§1983 action appropriate, but the police officers 42
Incriminating statements made involun- excessive Miranda warnings and the impact
involved were not entitled to qualified tarily under the Due Process Clause may never this has had on the legitimate interests of
immunity when they continued to question the be used for any purpose. Arizona v. criminal justice.
suspects/plaintiffs after they invoked their Fulminante, 499 U.S. 279 (1991).
Miranda rights). 43
Harris v. New York, 401 U.S. 222 (1971). Law enforcement officers of other than
37
The standard for qualified immunity is Ironically, Dickerson’s suppressed confession federal jurisdiction who are interested in
this article should consult their legal
“[G]overnment officials performing eventually was used against him at trial to advisors. Some police procedures ruled
discretionary functions, generally are shielded impeach his in-court testimony. permissible under federal constitutional law
from liability for civil damages insofar as their 44
While the defendant’s statement would be are of questionable legality under state law
conduct does not violate clearly established excluded from trial, the discovery of the witness or are not permitted at all.
Official Business
Penalty for Private Use $300
Subscribe Now