Sie sind auf Seite 1von 35

March 2004

Volume 73
Number 3
United States
Department of Justice
Federal Bureau of Investigation
Washington, DC 20535-0001

Robert S. Mueller III


Director

Contributors’ opinions and statements Features


should not be considered an
endorsement by the FBI for any policy,
program, or service.

The attorney general has determined Geologic Material as Geologic materials often can provide
that the publication of this periodical is
necessary in the transaction of the
public business required by law. Use
Physical Evidence 1 scientific support as physical evidence
in criminal and civil cases.
By Joseph A. Finley, Jr.
of funds for printing this periodical has
been approved by the director of the
Office of Management and Budget. Law enforcement officers can better
Sudden, Unexplained Infant
The FBI Law Enforcement Bulletin
(ISSN-0014-5688) is published
Death Investigations 10 handle SUID cases after gaining an
understanding of their role in these
monthly by the Federal Bureau of By Ernst H. Weyand investigations.
Investigation, 935 Pennsylvania
Avenue, N.W., Washington, D.C.
20535-0001. Periodicals postage paid Community Policing Understanding the concept of
at Washington, D.C., and additional
mailing offices. Postmaster: Send
address changes to Editor, FBI Law
By David M. Allender 18 community policing can help law
enforcement agencies design and
Enforcement Bulletin, FBI Academy, implement successful programs.
Madison Building, Room 209,
Quantico, VA 22135.
Computer Forensics An understanding of computer-related
Editor By Loren D. Mercer 28 evidence proves necessary for law
enforcement agencies and the courts.
John E. Ott
Associate Editors
Cynthia L. Lewis
David W. MacWha
Bunny S. Morris Departments
Art Director
Denise Bennett Smith
Assistant Art Director 6 Book Review 16 Bulletin Reports
Stephanie L. Lowe
Law Enforcement Corrections
Staff Assistant
Linda W. Szumilo Funeral Manual Juvenile Justice
Training
This publication is produced by 8 Focus on Identity Theft Web-Based Resources
members of the Law Enforcement
Communication Unit, Training Identity Theft Within Federal
and Development Division. Student Aid Programs 23 Perspective
Management Defined
Internet Address
9 Unusual Weapon Alert
leb@fbiacademy.edu
Bullet Cartridge Knives
Cover Photo
© Digital Stock

Send article submissions to Editor,


FBI Law Enforcement Bulletin, FBI
Academy, Madison Building, Room
209, Quantico, VA 22135.

ISSN 0014-5688 USPS 383-310


Geologic Material as
Physical Evidence
By JOSEPH A. FINLEY, Jr., Ph.D.

© PhotoDisc

T
he field of geology and its in forensic science. Geologic
Whenever two objects come relationship to forensic material, as with all physical
into contact, there always is a science has remained evidence, contributes scientific
transfer of material. The shrouded in mystery for many support that can assist in es-
methods of detection may not
be sensitive enough to demon-
years. Although the interaction tablishing the guilt or innocence
strate this, or the decay rate of humans with the environment of an individual. In general,
may be so rapid that all evi- long has been the object of much the usefulness of geologic mate-
dence of transfer has vanished interest to physical scientists, rial as physical evidence de-
after a given time. Nonetheless, published literature on this topic pends on the number of signifi-
the transfer has taken place.1
is relatively limited. cant variations in the material
Geologic material, com- and the ability to compare and
monly used as physical evi- contrast these variations. The
dence in both criminal and civil inorganic nature of geologic
cases, can play an important role material can make qualitative

March 2004 / 1
identification relatively straight- standard practices for the FBI minerals are produced elsewhere
forward. Combined with the sci- Laboratory in soil cases.3 and transported to the location
entific objectivity of the analysis where they are found. Fragments
and testimony of the expert wit- Formation of rocks and minerals created by
ness, geologic material has a Soil material generally is the weathering of a rock outcrop
great advantage as physical evi- formed by nature in one of two may be carried away by rivers
dence. To this effect, investi- ways, residual or transported. and deposited as sandbars,
gators must ensure that they This loose material (soil) is com- gravel, or fine mud. Wind can
use proper collection and pres- posed of fragments of minerals move vast quantities of frag-
ervation techniques for process- and rocks generated from the ments great distances, depositing
ing and analyzing various breaking up or dissolving of the them as dunes and dust layers.
materials. earth’s solid rocks. Residual soil Wave and current actions break
material forms in places where down rock and mineral forma-
SOIL solid rock is exposed in outcrops tions along shores of seas and
Today, most major crime at the earth’s surface. This solid lakes, transporting this material
laboratories throughout the rock endures the natural weath- and depositing it as beaches or
world, both public and private, ering processes, which, over undersea sediment. The force of
study soils. The FBI was one of time, break up and dissolve the gravity may cause landslides and
the first forensic laboratories in rock. This procedure turns the move tons of material down a
the United States to extensively outcrop into a mass of fragments slope, thereby producing a mass
use soil and mineral analysis and removes some of the mate- of newly transported soil on the
in criminal cases. 2 As early rial in solution (dissolving of the land below.
as 1935, the FBI Laboratory minerals normally occurs in rain
worked with soils; by early 1939, or groundwater). Composition
heavy mineral separations and Transported soil mate- Characteristically, soil is a
mineral identifications were rials occur where fragments of very complex system composed
of certain quantities of solid, liq-
uid, and gaseous materials. The
unconsolidated mineral matter
on the earth’s surface has been

“ ...investigators must
ensure that they use
proper collection and
subjected to and influenced by
genetic and environmental fac-
tors, such as parent materials,
climate (including moisture and
temperature effects), macro- and
preservation techniques
microorganisms, and topogra-
for processing and phy. Over a period of time, these
analyzing various factors produce a product (soil)
materials. that differs from the material


from which it derived in many
physical, chemical, biological,
Special Agent Finley, formerly an expert witness in the Mineralogy Unit, and morphological properties
FBI Laboratory Division, now serves in the FBI’s Miami, Florida, office.
and characteristics.4

2 / FBI Law Enforcement Bulletin


The important distinction light spectrum occur. With most constituent material that relates
in a forensic definition of soil geologic materials and soils, the directly to the ability to compare
appears in the sampling of earth native minerals contribute di- it by using a microscope. The
material, either accidentally or rectly to the soil color, as well as importance of mineral composi-
deliberately. For forensic pur- organic matter present. tion is apparent in soil because
poses, the definition of soil is Soil structure, an arrange- minerals can comprise approxi-
earth material collected acciden- ment of the soil particles, can be mately 45 percent of an entire
tally or deliberately and associ- recorded descriptively. Some sample.7 Geologists use various
ated with a matter under investi- soils, particularly loose sands, methods to positively identify
gation. In general, the usefulness consist of a structureless mass, the sample. The soil examination
of most types of physical evi- whereas most soils tend to clus- associates or disassociates a
dence, recognizing that probabil- ter together to form compound “known” sample from a “ques-
ity and chance are most impor- structures. Particle sizes of soil tioned” sample. Some tech-
tant, depends on the number of niques used to make this com-
significant variations easily ob- parison may destroy the sample;


served and measured in the ma- therefore, appropriate personnel
terial; specifically, how many should use them accordingly.
different kinds of classes can ex- Evidence value rests Because forensic geologists
ist and how widespread each upon the fact that soil must be aware of the context
class is. The value of soils, rock, varies from point to and source of the samples exam-
minerals, and fossils lies in the point on the surface, ined, investigators should ensure
fact that many variations and as well as below the that they remove earth material
possibilities exist. Any process from clothing, vehicles, or other
that aids in generating a uniquely
earth’s surface. sources with extreme care, en-


identifiable material determines suring preservation of the
the value and type of examina- original sample. Specifically, in-
tions that will prove most useful. vestigators should pay close at-
These processes constitute the minerals are classified as sand, tention to layering and lumps of
keys to a meaningful soil com- silt, and clay (based on a physical materials.8
parison from which the foren- measurement). A wide range of Evidence value rests upon
sic scientist can draw valid textural (particle) size exists in the fact that soil varies from
conclusions. soil, depending upon the rocks point to point on the surface, as
Soils pass through a cycle of from which it derived and the well as below the earth’s surface.
development involving youth, processes by which the soil has For depth of the sample, investi-
maturity, and old age.5 Based accumulated.6 Soils are coarse- gators should note the approxi-
upon this readily accepted con- or fine-grained. mate depth of their own foot-
cept of soil alteration, the com- Soil structure constitutes one prints in the soil at the scene.
parison of soil by color, texture, of the most important soil prop- Investigators should take numer-
and mineral composition is justi- erties, but forensic scientists ous samples at the immediate
fied. Color is one of the most must approach it carefully due to scene radiating outward from the
important identifying character- the inherently smaller sample center and also an “alibi” sample
istics of minerals—virtually all sizes. In most soil samples, away from the immediate scene.
possible colors of the visible mineral composition is the This type of sampling will allow

March 2004 / 3
Examining Geologic Evidence
The stereobinocular microscope helps identify the various minerals and mineral sites
present in a sample. The widefield, low-power stereobinocular microscope gives an erect,
three-dimensional image that makes it ideal for manipulating a sample. Minerals also have
different densities, an identifiable property. Normally, these differences are divided into two
groups of “heavy minerals” and “light minerals” with the boundary drawn at approximately
2.9 grams/cc.
Additionally, forensic geologists use a polarizing or petrographic microscope to posi-
tively identify the sample. This differs from the stereobinocular microscope in that it has
filters for polarizing the light and rotating the state and attachments for viewing the charac-
teristic effects on light that has passed through minerals. Minerals, especially small-sized
ones, commonly are identified using x-ray diffraction and spectrographic techniques. Other
instruments of value to the forensic geologist exist, particularly the scanning electron
microscope and the electron microscope. With these instruments, geologists can examine
extremely small mineral particles using magnification in excess of 100,000 times. Where
applicable, pH-size particle determination and elemental analysis may be used in conjunc-
tion with color, texture, and mineral composition.

the forensic geologist to see any when packaged and limit the materials and represent the com-
variation. If sample variations possibility of contamination. bination of a variety of minerals
are wet or moist, investigators Only plastic locking bags or or rocks at a specific time for a
should air-dry them before plac- glass vials should be used, never certain purpose, they can be
ing them in a vial or similar con- envelopes. highly distinctive. Regional dif-
tainer to prevent biological ac- ferences in the base aggregates
tivity from continuing and to BUILDING MATERIALS used to produce these materials
avert any breakdown of the Building materials long have prove useful to the forensic sci-
sample. The amount of sample been an important part of entist. Different building materi-
required for analysis depends on people’s interaction with and im- als contain suitable aggregates,
the type of examination con- pact upon their environment. such as quartz, gravel, crushed
ducted; however, most analyses Natural materials used to form stone, bituminous or anthracite
require approximately 1 cup of manmade products that will be- cinders, burned clay or shale, and
soil. If considerable gravel or come part of a structure, dwell- pumice or volcanic scoria, all of
other coarse material is present, ing, or similar fixture can be which may indicate a particular
investigators should increase the classified as building materials. geographic area.9
size of the sample. They can When handling building ma- Building materials can in-
make the first determination of terials, investigators must con- clude bricks, cinder and con-
the soil’s color at the scene, for sider the various types of com- crete blocks, cement, plaster,
example, and the color of the soil binations at a given location. ceramics, fiberglass, abrasives,
on a suspect’s clothing. They Because building materials cleaning and face powders,
should ensure that the soil is dry commonly are made of mineral and commercial sands. Each

4 / FBI Law Enforcement Bulletin


particular type of material lends should take representative sample dry and intact to prevent
itself to similar comparative ex- samples of each material. They destroying any of the unique
aminations. Most plaster and ce- should package materials in physical characteristics of the
ment contain rock and mineral appropriate containers, such insulation. Additionally, they
particles. Investigators must en- as plastic locking containers, should ensure that cross-con-
sure that these materials are to avoid any chance of tamination of specimens does
placed in airtight containers and contamination. not occur. Investigators should
not heated again, as in the initial leave any questioned material in-
formation, to prevent the pos- tact on the specimen because re-


sible conversion of the gypsum moving the insulation may ren-
back to the plaster, or low-water, der its value worthless in the
form. Soil, building forensic examination.
Cleaning and face powders materials, and
commonly have a mineral base safe insulation...can CONCLUSION
or mineral filler. The specific benefit law enforce- Geologic material can prove
minerals used tend to differ from ment agencies as an invaluable tool as physical
one product to another, and evidence in cases. evidence in criminal and civil
manufacturers often change the proceedings. The field of foren-


size and composition of minerals sic geology can expand to con-
through time. Abrasive materials tain virtually all inorganic mate-
may be natural or artificial— rials used as physical evidence.
natural materials tend to be more SAFE INSULATION Soil, building materials, and safe
diverse. Further, a wide variety Found between the walls of insulation represent just three
of sands are used for commercial fire-resistant and burglar-resis- examples of the numerous types
purposes. tant safes and safe cabinets, safe of geologic materials that can
The alteration of the environ- insulation often is soft and very benefit law enforcement agen-
ment with building materials can porous and, therefore, can be cies as evidence in cases.
prove important to the forensic readily transferred to tools and The usefulness of most types
scientist who will use various clothing. Various types of mate- of physical evidence depends on
methods to examine building rials are used as safe insulation, the number of significant differ-
materials broken down into sev- including wood chips, gypsum, ences that exist in the material.
eral areas. However, for the fo- fiberglass, and asbestos. Many Nature has provided geologic
rensic scientist to make an accu- safes made before 1936 contain materials with large variations
rate determination, investigators natural cement as insulation. and possibilities.10 Investigators
should sample all types of mate- Collecting safe insulation at must ensure that they follow ap-
rial present at the scene. Most a crime scene is a relatively propriate procedures when se-
cases involving building mate- simple procedure. If the safe is curing, packaging, and preserv-
rials are related to burglaries present at the scene, investiga- ing geologic materials. The
where someone has broken into tors should take samples of all forensic scientist then can pro-
a dwelling or structure. Brick, walls because replacement of vide an expert opinion to the
cinder block, fiberglass, and one or more walls with different inference or conclusion drawn
gypsum board most likely would safe insulation is common. In- from facts determined during the
be involved, and investigators vestigators should keep the examination of these materials.

March 2004 / 5
Endnotes Soils (New York, NY: McGraw Hill, crime scene, or “alibi” location, and
1939). samples scientists use as part of their
1 6
The Locard exchange principle, L. C. Nickolls, “Identification of normal professional resources. “Known
developed by Edmond Locard in 1929, Stains of a Nonbiological Nature,” in samples” from scientists’ normal profes-
is the basic precept of forensic geology. F. Lundquist, ed., Methods of Forensic sional resources are numerous and varied.
2
R. C. Murray and C. F. Tedrow, Science, 1 (New York, NY: Interscience Use of these samples for comparison may
Forensic Geology (Englewood Cliffs, NJ: Publications, 1962), 355-362. provide the scientist with a correct
7
Prentice-Hall, Inc., 1992), 23-24. Although scientists have identified identification of the material and, in some
3
Ibid. over 2,000 minerals, only about 20 are cases, the particular area of origin.
4 9
G. D. Smith, et al., “Glossary of commonly found in soils, with the bulk of American Society for Testing
Soil Science Terms,” Soil Science Society soil containing only 3 to 5 different Materials Standards, Book of ASTM
Proceedings 26, no. 3(1965): 305-317. minerals. Standards, 1955, 421-611.
5 8 10
A. K. Lobeck, Geomorphology: An Two possible types of “known Supra note 2.
Introduction to the Study of Landscapes, samples” exist: samples collected from the

Book Review

it can have long-lasting effects on officers


and administrators alike. Therefore, to cope
with such a tragedy, it is imperative for an
administrator to be prepared. Less than 100
pages long, the Law Enforcement Funeral
Manual provides sample funeral services,
memorials, poems, short readings, and
hymns for use under a wide range of cir-
cumstances. Containing information gathered
by the International Conference of Police
Chaplains, the book presents administrators
and law enforcement personnel with the tools
to help promote healthy healing. In addition,
this manual provides services for multiple
Law Enforcement Funeral Manual, religious beliefs. Overall, this concise,
by William P. Sanders, Charles C. Thomas, helpful book compiles components nec-
Publisher, Springfield, Illinois, 2001. essary to conduct a thoughtful and appro-
Death is never easy. However, whenever priate ceremony for a law enforcement
it strikes within a law enforcement agency, funeral.

6 / FBI Law Enforcement Bulletin


Chapter 1 provides a brief overview on readings specifically designed for officers
how to notify family members or loved ones who have passed away. In addition, this
regarding the death of an officer. The author chapter mentions the needs of the survivors
strongly suggests that the department enlist and points out the necessity of advising
the services of a police chaplain when making family members and loved ones that the
notifications. agency will be honoring the deceased officer
Chapter 2 describes the basic elements in ceremonial fashion. To promote healthy
of the law enforcement funeral. The author healing, this chapter also focuses on survivor
examines U.S. flag etiquette and the use of resources and support agencies.
pipe and drum corps, bugler, honor guard, In the appendices, the author provides a
badge mourning bands, flowers, and ribbons sample departmental policy or standard oper-
in detail. This chapter also offers special ating procedure model that can be modified
religious funeral considerations for those quickly to assume the needs of the individual
officers of varied beliefs (e.g., Buddhist, agency. Additionally, a funeral checklist con-
Hindu, Islamic). tains the important components in a handy,
Chapter 3 gives the law enforcement to-do format, as well as a model for debrief-
administrator the entire funeral services for ing personnel after critical incidents.
officers killed in the line of duty, killed off The Law Enforcement Funeral Manual
duty, and retired. As part of the funeral is a well-designed guide for police adminis-
service, the author provides prayers, scrip- trators. It is presented in a fashion that is
tures, readings, hymns, and closing benedic- acceptable to those having no experience in
tions. In addition, this chapter provides police funerals, as well as seasoned veterans
necessary information on how the motorcade and clergy alike. Although it is in sharp con-
would proceed to the cemetery. This latter trast to most law enforcement publications,
point often is overlooked in prior planning the manual provides basic information that an
and policy determination. agency can use to quickly and professionally
While the first three chapters focus on the prepare after tragedy strikes. It should be a
deaths of human officers, chapter 4 contains necessary, if not totally welcome, addition to
memorial services for law enforcement any law enforcement agency’s library.
service animals. Although most agencies have
existing policies regarding officer deaths, Reviewed by
work dogs and horses rarely are mentioned, Charles Mesloh,
even though their deaths occur much more Assistant Professor,
frequently. As a result, administrators often Florida Gulf Coast University
are at a loss as to how to handle these events.
This chapter fills a much-needed void in the Jennifer James-Mesloh,
extant literature. President,
Chapter 5 offers those conducting memo- Advanced Research Solutions, Inc.
rial services poems, prayers, hymns, and short Labelle, Florida

March 2004 / 7
Focus on Identity Theft
individuals and prison inmates to apply for and
obtain federal student aid. Beginning in 2002, the
department began checks of Social Security
numbers against death records to identify the
fraudulent use of numbers formerly issued to
deceased individuals.
A recent example of student identity theft
resulted in a 26-count indictment against an
individual in U.S. District Court, Western District
of New York, for his role in allegedly defrauding
the Department of Education of over $160,000 by
submitting fraudulent student loan applications in
Identity Theft the name of his mother and brother. The indict-
Within Federal ment also charged that the individual prepared
Student Aid Programs and submitted approximately 2,370 additional
By Sharon Jones-Davis
© Digital Stock
student loan applications requesting disbursement
of approximately $43.8 million. These applica-
tions were prepared using multiple fictitious

I dentity theft is a rapidly growing crime that


has reached the hallowed halls of academia.
Identity thieves have targeted U.S. Department
identities that claimed attendance at various
colleges in the United Kingdom.
OIG collaboration with the Mesa Police
of Education federal student aid programs, with a Department, Mesa Community College, the
potential impact on million of students at thou- Social Security Administration, and the U.S.
sands of institutions of higher learning nation- Secret Service recently resulted in an individual
wide. The department processes over 11 million pleading guilty to one count of student aid fraud
applications for student financial aid and dis- and one count of identity theft. He also admitted
burses over $60 billion a year in federal student to forfeiture allegations. The investigation re-
aid funds. vealed that he had assumed over 50 different
The department’s Office of Inspector General identities to obtain approximately $313,000 in
(OIG) serves as its law enforcement arm. With federal student aid. Many of the victims were
regional offices and over 70 special agents, the prison inmates. He faces a potential sentence of
OIG investigates allegations of identity theft 20 years and a $270,000 fine. Because he admit-
involving federal student aid funds in conjunction ted to forfeiture allegations, he faces forfeiture of
with the U.S. Attorney General’s Office. Within his house, car, computer and electronic equip-
the last year and a half, OIG investigations ment, and nearly $70,000 in cash and bank
conducted along with other federal, state, and accounts.
local police have resulted in over $1 million in Crimes such as these have resulted in Secre-
court ordered restitutions. And, the numbers tary of Education Roderick Paige, Inspector
continue to grow. General John Higgins, and Federal Student Aid
The methods that these perpetrators employ Chief Operating Officer Theresa Shaw launching
vary from the fraudulent use of personal informa- an identity theft prevention initiative to alert stu-
tion belonging to family members and friends to dents who are particularly vulnerable to this type
conspiracies that involve groups of individuals of financial crime. The Web site www.ed.gov/
who have access to student information. Identity misused provides information about how to pre-
thieves also have used the identities of deceased vent and report identity theft that involves federal

8 / FBI Law Enforcement Bulletin


student aid funds. The OIG has increased its data- involving individuals who steal personal informa-
mining efforts to identify potential trends and tion to commit fraud within federal student aid
patterns involving identity theft and other crimes programs. The OIG seeks to expand its role in
involving fraud against the student aid programs. preventing student aid identity theft by working
As a result of data mining, the OIG also was able with other law enforcement agencies and educat-
to assist other federal law enforcement agencies ing students to the long-term economic threat this
identify foreign nationals with terrorist links who crime poses.
fraudulently obtained student aid. Sharon Jones-Davis is a program management analyst at the
The OIG will continue in its efforts to com- U.S. Department of Education, Office of Inspector General,
bat identity theft by conducting investigations Investigation Services.

Unusual Weapon Alert

Bullet Cartridge Knives


This unusual weapon appears to be a rifle This weapon looks like a handgun car-
cartridge with a head stamp that reads “30-06 tridge, but contains a sharp metal blade with
SPRG.” Instead, it has a sharp metal blade a head stamp that reads, “30-06 SPRG.”
inside that poses a serious threat to law Law enforcement officers should be aware
enforcement officers. of the possible threat of this weapon.

March 2004 / 9
© Digital Juice

Sudden,
Unexplained
Infant Death
Investigations
By ERNST H. WEYAND

I nvestigating sudden, unex-


plained infant death (SUID)
in the United States serves
as one of the many challenges
through a SUID investigation,
providing a much greater chance
of an accurate determination of
what caused or contributed to a
the sudden death of a child under
1 year of age that remains unex-
plained even after a thorough
case investigation2—scientists
facing law enforcement officers. child’s death. call it a “diagnosis of exclusion.”
Federal, state, and local investi- SIDS is the most frequently de-
gators alike often receive little SUID AND SIDS termined cause of SUID.3
introduction to SUID and do not SUID cases involve infant SUID investigators should
fully understand their role in a deaths that occur outside of a consider that SIDS claims more
SUID investigation when re- doctor’s care without an imme- infant lives in the United States
quired to handle one. A more diate explanation of their cause. than congenital anomalies, ill-
complete understanding of this People should not confuse SUID nesses, injuries, and homicides
role can enable law enforcement with sudden infant death syn- combined. In fact, SIDS deaths
officers to work effectively drome (SIDS),1 which refers to outnumber abuse and neglect

10 / FBI Law Enforcement Bulletin


deaths in children under 1 year of Approximately 15 percent of “investigation of exclusion” by
age nearly 9 to 1.4 Law enforce- SUID investigations will iden- examining various areas outside
ment officers that investigate in- tify a cause of death other than the normal scope of a criminal
fant deaths on Indian reserva- SIDS.6 Murder serves as one ex- case to rule out such possibilities
tions must face an even more ample—in 2000, the homicide as abuse, neglect, environmental
alarming concern: SIDS deaths rate for children under the age of factors, illness, accidental as-
among Native American babies 1 year reached a 30-year high phyxiation, or strangulation. To
occur at a rate of nearly 3 times (9.1 murders per 100,000 in- streamline this process and to
the national average (6 per 1000) fants), a number twice that re- ensure that they do not overlook
for that of Caucasian infants (2 ported in 1970 and nearly critical evidence, officers should
per 1000)—in North and South equivalent to the 2000 homicide consider dividing a SUID inves-
Dakota, the rate is approximately rate for American teens between tigation into four general catego-
4 times that figure (8 per 1000).5 the ages of 15 and 19.7 Many ries: the death scene analysis, the
researchers consider this number autopsy, an examination of the
THE SUID low, not accurately depicting the infant’s medical history, and a
INVESTIGATION number of infant murders in the review of the family case history.
Agencies should treat the United States.
sudden, unexplained death of an Many law enforcement offi- The Death Scene
infant like any other mysterious cers find the SUID investigation The death scene is the phase
death. A meticulous investiga- enigmatic; instead of looking for of a SUID investigation most af-
tion must begin immediately to possible wrongdoing, they often fected by the passage of time. To
determine if criminal behavior must focus their efforts on estab- work efficiently, investigators
caused or contributed to the lishing an overwhelming lack must know what to look for and
death of the child. Often, if in- of evidence. In other words, an how to document the findings.
vestigators find no such evi- investigator engages in an Officers should begin at the
dence during the initial stages of
a SUID case, health profession-
als (e.g., medical examiners, fo-
rensic pathologists, and coro-
ners) in large metropolitan areas
with ample investigative re-
sources complete the investiga-
tion to determine the cause and
manner of the infant’s death. In
“ ...without a complete
investigation, the
circumstances
more rural areas where these surrounding a baby’s
means may not exist, law en-
forcement officers commonly death will remain
assist them in solving these a mystery.
cases. Regardless, without a


complete investigation, the
circumstances surrounding a
baby’s death will remain a Special Agent Weyand serves in the Indian Country Unit
at FBI Headquarters in Washington, D.C.
mystery.

March 2004 / 11
place where the infant’s death The collection and thorough familiar with basic medical con-
was pronounced and quickly documentation of physical evi- cepts and terms related to infant
move to the location (if differ- dence at the death scene can death. When documenting the
ent) where the baby was found prove essential in accurately es- general appearance of the child,
dead or unresponsive. If pos- tablishing an infant’s cause of officers should note the body,
sible, investigators ought to oc- death. Items considered impor- face, head, and neck positions;
cupy both places as soon as the tant to a SUID investigation in- rigor mortis; postmortem lividity
death is reported and quickly clude the baby’s clothes and dia- (creating a drawing and depict-
identify the individuals who lo- per, bedding, formula, time and ing the pattern); birthmarks;
cated the child because their ob- contents of the last bottle, over- body temperature; physical de-
servations can greatly assist the the-counter or prescribed drugs velopment; evidence of trauma;
re-creation of the death scene. state of hydration; and any fluids
At the scene, investigators (e.g., vomitus, blood, mucus, or


should describe, in detail, the site other secretions) or obstructions
where witnesses found the baby. present in or around the baby’s
For example, if the death oc- People should mouth or nostrils. Additionally,
curred at home in the infant’s not confuse SUID they ought to document all at-
bedroom, officers ought to in- with sudden infant tempts to resuscitate the child,
clude a description of the room, death syndrome along with any physical signs of
as well as their observations of (SIDS).... attempted resuscitation (e.g., en-
the sleeping surface. Investiga- dotracheal tube, chest ecchymo-


tors must take great care in docu- sis,8 EKG monitor pads, or intra-
menting these details (e.g., “The venous lines).
mattress is too small for the crib”
or “Officers noticed a broken or medications, and other appro- The Autopsy
spring in the bedding”). They priate items, such as folk rem- The forensic autopsy of the
also should determine if anyone edies or unpasteurized honey (if infant serves as a critical step in a
was sleeping with the child at the ingested within 30 days of the SUID investigation. Without a
time of death and if this person time of death). In addition, in- thorough autopsy by a compe-
was impaired by alcohol or other vestigators should collect any tent, experienced health profes-
drugs. After examining the toys located nearby and docu- sional, the cause and manner of
sleeping site, investigators then ment their relative position to the the baby’s death will remain in
would record a variety of envi- child. question. The law enforcement
ronmental factors, including in- Officers also must meticu- officer plays a critical, though
side temperature, outside tem- lously document the baby’s gen- limited, part in this phase of the
perature, type of heating present, eral appearance. This serves as a investigation. While carrying out
type of air conditioning, any hu- critical portion of the death scene their role in this process, in-
midifier or vaporizer use, type of investigation and provides in- vestigators ought to remain
flooring, state of the home’s valuable information to the sensitive to the needs of the
cleanliness, number of people health professional—in this child’s family and effectively ex-
living in the residence, and any regard, investigators can com- plain the importance of a foren-
presence of animals. municate more effectively when sic autopsy.

12 / FBI Law Enforcement Bulletin


Considerations During a SUID Investigation
1. Remain sensitive to the family, but stay focused. Although painful for the family, a
detailed investigation may shed light on the true cause of death.
2. Time is critical. Crucial evidence will become lost or destroyed if the investigation does
not begin immediately.
3. Trust your investigative instincts. Remain alert to the possibility of rollover death (also
referred to as overlying death), accidental suffocation, strangulation, positional asphyx-
iation, child abuse, child neglect, or homicide. Investigators should use their expe-
rience, training, and judgment to develop additional leads in any stage of the SUID
investigation.
4. Use a SUID investigative protocol.9 This written checklist, or guide, ensures that inves-
tigators do not overlook critical evidence during the “investigative window”of a SUID
investigation.

First, the officer obtains pa-


the child’s medical history from illnesses not documented in
rental consent, a coroner’s direc-
records, as well as interviews medical records, or contracted
tive, or a court order authorizing
with parents, guardians, or care- illnesses or medical complica-
the autopsy. Next, the investiga-
takers—of course, if the infant’s tions during the first week of life.
tor must coordinate the transpor-
death resulted from abuse, ne- If the baby required resuscitation
tation of the infant (while main-
glect, or homicide, these indi- at any time since birth, it should
taining a proper chain of viduals may be suspects. Impor- be documented in detail. In addi-
custody). The officer also should
tant information to gather during tion, officers ought to determine
make efforts, early in the investi-
this phase of the investigation in- if the child ever required oxygen,
gation, to obtain the baby’s cludes if the baby had an illness an apnea monitor, pacemaker, or
medical records, as well as docu-
within 48 hours of the time of antibiotic or anticonvulsant
mentation of the mother’s prena-
death, received any medications medications.
tal care. Copies of these records
(prescribed or over the counter), To complete the medical his-
ought to accompany the infant to
or exhibited any recent changes tory, the investigator must exam-
the autopsy. Finally, the investi-
in behavior or sleeping habits. ine the date and circumstances of
gator should remain available,Officers also should determine if the infant’s last doctor’s visit;
either in person or by telephone,
the infant had exposure to to- determine if the child ever re-
to provide input and observa- bacco smoke or illicit drugs at ceived emergency room atten-
tions to the health professional at
any time. tion and, if so, under what cir-
the time of the autopsy. As the investigation into the cumstances; and ascertain if the
child’s medical history contin- baby ever required a hospital
The Infant’s Medical History ues, the investigator must deter- stay or surgery. The officer also
Investigators can gather mine if the infant experienced should document, in detail, the
much of the information about previous traumatic injuries, had infant’s immunizations and

March 2004 / 13
when they were administered. life-threatening trauma, HIV, (e.g., anemia, diabetes, high
Finally, the investigator ought to hepatitis, or sickle-cell anemia. blood pressure, infections,
develop information about the If so, the officer ought to conduct physical trauma, or sexually
child’s feeding history (e.g., Did a logical and thorough investiga- transmitted diseases) or use of
the infant have any food intoler- tion to gather as much informa- alcohol, controlled substances,
ances?) and establish the baby’s tion as possible about each par- or tobacco during pregnancy. In
exposure to illness through con- ticular instance. If necessary, the addition, the officer should de-
tact with adults or animals. investigator should widen this termine if the mother had any
phase of investigation to include previous pregnancies, previous
The Family’s Case History extended family members. After live births, previous abortions or
A review of the infant’s fam- the interviews of family mem- miscarriages, or a history of fer-
ily case history may prove the bers, the officer must contact an tility treatment.
most time-consuming part of appropriate agency, such as so- Finally, the investigator
a SUID investigation. The inves- cial services or child protection ought to document the infant’s
tigator begins by interviewing services, and inquire about any gestational age (considering 40
immediate family members to family contacts and the nature of weeks as “full term”) and weight
determine if they have experi- these contacts. at birth, method of delivery
enced any suspicious childhood The investigator also needs (vaginal birth or cesarean sec-
accidents, a history of infant to examine and document the tion), and if the baby was part of
or childhood death, SIDS, con- mother’s prenatal history and a dual or multiple birth. To en-
genital anomalies, infections, medical care. Information ought sure completeness, the officer
pneumonia, premature birth, to include any health problems should determine the age and

Online Resources
• SIDS Alliance
http://www.sidsalliance.org
• Interagency Panel on Sudden Infant Death Syndrome
“Guidelines for Death Scene Investigation of Sudden, Unexplained Infant Deaths”
http://www.cdc.gov/mmwr/preview/mmwrhtml/00042657.htm
• Office of Juvenile Justice and Delinquency Prevention
“Recognizing When a Child’s Injury or Illness Is Caused by Abuse”
http://www.ncjrs.org/html/ojjdp/portable_guides/abuse_02/key.html#sids
• Canadian Association of Chiefs of Police
“Code of Police Practice - A Guide for First-Line Officers”
http://www.rcmp-learning.org/copp/encopp/d_infant.htm

14 / FBI Law Enforcement Bulletin


health of the other children in the investigation is essential in es-
infant’s family and describe the tablishing the true cause and Wanted:
family’s demographics (e.g., em- manner of an infant’s death. Photographs
ployment, education, income,
ages of parents, and citizenship). Endnotes
After examining and docu- 1
For further information, see Linda
menting the family history, the Esposito, Larry Minda, and Claire Forman,
SUID investigator must contact “Sudden Infant Death Syndrome: Police
the health professional involved Can Make a Difference,” FBI Law En-
with the case and provide the in- forcement
2
Bulletin, September 1998, 1-5.
A thorough case investigation
formation gathered during the in- includes a complete autopsy, an examina-
vestigation. A discussion of tion of the death scene, and a review of the
these findings then determines infant’s clinical history. See Jodi Shaefer,
the need for additional work by Kathleen Fernbach, and Mary McClain,
“SIDS Is Not Homicide But...”; retrieved
T he Bulletin staff is
always on the lookout
for dynamic, law enforce-
the officer. Regardless, the in- on September 17, 2003, from http:// ment-related photos for
vestigator must remain available www.asip1.org/sid_not_homicide.html. possible publication in the
to provide input as necessary Without such an analysis, an infant death magazine. We are interested
during the autopsy/investigation cannot be attributed to SIDS; it must in photos that visually depict
to help determine cause and remain in the “undetermined” or “unex- the many aspects of the law
plained” category.
manner of death. 3
enforcement profession and
Interagency Panel on Sudden Infant
Death Syndrome, “Guidelines for Death
illustrate the various tasks
CONCLUSION Scene Investigation of Sudden, Unex- law enforcement personnel
Law enforcement officers plained Infant Deaths”; retrieved on perform.
can play a crucial role in SUID September 17, 2003, from http:// We can use either black-
investigations. The information www.cdc.gov/mmwr/preview/mmwrhtml/ and-white glossy or color
00042657.htm. prints or slides, although we
gathered during an extensive 4
Arizona SIDS Advisory Council, prefer prints (5x7 or 8x10).
analysis of the death scene, ex- Facts About Sudden Infant Death We will give appropriate
amination of the infant’s medical Syndrome (SIDS) for Police Officers and
credit to photographers when
history, and review of the family Pre-Hospital Personnel, Infant Death
Support Series (April 29, 1994).
their work appears in the
case history can greatly supple- 5 magazine. Contributors
Department of Health and Human
ment the autopsy results and en- Services, Mi Cinca Kin Towani Ewaktonji should send duplicate, not
able the medical professional to Kte Sni, Results of the Aberdeen Area original, prints as we do not
properly interpret postmortem Infant Mortality Study (June 6, 1998). accept responsibility for
6
findings. Supra note 3. damaged or lost prints. Send
7
Laura Sessions Stepp, “Infants Now photographs to:
Sudden, unexplained infant Murdered As Often As Teens,” The
deaths can prove challenging to Washington Post, December 10, 2002, sec.
both the law enforcement and Art Director
A, p. 3.
medical communities. The team 8
Evidence of ruptured blood vessels.
FBI Law Enforcement
9
A model protocol is available at http:/ Bulletin, FBI Academy,
effort between the investigator Madison Building,
/www.fbi.gov/hq/cid/indian/about.htm.
and the health professional in Room 209, Quantico,
ensuring a thorough, complete VA 22135.

March 2004 / 15
Bulletin Reports

Corrections
The National Institute of Corrections (NIC) presents
Gender-Responsive Strategies: Research, Practice, and
Guiding Principles for Women Offenders, which summa-
rizes current knowledge on the characteristics of women
in correctional settings, the ways in which gender makes
a difference in current criminal justice practice, and
multidisciplinary research and theory on women’s lives
that have implications for managing women in the crimi-
nal justice system. For availability and ordering informa-
tion, contact the NIC
Information Center at 800-
877-1461 and reference
accession number 018017. Juvenile Justice
This publication also is The Office of Juvenile Justice and Delinquency Preven-
available electronically at tion (OJJDP) presents Juvenile Gun Courts: Promoting
http://www.nicic.org/pubs/ Accountability and Providing Treatment, which draws on
2003/018017.pdf. the experiences of policymakers and practitioners involved
with juvenile gun courts to describe their development.
Juvenile gun courts are targeted interventions that expose
youth charged with gun offenses to the ramifications of
such acts. Like its better-known counterpart, the youth drug
court, the juvenile gun court is a specialty court that fea-
tures small case loads, frequent hearings, immediate sanc-
tions, family involvement, and treatment services. This
bulletin, part of the Juvenile Accountability Incentive
Block Grants Best Practices Series, reviews the OJJDP-
supported Jefferson County, Alabama, Juvenile Gun
Court. This report is available electronically at http://
ojjdp.ncjrs.org/pubs/courtsum.html#187078 or by contact-
ing the National Criminal Justice Reference Service at
800-851-3420.

16 / FBI Law Enforcement Bulletin


Training
The Office of Community Oriented Policing Services
(COPS) presents Mutual Respect in Policing, a teaching aid
for instructors and facilitators who provide information to
police officers on the subject. This videotape and lesson
plan provide officers with a greater awareness of respectful
police behavior, help them strengthen their ability to work
toward better community relationships, and enhance their
awareness of culturally sensitive issues. The video contains
five scenarios of police-citizen interaction that can be pre-
sented separately during successive roll calls or together in
one classroom presentation. The lesson
plan guides the instructor through the
training video, highlights teaching
Web-Based Resources points, and poses specific questions
about the scenarios from the video.
The Bureau of Justice Statistics (BJS) Availability and ordering information
presents Homicide Trends in the United States, are available through the U.S. Depart-
a section of its Web site that contains over 50 ment of Justice Response Center at
charts that describe homicide patterns and 800-421-6770.
trends in the United States since 1976. Homi-
cide is of interest not only because of its sever-
ity but also because it is a fairly reliable barom-
eter of all violent crime. This site can be
accessed at http://www.ojp.usdoj.gov/bjs/
homicide/homtrnd.htm.

Bulletin Reports is an edited collection of criminal justice studies, reports, and project findings. Send your
material for consideration to: FBI Law Enforcement Bulletin, Room 209, Madison Building, FBI Academy,
Quantico, VA 22135. (NOTE: The material in this section is intended to be strictly an information source and
should not be considered an endorsement by the FBI for any product or service.)

March 2004 / 17
Community Policing
Exploring the Philosophy
By DAVID M. ALLENDER

© Mark C. Ide

A discussion concerning
the definition of com-
munity policing can in-
clude vastly different connota-
envision a police force that re-
sponds exclusively to the de-
mands voiced by them. Re-
searchers usually define the
consensus interpretation entirely
dissimilar to any of these. With
such a wide range of viewpoints,
formulating a definition of com-
tions, depending upon the views model by their particular orienta- munity policing becomes a
held by those involved. Street- tion. Politicians typically sup- daunting task. However, one ex-
level officers might conjure up a port the concept, but often re- planation highlights nine words
scenario that requires the transfer main unsure of what the theory that can provide the key to better
of officers from traditional en- means. Law enforcement admin- understanding the concept.
forcement duties to an assign- istrators tend to view the idea as Community policing is a
ment that requires little “police another federally supported ini- philosophy of full-service,
action” but, instead, concen- tiative that they must implement personalized policing where
trates on helping citizens con- to receive grant funds. Finally, the same officer patrols and
front “order maintenance” is- officers and citizens working in a works in the same area on a
sues. Community groups may successful project often reach a permanent basis, from a

18 / FBI Law Enforcement Bulletin


decentralized place, work- and improperly marketed to law with uncivil behavior than to
ing in a proactive partner- enforcement and the public, this become a victim of crime. Fear
ship with citizens to identify model had little chance of suc- on the part of residents, however,
and solve problems.1 cess. Rising crime rates, espe- often caused community groups
Based on this definition, the cially in the categories of violent to equate disorderly persons with
first indication that this form of crime, dictated the need to de- criminal activity. Academic in-
policing differs from other ap- velop a more successful model formation supported the feeling
proaches is its label as a philoso- for police to follow. Community that resident fear represented an
phy. Three other critical aspects policing, which attempts to form important factor in determining
include personalized, partner- a partnership between the police police effectiveness. Thus, re-
ship, and problem-solving ingre- and residents in the neighbor- ducing civil disorder became a
dients. Other identified factors, hoods the officers serve, devel- main ingredient of the emerging
while important, are not as es- oped primarily because many community policing philosophy.
sential to understanding the con- people desired an improved Law enforcement profes-
cept of community policing. American police force. sionals, equipped with lessons
Early advocates of commu- learned during the problem-
CHANGING nity policing identified order laden traditional policing period
THE APPROACH maintenance issues as important and the failed team policing ini-
Over the years, American so- factors in the overall control of tiative, realized the need to work
ciety has embraced a number of crime.2 Reports identifying the with the various communities
policing methodologies. Many amount of crime in the country they served to identify issues
scholars have defined the type of indicated that most Americans viewed by each neighborhood as
work done by officers in the were much more likely to en- significant. Traditional policing
1950s through the early 1970s as counter problems associated “is centered on serious crime,
“traditional” policing. This ter-
minology, in fact, can prove mis-
leading. Several factors, includ-
ing the massive shift of many
police forces into vehicles
equipped with radios, reform ini-
tiatives designed to remove poli-
tics from the police agencies, and
early steps toward professional-
ism, already had altered the
“ Public support for
community policing
can vary depending
on how an agency
methods and tactics employed by
law enforcement. Moreover, not
plans and implements
everyone in the profession ac- the effort.


cepted the traditional policing
approach.
To this end, several law
enforcement agencies attempted Captain Allender serves with the Indianapolis,
Indiana, Police Department.
to implement “team policing”
in the 1980s. Poorly defined

March 2004 / 19
as opposed to maintenance of explain adequately all of the engage in problem solving
community social order or gen- responsibilities that would ac- designed to deal with both the
eral service delivery.”3 Those company this policy. Uncer- immediate situation and with the
designing community policing tainty about what the program underlying causes for the prob-
projects were determined to entailed hindered its implemen- lems. The general public and law
go in a different direction, but tation in the law enforcement enforcement must partner to
they faced many challenges. The community. Some veteran offi- identify problems and formulate
first obstacle to overcome was cers began to feel that commu- solutions. The local law enforce-
formulating a definition for the nity policing was just another ment agency and its citizens
concept. federal program that would dis- must arrive at a consensus defi-
appear as soon as the grant nition for community policing
DEFINING THE CONCEPT money dried up. before they attempt its imple-
Confusion about what con- mentation. The definition needs
stituted community policing to be flexible and subject to


arose from the beginning. Every- change as problems in the neigh-
one from citizens to politicians, borhood evolve.
academics, and even law en- Confusion about
forcement managers espoused what constituted IMPLEMENTING
conflicting ideas of what com- THE STRATEGY
community policing
prised community policing. arose from the Besides law enforcement of-
Community advocates latched ficers, other components of the
onto the name and decided that it
beginning. criminal justice system can be


signaled a new value system in impacted by the implementation
which police would become of a community policing strat-
more involved with the social egy. Prosecutors or district attor-
problems within their neighbor- How, then, could the propo- neys need to be part of the plan-
hoods. Grant programs encour- nents of community policing ning process before officers
aged community policing mea- identify the expected outcomes bring them arrests for order
sures that satisfied written grant of the program? The common maintenance concerns that other-
requirements and attempted to theme running through all of wise might have been over-
meet the needs of the target area the definitions of community looked. Judges need to under-
receiving funds. Grant writers, policing remains the desire to stand that cases brought before
however, often failed to define improve the quality of life for them from these areas are part of
what those measures entailed. local residents. To accomplish a systematic approach to allevi-
Law enforcement managers be- the goals and objectives of ate problems in a targeted area.
gan holding meetings for their the program, most community Aggressive enforcement that
rank and file sworn personnel policing theories state that an or- results in increased arrests might
informing them that with the der maintenance component impact the jail because of an
advent of community policing, must exist that targets problems increased inmate population.
officers would be “empowered” specific to each community or Probation and parole officers
to take care of problems on environment. may benefit from working with
their beats. These managers, However, coupled with order community policing officers,
however, sometimes failed to maintenance, police also must who could offer them a better

20 / FBI Law Enforcement Bulletin


understanding of problematic to plan for and avoid legal start-up phase of the effort, the
persons living in the area. Public complications, such as in the use of overtime and other grant
defenders may encounter an in- previous example wherein it may funds can be an important way to
creased caseload and possibly be necessary to gather statistical get personnel to support the pro-
find prosecutors more resistant information on both victims and gram. To continue the effort after
to plea bargaining. Officials suspects. Planning will help le- grant funds run out, a department
charged with enforcing city ordi- gal advisors defend controversial can tap into money that it ordi-
nances involving zoning and efforts. narily would budget for public
housing will be asked to assist relations activities, normal over-
police with a variety of projects. time expenditures, and officers
To achieve maximum success, already assigned to the neighbor-
each component of the criminal hood. With increased interaction
justice system must mesh with with the community, officers, at
the others and keep in mind cer- the very least, will gain intelli-
tain influential factors, including gence information that can en-
constitutional issues, cost con- able them to better deal with
siderations, and the level of pub- neighborhood problems.
lic support.
Public Support
Constitutional Issues Public support for commu-
Constitutional issues may nity policing can vary depending
© Mark C. Ide
arise from community policing on how an agency plans and
efforts. Changes in the way po- Cost Considerations implements the effort. If officers
lice enforce the law or institute Costs associated with com- work with the community to es-
new programs may give rise to munity policing need not be tablish a mutual goal, the pro-
challenges or complaints. Com- high. After all, law enforce- gram probably will be accepted.
munity police are encouraged to ment’s single largest expendi- In locations where officers make
try new concepts. Whenever po- ture is officer salaries. The offi- little or no effort to achieve a
lice enter an uncharted area, le- cers assigned to a given area can consensus of opinion, problems
gal challenges generally result. work either in the traditional will arise.4 Political support will
Some issues will be decided in mode or in a more directed man- come only if the residents sup-
the favor of law enforcement, ner under established commu- port the concept. Civil liberties
whereas others will be decided nity policing guidelines. Regard- groups will monitor the effort
in favor of the defendants. For less of the approach, salaries will closely to see if constitutional
example, if the target area is remain the same. problems or other irregularities
located in a part of the city As a philosophy, community occur.
populated mostly by minori- policing can make use of exist-
ties, charges of racial profiling ing resources. Integration of law CONCLUSION
may result from aggressive en- enforcement assets with other The philosophy of commu-
forcement. The law enforcement components of the community nity policing states that success-
administrator charged with plan- actually can make for a more ful programs require the forma-
ning a community policing pro- efficient and cost-effective po- tion of a partnership between
gram must make every effort lice agency. It is true that in the the police and area residents.

March 2004 / 21
Problem solving represents an formulate new solutions for new National Institute of Justice, 2000),
important component of the ef- problems. 299-370.
4
The author based this statement on his
fort. Flexibility remains a neces- observations during a 6-month detail
sity in dealing with evolving Endnotes working in the Executive Office for Weed
problems in the target area. 1
and Seed as a part of the FBI’s Executive
Robert C. Trojanowicz, U.S.
Regular interaction between Department of Justice, Federal Bureau of
Fellowship Program. He visited several
residents and the police builds Investigation, Behavioral Science Unit, cities that had instituted community
policing as part of Weed and Seed, which
trust and an increased flow of and Michigan State University, National strategically links concentrated and
information. Intelligence gained Center for Community Policing, Commu- enhanced law enforcement efforts
from the public is an invaluable nity Policing: A Survey of Police Depart- (weeding) with health and human services
tool for police. Information ments 2
in the United States, (1994), 6.
James Q. Wilson and George L.
(seeding) to prevent and deter further
gained as a result of community Kelling, “Broken Windows,” Atlantic crime. One city had three sites that varied
greatly in police commitment and resident
policing can lead police to crimi- Monthly 249 (March 1982): 29-38. participation. The most successful had
nal activity that otherwise would 3
Jack R. Greene, “Community Policing high levels of both. The least successful
have gone undetected. Although in America: Changing the Nature, Struc- site had low police involvement, little
ture, and Function of the Police,” in
criminal activity may mutate and Policies, Processes, and Decisions of the resident support, and even some evidence
continue, a successful commu- Criminal Justice System vol. 3 (Washing- of resident opposition to the program.
nity policing program will help ton, DC: U.S. Department of Justice,

Subscribe Now

22 / FBI Law Enforcement Bulletin


Perspective
M-A-N-A-G-E-M-E-N-T Defined This knowledge helps them not only to
Subordinates’ Expectations perform their jobs competently but also to help
By Sergeant Richard Forsyth
their employees achieve success in their duties.
This proves essential in today’s society where an
attitude of “doing more” error-free serves as the

M anagement remains a much-studied


subject. All organizations, from large
corporations to local police departments, desire
common expectation of organizations, as well as
the public. In this regard, effective managers will
pass on their knowledge, including their mistakes
and the errors of others that they have witnessed,
to supervise their employees as effectively as to subordinates. They will do their best to not
possible. Over the years, leaders have examined allow their employees to take a negative course
countless books and articles presenting both of action; they will help them to make the right
differing and evolving opinions of what consti- decisions.
tutes effective supervision.
I believe that a particularly insightful way to A – Accountability
look into the subject of management is to view it Accountability is important at all levels of
from the subordinate’s perspective. For example, an organization. Managers can demonstrate their
what does a sergeant expect from a lieutenant? willingness to be held accountable by getting out
A lieutenant from a captain? A captain from a from behind their desks and becoming personally
chief? What considerations are important in the involved with their subordinates, bonding with
M-A-N-A-G-E-M-E-N-T of employees?1 them by speaking and listening to them, observ-
M – Management ing them, and sharing experiences. They must
Management means bringing about, accom-
plishing, and conducting. Effective managers “get
Sergeant Forsyth serves
things done” the right way. Employees want to with the Buena Park,
work for such individuals. These supervisors do California, Police
not rely on additional people to do their jobs. Department.
They do not allow others (e.g., elected officials,
the media) to provide leadership for them, and
they recognize the difference between “dumping”
their work on subordinates and appropriately
delegating it (to teach and improve them). They
serve as examples for others to follow.
Effective managers strive to continually learn.
They stay abreast of the latest trends in supervi-
sion and not just in law enforcement because,
after all, the world continually changes and
management styles must adjust accordingly.
Successful supervisors also use the comments
and criticism of others to their own benefit,
thereby molding and shaping themselves into
effective leaders and managers.

March 2004 / 23
invest meaningful time with their employees to Bach’s classic book Jonathan Livingston Seagull,
truly understand them and their needs. most of the seagulls did not bother to learn
Supervisors can demonstrate their willingness anything more than just the simplest facts of
to get involved in a variety of situations. For flight. Jonathan struggled with the decision of
example, my chief still goes out on patrol every whether to be content to fly like the other gulls or
now and then. He puts on his uniform, takes the to be different and live up to his flying potential.
stars off his collar, and partners with an officer He decided to take action and excelled above the
on patrol. His actions show the entire department other gulls in the art of flying.
that he does not consider himself above doing the While it is easy to sit back and do just enough
same work that he asks his officers to perform— to get by, to not make waves, and to make every-
and demonstrate his account- one happy, it takes courage to
ability to his employees. act. Employees find it frustrat-
ing to look at a manager and see
N – Nobility


someone who will not do so.
Nobility means being Nonaction implies that the
morally sound, superior in All organizations... supervisor must not care.
character and nature. Subordi- desire to supervise Managers should strive to be
nates want to follow managers their employees as people who act when needed,
who model such qualities. effectively as leaders who possess enough
Unfortunately, in today’s possible. courage to change direction
society, many people seem to when warranted. Subordinates
think that two standards exist in


want to know that if their
the way people act—one for bosses see something that is not
professional conduct and the right, they will have the courage
other for private. For example, to speak up, to bring the issue to
famous athletes or well-known politicians may light, and to take action. As a famous athlete said,
want to receive judgment only on their spectacu- “You miss 100 percent of the shots you never
lar accomplishments on the athletic field or in the take.”2 Strong leaders “take the shot.” Employees
political arena and to have their private affairs want to work for such individuals.
ignored. However, people of integrity adhere to
moral principles in all activities, on or off duty. G – Guiding Principle
The fact is, subordinates lose respect for their People generally follow a guiding principle
managers if they see them participating in inap- that tells them to treat others as they would like to
propriate conduct, regardless of when or where be treated. Truly, the greatest legacy a person can
the activity takes place. Employees want to work leave behind is to have had a positive influence
for managers of noble character; such supervisors on the lives of others. Supervisors can do this in
earn the esteem of their staffs. three ways.
First, managers should only employ supervi-
A – Action sory tactics that they would consider appropriate
Action defines leadership. Leaders make if their own bosses used them. In this regard,
decisions about where they want to go, what they supervisors can evaluate their own managers and
want to do, and how they will get there. And, they incorporate positive attributes into their own style
do what they said they would do. In Richard of management while eliminating the negative.

24 / FBI Law Enforcement Bulletin


Second, they should lead by example. Manag- include other areas that would augment their
ers should ask employees to follow only regula- repertoire.
tions and procedures that they themselves follow. Putting a priority on education shows subor-
Supervisors’ practices and actions should mirror dinates that the manager cares about their per-
agency rules and policies, as well as the types of sonal progression, as well as the ever-growing
behavior expected from subordinates. and changing needs of the department. Supervi-
Third, managers should treat employees with sors should continually encourage their employ-
dignity, kindness, caring, and compassion. This ees to take advantage of opportunities. As subor-
does not mean that they must be soft but, rather, dinates continue to learn, they confidently and
human. Subordinates respond positively to effectively can serve the needs of the organiza-
supervisors that truly respect and care about them tion, as well as the community. Also, when
personally and professionally. Managers can employees feel competent and valuable, they
accomplish this in many ways. For example, they enjoy their work. Education serves as an effective
simply can show a genuine interest in employees’ tool organizational leaders can use to better their
lives outside of work— personnel and the organiza-
areas, such as their families tion; it provides a “win-
and hobbies. My agency win” situation.
has a slogan that sums this
point up well: “People are M – Mentoring
our greatest asset.” Super- Mentoring constitutes
visors should treat their another important aspect of
subordinates accordingly. management. Profession-
ally, supervisors can find
E – Education many areas of their jobs
Managers must facili- that would be beneficial for
tate the education of their their subordinates to learn.
employees. One method is For example, sergeants
to encourage subordinates can gain insight into a
to pursue formal college lieutenant’s decision-
degrees. Such credentials can serve to further making process, lieutenants can assist with staff
professionalize law enforcement in general. Also, work usually done by captains, and captains can
campus settings present officers the opportunity attend functions for chiefs of police. The best
to facilitate friendships and relationships with learning comes from doing. Supervisors should
individuals of other professions and cultures, involve their employees where they can learn
exposing them to different ways of thinking. from areas of the job done by those above them.
This, in turn, can help them expand their outlook An effective manager tries to train, educate, and
and better understand the diverse communities motivate their subordinates to one day replace
and people they serve. them.
Another way supervisors can help educate Many years ago, I took the promotional exam
their employees is through formal training, such for the rank of sergeant and did not do very well.
as conferences and seminars. Such opportunities Shortly thereafter, a sergeant approached me and
should not be limited only to those relative to presented a flier announcing a seminar for offi-
their specific current assignment but should cers seeking this rank. This individual even

March 2004 / 25
offered to attend with me. I remember thinking maintain subordinates’ trust by demonstrating
that this sergeant easily could have thrown the self-discipline and consistency. Subordinates
announcement away when he received it, think- need assurance that supervisors base their actions
ing to himself that he already had attained this and decisions on ethical principles.
rank and did not need the seminar for his own
benefit. How grateful I was that he looked upon N – Notice
his responsibility to mentor others. I greatly Managers should notice the quality work
appreciated his willingness to help me in my own done by their personnel. People depend on the
progression and development toward promotion. evaluations of others, particularly in the work-
place. Supervisors can address this need by using
E – Ethics praise often. Recognition acts as a strong motiva-
As individuals who must set the example for tor at work; employee job satisfaction surveys
their subordinates, managers must realize that attest to this. Unfortunately, organizations often
their words, attitudes, emotions, thoughts, and do not recognize their staffs for the superior work
actions all reveal their personal they do. Certainly, nobody
ethics. While nobody is perfect, wants to work for an agency
supervisors are held to a higher where the boss takes credit for
standard. Fair or unfair, the
higher individuals climb the
“ladder of success,” the more
people expect them to uphold
“ ...a particularly
insightful way to
look into the subject
everything that goes right and
places blame on others when
things go wrong. Managers
should give credit where credit
the ethical standards of law of management is to is due—not doing so surely will
enforcement. view it from the develop disdain and resentment
People’s ethical standards subordinate’s in the organization.
are the written and unwritten perspective. In my department, a watch
rules that govern their personal commander became known for
conduct. Law enforcement
officers strive to abide by the
Law Enforcement Code of
Ethics, which states, in part, “I will never act
” placing stickers of big red stars
on officers’ reports that he
deemed outstanding. While
everyone initially considered it silly (reminding
officiously or permit personal feelings, preju- them of kindergarten), officers actually began
dices, political beliefs, aspirations, animosities or working harder to write better reports, with the
friendships to influence my decisions.” In other obvious goal of receiving a red star on their work.
words, this simply means doing the right thing Recognizing someone for the valuable work they
and making the right choices for the right rea- do is an easy way to develop loyalty and encour-
sons. Supervisors have an obligation to abstain age increased productivity.
from unethical behavior and to call attention to
inappropriate actions when others commit them. T – Trustworthiness
Employees expect managers to “right the wrong,” The Boy Scouts of America follow 12 ideals
to be just and fair in their dealings with their that encompass their Scout Law, with the first
staffs, to demonstrate respect, to prove loyal to being, “A scout is trustworthy.” Trustworthiness
the organization’s mission and vision, and to is of the utmost importance in management as

26 / FBI Law Enforcement Bulletin


well. A manager can develop trust at work by
simply not doing anything to undermine it. Wanted:
Supervisors must remain honest with their Notable Speeches
employees. Managers should treat their word as
their bond; in short, they should do as they say.
But also, managers must remain committed to the
truth in their overall communications. They must
avoid giving different versions of “the truth” to
T he FBI Law Enforcement
Bulletin seeks transcripts
of presentations made by crim-
different employees or telling them only what inal justice professionals for
they want to hear. Trustworthy managers always its Notable Speech depart-
speak honestly, even when it proves unpopular. ment. Anyone who has
Open communication also proves essential, delivered a speech recently
creating a sense of partnership between managers and would like to share the
and employees. Subordinates must know that information with a wider
audience may submit a trans-
they can discuss issues with an open and under- cript of the presentation to the
standing supervisor. Also important, managers Bulletin for consideration.
must share information with their staffs, such as As with article submis-
important decisions facing the organization. sions, the Bulletin staff will
Informed employees will trust and remain loyal edit the speech for length and
to the leaders who communicate openly with clarity, but, realizing that the
them. information was presented
orally, maintain as much of
Conclusion the original flavor as possible.
The effective M-A-N-A-G-E-M-E-N-T of Presenters should submit their
employees serves as a primary goal for any transcripts typed and double-
department. The subject has received much study spaced on 8 ½- by 11-inch
white paper with all pages
over the years, resulting in the production of numbered. When possible, an
countless books and other materials presenting electronic version of the tran-
different views of what constitutes effective script saved on computer disk
supervision of subordinates. should accompany the docu-
Agency leaders may find this topic confusing ment. Send the material to:
at times. Perhaps, examining it from the
subordinate’s perspective can help supervisors Editor, FBI Law
gain insight into how they can effectively manage Enforcement Bulletin
an organization’s greatest asset—its people. FBI Academy
Madison Building,
Room 209
Endnotes Quantico, VA 22135
1
The author based this article on his professional experience telephone: 703-632-1952,
and observations during his years in law enforcement. e-mail: leb@fbiacademy.edu
2
Wayne Gretzky; retrieved on November 12, 2003, from http:/
/www.dailycelebrations.com/092100.htm.

March 2004 / 27
Computer Forensics
Characteristics and
Preservation of Digital Evidence
By LOREN D. MERCER, M.F.S.

© Digital Juice

I n San Diego County, Cali- a dock at muster. These cases properly handle digital evidence.
fornia, forensic experts ex- and many more, handled by com- Law enforcement agencies take
amined a laptop computer puter forensic examiners every different avenues of addressing
for evidence of notes used in the day, have convicted scores of this increasing load of computer
robbery of several local banks— criminals who committed or evidence that requires examina-
a university professor later stored information pertaining to tion to close cases. Many train a
would plead guilty to bank rob- their crimes with computers and few of their law enforcement of-
bery charges and receive 9 years other digital devices. 2 Such ficers. Some train professional
in prison, even though the laptop criminal acts now transcend tra- support technicians. Increas-
contained no saved notes.1 In an- ditional business crimes. ingly, agencies send their work
other case, a Navy enlisted man Criminals commit few to local or regional computer fo-
faced a dishonorable discharge crimes today without involving a rensic laboratories. Regardless,
and time in the brig for posses- computing device of some type. an understanding of the proper
sion of child pornography after This puts a strain on computer evidentiary foundations for ad-
the discovery of floppy disks in a forensic examiners who have the mission of computer-related evi-
backpack he inadvertently left on training, skills, and abilities to dence proves necessary for the

28 / FBI Law Enforcement Bulletin


courts to have confidence in the
material ultimately presented.
Uniqueness of Computer
Digital Evidence
“ …an understanding of
the proper evidentiary
foundations for
In 1948, well-known math- admission of
ematician Dr. Claude Shannon computer-related
outlined mathematical formulas evidence proves
that reduced communication necessary….
processes to binary code and cal-


culated ways to send them
through communications lines.3
Since then, computers and other Mr. Mercer serves as a computer forensic examiner with the Computer
Analysis Response Team at the FBI’s San Diego, California, office.
digital computing devices have
used encoding methods based on
the binary numbering system.
Computers allow criminals and how important a chain alphanumeric code must repre-
to remain relatively anonymous of custody becomes when testi- sent 10 decimal digits and 26 let-
and to invade the privacy and fying to the ‘originality’ of the ters, or 36 items. However, the
confidentiality of individuals evidence.”5 inclusion of punctuation, sym-
and companies in ways not pos- bols, and computer control codes
sible prior to the advent of the Storage of Data requires a seven-bit code
computer age. “Evidence of “Digital electronics involves (2x2x2x2x2x2x2) yielding 128
these crimes is neither physical circuits and systems in which combinations, or 27=128. The
nor human, but, if it exists, there are only two possible complete expression of binary
is little more than electronic states. The states are represented information encompasses eight
impulses and programming by two different voltage levels: a bits, with one sign bit and seven
codes.”4 This evidence can take high or a low level. The two-state magnitude bits,8 giving 256 pos-
the form of data digitally stored number system (base 2) is called sible combinations. This eight-
as text files, graphics files, binary, and its two digits are 0 bit binary number represents one
sounds, motion pictures, data- and 1. A binary digit is called a byte. Of the alphanumeric codes,
bases, temporary files, erased bit.”6 Because reading strings of the American Standard Code for
files, and ambient computer data zeros and ones severely limits Information Interchange (ASCII)
dumped on the storage device by the number of people capable of serves as the most widely used.
the operating system or applica- reading a digital device and to Although more complicated,
tion program. If someone opened accommodate letters, punctua- hexadecimal numbering pro-
a digital storage device, they tion, and special characters, an- vides a way to input data into the
would see no letters, numbers, or other decimal numbering system computer that makes sense to the
pictures on it. Therefore, “un- began—the hexadecimal, or average person. After entry,
derstanding how a computer base 16,7 system. The hexadeci- computers write and read data to
stores data is basic to under- mal numbers express the binary digital media by a “read-write”
standing how sensitive that data values stored on a device. At head controlled by the micropro-
is to inadvertent contamination a minimum, a truly readable cessor. For example, a computer

March 2004 / 29
may store data as minute magne- it in the best possible state for courts to question the accuracy
tized regions along a track of a authentication purposes.12 and reliability of the data, the
floppy disk. Other storage de- When duplicating evidence, examination process, and the
vices exist that store data in a the original needs forensically examiner’s “intellectual rigor.”
different fashion, but all read the sound handling from its initial For the admissibility of the
binary data as a zero or a one. seizure until its final disposition. evidence, courts require proof of
Computer evidence has both This requires a chain of custody its authenticity. Two recent U.S.
a physical component (the stor- to assure proper handling by Supreme Court cases, Daubert
age media) and a nonphysical qualified individuals. Also, the vs. Merrell Dow Pharmaceuti-
component (electronic impulses duplication must produce an ac- cals, Inc., 1993 and Khumo Tire
and magnetic orientation). By its curate reproduction of the origi- Co. vs. Carmichael, 1997, have
nature, digital evidence proves nal. Failure to authenticate the brought the standards of forensic
susceptible to alteration, either science and expert testimony
inadvertently or purposely. “It is concerning admissibility of evi-


a product of the data stored, the dence into focus. The major fac-
application used to create and tor that underlies the authenticity
store it, and the computer system …evidence of criminal of duplicate evidence is data set
that directs these activities.”9 activity…requires validation.
preservation, The process of validating
Preservation of Computer examination, digital data sets proves straight-
Forensic Evidence forward. Forensic examiners use
and analysis in
Computer forensic science a forensically an algorithm13 to create a hexa-
encompasses four key ele- sound manner…. decimal numeric value repre-
ments: identification, preserva- senting the data set. For ex-


tion, analysis, and presentation.10 ample, in an MD514 one-way
Manual handling, processing, hash15 sum, a 16-character hexa-
and authenticity issues serve as decimal value is produced by the
the basis of the preservation as- duplicate image or copy may in- algorithm where there are 2128
pect. Safeguards and method- validate any results produced. possible values. This equates to
ologies used by computer foren- The duplication process requires approximately 340 billion bil-
sic examiners must ensure the the examiner to protect the origi- lion billion billion probable
preservation of digital evidence nal from accidental alteration unique numbers. Theoretically,
to withstand judicial scrutiny and to use methods and applica- two different data set values
should the matter go to trial.11 tions that assure the duplicate could prove identical, but, prac-
In this regard, computer foren- image will produce output that tically, they cannot. By com-
sic examiners seek to use copies would match output from the parison, in cases where DNA re-
of images of original digital original. Agency standard oper- sults have identified a subject,
media for their investigations. ating procedures and policy probability tables exclude or in-
This premise finds its basis in manuals delineate methods of clude an individual using prob-
protecting original digital evi- handling and duplicating. Fail- abilities of one to several billion
dence from accidental damage or ure to adhere to agency policies and stand accepted as unique to
unintentional alteration, leaving and procedures will cause the an individual, or a very small

30 / FBI Law Enforcement Bulletin


population of individuals, by original or (2) in the circum- (b) states, “Process or system.
courts. The likelihood of two stances it would be unfair to Evidence describing a process or
identical values happening in an admit the duplicate in lieu of system used to produce a result
MD5 algorithm proves infinitely the original.”18 FRE 1001 (4) de- and showing that the process
smaller. With known and tested fines duplicate as “a counter- or system produces an accurate
computer forensic tools and hash part produced by the same im- result.”21 Title 42 U.S. Code,
algorithms, there exists a means pression as the original… Section 2000aa-7, covers digital
to duplicate and authenticate by mechanical or electronic evidence under definition
digital evidence. The duplicate’s rerecording…or by other equiva- (a), “documentary materials,”
authenticity can be equated to the lent techniques which accurately which states, “materials upon
original. reproduces the original.”19 FRE which information is recorded,
901 (a) provides that “the re- and includes, but is not limit-
Federal Rules of Evidence – quirement of authentication or ed to…other mechanically,
Original Evidence identification as a condition pre- magnetically, or electronically
The Federal Rules of Evi- cedent to admissibility is satis- recorded cards, tapes, or
dence16 (FRE) cover duplicate fied by evidence sufficient to discs….”22 Original evidence or
digital evidence and its authenti- support a finding that the matter a derivative of the original,
cation. For admissibility in court, in question is what its proponent either electronic or printed,
the evidence should possess a claims.”20 Example 9 of FRE 901 therefore, proves admissible if
chain of custody to show that no
inadvertent or purposeful con-
tamination occured. Preserving
evidence to ensure its integrity
proves important to the courts’ Computer Numbering Systems
consideration of its originality. Decimal Binary Hexadecimal
These rules define original
electronic documents. FRE 1001 00 0000 0
(1) defines writings and record- 01 0001 1
ings to include magnetic, me- 02 0010 2
chanical, and electronic methods 03 0011 3
of setting down letters, words, 04 0100 4
numbers, and their equivalents. 05 0101 5
FRE 1001 (3) states, “If data are 06 0110 6
stored in a computer or similar 07 0111 7
device, any printout or other out- 08 1000 8
put readable by sight, shown to 09 1001 9
reflect accurately, is an ‘origi- 10 1010 A
nal.’”17 FRE 1003 provides that 11 1011 B
“a duplicate is admissible to the 12 1100 C
same extent as an original unless 13 1101 D
(1) a genuine question is raised 14 1110 E
as to the authenticity of the 15 1111 F

March 2004 / 31
the handling, duplication, and The ultimate goal of law en- 5
Loren Mercer, “Chain of Custody
authenticity provides assurance forcement has not changed, but Issues Regarding the Handling of Digital
Evidence” (masters thesis, National
to courts that the evidence is as crimes are committed in new University, 2001).
claimed. ways. To preserve the freedoms 6
Thomas Floyd, Digital Fundamentals
all Americans enjoy, evidence of (New York, NY: Merrill, 1990).
Conclusion criminal activity still requires 7
The term base describes the number
The computer age dramati- preservation, examination, and of digits used in a particular numbering
cally has changed how people re- analysis in a forensically sound system. For instance, the decimal number-
ing system is a base-10 system.
late to each other, but not their manner to show the innocence or 8
For further information, see http://
basic human nature. A minority guilt of a suspect. www.geocities.com/regia_me/sig-mag.htm,
of individuals who believe there accessed on July 23, 2003.
9
exists a shortcut to riches, or who Michael Noblett, Mark Pollitt, and


invade the privacy or innocence Lawrence Presley, “Recovering and
Examining Computer Forensic Evidence,”
of others, continue to carry out Forensic Science Communications 2, no. 4
their criminal agendas. How- (2000); retrieved on July 23, 2003, from
ever, now they more likely use a
Law enforcement http://www.fbi.gov/hq/lab/fsc/backissu/
computer or other digital device agencies recognize oct2000/computer.htm.
to store information about their that digital devices 10
Rodney McKemmish, “What Is
actions or to commit their will increase in use Forensic Computing,” Australian Institute
of Criminology–Trends and Issues in
crimes. in the commission Criminal Justice (June 1999): 1-6;
Law enforcement agencies of crimes.... retrieved on July 23, 2003, from http://
recognize that digital devices www.aic.gov.au/publications/tandi/


ti118.pdf.
will increase in use in the com- 11
J. Borck, “Leave the Cybersleuthing
mission of crimes and that hu- to the Experts,” InfoWorld 23, no. 54
man and equipment resources to Endnotes (2001).
examine this evidence will prove 1
Kathryn Balint, “Computers May
12
Supra note 9.
13
an expanding department bud- Reveal Secrets Behind Crimes”; retrieved A formula or set of steps for solving
a particular problem.
getary item. Agencies that em- on July 23, 2003, from http:// 14
For further information, see
ploy or use computer forensic www.signonsandiego.com/news/metro/ www.permissiontechnology.com/
laboratory resources must recog- santana/20010312-9999_1n12compute. md_5_hash_resources.htm, accessed on
nize that computer forensic ex- html. 2
The author based this article largely
July 15, 2003.
15
aminers need to 1) adhere to a set on his research on and experience with For further information, see
www.rsasecurity.com/rsalabs/faq/
of scientific standards that in- the subject of computer forensics. Law 2-1-6.html, accessed on July 15, 2003.
clude a chain of custody policy enforcement agencies should refer to 16
Federal Rules of Evidence; retrieved
encompassing the unique nature appropriate legal guidelines applicable on July 23, 2003, from http://
of digital evidence, 2) use stan- to their
3
jurisdicions.
Loring Wirbel, “Comms Pioneer
www.law.cornell.edu/rules/fre/
dard operating procedures that Claude Shannon Dead at 84”; retrieved on overview.html.
17
Ibid.
assure known results from dupli- July 23, 2003, from http://www.eetimes. 18
Ibid.
cation and authentication, and 3) com/story/OEG20010227S0045. 19
Ibid.
4
follow policies that meet stan- David Carter and Andra Katz, 20
Ibid.
“Computer Crime: An Emerging Chal-
dards of forensic science and ex- lenge for Law Enforcement”; retrieved on 21
Ibid.
22
pert witness testimony as pro- July 23, 2003, from http://www.sgrm.com/ 42 U.S.C. § 2000aa-7.
mulgated by the courts. art11.htm.

32 / FBI Law Enforcement Bulletin


The Bulletin Notes

Law enforcement officers are challenged daily in the performance of their duties; they face each
challenge freely and unselfishly while answering the call to duty. In certain instances, their actions
warrant special attention from their respective departments. The Bulletin also wants to recognize
those situations that transcend the normal rigors of the law enforcement profession.

While on mobile patrol, Officers Rickard Cooper


and Gary Ribich of the Cleveland Clinic Foundation,
Ohio, Police Department came upon a crash involv-
ing a medical helicopter. As they approached the
scene, a man with his clothes on fire ran frantically
toward them from the crash site. As Officer Ribich
retrieved the fire extinguisher from the police vehicle,
Officer Cooper rushed to the individual’s aid, in-
structing him to drop and roll. The officers were able
Officer Cooper Officer Ribich
to extinguish the flames. Officer Cooper then noticed
a stream of fuel moving along the ground from the
crash site toward the officers and their vehicle. As Officer Cooper began running to move the
vehicle and Officer Ribich started to pull the man to safety, a loud explosion occurred, propel-
ling Officer Ribich and the victim a short distance away and rocking Officer Cooper. Both
officers suffered some temporary hearing loss and Officer Ribich sustained minor leg injuries.
Because of the quick thinking and actions of these officers, the victim became the only survi-
vor of a crew of three aboard the helicopter.

Early one morning while on patrol, Officer William Shepard of the


Des Moines, Washington, Police Department detected the odor of smoke
in the air. Immediately, Officer Shepard began searching the area for the
source of the smoke and noticed a local motel, at near capacity, on fire.
Quickly, Officer Shepard requested the aid of fire department personnel
and then awoke and evacuated all occupants room-by-room. The indi-
vidual in the room
where the fire origi-
nated already was Nominations for the Bulletin Notes should be based
suffering from smoke on either the rescue of one or more citizens or arrest(s)
Officer Shepard made at unusual risk to an officer’s safety. Submissions
inhalation. Officer should include a short write-up (maximum of 250
Shepard’s prompt and professional re- words), a separate photograph of each nominee, and a
letter from the department’s ranking officer endorsing
sponse to this crisis saved many lives. the nomination. Submissions should be sent to the
Editor, FBI Law Enforcement Bulletin, FBI Academy,
Madison Building, Room 209, Quantico, VA 22135.
U.S. Department of Justice Periodicals
Federal Bureau of Investigation Postage and Fees Paid
Federal Bureau of Investigation
FBI Law Enforcement Bulletin ISSN 0014-5688
935 Pennsylvania Avenue, N.W.
Washington, DC 20535-0001

Official Business
Penalty for Private Use $300

Patch Call

The patch of the Fayette, Alabama, Police The patch of the Hampstead, Maryland,
Department features an eagle, symbolizing Police Department displays the town train station,
strength and justice through law and order, sitting which serviced passengers traveling between
atop the city’s shield, which is framed by the Baltimore and Hanover, Pennsylvania. The
flags of the United States and the state of Ala- station, built in 1912 and operational until 1969,
bama. The shield features the year of Fayette’s still stands and is currently under renovation to
incorporation, 1821, along with the cotton bowl, serve as a museum and visitor center.
representing agriculture; the wheel, depicting
industry; and the lamp, symbolizing education.

Das könnte Ihnen auch gefallen