6 The Enforcement of Laws
and the Collection, Preservation, and Interpretation of Evidence
CHAPTER OUTLINE
Introduction: Private Security’s Role in Enforcing the Law....................................................... 220
Defining Criminal Liability............................................................................................................ 220
The Criminal Act (Actus Reus) ..................................................................................................221
The Criminal Mind (Mens Rea).................................................................................................222
Classification of Criminal Offenses and Related Penalties ........................................................ 225
Specific Types of Crimes and Offenses ....................................................................................... 227
Offenses against the Person .....................................................................................................227
Felonious Homicide ................................................................................................................. 227
Murder ................................................................................................................................... 227
Manslaughter.......................................................................................................................... 228
Felony Murder Rule................................................................................................................. 229
Assault.................................................................................................................................... 230
Kidnapping and False Imprisonment ........................................................................................ 231
Sexual Offenses ...................................................................................................................... 233
Offenses against the Habitation and Other Buildings ...........................................................260
Arson...................................................................................................................................... 260
Burglary .................................................................................................................................. 261
Robbery .................................................................................................................................. 267
Theft or Larceny...................................................................................................................... 267
Forgery ................................................................................................................................... 275
Offenses against Public Order and Decency............................................................................277
Riot......................................................................................................................................... 278
Public Drunkenness ................................................................................................................. 279
Other Public Order Provisions .................................................................................................. 279
Evidence and Proof ...................................................................................................................280
The Chain of Custody ............................................................................................................. 280
The Admission of Business Records ......................................................................................... 282
Real and Demonstrative Evidence ............................................................................................ 283
Lay Witnesses ......................................................................................................................... 285
Expert Witnesses ..................................................................................................................... 286
Practical Exercise: Cross-Examination ....................................................................................... 288
A. Potpourri of Evidentiary Principles ....................................................................................... 288
Summary........................................................................................................................................ 292
Discussion Questions .................................................................................................................... 292
Notes.............................................................................................................................................. 293
Private Security and the Law
Copyright © 2012 by Elsevier Inc. All rights of reproduction in any form reserved. 219
Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:20:29.
C op
yr ig
ht ©
2 01
1. E
ls ev
ie r S
ci en
ce &
T ec
hn ol
og y.
A ll
rig ht
s re
se rv
ed .
Introduction: Private Security’s Role in Enforcing the Law Private security is an indispensable cog in the American machinery of justice. Previous
commentary outlines the Herculean contributions made by the industry in the protec-
tion of social and economic order. Even private security’s harshest, most strident critics
realize that without the services of private security, a gaping, colossal protection vacuum
would exist in the distribution of justice, the protection of assets and facilities, and
related services. Public policing alone simply cannot fend off the escalating criminality
or solely assure the integrity of community and governmental infrastructures. It is com-
mon knowledge that the security industry performs numerous functions, from crowd
control to physical perimeter protection in public and private installations, and deter-
rent and preventive activities regarding shoplifting and other corporate crime. But pre-
cisely which laws, statutes, or specific violations cover these sorts of activities? Does it
make imminent sense that private security operatives have training and foundational
knowledge in the law of crimes as well as the underlying proof requirements? And if
the industry is to make a meaningful contribution in the apprehension and subsequent
prosecution of criminal behavior, must its agents know and understand the evidentiary
demands for a successful prosecution? Surely any professional security force will need to
comprehend the definitions of criminal behavior and the evidentiary proof that must
accompany any attempt to successfully conclude a criminal investigation and prosecu-
tion. These are the chief aims of the chapter.
Defining Criminal Liability Before private security operatives can intelligently detect or enforce criminal behavior,
they must master the essential elements of the alleged criminal behavior. More particu-
larly, the industry must focus on the crimes more likely encountered by its field
personnel.
Every crime consists of two basic elements:
1. The criminal act: actus reus
2. The mental intent: mens rea
Taking these elements into consideration, guilt under nearly all criminal offenses
calls for proof of both the act itself and the mind that triggers, intends, or prompts the
act. In the mental faculty requirement, the actor must do more than merely act, but con-
template upon the act before its commission and present some sort of mental intention-
ality. One without the other is bound to lead to failure in the American conception of
criminal culpability.
In some intellectual circles there is a third element—namely, causation, which
demands proof that the act and the mind together, working in consort, lead to a
220 PRIVATE SECURITY AND THE LAW
Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:20:29.
C op
yr ig
ht ©
2 01
1. E
ls ev
ie r S
ci en
ce &
T ec
hn ol
og y.
A ll
rig ht
s re
se rv
ed .
particular consequence. While not necessarily central to every criminal advocacy, it is
wise to consider the question of whether a criminal’s mind prompted a particular act
that in turn caused a particular harm or injury. This is a thumbnail sketch of the criminal
definition.
The Criminal Act (Actus Reus)
Not unexpectedly, criminal liability cannot attach without a deed, an act, an offense, or
an omission of specifically enumerated conduct. Crimes are not inventions or fantasies
but real human activity. Merely thinking about crimes, with rare exceptions, is not crim-
inally punishable. Thoughts, no matter how bizarre or perverted, are not punishable
unless put into effect. Thus, in order to be found guilty of theft, an individual has to take
overt steps toward the unlawful taking of another’s property. He or she may think obses-
sively about the desire to be in possession of some object, but until some overt act or
course of conduct is chosen and put into effect, there is no actus reus.1 Hence, every
criminal construction insists on an act of some sort.
A criminal act must be a voluntary act. The law does not hold accountable those indi-
viduals who are mentally incapacitated or operating against their will, by either duress
or coercion, or suffering from a related or corollary disease or mental defect that substan-
tially impacts the mental faculty.2 The American Law Institute’s Model Penal Code, in its
proposed 1962 draft, defines the nature of a voluntary act for criminal liability purposes:
Requirement of Voluntary Act; Admission as Basis of Liability; Possession Is an Act.
(1) A person is not guilty of an offense unless his liability is based on conduct which
includes a voluntary act or the omission to perform an act of which he is
physically capable.
(2) The following are not voluntary acts within the meaning of this Section.
(a) a reflex or convulsion;
(b) a bodily movement during unconsciousness or sleep;
(c) conduct during hypnosis or resulting from hypnotic suggestion;
(d) a bodily movement that otherwise is not a product of the effort or
determination of the actor, either conscious or habitual.
(3) Liability for the commission of an offense may not be based on an omission
unaccompanied by action unless;
(a) the omission is expressly made sufficient by the law defining the offense; or
(b) the duty to perform the omitted act is otherwise imposed by law.3
Criminal liability does not attach unless the prosecution can demonstrate an act that
is voluntary and not the result of unintentional, accidental, or nonvolitional circum-
stances. Acts by omission—that is, a failure to act when the law so dictates, such as
the case of a parent who neglects his child or fails to save the child when in peril—are
also within the definition of actus reus.4 In this sense, acts fall into two categories: com-
mission and omission.
Chapter 6 • Collection, Preservation, and Interpretation of Evidence 221
Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:20:29.
C op
yr ig
ht ©
2 01
1. E
ls ev
ie r S
ci en
ce &
T ec
hn ol
og y.
A ll
rig ht
s re
se rv
ed .
n n n
For a fascinating report on how federal codes are eroding the requirements of a mental state,
read the Heritage Foundation’s report at http://www.heritage.org/research/reports/2010/05/
the-criminal-intent-report-congress-is-eroding-the-mens-rea-requirement-in-federal-
criminal-law.
n n n
An incident report form, like Figure 6.1,5 aids the security investigator in determining
the nature of the act.
The Criminal Mind (Mens Rea)
Determining the state of one’s mind, the mens rea, is a much more complicated exercise
than the proof of a criminal act. It has long been a major tenet of American jurispru-
dence that persons not in control of their mind or fully functional in mental state are
less likely to be criminally responsible. Subjectively or objectively appraising what is in
a person’s mind can be gleaned from the facts themselves, the corpus delicti, the state-
ments and comments of the actor by oral or written form, as well as psychological and
psychiatric evidence. All of these conclusions must be linked to the crime in question.
While most scholars and academics concede that there is such a thing as mens rea, it
is, nevertheless, very subjective and difficult to prove.6 That a defendant may intend
the general consequences of a certain action is clear, but how intensely the person actu-
ally desires to cause harm and the actual injury level the individual intends is harder to
quantify.
Consider the various descriptive adjectives and adverbs that are utilized to describe a
person’s state of mind:
• Felonious intent
• Criminal intent
• Malice aforethought
• Premeditated
• Guilty knowledge
• Fraudulent intent
• Willful with scienter
• With guilty knowledge
• Maliciously
• Viciously
• Intentionally
• With gross disregard
• With depraved heart
• With an evil purpose
• Wantonly
222 PRIVATE SECURITY AND THE LAW
Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:20:29.
C op
yr ig
ht ©
2 01
1. E
ls ev
ie r S
ci en
ce &
T ec
hn ol
og y.
A ll
rig ht
s re
se rv
ed .
FIGURE 6.1 Incident Report.
Chapter 6 • Collection, Preservation, and Interpretation of Evidence 223
Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:20:29.
C op
yr ig
ht ©
2 01
1. E
ls ev
ie r S
ci en
ce &
T ec
hn ol
og y.
A ll
rig ht
s re
se rv
ed .
• Lawfully
• Without justification
• With a corrupted mind
• Criminally negligent
• With disregard for human life
• With depraved indifference
• Without moral turpitude
• Without justification
• Overtly
• With mischievous intent7
Admittedly, these terms can never fully describe the actor’s mind, but at best they
imply the conduct’s level of intentionality. Mens rea codifications attempt to catego-
rize malefactors and their respective mental states, although this is an imperfect
exercise.
n n n
Evaluate the Power Point presentation from the University of North Texas at http://pacs.unt
.edu/criminal-justice/Course_Pages/CJUS_2100/2100chapter2.ppt#329,10,Slide 10.
n n n Diverse descriptive states of culpability have been encompassed in the Model Penal
Code. Some portions are reproduced as follows:
General Requirements of Culpability.
(1) Minimum Requirements of Culpability. Except as provided in Section 2.05, a person
is not guilty of an offense unless he acted purposely, knowingly, recklessly or
negligently as the law may require, with respect to each material element of the
offense.
(2) Kinds of Culpability Defined.
(a) Purposely.
A person acts purposely with respect to a material element of an offense
when:
(i) if the element involves the nature of his conduct or a result thereof, it is his
conscious object to engage in conduct . . .
(ii) if the element involves the attendant circumstances, he is aware of the
existence of such circumstances . . .
(b) Knowingly.
A person acts knowingly with respect to a material element of an offense
when:
(i) if the element involved the nature of his conduct or the attendant
circumstances, he is aware that his conduct is of that nature or he knows
such circumstances exist; and
224 PRIVATE SECURITY AND THE LAW
Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:20:29.
C op
yr ig
ht ©
2 01
1. E
ls ev
ie r S
ci en
ce &
T ec
hn ol
og y.
A ll
rig ht
s re
se rv
ed .
(ii) if the element involves the result of his conduct he is aware that it is
practically certain that his conduct will cause such a result.
(c) Recklessly.
A person acts recklessly with respect to a material element of an offense when he
consciously disregards a substantial and unjustifiable risk that the material element
exists or will result from his conduct. . . .
(d) Negligently.
A person acts negligently with respect to a material element of an offense when he
should be aware of a substantial and unjustifiable risk that the material element
exists or will result from his conduct.8
Security professionals should be vigilant in their assessment of facts and conditions
at a crime scene because conduct can be explained in more than one way. Instead of
always assuming a crime occurred, look for secondary explanations, such as mistake
of fact or law regarding a right to property; inadvertent entry rather than an unlawful
trespass; or an act of self-defense rather than an offensive touching. Security investiga-
tors and officers must not assume that the act is coupled with a criminal mind. Neither
the act nor the mind alone will suffice since “criminal liability is predicated upon a
union of act and intent or criminal negligence.”9
Classification of Criminal Offenses and Related Penalties Common law and statutory guidelines also characterize criminal behavior into various
classifications or types. Those classifications generally include the following:
• Felony10
• Misdemeanor11
• Summary offense12
• Treason13 and other infamous crimes
The security industry’s concern will be the detection and apprehension of misdemea-
nants and felons whose crimes constitute the basic menu of criminal charges including
assault, battery, theft and related property offenses, sexual offenses, intimidation and
harassment, and white-collar crime including forgery, credit card fraud, and the like.
Treason and other infamous crimes emerge in cases of international terrorism and
homeland security, and given the rising influence of private sector justice in the global
war on terror, they should give rise to more involvement. The entire airspace industry
is dependent on personnel not only trained in security issues but also the criminal
law issues that surround breaches of security at airport facilities. Shoplifting and retail
theft may be designated a “summary” offense. Summary offenses generally consist of
public order violations, including failure to pay parking tickets, creating a temporary
Chapter 6 • Collection, Preservation, and Interpretation of Evidence 225
Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:20:29.
C op
yr ig
ht ©
2 01
1. E
ls ev
ie r S
ci en
ce &
T ec
hn ol
og y.
A ll
rig ht
s re
se rv
ed .
obstruction in a public place, public intoxication, or other offenses of a less serious
nature that are rarely punishable by a term of imprisonment14 but are regularly
witnessed by the security professional, like lower-level shoplifting.
At common law, the designation of an act as a felony constituted an extremely seri-
ous offense. Penal and correctional response to felony behavior included the death pen-
alty and forfeiture of all lands, goods, and other personal property. Generally, a felony
was any capital offense, namely, murder, manslaughter, rape, sodomy, robbery, larceny,
arson, burglary, mayhem, and other violent conduct.15 An alternative way of defining a
felony was the severity of its corresponding punishment. Felony was defined “to mean
offenses for which the offender, on conviction, may be punished by death or imprison-
ment in the state prison or penitentiary; but in the absence of such statute the word is
used to designate such serious offenses as were formally punishable by death, or by for-
feiture of the lands or goods of the offender.”16 In other words, a crime could be a felony
or a misdemeanor not because of its severity or subsequent impact but because of the
term of incarceration. Modern criminal analysis shows confused and perplexing legisla-
tive decision making on the nature of a felony and a misdemeanor. The President’s
Commission on Law Enforcement and Administration of Justice, in its Task Force Report
on the Courts,17 relates:
A study of the Oregon Penal Code revealed that 1,413 criminal statutes contained a
total of 466 different types and lengths of sentences. The absence of legislative atten-
tion to the whole range of penalties may also be demonstrated by comparisons
between certain offenses. A recent study of the Colorado Statutes disclosed that a
person convicted of a first degree murder must serve ten (10) years before becoming
eligible for parole, while a person convicted of a lesser degree of the same offense
must serve at least fifteen (15) years; destruction of a house with fire is punishable
by a maximum twenty (20) years imprisonment, but destruction of a house with
explosives carries a ten (10) year maximum. In California, an offender who breaks
into an automobile to steal the contents of the glove compartment is subject to a fif-
teen (15) year maximum sentence but if he stole the car itself, he would face a max-
imum ten (10) year term.
Although each offense must be defined in a separate statutory provision, the num-
ber and variety of sentencing distinctions which result when legislatures prescribe a
separate penalty for each offense are among the main causes of the anarchy in sen-
tencing that is so widely deplored.18
In defining the term “misdemeanor,” legislatures and jurists use a process of elimina-
tion holding that an offense not deemed a felony is, deductively, a misdemeanor. Usually
misdemeanors are offenses punishable by less than a year’s incarceration. The popular
perception that misdemeanors are not serious offenses may be a faulty impression.
Criminal codes surprise even the most seasoned justice practitioner, who frequently
226 PRIVATE SECURITY AND THE LAW
Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:20:29.
C op
yr ig
ht ©
2 01
1. E
ls ev
ie r S
ci en
ce &
T ec
hn ol
og y.
A ll
rig ht
s re
se rv
ed .
finds little logic in an offense’s definition, resulting classification, and corresponding
punishment. For examples of this confusion, review selected state code provisions on
“sexual offenses.”19
Specific Types of Crimes and Offenses
Offenses against the Person
Felonious Homicide The security industry cannot avoid the ravages of criminal homicide, and in fact,
because of the improper use of weaponry or mistaken identity, it is sometimes the
accused. Criminal acts of homicide are being recorded because of the installation,
maintenance, and operational oversight of electronic surveillance systems and other
technological equipment utilized to protect the internal and external premises of
businesses. As the public sector continues to transfer and privatize many of its tradi-
tionally public police functions, such as in the area of courtroom and prison security,
violent acts of homicide are unfortunately replayed. Airport terrorism, failed executive
protection programs, and attempted or actual homicides on armored car money car-
riers are other distressing examples of criminal homicide. This subsection deals only
with felonious acts of homicide, and the security professional is reminded that non-
culpable homicide occurs in cases of self-defense, necessity in time of war, or by legal
right, authority, or privilege.20 Criminal homicide is defined by the Model Penal Code
as follows:
(1) A person is guilty of criminal homicide if he purposely, knowingly, recklessly
or negligently causes the death of another human being.
(2) Criminal homicide is murder, manslaughter or negligent homicide.21
The Model Penal Code, after this general legislative introduction, precisely defines each
type of homicide.
Murder A charge of murder will be upheld when,
(a) it is committed purposely or knowingly; or
(b) it is committed recklessly under circumstances manifesting extreme indifference to
the value of human life. Such recklessness and indifference are presumed if the
actor is engaged or is an accomplice in the commission of, or an attempt to commit,
or flight after committing or attempting to commit robbery, rape, deviate sexual
intercourse by force or threat of force, arson, burglary, kidnapping or felonious
escape.22
The code as suggested requires a high level of mental faculty. While the law of criminal
intent varies, most major capital offenses require what is known as specific intent.23
Chapter 6 • Collection, Preservation, and Interpretation of Evidence 227
Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:20:29.
C op
yr ig
ht ©
2 01
1. E
ls ev
ie r S
ci en
ce &
T ec
hn ol
og y.
A ll
rig ht
s re
se rv
ed .
Specific intent can be loosely described as premeditation or a mind possessive of malice
aforethought. In other words, the criminal actor wants, desires, wishes, knows, and realizes
the ramifications and repercussions of his or her activity. Although the law does not require
an intelligent or an esoteric thinker, there is a clear, lucid mindset operating. The level of
mind required for a charge of murder was clearly discerned in a Michigan case, People v.
Moran:24
Malice aforethought is the intention to kill, actual or implied, under circumstances
which do not constitute excuse or justification or mitigate the degree of the offense
of manslaughter. The intent to kill may be implied where the actor actually intends
to inflict great bodily harm or the natural tendency of his behavior is to cause death
or great bodily harm.25
Despite the legal attempts to objectify mental intentions, there will always be subjective
underpinnings. The security practitioner must gauge conduct in light of all circum-
stances. He or she must ask him or herself whether the facts of a given case lead a rea-
sonable person to the conclusion that the person not only knew what he or she was
doing but wished both the method and the end result.
Manslaughter Less crystalline as to intentionality, criminal codifications make room for a mindset
that is impacted or effected by mitigation and other external forces. In homicide,
the crime that fits this description is manslaughter. Most jurisdictions further grade
felonious homicide into another central category: voluntary or involuntary man-
slaughter.26 While specific intent is always required for a charge of murder, except
in cases of strict liability such as cop killing and felonious homicide, actions and con-
duct that are not as intellectually precise, not as free from influential mitigating fac-
tors and provocation, sometimes qualify for a less rigorous mental state, that of
general intent.27 This is not to say that some jurisdictions do not have a specific
intent requirement for a manslaughter charge, for there are diverse ways of classifying
the mind in the law of manslaughter. For the most part, a charge of manslaughter,
whether voluntary or involuntary, has a significantly smaller burden of proof regard-
ing the actor’s objective state of mind. This distinct language is readily discoverable in
the following statute:
2503 Voluntary Manslaughter
(a) General rule—A person who kills an individual without lawful justification
commits voluntary manslaughter if at the time of the killing he is acting under
a sudden and intense passion resulting from serious provocation by:
(1) the individual killed; or
(2) another whom the actor endeavors to kill, but he negligently or accidentally
causes the death of the individual killed.28
228 PRIVATE SECURITY AND THE LAW
Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:20:29.
C op
yr ig
ht ©
2 01
1. E
ls ev
ie r S
ci en
ce &
T ec
hn ol
og y.
A ll
rig ht
s re
se rv
ed .
2504 Involuntary Manslaughter
(a) General rule—A person is guilty of involuntary manslaughter when as a direct
result of the doing of an unlawful act in a reckless or grossly negligent manner, or
the doing of a lawful act in a reckless or grossly negligent manner, he causes the
death of another person.29
Compared to the murder statute, the language of the voluntary manslaughter provi-
sion permits an evaluation of various mitigating circumstances including provocation,
intense and emotional passion, and sudden and impetuous events.30 In involuntary
cases, the issue of gross negligence is appropriately weighed. In these cases, the court
instructs the jury on the negligent nature of the act that causes harm. The defendant
need not specifically intend the commission of any crime but could have or should have
known the consequences. These are acts, mistaken and accidental in nature, unrespon-
sive to others. Cases of automobile manslaughter or the mishandling of weapons while
in a drunken stupor are good examples.31
In security settings, manslaughter is a more common event, particularly since practi-
tioners are often called upon in hostile crowd control situations, in the maintenance of
order at special events, and for related activities.
n n n
Read and interpret a California vehicular manslaughter law at http://dmv.ca.gov/pubs/vctop/
appndxa/penalco/penco191_5.htm.
n n n
Felony Murder Rule Whether the jurisdiction has a felony murder rule (FMR) in operation is another secu-
rity industry concern since the charge has far-reaching tentacles that pull in all opera-
tives acting in consort with one another. Hence, if a team of four security officers are on
a stakeout and one of them unlawfully shoots another, even one of the officers,
and lacks the privilege or right to do so, all will be held accountable. One of the
officers would have to be engaged in felonious conduct. As outlined in the Code Section
210.1(a) above on criminal homicide, a charge of murder is appropriate when any indi-
vidual dies during the commission of any major capital felony.32 Co-conspirators,
accomplices, or other individuals, even though they did not pull the trigger, plan the
murder, or personally wish or desire for the death of another, can be felony murderers.
Hence, bank robbers or home invaders committing burglary, causing the death of any
party, whether it be responding police, inhabitants, or even the partners in crime, will
trigger the FMR.
The felony murder rule has been the subject of severe legal challenges in recent
years. “There has been a discernible but not universal trend towards limiting the felony
murder doctrine. The trend seems to be related to increasing skepticism as the extent to
which the felony murder rule in fact serves a legitimate function or at least as to whether
it serves its function or functions at an acceptable cost.”33 The most heated debate
Chapter 6 • Collection, Preservation, and Interpretation of Evidence 229
Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:20:29.
C op
yr ig
ht ©
2 01
1. E
ls ev
ie r S
ci en
ce &
T ec
hn ol
og y.
A ll
rig ht
s re
se rv
ed .
occurs when two or more persons are engaged in a theft, robbery, or burglary, obviously
less serious offenses than murder or manslaughter, and someone dies by accident or
negligence.34 However, the strict liability nature of the felony murder rule forces crim-
inals to think of the possible potential ramifications of their behavior, which surely
includes the death of the participants and bystanders, during the commission of a felo-
nious act.35
n n n
There are groups and associations solely dedicated to elimination of the Felony Murder Rule.
See Felonymurder.org at: http://felonymurder.org.
n n n
Assault Aside from theft actions, security officers witness no other crime as regularly as assault
and battery. In Chapter 4, readers were introduced to the concept of assault in a
civil sense, although there is a corresponding criminal definition as well. At common
law, assault and battery were separate offenses, the former being a threat to touch
or harm and the latter being the actual offensive touching. Most jurisdictions
have merged the offenses, at least in a criminal context, while still distinguishing the
offenses by severity and degree. The Model Penal Code poses the following
construction:
(1) Simple Assault. A person is guilty of assault if he:
(a) attempts to cause or purposely, knowingly or recklessly causes bodily injury to
another; or
(b) negligently causes bodily injury to another with a deadly weapon; or
(c) attempts by physical menace to put another in fear of imminent serious
bodily harm.
(2) Aggravated Assault. A person is guilty of aggravated assault if he:
(a) attempts to cause serious bodily injury to another, or causes such injury
purposely, knowingly or recklessly under circumstances manifesting extreme
indifference to the value of human life; or
(b) attempts to cause or purposely or knowingly causes bodily injury to another
with a deadly weapon.36
Most security specialists will encounter the crimes known as assault. Efforts to
control crowds, secure buildings and installations, apprehend or detain a disgruntled
employee, break up disputants in commercial establishments, and handle unruly
and disgruntled shoppers in retail establishments are ripe settings to encounter
assailants.
Assault can be an extremely serious offense, particularly under the “aggravated” pro-
vision.37 In fact, some jurisdictions have adopted reckless endangerment,38 a new statu-
tory design that describes even more severe conduct. See the following example:
230 PRIVATE SECURITY AND THE LAW
Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:20:29.
C op
yr ig
ht ©
2 01
1. E
ls ev
ie r S
ci en
ce &
T ec
hn ol
og y.
A ll
rig ht
s re
se rv
ed .
(3) A person acts recklessly with respect to a material element of an offense when he
consciously disregards a substantial and unjustifiable risk that the material element
exists or will result from his conduct.
The risk must be of such a nature and degree that, considering the nature and
intent of the actor’s conduct and the circumstances known to him, its disregard
involves a gross deviation from the standard of conduct that a reasonable person
would observe in the actor’s situation.39
Assaults are now a recurring concern for security officers working in domestic and
international terrorism. It behooves security policymakers and planners to educate
themselves as well as their staff on these criminal acts and corresponding statutes:
• Terrorist threats
• Use of tear gas or other noxious substances
• Harassment
• Ethnic intimidation40
Proof of an assault may or may not require proof of physical injuries. Any injuries
alleged can be recorded in the personal injury report shown in Figure 6.2.41
Kidnapping and False Imprisonment Kidnapping and false imprisonment actions are relevant to the security industry
because of its heavy involvement in executive protection and counterterrorism. Political
figures, military commanders and state guests, as well as traditional celebrities, provide
instant targets for our enemies.
Kidnapping consists of the unlawful confinement or restraint of a victim, with an
accompanying movement or transportation, for the purpose of ransom, political benefit
or other motivation, including the desire to inflict harm. The Model Penal Code sets out
the essential elements:
A person is guilty of kidnapping if he unlawfully removes another from his place of
residence or business, or a substantial distance from the vicinity where he is found,
or if he unlawfully confines another for a substantial period in a place of isolation,
with any of the following purposes:
(a) to hold for ransom or reward, or as a shield or hostage; or
(b) to facilitate commission of any felony or flight thereafter; or
(c) to inflict bodily injury on or to terrorize the victim or another; or
(d) to interfere with the performance of any government or political function.42
While most of this codification is clear on its face, legal scholars and advocates fre-
quently contest the transportation or “carrying away” requirement. Modern interpretation,
Chapter 6 • Collection, Preservation, and Interpretation of Evidence 231
Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:20:29.
C op
yr ig
ht ©
2 01
1. E
ls ev
ie r S
ci en
ce &
T ec
hn ol
og y.
A ll
rig ht
s re
se rv
ed .
FIGURE 6.2 Personal Injury Report Form.
232 PRIVATE SECURITY AND THE LAW
Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:20:29.
C op
yr ig
ht ©
2 01
1. E
ls ev
ie r S
ci en
ce &
T ec
hn ol
og y.
A ll
rig ht
s re
se rv
ed .
which is generally rather liberal, rejects the view of geographic transfer that is from
one locale to another and adopts the “any movement” standard as being sufficient.43
Kidnapping is usually coupled with false imprisonment and rightfully so. Security profes-
sionals who detain or restrict themovements of a consumer in retail settings, unprotected by
merchants’ privilege or other statutory immunitymay be criminally liable for false imprison-
ment. False imprisonment is both a civil and criminal action. Here is a typical construction:
A person commits a misdemeanor if he knowingly restrains another unlawfully so
as to interfere substantially with his liberty.44
Any security-based investigation, whereby a suspect’s freedom to move is abridged,
rightly or wrongly, can give rise to the claim of false imprisonment. Kelley V. Rea, a prin-
cipal in the security firm Legal and Security Services, Ltd., highlights this ongoing risk.
We also continue to read a surprising number of cases, arising out of investigations,
with allegations of false imprisonment and infliction of emotional distress. Where a
person is held against his or her will or where that person is subjected to “outra-
geous” conduct, such charges may arise. Conducting an “interview” that lasts more
than an hour and giving the person interviewed the impression that he or she is not
free to leave may trigger a charge of false imprisonment. Long, tough, threatening
questioning, particularly if physical threats are made or physical force used, will
often lead to infliction of emotional distress allegations.45
Aside from the physical harm, pain and suffering awards for psychic damages tend to
be fairly generous when the confinement and detention is without justification.46 The
litigiousness of making an accusation or claim should at least prompt a cautious
approach on the security claim operative. In cases of criminal conduct, it may be sound
to completely turn over the case to public law enforcement.
n n n
For a series of damage awards in civil actions for false imprisonment, see http://www.jvra
.com/verdict_trak/professional.aspx?page¼2&search¼491. n n n
Sexual Offenses Those entrusted with the task of ensuring safe business and industrial environments
now must consider the ramifications of illegal sexual interaction between employers
and employees and the increasing sexual victimization of guests, invitees, or licensees
on the premises. The investigation and identification of sexual misconduct in the work-
place is a major security responsibility. So too in the prison environment, where private
prisons operated by private personnel play a central role in providing a safe environ-
ment. Most states provide levels of protections and corresponding liability for failure
Chapter 6 • Collection, Preservation, and Interpretation of Evidence 233
Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:20:29.
C op
yr ig
ht ©
2 01
1. E
ls ev
ie r S
ci en
ce &
T ec
hn ol
og y.
A ll
rig ht
s re
se rv
ed .
to provide. See Figure 6.3,47 which charts 50 jurisdictions. Negligent hiring and supervi-
sion cases are frequently based on the failure of supervision and oversight when hiring
or disciplining employees who engage in sexual offenses.48
n n n
The American University Law School runs a clearinghouse that announces litigation relating
to civil actions and awards in prison settings for sexual abuse. Visit http://www.wcl.american
.edu/nic/AnEndtoSilenceYearinNews2008.cfm.
n n n
The tragic violence of rape and aggravated sexual assault will, can, and does occur in
any social, commercial, or business setting.49
The Model Penal Code’s sample statute is outlined as follows:
(1) Rape. A male who has sexual intercourse with a female not his wife is guilty of rape if:
(a) he compels her to submit by force or by threat of imminent death, serious bodily
injury, extreme pain or kidnapping, to be inflicted on anyone; or
(b) he has substantially impaired her power to appraise or control her conduct by
administering or employing without her knowledge drugs, intoxicants, or other
means for the purpose of preventing resistance; or
(c) the female is unconscious; or
(d) the female is less than ten (10) years old.50
While the Model Penal Code lays out the generic elements of sexual offenses, since
the 1970s we have witnessed extraordinary efforts to either reform or expand statutory
coverage. Proponents of rape law reform have successfully created sexual offense legis-
lation that is gender neutral, that does not require a traditional vaginal and penal con-
tact, and does not weigh the substantiality of victim resistance.51
In business and commercial settings, cases of indecent assault or indecent exposure
are not atypical. A representative statute from Pennsylvania covers the standard language:
Indecent assault. A person who has indecent contact with another not his spouse, or
causes such other to have indecent contact with him is guilty of indecent assault, a
misdemeanor of the second degree, if:
(1) the person does so without the complainant’s consent;
(2) the complainant is unconscious or the person knows that the complainant is
unaware that the indecent contact is occurring;
(3) the complainant suffers from a mental disability which renders the complainant
incapable of consent;52
Indecent exposure.
(a) OFFENSE DEFINED—A person commits indecent exposure if that person
exposes his or her genitals in any public place or in any place where there are
present other persons under circumstances in which he or she knows or should
know that this conduct is likely to offend, affront or alarm.
234 PRIVATE SECURITY AND THE LAW
Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:20:29.
C op
yr ig
ht ©
2 01
1. E
ls ev
ie r S
ci en
ce &
T ec
hn ol
og y.
A ll
rig ht
s re
se rv
ed .
FIGURE 6.3 Checklist of State Criminal Laws Prohibiting the Sexual Abuse of Persons in Custody.
(Continued)
C h a p ter
6 • C o lle
c tio
n , P re se rv a tio
n , a n d In te rp re ta tio
n o f E v id e n c e
2 3 5
N em
eth, C . (2011). P
rivate security and the law . P
roQ uest E
book C entral <a onclick=w
indow .open('http://ebookcentral.proquest.com
','_blank') href='http://ebookcentral.proquest.com
' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com </a>
C reated from
apus on 2020-10-13 13:20:29.
Copyright © 2011. Elsevier Science & Technology. All rights reserved.
FI G U R E 6 .3 — C o n t’ d
236 PRIVATE SECURITY AND THE LAW
Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:20:29.
C op
yr ig
ht ©
2 01
1. E
ls ev
ie r S
ci en
ce &
T ec
hn ol
og y.
A ll
rig ht
s re
se rv
ed .
FI G U R E 6 .3 — C o n t’ d
(C o n ti n u e d )
Chapter 6 • Collection, Preservation, and Interpretation of Evidence 237
Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:20:29.
C op
yr ig
ht ©
2 01
1. E
ls ev
ie r S
ci en
ce &
T ec
hn ol
og y.
A ll
rig ht
s re
se rv
ed .
FI G U R E 6 .3 — C o n t’ d
238 PRIVATE SECURITY AND THE LAW
Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:20:29.
C op
yr ig
ht ©
2 01
1. E
ls ev
ie r S
ci en
ce &
T ec
hn ol
og y.
A ll
rig ht
s re
se rv
ed .
FI G U R E 6 .3 — C o n t’ d
(C o n ti n u e d )
Chapter 6 • Collection, Preservation, and Interpretation of Evidence 239
Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:20:29.
C op
yr ig
ht ©
2 01
1. E
ls ev
ie r S
ci en
ce &
T ec
hn ol
og y.
A ll
rig ht
s re
se rv
ed .
FI G U R E 6 .3 — C o n t’ d
240 PRIVATE SECURITY AND THE LAW
Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:20:29.
C op
yr ig
ht ©
2 01
1. E
ls ev
ie r S
ci en
ce &
T ec
hn ol
og y.
A ll
rig ht
s re
se rv
ed .
FI G U R E 6 .3 — C o n t’ d
(C o n ti n u e d )
Chapter 6 • Collection, Preservation, and Interpretation of Evidence 241
Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:20:29.
C op
yr ig
ht ©
2 01
1. E
ls ev
ie r S
ci en
ce &
T ec
hn ol
og y.
A ll
rig ht
s re
se rv
ed .
FI G U R E 6 .3 — C o n t’ d
242 PRIVATE SECURITY AND THE LAW
Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:20:29.
C op
yr ig
ht ©
2 01
1. E
ls ev
ie r S
ci en
ce &
T ec
hn ol
og y.
A ll
rig ht
s re
se rv
ed .
FI G U R E 6 .3 — C o n t’ d
(C o n ti n u e d )
Chapter 6 • Collection, Preservation, and Interpretation of Evidence 243
Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:20:29.
C op
yr ig
ht ©
2 01
1. E
ls ev
ie r S
ci en
ce &
T ec
hn ol
og y.
A ll
rig ht
s re
se rv
ed .
FI G U R E 6 .3 — C o n t’ d
244 PRIVATE SECURITY AND THE LAW
Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:20:29.
C op
yr ig
ht ©
2 01
1. E
ls ev
ie r S
ci en
ce &
T ec
hn ol
og y.
A ll
rig ht
s re
se rv
ed .
FI G U R E 6 .3 — C o n t’ d
(C o n ti n u e d )
Chapter 6 • Collection, Preservation, and Interpretation of Evidence 245
Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:20:29.
C op
yr ig
ht ©
2 01
1. E
ls ev
ie r S
ci en
ce &
T ec
hn ol
og y.
A ll
rig ht
s re
se rv
ed .
FI G U R E 6 .3 — C o n t’ d
246 PRIVATE SECURITY AND THE LAW
Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:20:29.
C op
yr ig
ht ©
2 01
1. E
ls ev
ie r S
ci en
ce &
T ec
hn ol
og y.
A ll
rig ht
s re
se rv
ed .
FI G U R E 6 .3 — C o n t’ d
(C o n ti n u e d )
Chapter 6 • Collection, Preservation, and Interpretation of Evidence 247
Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:20:29.
C op
yr ig
ht ©
2 01
1. E
ls ev
ie r S
ci en
ce &
T ec
hn ol
og y.
A ll
rig ht
s re
se rv
ed .
FI G U R E 6 .3 — C o n t’ d
248 PRIVATE SECURITY AND THE LAW
Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:20:29.
C op
yr ig
ht ©
2 01
1. E
ls ev
ie r S
ci en
ce &
T ec
hn ol
og y.
A ll
rig ht
s re
se rv
ed .
FI G U R E 6 .3 — C o n t’ d
(C o n ti n u e d )
Chapter 6 • Collection, Preservation, and Interpretation of Evidence 249
Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:20:29.
C op
yr ig
ht ©
2 01
1. E
ls ev
ie r S
ci en
ce &
T ec
hn ol
og y.
A ll
rig ht
s re
se rv
ed .
FI G U R E 6 .3 — C o n t’ d
250 PRIVATE SECURITY AND THE LAW
Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:20:29.
C op
yr ig
ht ©
2 01
1. E
ls ev
ie r S
ci en
ce &
T ec
hn ol
og y.
A ll
rig ht
s re
se rv
ed .
FI G U R E 6 .3 — C o n t’ d
(C o n ti n u e d )
Chapter 6 • Collection, Preservation, and Interpretation of Evidence 251
Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:20:29.
C op
yr ig
ht ©
2 01
1. E
ls ev
ie r S
ci en
ce &
T ec
hn ol
og y.
A ll
rig ht
s re
se rv
ed .
FI G U R E 6 .3 — C o n t’ d
252 PRIVATE SECURITY AND THE LAW
Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:20:29.
C op
yr ig
ht ©
2 01
1. E
ls ev
ie r S
ci en
ce &
T ec
hn ol
og y.
A ll
rig ht
s re
se rv
ed .
FI G U R E 6 .3 — C o n t’ d
(C o n ti n u e d )
Chapter 6 • Collection, Preservation, and Interpretation of Evidence 253
Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:20:29.
C op
yr ig
ht ©
2 01
1. E
ls ev
ie r S
ci en
ce &
T ec
hn ol
og y.
A ll
rig ht
s re
se rv
ed .
FI G U R E 6 .3 — C o n t’ d
254 PRIVATE SECURITY AND THE LAW
Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:20:29.
C op
yr ig
ht ©
2 01
1. E
ls ev
ie r S
ci en
ce &
T ec
hn ol
og y.
A ll
rig ht
s re
se rv
ed .
FI G U R E 6 .3 — C o n t’ d
(C o n ti n u e d )
Chapter 6 • Collection, Preservation, and Interpretation of Evidence 255
Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:20:29.
C op
yr ig
ht ©
2 01
1. E
ls ev
ie r S
ci en
ce &
T ec
hn ol
og y.
A ll
rig ht
s re
se rv
ed .
FI G U R E 6 .3 — C o n t’ d
256 PRIVATE SECURITY AND THE LAW
Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:20:29.
C op
yr ig
ht ©
2 01
1. E
ls ev
ie r S
ci en
ce &
T ec
hn ol
og y.
A ll
rig ht
s re
se rv
ed .
FI G U R E 6 .3 — C o n t’ d
Chapter 6 • Collection, Preservation, and Interpretation of Evidence 257
Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:20:29.
C op
yr ig
ht ©
2 01
1. E
ls ev
ie r S
ci en
ce &
T ec
hn ol
og y.
A ll
rig ht
s re
se rv
ed .
(b) GRADING—If the person knows or should have known that any of the persons
present are less than 16 years of age, indecent exposure under subsection (a) is a
misdemeanor of the first degree. Otherwise, indecent exposure under subsection
(a) is a misdemeanor of the second degree.53
Security companies charged with these types of investigations must memorialize
complaints in document form. See Figure 6.4.54 Cases of sexual harassment are unfortu-
nately recurring phenomena for security advisors and consultants. To ferret out the
ruses from the legitimate cases of sexual harassment, employ the evaluation checklist
shown in Figure 6.5.55
FIGURE 6.4 Sexual Harassment Complaint Form.
258 PRIVATE SECURITY AND THE LAW
Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:20:29.
C op
yr ig
ht ©
2 01
1. E
ls ev
ie r S
ci en
ce &
T ec
hn ol
og y.
A ll
rig ht
s re
se rv
ed .
FIGURE 6.5 Sexual Harassment Evaluation Checklist.
(Continued)
Chapter 6 • Collection, Preservation, and Interpretation of Evidence 259
Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:20:29.
C op
yr ig
ht ©
2 01
1. E
ls ev
ie r S
ci en
ce &
T ec
hn ol
og y.
A ll
rig ht
s re
se rv
ed .
Offenses against the Habitation and Other Buildings
The security industry is entrusted with the protection of homes, business and commer-
cial buildings, and residential settings. Whether by direct patrol or technological surveil-
lance, the industry is increasingly controlling the safety of private residences and
business settings.56
Arson Industrial and business concerns have a grave interest in the protection of their assets
and real property from arsonists.57 Around-the-clock security systems, surveillance sys-
tems, and electronic technology have done much to aid private enterprise in the protec-
tion of its interests.58
Arson, as defined in the Model Penal Code, includes the following provisions:
Arson. A person is guilty of arson, a felony of the second degree, if he starts a fire or
causes an explosion with the purpose of:
(a) destroying a building or occupied structure of another; or
(b) destroying or damaging any property, whether his own or another’s, to collect
insurance for such loss.59
Judicial interpretation of arson statutes has been primarily concerned with either the
definition of a “structure” or in the proof an actual burning or physical fire damage.
Structure has been broadly defined as any physical plant, warehouse, or accommoda-
tion that permits the carrying on of business or the temporary residents of persons, a
domicile, and even ships, trailers, sleeping cars, airplanes, and other movable vehicles
or structures.60 Any burning, substantial smoke discoloration and damage, charring,
the existence of alligator burn patterns, destruction and damage caused as the results
of explosives, detonation devices, and ruination by substantial heat meets the arson cri-
teria. Total destruction or annihilation is not required.61
Most jurisdictions have also adopted related offenses:
• Reckless burning or exploding
• Causing or risking a catastrophe
FIGURE 6.5—Cont’d
260 PRIVATE SECURITY AND THE LAW
Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:20:29.
C op
yr ig
ht ©
2 01
1. E
ls ev
ie r S
ci en
ce &
T ec
hn ol
og y.
A ll
rig ht
s re
se rv
ed .
• Failure to prevent a catastrophe
• Criminal mischief
• Injuring or tampering with fire apparatus, hydrants, etc.
• Unauthorized use or opening of a fire hydrant
• Institutional vandalism62
n n n
Find out about efforts of the Department of Homeland Security (DHS) and other federal
agencies to thwart arson attempts at churches and synagogues at http://www.usfa.dhs.gov/
downloads/pdf/publications/napi1.pdf.
n n n
Proving a case of arson can be made easier with Figure 6.6.63
Burglary Of major interest to the security industry is the crime of burglary, a crime whose feloni-
ous intent requires an illegal entry into a domicile or other structure for the purpose of
committing any felony therein. Clark and Marshall’s Treatise on Crimes,64 provides the
common law definition of the crime of burglary:
1. The premises must be the dwelling house of another . . .
2. There must be a breaking of some part of the house itself. The breaking must be
constructive, as well as actual.
3. There must be an entry. The slightest entry of a hand or even an instrument suffices.
4. The breaking and entering must both be at night; but need not be on the same
night.
5. There must be an intent to commit a felony in the house and such intent must
accompany both the breaking and entry. The intended felony need not be
committed.65
Statutory modification of these elements has been quite common. A definition of a
dwelling house has been liberally construed and includes a chicken coop, a cow stable,
a hog house, a barn, a smokehouse, a mill house, and any other area or any other build-
ing or occupied structure.66 The term “breaking” does not require an actual destruction
of property, merely the breaking of a plane or point of entrance into the occupied struc-
ture.67 Additionally, most jurisdictions have reassessed the nighttime determination and
made the requirement nonmandatory, though they make the time of the intrusion appli-
cable to the gradation of the offense.68
Security operatives should, as in all other forms of criminality, take steps to prevent
burglaries. See the checklist at Figure 6.7.69
Be aware that burglary is not necessarily motivated by a property offense. Appellate
decisions continually instruct that burglary’s requirement of entry be spurred on by an
intent to commit any felony.70 The benchmark question then becomes, what was the
intent of the accused at the precise time of his actual breaking and entry?71
Chapter 6 • Collection, Preservation, and Interpretation of Evidence 261
Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:20:29.
C op
yr ig
ht ©
2 01
1. E
ls ev
ie r S
ci en
ce &
T ec
hn ol
og y.
A ll
rig ht
s re
se rv
ed .
FIGURE 6.6 Total Fire Inspection Report.
(Continued)
262 PRIVATE SECURITY AND THE LAW
Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:20:29.
C op
yr ig
ht ©
2 01
1. E
ls ev
ie r S
ci en
ce &
T ec
hn ol
og y.
A ll
rig ht
s re
se rv
ed .
FIGURE 6.6—Cont’d
Chapter 6 • Collection, Preservation, and Interpretation of Evidence 263
Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:20:29.
C op
yr ig
ht ©
2 01
1. E
ls ev
ie r S
ci en
ce &
T ec
hn ol
og y.
A ll
rig ht
s re
se rv
ed .
FIGURE 6.7 Burglary Prevention Checklist.
(Continued)
264 PRIVATE SECURITY AND THE LAW
Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:20:29.
C op
yr ig
ht ©
2 01
1. E
ls ev
ie r S
ci en
ce &
T ec
hn ol
og y.
A ll
rig ht
s re
se rv
ed .
A related act that has applicability to the security environment is criminal trespass:72
Trespass
(1) Buildings and occupied structures. A person commits an offense if, knowing he is
not licensed or privileged to do so, he enters or surreptitiously remains in any
building or occupied structure or separately secured or occupied portion thereof.
An offense under this Subsection is a misdemeanor if it is committed in a
dwelling at night. Otherwise, it is a petty misdemeanor.73
To minimize burglary and trespass activity, adopt the policy considerations shown in
Figure 6.874 when conducting a facility review.
FIGURE 6.8 Hazardous Conditions Requiring Special Attention.
(Continued)
FIGURE 6.7—Cont’d
Chapter 6 • Collection, Preservation, and Interpretation of Evidence 265
Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:20:29.
C op
yr ig
ht ©
2 01
1. E
ls ev
ie r S
ci en
ce &
T ec
hn ol
og y.
A ll
rig ht
s re
se rv
ed .
FIGURE 6.8—Cont’dNemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:20:29.
C op
yr ig
ht ©
2 01
1. E
ls ev
ie r S
ci en
ce &
T ec
hn ol
og y.
A ll
rig ht
s re
se rv
ed .
Robbery The unlawful acquisition or taking of property by forceful means constitutes a robbery.75
In retail and commercial establishments, security officers and personnel are frequently
endangered by the activities of felons. Robbery is more than a property crime since it
is coupled with a violent thrust. The exact provisions of a general robbery statute
include those outlined in the Model Penal Code provision:
(1) Robbery Defined. A person is guilty of robbery if, in the course of committing a
theft, he:
(a) inflicts serious bodily injury upon another; or
(b) threatens another with or purposely puts him in fear of immediate serious
bodily injury; or
(c) commits or threatens immediately to commit any felony of the first or second
degree.
An act shall be deemed “in the course of committing a theft” if it occurs in an attempt to
commit theft or in flight after the attempt or commission.76
Distinguishing robbery from a larceny or a theft offense is not a difficult task since
both judicial interpretation and statutory definitions insist on a finding of force, vio-
lence, or a physical threat of imminent harm. Robbery can be accomplished by threats
only if the threats are of death or of great bodily injury to the victim, a member of the
victim’s family or some other relative of the victim, or someone in the victim’s presence.
Threats to damage property will not suffice, with the possible exception of a threat to
destroy a dwelling house.77 Considerations relevant to a finding of guilt in a robbery case
include whether or not the victim was actually threatened with immediate harm;
whether the force or violence exerted created substantial fear or simple apprehension
in the robbery victim;78 and whether the statutory guidelines demand that the victim
be present when the unlawful taking occurs.79
Theft or Larceny No other area of proscribed behavior affects the security practice as much as in the
crime of theft or, as it was once known at common law, larceny.80 Shoplifting is a form
of larceny and has become retail security’s central concern as it seeks to devise loss pre-
vention strategies.81
n n n
Visit and evaluate worldwide data on the scourge of property theft in the retail world at
http://www.globalretailtheftbarometer.com/pdf/grtb-2010-summary.pdf.
n n n
Stock pilferage, fraudulent accounting and record-keeping systems, embezzling of
corporate funds, and theft of benefits and services are all criminal behaviors that
Chapter 6 • Collection, Preservation, and Interpretation of Evidence 267
Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:20:29.
C op
yr ig
ht ©
2 01
1. E
ls ev
ie r S
ci en
ce &
T ec
hn ol
og y.
A ll
rig ht
s re
se rv
ed .
significantly influence the profitable nature of business and industry. In the broadest
definitional terms, larceny consists of the following characteristics:
• A taking that is unlawful
• A carrying away or movement thereafter of personal property
• Property of which the taker is not in rightful ownership or possession
• With a mens rea that is felonious
Table 6.1 outlines the requisite elements needed for a successful charge of larceny.82
Historical argument on what exactly could be the subject of a larceny is quite prolific,
from disputes about whether rabbits and fish are larcenable, or whether vegetables,
land, or the skins of deer could be the subject of theft.83 In contemporary legal parlance,
literally any type of property is potentially larcenable. Maryland delineates an extensive
list of property classifications, including the following:
(1) “Property” means anything of value.
(2) “Property” includes:
(i) real estate;
(ii) money;
(iii) a commercial instrument;
(iv) an admission or transportation ticket;
(v) a written instrument representing or embodying rights concerning anything of
value, or services, or anything otherwise of value to the owner;
(vi) a thing growing on, affixed to, or found on land, or that is part of or affixed to
any building;
(vii) electricity, gas, and water;
(viii) a bird, animal, or fish that ordinarily is kept in a state of confinement;
(ix) food or drink;
(x) a sample, culture, microorganism, or specimen;
(xi) a record, recording, document, blueprint, drawing, map, or a whole or partial
copy, description, photograph, prototype, or model of any of them;
(xii) an article, material, device, substance, or a whole or partial copy, description,
photograph, prototype, or model of any of them that represents evidence of,
reflects, or records a secret:
1. scientific, technical, merchandising, production, or management
information; or
2. designed process, procedure, formula, invention, trade secret, or improvement;
(xiii) a financial instrument; and
(xiv) information, electronically produced data, and a computer software or
program in a form readable by machine or individual.84
Aside from the requisite form, the fact finder must then consider if the claim or right
of a possessor of property for larceny is an infringement on that right to possess. One
need not own property to suffer a larceny, but one needs to be its rightful and privileged
268 PRIVATE SECURITY AND THE LAW
Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:20:29.
C op
yr ig
ht ©
2 01
1. E
ls ev
ie r S
ci en
ce &
T ec
hn ol
og y.
A ll
rig ht
s re
se rv
ed .
Table 6.1 Elements of Larceny
I. Trespassory Taking §12.06
II. Asportation §12.05
III. Personal Goods §12.01
IV. Of Another §12.01
V. Felonious Intent §12.04
A. Trespass de bonis asportatis
is the type of taking
required—at least under
such circumstances as
amount technically to a
trespass.
B. From actual or constructive
possession of owner.
C. Without owner’s consent.
D. The taking may be by means
of nonhuman agency, inno-
cent human agent, or by
hands of the thief or thieves.
E. Taking by violence from the
person of another trans-
forms this offense into
robbery.
F. Some carrying away of the
property.
G. There is sufficient asportation if
the property (III) be entirely
removed from the place it occu-
pied so that it comes under the
dominion and control of the tres-
passer though only for an instant.
H. Personal property
only; real property
excluded.
I. Must be a thing
that is recognized
in law as being
property and the
subject of
ownership.
Of some value, though
slight value to
owner will suffice.
J. Special property
in another is
sufficient even
against a gen-
eral owner.
(1) Mere pos-
session is
enough as
against
others than
the owner.
See }12.03.
K. Animus furandi must exist
both in the taking (I) and the
carrying away (II).
(1) Intent to deprive the
owner permanently of
his property in the good,
or of its value or part of
its value, viz., an intent to
steal.
(2) There must be a fraudu-
lent intent and not a
mistake or bona fide
claim of right.
L. There is minority authority
requiring that the taking
shall be lucri causa—for the
sake of gain.
C h a p ter
6 • C o lle
c tio
n , P re se rv a tio
n , a n d In te rp re ta tio
n o f E v id e n c e
2 6 9
N em
eth, C . (2011). P
rivate security and the law . P
roQ uest E
book C entral <a onclick=w
indow .open('http://ebookcentral.proquest.com
','_blank') href='http://ebookcentral.proquest.com
' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com </a>
C reated from
apus on 2020-10-13 13:20:29.
Copyright © 2011. Elsevier Science & Technology. All rights reserved.
possessor. Finally, the taking of said property must not arise from violence or force, for
to take in that fashion would call for a robbery charge over that of larceny.
The Model Penal Code’s provision on theft is fairly straightforward:
Theft by Unlawful Taking or Disposition.
(1) Moveable Property. A person is guilty of theft if he takes, or exercises
unlawful control over, moveable property of another with purpose to deprive
him thereof.
(2) Immovable Property. A person is guilty of theft if he unlawfully transfers
immovable property of another or any interest therein with the purpose to
benefit himself or another not entitled thereto.85
Security professionals should formally record any allegations of lost or stolen property in
a report format. See Figure 6.9.86
Given the diversity of property forms and the new and emerging means of taking
things or items of value, traditional larceny definitions fail to encompass these many
forms. Commentators at the American Law Institute have long advanced the need to
consolidate these diverse thefts under one codified heading. The larceny should now
be labeled theft, and distinct provisions of theft will be divided up by other variables
such as value of property, type and form of property, and tangible or intangible design.
The call here is for consolidation of the myriad of theft offenses under one roof while
allowing distinct elements to remain. As a result, “the general definition of theft conso-
lidates into a single offense a number of heretofore distinct property crimes, including
larceny, embezzlement, obtaining by false pretense, cheat, extortion and all other invol-
untary transfers of wealth except those explicitly excluded by provisions of this article.”87
Therefore, security personnel must be concerned about the closely aligned theft
provisions and correctly evaluate the facts to see the applicability of certain offenses.
A summary review follows.
THEFT BY DECEPTION88/FALSE PRETENSES
Be aware of individuals who are best described as “flim-flam” artists who create false
impressions and deceive others into giving up their rightful possession of property.89
In the case of false pretense, the criminal actor deceptively attains ownership in a deed,
a stock certificate, an auto title, or other form of property interest evidenced by a legal
document.90
THEFT BY EXTORTION91
Theft’s methods may employ threats that are futuristic in design. Future threats of bodily
injury or even by words disclosing private matters or secrets that will cause serious
injury to a party are common artifices employed by those seeking funds illegally.92 When
public officials refuse to cooperate in an official capacity or threaten to cause harm or
injury without justification unless they receive a kickback or other payback, this falls
under the theft-by-extortion umbrella.
270 PRIVATE SECURITY AND THE LAW
Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:20:29.
C op
yr ig
ht ©
2 01
1. E
ls ev
ie r S
ci en
ce &
T ec
hn ol
og y.
A ll
rig ht
s re
se rv
ed .
FIGURE 6.9 Report of Lost/Stolen Property.
Chapter 6 • Collection, Preservation, and Interpretation of Evidence 271
Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:20:29.
C op
yr ig
ht ©
2 01
1. E
ls ev
ie r S
ci en
ce &
T ec
hn ol
og y.
A ll
rig ht
s re
se rv
ed .
THEFT OF PROPERTY LOST, MISLAID, OR DELIVERED BY MISTAKE93
Security personnel must be particularly concerned about employees in retail establish-
ments or other business concerns who have access to lost and found property depart-
ments, or who take advantage of incorrectly delivered warehouse shipments.
RECEIVING STOLEN PROPERTY94
One often-discovered activity, especially in retail circles, is an internal network of illegal
goods and services flowing either from employee to employee or from employee to
third-party outsiders.
THEFT OF SERVICES95
Cable companies, electric utilities, hotels, motels, and other tourist facilities are subject to
thieving scams as are rental car companies, entertainment venues, and telephone compa-
nies. At common law theft had tobeof a tangible item. Services lacked that corporeal quality.
Modern statutes incorporate services into their definitions because they are things of value.
RETAIL THEFT96
Considering the rampant onslaught of shoplifting cases in the judicial system and the
need for specialized statutory designs that recognize the many demands that business
labors under as its seeks to prevent the activity, retail theft is a major concern for private
security policymakers. Modern retail theft statutes are distinctively less draconian in
punishment. In addition, most provide some sort of immunity in the form of merchant’s
privilege or other protection. Some statutes permit and even promote alternative diver-
sion or disposition of said cases. A typical construction might be as follows:
(a) OFFENSE DEFINED—A person is guilty of a retail theft if he:
(1) takes possession of, carries away, transfers or causes to be carried away or
transferred, any merchandise displayed, held, stored or offered for sale by any
store or other retail mercantile establishment with the intention of depriving the
merchant of the possession, use or benefit of such merchandise without paying
the full retail value thereof;
(2) alters, transfers or removes any label, price tag marking, indicia of value or any
other markings which aid in determining value affixed to any merchandise
displayed, held, stored or offered for sale in a store or other retail mercantile
establishment and attempts to purchase such merchandise personally or in
consort with another at less than the full retail value with the intention of
depriving the merchant of the full retail value of such merchandise;
(3) transfers any merchandise displayed, held, stored or offered for sale by any store
or other retail mercantile establishment from the container in or on which the
same shall be displayed to any other container with intent to deprive the
merchant of all or some part of the full retail value thereof; or
(4) under-rings with the intention of depriving the merchant of the full retail value
of the merchandise.
272 PRIVATE SECURITY AND THE LAW
Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:20:29.
C op
yr ig
ht ©
2 01
1. E
ls ev
ie r S
ci en
ce &
T ec
hn ol
og y.
A ll
rig ht
s re
se rv
ed .
(5) destroys, removes, renders inoperative or deactivates any inventory control tag,
security strip or any other mechanism designed or employed to prevent an
offense under this section with the intention of depriving the merchant of the
possession, use or benefit of such merchandise without paying the full retail
value thereof.97
The economic impact of retail theft is incredibly high.98 Economic crime impacts society
in many direct and indirect ways:
BUSINESS
• increased costs of insurance and security protection;
• costs of internal audit activities to detect crime;
• cost of investigation and prosecution of suspects measured in terms of lost time of
security and management personnel;
• reduced profits;
• increased selling prices and weakened competitive standing;
• loss of productivity;
• loss of business reputation;
• deterioration in quality of service;
• threats to the survival of small business.
LOCAL GOVERNMENT
• costs of investigation and prosecution of suspects;
• increased costs of prosecuting sophisticated (e.g., embezzlement) and technology-
related (e.g., computer) crime;
• costs of correctional programs to deal with economic crime offenders;
• cost of crime prevention programs;
• cost of crime reporting and mandated security programs;
• loss of tax revenue (e.g., loss of sales tax, untaxed income of perpetrator, and tax
deductions allowed business for crime-related losses).
THE PUBLIC
• increased costs of consumer goods and services to offset crime losses;
• loss of investor equity;
• increased taxes;
• reduced employment due to business failures.99
Employ the shoplifting checklist shown in Figure 6.10100 when conducting an investi-
gation.
The appearance of shoplifters has given way to some creative programs of civil recov-
ery. The retailer, instead of formally prosecuting the shoplifter, bills him or her to recover
the proceeds of the theft:
Thirty-eight states now permit civil recovery, according to R. Reed Hayes Jr., presi-
dent, L P Specialists, Winter Park, Fla. Hayes, a pioneer in civil recovery who has
watched the technique blossom after its 1973 Nevada start.
Chapter 6 • Collection, Preservation, and Interpretation of Evidence 273
Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:20:29.
C op
yr ig
ht ©
2 01
1. E
ls ev
ie r S
ci en
ce &
T ec
hn ol
og y.
A ll
rig ht
s re
se rv
ed .
Typically, the business gives notice to a person by mail, asking for payment for money
owed. If the person neglects a certain number of notices, civil action is initiated. More
often, the person pays the money owed in one lump sum or in payments.101
n n n
An example of a firm that specializes in the tactics of civil recovery is at http://www
.lpinnovations.com/page/83-civil_recovery.
n n n
RELATED PROPERTY OFFENSES: FRAUDULENT BEHAVIOR
The illegal acquisition of property may take place under fraudulent or deceptive circum-
stances. Criminals are inventive creatures who employ devious tactics and techniques to
secure property not rightfully theirs to possess. If property cannot be taken outright,
then the devious felon will invent a new technique, a new design to fraudulently acquire
some property or interest.102
Problems with fraud trickle throughout the entire economic and business system,
whether auto, homes, stocks, bonds and commercial paper, or intellectual property.
At times, fraud activities seem insurmountable, but some are banding together to do
something about it. The National Insurance Crime Bureau is one such entity. “[A] new
agency—amerger of the National Automobile Theft Bureau and the Insurance Crime Pre-
vention Institute—employs a national network of 165 investigators who help law enforce-
ment prosecute insurance fraud perpetrators.”103 For information, call 1-800-TEL-NICB.
Another resource center on fraud detection to contact is:
National Fraud Information Center/National Consumer’s League
Fraud hotline: 1-800-876-7060, or file an online complaint at www.fraud.org
FIGURE 6.10 Shoplifting Investigation Checklist.
274 PRIVATE SECURITY AND THE LAW
Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:20:29.
C op
yr ig
ht ©
2 01
1. E
ls ev
ie r S
ci en
ce &
T ec
hn ol
og y.
A ll
rig ht
s re
se rv
ed .
1701 K Street, N.W., Suite 1200
Washington, D.C. 20006
Phone: 202-835-3323
Fax: 202-835-0747
www.nclnet.org
In the case of insurance fraud contact:
Coalition against Insurance Fraud
1012 14th Street, NW, Suite 200
Washington, D.C. 20005
Phone: 202-393-7330
Fax: 202-393-7329
www.insurancefraud.org
Fraudulent behavior, aside from its potential criminal behavior, may also trigger
various sorts of civil liability.
Forgery Property takings may be by simulation, forgery, or other deception. Individuals who create
false documentation, false writings, or forged stamps, seals, trademarks, or other symbols
of value, right, privilege, or identification may be subject to charges of forgery.104 A com-
mon example of criminal forgery involves tampering with wills, deeds, contracts, com-
mercial instruments, negotiable bonds, securities, or any other writing that influences,
executes, authenticates, or issues something of monetary value. To constitute forgery,
a fraudulent intent is always essential. There must not only be a false making of an
instrument, but it must be with intent to defraud:105
715A.2 Forgery.
1. A person is guilty of forgery if, with intent to defraud or injure anyone, or with
knowledge that the person is facilitating a fraud or injury to be perpetrated by
anyone, the person does any of the following:
a. Alters a writing of another without the other’s permission.
b. Makes, completes, executes, authenticates, issues, or transfers a writing so that
it purports to be the act of another who did not authorize that act, or so that it
purports to have been executed at a time or place or in a numbered sequence
other than was in fact the case, or so that it purports to be a copy of an original
when no such original existed.
c. Utters a writing which the person knows to be forged in a manner specified in
paragraph “a” or “b”.
d. Possesses a writing which the person knows to be forged in a manner specified
in paragraph “a” or “b”.106
Chapter 6 • Collection, Preservation, and Interpretation of Evidence 275
Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:20:29.
C op
yr ig
ht ©
2 01
1. E
ls ev
ie r S
ci en
ce &
T ec
hn ol
og y.
A ll
rig ht
s re
se rv
ed .
SIMULATING OBJECTS OF ANTIQUITY OR RARITY
Security officials given the responsibility of protecting museum collections, art centers,
or other nonprofit institutions dedicated to articles of antiquity or rarity should always
be aware of possible reproduction or simulation of their employer’s collections:
Simulating objects of antiquity, rarity, etc.
A person commits a misdemeanor of the first degree if, with intent to defraud any-
one or with knowledge that he is facilitating a fraud to be perpetrated by anyone, he
makes, alters or utters any object so that it appears to have value because of antiq-
uity, rarity, source, or authorship which it does not possess.107
FRAUDULENT DESTRUCTION, REMOVAL, OR CONCEALMENT OF RECORDABLE
INSTRUMENTS OR THEIR TAMPERING
Internal security, particularly in the area of personnel, payroll, and administrative mat-
ters, should give substantial thought to the preventative security measures that are pres-
ently in place or should be implemented:
}4103. Fraudulent destruction, removal or concealment of recordable instruments A person commits a felony of the third degree if, with intent to deceive or injure
anyone, he destroys, removes or conceals any will, deed, mortgage, security
instrument or other writing for which the law provides public recording.
}4104. Tampering with records or identification (a) Writings—A person commits a misdemeanor of the first degree if, knowing that
he has no privilege to do so, he falsifies, destroys, removes or conceals any writing
or record, or distinguishing mark or brand or other identification with intent to
deceive or injure anyone or to conceal any wrongdoing.108
BAD CHECK AND CREDIT CARD VIOLATIONS
Retail centers are regularly victimized by check and credit card fraud and related viola-
tions. Here too property is acquired without the proper payment of consideration. The
seemingly endless stream of fraudulent and bounced checks received by commercial
establishments is mind-boggling. The security industry must adopt an aggressive pos-
ture against these actors in order to protect pricing and value in the exchange of goods
and services. Bad checks and credit card fraud drive up the prices. The language of bad
check laws is fairly uniform.
}4105. Bad checks
(a) OFFENSE DEFINED—
(1) A person commits an offense if he issues or passes a check or similar sight order for
the payment of money, knowing that it will not be honored by the drawee.
276 PRIVATE SECURITY AND THE LAW
Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:20:29.
C op
yr ig
ht ©
2 01
1. E
ls ev
ie r S
ci en
ce &
T ec
hn ol
og y.
A ll
rig ht
s re
se rv
ed .
(2) A person commits an offense if he, knowing that it will not be honored by the
drawee, issues or passes a check or similar sight order for the payment of money
when the drawee is locatedwithin this Commonwealth. Aviolation of this paragraph
shall occur without regard to whether the location of the issuance or passing of the
check or similar sight order is within or outside of this Commonwealth. It shall be no
defense to a violation of this section that some or all of the acts constituting the
offense occurred outside of this Commonwealth.
}4106. Access device fraud
(a) OFFENSE DEFINED—A person commits an offense if he:
(1) uses an access device to obtain or in an attempt to obtain property or services
with knowledge that:
(i) the access device is counterfeit, altered or incomplete;
(ii) the access device was issued to another person who has not authorized
its use;
(iii) the access device has been revoked or canceled; or
(iv) for any other reason his use of the access device is unauthorized by the
issuer or the device holder; or
(2) publishes, makes, sells, gives, or otherwise transfers to another, or offers
or advertises, or aids and abets any other person to use an access device
knowing that the access device is counterfeit, altered or incomplete, belongs
to another person who has not authorized its use, has been revoked or
canceled or for any reason is unauthorized by the issuer or the device
holder; or
(3) possesses an access device knowing that it is counterfeit, altered, incomplete or
belongs to another person who has not authorized its possession.109
n n n
Review the criminal penalties for bad checks at http://www.ckfraud.org/penalties.html#
criminal.
n n n
Offenses against Public Order and Decency
Maintenance of public order is a public police function that has been increasingly trans-
ferred to the private sector.110 Not surprisingly, security personnel have recently come
up against troubled and volatile conditions experienced by the police in the mid-
1960s, namely, riotous situations, disorderly persons, extreme disorderly conduct,
harassment, public drunkenness, and other obstructive activities. As this transference
of public control functions continues unabated, an understanding of the relevant
statutes is imperative.
Chapter 6 • Collection, Preservation, and Interpretation of Evidence 277
Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:20:29.
C op
yr ig
ht ©
2 01
1. E
ls ev
ie r S
ci en
ce &
T ec
hn ol
og y.
A ll
rig ht
s re
se rv
ed .
Riot A person is guilty of riot, a felony of the third degree, if he participates with two or more
others in a course of disorderly conduct:
(1) with intent to commit or facilitate the commission of a felony or misdemeanor;
(2) with intent to prevent or coerce official action; or
(3) when the actor or any other participant to the knowledge of the actor uses or plans
to use a firearm or other deadly weapon.111
Other provisions relating to public obstruction, trespass, and resisting arrest are close
companions to crowd control. Pennsylvania and other jurisdictions have drafted aligned
provisions dealing with similar situations such as the following:
}5104. Resisting arrest or other law enforcement A person commits a misdemeanor of the second degree if, with the intent of
preventing a public servant from effecting a lawful arrest or discharging any other
duty, the person creates a substantial risk of bodily injury to the public servant or
anyone else, or employs means justifying or requiring substantial force to overcome
the resistance.112
}5507. Obstructing highways and other public passages (a) Obstructing—A person, who, having no legal privilege to do so, intentionally or
recklessly obstructs any highway, railroad track or public utility right-of-way,
sidewalk, navigable waters, other public passage, whether alone or with others,
commits a summary offense, or, in case he persists after warning by a law officer, a
misdemeanor of the third degree. No person shall be deemed guilty of an offense
under this subsection solely because of a gathering of persons to hear him speak or
otherwise communicate, or solely because of being amember of such a gathering.113
}7506. Violation of rules regarding conduct on Commonwealth property114
}5502. Failure of disorderly persons to disperse upon official order Where three or more persons are participating in a course of disorderly conduct
which causes or may reasonably be expected to cause substantial harm or serious
inconvenience, annoyance or alarm, a peace officer or other public servant engaged
in executing or enforcing the law may order the participants and others in the
immediate vicinity to disperse. A person who refuses or knowingly fails to obey such
an order commits a misdemeanor of the second degree.115
Handling the disruptive, the loud, and the fighters requires a charge of disorderly
conduct:
}5503. Disorderly conduct (a) OFFENSE DEFINED—A person is guilty of disorderly conduct if, with intent to
cause public inconvenience, annoyance or alarm, or recklessly creating a risk
thereof, he:
(1) engages in fighting or threatening, or in violent or tumultuousbehavior;
278 PRIVATE SECURITY AND THE LAW
Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:20:29.
C op
yr ig
ht ©
2 01
1. E
ls ev
ie r S
ci en
ce &
T ec
hn ol
og y.
A ll
rig ht
s re
se rv
ed .
(2) makes unreasonable noise;
(3) uses obscene language, or makes an obscene gesture; or
(4) creates a hazardous or physically offensive condition by any act which serves
no legitimate purpose of the actor.116
What is the likelihood of being arrested for using obscene language?
Public Drunkenness A person is guilty of a summary offense if he appears in any public place manifestly
under the influence of alcohol or a controlled substance, to the degree that he may
endanger himself or other persons or property or annoy persons in his vicinity.117
Ohio law defines voluntary intoxication in more specific terms, stating that a viola-
tion of the disorderly conduct statute for public intoxication will only occur if the person
is engaging in conduct “likely to be offensive or to cause inconvenience, annoyance, or
alarm to persons of ordinary sensibilities.”118
Other Public Order Provisions Loitering,119 obstruction of highways and other public places,120 disrupting lawful meet-
ings or processions,121 desecration, theft or sale of venerated objects,122 and vagrancy123
are related public offenses of interest to the security professional. When one considers
the homeless figures on the nation’s streets, does vagrancy seem an enforceable statute?
Ponder Wisconsin’s vagrancy language:
947.02. Vagrancy.
Any of the following are vagrants and are guilty of a Class C misdemeanor:
(1) A person, with the physical ability to work, who is without lawful means of
support and does not seek employment; or . . .
(2) A prostitute who loiters on the streets or in a place where intoxicating liquors
are sold, or a person who, in public, solicits another to commit a crime
against sexual morality; or
(3) A person known to be a professional gambler or known as a frequenter of
gambling places or who derives part of his or her support from begging or as
a fortune teller or similar impostor.124
Critics of vagrancy statutes comment on the imprecision and vagaries of language
employed. Civil libertarians bristle at language that seeks to measure whether a person
looks employed or not, or whether one appears not to have a livelihood. Is it better that
vagrants and other undesirables simply lay on the streets? Or does it make sense to
round up the displaced for social service processing? Tension exists between those
who urge decriminalization of the homeless or vagrancy statutes and those who see
the loitering as a nuisance and a trespass. As the public police system further transfers
public order functions, private security will have to increasingly deal with these sorts
of social pathology.
Chapter 6 • Collection, Preservation, and Interpretation of Evidence 279
Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:20:29.
C op
yr ig
ht ©
2 01
1. E
ls ev
ie r S
ci en
ce &
T ec
hn ol
og y.
A ll
rig ht
s re
se rv
ed .
Evidence and Proof
Detecting crime and implementing steps that halt its spread are major vocational issues
for the security profession. To do so, the security industry must process criminals with
procedural and evidentiary rigor. While not held accountable under the public police
standard, it is salient for security specialists to carry out their task and mission with pro-
fessional demeanor. Unfortunately, private security has sometimes taken the law into its
own hands, attempting to perform criminal investigations that will generate questions of
admissibility. Far too often, private security has displayed scant care about the implica-
tions of evidence collection. To be certain, private security has always taken an active
interest in the collection and preservation of evidence since it is so often on the front
lines of first response. That same interest must extend to eventual trial or other liti-
gation. As a result, security personnel must master the dominant themes in evidence
law and practice.
The Chain of Custody Evidence acquired at the scene of a crime or other location that the prosecution seeks to
admit will always be challenged on chain of custody theory.125 Evidence that is acquired
in any investigation should be properly tagged and packaged with precautions to thor-
oughly preserve content and structural integrity.126 In other words, the defense will
question whether the evidence, as acquired on the date of the investigation, compares
in composition and nature as it did on the date it was offered for admission. Any change,
corruption, or other alteration imputes a faulty and flawed chain. The evidence will be
suspect and likely denied admission. Evidence that lacks a chronological tag or docu-
mentary history will be challenged. John Waltz, in his text Criminal Evidence, reminds
practitioners:
Tracing an unbroken chain of custody can hold crucial to the effective use of a fire-
arm’s identification evidence. This does not mean, however, that changes in the con-
ditions of firearm’s evidence or the passage of a substantial period of time between
the shooting and the recovery of the firearm’s evidence will foreclose admissibility at
trial. . . . Of course it is important that, to the extent possible, all law enforcement
agencies provide for the safe storage of vital evidence prior to trial. Police depart-
ments are well advised to maintain a locked evidence room manned by an officer
who keeps detailed records not only of its contents but of the disposition of items
of evidence and the names of persons entering the room for any purposes.127
The image of a chain is most appropriate since any break in a series of links on a
chain destroys the chain.128 By analogy, real evidence with a checkered history, whether
as to location or packaging, loses its credibility. For this reason, the proponent of real
evidence must establish that the condition of the real evidence being offered has
remained basically unchanged since the date of acquisition, and that it has neither been
280 PRIVATE SECURITY AND THE LAW
Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:20:29.
C op
yr ig
ht ©
2 01
1. E
ls ev
ie r S
ci en
ce &
T ec
hn ol
og y.
A ll
rig ht
s re
se rv
ed .
tampered with nor suffered any damage. Opposing counsel challenging the quality and
integrity of real evidence might argue that the evidence is contaminated or lacks a reli-
able historical record assuring its pristine and untouched condition.129
n n n
The Environmental Protection Agency delivers an entire course on chain of custody issues at
http://www.epa.gov/apti/coc.
n n n
A security department would be well advised to heed the same advice—that chrono-
logical tracking is essential upon initial acquisition of evidence and that a cooperative
plan for transference of evidentiary matter to police departments and other justice agen-
cies be instituted. Evidence tags are inexpensive, reliable ways of tracing an evidence
chain. An evidence log is equally helpful. See Figure 6.11 for an example.
FIGURE 6.11 Prosecutor’s Office Evidence Log.
Chapter 6 • Collection, Preservation, and Interpretation of Evidence 281
Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:20:29.
C op
yr ig
ht ©
2 01
1. E
ls ev
ie r S
ci en
ce &
T ec
hn ol
og y.
A ll
rig ht
s re
se rv
ed .
Destruction or even partial corruption of evidence taints and undermines the proof.
Documents, physical evidence, forensic materials, and other forms of evidence used by
both the prosecution and the defense will only be able to withstand legal challenges if
not subject to integrity challenges. While each party may employ the evidence for its
case in chief, the question of whether said evidence finds a willing tribunal will largely
depend on the proof of how it has been handled and processed. The chain of custody
requirements assure that the history of that evidence is both traceable and verifiable.130
Destruction of evidence will also make discovery of said evidence, a compulsory grant
by prosecution to defense, even more difficult, for that evidence is untrustworthy. The
exercise of procedural examination can be frustrated if relevant material is altered, con-
cealed, or destroyed.131 Destruction may also trigger constitutional violation when the
agent who ruined the evidence did so with malice, fraud, or some other intentional pur-
pose. Whether by case law or statute, destroying evidence in all circumstances is a pro-
hibited act.132
n n n
Visit an evidence company to review the many products available to assure the integrity of
evidence at http://www.sirchie.com.
n n n
The Admission of Business Records Business records are inherently hearsay, since the author of that record is not readily
available to testify. Hearsay is inadmissible unless an exception has been fashioned. As
is so often the case, especially in large corporate enterprises, record keeping is so volu-
minous and broad based that it is difficult to tie authorship to any given document. The
Federal Rules of Evidence fully recognize that business records themselves, while admit-
tedly hearsay, are admissible. Federal Rule 803(6) provides:
A memorandum, report, record, or data compilation, in any form, of acts, events,
conditions, opinions, or diagnoses, made at or near the time by, or from informa-
tion transmitted by, a person with knowledge, if kept in the course of a regularly
conducted business activity, and if it was the regular practice of that business activ-
ity to make the memorandum, report, record, or data compilation, all as shown by
the testimony of the custodian or other qualified witness, unless the source of infor-
mation or the method or circumstances of preparation indicate lack of trustworthi-
ness. The term “business” as used in this paragraph includes business, institution,
association, profession, occupation, and calling of every kind, whether or not con-
ducted for profit.133
Records, in order to be regularly admissible and outside the hearsay criterion, must
be regularly kept. A presumption exists in the law that regularly kept records, automati-
cally filled-in forms, and other autonomic exercises decrease the likelihood of deception
and fraud in authorship.134 For the most part, security record keeping, like surveillance
282 PRIVATE SECURITY AND THE LAW
Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:20:29.
C op
yr ig
ht ©
2 01
1. E
ls ev
ie r S
ci en
ce &
T ec
hn ol
og y.
A ll
rig ht
s re
se rv
ed .
reports, warehouse bills of lading, visitors’ logs, shoplifting reports, and investigative
task sheets, are robotic business records135 that will be admitted despite their hearsay
content.
Thus, business records will not be admitted in any subsequent litigation except
under the following conditions:
• The record was made at or near the time of the occurrence.
• It was the regular practice of the business to make such records.
• There are no indications of untrustworthiness in the record.
• The information in the record was made by, or with information from, a
knowledgeable person.
• The record was made and kept in the normal course of a business.136
Real and Demonstrative Evidence As the name implies, real or physical evidence is of a tangible form—something
that can be felt, touched, sensed, and seen. Real evidence is the gun, the knife, the
blood, and other actual composition.137 Real evidence is the actual product, not a
reproduction or a copy. It may be the actual weapon, forged check or deed, or other
physical matter. In most litigation, there is a preference for the real over other eviden-
tiary forms:
As the trier of fact looks for the truth, what form of evidence is most convincing dur-
ing its deliberations? Is the testimony of expert or lay witnesses regarding impres-
sions and eyewitness accounts as persuasive as evidence in real format? Is the
testimony of the plaintiff in a civil negligence case regarding experienced pain
and suffering more probative than the actual exhibition of injuries inflicted in
the plaintiff ’s body?138
While there may be some variety in responses based on the quality of the real and the
illustrative and educational quality of secondary evidence forms, there is little doubt
that the real evidence form can be compelling.
Comparatively, demonstrative evidence is an illustration of the real.139 Its admissibil-
ity and utility depends upon these criteria:
Does it aid the trier of fact in discerning the truth? Does it simplify complex pro-
blems? Does it educate the jury and tribunal? Is it persuasive? Does the demonstra-
tion appeal to multiple senses?140
Common forms of demonstrative evidence include the following:
• Maps
• Models
• Photographs
Chapter 6 • Collection, Preservation, and Interpretation of Evidence 283
Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:20:29.
C op
yr ig
ht ©
2 01
1. E
ls ev
ie r S
ci en
ce &
T ec
hn ol
og y.
A ll
rig ht
s re
se rv
ed .
• Videotapes
• Animation Graphics
• Experiments and Simulations • Movies
• Charts
• Graphs
• Reproductions
• Scale Models
• Multiple Views
• Cast Models
• Sound Recordings
• Artistic Reproductions
• X-Rays
• Thermographs
• Spectrograms
• Medical Test Results
• Chemical Analysis141
Security personnel are increasingly relying on animation and other graphics por-
trayals142 to reconstruct a case during the investigative phase. Some of the more com-
monly used providers in the area are the following:
The Association of Medical Illustrators
201 E. Main Street, Suite 1405
Lexington, Kentucky 40507
Phone: 1-866-393-4AMI (or 1-866-393-4264)
E-mail: [email protected]
http://www.ami.org
(for information on medical illustrators in your area)
Wolf Technical Services, Inc.
9855 Crosspoint Blvd., Suite 126
Indianapolis, Indiana 46256-3336
Main: 317-842-6075
Toll Free: 1-800-783-9653
Fax: 317-842-6974
http://www.wolftechnical.com/
(accident reconstruction and forensic engineering)
ARCCA Incorporated
2288 Second Street Pike
Penns Park, Pennsylvania 18943
Phone: 215-598-9750
Toll Free: 1-800-700-4944
Fax: 215-598-9751
284 PRIVATE SECURITY AND THE LAW
Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:20:29.
C op
yr ig
ht ©
2 01
1. E
ls ev
ie r S
ci en
ce &
T ec
hn ol
og y.
A ll
rig ht
s re
se rv
ed .
http://www.arcca.com
(illustrations and charts of crash simulations)
n n n
Visit one of the country’s largest developers of medical and injury demonstrative exhibits at
http://www.medicallegalexhibits.com.
n n n
Lay Witnesses As private security performs its investigatory functions, it must rely on evidence
provided by witnesses. The measure of witness competency will largely be determined
by whether the witness is lay or expert. A wise practice is to evaluate lay witnesses in
the field, since these very individuals, who are providing crucial information, may be
the best foundation on which a case rests. If incompetent in the field, they will clearly
be incompetent on the stand.143 By competency, we merely hold that the witness is
capable of relating facts and conditions in a reliable and dependable way.
Lay competency is generally defined by Rule 602 of the Federal Rules of Evidence as
follows:
(1) The witness has the capacity to actually perceive, record and recollect impressions
of fact (physical and mental capacity);
(2) The witness in fact did perceive, record and recollect impressions having a tendency
to establish a fact of consequence in the litigation (personal knowledge);
(3) Thewitness be capable of understanding theobligation to tell the trust (oathor affirmation);
(4) The witness possess the capacity to express himself understandably where
necessary with the aid of an interpreter.144
Competency does not require genius but the capacity to perceive, record, and recol-
lect impressions of fact as influenced by a wide assortment of social and biogenic fac-
tors.145 All lay witnesses, in order to be effective on the witness stand, need to be
evaluated in light of these criteria:
• What is their present age?
• Do they have any personal habits that would indicate their powers of recollection
and thought retention would be influenced by chemical or drug usage?
• From an observational point of view, do these individuals appear intellectually ordered?
• Would a street person, bag lady, or heroin abuser be a witness who could withstand
the competency standard?
• Did they have any personal knowledge of the events or is their viewpoint strictly the
product of hearsay?146
Certain witnesses—such as children, a spouse, a coconspirator who has been granted
immunity, or a person who has been adjudged insane—will trigger credibility concerns.147
Lack of credibility, however, does not disallow a witness from taking the stand.148
Chapter 6 • Collection, Preservation, and Interpretation of Evidence 285
Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:20:29.
C op
yr ig
ht ©
2 01
1. E
ls ev
ie r S
ci en
ce &
T ec
hn ol
og y.
A ll
rig ht
s re
se rv
ed .
Security practitioners should evaluate the levels of sincerity and credibility of any wit-
ness they interview during the investigative process. Employing simple human relations
skills will often permit the security professional to judge the quality and credibility of
any witness. When evaluating a witness, utilize the checklist presented in Figure 6.12.149
The security officer needs to evaluate and weigh not only the physical and real evi-
dence he or she collects but also the testimony from interested as well as disinterested
witnesses. Conduct the type of human observation that ferrets out the unreliable in
favor of the reliable lay witness. Make human judgments that work for the average per-
son, and avoid witnesses who are disgruntled individuals, abhorrent characters, and
courtroom groupies whose sole purpose in life is to meddle in the affairs of others.150
Expert Witnesses An expert is often defined as any witness who is not a lay witness. While it is a suitable
definition, the complexities of expert testimony call for more.151 It is now a given that
experts populate our courtroom in both the criminal and civil realm. It is also commonly
FIGURE 6.12 Witness Competency Checklist.
286 PRIVATE SECURITY AND THE LAW
Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:20:29.
C op
yr ig
ht ©
2 01
1. E
ls ev
ie r S
ci en
ce &
T ec
hn ol
og y.
A ll
rig ht
s re
se rv
ed .
agreed upon that there has been a proliferation of experts, expert testimony, and fields
of acceptable expertise once unenvisioned.152 These perceptions are the result of many
factors such as media coverage of flamboyant expert witnesses to celebrated and often
avant-garde litigation. However, the bulk of testimony given in any criminal or civil
action is fundamentally “lay” in nature. An expert is entitled to give an opinion, but only
in the context of his or her expertise, though a foundational test will have to be met
before such testimony is proffered. In the case of a lay witness, foundational require-
ments must be laid as follows:
• The witness’s testimony is based upon his or her own unique perception.
• The court is convinced that the testimony of the lay witness is helpful in arriving at
the truth.
• The witness does in actuality have an opinion.
• The witness is capable and competent to testify as to that opinion.
• Without the testimony the trier of fact, namely, the judge and jury, would not have
the best case presented.
• The witness is giving lay testimony rather than expert testimony.
• No opinion as to a rule or an interpretation of law will be permitted.153
Experts, on the other hand, must be qualified to testify in their areas of expertise.
Rule 703 of the Federal Rules of Evidence154 requires that an expert’s opinion rest on
facts, data, or other information that he or she has actually seen or heard or has been
communicated to the expert. Rule 704155 permits the expert witness to attest to the ulti-
mate issue of fact, though at one point in history the ultimate issue doctrine withheld
that right. By ultimate issue, the expert is giving his or her assessment on the fundamen-
tal guilt or innocence of the defendant or the truth or falsity of a given issue at trial.156
Security companies must learn to develop collegial and longstanding relationships
with experts in fields of mutual interest, such as engineering, hazardous materials, use
of force and professional police practices, product liability, negligence and intentional
tortious conduct. The occasion may arise whereby the security company needs the
assistance of an expert. Insist that the self-acclaimed expert prove his or her quali-
fications since the court will expect the scrutiny by reviewing these standardized
qualifications:
• The witness has specialized training in the field of his or her expertise.
• The witness has acquired advanced degrees from educational institutions.
• The witness has practiced in the field for a substantial period of time.
• The witness taught courses in a particular field.
• The witness has published books or articles in the particular field.
• The witness belongs to professional societies or organizations in a particular field.
• The witness has previously testified and been qualified as an expert before a court or
administrative body on a particular subject to which he or she is being asked to
render an opinion.157
Chapter 6 • Collection, Preservation, and Interpretation of Evidence 287
Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:20:29.
C op
yr ig
ht ©
2 01
1. E
ls ev
ie r S
ci en
ce &
T ec
hn ol
og y.
A ll
rig ht
s re
se rv
ed .
Practical Exercise: Cross-Examination Security operatives are frequently cross-examined on the witness stand.158 How would
you respond to the following queries:
1. “Your name and occupation, please?”
2. “So, you’re a real live Pinkerton detective. And who do you represent in this case?”
3. “In other words, you are being paid to testify for ABC Insurance Company against
my client, isn’t that correct?”
4. “Exactly how long did you conduct your spying in Mr. Smith’s home and how long
did you actually observe my client engaged in activity during this time?”
5. “So, for two (2) days you were paid to observe Mr. Smith for only a half hour. The
insurance company must have been disappointed.”
6. “You describe in your report the home of Mr. Smith and state that its approximate
value is $65,000. Are you qualified to make such a statement?”
7. “Just how far away were you when you took these movies of Mr. Smith and don’t you
consider taking these movies without his permission a shameful invasion of Mr.
Smith’s right to privacy?”
8. “You state in your report that Mr. Smith exhibited no sign of discomfort or pain
while moving about. Do you have a medical background that qualifies you to judge
whether or not Mr. Smith was experiencing pain?”
9. “I understand that your presence in Mr. Smith’s neighborhood created a great deal
of anxiety among his neighbors, that they were concerned for the safety of their
children with a stranger parked for two (2) days in their neighborhood with out-of-
state license plates. Do you think you have a right to frighten innocent people while
you are spying on my client for this big insurance company?”
10. “Do you get a percentage of any money the insurance company may save—Never
mind. No further questions.”159
There has been a proliferation of experts and consulting services in the security
industry itself. Review a recent classified section of any industry magazine and you will
find a plethora of ads for expert witness and consulting services. Assuring the integrity of
these or any other proposed expert is a problem, for the security industry and all other
areas of expertise.160 The International Association of Professional Security Consul-
tants161 is a member organization dedicated to assuring competency among its security
experts.
Use the following expert witness questionnaire when determining the qualifications
of an expert. See Figure 6.13.162 A contract for the expert services of a security specialist
lays out the professional expectations. See Figure 6.14.
A. Potpourri of Evidentiary Principles BURDEN OF PROOF
In criminal cases, the standard is beyond a reasonable doubt; in civil cases, the standard
is beyond a preponderance of the evidence or by clear and convincing evidence.163
288 PRIVATE SECURITY AND THE LAW
Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:20:29.
C op
yr ig
ht ©
2 01
1. E
ls ev
ie r S
ci en
ce &
T ec
hn ol
og y.
A ll
rig ht
s re
se rv
ed .
FIGURE 6.13 Expert Witness Questionnaire.
Chapter 6 • Collection, Preservation, and Interpretation of Evidence 289
Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:20:29.
C op
yr ig
ht ©
2 01
1. E
ls ev
ie r S
ci en
ce &
T ec
hn ol
og y.
A ll
rig ht
s re
se rv
ed .
FIGURE 6.14 Contract for Expert Services.
290 PRIVATE SECURITY AND THE LAW
Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:20:29.
C op
yr ig
ht ©
2 01
1. E
ls ev
ie r S
ci en
ce &
T ec
hn ol
og y.
A ll
rig ht
s re
se rv
ed .
QUESTIONS OF LAW VERSUS QUESTIONS OF FACT
A trial judge saddled with the question of law must decide the applicability of a case
decision, statute, or other regulation. A question of fact is an interpretation of events left
best to the jury or a judge evaluating the case before it.
THE BASIC TYPES OF EVIDENCE
Direct evidence Direct evidence is a type of evidence that “proves a fact proposition
directly rather than by inferential process.”164
Indirect or circumstantial evidence Circumstantial evidence relies on the inference that
can be deduced from a fact pattern presented. The bulk of evidence is circumstantial.165
THREE FORMS OF EVIDENCE
All evidence is further subcategorized into the following forms.
CASE EXAMPLES
THIRD-PARTY CRIMINAL ACTS—HATT V. HAMMOND, NO. 236637 (PIMA COUNTY
SUPERIOR COURT, TUCSON, ARIZONA, OCTOBER 20, 1987)
Facts
A 66-year-old retired man and his wife were assaulted at gunpoint by three men in their hotel
room. Plaintiffs sued the hotel for failing to provide adequate security. At the time of the incident,
the hotel was sponsoring a precious gem show. The hotel was accused of being negligent in
failing to provide additional security with this expensive property. The claim of inadequate
security was also based on the fact that the plaintiffs’ room was located in a building that was
detached from the hotel lobby and had six unguarded, unlocked exterior doors.
Issue
Is the hotel liable for failure to provide sufficient security?
THIRD-PARTY CRIMINAL ACTS
Facts
Upon returning to her apartment unit at 11 p.m., a 21-year-old woman locked the sliding glass
door, pulled the drapes, and immediately went to bed. Two hours later she was awakened by an
individual who, with brutal force, caused her to perform sexual acts against her will. She
brought suit against the owners and managers of the building complex, alleging that they had
knowledge that other specific criminal acts had taken place within the complex and that they
had negligently failed to take reasonable steps to protect their tenants. Plaintiff further alleged
that the defendants failed to warn tenants of these prior crimes, thus denying tenants the
opportunity to take increased self-protective measures.
Issue
Is this apartment complex negligent for the criminal acts of a third party?
Chapter 6 • Collection, Preservation, and Interpretation of Evidence 291
Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:20:29.
C op
yr ig
ht ©
2 01
1. E
ls ev
ie r S
ci en
ce &
T ec
hn ol
og y.
A ll
rig ht
s re
se rv
ed .
Testimonial evidence Evidence provided by oral testimony under oath or affirmation or,
on occasion, by sworn pretrial written deposition or interrogatory.166
Tangible evidence As discussed previously, tangible evidence is either the real evidence
the actual agency utilized in the criminal activity or, otherwise, demonstrative evidence
that is an illustrative tool in the form of a visual design, reproduction, diagram, or ana-
tomical model.167
Judicially noticed evidence Evidence that is generally and commonly known by the
community at large and that is scientifically acceptable in most circles can be judicially
noticed. The fact that the sun rises during a 24-hour cycle, at least in North America, is a
judicially noticed fact.168
Summary The chapter provides a broad overview of legal principles, definitions, and standards
relating to the laws of crime and evidence law. The coverage commenced with a review
of criminal liability. As private sector justice moves increasingly into public functions of
law enforcement, it will have to master the art and science of crimes and their
subsequent prosecutions. Even more pertinent is this chapter’s refined analysis of crim-
inal charges and actions. Criminal law is primarily codified, but in the focused, occupa-
tional realm of private security, certain actions more commonly occur: property crimes
such as theft and its parallel and companion charges; offenses against the person such
as murder, manslaughter, kidnapping, false imprisonment, and sexual offenses; and
offenses against the public order and public domain. Property offenses naturally receive
the bulk of attention since asset protection is the proclaimed vocational priority of pri-
vate security.
Equally essential to the professional growth of the security industry is mastery of
select evidentiary principles that affect the investigative practice of the private security
industry. Evaluating the quality, competency, and credibility of witnesses and utilizing
experts throughout all stages of criminal process are fully covered. Heeding the founda-
tional rules and admission for evidence, whether real, testimonial, or expert in design,
assures a worthwhile claim or case for the private sector entity. Assuring the quality of
the evidence is just as critical. The chapter gives suggestions on chain of custody poli-
cies and procedures and delivers a definitional overview of the most relevant evidentiary
principles.
Discussion Questions 1. What two major elements are necessary for the finding of criminal liability?
2. Research your jurisdiction’s manslaughter statutes. What language is utilized to
describe the mental state?
292 PRIVATE SECURITY AND THE LAW
Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:20:29.
C op
yr ig
ht ©
2 01
1. E
ls ev
ie r S
ci en
ce &
T ec
hn ol
og y.
A ll
rig ht
s re
se rv
ed .
3. How does one distinguish between the gradations and levels of differing criminal
acts?
4. Give a fact pattern that would involve a private security agent or investigator that
applies the felony murder rule.
5. What types of criminal activity would most commonly occur in American business
and industry and require the investigative services of private security forces?
6. Why should the private security industry be concerned about “public offenses” or
conduct involving the social order?
7. Name three evidentiary rules that are relevant to the private security industry.
Notes 1. See Restatement of Torts }2.05 (1934); William L. Clark & William L. Marshall, A Treatise on the Law
of Crimes 200 (1967); see also John E. Douglas & Mark Olshaker, The Anatomy of Motive (1999); Leo Katz, Bad Acts and Guilty Minds: Conundrums of the Criminal Law (1987).
2. See Charles P. Nemeth, Criminal Law 84 (2004, 2nd 3d. forthcoming 2011); see also Stanton E. Same- now, Inside the Criminal Mind (1984); Lawrence Taylor, Born to Crime: The Genetic Causes of Criminal Behavior (1984).
3. Model Penal Code }2.01 (1-3) (1962).
4. See Nemeth, Criminal, supra note 2, at 77-83.
5. Edward T. Guy, John J. Merrigan, Jr. & John A. Wanat, Forms for Safety and Security Management 138 (1981).
6. George E. Dix & Michael M. Sharlot, Basic Criminal Law, Cases and Materials 151 (1980); see also Steven J. Rossen & Wilton S. Sogg, Smith’s Review of Criminal Law (1985); Nemeth, Criminal, supra note 2, at 87; Katherine R. Tromble, Humpty Dumpty on Mens Rea Standards: A Proposed Method- ology for Interpretation, 52 Vand. L. Rev. 521, 522 (1999); Note, Mens Rea in Federal Criminal Law, 111 Harv. L. Rev. 2402 (1998).
7. See generally Tromble, supra note 6; Note, Mens Rea, supra note 6; Douglas & Olshaker, supra note 1; Richard Rhodes, Why They Kill: The Discoveries of a Maverick Criminologist (1999); Katz, supra note 1; Frank Remington & Orrin L. Helstad, Mental Element in Crimes—A Legislative Problem, 1952 Wisc. L. Rev. 644 (1952); Rollin M. Perkins, A Rationale of Mens Rea, 52 Harv. L. Rev. 905 (1935); Thomas A. Cowan, A Critique of the Moralistic Conception of Criminal Law, 97 U. Pa. L. Rev. 502 (1949); Dennis v. U.S., 341 U.S. 494 (1951).
8. Model Penal Code }2.02 (1 & 2) (1962). See also Del. Code Ann. tit. 11, }231 (2001); Mo. Rev. Stat. }562.016 (2001); Jonathan L. Marcus, Model Penal Code Section 2.02(7) and Willful Blindness, 102 Yale L.J. 2231, 2232 (1993).
9. Clark & Marshall, supra note 1, at 270.
10. See Nemeth, Criminal, supra note 2, at 53-55; John E. Douglas, Crime Classification Manual (1997); Dictionary of Criminal Justice Terms (1990); 4 William Blackstone, Commentaries 5 (1941); Clark & Marshall, supra note 1, at }}2.01-2.04; Michael J. Pastor, Note: A Tragedy and a Crime?: Amadou Diallo, Specific Intent, and the Federal Prosecution of Civil Rights Violations, 6 N.Y.U. J. Legis. & Pub. Pol’y 171 (2002); Adam Candeub, Consciousness & Culpability, 54 Ala. L. Rev. 113 (2002).
11. See Nemeth, Criminal, supra note 2, at 55-56.
12. See Nemeth, Criminal, supra note 2, at 56.
Chapter 6 • Collection, Preservation, and Interpretation of Evidence 293
Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:20:29.
C op
yr ig
ht ©
2 01
1. E
ls ev
ie r S
ci en
ce &
T ec
hn ol
og y.
A ll
rig ht
s re
se rv
ed .
13. See generally 2 Frederic Pollock, Sr. & Fredrick W. Maitland, History of English Law (1903); Black- stone, supra note 10; Clark & Marshall, supra note 1, at 108-115; Center for Criminal Justice, Private Police Training Manual 34 (1985); Nemeth, Criminal, supra note 2, at 50-53.
14. There are exceptions to this including Pennsylvania. See 18 Pa. Stat. Ann. }}1105 (2010).
15. See Blackstone, supra note 10, at 205.
16. Bannon v. U.S., 156 U.S. 464 (1894).
17. Task Force on Administration on Justice, The President’s Commission on Law Enforcement and Administration of Justice, Task Force Report: The Courts (1967).
18. Id. at 15.
19. As an example see New York’s misdemeanor classification of Sexual Misconduct, at }}130.20. Critics claim it is nothing more than an actual Aggravated Sexual Assault.
20. See generally Perkins, supra note 7; Herbert Wechsler & Jerome Michael, A Rationale of the Law of Homicide, 37 Colum. L. Rev. 701 (1937); see Nemeth, Criminal, supra note 2, at 115.
21. Model Penal Code }210.1 (1962).
22. Id. at }210.2.
23. See Nemeth, Criminal, supra note 2, at 93-97; People v. Erikson, No. 25854 (Ca. Super. Ct. 1997); Edward Imwinkelried, Evidence Pedagogy in the Age of Statutes, 41 J. Legal Educ. 227 (1991).
24. People v. Morris, 187 N.W. 2d 434, 438-443 (Mich. App. 1971).
25. Id.
26. See Nemeth, Criminal, supra note 2, at 128-135; Kenneth W. Simons, Does Punishment for “Culpa- ble Indifference” Simply Punish for “Bad Character”? Examining the Requisite Connection Between Mens Rea and Actus Reus, 6 Buff. Crim. L.R. 219 (2002); Guyora Binder, The Rhetoric of Motive and Intent, 6 Buff. Crim. L.R. 1 (2002).
27. See Nemeth, Criminal, supra note 2, at 97-99; Binder, supra note 26.
28. 18 Pa. Cons. Stat. Ann. }2503 (a) (West 2010).
29. Id. at }2504 (a).
30. See Nemeth, Criminal, supra note 2, at 128-129; Simons, supra note 26; Binder, supra note 26.
31. Mo. Rev. Stat. }565.024 (2010).
32. See Nemeth, Criminal, supra note 2, at 135-144; Dana K. Cole, Expanding Felony-Murder in Ohio: Felony-Murder or Murder-Felony? 63 Ohio St. L.J. 15 (2002); Rudolph J. Gerber, The Felony Murder Rule: Conundrum Without Principle, 31 Ariz. St. L.J. 763 (1999); Guyora Binder, The Model Penal Code Revisited: Felony Murder and Mens Rea Default Rules: A Study in Statutory Interpretation, 4 Buff. Crim. L.R. 399 (2000).
33. Dix & Sharlot, supra note 6, at 470.
34. See Nemeth, Criminal, supra note 2, at 137.
35. James J. Tomkovicz, The Endurance of the Felony-Murder Rule: A Study of the Forces that Shape Our Criminal Law, 51 Wash. & Lee L. Rev. 1429 (1994).
36. Model Penal Code }211.1 (1962).
37. See Nemeth, Criminal, supra note 2, at 185.
38. Model Penal Code }211.2 (1962).
39. 18 Pa. Cons. Stat. }302 (2010).
40. See 18 Pa. Cons. Stat. }}2705-2710 (2010).
41. Guy et al., supra note 5, at 187.
294 PRIVATE SECURITY AND THE LAW
Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:20:29.
C op
yr ig
ht ©
2 01
1. E
ls ev
ie r S
ci en
ce &
T ec
hn ol
og y.
A ll
rig ht
s re
se rv
ed .
42. Model Penal Code }212.1 (1962).
43. See State v. Williams, 526 P.2d 1244 (Ariz. 1 974); People v. Caudillo, 580 P. 2d 274 (Cal. 1978); see also Richard Sanders, “Double Offense” Problems in Kidnapping and False Imprisonment Cases, Fla. B.J., Dec. 2003, at 10.
44. Model Penal Code }212.3 (1962).
45. Kelley V. Rea, The Legal Risks of Conducting a Security-Initiated Investigation, 28 Sec. 23 (1991); see also Richard A. Bales & Jeffrey A.McCormick,Workplace Investigations in Ohio, 30 Cap. U. L. Rev. 29 (2002).
46. Robert L. Rabin, Pain and Suffering and Beyond: Some Thoughts on Recovery for Intangible Loss, 55 DePaul L. Rev. 359 (2006).
47. Brenda V. Smith, Checklist Of State Criminal Laws Prohibiting The Sexual Abuse Of Persons In Custody Of Law Enforcement, Lock-Up And Jail Authorities (2008) available at http://www.wcl .american.edu/nic/legal_responses_to_prison_rape/lock-up_fifty_state_checklist.pdf?rd¼1.
48. John Ashby, Employment References: Should Employers Have An Affirmative Duty To Report Employee Misconduct To Inquiring Prospective Employers? 46 Ariz. L. Rev. 117 (2004); Mark Minuti, Employer Liability Under The Doctrine Of Negligent Hiring: Suggested Methods For Avoiding The Hiring Of Dangerous Employees, 13 Del. J. Corp. L. 501 (1988); Henley v. Prince George’s County, 479 A.2d 1375, 1381 (Md. App. 1984), aff ’d in part and rev’d in part, 503 A.2d 1333 (Md. 1986).
49. See Nemeth, Criminal, supra note 2, at 205; Henry L. Chambers, Jr., (Un)Welcome Conduct and the Sexually Hostile Environment, 53 Ala. L. Rev. 733 (2002); NiloofarNejat-Bina, Employers as Vigilant Chaperones Armed with Dating Waivers: The Intersection of Unwelcomeness and Employer Liability in Hostile Work Environment Sexual Harassment Law, 20 Berkeley J. Emp. & Lab. L. 325 (1999).
50. Model Penal Code }213.1 (1962).
51. See Charles P. Nemeth, Judicial Doubt or Distrust: Court Ordered Psychiatric Examination of Rape Victims, 12 Hum. Rights 1 (1984); David P. Bryden, Forum on the Law of Rape: Redefining Rape, 3 Buff. Crim. L.R. 317 (2000).
52. 18 Pa. Cons. Stat. }3126 (2010).
53. Id. at }3127.
54. Kurt A. Decker, A Manager’s Guide to Employee Privacy (1989).
55. 33 Am. Jur. Trials, 286-289.
56. See William C. Cunningham & Todd H. Taylor, The Hallcrest Report, Private Security and Private Police in America (1985).
57. See Nemeth, Criminal, supra note 2, at 310.
58. Robert A. Neale, Arson: The Overlooked Threat to Homeland Security, Emergency Management Online Issue, Sept. 7, 2010, at http://www.emergencymgmt.com/safety/Arson-Homeland-Security.html.
59. Model Penal Code }220.1 (1962).
60. Id. at }220.1 (1962); see Nemeth, Criminal, supra note 2, at 315-319.
61. See Dix & Sharlot, supra note 6, at }410.
62. See 18 Pa. Cons. Stat. }}3301-3307 (2010).
63. Charles P. Nemeth, Private Security and the Investigative Process 263-264 (3rd ed. 2010).
64. Clark & Marshall, supra note 1.
65. Id. at 984.
66. Id. at 986-987.
67. See Nemeth, Criminal, supra note 2, at 298-302.
68. See N.Y. Criminal Law }}140 (McKinney 1980); Nemeth, Criminal, supra note 2, at 302.
Chapter 6 • Collection, Preservation, and Interpretation of Evidence 295
Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:20:29.
C op
yr ig
ht ©
2 01
1. E
ls ev
ie r S
ci en
ce &
T ec
hn ol
og y.
A ll
rig ht
s re
se rv
ed .
69. Nemeth, Private Security, supra note 63, at 245.
70. See Albert Coates, Criminal Intent in Burglary, 2 N.C. L. Rev. 110 (1924); see also Champlin v. State, 267 N.W.2d 295 (Wis. 1978); State v. Ortiz, 584 P.2d 1306 (N.M. 1978).
71. Clark & Marshall, supra note 1, at 1007.
72. See Nemeth, Criminal, supra note 2, at 307-310.
73. Model Penal Code }221.2 (1) (1962).
74. John Francis, Security Officer Manual (1992).
75. See Nemeth, Criminal, supra note 2, at 168-172.
76. Model Penal Code }222.1 (1) (1962).
77. Wayne R. Lafave & Austin W. Scott, Sr., Criminal Law 698-699 (1972); see also People v. Woods, 360 N.E.2d 1082 (N.Y. 1977); Commonwealth v. Mays, 375 A.2d 116 (Pa. Super. 1977).
78. Lafave & Scott, supra note 77, at 200.
79. See People v. Beebe, 245 N.W.2d 547 (Mich. App. 1976).
80. See Nemeth, Criminal, supra note 2, at 253.
81. James Cleary, Prosecuting the Shoplifter, A Loss Prevention Strategy (1986); Anne-Marie G. Harris, Shopping While Black: Applying 42 U.S.C. }1981 To Cases of Consumer Racial Profiling, 23 B.C. Third World L.J. 1 (2003); see also Center for Retail Research, The Global Retail Theft Barometer (10th ed. 2010) available at http://www.globalretailtheftbarometer.com/pdf/grtb-2010-summary.pdf
82. Clark & Marshall, supra note 1, at 802.
83. Id. at 804-807.
84. Md. Code Ann. Criminal Law }3-401 (West 2010).
85. Model Penal Code }223.2 (Proposed Official Draft 1962).
86. Guy et al., supra note 5, at 152.
87. Model Penal Code 56 (Tentative Draft 1953).
88. Model Penal Code }223.3 (1962).
89. See Nemeth, Criminal, supra note 2, at 275.
90. R.I. Gen. Laws }11-41-4 (2009).
91. Model Penal Code }223.4 (1962).
92. See Nemeth, Criminal, supra note 2, at 270-274.
93. Model Penal Code }223.5 (1962).
94. Id. at }223.6; see Nemeth, Criminal, supra note 2, at 269-270.
95. Id. at }223.7; see Nemeth, Criminal, supra note 2, at 264-265.
96. See Nemeth, Criminal, supra note 2, at 265-267.
97. 18 Pa. Cons. Stat. }3929 (2010).
98. For a thorough analysis of retail theft and its legal and commercial applications, review James Cleary, Prosecuting the Shoplifter, A Loss Prevention Strategy (1986).
99. Id. at 19.
100. Nemeth, Private Security, supra note 63, at 234-238 (2010).
101. Bill Zalud, Retail’s 7 Greatest Security Hits! 28 Sec. 34, 35 (1991).
102. See Nemeth, Criminal, supra note 2, at 275-277.
296 PRIVATE SECURITY AND THE LAW
Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:20:29.
C op
yr ig
ht ©
2 01
1. E
ls ev
ie r S
ci en
ce &
T ec
hn ol
og y.
A ll
rig ht
s re
se rv
ed .
103. Note, Insurance Firms Toughen Fraud Fight, 29 Sec. 65 (1992).
104. See Nemeth, Criminal, supra note 2, at 277-283.
105. Clark & Marshall, supra note 1, at 954; see Me. Rev. Stat. Ann. tit. 17-A }702 (2009); Or. Rev. Stat. }165.013 (2009); State v. Tarrence, 985 P.2d 225 (Ore. App. 1999); U.S. v. Sherman, 52 M.J. 856 (U.S. Army Ct. Crim. App. 2000).
106. Iowa Code }715A.2 (2008).
107. 18 Pa. Cons. Stat. }4102 (2010).
108. Id. at }}4103-4104.
109. Id. at }}4105-4106; see also Md. Code. Ann. Criminal Law }}8-103, 8-214 (West 2010).
110. See Cunningham & Taylor, supra note 56.
111. 18 Pa. Cons. Stat. }5501 (2010).
112. Id. at }5104.
113. Id. at }5507.
114. Id. at }7506.
115. Id. at }5502.
116. Id. at }5503; see Nemeth, Criminal, supra note 2, at 56, 102.
117. 35 PA. CONS. STAT. }780-102; 18 Pa. Cons. Stat. }5505 (2010).
118. Ohio Rev. Code Ann. }2917.11(B)(1) (West 2010).
119. 18 Pa. Cons. Stat. }5506 (2010).
120. Id. at }5507.
121. Id. at }5508; Ohio Rev. Code Ann. }2917.12(7) (West 2010).
122. Id. at }5509.
123. Miss. Code Ann. }97-35-37 (2010).
124. Wis. Stat. }947.02 (2010).
125. See Charles P. Nemeth, Law and Evidence 68-74 (2011).
126. See Arnold Markle, Criminal Investigation and the Preservation of Evidence (1977); Jill Witkowski, Can Juries Really Believe What They See? New Foundational Requirements for the Authentication of Digital Images, 10 Wash. U. J.L. & Pol’y 267 (2002).
127. John R. Waltz, Criminal Evidence 389-390 (1975); see also Ignacio v. Territory of Guam, 413 F.2d 513 (9th Cir. 1969), cert. denied, 397 U.S. 943 (1970).
128. See Nemeth, Evidence, supra note 125, at 66.
129. Charles P. Nemeth, Evidence Handbook for Paralegals 41 (1993).
130. See Robert Aronson & Jacqueline McMurtrie, Symposium: Ethics and Evidence: III. The Ethical Lim- itations on Prosecutors When Preparing and Presenting Evidence: The Use and Misuse of High-Tech Evidence by Prosecutors: Ethical and Evidentiary Issues, 76 Fordham L. Rev. 1453 (2007); James W. McElhaney, Proving Your Evidence Is Genuine, A.B.A. J., May 1993, at 96; Joshua A. Perper et al., Suggested Guidelines for the Management of High-Profile Fatality Cases, 132 Archives Pathology & Laboratory Med. 1630 (2008).
131. Model Rules of Prof’l Conduct R. 3.4 cmt. (1989).
132. Jamie S. Gorelick, Stephen Marzen, and Lawrence Solum, Destruction of Evidence 200-202 (1989).
133. Fed. R. Evid. }803 (6).
134. Nemeth, Evidence, supra note 125, at 150-151.
Chapter 6 • Collection, Preservation, and Interpretation of Evidence 297
Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:20:29.
C op
yr ig
ht ©
2 01
1. E
ls ev
ie r S
ci en
ce &
T ec
hn ol
og y.
A ll
rig ht
s re
se rv
ed .
135. See U.S. v. Reese, 568 F.2d 1246 (6th Cir. 1977).
136. John A. Tarantino, Trial Evidence Foundations 6-24 (1986); see also Cascade Lumber v. Cvitanovich, 332 P.2d 1061 (Ore. 1958); contra Liner v. J.B. Tully and Co., 617 F.2d 327 (5th Cir. 1980); Jill Wit- kowski, Can Juries Really Believe What They See? New Foundational Requirements for the Authenti- cation of Digital Images, 10 Wash. U. J.L. & Pol’y 267 (2002); Heather M. Bell, The Year In Review 2001: Cases from Alaska Supreme Court, Alaska Court of Appeals, U.S. Court of Appeals for the Ninth Circuit, and U.S. District Court for the District of Alaska, 19 Alaska L. Rev. 201(2002); Lance Cole, The Fifth Amendment and Compelled Production of Personal Documents after United States v. Hubbell—New Protection for Private Papers? 29 Am. J. Crim. L. 123 (2002).
137. Nemeth, Evidence, supra note 125, at 49-79; see also Nicole J. De Sario, Merging Technology with Justice: How Electronic Courtrooms Shape Evidentiary Concerns, 50 Clev. St. L. Rev. 57 (2002- 2003); Richard Mahoney, Evidence, 2003 N.Z. L. Rev. 141 (2003).
138. Nemeth, Paralegals, supra note 129, at 32.
139. Nemeth, Evidence, supra note 125, at 83-129; see also Katherine A. Godden, Cartoon Criminals: The Unclear Future of Computer Animation in the Minnesota Criminal Courtroom—State v. Stewart, 30 Wm. Mitchell L. Rev. 355 (2003); De Sario, supra note 137; Mahoney, supra note 137.
140. Nemeth, Paralegals, supra note 129, at 55.
141. See Moore v. Illinois, 408 U.S. 786 (1972); State v. Kazold, 521 P.2d 990 (Ariz.1974); In Re Air Crash Disaster, 635 F.2d 67 (2d Cir. 1980); McCormick v. Smith, 98 S.E.2d 448 (N.C. 1957); U.S. v. Addeson, 498 F.2d 741 (D.C. Cir. 1974); State v. Mills, 328 A.2d 410 (Vt. 1974); Prouda v. McLaughlin, 479 A.2d 447 (N.J. Super. Ct. Law Div. 1984).
142. See Stewart M. Casper, Looking Fraudulent Surveillance in the Eye: How to Refute Distorted Evi- dence, Trial, Jan. 1993, at 137; Greg Joseph, Demonstrative Videotape Evidence, Trial, June 1986, at 60, 63; Robert D. Peltz, Admissibility of “Day in the Life” Films, Fla. Bar J., Jan. 1989, at 55; Martha A. Churchill, Day in the Life Films Subject to Court Challenge, For Def., Dec. 1990, at 24; Grimes v. Employer Mutual Liability Insurance Co., 73 F.R.D. 607 (D. Ala. 1977); Bolstridge v. Central Maine Power Co., 621 F. Supp. 1202 (D. Me. 1985); Joyce Lynee Maderia, Lashing Reason to the Mast: Understanding Judicial Constraints on Emotion in Personal Injury, 40 U.C. Davis L. Rev. 137 (2006); Philip K. Anthony & Donald E. Vinson, Demonstrative Exhibits; A Key to Effective Jury Pre- sentation, For Def., Nov. 1986, at 13; David Tait, Rethinking the Role of the Image in Justice: Visual Evidence and Science in the Trial Process, 6 Law, Probability & Risk 311 (2007).
143. Nemeth, Evidence, supra note 125, at 172-182; see also Jerome A. Hoffman, Special Section on Alabama Law: The Alabama Rules of Evidence: Their First Half-Dozen Years, 54 Ala. L. Rev. 241 (2002); Ida-Gaye Warburton, The Commandeering of Free Will: Brainwashing as a Legitimate Defense, 16 Cap. Def. J. 73 (2003); Lawrence M. Solan & Peter M. Tiersma, Hearing Voices: Speaker Identification in Court, 54 Hastings L.J. 373 (2003).
144. See Fed. R. Evid. }602; see also Michael Graham, Handbook of Federal Evidence (1981); Comment, Witness under Article VI of the Proposed Federal Rules of Evidence, 15 Way. L. Rev. 1236 (1969); C. R. Kingston, Law of Probabilities and the Credibility of Witnesses and Evidence, 15 J. For. Sci. 18 (1970).
145. Frederick Overby, Preparing Lay Witnesses, Trial, Apr. 1990, at 88, 91; Judy Clarke, Trial Preparation: The Trial Notebook, Champion, June 1995, at 4; Sandra Guerra Thompson, Beyond a Reasonable Doubt? Reconsidering Uncorroborated Eyewitness Identification Testimony, 41 U.C. Davis L. Rev. 1487 (2008).
146. See U.S. v. Lyon, 567 F.2d 777 (8th Cir. 1977) cert. denied, 435 U.S. 918; U.S. v. Mandel, 591 F. 2d 1347 (4th Cir. 1979).
147. Tarantino, supra note 136, at 3-11–3-22.
148. Marcus T. Boccaccini & Stanley L. Brodsky, Believability of Expert and Lay Witnesses: Implications for Trial Consultation, 33 Prof. Psychol. Res. & Prac. 384-388 (2002).
298 PRIVATE SECURITY AND THE LAW
Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:20:29.
C op
yr ig
ht ©
2 01
1. E
ls ev
ie r S
ci en
ce &
T ec
hn ol
og y.
A ll
rig ht
s re
se rv
ed .
149. Nancy Schleifer, Litigation Forms and Checklists 13-25 (1991).
150. McCormick on Evidence }}43-108 (1972); Alan W. Mewitt, Psychiatric Testimony as to Credibility in Criminal Cases, 13 Crim. L.Q. 79 (1970).
151. William Pipkin, Expert Opinion Testimony: Experts, Where Did They Come from and Why are They Here?, 13 Law & Psychol. Rev. 103 (1989); Anne Bowen Poulin, Credibility: A Fair Subject for Expert Testimony?, 59 Fla. L. Rev. 991 (2007); Jennifer L. Mnookin, Idealizing Science and Demonizing Experts: An Intellectual History of Expert Evidence, 52 Vill. L. Rev. 763 (2007); James S. Schutz, The Expert Witness and Jury Comprehension: An Expert’s Perspective, 7 Cornell J.L. & Pub. Pol’y 107 (1997); Ric Simmons, Conquering the Province of the Jury: Expert Testimony and the Profession- alization of Fact-Finding, 74 U. Cin. L. Rev. 1013 (2006); Harold A. Feder, The Care and Feeding of Experts, Trial, June 1985, at 49; Stephen D. Easton, “Red Rover, Red Rover, Send that Expert Right Over”: Clearing the Way for Parties to Introduce the Testimony of Their Opponents’ Expert Witnesses, 55 SMU L. Rev. 1427 (2002).
152. Nemeth, Evidence, supra note 125, at 202.
153. See Fed. R. Evid. }701; see also U.S. v. Burnette, 698 F.2d 1038 (9th Cir 1983), cert. denied, 103 S. Ct. 2106 (1983); U.S. v. Jackson, 569 F.2d 1003 (7th Cir. 1978), cert. denied, 437 U.S. 907.
154. Fed. R. Evid. }703.
155. Id. at }704.
156. Nemeth, Evidence, supra note 125, at 195-228.
157. Tarantino, supra note 136, at 4-5.
158. Nemeth, Evidence, supra note 125, at 186-189, 221-228; see also Fred Ferguson, Advocacy in the New Millennium, 41 Alberta L. Rev. 527 (2003); Sanja Kutnjak Ivkovic et al., Jurors’ Evaluations of Expert Testimony: Judging the Messenger and the Message, 28 Law & Soc. Inquiry 441 (2003).
159. Pinkerton’s Inc., Investigations Department Training Manual (1990).
160. Note, Expert Witness: Corrupt or Inept?, 30 Sec. 98 (1993).
161. 575 Market St. Suite 2125 San Francisco, CA 94105; Phone: (1) 415-536-0288; Fax: (1) 415-764-4915.
162. Nemeth, Paralegals, supra note 129, at 167-168.
163. Nemeth, Evidence, supra note 125, at 34-39; see also Kevin M. Clermont & Emily Sherwin, A Com- parative View of Standards of Proof, 50 Am. J. Comp. L. 243 (2002); Michele Taruffo, Rethinking the Standards of Proof, 51 Am. J. Comp. L. 659 (2003).
164. Waltz, supra note 127, at 11; See Nemeth, Evidence, supra note 125, at 16; Major Charles H. Rose III, New Developments: Crop Circles in the Field of Evidence, Army L., April/May 2003, at 43.
165. Waltz, supra note 127, at 13; Nemeth, Evidence, supra note 125, at 16-17.
166. Nemeth, Evidence, supra note 125, at 18.
167. Waltz, supra note 127, at 13.
168. Id.; see Nemeth, Evidence, supra note 125, at 11-15; see also Scott Brewer, Scientific Expert Testi- mony and Intellectual Due Process, 107 Yale L.J. 1535 (1998).
Chapter 6 • Collection, Preservation, and Interpretation of Evidence 299
Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:20:29.
C op
yr ig
ht ©
2 01
1. E
ls ev
ie r S
ci en
ce &
T ec
hn ol
og y.
A ll
rig ht
s re
se rv
ed .
Intentionally left as blank
Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:20:29.
C op
yr ig
ht ©
2 01
1. E
ls ev
ie r S
ci en
ce &
T ec
hn ol
og y.
A ll
rig ht
s re
se rv
ed .
7 Public and Private Law Enforcement
A Blueprint for Cooperation
CHAPTER OUTLINE
Introduction: The Relationship between the Public and Private Sectors ................................. 301
Public Interest versus Private Concerns....................................................................................306
Moral or Egalitarian Purpose ...................................................................................................307
A Caste System of Professionalism...........................................................................................308
A Failure to Communicate and Cooperate..............................................................................310
Positive Programs on Interaction and Cooperation ................................................................... 314
College and Municipal Police Forces........................................................................................316
Transit and Municipal Police Forces.........................................................................................319
Private Security Industry and Law Enforcement Agencies .....................................................321
Recommendations......................................................................................................................... 324
National Advisory Committee on Criminal Justice..................................................................324
The Hallcrest Report..................................................................................................................326
The Private Sector Office of the Department of Homeland Security ....................................327
Summary........................................................................................................................................ 328
Discussion Questions.................................................................................................................... 329
Notes.............................................................................................................................................. 329
Introduction: The Relationship between the Public and Private Sectors The interplay between public and private law enforcement and the modern delivery of
public safety from privatized interest continue unabated. Everywhere across this rich
country, public police entities engage the private sector, governments employ private
sector companies for security of facilities and asset protection, communities turn to
both arms of the justice model, and the military industrial complex appreciates the
value of private sector involvement in military operations. It is the commonality of inter-
ests that spurs on this unbridled growth in cooperation. Despite the differences in legal
powers, employers, and mission, private security officers and public police have many
similarities.1
The historical legacy that characterizes the relationship between the public and private
justice systems is less than positive though continuously improving. In 1976, the Private
Security Advisory Council, through the U.S. Department of Justice, delivered an insightful
Private Security and the Law
Copyright © 2012 by Elsevier Inc. All rights of reproduction in any form reserved. 301
Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:21:28.
C op
yr ig
ht ©
2 01
1. E
ls ev
ie r
S ci
en ce
& T
ec hn
ol og
y. A
ll rig
ht s
re se
rv ed
.
critique on the barriers to full and unbridled cooperation between the public and private
law enforcement systems. Struggling with role definition and resource deployment, the
relationship has been an uneasy but steady one. The council stressed the need to clarify
role definitions and end the absurd and oft-practiced negative stereotyping.2 The council
cited various areas of conflict and ranked them in order of importance:
1. Lack of mutual respect
2. Lack of communication
3. Lack of cooperation
4. Lack of security enforcement knowledge of private security
5. Perceived competition
6. Lack of standards
7. Perceived corruption3
Put another way, each side operates from a series of perceptions, some accurate, others
not. For the most part, the caricatures inhibit full cooperation. The Hallcrest Report I4
decisively addressed this issue. In characterizing the police role as inclined toward crime
detection, prevention, and control, security will always be to some extent the public
police’s antagonist. Private police give less attention to apprehension, crime detection,
prevention, and technology than do their public counterparts. Comparatively, private
security addresses similar subject matter but still dwells intently on the protection of
assets, immediate deterrence, and commercial enforcement. Figure 7.1 note 5 provides
a graphic illustration of the major distinctions between these two entities. Tables 7.1
note 6 and 7.2 note 7 further edify these occupational distinctions.
n n n
Learn about Hallcrest Systems, the consulting firm that produces outlook reports on the
private sector at http://www.hallcrestsystems.com.
n n n
A cursory assessment of these figures shows fundamental agreement on the protec-
tion of lives and property. Departure occurs in the upper classifications of law enforce-
ment since the thrust of any public police department must be for the eventual arrest
and prosecution of suspects. In contrast, the private justice function is still concerned
Input Role/Function Targets Delivery System Output
Citizen Crime Prevention General Government Enforcement & Apprehension
Client Crime Prevention Specific Profit-Oriented Enterprise Loss Reduction/Assets Protection
Private PublicSecurity Services
FIGURE 7.1 Comparison between
public and private police functions.
302 PRIVATE SECURITY AND THE LAW
Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:21:28.
C op
yr ig
ht ©
2 01
1. E
ls ev
ie r
S ci
en ce
& T
ec hn
ol og
y. A
ll rig
ht s
re se
rv ed
.
with preventive activities in the area of crime loss, fire prevention, and other order-
maintenance functions. In the security manager rankings, criminal investigation and
arrest and prosecution show up in the lower rankings. This prioritization, in and of itself,
is a telling distinction, though it should not be viewed as justification for a sharp divi-
sion. If anything, both public and private law enforcement share a generic goal—namely,
the general enforcement of laws. As Bill Strudal points out in his article, “Giving the
Police a Sense of Security”:
Our goal, usually not shared by police and security is law enforcement . . . if we accept
the premise that police and security have the same goals, then why don’t we work
together on a regular basis? There are differences; nobody can deny that . . . there
are many other gaps between the two forces, but none is insurmountable with good
training and dialogue.8
Table 7.1 Security Manager Rankings of Private Security Functions (Rank Ordered)
Proprietary Managers Contractual Managers
1. Protection of lives and property 1. Protection of lives and property
2. Crime prevention 2. Crime prevention
3. Loss prevention 3. Loss prevention
4. Fire prevention 4. Fire prevention
5. Access control 5. Access control
6. Crime investigation 6. Order maintenance
7. Employee identification 7. Employee identification
8. Order maintenance 8. Crime reporting
9. Arrest/prosecution 9. Arrest/prosecution
10. Accident prevention 10. Information security
11. Crime reporting 11. Crime investigation
12. Information security 12. Accident prevention
13. Traffic control 13. Traffic control
N ¼ 676 N ¼ 545
Table 7.2 Law Enforcement Executive Ratings of Law Enforcement Function (Rank Ordered)
1. Protection of lives and property
2. Arrest and prosecution of criminals
3. Investigation of criminal incidents
4. Maintaining public order
5. Crime prevention
6. Community relations
7. General assistance to the public
8. Traffic enforcement
9. Traffic control
N ¼ 384
Chapter 7 • Public and Private Law Enforcement 303
Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:21:28.
C op
yr ig
ht ©
2 01
1. E
ls ev
ie r
S ci
en ce
& T
ec hn
ol og
y. A
ll rig
ht s
re se
rv ed
.
The similarities between function, duty, and obligation are very apparent when the tasks
of investigation are considered. The skills of the private sector are essentially identical to
those of the public sector. Review Figure 7.2 to see the diverse opportunities shared and
borne by both the private and public sectors.
Given the equal occupational capacity of both the private and public sectors to
engage in these many activities, cooperation rather than division appears a wiser tactic.
Surely, the concerns of private sector justice increasingly mirror that of the public
model. Security’s threats and concerns are charted at Table 7.3.9
Employee theft, property crime, and access controls are the top concerns of security
professionals. Computer and information security concerns continue to increase as the
most important security-related concerns.
Another recurring stumbling block, at least perceptually, is public law enforcement’s
attitude of superiority. Table 7.410 indicates that traditional law enforcement takes a dim
view of the contribution of proprietary and contractual security when compared to its
own role, though the merger of functions and roles will likely shrink this chasm in the
near future. But there is a road to travel.11
FIGURE 7.2 Common tasks of private and public officers.
Table 7.3 Security 2001 Profile: Security Threats, Concerns
2001 1999 1998 1997
1. Property crime 1. Employee theft 1. Employee theft 1. Employee theft
2. Employee theft 2. Property crime 2. Property crime 2. Property crime
3. Violent crime 3. Access/egress 3. Access/egress 3. Fire/safety*
4. Computer sec 4. Computer sec 4. Violence** 4. Access/egress
5. Access/egress 5. Parking sec 5. Computer sec 5. Computer sec
6. Parking sec 6. Violent crime 6. Parking sec 6. Work violence
7. White collar 7. Burglary 7. Burglary 7. Violent crime
*Fire and life safety concerns broken out as a separate question since 1998.
**Workplace violence broken out as a category under life safety concerns since 1998. On the security side, workplace violence and
violent crime combine together this year into one category called violent crime.
304 PRIVATE SECURITY AND THE LAW
Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:21:28.
C op
yr ig
ht ©
2 01
1. E
ls ev
ie r
S ci
en ce
& T
ec hn
ol og
y. A
ll rig
ht s
re se
rv ed
.
In appraising the findings of this perceptual study, the Hallcrest II authors suggest:
Here again, law enforcement executives gave markedly lower ratings than did the
private security managers. They agreed, however, on the areas that deserved the
highest and lowest ratings. Thus, both the law enforcement executives and the secu-
rity managers felt that private security was relatively effective in reducing the dollar
loss of crime, and relatively ineffective in apprehending larger numbers of crim-
inals. This ranking is consistent with the preventive orientation of private security,
which is more concerned with loss control than with arrest and prosecution for
crimes. Consistent, too, is the finding that proprietary security managers gave
themselves highest marks for maintaining order.12
Unfortunately, slight differences in approach and methodology have increased the divide
between these camps. And with these attitudes in place, it becomes a much more difficult
task to partner and cooperate. A 2004 Policy Summit co-sponsored by public and private
law enforcement associations lists the main reasons why these alliances falter:
• Egos and turf battles
• Lack of resources (funds, staff)
• Lack of a product
• Overemphasis on structure or resource needs
• Insufficient commitment and support from higher levels of participating
organizations
• Overemphasis on the social aspect and underemphasis on business
• Unwillingness of partners to share information, especially information that would
reflect poorly on the sharer
• Insufficient alignment of interests 13
To the detriment of all, these petty differences continue to the present.14 John
Driscoll, in his article “Public and Private Security Forces Unite in Dallas,” asserts “this
negative approach prevents the two similar entities from realizing their commonalities
Table 7.4 Private Security Contributions to Crime Prevention and Control: Ratings by Law Enforcement and Private Security Managers
Law Enforcement Proprietary Security Contractual Security
Overall contribution 2.2 1.5 1.2
Reduction in volume of crime 2.4 1.7 1.5
Reduction in direct dollar crime loss 2.2 1.6 1.5
Number of criminal suspects apprehended 2.6 1.9 2.0
Order maintenance 2.4 1.4 1.7
N ¼ 384 N ¼ 676 N ¼ 545 SCALE: 1 ¼ very effective, 2 ¼ somewhat effective, 3 ¼ not effective.
Chapter 7 • Public and Private Law Enforcement 305
Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:21:28.
C op
yr ig
ht ©
2 01
1. E
ls ev
ie r
S ci
en ce
& T
ec hn
ol og
y. A
ll rig
ht s
re se
rv ed
.
and capitalizing upon mutual cooperation.”15 Driscoll recounts the “Dallas experiment”
that stresses interaction between the parties in sharing “criminal information bulletins,
recruit[ing] class training blocks, field training officer and security officer meetings, and
additional joint information seminars.”16 The elitist attitude taken by public law
enforcement fosters a polarization between the public and private sectors. Though role
conflicts and perceptual views of the public and private sectors are compelling argu-
ments, there are other forceful explanations for the natural tension between these com-
peting interests. What is undeniable is the march forward into the public realm, with
examples so numerous it is now difficult to catalog. Private sector operatives now watch
over airports and parks, act as first responders and protectors of federal and state instal-
lations, deliver safety and security to the Olympics and sporting events, conduct surveil-
lance, and assess critical infrastructure. In the final analysis, the playing field will be
leveled a little more each day by the ever-growing numbers of private security forces.17
Public Interest versus Private Concerns
Public law enforcement is and has always been tasked with the needs of the public good.
Few private security companies have to be concerned with domestic disputes, the trans-
portation of the deceased, stray animals, or protection of the homeless and other down-
trodden individuals.18 The Private Security Advisory Council characterized police work
as a public interest function. Public police have “a wide range of responsibilities to pro-
tect essentially public concerns and their efforts are closely tied to statutorily mandated
duties and the criminal justice system.”19 The advisory council further relates that the
police are burdened with constitutional limitations and must interpret and implement
certain guidelines in the performance of their law enforcement duties. Additionally,
public policing is further restrained by public budgeting and financing processes. Police
management policies and an administrative hierarchy within most major police depart-
ments must evaluate and allocate resources according to the needs and demands
presently operating within this community structure.20
Norman Spain and Gary Elkin, in their article, “Private Security versus Law Enforce-
ment,” relate with precision:
One of the traditional functions of the public police is to deter crime. In reality, their
ability to do this is drastically limited. The primary reasons are that the police have
little authority to change the conditions that foster crime and they have no author-
ity to decide who will reside in their jurisdiction, whom they will police. Private
security forces, on the other hand, may alter—at times drastically—the environ-
ment in which they operate. They can have walls and fences erected, doors sealed,
windows screened, lights put up, and intrusion detectors installed. They can often
play a decisive role in determining whom they have to monitor—who is to be an
employee of the company—by conducting background investigations of potential
employees.21
306 PRIVATE SECURITY AND THE LAW
Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:21:28.
C op
yr ig
ht ©
2 01
1. E
ls ev
ie r
S ci
en ce
& T
ec hn
ol og
y. A
ll rig
ht s
re se
rv ed
.
Such a supposition is difficult to dispute, since private security is primarily concerned
with the private concerns of private property assets and particular individuals. “Indivi-
duals and privately funded organizations and businesses undertake measures to provide
protection for the perceived security needs that involve their private interests, not in the
public domain. Private security is an option exercised to provide an additional or
increased level of protection than that afforded by public law enforcement, which must
respond to the larger concerns of the public.”22
Moral or Egalitarian Purpose
Entrance into the vocation of public law enforcement is considered by most a moral
and social commitment—a vocation rather than a mere job. This career distinction is
generally not applied to individuals who commit their lives to the service of private
security. But is such a viewpoint fair and rational? Is not the protection of assets, gov-
ernmental facilities, communities, business interests, private proprietary holdings, or
contributions in military and security initiatives a noble endeavor? If private security
were not involved, what would be the state of American industry and its physical
plants, the security of courthouses and judicial centers, transportation facilities, and
neighborhood associations? How would the dynamic of the battlefield change in for-
eign wars? How would the allocation of military personnel be impacted? For that mat-
ter, how many more employees would the public sector have to hire, on the backs of
already beleaguered taxpayers, to cover the diverse functions of private sector justice?
By what standards are these judgments of moral superiority or social importance
designed? Critics and theoreticians who scathingly condemn the nature of private jus-
tice often forget the historical contribution private security has provided. Long before
the establishment of a formal, publicly funded police department in pre- and postco-
lonial America, private security interests were the only entities providing protection
for individual persons, assets, and business interests. Remember that the nature of a
system of town watches, the “hue and cry,” calling for posse formation and community
cooperation, constables, and part-time sheriffs could hardly be characterized as public
in design.23
Judgments about private sector justice cannot be made in a vacuum but must be
evaluated in light of the range of services the industry provides a troubled world. To
be more particular, who would protect the majority of federal installations? Who would
protect the majority of American museums? What force or body would ensure safety and
protection in the college and university environment? What other bodies would provide
adequate crowd control at entertainment events? What cost would society incur to
ensure a public police officer in each bank? Should taxpayers’ money be spent in
the transportation of money and other negotiable instruments? What police depart-
ment would provide adequate security for American corporations? How far could city
budgets be stretched to provide a secured environment for its multiple retail establish-
ments if security services were absent? When these queries are explored, public law
Chapter 7 • Public and Private Law Enforcement 307
Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:21:28.
C op
yr ig
ht ©
2 01
1. E
ls ev
ie r
S ci
en ce
& T
ec hn
ol og
y. A
ll rig
ht s
re se
rv ed
.
enforcement’s tendency to preach from a high moral pedestal is not as convincing.
Richard Kobetz and H. H. Antony Cooper, in their article “Two Armies: One Flag,”
cogently state:
It is no exaggeration to aver that without the aid of those presently engaged in the
various tasks of private security, the resources of public law enforcement would
have to be expanded far beyond the limits that the taxpayer could afford and would
pay. Even those who do not contribute directly to the cost of providing private secu-
rity services benefit to some notable extent from their existence. Private security is
not a public luxury. It represents a substantial contribution to the general security
of the community. In their impact on the community public and private law
enforcement are one and indivisible.24
A Caste System of Professionalism
Private security has long been an underclass when compared to public law enforcement.
Differences in orientation, training, requirements, and social status accorded these posi-
tions have a great deal to do with the class or status differentiation. While much time
and energy has been expended in the professionalization of public law enforcement,25
negative stereotypes, justified or not, still exist concerning private security personnel.
The most powerful trend is the continued growth of the private security industry, both
in real terms and relative to law enforcement. In 1987, the director of the U.S. Justice
Department’s National Institute of Justice (NIJ) wrote that
cooperation becomes increasingly essential with the growth of the private security
industry. [In policing,] resources to meet the increasing demand have dwindled.
In most major cities, police personnel have declined, and the number of police
employees per 1,000 population dropped 10 percent between 1975 and 1985.
Shrinking tax revenues throughout the country and outright taxpayer revolts . . .
have curtailed growth in government. Police, like other public administrators, have
become familiar with cutback management.26
The Private Advisory Council expounds that these attitudes
are based on incorrect assumptions that private security personnel perform the
same job duties as patrol officers and investigators in law enforcement, and that
a broad generalization can be made about the nature and personnel of all compo-
nents of proprietary and contractual security—guards, private patrol services, pri-
vate investigators, armored car guards and armed couriers, and alarm response
runners and installers. Certainly, the security industry and private justice practi-
tioners must concede there is a distinction between the level of training and
308 PRIVATE SECURITY AND THE LAW
Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:21:28.
C op
yr ig
ht ©
2 01
1. E
ls ev
ie r
S ci
en ce
& T
ec hn
ol og
y. A
ll rig
ht s
re se
rv ed
.
qualifications for certification. The security industry has been its own worst enemy
in this area by failing to promote high level, sophisticated standards of educational
requirements.27
In response to the call for increased state and local regulation of the private security
force, Richard Lukins, in his article “Security Training for the Guard Force,” castigates
the industry for its lack of action:
This trend has not caught the affected components of the private security industry—
the guard services and proprietary security managers—completely by surprise but it
does not appear that they were totally prepared either. And certainly no one can say
that our industry has established an imposing record of self-regulation.28
Lukins further relates that the present impression of a security guard as not more
than “half a cop” will be deleterious to future professionalism in the security industry. 29
The quest for professionalism requires more than rhetoric. As outlined in Chapter 2 on
regulation, licensing, and qualifications, the road to professionalism is filled with impe-
diments. Those impediments—a lack of educational discipline or cogent body of knowl-
edge, an accepted code of ethics, a prestige or status consensus on occupational roles,
or a seal of social and governmental legitimacy—are all attainable goals.30 To get beyond
the characterization that a private security practitioner is nothing more than a play
policeman, the industry will have to aggressively implement the standards of profession-
alism. On the other hand, much of that judgment is the result of prejudice and stereo-
type. “Private security is aware of this status differential imposed by many law
enforcement personnel and deeply resent it since they feel that law enforcement neither
understands nor empathizes with their crime prevention role. This in turn leads to a
lower level of esteem by private security for law enforcement personnel.”31 Petty bicker-
ing and hate mongering further erodes the ambition of professionalism. Constructive
suggestions regarding increased standards and performance objectives are more in
order. Certification programs such as that offered by ASIS International and its Certified
Protection Professional programs make a real contribution to substantive professional-
ism. The CPP program’s chief objectives are as follows:
1. To raise the professional standing of the field and to improve the practice of security
management by giving special recognition to those security practitioners who, by
passing examinations and fulfilling prescribed standards of performance, conduct,
and education, have demonstrated a high level of competence and ethical fitness.
2. To identify sources of professional knowledge of the principles and practices of
security and loss prevention, related disciplines, and laws governing and affecting the
practice of security.
3. To encourage security professionals to carry out a continuing program of
professional development.32
Chapter 7 • Public and Private Law Enforcement 309
Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:21:28.
C op
yr ig
ht ©
2 01
1. E
ls ev
ie r
S ci
en ce
& T
ec hn
ol og
y. A
ll rig
ht s
re se
rv ed
.
Attaining professionalism will require both dedication and perseverance. Howard
C. Shook, former president of the International Association of Chiefs of Police (IACP),
remarks that the private security sector has “proven its worth and can defend itself from
detractors rather easily.”33 Harold Peterson, in his work “Private Security v. Public Law
Enforcement,”34 calls for a natural respect between the public and private sectors and
highlights the unique and extremely sophisticated expertise exhibited by the private jus-
tice system. He warns the traditionalist in law enforcement:
There are those in both the community and law enforcement who believe that the
public police alone are responsible for crime reduction. If, as a chief, you think like
this, I’m afraid that your agency will fail the public you serve.35
A Failure to Communicate and Cooperate
Predictably, a lack of respect between the public and private sector leads to a lack of
communication. The Private Security Advisory Council cogently concludes:
Since many law enforcement personnel perceive themselves as having a higher
degree of status than private security, and do not properly appreciate the role of pri-
vate security in crime prevention, there will be a tendency to avoid communication
with private security personnel. One might expect that private security would com-
municate freely with law enforcement as a perceived higher status group. But the
intensity of feelings expressed by private security and the ambiguity of their rela-
tionship with law enforcement . . . would seem to indicate an uncertainty as to
the equality of status with law enforcement. Private security, then, would generally
tend to avoid communication with law enforcement; without effective communica-
tion cooperation cannot be imposed.36
Like squabbling relatives, this state of interaction is counterproductive but easily cor-
rectable. Many of the perceptions, viewpoints, and preconceived notions about the role
of private security as it relates to public law enforcement that each party possesses are
highly biased and unscientific. For example, it is ludicrous to argue that the training
and educational requirements for all public law enforcement positions are markedly
higher. Some major police departments, such as the one in the city of Philadelphia, with
a metropolitan area of more than 6 million people, historically required no more than an
eighth-grade education. While this may be an exception to the general requirement of a
high school diploma, it is folly for public police personnel to perceive their educational
requirements as always being more rigorous. Of course, there has been a strong ten-
dency toward higher educational requirements with a recent flurry of legislative activity
concerning the regulation, licensing, and education mandated for private security.37 The
perception that only public policing has erudite training is fundamentally flawed.
310 PRIVATE SECURITY AND THE LAW
Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:21:28.
C op
yr ig
ht ©
2 01
1. E
ls ev
ie r
S ci
en ce
& T
ec hn
ol og
y. A
ll rig
ht s
re se
rv ed
.
Another rationale often espoused by the public sector, which justifies its lack of com-
munication, is functional separation. Some see no benefits to communication because
of distinct occupational roles. The perception that private security protects only those
interests that are strictly private is incorrect. Consider Table 7.5,38 which charts the pub-
lic functions performed by the private justice sector.
Table 7.5 Sites with Experience in Private Provision of Protection Services
State Jurisdiction Type of Service
Alaska Anchorage Parking meter enforcement
Parking meter collection
Parking lot security
Arizona State Parking lot enforcement
Flagstaff School crossing guards
Maricopa County Building security
Phoenix Crowd control
California Federal U.S. Department of Energy facility security
Hawthorns Traffic control during peak hours
Los Angeles Patrol streets surrounding private university
Traffic and security for special events
Los Angeles County Building security
Park security
Norwalk Park security
San Diego Housing project security
Park security
San Francisco Building security
Santa Barbara Airport security
Prison transport
Colorado Denver Building security
Fort Collins Building security
Connecticut Hartford Sport arena security
Florida Dade County Courts, building security
Fort Lauderdale Airport, building security
Pensacola Airport security
St. Petersburg Park security
Hawaii State Parking lot enforcement
Idaho State Regional medical center security
Idaho Falls School crossing guards
Kentucky Lexington Housing project security
Massachusetts Boston Hospital, courts, library security—city
Library security—federal
Nevada Federal Nuclear test site security
New Jersey Sport Authority Sports arena security
New York State Response to burglar alarms in state office
Buffalo County security—federal
(Continued)
Chapter 7 • Public and Private Law Enforcement 311
Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:21:28.
C op
yr ig
ht ©
2 01
1. E
ls ev
ie r
S ci
en ce
& T
ec hn
ol og
y. A
ll rig
ht s
re se
rv ed
.
Those asserting a limited public role for private security inaccurately portray the
industry. Private security personnel have willingly taken on, been legislatively granted,
or freely pursued these traditionally public functions:
• Community protection and services
• Public housing protection
• Parking authority control and security
• Enforcement of motor vehicle laws
• Natural resource activities
• Waterways and port services
• Air and rail protection
• Animal control
• Court security
• Governmental office security
• Private prisons
• Code violation inspectors
• Special event security
• Governmental investigations
Table 7.5 Sites with Experience in Private Provision of Protection Services—Cont’d
State Jurisdiction Type of Service
New York City Security compounds for towed cars
Shelter security
Human Resources Administration security
Building security
Locate cars with outstanding tickets
Arrests for retail store theft
Management training, police
Campus security
Pennsylvania State Unemployment offices security
Welfare offices security
Philadelphia Parking enforcement
Pittsburgh Court security—federal
Patrol city park
High school stadium security
School crossing guards
Transfer of prisoners
Texas Dallas/Fort Worth
Houston
Airport security including baggage checking Building security
Utah State Building security
Training for transit police
Washington Seattle
Tacoma
Building security
Sports arena security
Washington, D.C. District of Columbia Federal Planning and management
building security
312 PRIVATE SECURITY AND THE LAW
Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:21:28.
C op
yr ig
ht ©
2 01
1. E
ls ev
ie r
S ci
en ce
& T
ec hn
ol og
y. A
ll rig
ht s
re se
rv ed
.
The call for cooperation and professional interchange is earnest and well grounded.
Professional associations and groups such as the American Society for Industrial
Security have formulated liaison committees. Additionally, the International Association
of Chiefs of Police has emphasized the unique capacities of the security industry, stating
that it should be viewed as a complement to public law enforcement.39 Even the current
structure and bureaucratic makeup of the Department of Homeland Security includes
a Private Sector Commission that is considered a significant contributor in the war
on terror.40
There can be little dispute that privatization of public services or contracting out
a government responsibility to private employers is a major trend. Not unexpectedly,
much of this activity has been viewed with distrust and apprehension, particularly from
those authorities that intend to ensure the vested interest of police. The Hallcrest Report
I notes that this type of bickering and failure to communicate borders on the inane. The
interest of the public will be better served through “constructive dialogue and creative
planning by law enforcement and private security to facilitate contracting out of certain
non-crime activities.”41 The report further notes that energy, time, and resources are
being wasted in this debate and “could be better utilized in identifying areas for contract-
ing out and developing tightly prescribed contract specifications of performance.” 42
The momentum of privatization makes public reticence to private sector justice even
more unjustified. “But the trick to privatization is not only lowering costs, but also
maintaining quality of service—particularly when the service in question is security.”43
The transference of public obligation to private interest is a trend likely to continue.
See Table 7.6.44
The failure of public and private policing to communicate undermines and
hinders the social order. Public law enforcement, in its own ignorance of the processes
and functions of private law enforcement, simply chooses to disregard the reality of
its professional counterpart. In the same vein, private security, particularly through its
own internal decision making, management, and personnel practices, has done
little to dissuade its reputation that it is a business first and foremost. As one commen-
tator states:
Table 7.6 Possibility of Transferring Responsibility to Private Security
Activity Law Enforcement
Executives Proprietary Security
Managers Contract Security
Managers
Responding to burglar alarms 57% 69% 68%
Preliminary investigations 40% 88% 68%
Completing incident reports
(a) victim declines prosecution;
for insurance purposes only
68% 87% 66%
(b) misdemeanors 45% 81% 63%
Supplemental case reports 38% 78% 63%
Transporting citizen arrests 35% 32% 38%
Chapter 7 • Public and Private Law Enforcement 313
Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:21:28.
C op
yr ig
ht ©
2 01
1. E
ls ev
ie r
S ci
en ce
& T
ec hn
ol og
y. A
ll rig
ht s
re se
rv ed
.
Many problems are constant and intractable while the barriers remain; solutions
become possible only as they fall away. Familiar roles are exchanged for others less
accustomed. The experience is designed expressly to give practical insight into the
domain and responsibility of others. It is a sobering feeling to have once in a while
the privilege of walking a mile in someone else’s moccasins. It is hoped that these
shared experiences may be carried over into the day-to-day realities of professional
life and provide a positive inspiration for cooperation and understanding.45
Failure of both the public and private justice systems to communicate and cooperate
is a staggering loss of human and professional resources. The Private Security Advisory
Council revealed an exceptionally low level of interaction between the public and pri-
vate sectors. Its more salient findings included the following:
1. Less than one-half had conducted a survey to find out how many and what types of
private security agencies operated in their areas;
2. Only one-third of the agencies stated that they had an office or officer to provide
liaison with private security;
3. Only 25 percent of the agencies had policies or procedures for defining working roles
of law enforcement in private security;
4. Only 25 percent had policies covering interchange of information with private
security;
5. Less than 20 percent had procedures for cooperative actions with private security.46
The lack of cooperation and communication negatively impacts both systems, as evi-
dent in Table 7.7. 47
Both law enforcement and the private security industry have a moral and legal obli-
gation to open channels of communication and to cooperate professionally. To maintain
the current relationship is debilitating to efforts to reduce criminality and assure a safer
world. The continued practice of turf protection, stereotyping, and prejudicial analysis
benefits no one. As Kobetz and Cooper relate:
As soon as the essential unity of a mission is perceived and accepted, the special diffi-
culties of responsibility and approach can be studied in detail. For too long, the other
side—our common antisocial enemy—has seen matters in terms of “them versus us,”
is it not time that we, the public and the private providers of security, truly end this
and in a practical and professional fashion begin to think of “us versus them”? 48
Positive Programs on Interaction and Cooperation The best remedy for the unfortunate divide between the public and private justice
model is success by cooperation and integration.49 Instead of diverse worlds, there need
be the forging of a solid professional alliance. Public and private needs see each system
314 PRIVATE SECURITY AND THE LAW
Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:21:28.
C op
yr ig
ht ©
2 01
1. E
ls ev
ie r
S ci
en ce
& T
ec hn
ol og
y. A
ll rig
ht s
re se
rv ed
.
as distinct yet complimentary, unique yet dedicated to a similar mission. “While healthy
competition and fraternal camaraderie are still in the distant future, the likelihood that
more and more local police departments will recognize the hidden wealth that lies in
police private security relations seems closer than ever.”50 To accomplish the objective
of mutual cooperation and communication, certain goals, objectives, and responsibil-
ities have to be met. Daniel E. McElory, in his article “A Professional Alliance,” holds
the following to be essential:
• Recognize certain prescribed standards of performance, education and high level of
professional competence of individuals entering the field or presently employed in
the industry.
• Encourage the use of sound practices, principles of security and loss prevention.
• Promote mutual respect, cooperation, and communication between both sectors as
well as increasing the knowledge of each other’s functions.
• Speak in a unified voice on issues that promote the industry at large.
• Stress and promote programs designed for increasing professional development at all
levels of employment.
• Work to establish liaisons wherever possible that will serve to benefit the entire industry.
• Pursue a program of true professionalism in thought, word, and deed. 51
Table 7.7 Private Security Perceptions of Law Enforcement Cooperation on Criminal Incidents/Assistance Calls
Security Managers Degree of Law Enforcement Cooperation Proprietary Contract
Don’t cooperate
Cooperative reluctantly
Cooperate fully
Interfere with private security investigation
Withhold needed information
2%
23%
71%
2%
9%
N ¼ 676
7%
33%
34%
4%
15%
N ¼ 545 Security Employees
Law Enforcement Response to Assistance Requests Proprietary Contract
Respond promptly
Respond slowly
Depends on situation
Have never called police
59%
3%
32%
6%
35%
10%
36%
19%
Law Enforcement Support for Security Employee Decisions
Support decisions
Do not support
Sometimes support
N/R
75%
1%
11%
13%
N ¼ 110
52%
4%
23%
22%
N ¼ 78
Chapter 7 • Public and Private Law Enforcement 315
Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:21:28.
C op
yr ig
ht ©
2 01
1. E
ls ev
ie r
S ci
en ce
& T
ec hn
ol og
y. A
ll rig
ht s
re se
rv ed
.
Factionalism is surely not a fixed state for either side of the policing model. What
appears more likely on the horizon is the recognition that these are two armies
operating under one flag. The present landscape has many a story to tell about how
these two theaters work in unity. For a sampling of these partnerships, see Appendix 4.
These are the true success stories in the life of private security—the ones where public
and private work as comrades in arms.52
n n n
Review the current state of partnering between the public and private sector at http://www
.ilj.org/publications/docs/Operation_Partnership_Private_Security.pdf.
n n n
College and Municipal Police Forces
The cooperation exhibited between city or municipal police and college and university
security forces is a long-standing example of how these two worlds can effectively
cooperate. William Bess, director of campus safety at Bowling Green State University,
and Galen Ash, director at the Bowling Green Police Department, feel confident that
they have mastered the art of interaction by identifying the essential elements in the
recipe for successful cooperation:
1. Mutual assistance agreement
2. Support from the courts
3. Shared training programs
4. Efficient communications (technical)
5. Ongoing administrative working relations
6. Police/advisory committee participation
7. Shared crime prevention programs
8. Cooperative investigations and sharing of information
9. College educational programs
10. Informal daily contacts.53
At Bowling Green, the private and public police model overcomes the preconceptions
and caricatures so often applied to each model. Both parties indicate that rhetoric is
easy, but activities that are planned and concerted are the elixirs that smooth over the
distrustful state of affairs. The interaction between public and private security, especially
between college and university departments and the city or municipalities in which they
are located, is an ongoing departmental obligation. The National Association of College
and University Business Officers affirms the need for continuing interplay:
The security department must be largely self-sufficient, but able to work harmoni-
ously with other institutional departments. It should also maintain effective liaison
with other law enforcement agencies, the courts, the prosecuting agencies and the
316 PRIVATE SECURITY AND THE LAW
Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:21:28.
C op
yr ig
ht ©
2 01
1. E
ls ev
ie r
S ci
en ce
& T
ec hn
ol og
y. A
ll rig
ht s
re se
rv ed
.
press. It is also advisable that the local chief of police be informed of public func-
tions to be held at the institution, so that he may be prepared to assist if necessary.54
n n n
Find out about the International Association of Campus Law Enforcement Association at
http://www.iaclea.org/visitors/about.
n n n
Not all relationships are born from good will. For example, at both the University of
Pennsylvania and Temple University, the cost cutting of once public police forces
erected a newer private sector model, which has resulted in efforts to unionize the
private guard force. Allied Barton, the replacement company, has been met with severe
labor organizing activities that reflect disgruntlement. On October 10, 2010, the private
force voted to unionize.55
The influence of private sector policing on college campuses is multidimensional.
With the implementation of new federal legislation on the reporting of the campus
crime rate, under the Crime Awareness and Campus Security Act of 1990, 56
private
sector justice computes the crime data. Campuses are required to collect and publish
the following data:
(A) A statement of current campus policies regarding procedures and facilities
for students and others to report criminal actions or other emergencies
occurring on campus and policies concerning the institution’s response to
such reports.
(B) A statement of current policies concerning security and access to campus facilities,
including campus residences, and security considerations used in the maintenance
of campus facilities.
(C) A statement of current policies concerning campus law enforcement, including—
(i) the law enforcement authority of campus security personnel;
(ii) the working relationship of campus security personnel with State and local law
enforcement agencies, including whether the institution has agreements with
such agencies, such as written memoranda of understanding, for the
investigation of alleged criminal offenses; and
(iii) policies which encourage accurate and prompt reporting of all crimes to the
campus police and the appropriate law enforcement agencies.
(D) A description of the type and frequency of programs designed to inform students
and employees about campus security procedures and practices and to encourage
students and employees to be responsible for their own security and the security of
others.
(E) A description of programs designed to inform students and employees about the
prevention of crimes.
Chapter 7 • Public and Private Law Enforcement 317
Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:21:28.
C op
yr ig
ht ©
2 01
1. E
ls ev
ie r
S ci
en ce
& T
ec hn
ol og
y. A
ll rig
ht s
re se
rv ed
.
(F) Statistics concerning the occurrence on campus, in or on non-campus buildings or
property, and on public property during the most recent calendar year, and during
the 2 preceding calendar years for which data are available—
(i) of the following criminal offenses reported to campus security authorities or
local police agencies:
(I) murder;
(II) sex offenses, forcible or non-forcible;
(III) robbery;
(IV) aggravated assault;
(V) burglary;
(VI) motor vehicle theft;
(VII) manslaughter;
(VIII) arson; and
(IX) arrests or persons referred for campus disciplinary action for liquor law
violations, drug-related violations, and weapons possession; and
(ii) of the crimes described in sub clauses (I) through (VIII) of clause (i), of larceny-
theft, simple assault, intimidation, and destruction, damage, or vandalism of
property, and of other crimes involving bodily injury to any person, in which the
victim is intentionally selected because of the actual or perceived race, gender,
religion, sexual orientation, ethnicity, or disability of the victim that are reported
to campus security authorities or local police agencies, which data shall be
collected and reported according to category of prejudice. (G) A statement of policy concerning the monitoring and recording through local police
agencies of criminal activity at off-campus student organizations which are recognized
by the institution and that are engaged in by students attending the institution,
including those student organizations with off-campus housing facilities.
(H) A statement of policy regarding the possession, use, and sale of alcoholic beverages
and enforcement of State underage drinking laws and a statement of policy
regarding the possession, use, and sale of illegal drugs and enforcement of Federal
and State drug laws and a description of any drug or alcohol abuse education
programs as required under section 1011i of this title.
(I) A statement advising the campus community where law enforcement agency
information provided by a State under section 14071(j) of Title 42, concerning
registered sex offenders may be obtained, such as the law enforcement office of the
institution, a local law enforcement agency with jurisdiction for the campus, or a
computer network address.
(J) A statement of current campus policies regarding immediate emergency response
and evacuation procedures, including the use of electronic and cellular
communication (if appropriate), which policies shall include procedures to—
(i) immediately notify the campus community upon the confirmation of a significant
emergency or dangerous situation involving an immediate threat to the health or
safety of students or staff occurring on the campus, as defined in paragraph (6),
unless issuing a notification will compromise efforts to contain the emergency;
318 PRIVATE SECURITY AND THE LAW
Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:21:28.
C op
yr ig
ht ©
2 01
1. E
ls ev
ie r
S ci
en ce
& T
ec hn
ol og
y. A
ll rig
ht s
re se
rv ed
.
(ii) publicize emergency response and evacuation procedures on an annual basis in
a manner designed to reach students and staff; and
(iii) test emergency response and evacuation procedures on an annual basis.57
The International Association of Campus Law Enforcement Administration (IACLEA)
has been a major implementer of the new policy. While the reporting requirements are
administratively cumbersome, the “law has, however, delivered some good. Besides
placating many victims’ rights groups, it directs attention toward campus security with
real and positive impact. As prospective students focus more on crime statistics as
criteria for choosing a college, campuses will tend to beef up onsite security programs
by specifying integrated access control, communications, and monitoring systems in
dormitories, classrooms, parking lots, and other facilities.”58 Local police departments,
as well as state entities, increasingly rely on this information.
Crime is a growing reality on college campuses, as is the paucity of funds to control
and eradicate it. Universities and colleges are increasingly looking to the private sector
to deliver safety and security on campus. Allied Barton is entrusted with the University
of Pennsylvania, works closely with the Philadelphia Police Department, and delivers a
wide array of services to the educational community including the following:
• Campus Fire Safety
• Evacuation Planning
• Drug and Alcohol Abuse
• Domestic Abuse
• High Risk/Confrontational Situation Management
• Clery Act
• Access Control
• Lock-outs and Vehicle Assists
• Campus Escort Services
• Residential Life Security
• Campus Emergency Preparedness
Other companies are major players in the delivery of law enforcement services, and all
of these entities work closely and cooperatively with public law enforcement.
Transit and Municipal Police Forces
In the areas of transit, transportation systems, and other public facilities from airports to
bus stations, the role of private sector justice is clearly evident. Transit systems are often
large and complicated and present serious and significant security challenges for
security professionals.
n n n
See how the Sacramento California Transit system utilizes both public and private police in
the operation of its system at http://www.sacrt.com/lightrail.stm#Security.
n n n
Chapter 7 • Public and Private Law Enforcement 319
Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:21:28.
C op
yr ig
ht ©
2 01
1. E
ls ev
ie r
S ci
en ce
& T
ec hn
ol og
y. A
ll rig
ht s
re se
rv ed
.
Some transit systems, such as the city of Los Angeles and its five surrounding
counties, employ full-time transit police to oversee the safety of its operations.59 Cou-
pling a massive metropolitan area with a highly visible bus and transit service provides
opportune laboratory conditions to test public/private cooperation. So sophisticated is
the interaction between the private transit police and the surrounding city of Los
Angeles and counties that in 1982 Los Angeles County was awarded a grant of
$375,000 for the purposes of “hiring off-duty local police officers to work on a part-time
basis.”60 The benefits of the program over the years since its inception have been many
and include a massive infusion of manpower, which has resulted in a decline of violent
criminality in transit locations.61 The intangible and indirect benefits of interaction and
cooperation seem to be held in the highest regard. Harry Buzz, then assistant chief of the
Transit Police Department, has written:
The indirect benefits include development of working relationships between
members of our local enforcement agencies. The part-time officers have gained
respect for the professionalism of our department which they take back to their
own agency. They have become more sensitized to transit crime and can, while
working with their primary agency, handle unique transit related problems with
confidence.
Transit police officers have benefited from the exposure to highly trained and
experienced officers of other agencies. Also, since transit police officers patrol most
streets in Los Angeles County, especially the high crime areas, they are frequently
called upon to provide backup to local jurisdictions. This is particularly true in
the city of Los Angeles where [the Los Anglese Police Department, LAPD] is operating
with extremely limited personnel resources. On many of these occasions, the officer
being assisted has worked part time for our department and the other officers know
each other.62
Aside from these remarkable benefits, the transit-LAPD experiment has dramatically
increased the public’s perception of safety. That, of course, is the greatest benefit of any
policing process whether public or private.63 Other transit programs which utilize
private sector entities and officers include Seattle, Washington, Milwaukee, Wisconsin,
and Phoenix, Arizona.
n n n
Review the U.S. Department of Transportation’s Guide on security guidelines for mass transit
at http://transit-safety.volpe.dot.gov/publications/security/PlanningGuide.pdf.
n n n
While in many cases interaction and cooperation between public and private law
enforcement is impeded by an atmosphere of distrust and elitism, these examples indi-
cate the capacity to change and to benefit from mutual dedication.
320 PRIVATE SECURITY AND THE LAW
Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:21:28.
C op
yr ig
ht ©
2 01
1. E
ls ev
ie r
S ci
en ce
& T
ec hn
ol og
y. A
ll rig
ht s
re se
rv ed
.
Private Security Industry and Law Enforcement Agencies
Public and private policing have a significant relational history. At the federal level,
various agencies of government, from the Department of Homeland Security (DHS) to
the military branches, have come to heavily depend upon the services of private sector
justice. As the Bureau of Justice Assistance notes in its Engaging Private Security to
Promote Homeland Security, private sector justice can jump in with feet first. Private
security can do the following:
• Coordinate plans with the public sector regarding evacuation, transportation, and
food services during emergencies.
• Gain information from law enforcement regarding threats and crime trends.
• Develop relationships so that private practitioners know whom to contact when they
need help or want to report information.
• Build law enforcement understanding of corporate needs (e.g., confidentiality).
• Boost law enforcement’s respect for the security field. 64
The entire mission of homeland security presumes cooperation and alliances. Even
the president’s guiding mission statement on the defense of this nation notes:
We will help ensure that the Federal Government works with states and local
governments, and the private sector as close partners in a national approach to
prevention, mitigation, and response.65
In homeland defense, the private sector justice model achieves extraordinary benefits
for the collective. According to the Homeland Security Research Corporation, by 2011
the private sector “will trail only DHS in HLS industry procurement volume. This stems
from the forecasted 50% private sector procurement growth from 2007–2011, totaling an
accumulated $28.5B.”66 The face of private sector justice can be discovered across the
DHS spectrum; from privatized forces seeking out terrorists in Iraq and Afghanistan to
the protection of federal installations across the mainland, private sector justice makes
extraordinary contributions in the defense of the country.67
This same mentality extends to both states and localities. Each of these entities seeks
the promotion of safety and security by mutually agreed upon responsibilities and the
appropriate delegation of power and authority to those properly entrusted. Public and
private police must work together since the benefits are so measurable. Partnerships
advance
• Creative problem solving,
• Increased training opportunities,
• Information, data, and intelligence sharing,
• Force multiplier opportunities,
• Access to the community through private sector communications technology, and
• Reduced recovery time following disasters. 68
Chapter 7 • Public and Private Law Enforcement 321
Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:21:28.
C op
yr ig
ht ©
2 01
1. E
ls ev
ie r
S ci
en ce
& T
ec hn
ol og
y. A
ll rig
ht s
re se
rv ed
.
Another successful forging between public and private security forces is between the
city of Amarillo, Texas, and a private security company Allstate Security Industries,
Inc. The president of Allstate and the chief of the Amarillo Police Department recognize
that mutual cooperation benefits both departments. Commencing in August 1981, both
entities devised a program whereby Allstate Security would begin responding to all
alarm calls. In reviewing the findings of an internal study, the department revealed that
“this procedure relieved the police department of the time consuming responsibility of
answering an average of 8 alarms per day and saved the Department approximately
3,428 man hours, or the equivalent of adding 13/4 men per year to their police depart-
ment. All of this was at no cost to the taxpayers.”69 The results of such mutual coopera-
tion are advantageous from an economic as well as a human point of view. As Allstate
continues to pursue alarm calls, the policy frees up other public officers to perform
more critical functions relating to investigative and apprehension processes. As it
spreads out the many responsibilities, the policy reduces the stress level in the entire
department and builds or affirms goodwill between the department, the security
company, and the public at large. Given the success of this relationship, the program
of mutual cooperation was expanded to include a neighborhood patrol program and
a canine program. Current internal studies of these activities indicate a positive
outcome.70
In the early 1980s, Washington State embarked on an ambitious joint endeavor
between the public and private sector entitled the Washington Law Enforcement
Executive Forum (WLEEF). “Membership is composed of 26 individuals equally divided
between the private sector and law enforcement executives, including sheriffs, chiefs,
the state patrol chief, and special agents in charge of the Seattle offices of the FBI and
Secret Service, as well as representation from the state attorney general’s office. Close
relationship and open communication exist between the WLEEF and the Washington
Association of Sheriffs and Police Chiefs.”71 WLEEF’S achievements include the
following:
• funding a statewide loan executive program to enhance management of local police
agencies;
• providing support for the Law Enforcement Executive Journal, the nation’s first law
enforcement/business publication;
• support computer crime control legislation;
• funding and developing a state-wide toll-free hotline for reporting drunk drivers;
• sponsoring legislation for regulation and training of private security personnel;
• promoting a Business Watch program to prevent crimes against businesses; and
• creating an Economic Crime Task Force;
• to assess the nature and extent of white-collar crime in the state,
• to develop strategies to reduce such crime,
• to promote appropriate legislative initiatives and revisions, and
• to collect and disseminate information on economic crime. 72
322 PRIVATE SECURITY AND THE LAW
Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:21:28.
C op
yr ig
ht ©
2 01
1. E
ls ev
ie r
S ci
en ce
& T
ec hn
ol og
y. A
ll rig
ht s
re se
rv ed
.
More recently, WLEEF has been an active participant in the state’s 1991 legislation
on the regulation and licensing of the private security industry. This joint endeavor
produced a variety of positive results, including these:
1. The philosophical and operational “gap” between public law enforcement and
private security is not nearly as wide as often imagined.
2. Competitive security companies can work well together for legitimate common
causes, such as training.
3. A high-quality training program can be put together in a short four-hour block.
4. Good communication between government and the security industry can go a long
way toward making a licensing law workable and meaningful.
5. There are a lot of community resources available for training.73
n n n
Visit WLEEF’S webpage at http://www.wastatesecuritycouncil.org/about.html.
n n n
WLEEF, by and through its Operation Cooperation program, educates both ends of
the justice spectrum on the benefits of cooperation. It designates particular structures
and goals as well for the public-private consortium and delineates how intimate, how
formal or informal, these associations might be. Calling these partnerships, WLEEF finds
plenty of room for distinctive relationships:
Degree of formality. Some programs are formal, incorporated ventures, such as 501(c)
(3) nonprofits; others are merely “clubs” with bylaws and officers; while others are
completely informal.
Specificity of mission. Some exist to solve specific problems, while others are general-
purpose, networking organizations.
Leadership. Some collaborative programs are led by law enforcement, others by the
private sector, and still others jointly by both fields.
Funding. Some programs have no budget, while others are well funded. There are
many models for funding. For example, a partnership may receive money from
participating organizations (including police agencies), from sponsors, or from police
foundations or crime commissions.
Inclusiveness. A partnership may be a collaboration between law enforcement and
private security or between law enforcement and the larger business sector, including
more than security operations. On the law enforcement side, collaboration may
include not only municipal police and sheriffs, but also state and federal law
enforcement officers and school district and campus police. Cooperation also can be
arranged between a single company and the local police department or between a
federal agency and businesses throughout the country.74
WLEEF continues its aggressive promotion of cooperation between the public and
private sector by laying out the essential ways in which these two worlds can cooperate.
Chapter 7 • Public and Private Law Enforcement 323
Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:21:28.
C op
yr ig
ht ©
2 01
1. E
ls ev
ie r
S ci
en ce
& T
ec hn
ol og
y. A
ll rig
ht s
re se
rv ed
.
In the final analysis, mutual cooperation, respect and a passionate orientation toward
professionalism all lead to safer communities. James A. Kirkley, then director of the
Department of Public Safety at the Claremont Colleges in Claremont, California,
critiques the traditional separation of authority and power:
It is now time for a total community effort. The high percentage of non-crime calls
for service, the percentage of non-observable crimes, and the fiscal constraints
placed upon you, make it ludicrous to expect the public police alone to be respon-
sible for reducing crimes.
Teamwork has long been recognized as an essential ingredient in winning. It is
used in all sports, war, business, and even in police work. . . .
The time has come for the public sector and the private sector in law enforcement
to work as a team.75
The consensus building for continual interaction and cooperation between the public
and private sector has come of age.
Recommendations
National Advisory Committee on Criminal Justice
Most professional associations, groups, think tanks, and institutes stress the essentiality
of cooperation between the public and private sectors. Most issue unequivocal recom-
mendations on the sensibility of working closely for a similar goal and cause. The
National Advisory Committee on Criminal Justice Standards and Goals, in its Report of
the Task Force on Private Security, urges significant interaction and close cooperation.
The report concludes:
Over the past decade, the resources devoted to both public law enforcement and the
private security industry have increased as the awareness of the need for greater
crime prevention and control has grown. National leaders have called upon every
private citizen, institution, and business to join their efforts with the criminal
justice system to prevent crime. Although a closer cooperation between the private
security and public law enforcement spheres offers a special opportunity for
improved crime prevention, the relationship has often been ignored, overlooked or
restrained. Recently, however, the potential of that meaningful working relationship
between law enforcement and private security has been recognized.76
Theoretical concerns aside, practical, pragmatic considerations justify and even com-
pel a policy of interaction. As this work has delved into the complex legal and policy
questions involved in private security, one striking, recurring observation occurs—that
for all the clamor about the differences of public and private security, there is really very
little difference between the two entities. Therefore, the limitations and hesitations
about a unified purpose are largely the result of hyperbole and exaggerated positions.
324 PRIVATE SECURITY AND THE LAW
Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:21:28.
C op
yr ig
ht ©
2 01
1. E
ls ev
ie r
S ci
en ce
& T
ec hn
ol og
y. A
ll rig
ht s
re se
rv ed
.
The National Advisory Committee enunciated specific standards, steadfastly
encouraging cooperation, mutual respect, and regular interaction. Stated as specific
goals, the report recommends:
Goal 6.1: Interaction Policies
Effective interaction between the private security industry and law enforcement
agencies is imperative for successful crime prevention and depends to a large extent
on published clear and understandable policies developed by their administrators.
Policies should be developed to serve as guides for modification by appropriate
agencies.77
Goal 6.2: Survey and Liaison with Private Security
Law enforcement agencies should conduct a survey and maintain a current roster of
those security industry components operating in the agencies’ jurisdictions, and
designate at least one staff officer to serve as liaison with them. 78
Goal 6.3: Policy and Procedures
For law enforcement agencies and the private security industry to most effectively
work within the same jurisdiction, policies and procedures should be developed
covering:
(a) the delineation of working roles of law enforcement officers and private security
personnel;
(b) the continuous prompt and reasonable interchange of information; and
(c) cooperative actions between law enforcement agencies and the private security
industry.79
Goal 6.4: Multi-Level Law Enforcement Training in Private Security
There should be a multi-level training program for public law enforcement officials,
including but not limited to:
1. Role and mission of the private security industry;
2. Legal status and types of services provided by private service companies;
3. Interchange of information, crime reporting, and cooperative actions with the
industry; and
4. Orientation in technical and operational procedures.80
Goal 6.5: Mistaken Identity of Private Security Personnel
Title, terms, verbal representations, and visual items that cause the public to mistake
private security personnel for law enforcement officers should be eliminated; security
employers should ensure that their personnel and equipment are easily distinguishable
from public law enforcement personnel and equipment.81
Goal 6.6: State Regulation of Private Security, Uniforms, Equipment and Job Titles
Each state should develop regulations covering use and wear of private
security uniforms, equipment, company names and personnel titles that do not
conflict with those in use by law enforcement agencies within the state.82
Goal 6.7: Law Enforcement Personnel Secondary Employment
Law enforcement administrators should insure that secondary employment of public
law enforcement personnel in the private security industry does not create a conflict
of interest and that public resources are not used for private purposes.83
Chapter 7 • Public and Private Law Enforcement 325
Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:21:28.
C op
yr ig
ht ©
2 01
1. E
ls ev
ie r
S ci
en ce
& T
ec hn
ol og
y. A
ll rig
ht s
re se
rv ed
.
Goal 6.8: Law Enforcement Officer Employment as a Security Manager
No law enforcement officer should be a principal or a manager of a private security
operation where such an association creates a conflict of interest.84
Goal 6.9: Private Investigatory Work
Law enforcement officers should be strictly forbidden from performing any
investigatory work.85
The National Advisory Committee approaches the dilemma on multiple fronts. First,
in order to ensure a cooperative environment between public and private sectors, it har-
kens for continuous and regular interaction and calls for the creation of a liaison officer
and other committees to facilitate the interchange between public and private factions.
The committee also urges the elimination of all conflict of interest situations, especially
as relates to moonlighting and industrial involvement where either an actual or a per-
ceived conflict might exist. Finally, the committee, while insisting on mutual respect
and emulation of each other’s tasks and duties, reminds the private sector that it cannot
be copycat police officers and should not hold itself out, whether by uniform, badge, or
other representation, as operating under the authority of the state or municipality where
it is located. Such actions foster potential abuse and cause confusion in the public eye.
n n n
The Private Sector Office frequently lends its business expertise when evaluating particular
security procedures such as air safety. See: http://tinet.ita.doc.gov/research/programs/ifs/
DHS-OTTI_PilotStudyReport_v7-FINAL.pdf.
n n n
The Hallcrest Report
The Hallcrest Report I accepts the fact that private security has “got its head together
and found its purpose in life.” Its recommendations now insist on a more proactive
and participatory role in the elimination, prevention, and detection of criminality in
society. Some of the following recommendations attest to this philosophical direction:
• Private security should be involved in community crime prevention. 86
• Private security should be participants in the development of an Economic Crime
Institute.87
• Private security should be required, through its associations, to develop crime loss
reporting data and information. 88
• Private industrial security firms should formulate employee awareness programs and
specific corporate policies on business, business ethics, and crime.89
• Private security concerns should be involved in strategic planning, alternative policing
arrangements, and the transfer of selected police activities to the private sector.90
• Private security should provide the resources necessary to design a Private Security
Resource Institute.91
• Private security should establish standard industrial classifications. 92
326 PRIVATE SECURITY AND THE LAW
Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:21:28.
C op
yr ig
ht ©
2 01
1. E
ls ev
ie r
S ci
en ce
& T
ec hn
ol og
y. A
ll rig
ht s
re se
rv ed
.
• Private security should have total access to criminal histories. 93
• Private security should be permitted to achieve an identity through uniforms and
appropriate advertising.94
• Private security should develop the capacity to transfer its technology to the public sector. 95
• Private security should support efforts to standardize qualifications, educational
training, and certification.96
• Private security should provide educational opportunities for public law enforcement
officials.97
• Private security should establish a task force of police and private security personnel
for various purposes.98
As propounded earlier, these recommendations call for a more active involvement in
crime prevention, deterrence, and apprehension than traditionally has been expected.
Private security as an industry can no longer expect to be insulated from either the gov-
ernment’s regulatory process or public scrutiny. As the role of private security expands,
both legally and socially, new responsibilities and obligations must be tackled. Given the
high rate of public dissatisfaction over the performance of the public police systems, pri-
vate police should view increased demands as a sign of confidence. The world’s overall
complexity makes it likely that security is here to stay and flourish. “The world has
shrunk and most industries now face global competition. Businesses are not only
concerned with the ethics and mores of a domestic environment, but must now deal
with the values of a dynamic world market. Vast new technologies in communications
have placed enormous pressures on businesses to protect their data and the assets that
pass through these technologies.”99 Public policing, with its numerous restrictions and
difficulties, can only envy the private police process.
The Private Sector Office of the Department of Homeland Security
Aside from professional associations, think tanks, and other groups, the future for the
private sector will be bound tightly to the activities of the DHS. From its earliest days,
when it was referred to as the Office of Homeland Security, the National Strategy
for Homeland Security,100 states that the role of private security and public law enforce-
ment in terrorism planning and detection was to be a “close partnership.”101 Federal
spending “on anti-terror since 9/11 has tripled.102. . . Estimates of private sector direct
spending on increased security range from $10 billion to $127 billion.”103 Presidential
executive orders since 9/11 repeatedly encourage cooperation between the two sectors
in infrastructure, critical cybercrimes, incident response, and maritime and health pol-
icy.104 The Bureau of Justice Assistance in the Department of Justice urges the creation
of partnerships between the public and private sector. To be a successful partnership,
12 essential components are needed:
• Common goals
• Common tasks
Chapter 7 • Public and Private Law Enforcement 327
Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:21:28.
C op
yr ig
ht ©
2 01
1. E
ls ev
ie r
S ci
en ce
& T
ec hn
ol og
y. A
ll rig
ht s
re se
rv ed
.
• Knowledge of participating agencies’ capabilities and missions
• Well-defined projected outcomes
• A timetable
• Education for all involved
• A tangible purpose
• Clearly identified leaders
• Operational planning
• Agreement by all partners as to how the partnership will proceed
• Mutual commitment to providing necessary resources
• Assessment and reporting 105
DHS formally encourages these sorts of arrangements. Throughout DHS policy
making is the perpetual recognition that it cannot go it alone and that it needs the daily
cooperation of the private sector. Within its Office of Policy, DHS has erected a Private
Sector Office, its chief aims being as follows:
• To engage individual businesses, trade associations, and other nongovernmental
organizations to foster dialogue with the department;
• To advise the secretary on prospective policies and regulations and in many cases on
their economic impact;
• To promote public-private partnerships and best practices to improve the nation’s
homeland security; and
• To promote department policies to the private sector.
Outreach by both sectors is critical to partnering success, though DHS appears to expect
the first initiative from the public sector.
n n n
Visit the Private Sector Office of the Department of Homeland Security (DHS) at http://www
.dhs.gov/xabout/structure/gc_1166220191042.shtm.
n n n
Summary This chapter pragmatically examines the current cooperative programs between public
and private law enforcement. While efforts to stress the commonality of interest between
private and public justice are ongoing, there are still glaring differences regarding legal
authority, rights, and obligations. There have been judicial and social efforts to extend
constitutional protections to private justice. While numerous attempts have been made
to color the activities of private policing as a state action or a governmental exercise,
which in turn affords more significant constitutional protections to the aggrieved suspect,
no permanent bridge has yet been built. Private security, for all of its shortcomings, still
has the upper hand procedurally when compared to the restraints of public policing.
Much of the chapter was concerned with the distinct, yet complementary functional
approaches to crime prevention, deterrence, and policy interests of the public and
328 PRIVATE SECURITY AND THE LAW
Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:21:28.
C op
yr ig
ht ©
2 01
1. E
ls ev
ie r
S ci
en ce
& T
ec hn
ol og
y. A
ll rig
ht s
re se
rv ed
.
private sectors, requirements in training and other qualifications, and a critical review of
stereotypic and prejudicial perceptions of both law enforcement interests. In the final
analysis, the preponderance of the evidence demonstrates that the public/private
division is more an exercise in human prejudice than in logic or knowledge. Public/
private cooperation would be an intelligent exercise of combined resources to combat
criminality in American society. Examples of the cooperation between college and
municipal police departments, private transit police forces, and other private/public
joint ventures were presented. While these examples are not scientifically probative,
they are illustrative success stories.
Finally, recommendations from the National Committee on Criminal Justice
Standards and Goals as well as the findings of the Hallcrest Reports I and II and the
Private Sector Office of the Department of Homeland Security were covered in depth.
The private security industry’s involvement in public justice activities, tasks, and obliga-
tions signals increased responsibility for the industry and demands it to be a major
contributor and policymaker in the elimination of crime and a safer world.
Discussion Questions 1. Offer a few recommendations on how to improve the interaction of private police
and public law enforcement.
2. Do police and private security have any common interests?
3. Does private sector justice have a moral or egalitarian purpose?
4. In your jurisdiction, are there any examples of mutual cooperation between public
and private law enforcement?
5. What are some drawbacks of having a state or local police commission exercising
regulatory oversight over the private security industry?
6. Pose three suggestions on how to equalize the status of public and private law
enforcement.
7. Would it be feasible for state or other governmental regulators to require the security
industry to donate time to assist public law enforcement in public order or public
safety activities?
Notes 1. Arthur J. Bilek, James C. Klotter, & R. Keegan Federal, Legal Aspects of Private Security 180 (1980);
James Pastor, Security Law and Methods (2006); James F. Pastor, Terrorism and Public Safety Polic- ing: Implications for the Obama Presidency (2009).
2. National Advisory Committee on Criminal Justice Standards and Goals, Private Security: Report of the Task Force on Private Security (1976); see also Operation Cooperation, Guidelines for Partner- ships Between Law Enforcement & Private Security Organizations 11 (2000).
3. National Advisory Committee, supra note 2, at 2; see also Operation Cooperation, supra note 2.
Chapter 7 • Public and Private Law Enforcement 329
Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:21:28.
C op
yr ig
ht ©
2 01
1. E
ls ev
ie r
S ci
en ce
& T
ec hn
ol og
y. A
ll rig
ht s
re se
rv ed
.
4. William C. Cunningham & Todd H. Taylor, Private Security and Police in America (1986); see also Experts Salute Public & Private Sectors on Crime Reduction Collaboration, Security Letter, July 8, 2002; Chris A. Bradford & Clifford A. Simonsen, The Need for Cooperative Efforts between Private Security and Public Law Enforcement in the Prevention, Investigation, and Prosecution of Fraud- Related Criminal Activity, 10 Security J. 161 (1998).
5. William C. Cunningham, John J. Strauchs, & Clifford W. VanMeter, Private Security Trends 1970 to 2000: The Hallcrest Report II 116 (1990); see also Operation Cooperation, supra note 2.
6. Cunningham et al., supra note 5, at 120; see also Operation Cooperation, supra note 2.
7. Cunningham et al., supra note 5, at 118.
8. Bill Strudel, The Private Security Connection: Giving the Police a Sense of Security, Police Chief, Feb. 1982, at 28-29; Law Commission of Canada, In Search of Security: The Roles of Public Police and Private Agencies (2002); George S. Rigakos, The New Parapolice (2002).
9. 2001 Industry Forecast, Security Mag., Chart 2 (2001).
10. Cunningham et al., supra note 5, at 121; see also Operation Cooperation, supra note 2.
11. International Chiefs of Police, National Policy Summit: Building Private Security/Public Policing Partnerships to Prevent and Respond to Terrorism and Public Disorder (2004), available at http:// www.cops.usdoj.gov/files/ric/Publications/national_policy_summit.pdf.
12. Cunningham et al., supra note 5, at 121.
13. International Chiefs of Police, supra note 11, at 18.
14. John E. Driscoll, Public and Private Security Forces Unite in Dallas, Police Chief, 1988, at 48; see also S. Ronald Hauri, Public-Private Security Liaison: The Synergy of Cooperation, Crime & Just. Int’l, Oct. 1997, at 16; Operation Cooperation, supra note 2.
15. Driscoll, supra note 14, at 48; see also Hauri, supra note 14.
16. Driscoll, supra note 14, at 48; see also Hauri, supra note 14.
17. Operation Cooperation, supra note 2, at 11; see also Pastor, Terrorism, supra note 1; James F. Pastor, The Privatization of Police in America: An Analysis and Case Study (2003).
18. Richard A. Lukins, Securing Training for the Guard Force, Security Mgmt., May 1976, at 32.
19. National Advisory Committee, supra note 2, at 5; see Mahesh K. Nalla & Don Hummer, Relations between Police Officers and Security Professionals: A Study of Perceptions, 12 Security J. 31 (1999).
20. National Advisory Committee, supra note 2, at 5; Hauri, supra note 14; Operation Cooperation, supra note 2, at 2-3.
21. Norman M. Spain & Gary L. Elkin, Private Security versus Law Enforcement, 16 Security World 32 (1979); see Nalla & Hummer, supra note 19; Hauri, supra note 14.
22. National Advisory Committee, supra note 2, at 5.
23. E. J. Criscuoli, Jr., Building a Professional Complement to Law Enforcement, Police Chief, 1978, at 28; see also Robert R. Rockwell, Private Guards: A Viewpoint, Security Mgmt., 1975, at 5; Nalla & Hummer, supra note 19; Hauri, supra note 14.
24. Richard W. Kobetz & H. H. A. Cooper, Two Armies: One Flag, Police Chief, 1978, at 28.
25. See generally Charles P. Nemeth, Status Report on Contemporary Criminal Justice Education (discussing education and its correlation to police professionalism) (1988).
26. Operation Cooperation, supra note 2.
27. National Advisory Committee, supra note 2, at 11.
28. Lukins, supra note 18, at 32.
29. Id.
330 PRIVATE SECURITY AND THE LAW
Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:21:28.
C op
yr ig
ht ©
2 01
1. E
ls ev
ie r
S ci
en ce
& T
ec hn
ol og
y. A
ll rig
ht s
re se
rv ed
.
30. Id. at 34; see also Pastor, Terrorism, supra note 1; Pastor, Privatization of Police, supra note 17.
31. See generally Private Security Advisory Council, Codes of Ethics for Private Security Management and Private Security Employees (1976); Private Security Advisory Council, Model Security Guard Training Curricula (1977); Private Security Advisory Council, Report on the Meeting of April 21-23, 1976 (1976); Nemeth, supra note 25.
32. Note, Certified Protection Security and Law Enforcement, Security Mgmt., 1980, at 75.
33. Howard C. Shook, Certified Protection Professional Progress Report, Security Mgmt., 1980, at 75.
34. Harold I. Peterson, Private Security v. Public Law Enforcement, Police Chief, 1983, at 26; see Nalla & Hummer, supra note 19; Hauri, supra note 14.
35. Peterson, supra note 34, at 27; see Nalla & Hummer, supra note 19; Hauri, supra note 14.
36. National Advisory Committee, supra note 2, at 12.
37. See Nemeth, supra note 25; see also Charles P. Nemeth, Directory of Criminal Justice Education, Including Criminology, Law and Justice Related Education (1991); Olson, A Comparison of Some Characteristics of Public and Private Security Personnel, 1 J. Security Admin. 51 (1978) (for further breakdown of the stereotypes on age, income, and educational level).
38. Cunningham et al., supra note 5, at 275-76.
39. Kobetz & Cooper, supra note 24, at 33.
40. See Charles P. Nemeth, Introduction to Homeland Security: Principles and Practice (2010); see also K. C. Poulin & Charles P. Nemeth, Private Security and Public Safety: A Community-Based Approach (2004).
41. Cunningham & Taylor, supra note 1, at 185; see Nalla & Hummer, supra note 19; Hauri, supra note 14.
42. Cunningham & Taylor, supra note 1, at 186.
43. Stephen C. George, Privatization & Integration, 29 Security 5 (1992).
44. Cunningham et al., supra note 5, at 272.
45. Cunningham & Taylor, supra note 1, at 187.
46. National Advisory Committee, supra note 2, at 14.
47. Cunningham & Taylor, supra note 1, at 196.
48. Kobetz & Cooper, supra note 24, at 32.
49. The Law Enforcement-Private Security Consortium, Operation Partnership: Trends and Practices in Law Enforcement and Private Security Collaborations (2005) http://www.ilj.org/publications/docs/ Operation_Partnership_Private_Security.pdf; see also Pastor, Terrorism, supra note 1; Pastor, Priva- tization of Police, supra note 17.
50. Harold W. Gray, Private Security—Some Comments, Police Chief, 1978, at 34; see also Bilek et al., supra note 1, at 206.
51. Daniel E. McElory, A Professional Alliance, Security World, 1979, at 34, 37-38.
52. Andrew Morabito & Sheldon Greenberg, Engaging the Private Sector To Promote Homeland Secu- rity: Law Enforcement-Private Security Partnerships(2005) at http://www.ncjrs.gov/pdffiles1/bja/ 210678.pdf.
53. William R. Bess & Galen L. Ash, City/University Cooperation, Police Chief, 1982, at 42; see also Ronso, The U.S. Air Force Security Police: Is There a Civilian Counterpart? Police Chief, 1982, at 32.
54. Bess & Ash, supra note 53.
55. Fabricio Rodriguea, Philadelphia Security Officer Union, Social Policy 4, 6 (Winter 2010).
56. 20 U.S.C.A. }1092 (West 2010).
Chapter 7 • Public and Private Law Enforcement 331
Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:21:28.
C op
yr ig
ht ©
2 01
1. E
ls ev
ie r
S ci
en ce
& T
ec hn
ol og
y. A
ll rig
ht s
re se
rv ed
.
57. 20 U.S.C.A. }1092(f) (West 2010).
58. Note, Federal Guidance Lacking as Colleges Report Crime Statistics, 30 Security 12 (1993).
59. John W. Powell, Security, 3 Coll. Univ. Bus. Admin. 5 (1974).
60. Harry Budds, Los Angeles Transit Police: A Unique Agency Taking on Unique Challenges, Police Chief, 1982, at 30.
61. Id. at 31.
62. Id.
63. U.S. Dept. of Transportation, Federal Transit Administration, Transit Security Handbook (1998); 4 Transportation Research Board, Public Transportation Security: Intrusion Detection for Public Transportation Facilities Handbook (2004) at http://trb.org/publications/tcrp/tcrp_rpt_86v4.pdf.
64. Bureau of Justice Assistance, Engaging the Private Sector to Promote Homeland Security: Law Enforcement-Private Security Partnerships 11 (2003).
65. The White House Web site, Homeland Security Page, at http://www.whitehouse.gov/issues/ homeland-security.
66. Press Release, Homeland Security Research Corporation, Private Sector to Become 2nd Largest Homeland Security Industry Customer by 2011 (April 9, 2008).
67. For an examination of how these privatized practices prompt ethical concerns, see Kateri Carmola, Private Security Contractors in the Age of New Wars: Risk, Law & Ethics (2008).
68. Bureau of Justice Assistance, supra note 64, at 11.
69. Dale Pancake, The New Professionals: Cooperation between Police Departments and Private Security, Police Chief, 1983, at 34; see also James McGuire, Michael O’Mara & Albert Ware, Training: The Bridge that Connects Public and Private Police, Police Chief, 1983, at 38.
70. Pancake, supra note 69, at 35; David H. Bayley & Clifford D. Shearing, The New Structure of Polic- ing: Description, Conceptualization, and Research Agenda—NCJ 187083 (2001).
71. Cunningham et al., supra note 5, at 255.
72. Id. at 255-256.
73. Note, Private Security and Police Join Training Forces in Washington, Police Chief, Oct. 1992, at 170. Information regarding the program can be obtained from: Washington State Security Council, 6632 S. 191st Place, E-107, Kent, Washington 98032; (206) 872-2450; fax: (206) 872-1403.
74. Bureau of Justice Assistance, Operation Cooperation: Guidelines for Partnerships between Law Enforcement & Private Security Organizations 5 (2000), available at http://www.ilj.org/ publications/docs/Operation_Cooperation.pdf
75. James A. Kirkley, The Role of the Police in Private Security, Police Chief, 1982 at, 35; see Nalla & Hummer, supra note 19; Hauri, supra note 14.
76. National Advisory Committee, supra note 2.
77. National Advisory Committee, supra note 2.
78. National Advisory Committee, supra note 2, at 207.
79. National Advisory Committee, supra note 2, at 211.
80. National Advisory Committee, supra note 2, at 214.
81. National Advisory Committee, supra note 2, at 210.
82. National Advisory Committee, supra note 2, at 222.
83. National Advisory Committee, supra note 2, at 226.
84. National Advisory Committee, supra note 2, at 231.
332 PRIVATE SECURITY AND THE LAW
Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:21:28.
C op
yr ig
ht ©
2 01
1. E
ls ev
ie r
S ci
en ce
& T
ec hn
ol og
y. A
ll rig
ht s
re se
rv ed
.
85. National Advisory Committee, supra note 2, at 236.
86. Cunningham & Taylor, supra note 4, at 237; for a summary of the entire Report see, William C. Cunningham & Todd H. Taylor, Crime and Protection in America: A Study of Private Security and Law Enforcement Resources and Relationships, NCJ Number: 93660 (1984).
87. Cunningham & Taylor, supra note 4, at 241.
88. Cunningham & Taylor, supra note 4, at 242.
89. Cunningham & Taylor, supra note 4, at 242 (1986).
90. Cunningham & Taylor, supra note 4, at 242 (1986).
91. Cunningham & Taylor, supra note 4, at 247 (1986).
92. Cunningham & Taylor, supra note 4, at 249 (1986).
93. Cunningham & Taylor, supra note 4, at 250 (1986).
94. Cunningham & Taylor, supra note 4, at 254 (1986).
95. Cunningham & Taylor, supra note 4, at 259 (1986).
96. Cunningham & Taylor, supra note 4, at 262 (1986).
97. Cunningham & Taylor, supra note 4, at 265-266 (1986).
98. Cunningham & Taylor, supra note 4, at 271 (1986).
99. Ira S. Somerson, Preface to Security @ the Millennium, presentation at ASIS International Seminar and Exhibits, Sept. 27-29, 1999.
100. Office of Homeland Security, Office of the President, National Strategy for Homeland Security 12 (2002).
101. Id.
102. Bart Hobijn, What Will Homeland Security Cost?, Fed. Res. Bank N.Y. Econ. Pol’y Rev., Nov. 2002, at 23, available at http://www.ny.frb.org/research/epr/02v08n2/0211hobi.html.
103. Id. at 28.
104. Diane Ritchey, Public and Private Security: Bridging the Gap, Security Mag. Online, June 1, 2010, at 2, available at http://www.securitymagazine.com/articles/public-and-private-security-bridging- the-gap-1.
105. Bureau of Justice Assistance, supra note 64, at 13.
Chapter 7 • Public and Private Law Enforcement 333
Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:21:28.
C op
yr ig
ht ©
2 01
1. E
ls ev
ie r
S ci
en ce
& T
ec hn
ol og
y. A
ll rig
ht s
re se
rv ed
.
Intentionally left as blank
Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:21:28.
C op
yr ig
ht ©
2 01
1. E
ls ev
ie r
S ci
en ce
& T
ec hn
ol og
y. A
ll rig
ht s
re se
rv ed
.

Get help from top-rated tutors in any subject.
Efficiently complete your homework and academic assignments by getting help from the experts at homeworkarchive.com