6 The Enforcement of Laws

and the Collection, Preservation, and Interpretation of Evidence

CHAPTER OUTLINE

Introduction: Private Security’s Role in Enforcing the Law....................................................... 220

Defining Criminal Liability............................................................................................................ 220

The Criminal Act (Actus Reus) ..................................................................................................221

The Criminal Mind (Mens Rea).................................................................................................222

Classification of Criminal Offenses and Related Penalties ........................................................ 225

Specific Types of Crimes and Offenses ....................................................................................... 227

Offenses against the Person .....................................................................................................227

Felonious Homicide ................................................................................................................. 227

Murder ................................................................................................................................... 227

Manslaughter.......................................................................................................................... 228

Felony Murder Rule................................................................................................................. 229

Assault.................................................................................................................................... 230

Kidnapping and False Imprisonment ........................................................................................ 231

Sexual Offenses ...................................................................................................................... 233

Offenses against the Habitation and Other Buildings ...........................................................260

Arson...................................................................................................................................... 260

Burglary .................................................................................................................................. 261

Robbery .................................................................................................................................. 267

Theft or Larceny...................................................................................................................... 267

Forgery ................................................................................................................................... 275

Offenses against Public Order and Decency............................................................................277

Riot......................................................................................................................................... 278

Public Drunkenness ................................................................................................................. 279

Other Public Order Provisions .................................................................................................. 279

Evidence and Proof ...................................................................................................................280

The Chain of Custody ............................................................................................................. 280

The Admission of Business Records ......................................................................................... 282

Real and Demonstrative Evidence ............................................................................................ 283

Lay Witnesses ......................................................................................................................... 285

Expert Witnesses ..................................................................................................................... 286

Practical Exercise: Cross-Examination ....................................................................................... 288

A. Potpourri of Evidentiary Principles ....................................................................................... 288

Summary........................................................................................................................................ 292

Discussion Questions .................................................................................................................... 292

Notes.............................................................................................................................................. 293

Private Security and the Law

Copyright © 2012 by Elsevier Inc. All rights of reproduction in any form reserved. 219

Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:20:29.

C op

yr ig

ht ©

2 01

1. E

ls ev

ie r S

ci en

ce &

T ec

hn ol

og y.

A ll

rig ht

s re

se rv

ed .

Introduction: Private Security’s Role in Enforcing the Law Private security is an indispensable cog in the American machinery of justice. Previous

commentary outlines the Herculean contributions made by the industry in the protec-

tion of social and economic order. Even private security’s harshest, most strident critics

realize that without the services of private security, a gaping, colossal protection vacuum

would exist in the distribution of justice, the protection of assets and facilities, and

related services. Public policing alone simply cannot fend off the escalating criminality

or solely assure the integrity of community and governmental infrastructures. It is com-

mon knowledge that the security industry performs numerous functions, from crowd

control to physical perimeter protection in public and private installations, and deter-

rent and preventive activities regarding shoplifting and other corporate crime. But pre-

cisely which laws, statutes, or specific violations cover these sorts of activities? Does it

make imminent sense that private security operatives have training and foundational

knowledge in the law of crimes as well as the underlying proof requirements? And if

the industry is to make a meaningful contribution in the apprehension and subsequent

prosecution of criminal behavior, must its agents know and understand the evidentiary

demands for a successful prosecution? Surely any professional security force will need to

comprehend the definitions of criminal behavior and the evidentiary proof that must

accompany any attempt to successfully conclude a criminal investigation and prosecu-

tion. These are the chief aims of the chapter.

Defining Criminal Liability Before private security operatives can intelligently detect or enforce criminal behavior,

they must master the essential elements of the alleged criminal behavior. More particu-

larly, the industry must focus on the crimes more likely encountered by its field

personnel.

Every crime consists of two basic elements:

1. The criminal act: actus reus

2. The mental intent: mens rea

Taking these elements into consideration, guilt under nearly all criminal offenses

calls for proof of both the act itself and the mind that triggers, intends, or prompts the

act. In the mental faculty requirement, the actor must do more than merely act, but con-

template upon the act before its commission and present some sort of mental intention-

ality. One without the other is bound to lead to failure in the American conception of

criminal culpability.

In some intellectual circles there is a third element—namely, causation, which

demands proof that the act and the mind together, working in consort, lead to a

220 PRIVATE SECURITY AND THE LAW

Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:20:29.

C op

yr ig

ht ©

2 01

1. E

ls ev

ie r S

ci en

ce &

T ec

hn ol

og y.

A ll

rig ht

s re

se rv

ed .

particular consequence. While not necessarily central to every criminal advocacy, it is

wise to consider the question of whether a criminal’s mind prompted a particular act

that in turn caused a particular harm or injury. This is a thumbnail sketch of the criminal

definition.

The Criminal Act (Actus Reus)

Not unexpectedly, criminal liability cannot attach without a deed, an act, an offense, or

an omission of specifically enumerated conduct. Crimes are not inventions or fantasies

but real human activity. Merely thinking about crimes, with rare exceptions, is not crim-

inally punishable. Thoughts, no matter how bizarre or perverted, are not punishable

unless put into effect. Thus, in order to be found guilty of theft, an individual has to take

overt steps toward the unlawful taking of another’s property. He or she may think obses-

sively about the desire to be in possession of some object, but until some overt act or

course of conduct is chosen and put into effect, there is no actus reus.1 Hence, every

criminal construction insists on an act of some sort.

A criminal act must be a voluntary act. The law does not hold accountable those indi-

viduals who are mentally incapacitated or operating against their will, by either duress

or coercion, or suffering from a related or corollary disease or mental defect that substan-

tially impacts the mental faculty.2 The American Law Institute’s Model Penal Code, in its

proposed 1962 draft, defines the nature of a voluntary act for criminal liability purposes:

Requirement of Voluntary Act; Admission as Basis of Liability; Possession Is an Act.

(1) A person is not guilty of an offense unless his liability is based on conduct which

includes a voluntary act or the omission to perform an act of which he is

physically capable.

(2) The following are not voluntary acts within the meaning of this Section.

(a) a reflex or convulsion;

(b) a bodily movement during unconsciousness or sleep;

(c) conduct during hypnosis or resulting from hypnotic suggestion;

(d) a bodily movement that otherwise is not a product of the effort or

determination of the actor, either conscious or habitual.

(3) Liability for the commission of an offense may not be based on an omission

unaccompanied by action unless;

(a) the omission is expressly made sufficient by the law defining the offense; or

(b) the duty to perform the omitted act is otherwise imposed by law.3

Criminal liability does not attach unless the prosecution can demonstrate an act that

is voluntary and not the result of unintentional, accidental, or nonvolitional circum-

stances. Acts by omission—that is, a failure to act when the law so dictates, such as

the case of a parent who neglects his child or fails to save the child when in peril—are

also within the definition of actus reus.4 In this sense, acts fall into two categories: com-

mission and omission.

Chapter 6 • Collection, Preservation, and Interpretation of Evidence 221

Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:20:29.

C op

yr ig

ht ©

2 01

1. E

ls ev

ie r S

ci en

ce &

T ec

hn ol

og y.

A ll

rig ht

s re

se rv

ed .

n n n

For a fascinating report on how federal codes are eroding the requirements of a mental state,

read the Heritage Foundation’s report at http://www.heritage.org/research/reports/2010/05/

the-criminal-intent-report-congress-is-eroding-the-mens-rea-requirement-in-federal-

criminal-law.

n n n

An incident report form, like Figure 6.1,5 aids the security investigator in determining

the nature of the act.

The Criminal Mind (Mens Rea)

Determining the state of one’s mind, the mens rea, is a much more complicated exercise

than the proof of a criminal act. It has long been a major tenet of American jurispru-

dence that persons not in control of their mind or fully functional in mental state are

less likely to be criminally responsible. Subjectively or objectively appraising what is in

a person’s mind can be gleaned from the facts themselves, the corpus delicti, the state-

ments and comments of the actor by oral or written form, as well as psychological and

psychiatric evidence. All of these conclusions must be linked to the crime in question.

While most scholars and academics concede that there is such a thing as mens rea, it

is, nevertheless, very subjective and difficult to prove.6 That a defendant may intend

the general consequences of a certain action is clear, but how intensely the person actu-

ally desires to cause harm and the actual injury level the individual intends is harder to

quantify.

Consider the various descriptive adjectives and adverbs that are utilized to describe a

person’s state of mind:

• Felonious intent

• Criminal intent

• Malice aforethought

• Premeditated

• Guilty knowledge

• Fraudulent intent

• Willful with scienter

• With guilty knowledge

• Maliciously

• Viciously

• Intentionally

• With gross disregard

• With depraved heart

• With an evil purpose

• Wantonly

222 PRIVATE SECURITY AND THE LAW

Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:20:29.

C op

yr ig

ht ©

2 01

1. E

ls ev

ie r S

ci en

ce &

T ec

hn ol

og y.

A ll

rig ht

s re

se rv

ed .

FIGURE 6.1 Incident Report.

Chapter 6 • Collection, Preservation, and Interpretation of Evidence 223

Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:20:29.

C op

yr ig

ht ©

2 01

1. E

ls ev

ie r S

ci en

ce &

T ec

hn ol

og y.

A ll

rig ht

s re

se rv

ed .

• Lawfully

• Without justification

• With a corrupted mind

• Criminally negligent

• With disregard for human life

• With depraved indifference

• Without moral turpitude

• Without justification

• Overtly

• With mischievous intent7

Admittedly, these terms can never fully describe the actor’s mind, but at best they

imply the conduct’s level of intentionality. Mens rea codifications attempt to catego-

rize malefactors and their respective mental states, although this is an imperfect

exercise.

n n n

Evaluate the Power Point presentation from the University of North Texas at http://pacs.unt

.edu/criminal-justice/Course_Pages/CJUS_2100/2100chapter2.ppt#329,10,Slide 10.

n n n Diverse descriptive states of culpability have been encompassed in the Model Penal

Code. Some portions are reproduced as follows:

General Requirements of Culpability.

(1) Minimum Requirements of Culpability. Except as provided in Section 2.05, a person

is not guilty of an offense unless he acted purposely, knowingly, recklessly or

negligently as the law may require, with respect to each material element of the

offense.

(2) Kinds of Culpability Defined.

(a) Purposely.

A person acts purposely with respect to a material element of an offense

when:

(i) if the element involves the nature of his conduct or a result thereof, it is his

conscious object to engage in conduct . . .

(ii) if the element involves the attendant circumstances, he is aware of the

existence of such circumstances . . .

(b) Knowingly.

A person acts knowingly with respect to a material element of an offense

when:

(i) if the element involved the nature of his conduct or the attendant

circumstances, he is aware that his conduct is of that nature or he knows

such circumstances exist; and

224 PRIVATE SECURITY AND THE LAW

Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:20:29.

C op

yr ig

ht ©

2 01

1. E

ls ev

ie r S

ci en

ce &

T ec

hn ol

og y.

A ll

rig ht

s re

se rv

ed .

(ii) if the element involves the result of his conduct he is aware that it is

practically certain that his conduct will cause such a result.

(c) Recklessly.

A person acts recklessly with respect to a material element of an offense when he

consciously disregards a substantial and unjustifiable risk that the material element

exists or will result from his conduct. . . .

(d) Negligently.

A person acts negligently with respect to a material element of an offense when he

should be aware of a substantial and unjustifiable risk that the material element

exists or will result from his conduct.8

Security professionals should be vigilant in their assessment of facts and conditions

at a crime scene because conduct can be explained in more than one way. Instead of

always assuming a crime occurred, look for secondary explanations, such as mistake

of fact or law regarding a right to property; inadvertent entry rather than an unlawful

trespass; or an act of self-defense rather than an offensive touching. Security investiga-

tors and officers must not assume that the act is coupled with a criminal mind. Neither

the act nor the mind alone will suffice since “criminal liability is predicated upon a

union of act and intent or criminal negligence.”9

Classification of Criminal Offenses and Related Penalties Common law and statutory guidelines also characterize criminal behavior into various

classifications or types. Those classifications generally include the following:

• Felony10

• Misdemeanor11

• Summary offense12

• Treason13 and other infamous crimes

The security industry’s concern will be the detection and apprehension of misdemea-

nants and felons whose crimes constitute the basic menu of criminal charges including

assault, battery, theft and related property offenses, sexual offenses, intimidation and

harassment, and white-collar crime including forgery, credit card fraud, and the like.

Treason and other infamous crimes emerge in cases of international terrorism and

homeland security, and given the rising influence of private sector justice in the global

war on terror, they should give rise to more involvement. The entire airspace industry

is dependent on personnel not only trained in security issues but also the criminal

law issues that surround breaches of security at airport facilities. Shoplifting and retail

theft may be designated a “summary” offense. Summary offenses generally consist of

public order violations, including failure to pay parking tickets, creating a temporary

Chapter 6 • Collection, Preservation, and Interpretation of Evidence 225

Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:20:29.

C op

yr ig

ht ©

2 01

1. E

ls ev

ie r S

ci en

ce &

T ec

hn ol

og y.

A ll

rig ht

s re

se rv

ed .

obstruction in a public place, public intoxication, or other offenses of a less serious

nature that are rarely punishable by a term of imprisonment14 but are regularly

witnessed by the security professional, like lower-level shoplifting.

At common law, the designation of an act as a felony constituted an extremely seri-

ous offense. Penal and correctional response to felony behavior included the death pen-

alty and forfeiture of all lands, goods, and other personal property. Generally, a felony

was any capital offense, namely, murder, manslaughter, rape, sodomy, robbery, larceny,

arson, burglary, mayhem, and other violent conduct.15 An alternative way of defining a

felony was the severity of its corresponding punishment. Felony was defined “to mean

offenses for which the offender, on conviction, may be punished by death or imprison-

ment in the state prison or penitentiary; but in the absence of such statute the word is

used to designate such serious offenses as were formally punishable by death, or by for-

feiture of the lands or goods of the offender.”16 In other words, a crime could be a felony

or a misdemeanor not because of its severity or subsequent impact but because of the

term of incarceration. Modern criminal analysis shows confused and perplexing legisla-

tive decision making on the nature of a felony and a misdemeanor. The President’s

Commission on Law Enforcement and Administration of Justice, in its Task Force Report

on the Courts,17 relates:

A study of the Oregon Penal Code revealed that 1,413 criminal statutes contained a

total of 466 different types and lengths of sentences. The absence of legislative atten-

tion to the whole range of penalties may also be demonstrated by comparisons

between certain offenses. A recent study of the Colorado Statutes disclosed that a

person convicted of a first degree murder must serve ten (10) years before becoming

eligible for parole, while a person convicted of a lesser degree of the same offense

must serve at least fifteen (15) years; destruction of a house with fire is punishable

by a maximum twenty (20) years imprisonment, but destruction of a house with

explosives carries a ten (10) year maximum. In California, an offender who breaks

into an automobile to steal the contents of the glove compartment is subject to a fif-

teen (15) year maximum sentence but if he stole the car itself, he would face a max-

imum ten (10) year term.

Although each offense must be defined in a separate statutory provision, the num-

ber and variety of sentencing distinctions which result when legislatures prescribe a

separate penalty for each offense are among the main causes of the anarchy in sen-

tencing that is so widely deplored.18

In defining the term “misdemeanor,” legislatures and jurists use a process of elimina-

tion holding that an offense not deemed a felony is, deductively, a misdemeanor. Usually

misdemeanors are offenses punishable by less than a year’s incarceration. The popular

perception that misdemeanors are not serious offenses may be a faulty impression.

Criminal codes surprise even the most seasoned justice practitioner, who frequently

226 PRIVATE SECURITY AND THE LAW

Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:20:29.

C op

yr ig

ht ©

2 01

1. E

ls ev

ie r S

ci en

ce &

T ec

hn ol

og y.

A ll

rig ht

s re

se rv

ed .

finds little logic in an offense’s definition, resulting classification, and corresponding

punishment. For examples of this confusion, review selected state code provisions on

“sexual offenses.”19

Specific Types of Crimes and Offenses

Offenses against the Person

Felonious Homicide The security industry cannot avoid the ravages of criminal homicide, and in fact,

because of the improper use of weaponry or mistaken identity, it is sometimes the

accused. Criminal acts of homicide are being recorded because of the installation,

maintenance, and operational oversight of electronic surveillance systems and other

technological equipment utilized to protect the internal and external premises of

businesses. As the public sector continues to transfer and privatize many of its tradi-

tionally public police functions, such as in the area of courtroom and prison security,

violent acts of homicide are unfortunately replayed. Airport terrorism, failed executive

protection programs, and attempted or actual homicides on armored car money car-

riers are other distressing examples of criminal homicide. This subsection deals only

with felonious acts of homicide, and the security professional is reminded that non-

culpable homicide occurs in cases of self-defense, necessity in time of war, or by legal

right, authority, or privilege.20 Criminal homicide is defined by the Model Penal Code

as follows:

(1) A person is guilty of criminal homicide if he purposely, knowingly, recklessly

or negligently causes the death of another human being.

(2) Criminal homicide is murder, manslaughter or negligent homicide.21

The Model Penal Code, after this general legislative introduction, precisely defines each

type of homicide.

Murder A charge of murder will be upheld when,

(a) it is committed purposely or knowingly; or

(b) it is committed recklessly under circumstances manifesting extreme indifference to

the value of human life. Such recklessness and indifference are presumed if the

actor is engaged or is an accomplice in the commission of, or an attempt to commit,

or flight after committing or attempting to commit robbery, rape, deviate sexual

intercourse by force or threat of force, arson, burglary, kidnapping or felonious

escape.22

The code as suggested requires a high level of mental faculty. While the law of criminal

intent varies, most major capital offenses require what is known as specific intent.23

Chapter 6 • Collection, Preservation, and Interpretation of Evidence 227

Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:20:29.

C op

yr ig

ht ©

2 01

1. E

ls ev

ie r S

ci en

ce &

T ec

hn ol

og y.

A ll

rig ht

s re

se rv

ed .

Specific intent can be loosely described as premeditation or a mind possessive of malice

aforethought. In other words, the criminal actor wants, desires, wishes, knows, and realizes

the ramifications and repercussions of his or her activity. Although the law does not require

an intelligent or an esoteric thinker, there is a clear, lucid mindset operating. The level of

mind required for a charge of murder was clearly discerned in a Michigan case, People v.

Moran:24

Malice aforethought is the intention to kill, actual or implied, under circumstances

which do not constitute excuse or justification or mitigate the degree of the offense

of manslaughter. The intent to kill may be implied where the actor actually intends

to inflict great bodily harm or the natural tendency of his behavior is to cause death

or great bodily harm.25

Despite the legal attempts to objectify mental intentions, there will always be subjective

underpinnings. The security practitioner must gauge conduct in light of all circum-

stances. He or she must ask him or herself whether the facts of a given case lead a rea-

sonable person to the conclusion that the person not only knew what he or she was

doing but wished both the method and the end result.

Manslaughter Less crystalline as to intentionality, criminal codifications make room for a mindset

that is impacted or effected by mitigation and other external forces. In homicide,

the crime that fits this description is manslaughter. Most jurisdictions further grade

felonious homicide into another central category: voluntary or involuntary man-

slaughter.26 While specific intent is always required for a charge of murder, except

in cases of strict liability such as cop killing and felonious homicide, actions and con-

duct that are not as intellectually precise, not as free from influential mitigating fac-

tors and provocation, sometimes qualify for a less rigorous mental state, that of

general intent.27 This is not to say that some jurisdictions do not have a specific

intent requirement for a manslaughter charge, for there are diverse ways of classifying

the mind in the law of manslaughter. For the most part, a charge of manslaughter,

whether voluntary or involuntary, has a significantly smaller burden of proof regard-

ing the actor’s objective state of mind. This distinct language is readily discoverable in

the following statute:

2503 Voluntary Manslaughter

(a) General rule—A person who kills an individual without lawful justification

commits voluntary manslaughter if at the time of the killing he is acting under

a sudden and intense passion resulting from serious provocation by:

(1) the individual killed; or

(2) another whom the actor endeavors to kill, but he negligently or accidentally

causes the death of the individual killed.28

228 PRIVATE SECURITY AND THE LAW

Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:20:29.

C op

yr ig

ht ©

2 01

1. E

ls ev

ie r S

ci en

ce &

T ec

hn ol

og y.

A ll

rig ht

s re

se rv

ed .

2504 Involuntary Manslaughter

(a) General rule—A person is guilty of involuntary manslaughter when as a direct

result of the doing of an unlawful act in a reckless or grossly negligent manner, or

the doing of a lawful act in a reckless or grossly negligent manner, he causes the

death of another person.29

Compared to the murder statute, the language of the voluntary manslaughter provi-

sion permits an evaluation of various mitigating circumstances including provocation,

intense and emotional passion, and sudden and impetuous events.30 In involuntary

cases, the issue of gross negligence is appropriately weighed. In these cases, the court

instructs the jury on the negligent nature of the act that causes harm. The defendant

need not specifically intend the commission of any crime but could have or should have

known the consequences. These are acts, mistaken and accidental in nature, unrespon-

sive to others. Cases of automobile manslaughter or the mishandling of weapons while

in a drunken stupor are good examples.31

In security settings, manslaughter is a more common event, particularly since practi-

tioners are often called upon in hostile crowd control situations, in the maintenance of

order at special events, and for related activities.

n n n

Read and interpret a California vehicular manslaughter law at http://dmv.ca.gov/pubs/vctop/

appndxa/penalco/penco191_5.htm.

n n n

Felony Murder Rule Whether the jurisdiction has a felony murder rule (FMR) in operation is another secu-

rity industry concern since the charge has far-reaching tentacles that pull in all opera-

tives acting in consort with one another. Hence, if a team of four security officers are on

a stakeout and one of them unlawfully shoots another, even one of the officers,

and lacks the privilege or right to do so, all will be held accountable. One of the

officers would have to be engaged in felonious conduct. As outlined in the Code Section

210.1(a) above on criminal homicide, a charge of murder is appropriate when any indi-

vidual dies during the commission of any major capital felony.32 Co-conspirators,

accomplices, or other individuals, even though they did not pull the trigger, plan the

murder, or personally wish or desire for the death of another, can be felony murderers.

Hence, bank robbers or home invaders committing burglary, causing the death of any

party, whether it be responding police, inhabitants, or even the partners in crime, will

trigger the FMR.

The felony murder rule has been the subject of severe legal challenges in recent

years. “There has been a discernible but not universal trend towards limiting the felony

murder doctrine. The trend seems to be related to increasing skepticism as the extent to

which the felony murder rule in fact serves a legitimate function or at least as to whether

it serves its function or functions at an acceptable cost.”33 The most heated debate

Chapter 6 • Collection, Preservation, and Interpretation of Evidence 229

Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:20:29.

C op

yr ig

ht ©

2 01

1. E

ls ev

ie r S

ci en

ce &

T ec

hn ol

og y.

A ll

rig ht

s re

se rv

ed .

occurs when two or more persons are engaged in a theft, robbery, or burglary, obviously

less serious offenses than murder or manslaughter, and someone dies by accident or

negligence.34 However, the strict liability nature of the felony murder rule forces crim-

inals to think of the possible potential ramifications of their behavior, which surely

includes the death of the participants and bystanders, during the commission of a felo-

nious act.35

n n n

There are groups and associations solely dedicated to elimination of the Felony Murder Rule.

See Felonymurder.org at: http://felonymurder.org.

n n n

Assault Aside from theft actions, security officers witness no other crime as regularly as assault

and battery. In Chapter 4, readers were introduced to the concept of assault in a

civil sense, although there is a corresponding criminal definition as well. At common

law, assault and battery were separate offenses, the former being a threat to touch

or harm and the latter being the actual offensive touching. Most jurisdictions

have merged the offenses, at least in a criminal context, while still distinguishing the

offenses by severity and degree. The Model Penal Code poses the following

construction:

(1) Simple Assault. A person is guilty of assault if he:

(a) attempts to cause or purposely, knowingly or recklessly causes bodily injury to

another; or

(b) negligently causes bodily injury to another with a deadly weapon; or

(c) attempts by physical menace to put another in fear of imminent serious

bodily harm.

(2) Aggravated Assault. A person is guilty of aggravated assault if he:

(a) attempts to cause serious bodily injury to another, or causes such injury

purposely, knowingly or recklessly under circumstances manifesting extreme

indifference to the value of human life; or

(b) attempts to cause or purposely or knowingly causes bodily injury to another

with a deadly weapon.36

Most security specialists will encounter the crimes known as assault. Efforts to

control crowds, secure buildings and installations, apprehend or detain a disgruntled

employee, break up disputants in commercial establishments, and handle unruly

and disgruntled shoppers in retail establishments are ripe settings to encounter

assailants.

Assault can be an extremely serious offense, particularly under the “aggravated” pro-

vision.37 In fact, some jurisdictions have adopted reckless endangerment,38 a new statu-

tory design that describes even more severe conduct. See the following example:

230 PRIVATE SECURITY AND THE LAW

Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:20:29.

C op

yr ig

ht ©

2 01

1. E

ls ev

ie r S

ci en

ce &

T ec

hn ol

og y.

A ll

rig ht

s re

se rv

ed .

(3) A person acts recklessly with respect to a material element of an offense when he

consciously disregards a substantial and unjustifiable risk that the material element

exists or will result from his conduct.

The risk must be of such a nature and degree that, considering the nature and

intent of the actor’s conduct and the circumstances known to him, its disregard

involves a gross deviation from the standard of conduct that a reasonable person

would observe in the actor’s situation.39

Assaults are now a recurring concern for security officers working in domestic and

international terrorism. It behooves security policymakers and planners to educate

themselves as well as their staff on these criminal acts and corresponding statutes:

• Terrorist threats

• Use of tear gas or other noxious substances

• Harassment

• Ethnic intimidation40

Proof of an assault may or may not require proof of physical injuries. Any injuries

alleged can be recorded in the personal injury report shown in Figure 6.2.41

Kidnapping and False Imprisonment Kidnapping and false imprisonment actions are relevant to the security industry

because of its heavy involvement in executive protection and counterterrorism. Political

figures, military commanders and state guests, as well as traditional celebrities, provide

instant targets for our enemies.

Kidnapping consists of the unlawful confinement or restraint of a victim, with an

accompanying movement or transportation, for the purpose of ransom, political benefit

or other motivation, including the desire to inflict harm. The Model Penal Code sets out

the essential elements:

A person is guilty of kidnapping if he unlawfully removes another from his place of

residence or business, or a substantial distance from the vicinity where he is found,

or if he unlawfully confines another for a substantial period in a place of isolation,

with any of the following purposes:

(a) to hold for ransom or reward, or as a shield or hostage; or

(b) to facilitate commission of any felony or flight thereafter; or

(c) to inflict bodily injury on or to terrorize the victim or another; or

(d) to interfere with the performance of any government or political function.42

While most of this codification is clear on its face, legal scholars and advocates fre-

quently contest the transportation or “carrying away” requirement. Modern interpretation,

Chapter 6 • Collection, Preservation, and Interpretation of Evidence 231

Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:20:29.

C op

yr ig

ht ©

2 01

1. E

ls ev

ie r S

ci en

ce &

T ec

hn ol

og y.

A ll

rig ht

s re

se rv

ed .

FIGURE 6.2 Personal Injury Report Form.

232 PRIVATE SECURITY AND THE LAW

Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:20:29.

C op

yr ig

ht ©

2 01

1. E

ls ev

ie r S

ci en

ce &

T ec

hn ol

og y.

A ll

rig ht

s re

se rv

ed .

which is generally rather liberal, rejects the view of geographic transfer that is from

one locale to another and adopts the “any movement” standard as being sufficient.43

Kidnapping is usually coupled with false imprisonment and rightfully so. Security profes-

sionals who detain or restrict themovements of a consumer in retail settings, unprotected by

merchants’ privilege or other statutory immunitymay be criminally liable for false imprison-

ment. False imprisonment is both a civil and criminal action. Here is a typical construction:

A person commits a misdemeanor if he knowingly restrains another unlawfully so

as to interfere substantially with his liberty.44

Any security-based investigation, whereby a suspect’s freedom to move is abridged,

rightly or wrongly, can give rise to the claim of false imprisonment. Kelley V. Rea, a prin-

cipal in the security firm Legal and Security Services, Ltd., highlights this ongoing risk.

We also continue to read a surprising number of cases, arising out of investigations,

with allegations of false imprisonment and infliction of emotional distress. Where a

person is held against his or her will or where that person is subjected to “outra-

geous” conduct, such charges may arise. Conducting an “interview” that lasts more

than an hour and giving the person interviewed the impression that he or she is not

free to leave may trigger a charge of false imprisonment. Long, tough, threatening

questioning, particularly if physical threats are made or physical force used, will

often lead to infliction of emotional distress allegations.45

Aside from the physical harm, pain and suffering awards for psychic damages tend to

be fairly generous when the confinement and detention is without justification.46 The

litigiousness of making an accusation or claim should at least prompt a cautious

approach on the security claim operative. In cases of criminal conduct, it may be sound

to completely turn over the case to public law enforcement.

n n n

For a series of damage awards in civil actions for false imprisonment, see http://www.jvra

.com/verdict_trak/professional.aspx?page¼2&search¼491. n n n

Sexual Offenses Those entrusted with the task of ensuring safe business and industrial environments

now must consider the ramifications of illegal sexual interaction between employers

and employees and the increasing sexual victimization of guests, invitees, or licensees

on the premises. The investigation and identification of sexual misconduct in the work-

place is a major security responsibility. So too in the prison environment, where private

prisons operated by private personnel play a central role in providing a safe environ-

ment. Most states provide levels of protections and corresponding liability for failure

Chapter 6 • Collection, Preservation, and Interpretation of Evidence 233

Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:20:29.

C op

yr ig

ht ©

2 01

1. E

ls ev

ie r S

ci en

ce &

T ec

hn ol

og y.

A ll

rig ht

s re

se rv

ed .

to provide. See Figure 6.3,47 which charts 50 jurisdictions. Negligent hiring and supervi-

sion cases are frequently based on the failure of supervision and oversight when hiring

or disciplining employees who engage in sexual offenses.48

n n n

The American University Law School runs a clearinghouse that announces litigation relating

to civil actions and awards in prison settings for sexual abuse. Visit http://www.wcl.american

.edu/nic/AnEndtoSilenceYearinNews2008.cfm.

n n n

The tragic violence of rape and aggravated sexual assault will, can, and does occur in

any social, commercial, or business setting.49

The Model Penal Code’s sample statute is outlined as follows:

(1) Rape. A male who has sexual intercourse with a female not his wife is guilty of rape if:

(a) he compels her to submit by force or by threat of imminent death, serious bodily

injury, extreme pain or kidnapping, to be inflicted on anyone; or

(b) he has substantially impaired her power to appraise or control her conduct by

administering or employing without her knowledge drugs, intoxicants, or other

means for the purpose of preventing resistance; or

(c) the female is unconscious; or

(d) the female is less than ten (10) years old.50

While the Model Penal Code lays out the generic elements of sexual offenses, since

the 1970s we have witnessed extraordinary efforts to either reform or expand statutory

coverage. Proponents of rape law reform have successfully created sexual offense legis-

lation that is gender neutral, that does not require a traditional vaginal and penal con-

tact, and does not weigh the substantiality of victim resistance.51

In business and commercial settings, cases of indecent assault or indecent exposure

are not atypical. A representative statute from Pennsylvania covers the standard language:

Indecent assault. A person who has indecent contact with another not his spouse, or

causes such other to have indecent contact with him is guilty of indecent assault, a

misdemeanor of the second degree, if:

(1) the person does so without the complainant’s consent;

(2) the complainant is unconscious or the person knows that the complainant is

unaware that the indecent contact is occurring;

(3) the complainant suffers from a mental disability which renders the complainant

incapable of consent;52

Indecent exposure.

(a) OFFENSE DEFINED—A person commits indecent exposure if that person

exposes his or her genitals in any public place or in any place where there are

present other persons under circumstances in which he or she knows or should

know that this conduct is likely to offend, affront or alarm.

234 PRIVATE SECURITY AND THE LAW

Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:20:29.

C op

yr ig

ht ©

2 01

1. E

ls ev

ie r S

ci en

ce &

T ec

hn ol

og y.

A ll

rig ht

s re

se rv

ed .

FIGURE 6.3 Checklist of State Criminal Laws Prohibiting the Sexual Abuse of Persons in Custody.

(Continued)

C h a p ter

6 • C o lle

c tio

n , P re se rv a tio

n , a n d In te rp re ta tio

n o f E v id e n c e

2 3 5

N em

eth, C . (2011). P

rivate security and the law . P

roQ uest E

book C entral <a onclick=w

indow .open('http://ebookcentral.proquest.com

','_blank') href='http://ebookcentral.proquest.com

' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com </a>

C reated from

apus on 2020-10-13 13:20:29.

Copyright © 2011. Elsevier Science & Technology. All rights reserved.

FI G U R E 6 .3 — C o n t’ d

236 PRIVATE SECURITY AND THE LAW

Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:20:29.

C op

yr ig

ht ©

2 01

1. E

ls ev

ie r S

ci en

ce &

T ec

hn ol

og y.

A ll

rig ht

s re

se rv

ed .

FI G U R E 6 .3 — C o n t’ d

(C o n ti n u e d )

Chapter 6 • Collection, Preservation, and Interpretation of Evidence 237

Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:20:29.

C op

yr ig

ht ©

2 01

1. E

ls ev

ie r S

ci en

ce &

T ec

hn ol

og y.

A ll

rig ht

s re

se rv

ed .

FI G U R E 6 .3 — C o n t’ d

238 PRIVATE SECURITY AND THE LAW

Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:20:29.

C op

yr ig

ht ©

2 01

1. E

ls ev

ie r S

ci en

ce &

T ec

hn ol

og y.

A ll

rig ht

s re

se rv

ed .

FI G U R E 6 .3 — C o n t’ d

(C o n ti n u e d )

Chapter 6 • Collection, Preservation, and Interpretation of Evidence 239

Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:20:29.

C op

yr ig

ht ©

2 01

1. E

ls ev

ie r S

ci en

ce &

T ec

hn ol

og y.

A ll

rig ht

s re

se rv

ed .

FI G U R E 6 .3 — C o n t’ d

240 PRIVATE SECURITY AND THE LAW

Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:20:29.

C op

yr ig

ht ©

2 01

1. E

ls ev

ie r S

ci en

ce &

T ec

hn ol

og y.

A ll

rig ht

s re

se rv

ed .

FI G U R E 6 .3 — C o n t’ d

(C o n ti n u e d )

Chapter 6 • Collection, Preservation, and Interpretation of Evidence 241

Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:20:29.

C op

yr ig

ht ©

2 01

1. E

ls ev

ie r S

ci en

ce &

T ec

hn ol

og y.

A ll

rig ht

s re

se rv

ed .

FI G U R E 6 .3 — C o n t’ d

242 PRIVATE SECURITY AND THE LAW

Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:20:29.

C op

yr ig

ht ©

2 01

1. E

ls ev

ie r S

ci en

ce &

T ec

hn ol

og y.

A ll

rig ht

s re

se rv

ed .

FI G U R E 6 .3 — C o n t’ d

(C o n ti n u e d )

Chapter 6 • Collection, Preservation, and Interpretation of Evidence 243

Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:20:29.

C op

yr ig

ht ©

2 01

1. E

ls ev

ie r S

ci en

ce &

T ec

hn ol

og y.

A ll

rig ht

s re

se rv

ed .

FI G U R E 6 .3 — C o n t’ d

244 PRIVATE SECURITY AND THE LAW

Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:20:29.

C op

yr ig

ht ©

2 01

1. E

ls ev

ie r S

ci en

ce &

T ec

hn ol

og y.

A ll

rig ht

s re

se rv

ed .

FI G U R E 6 .3 — C o n t’ d

(C o n ti n u e d )

Chapter 6 • Collection, Preservation, and Interpretation of Evidence 245

Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:20:29.

C op

yr ig

ht ©

2 01

1. E

ls ev

ie r S

ci en

ce &

T ec

hn ol

og y.

A ll

rig ht

s re

se rv

ed .

FI G U R E 6 .3 — C o n t’ d

246 PRIVATE SECURITY AND THE LAW

Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:20:29.

C op

yr ig

ht ©

2 01

1. E

ls ev

ie r S

ci en

ce &

T ec

hn ol

og y.

A ll

rig ht

s re

se rv

ed .

FI G U R E 6 .3 — C o n t’ d

(C o n ti n u e d )

Chapter 6 • Collection, Preservation, and Interpretation of Evidence 247

Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:20:29.

C op

yr ig

ht ©

2 01

1. E

ls ev

ie r S

ci en

ce &

T ec

hn ol

og y.

A ll

rig ht

s re

se rv

ed .

FI G U R E 6 .3 — C o n t’ d

248 PRIVATE SECURITY AND THE LAW

Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:20:29.

C op

yr ig

ht ©

2 01

1. E

ls ev

ie r S

ci en

ce &

T ec

hn ol

og y.

A ll

rig ht

s re

se rv

ed .

FI G U R E 6 .3 — C o n t’ d

(C o n ti n u e d )

Chapter 6 • Collection, Preservation, and Interpretation of Evidence 249

Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:20:29.

C op

yr ig

ht ©

2 01

1. E

ls ev

ie r S

ci en

ce &

T ec

hn ol

og y.

A ll

rig ht

s re

se rv

ed .

FI G U R E 6 .3 — C o n t’ d

250 PRIVATE SECURITY AND THE LAW

Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:20:29.

C op

yr ig

ht ©

2 01

1. E

ls ev

ie r S

ci en

ce &

T ec

hn ol

og y.

A ll

rig ht

s re

se rv

ed .

FI G U R E 6 .3 — C o n t’ d

(C o n ti n u e d )

Chapter 6 • Collection, Preservation, and Interpretation of Evidence 251

Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:20:29.

C op

yr ig

ht ©

2 01

1. E

ls ev

ie r S

ci en

ce &

T ec

hn ol

og y.

A ll

rig ht

s re

se rv

ed .

FI G U R E 6 .3 — C o n t’ d

252 PRIVATE SECURITY AND THE LAW

Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:20:29.

C op

yr ig

ht ©

2 01

1. E

ls ev

ie r S

ci en

ce &

T ec

hn ol

og y.

A ll

rig ht

s re

se rv

ed .

FI G U R E 6 .3 — C o n t’ d

(C o n ti n u e d )

Chapter 6 • Collection, Preservation, and Interpretation of Evidence 253

Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:20:29.

C op

yr ig

ht ©

2 01

1. E

ls ev

ie r S

ci en

ce &

T ec

hn ol

og y.

A ll

rig ht

s re

se rv

ed .

FI G U R E 6 .3 — C o n t’ d

254 PRIVATE SECURITY AND THE LAW

Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:20:29.

C op

yr ig

ht ©

2 01

1. E

ls ev

ie r S

ci en

ce &

T ec

hn ol

og y.

A ll

rig ht

s re

se rv

ed .

FI G U R E 6 .3 — C o n t’ d

(C o n ti n u e d )

Chapter 6 • Collection, Preservation, and Interpretation of Evidence 255

Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:20:29.

C op

yr ig

ht ©

2 01

1. E

ls ev

ie r S

ci en

ce &

T ec

hn ol

og y.

A ll

rig ht

s re

se rv

ed .

FI G U R E 6 .3 — C o n t’ d

256 PRIVATE SECURITY AND THE LAW

Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:20:29.

C op

yr ig

ht ©

2 01

1. E

ls ev

ie r S

ci en

ce &

T ec

hn ol

og y.

A ll

rig ht

s re

se rv

ed .

FI G U R E 6 .3 — C o n t’ d

Chapter 6 • Collection, Preservation, and Interpretation of Evidence 257

Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:20:29.

C op

yr ig

ht ©

2 01

1. E

ls ev

ie r S

ci en

ce &

T ec

hn ol

og y.

A ll

rig ht

s re

se rv

ed .

(b) GRADING—If the person knows or should have known that any of the persons

present are less than 16 years of age, indecent exposure under subsection (a) is a

misdemeanor of the first degree. Otherwise, indecent exposure under subsection

(a) is a misdemeanor of the second degree.53

Security companies charged with these types of investigations must memorialize

complaints in document form. See Figure 6.4.54 Cases of sexual harassment are unfortu-

nately recurring phenomena for security advisors and consultants. To ferret out the

ruses from the legitimate cases of sexual harassment, employ the evaluation checklist

shown in Figure 6.5.55

FIGURE 6.4 Sexual Harassment Complaint Form.

258 PRIVATE SECURITY AND THE LAW

Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:20:29.

C op

yr ig

ht ©

2 01

1. E

ls ev

ie r S

ci en

ce &

T ec

hn ol

og y.

A ll

rig ht

s re

se rv

ed .

FIGURE 6.5 Sexual Harassment Evaluation Checklist.

(Continued)

Chapter 6 • Collection, Preservation, and Interpretation of Evidence 259

Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:20:29.

C op

yr ig

ht ©

2 01

1. E

ls ev

ie r S

ci en

ce &

T ec

hn ol

og y.

A ll

rig ht

s re

se rv

ed .

Offenses against the Habitation and Other Buildings

The security industry is entrusted with the protection of homes, business and commer-

cial buildings, and residential settings. Whether by direct patrol or technological surveil-

lance, the industry is increasingly controlling the safety of private residences and

business settings.56

Arson Industrial and business concerns have a grave interest in the protection of their assets

and real property from arsonists.57 Around-the-clock security systems, surveillance sys-

tems, and electronic technology have done much to aid private enterprise in the protec-

tion of its interests.58

Arson, as defined in the Model Penal Code, includes the following provisions:

Arson. A person is guilty of arson, a felony of the second degree, if he starts a fire or

causes an explosion with the purpose of:

(a) destroying a building or occupied structure of another; or

(b) destroying or damaging any property, whether his own or another’s, to collect

insurance for such loss.59

Judicial interpretation of arson statutes has been primarily concerned with either the

definition of a “structure” or in the proof an actual burning or physical fire damage.

Structure has been broadly defined as any physical plant, warehouse, or accommoda-

tion that permits the carrying on of business or the temporary residents of persons, a

domicile, and even ships, trailers, sleeping cars, airplanes, and other movable vehicles

or structures.60 Any burning, substantial smoke discoloration and damage, charring,

the existence of alligator burn patterns, destruction and damage caused as the results

of explosives, detonation devices, and ruination by substantial heat meets the arson cri-

teria. Total destruction or annihilation is not required.61

Most jurisdictions have also adopted related offenses:

• Reckless burning or exploding

• Causing or risking a catastrophe

FIGURE 6.5—Cont’d

260 PRIVATE SECURITY AND THE LAW

Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:20:29.

C op

yr ig

ht ©

2 01

1. E

ls ev

ie r S

ci en

ce &

T ec

hn ol

og y.

A ll

rig ht

s re

se rv

ed .

• Failure to prevent a catastrophe

• Criminal mischief

• Injuring or tampering with fire apparatus, hydrants, etc.

• Unauthorized use or opening of a fire hydrant

• Institutional vandalism62

n n n

Find out about efforts of the Department of Homeland Security (DHS) and other federal

agencies to thwart arson attempts at churches and synagogues at http://www.usfa.dhs.gov/

downloads/pdf/publications/napi1.pdf.

n n n

Proving a case of arson can be made easier with Figure 6.6.63

Burglary Of major interest to the security industry is the crime of burglary, a crime whose feloni-

ous intent requires an illegal entry into a domicile or other structure for the purpose of

committing any felony therein. Clark and Marshall’s Treatise on Crimes,64 provides the

common law definition of the crime of burglary:

1. The premises must be the dwelling house of another . . .

2. There must be a breaking of some part of the house itself. The breaking must be

constructive, as well as actual.

3. There must be an entry. The slightest entry of a hand or even an instrument suffices.

4. The breaking and entering must both be at night; but need not be on the same

night.

5. There must be an intent to commit a felony in the house and such intent must

accompany both the breaking and entry. The intended felony need not be

committed.65

Statutory modification of these elements has been quite common. A definition of a

dwelling house has been liberally construed and includes a chicken coop, a cow stable,

a hog house, a barn, a smokehouse, a mill house, and any other area or any other build-

ing or occupied structure.66 The term “breaking” does not require an actual destruction

of property, merely the breaking of a plane or point of entrance into the occupied struc-

ture.67 Additionally, most jurisdictions have reassessed the nighttime determination and

made the requirement nonmandatory, though they make the time of the intrusion appli-

cable to the gradation of the offense.68

Security operatives should, as in all other forms of criminality, take steps to prevent

burglaries. See the checklist at Figure 6.7.69

Be aware that burglary is not necessarily motivated by a property offense. Appellate

decisions continually instruct that burglary’s requirement of entry be spurred on by an

intent to commit any felony.70 The benchmark question then becomes, what was the

intent of the accused at the precise time of his actual breaking and entry?71

Chapter 6 • Collection, Preservation, and Interpretation of Evidence 261

Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:20:29.

C op

yr ig

ht ©

2 01

1. E

ls ev

ie r S

ci en

ce &

T ec

hn ol

og y.

A ll

rig ht

s re

se rv

ed .

FIGURE 6.6 Total Fire Inspection Report.

(Continued)

262 PRIVATE SECURITY AND THE LAW

Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:20:29.

C op

yr ig

ht ©

2 01

1. E

ls ev

ie r S

ci en

ce &

T ec

hn ol

og y.

A ll

rig ht

s re

se rv

ed .

FIGURE 6.6—Cont’d

Chapter 6 • Collection, Preservation, and Interpretation of Evidence 263

Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:20:29.

C op

yr ig

ht ©

2 01

1. E

ls ev

ie r S

ci en

ce &

T ec

hn ol

og y.

A ll

rig ht

s re

se rv

ed .

FIGURE 6.7 Burglary Prevention Checklist.

(Continued)

264 PRIVATE SECURITY AND THE LAW

Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:20:29.

C op

yr ig

ht ©

2 01

1. E

ls ev

ie r S

ci en

ce &

T ec

hn ol

og y.

A ll

rig ht

s re

se rv

ed .

A related act that has applicability to the security environment is criminal trespass:72

Trespass

(1) Buildings and occupied structures. A person commits an offense if, knowing he is

not licensed or privileged to do so, he enters or surreptitiously remains in any

building or occupied structure or separately secured or occupied portion thereof.

An offense under this Subsection is a misdemeanor if it is committed in a

dwelling at night. Otherwise, it is a petty misdemeanor.73

To minimize burglary and trespass activity, adopt the policy considerations shown in

Figure 6.874 when conducting a facility review.

FIGURE 6.8 Hazardous Conditions Requiring Special Attention.

(Continued)

FIGURE 6.7—Cont’d

Chapter 6 • Collection, Preservation, and Interpretation of Evidence 265

Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:20:29.

C op

yr ig

ht ©

2 01

1. E

ls ev

ie r S

ci en

ce &

T ec

hn ol

og y.

A ll

rig ht

s re

se rv

ed .

FIGURE 6.8—Cont’dNemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:20:29.

C op

yr ig

ht ©

2 01

1. E

ls ev

ie r S

ci en

ce &

T ec

hn ol

og y.

A ll

rig ht

s re

se rv

ed .

Robbery The unlawful acquisition or taking of property by forceful means constitutes a robbery.75

In retail and commercial establishments, security officers and personnel are frequently

endangered by the activities of felons. Robbery is more than a property crime since it

is coupled with a violent thrust. The exact provisions of a general robbery statute

include those outlined in the Model Penal Code provision:

(1) Robbery Defined. A person is guilty of robbery if, in the course of committing a

theft, he:

(a) inflicts serious bodily injury upon another; or

(b) threatens another with or purposely puts him in fear of immediate serious

bodily injury; or

(c) commits or threatens immediately to commit any felony of the first or second

degree.

An act shall be deemed “in the course of committing a theft” if it occurs in an attempt to

commit theft or in flight after the attempt or commission.76

Distinguishing robbery from a larceny or a theft offense is not a difficult task since

both judicial interpretation and statutory definitions insist on a finding of force, vio-

lence, or a physical threat of imminent harm. Robbery can be accomplished by threats

only if the threats are of death or of great bodily injury to the victim, a member of the

victim’s family or some other relative of the victim, or someone in the victim’s presence.

Threats to damage property will not suffice, with the possible exception of a threat to

destroy a dwelling house.77 Considerations relevant to a finding of guilt in a robbery case

include whether or not the victim was actually threatened with immediate harm;

whether the force or violence exerted created substantial fear or simple apprehension

in the robbery victim;78 and whether the statutory guidelines demand that the victim

be present when the unlawful taking occurs.79

Theft or Larceny No other area of proscribed behavior affects the security practice as much as in the

crime of theft or, as it was once known at common law, larceny.80 Shoplifting is a form

of larceny and has become retail security’s central concern as it seeks to devise loss pre-

vention strategies.81

n n n

Visit and evaluate worldwide data on the scourge of property theft in the retail world at

http://www.globalretailtheftbarometer.com/pdf/grtb-2010-summary.pdf.

n n n

Stock pilferage, fraudulent accounting and record-keeping systems, embezzling of

corporate funds, and theft of benefits and services are all criminal behaviors that

Chapter 6 • Collection, Preservation, and Interpretation of Evidence 267

Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:20:29.

C op

yr ig

ht ©

2 01

1. E

ls ev

ie r S

ci en

ce &

T ec

hn ol

og y.

A ll

rig ht

s re

se rv

ed .

significantly influence the profitable nature of business and industry. In the broadest

definitional terms, larceny consists of the following characteristics:

• A taking that is unlawful

• A carrying away or movement thereafter of personal property

• Property of which the taker is not in rightful ownership or possession

• With a mens rea that is felonious

Table 6.1 outlines the requisite elements needed for a successful charge of larceny.82

Historical argument on what exactly could be the subject of a larceny is quite prolific,

from disputes about whether rabbits and fish are larcenable, or whether vegetables,

land, or the skins of deer could be the subject of theft.83 In contemporary legal parlance,

literally any type of property is potentially larcenable. Maryland delineates an extensive

list of property classifications, including the following:

(1) “Property” means anything of value.

(2) “Property” includes:

(i) real estate;

(ii) money;

(iii) a commercial instrument;

(iv) an admission or transportation ticket;

(v) a written instrument representing or embodying rights concerning anything of

value, or services, or anything otherwise of value to the owner;

(vi) a thing growing on, affixed to, or found on land, or that is part of or affixed to

any building;

(vii) electricity, gas, and water;

(viii) a bird, animal, or fish that ordinarily is kept in a state of confinement;

(ix) food or drink;

(x) a sample, culture, microorganism, or specimen;

(xi) a record, recording, document, blueprint, drawing, map, or a whole or partial

copy, description, photograph, prototype, or model of any of them;

(xii) an article, material, device, substance, or a whole or partial copy, description,

photograph, prototype, or model of any of them that represents evidence of,

reflects, or records a secret:

1. scientific, technical, merchandising, production, or management

information; or

2. designed process, procedure, formula, invention, trade secret, or improvement;

(xiii) a financial instrument; and

(xiv) information, electronically produced data, and a computer software or

program in a form readable by machine or individual.84

Aside from the requisite form, the fact finder must then consider if the claim or right

of a possessor of property for larceny is an infringement on that right to possess. One

need not own property to suffer a larceny, but one needs to be its rightful and privileged

268 PRIVATE SECURITY AND THE LAW

Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:20:29.

C op

yr ig

ht ©

2 01

1. E

ls ev

ie r S

ci en

ce &

T ec

hn ol

og y.

A ll

rig ht

s re

se rv

ed .

Table 6.1 Elements of Larceny

I. Trespassory Taking §12.06

II. Asportation §12.05

III. Personal Goods §12.01

IV. Of Another §12.01

V. Felonious Intent §12.04

A. Trespass de bonis asportatis

is the type of taking

required—at least under

such circumstances as

amount technically to a

trespass.

B. From actual or constructive

possession of owner.

C. Without owner’s consent.

D. The taking may be by means

of nonhuman agency, inno-

cent human agent, or by

hands of the thief or thieves.

E. Taking by violence from the

person of another trans-

forms this offense into

robbery.

F. Some carrying away of the

property.

G. There is sufficient asportation if

the property (III) be entirely

removed from the place it occu-

pied so that it comes under the

dominion and control of the tres-

passer though only for an instant.

H. Personal property

only; real property

excluded.

I. Must be a thing

that is recognized

in law as being

property and the

subject of

ownership.

Of some value, though

slight value to

owner will suffice.

J. Special property

in another is

sufficient even

against a gen-

eral owner.

(1) Mere pos-

session is

enough as

against

others than

the owner.

See }12.03.

K. Animus furandi must exist

both in the taking (I) and the

carrying away (II).

(1) Intent to deprive the

owner permanently of

his property in the good,

or of its value or part of

its value, viz., an intent to

steal.

(2) There must be a fraudu-

lent intent and not a

mistake or bona fide

claim of right.

L. There is minority authority

requiring that the taking

shall be lucri causa—for the

sake of gain.

C h a p ter

6 • C o lle

c tio

n , P re se rv a tio

n , a n d In te rp re ta tio

n o f E v id e n c e

2 6 9

N em

eth, C . (2011). P

rivate security and the law . P

roQ uest E

book C entral <a onclick=w

indow .open('http://ebookcentral.proquest.com

','_blank') href='http://ebookcentral.proquest.com

' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com </a>

C reated from

apus on 2020-10-13 13:20:29.

Copyright © 2011. Elsevier Science & Technology. All rights reserved.

possessor. Finally, the taking of said property must not arise from violence or force, for

to take in that fashion would call for a robbery charge over that of larceny.

The Model Penal Code’s provision on theft is fairly straightforward:

Theft by Unlawful Taking or Disposition.

(1) Moveable Property. A person is guilty of theft if he takes, or exercises

unlawful control over, moveable property of another with purpose to deprive

him thereof.

(2) Immovable Property. A person is guilty of theft if he unlawfully transfers

immovable property of another or any interest therein with the purpose to

benefit himself or another not entitled thereto.85

Security professionals should formally record any allegations of lost or stolen property in

a report format. See Figure 6.9.86

Given the diversity of property forms and the new and emerging means of taking

things or items of value, traditional larceny definitions fail to encompass these many

forms. Commentators at the American Law Institute have long advanced the need to

consolidate these diverse thefts under one codified heading. The larceny should now

be labeled theft, and distinct provisions of theft will be divided up by other variables

such as value of property, type and form of property, and tangible or intangible design.

The call here is for consolidation of the myriad of theft offenses under one roof while

allowing distinct elements to remain. As a result, “the general definition of theft conso-

lidates into a single offense a number of heretofore distinct property crimes, including

larceny, embezzlement, obtaining by false pretense, cheat, extortion and all other invol-

untary transfers of wealth except those explicitly excluded by provisions of this article.”87

Therefore, security personnel must be concerned about the closely aligned theft

provisions and correctly evaluate the facts to see the applicability of certain offenses.

A summary review follows.

THEFT BY DECEPTION88/FALSE PRETENSES

Be aware of individuals who are best described as “flim-flam” artists who create false

impressions and deceive others into giving up their rightful possession of property.89

In the case of false pretense, the criminal actor deceptively attains ownership in a deed,

a stock certificate, an auto title, or other form of property interest evidenced by a legal

document.90

THEFT BY EXTORTION91

Theft’s methods may employ threats that are futuristic in design. Future threats of bodily

injury or even by words disclosing private matters or secrets that will cause serious

injury to a party are common artifices employed by those seeking funds illegally.92 When

public officials refuse to cooperate in an official capacity or threaten to cause harm or

injury without justification unless they receive a kickback or other payback, this falls

under the theft-by-extortion umbrella.

270 PRIVATE SECURITY AND THE LAW

Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:20:29.

C op

yr ig

ht ©

2 01

1. E

ls ev

ie r S

ci en

ce &

T ec

hn ol

og y.

A ll

rig ht

s re

se rv

ed .

FIGURE 6.9 Report of Lost/Stolen Property.

Chapter 6 • Collection, Preservation, and Interpretation of Evidence 271

Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:20:29.

C op

yr ig

ht ©

2 01

1. E

ls ev

ie r S

ci en

ce &

T ec

hn ol

og y.

A ll

rig ht

s re

se rv

ed .

THEFT OF PROPERTY LOST, MISLAID, OR DELIVERED BY MISTAKE93

Security personnel must be particularly concerned about employees in retail establish-

ments or other business concerns who have access to lost and found property depart-

ments, or who take advantage of incorrectly delivered warehouse shipments.

RECEIVING STOLEN PROPERTY94

One often-discovered activity, especially in retail circles, is an internal network of illegal

goods and services flowing either from employee to employee or from employee to

third-party outsiders.

THEFT OF SERVICES95

Cable companies, electric utilities, hotels, motels, and other tourist facilities are subject to

thieving scams as are rental car companies, entertainment venues, and telephone compa-

nies. At common law theft had tobeof a tangible item. Services lacked that corporeal quality.

Modern statutes incorporate services into their definitions because they are things of value.

RETAIL THEFT96

Considering the rampant onslaught of shoplifting cases in the judicial system and the

need for specialized statutory designs that recognize the many demands that business

labors under as its seeks to prevent the activity, retail theft is a major concern for private

security policymakers. Modern retail theft statutes are distinctively less draconian in

punishment. In addition, most provide some sort of immunity in the form of merchant’s

privilege or other protection. Some statutes permit and even promote alternative diver-

sion or disposition of said cases. A typical construction might be as follows:

(a) OFFENSE DEFINED—A person is guilty of a retail theft if he:

(1) takes possession of, carries away, transfers or causes to be carried away or

transferred, any merchandise displayed, held, stored or offered for sale by any

store or other retail mercantile establishment with the intention of depriving the

merchant of the possession, use or benefit of such merchandise without paying

the full retail value thereof;

(2) alters, transfers or removes any label, price tag marking, indicia of value or any

other markings which aid in determining value affixed to any merchandise

displayed, held, stored or offered for sale in a store or other retail mercantile

establishment and attempts to purchase such merchandise personally or in

consort with another at less than the full retail value with the intention of

depriving the merchant of the full retail value of such merchandise;

(3) transfers any merchandise displayed, held, stored or offered for sale by any store

or other retail mercantile establishment from the container in or on which the

same shall be displayed to any other container with intent to deprive the

merchant of all or some part of the full retail value thereof; or

(4) under-rings with the intention of depriving the merchant of the full retail value

of the merchandise.

272 PRIVATE SECURITY AND THE LAW

Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:20:29.

C op

yr ig

ht ©

2 01

1. E

ls ev

ie r S

ci en

ce &

T ec

hn ol

og y.

A ll

rig ht

s re

se rv

ed .

(5) destroys, removes, renders inoperative or deactivates any inventory control tag,

security strip or any other mechanism designed or employed to prevent an

offense under this section with the intention of depriving the merchant of the

possession, use or benefit of such merchandise without paying the full retail

value thereof.97

The economic impact of retail theft is incredibly high.98 Economic crime impacts society

in many direct and indirect ways:

BUSINESS

• increased costs of insurance and security protection;

• costs of internal audit activities to detect crime;

• cost of investigation and prosecution of suspects measured in terms of lost time of

security and management personnel;

• reduced profits;

• increased selling prices and weakened competitive standing;

• loss of productivity;

• loss of business reputation;

• deterioration in quality of service;

• threats to the survival of small business.

LOCAL GOVERNMENT

• costs of investigation and prosecution of suspects;

• increased costs of prosecuting sophisticated (e.g., embezzlement) and technology-

related (e.g., computer) crime;

• costs of correctional programs to deal with economic crime offenders;

• cost of crime prevention programs;

• cost of crime reporting and mandated security programs;

• loss of tax revenue (e.g., loss of sales tax, untaxed income of perpetrator, and tax

deductions allowed business for crime-related losses).

THE PUBLIC

• increased costs of consumer goods and services to offset crime losses;

• loss of investor equity;

• increased taxes;

• reduced employment due to business failures.99

Employ the shoplifting checklist shown in Figure 6.10100 when conducting an investi-

gation.

The appearance of shoplifters has given way to some creative programs of civil recov-

ery. The retailer, instead of formally prosecuting the shoplifter, bills him or her to recover

the proceeds of the theft:

Thirty-eight states now permit civil recovery, according to R. Reed Hayes Jr., presi-

dent, L P Specialists, Winter Park, Fla. Hayes, a pioneer in civil recovery who has

watched the technique blossom after its 1973 Nevada start.

Chapter 6 • Collection, Preservation, and Interpretation of Evidence 273

Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:20:29.

C op

yr ig

ht ©

2 01

1. E

ls ev

ie r S

ci en

ce &

T ec

hn ol

og y.

A ll

rig ht

s re

se rv

ed .

Typically, the business gives notice to a person by mail, asking for payment for money

owed. If the person neglects a certain number of notices, civil action is initiated. More

often, the person pays the money owed in one lump sum or in payments.101

n n n

An example of a firm that specializes in the tactics of civil recovery is at http://www

.lpinnovations.com/page/83-civil_recovery.

n n n

RELATED PROPERTY OFFENSES: FRAUDULENT BEHAVIOR

The illegal acquisition of property may take place under fraudulent or deceptive circum-

stances. Criminals are inventive creatures who employ devious tactics and techniques to

secure property not rightfully theirs to possess. If property cannot be taken outright,

then the devious felon will invent a new technique, a new design to fraudulently acquire

some property or interest.102

Problems with fraud trickle throughout the entire economic and business system,

whether auto, homes, stocks, bonds and commercial paper, or intellectual property.

At times, fraud activities seem insurmountable, but some are banding together to do

something about it. The National Insurance Crime Bureau is one such entity. “[A] new

agency—amerger of the National Automobile Theft Bureau and the Insurance Crime Pre-

vention Institute—employs a national network of 165 investigators who help law enforce-

ment prosecute insurance fraud perpetrators.”103 For information, call 1-800-TEL-NICB.

Another resource center on fraud detection to contact is:

National Fraud Information Center/National Consumer’s League

Fraud hotline: 1-800-876-7060, or file an online complaint at www.fraud.org

FIGURE 6.10 Shoplifting Investigation Checklist.

274 PRIVATE SECURITY AND THE LAW

Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:20:29.

C op

yr ig

ht ©

2 01

1. E

ls ev

ie r S

ci en

ce &

T ec

hn ol

og y.

A ll

rig ht

s re

se rv

ed .

1701 K Street, N.W., Suite 1200

Washington, D.C. 20006

Phone: 202-835-3323

Fax: 202-835-0747

www.nclnet.org

In the case of insurance fraud contact:

Coalition against Insurance Fraud

1012 14th Street, NW, Suite 200

Washington, D.C. 20005

Phone: 202-393-7330

Fax: 202-393-7329

[email protected]

www.insurancefraud.org

Fraudulent behavior, aside from its potential criminal behavior, may also trigger

various sorts of civil liability.

Forgery Property takings may be by simulation, forgery, or other deception. Individuals who create

false documentation, false writings, or forged stamps, seals, trademarks, or other symbols

of value, right, privilege, or identification may be subject to charges of forgery.104 A com-

mon example of criminal forgery involves tampering with wills, deeds, contracts, com-

mercial instruments, negotiable bonds, securities, or any other writing that influences,

executes, authenticates, or issues something of monetary value. To constitute forgery,

a fraudulent intent is always essential. There must not only be a false making of an

instrument, but it must be with intent to defraud:105

715A.2 Forgery.

1. A person is guilty of forgery if, with intent to defraud or injure anyone, or with

knowledge that the person is facilitating a fraud or injury to be perpetrated by

anyone, the person does any of the following:

a. Alters a writing of another without the other’s permission.

b. Makes, completes, executes, authenticates, issues, or transfers a writing so that

it purports to be the act of another who did not authorize that act, or so that it

purports to have been executed at a time or place or in a numbered sequence

other than was in fact the case, or so that it purports to be a copy of an original

when no such original existed.

c. Utters a writing which the person knows to be forged in a manner specified in

paragraph “a” or “b”.

d. Possesses a writing which the person knows to be forged in a manner specified

in paragraph “a” or “b”.106

Chapter 6 • Collection, Preservation, and Interpretation of Evidence 275

Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:20:29.

C op

yr ig

ht ©

2 01

1. E

ls ev

ie r S

ci en

ce &

T ec

hn ol

og y.

A ll

rig ht

s re

se rv

ed .

SIMULATING OBJECTS OF ANTIQUITY OR RARITY

Security officials given the responsibility of protecting museum collections, art centers,

or other nonprofit institutions dedicated to articles of antiquity or rarity should always

be aware of possible reproduction or simulation of their employer’s collections:

Simulating objects of antiquity, rarity, etc.

A person commits a misdemeanor of the first degree if, with intent to defraud any-

one or with knowledge that he is facilitating a fraud to be perpetrated by anyone, he

makes, alters or utters any object so that it appears to have value because of antiq-

uity, rarity, source, or authorship which it does not possess.107

FRAUDULENT DESTRUCTION, REMOVAL, OR CONCEALMENT OF RECORDABLE

INSTRUMENTS OR THEIR TAMPERING

Internal security, particularly in the area of personnel, payroll, and administrative mat-

ters, should give substantial thought to the preventative security measures that are pres-

ently in place or should be implemented:

}4103. Fraudulent destruction, removal or concealment of recordable instruments A person commits a felony of the third degree if, with intent to deceive or injure

anyone, he destroys, removes or conceals any will, deed, mortgage, security

instrument or other writing for which the law provides public recording.

}4104. Tampering with records or identification (a) Writings—A person commits a misdemeanor of the first degree if, knowing that

he has no privilege to do so, he falsifies, destroys, removes or conceals any writing

or record, or distinguishing mark or brand or other identification with intent to

deceive or injure anyone or to conceal any wrongdoing.108

BAD CHECK AND CREDIT CARD VIOLATIONS

Retail centers are regularly victimized by check and credit card fraud and related viola-

tions. Here too property is acquired without the proper payment of consideration. The

seemingly endless stream of fraudulent and bounced checks received by commercial

establishments is mind-boggling. The security industry must adopt an aggressive pos-

ture against these actors in order to protect pricing and value in the exchange of goods

and services. Bad checks and credit card fraud drive up the prices. The language of bad

check laws is fairly uniform.

}4105. Bad checks

(a) OFFENSE DEFINED—

(1) A person commits an offense if he issues or passes a check or similar sight order for

the payment of money, knowing that it will not be honored by the drawee.

276 PRIVATE SECURITY AND THE LAW

Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:20:29.

C op

yr ig

ht ©

2 01

1. E

ls ev

ie r S

ci en

ce &

T ec

hn ol

og y.

A ll

rig ht

s re

se rv

ed .

(2) A person commits an offense if he, knowing that it will not be honored by the

drawee, issues or passes a check or similar sight order for the payment of money

when the drawee is locatedwithin this Commonwealth. Aviolation of this paragraph

shall occur without regard to whether the location of the issuance or passing of the

check or similar sight order is within or outside of this Commonwealth. It shall be no

defense to a violation of this section that some or all of the acts constituting the

offense occurred outside of this Commonwealth.

}4106. Access device fraud

(a) OFFENSE DEFINED—A person commits an offense if he:

(1) uses an access device to obtain or in an attempt to obtain property or services

with knowledge that:

(i) the access device is counterfeit, altered or incomplete;

(ii) the access device was issued to another person who has not authorized

its use;

(iii) the access device has been revoked or canceled; or

(iv) for any other reason his use of the access device is unauthorized by the

issuer or the device holder; or

(2) publishes, makes, sells, gives, or otherwise transfers to another, or offers

or advertises, or aids and abets any other person to use an access device

knowing that the access device is counterfeit, altered or incomplete, belongs

to another person who has not authorized its use, has been revoked or

canceled or for any reason is unauthorized by the issuer or the device

holder; or

(3) possesses an access device knowing that it is counterfeit, altered, incomplete or

belongs to another person who has not authorized its possession.109

n n n

Review the criminal penalties for bad checks at http://www.ckfraud.org/penalties.html#

criminal.

n n n

Offenses against Public Order and Decency

Maintenance of public order is a public police function that has been increasingly trans-

ferred to the private sector.110 Not surprisingly, security personnel have recently come

up against troubled and volatile conditions experienced by the police in the mid-

1960s, namely, riotous situations, disorderly persons, extreme disorderly conduct,

harassment, public drunkenness, and other obstructive activities. As this transference

of public control functions continues unabated, an understanding of the relevant

statutes is imperative.

Chapter 6 • Collection, Preservation, and Interpretation of Evidence 277

Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:20:29.

C op

yr ig

ht ©

2 01

1. E

ls ev

ie r S

ci en

ce &

T ec

hn ol

og y.

A ll

rig ht

s re

se rv

ed .

Riot A person is guilty of riot, a felony of the third degree, if he participates with two or more

others in a course of disorderly conduct:

(1) with intent to commit or facilitate the commission of a felony or misdemeanor;

(2) with intent to prevent or coerce official action; or

(3) when the actor or any other participant to the knowledge of the actor uses or plans

to use a firearm or other deadly weapon.111

Other provisions relating to public obstruction, trespass, and resisting arrest are close

companions to crowd control. Pennsylvania and other jurisdictions have drafted aligned

provisions dealing with similar situations such as the following:

}5104. Resisting arrest or other law enforcement A person commits a misdemeanor of the second degree if, with the intent of

preventing a public servant from effecting a lawful arrest or discharging any other

duty, the person creates a substantial risk of bodily injury to the public servant or

anyone else, or employs means justifying or requiring substantial force to overcome

the resistance.112

}5507. Obstructing highways and other public passages (a) Obstructing—A person, who, having no legal privilege to do so, intentionally or

recklessly obstructs any highway, railroad track or public utility right-of-way,

sidewalk, navigable waters, other public passage, whether alone or with others,

commits a summary offense, or, in case he persists after warning by a law officer, a

misdemeanor of the third degree. No person shall be deemed guilty of an offense

under this subsection solely because of a gathering of persons to hear him speak or

otherwise communicate, or solely because of being amember of such a gathering.113

}7506. Violation of rules regarding conduct on Commonwealth property114

}5502. Failure of disorderly persons to disperse upon official order Where three or more persons are participating in a course of disorderly conduct

which causes or may reasonably be expected to cause substantial harm or serious

inconvenience, annoyance or alarm, a peace officer or other public servant engaged

in executing or enforcing the law may order the participants and others in the

immediate vicinity to disperse. A person who refuses or knowingly fails to obey such

an order commits a misdemeanor of the second degree.115

Handling the disruptive, the loud, and the fighters requires a charge of disorderly

conduct:

}5503. Disorderly conduct (a) OFFENSE DEFINED—A person is guilty of disorderly conduct if, with intent to

cause public inconvenience, annoyance or alarm, or recklessly creating a risk

thereof, he:

(1) engages in fighting or threatening, or in violent or tumultuousbehavior;

278 PRIVATE SECURITY AND THE LAW

Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:20:29.

C op

yr ig

ht ©

2 01

1. E

ls ev

ie r S

ci en

ce &

T ec

hn ol

og y.

A ll

rig ht

s re

se rv

ed .

(2) makes unreasonable noise;

(3) uses obscene language, or makes an obscene gesture; or

(4) creates a hazardous or physically offensive condition by any act which serves

no legitimate purpose of the actor.116

What is the likelihood of being arrested for using obscene language?

Public Drunkenness A person is guilty of a summary offense if he appears in any public place manifestly

under the influence of alcohol or a controlled substance, to the degree that he may

endanger himself or other persons or property or annoy persons in his vicinity.117

Ohio law defines voluntary intoxication in more specific terms, stating that a viola-

tion of the disorderly conduct statute for public intoxication will only occur if the person

is engaging in conduct “likely to be offensive or to cause inconvenience, annoyance, or

alarm to persons of ordinary sensibilities.”118

Other Public Order Provisions Loitering,119 obstruction of highways and other public places,120 disrupting lawful meet-

ings or processions,121 desecration, theft or sale of venerated objects,122 and vagrancy123

are related public offenses of interest to the security professional. When one considers

the homeless figures on the nation’s streets, does vagrancy seem an enforceable statute?

Ponder Wisconsin’s vagrancy language:

947.02. Vagrancy.

Any of the following are vagrants and are guilty of a Class C misdemeanor:

(1) A person, with the physical ability to work, who is without lawful means of

support and does not seek employment; or . . .

(2) A prostitute who loiters on the streets or in a place where intoxicating liquors

are sold, or a person who, in public, solicits another to commit a crime

against sexual morality; or

(3) A person known to be a professional gambler or known as a frequenter of

gambling places or who derives part of his or her support from begging or as

a fortune teller or similar impostor.124

Critics of vagrancy statutes comment on the imprecision and vagaries of language

employed. Civil libertarians bristle at language that seeks to measure whether a person

looks employed or not, or whether one appears not to have a livelihood. Is it better that

vagrants and other undesirables simply lay on the streets? Or does it make sense to

round up the displaced for social service processing? Tension exists between those

who urge decriminalization of the homeless or vagrancy statutes and those who see

the loitering as a nuisance and a trespass. As the public police system further transfers

public order functions, private security will have to increasingly deal with these sorts

of social pathology.

Chapter 6 • Collection, Preservation, and Interpretation of Evidence 279

Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:20:29.

C op

yr ig

ht ©

2 01

1. E

ls ev

ie r S

ci en

ce &

T ec

hn ol

og y.

A ll

rig ht

s re

se rv

ed .

Evidence and Proof

Detecting crime and implementing steps that halt its spread are major vocational issues

for the security profession. To do so, the security industry must process criminals with

procedural and evidentiary rigor. While not held accountable under the public police

standard, it is salient for security specialists to carry out their task and mission with pro-

fessional demeanor. Unfortunately, private security has sometimes taken the law into its

own hands, attempting to perform criminal investigations that will generate questions of

admissibility. Far too often, private security has displayed scant care about the implica-

tions of evidence collection. To be certain, private security has always taken an active

interest in the collection and preservation of evidence since it is so often on the front

lines of first response. That same interest must extend to eventual trial or other liti-

gation. As a result, security personnel must master the dominant themes in evidence

law and practice.

The Chain of Custody Evidence acquired at the scene of a crime or other location that the prosecution seeks to

admit will always be challenged on chain of custody theory.125 Evidence that is acquired

in any investigation should be properly tagged and packaged with precautions to thor-

oughly preserve content and structural integrity.126 In other words, the defense will

question whether the evidence, as acquired on the date of the investigation, compares

in composition and nature as it did on the date it was offered for admission. Any change,

corruption, or other alteration imputes a faulty and flawed chain. The evidence will be

suspect and likely denied admission. Evidence that lacks a chronological tag or docu-

mentary history will be challenged. John Waltz, in his text Criminal Evidence, reminds

practitioners:

Tracing an unbroken chain of custody can hold crucial to the effective use of a fire-

arm’s identification evidence. This does not mean, however, that changes in the con-

ditions of firearm’s evidence or the passage of a substantial period of time between

the shooting and the recovery of the firearm’s evidence will foreclose admissibility at

trial. . . . Of course it is important that, to the extent possible, all law enforcement

agencies provide for the safe storage of vital evidence prior to trial. Police depart-

ments are well advised to maintain a locked evidence room manned by an officer

who keeps detailed records not only of its contents but of the disposition of items

of evidence and the names of persons entering the room for any purposes.127

The image of a chain is most appropriate since any break in a series of links on a

chain destroys the chain.128 By analogy, real evidence with a checkered history, whether

as to location or packaging, loses its credibility. For this reason, the proponent of real

evidence must establish that the condition of the real evidence being offered has

remained basically unchanged since the date of acquisition, and that it has neither been

280 PRIVATE SECURITY AND THE LAW

Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:20:29.

C op

yr ig

ht ©

2 01

1. E

ls ev

ie r S

ci en

ce &

T ec

hn ol

og y.

A ll

rig ht

s re

se rv

ed .

tampered with nor suffered any damage. Opposing counsel challenging the quality and

integrity of real evidence might argue that the evidence is contaminated or lacks a reli-

able historical record assuring its pristine and untouched condition.129

n n n

The Environmental Protection Agency delivers an entire course on chain of custody issues at

http://www.epa.gov/apti/coc.

n n n

A security department would be well advised to heed the same advice—that chrono-

logical tracking is essential upon initial acquisition of evidence and that a cooperative

plan for transference of evidentiary matter to police departments and other justice agen-

cies be instituted. Evidence tags are inexpensive, reliable ways of tracing an evidence

chain. An evidence log is equally helpful. See Figure 6.11 for an example.

FIGURE 6.11 Prosecutor’s Office Evidence Log.

Chapter 6 • Collection, Preservation, and Interpretation of Evidence 281

Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:20:29.

C op

yr ig

ht ©

2 01

1. E

ls ev

ie r S

ci en

ce &

T ec

hn ol

og y.

A ll

rig ht

s re

se rv

ed .

Destruction or even partial corruption of evidence taints and undermines the proof.

Documents, physical evidence, forensic materials, and other forms of evidence used by

both the prosecution and the defense will only be able to withstand legal challenges if

not subject to integrity challenges. While each party may employ the evidence for its

case in chief, the question of whether said evidence finds a willing tribunal will largely

depend on the proof of how it has been handled and processed. The chain of custody

requirements assure that the history of that evidence is both traceable and verifiable.130

Destruction of evidence will also make discovery of said evidence, a compulsory grant

by prosecution to defense, even more difficult, for that evidence is untrustworthy. The

exercise of procedural examination can be frustrated if relevant material is altered, con-

cealed, or destroyed.131 Destruction may also trigger constitutional violation when the

agent who ruined the evidence did so with malice, fraud, or some other intentional pur-

pose. Whether by case law or statute, destroying evidence in all circumstances is a pro-

hibited act.132

n n n

Visit an evidence company to review the many products available to assure the integrity of

evidence at http://www.sirchie.com.

n n n

The Admission of Business Records Business records are inherently hearsay, since the author of that record is not readily

available to testify. Hearsay is inadmissible unless an exception has been fashioned. As

is so often the case, especially in large corporate enterprises, record keeping is so volu-

minous and broad based that it is difficult to tie authorship to any given document. The

Federal Rules of Evidence fully recognize that business records themselves, while admit-

tedly hearsay, are admissible. Federal Rule 803(6) provides:

A memorandum, report, record, or data compilation, in any form, of acts, events,

conditions, opinions, or diagnoses, made at or near the time by, or from informa-

tion transmitted by, a person with knowledge, if kept in the course of a regularly

conducted business activity, and if it was the regular practice of that business activ-

ity to make the memorandum, report, record, or data compilation, all as shown by

the testimony of the custodian or other qualified witness, unless the source of infor-

mation or the method or circumstances of preparation indicate lack of trustworthi-

ness. The term “business” as used in this paragraph includes business, institution,

association, profession, occupation, and calling of every kind, whether or not con-

ducted for profit.133

Records, in order to be regularly admissible and outside the hearsay criterion, must

be regularly kept. A presumption exists in the law that regularly kept records, automati-

cally filled-in forms, and other autonomic exercises decrease the likelihood of deception

and fraud in authorship.134 For the most part, security record keeping, like surveillance

282 PRIVATE SECURITY AND THE LAW

Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:20:29.

C op

yr ig

ht ©

2 01

1. E

ls ev

ie r S

ci en

ce &

T ec

hn ol

og y.

A ll

rig ht

s re

se rv

ed .

reports, warehouse bills of lading, visitors’ logs, shoplifting reports, and investigative

task sheets, are robotic business records135 that will be admitted despite their hearsay

content.

Thus, business records will not be admitted in any subsequent litigation except

under the following conditions:

• The record was made at or near the time of the occurrence.

• It was the regular practice of the business to make such records.

• There are no indications of untrustworthiness in the record.

• The information in the record was made by, or with information from, a

knowledgeable person.

• The record was made and kept in the normal course of a business.136

Real and Demonstrative Evidence As the name implies, real or physical evidence is of a tangible form—something

that can be felt, touched, sensed, and seen. Real evidence is the gun, the knife, the

blood, and other actual composition.137 Real evidence is the actual product, not a

reproduction or a copy. It may be the actual weapon, forged check or deed, or other

physical matter. In most litigation, there is a preference for the real over other eviden-

tiary forms:

As the trier of fact looks for the truth, what form of evidence is most convincing dur-

ing its deliberations? Is the testimony of expert or lay witnesses regarding impres-

sions and eyewitness accounts as persuasive as evidence in real format? Is the

testimony of the plaintiff in a civil negligence case regarding experienced pain

and suffering more probative than the actual exhibition of injuries inflicted in

the plaintiff ’s body?138

While there may be some variety in responses based on the quality of the real and the

illustrative and educational quality of secondary evidence forms, there is little doubt

that the real evidence form can be compelling.

Comparatively, demonstrative evidence is an illustration of the real.139 Its admissibil-

ity and utility depends upon these criteria:

Does it aid the trier of fact in discerning the truth? Does it simplify complex pro-

blems? Does it educate the jury and tribunal? Is it persuasive? Does the demonstra-

tion appeal to multiple senses?140

Common forms of demonstrative evidence include the following:

• Maps

• Models

• Photographs

Chapter 6 • Collection, Preservation, and Interpretation of Evidence 283

Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:20:29.

C op

yr ig

ht ©

2 01

1. E

ls ev

ie r S

ci en

ce &

T ec

hn ol

og y.

A ll

rig ht

s re

se rv

ed .

• Videotapes

• Animation Graphics

• Experiments and Simulations • Movies

• Charts

• Graphs

• Reproductions

• Scale Models

• Multiple Views

• Cast Models

• Sound Recordings

• Artistic Reproductions

• X-Rays

• Thermographs

• Spectrograms

• Medical Test Results

• Chemical Analysis141

Security personnel are increasingly relying on animation and other graphics por-

trayals142 to reconstruct a case during the investigative phase. Some of the more com-

monly used providers in the area are the following:

The Association of Medical Illustrators

201 E. Main Street, Suite 1405

Lexington, Kentucky 40507

Phone: 1-866-393-4AMI (or 1-866-393-4264)

E-mail: [email protected]

http://www.ami.org

(for information on medical illustrators in your area)

Wolf Technical Services, Inc.

9855 Crosspoint Blvd., Suite 126

Indianapolis, Indiana 46256-3336

Main: 317-842-6075

Toll Free: 1-800-783-9653

Fax: 317-842-6974

http://www.wolftechnical.com/

(accident reconstruction and forensic engineering)

ARCCA Incorporated

2288 Second Street Pike

Penns Park, Pennsylvania 18943

Phone: 215-598-9750

Toll Free: 1-800-700-4944

Fax: 215-598-9751

284 PRIVATE SECURITY AND THE LAW

Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:20:29.

C op

yr ig

ht ©

2 01

1. E

ls ev

ie r S

ci en

ce &

T ec

hn ol

og y.

A ll

rig ht

s re

se rv

ed .

http://www.arcca.com

(illustrations and charts of crash simulations)

n n n

Visit one of the country’s largest developers of medical and injury demonstrative exhibits at

http://www.medicallegalexhibits.com.

n n n

Lay Witnesses As private security performs its investigatory functions, it must rely on evidence

provided by witnesses. The measure of witness competency will largely be determined

by whether the witness is lay or expert. A wise practice is to evaluate lay witnesses in

the field, since these very individuals, who are providing crucial information, may be

the best foundation on which a case rests. If incompetent in the field, they will clearly

be incompetent on the stand.143 By competency, we merely hold that the witness is

capable of relating facts and conditions in a reliable and dependable way.

Lay competency is generally defined by Rule 602 of the Federal Rules of Evidence as

follows:

(1) The witness has the capacity to actually perceive, record and recollect impressions

of fact (physical and mental capacity);

(2) The witness in fact did perceive, record and recollect impressions having a tendency

to establish a fact of consequence in the litigation (personal knowledge);

(3) Thewitness be capable of understanding theobligation to tell the trust (oathor affirmation);

(4) The witness possess the capacity to express himself understandably where

necessary with the aid of an interpreter.144

Competency does not require genius but the capacity to perceive, record, and recol-

lect impressions of fact as influenced by a wide assortment of social and biogenic fac-

tors.145 All lay witnesses, in order to be effective on the witness stand, need to be

evaluated in light of these criteria:

• What is their present age?

• Do they have any personal habits that would indicate their powers of recollection

and thought retention would be influenced by chemical or drug usage?

• From an observational point of view, do these individuals appear intellectually ordered?

• Would a street person, bag lady, or heroin abuser be a witness who could withstand

the competency standard?

• Did they have any personal knowledge of the events or is their viewpoint strictly the

product of hearsay?146

Certain witnesses—such as children, a spouse, a coconspirator who has been granted

immunity, or a person who has been adjudged insane—will trigger credibility concerns.147

Lack of credibility, however, does not disallow a witness from taking the stand.148

Chapter 6 • Collection, Preservation, and Interpretation of Evidence 285

Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:20:29.

C op

yr ig

ht ©

2 01

1. E

ls ev

ie r S

ci en

ce &

T ec

hn ol

og y.

A ll

rig ht

s re

se rv

ed .

Security practitioners should evaluate the levels of sincerity and credibility of any wit-

ness they interview during the investigative process. Employing simple human relations

skills will often permit the security professional to judge the quality and credibility of

any witness. When evaluating a witness, utilize the checklist presented in Figure 6.12.149

The security officer needs to evaluate and weigh not only the physical and real evi-

dence he or she collects but also the testimony from interested as well as disinterested

witnesses. Conduct the type of human observation that ferrets out the unreliable in

favor of the reliable lay witness. Make human judgments that work for the average per-

son, and avoid witnesses who are disgruntled individuals, abhorrent characters, and

courtroom groupies whose sole purpose in life is to meddle in the affairs of others.150

Expert Witnesses An expert is often defined as any witness who is not a lay witness. While it is a suitable

definition, the complexities of expert testimony call for more.151 It is now a given that

experts populate our courtroom in both the criminal and civil realm. It is also commonly

FIGURE 6.12 Witness Competency Checklist.

286 PRIVATE SECURITY AND THE LAW

Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:20:29.

C op

yr ig

ht ©

2 01

1. E

ls ev

ie r S

ci en

ce &

T ec

hn ol

og y.

A ll

rig ht

s re

se rv

ed .

agreed upon that there has been a proliferation of experts, expert testimony, and fields

of acceptable expertise once unenvisioned.152 These perceptions are the result of many

factors such as media coverage of flamboyant expert witnesses to celebrated and often

avant-garde litigation. However, the bulk of testimony given in any criminal or civil

action is fundamentally “lay” in nature. An expert is entitled to give an opinion, but only

in the context of his or her expertise, though a foundational test will have to be met

before such testimony is proffered. In the case of a lay witness, foundational require-

ments must be laid as follows:

• The witness’s testimony is based upon his or her own unique perception.

• The court is convinced that the testimony of the lay witness is helpful in arriving at

the truth.

• The witness does in actuality have an opinion.

• The witness is capable and competent to testify as to that opinion.

• Without the testimony the trier of fact, namely, the judge and jury, would not have

the best case presented.

• The witness is giving lay testimony rather than expert testimony.

• No opinion as to a rule or an interpretation of law will be permitted.153

Experts, on the other hand, must be qualified to testify in their areas of expertise.

Rule 703 of the Federal Rules of Evidence154 requires that an expert’s opinion rest on

facts, data, or other information that he or she has actually seen or heard or has been

communicated to the expert. Rule 704155 permits the expert witness to attest to the ulti-

mate issue of fact, though at one point in history the ultimate issue doctrine withheld

that right. By ultimate issue, the expert is giving his or her assessment on the fundamen-

tal guilt or innocence of the defendant or the truth or falsity of a given issue at trial.156

Security companies must learn to develop collegial and longstanding relationships

with experts in fields of mutual interest, such as engineering, hazardous materials, use

of force and professional police practices, product liability, negligence and intentional

tortious conduct. The occasion may arise whereby the security company needs the

assistance of an expert. Insist that the self-acclaimed expert prove his or her quali-

fications since the court will expect the scrutiny by reviewing these standardized

qualifications:

• The witness has specialized training in the field of his or her expertise.

• The witness has acquired advanced degrees from educational institutions.

• The witness has practiced in the field for a substantial period of time.

• The witness taught courses in a particular field.

• The witness has published books or articles in the particular field.

• The witness belongs to professional societies or organizations in a particular field.

• The witness has previously testified and been qualified as an expert before a court or

administrative body on a particular subject to which he or she is being asked to

render an opinion.157

Chapter 6 • Collection, Preservation, and Interpretation of Evidence 287

Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:20:29.

C op

yr ig

ht ©

2 01

1. E

ls ev

ie r S

ci en

ce &

T ec

hn ol

og y.

A ll

rig ht

s re

se rv

ed .

Practical Exercise: Cross-Examination Security operatives are frequently cross-examined on the witness stand.158 How would

you respond to the following queries:

1. “Your name and occupation, please?”

2. “So, you’re a real live Pinkerton detective. And who do you represent in this case?”

3. “In other words, you are being paid to testify for ABC Insurance Company against

my client, isn’t that correct?”

4. “Exactly how long did you conduct your spying in Mr. Smith’s home and how long

did you actually observe my client engaged in activity during this time?”

5. “So, for two (2) days you were paid to observe Mr. Smith for only a half hour. The

insurance company must have been disappointed.”

6. “You describe in your report the home of Mr. Smith and state that its approximate

value is $65,000. Are you qualified to make such a statement?”

7. “Just how far away were you when you took these movies of Mr. Smith and don’t you

consider taking these movies without his permission a shameful invasion of Mr.

Smith’s right to privacy?”

8. “You state in your report that Mr. Smith exhibited no sign of discomfort or pain

while moving about. Do you have a medical background that qualifies you to judge

whether or not Mr. Smith was experiencing pain?”

9. “I understand that your presence in Mr. Smith’s neighborhood created a great deal

of anxiety among his neighbors, that they were concerned for the safety of their

children with a stranger parked for two (2) days in their neighborhood with out-of-

state license plates. Do you think you have a right to frighten innocent people while

you are spying on my client for this big insurance company?”

10. “Do you get a percentage of any money the insurance company may save—Never

mind. No further questions.”159

There has been a proliferation of experts and consulting services in the security

industry itself. Review a recent classified section of any industry magazine and you will

find a plethora of ads for expert witness and consulting services. Assuring the integrity of

these or any other proposed expert is a problem, for the security industry and all other

areas of expertise.160 The International Association of Professional Security Consul-

tants161 is a member organization dedicated to assuring competency among its security

experts.

Use the following expert witness questionnaire when determining the qualifications

of an expert. See Figure 6.13.162 A contract for the expert services of a security specialist

lays out the professional expectations. See Figure 6.14.

A. Potpourri of Evidentiary Principles BURDEN OF PROOF

In criminal cases, the standard is beyond a reasonable doubt; in civil cases, the standard

is beyond a preponderance of the evidence or by clear and convincing evidence.163

288 PRIVATE SECURITY AND THE LAW

Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:20:29.

C op

yr ig

ht ©

2 01

1. E

ls ev

ie r S

ci en

ce &

T ec

hn ol

og y.

A ll

rig ht

s re

se rv

ed .

FIGURE 6.13 Expert Witness Questionnaire.

Chapter 6 • Collection, Preservation, and Interpretation of Evidence 289

Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:20:29.

C op

yr ig

ht ©

2 01

1. E

ls ev

ie r S

ci en

ce &

T ec

hn ol

og y.

A ll

rig ht

s re

se rv

ed .

FIGURE 6.14 Contract for Expert Services.

290 PRIVATE SECURITY AND THE LAW

Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:20:29.

C op

yr ig

ht ©

2 01

1. E

ls ev

ie r S

ci en

ce &

T ec

hn ol

og y.

A ll

rig ht

s re

se rv

ed .

QUESTIONS OF LAW VERSUS QUESTIONS OF FACT

A trial judge saddled with the question of law must decide the applicability of a case

decision, statute, or other regulation. A question of fact is an interpretation of events left

best to the jury or a judge evaluating the case before it.

THE BASIC TYPES OF EVIDENCE

Direct evidence Direct evidence is a type of evidence that “proves a fact proposition

directly rather than by inferential process.”164

Indirect or circumstantial evidence Circumstantial evidence relies on the inference that

can be deduced from a fact pattern presented. The bulk of evidence is circumstantial.165

THREE FORMS OF EVIDENCE

All evidence is further subcategorized into the following forms.

CASE EXAMPLES

THIRD-PARTY CRIMINAL ACTS—HATT V. HAMMOND, NO. 236637 (PIMA COUNTY

SUPERIOR COURT, TUCSON, ARIZONA, OCTOBER 20, 1987)

Facts

A 66-year-old retired man and his wife were assaulted at gunpoint by three men in their hotel

room. Plaintiffs sued the hotel for failing to provide adequate security. At the time of the incident,

the hotel was sponsoring a precious gem show. The hotel was accused of being negligent in

failing to provide additional security with this expensive property. The claim of inadequate

security was also based on the fact that the plaintiffs’ room was located in a building that was

detached from the hotel lobby and had six unguarded, unlocked exterior doors.

Issue

Is the hotel liable for failure to provide sufficient security?

THIRD-PARTY CRIMINAL ACTS

Facts

Upon returning to her apartment unit at 11 p.m., a 21-year-old woman locked the sliding glass

door, pulled the drapes, and immediately went to bed. Two hours later she was awakened by an

individual who, with brutal force, caused her to perform sexual acts against her will. She

brought suit against the owners and managers of the building complex, alleging that they had

knowledge that other specific criminal acts had taken place within the complex and that they

had negligently failed to take reasonable steps to protect their tenants. Plaintiff further alleged

that the defendants failed to warn tenants of these prior crimes, thus denying tenants the

opportunity to take increased self-protective measures.

Issue

Is this apartment complex negligent for the criminal acts of a third party?

Chapter 6 • Collection, Preservation, and Interpretation of Evidence 291

Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:20:29.

C op

yr ig

ht ©

2 01

1. E

ls ev

ie r S

ci en

ce &

T ec

hn ol

og y.

A ll

rig ht

s re

se rv

ed .

Testimonial evidence Evidence provided by oral testimony under oath or affirmation or,

on occasion, by sworn pretrial written deposition or interrogatory.166

Tangible evidence As discussed previously, tangible evidence is either the real evidence

the actual agency utilized in the criminal activity or, otherwise, demonstrative evidence

that is an illustrative tool in the form of a visual design, reproduction, diagram, or ana-

tomical model.167

Judicially noticed evidence Evidence that is generally and commonly known by the

community at large and that is scientifically acceptable in most circles can be judicially

noticed. The fact that the sun rises during a 24-hour cycle, at least in North America, is a

judicially noticed fact.168

Summary The chapter provides a broad overview of legal principles, definitions, and standards

relating to the laws of crime and evidence law. The coverage commenced with a review

of criminal liability. As private sector justice moves increasingly into public functions of

law enforcement, it will have to master the art and science of crimes and their

subsequent prosecutions. Even more pertinent is this chapter’s refined analysis of crim-

inal charges and actions. Criminal law is primarily codified, but in the focused, occupa-

tional realm of private security, certain actions more commonly occur: property crimes

such as theft and its parallel and companion charges; offenses against the person such

as murder, manslaughter, kidnapping, false imprisonment, and sexual offenses; and

offenses against the public order and public domain. Property offenses naturally receive

the bulk of attention since asset protection is the proclaimed vocational priority of pri-

vate security.

Equally essential to the professional growth of the security industry is mastery of

select evidentiary principles that affect the investigative practice of the private security

industry. Evaluating the quality, competency, and credibility of witnesses and utilizing

experts throughout all stages of criminal process are fully covered. Heeding the founda-

tional rules and admission for evidence, whether real, testimonial, or expert in design,

assures a worthwhile claim or case for the private sector entity. Assuring the quality of

the evidence is just as critical. The chapter gives suggestions on chain of custody poli-

cies and procedures and delivers a definitional overview of the most relevant evidentiary

principles.

Discussion Questions 1. What two major elements are necessary for the finding of criminal liability?

2. Research your jurisdiction’s manslaughter statutes. What language is utilized to

describe the mental state?

292 PRIVATE SECURITY AND THE LAW

Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:20:29.

C op

yr ig

ht ©

2 01

1. E

ls ev

ie r S

ci en

ce &

T ec

hn ol

og y.

A ll

rig ht

s re

se rv

ed .

3. How does one distinguish between the gradations and levels of differing criminal

acts?

4. Give a fact pattern that would involve a private security agent or investigator that

applies the felony murder rule.

5. What types of criminal activity would most commonly occur in American business

and industry and require the investigative services of private security forces?

6. Why should the private security industry be concerned about “public offenses” or

conduct involving the social order?

7. Name three evidentiary rules that are relevant to the private security industry.

Notes 1. See Restatement of Torts }2.05 (1934); William L. Clark & William L. Marshall, A Treatise on the Law

of Crimes 200 (1967); see also John E. Douglas & Mark Olshaker, The Anatomy of Motive (1999); Leo Katz, Bad Acts and Guilty Minds: Conundrums of the Criminal Law (1987).

2. See Charles P. Nemeth, Criminal Law 84 (2004, 2nd 3d. forthcoming 2011); see also Stanton E. Same- now, Inside the Criminal Mind (1984); Lawrence Taylor, Born to Crime: The Genetic Causes of Criminal Behavior (1984).

3. Model Penal Code }2.01 (1-3) (1962).

4. See Nemeth, Criminal, supra note 2, at 77-83.

5. Edward T. Guy, John J. Merrigan, Jr. & John A. Wanat, Forms for Safety and Security Management 138 (1981).

6. George E. Dix & Michael M. Sharlot, Basic Criminal Law, Cases and Materials 151 (1980); see also Steven J. Rossen & Wilton S. Sogg, Smith’s Review of Criminal Law (1985); Nemeth, Criminal, supra note 2, at 87; Katherine R. Tromble, Humpty Dumpty on Mens Rea Standards: A Proposed Method- ology for Interpretation, 52 Vand. L. Rev. 521, 522 (1999); Note, Mens Rea in Federal Criminal Law, 111 Harv. L. Rev. 2402 (1998).

7. See generally Tromble, supra note 6; Note, Mens Rea, supra note 6; Douglas & Olshaker, supra note 1; Richard Rhodes, Why They Kill: The Discoveries of a Maverick Criminologist (1999); Katz, supra note 1; Frank Remington & Orrin L. Helstad, Mental Element in Crimes—A Legislative Problem, 1952 Wisc. L. Rev. 644 (1952); Rollin M. Perkins, A Rationale of Mens Rea, 52 Harv. L. Rev. 905 (1935); Thomas A. Cowan, A Critique of the Moralistic Conception of Criminal Law, 97 U. Pa. L. Rev. 502 (1949); Dennis v. U.S., 341 U.S. 494 (1951).

8. Model Penal Code }2.02 (1 & 2) (1962). See also Del. Code Ann. tit. 11, }231 (2001); Mo. Rev. Stat. }562.016 (2001); Jonathan L. Marcus, Model Penal Code Section 2.02(7) and Willful Blindness, 102 Yale L.J. 2231, 2232 (1993).

9. Clark & Marshall, supra note 1, at 270.

10. See Nemeth, Criminal, supra note 2, at 53-55; John E. Douglas, Crime Classification Manual (1997); Dictionary of Criminal Justice Terms (1990); 4 William Blackstone, Commentaries 5 (1941); Clark & Marshall, supra note 1, at }}2.01-2.04; Michael J. Pastor, Note: A Tragedy and a Crime?: Amadou Diallo, Specific Intent, and the Federal Prosecution of Civil Rights Violations, 6 N.Y.U. J. Legis. & Pub. Pol’y 171 (2002); Adam Candeub, Consciousness & Culpability, 54 Ala. L. Rev. 113 (2002).

11. See Nemeth, Criminal, supra note 2, at 55-56.

12. See Nemeth, Criminal, supra note 2, at 56.

Chapter 6 • Collection, Preservation, and Interpretation of Evidence 293

Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:20:29.

C op

yr ig

ht ©

2 01

1. E

ls ev

ie r S

ci en

ce &

T ec

hn ol

og y.

A ll

rig ht

s re

se rv

ed .

13. See generally 2 Frederic Pollock, Sr. & Fredrick W. Maitland, History of English Law (1903); Black- stone, supra note 10; Clark & Marshall, supra note 1, at 108-115; Center for Criminal Justice, Private Police Training Manual 34 (1985); Nemeth, Criminal, supra note 2, at 50-53.

14. There are exceptions to this including Pennsylvania. See 18 Pa. Stat. Ann. }}1105 (2010).

15. See Blackstone, supra note 10, at 205.

16. Bannon v. U.S., 156 U.S. 464 (1894).

17. Task Force on Administration on Justice, The President’s Commission on Law Enforcement and Administration of Justice, Task Force Report: The Courts (1967).

18. Id. at 15.

19. As an example see New York’s misdemeanor classification of Sexual Misconduct, at }}130.20. Critics claim it is nothing more than an actual Aggravated Sexual Assault.

20. See generally Perkins, supra note 7; Herbert Wechsler & Jerome Michael, A Rationale of the Law of Homicide, 37 Colum. L. Rev. 701 (1937); see Nemeth, Criminal, supra note 2, at 115.

21. Model Penal Code }210.1 (1962).

22. Id. at }210.2.

23. See Nemeth, Criminal, supra note 2, at 93-97; People v. Erikson, No. 25854 (Ca. Super. Ct. 1997); Edward Imwinkelried, Evidence Pedagogy in the Age of Statutes, 41 J. Legal Educ. 227 (1991).

24. People v. Morris, 187 N.W. 2d 434, 438-443 (Mich. App. 1971).

25. Id.

26. See Nemeth, Criminal, supra note 2, at 128-135; Kenneth W. Simons, Does Punishment for “Culpa- ble Indifference” Simply Punish for “Bad Character”? Examining the Requisite Connection Between Mens Rea and Actus Reus, 6 Buff. Crim. L.R. 219 (2002); Guyora Binder, The Rhetoric of Motive and Intent, 6 Buff. Crim. L.R. 1 (2002).

27. See Nemeth, Criminal, supra note 2, at 97-99; Binder, supra note 26.

28. 18 Pa. Cons. Stat. Ann. }2503 (a) (West 2010).

29. Id. at }2504 (a).

30. See Nemeth, Criminal, supra note 2, at 128-129; Simons, supra note 26; Binder, supra note 26.

31. Mo. Rev. Stat. }565.024 (2010).

32. See Nemeth, Criminal, supra note 2, at 135-144; Dana K. Cole, Expanding Felony-Murder in Ohio: Felony-Murder or Murder-Felony? 63 Ohio St. L.J. 15 (2002); Rudolph J. Gerber, The Felony Murder Rule: Conundrum Without Principle, 31 Ariz. St. L.J. 763 (1999); Guyora Binder, The Model Penal Code Revisited: Felony Murder and Mens Rea Default Rules: A Study in Statutory Interpretation, 4 Buff. Crim. L.R. 399 (2000).

33. Dix & Sharlot, supra note 6, at 470.

34. See Nemeth, Criminal, supra note 2, at 137.

35. James J. Tomkovicz, The Endurance of the Felony-Murder Rule: A Study of the Forces that Shape Our Criminal Law, 51 Wash. & Lee L. Rev. 1429 (1994).

36. Model Penal Code }211.1 (1962).

37. See Nemeth, Criminal, supra note 2, at 185.

38. Model Penal Code }211.2 (1962).

39. 18 Pa. Cons. Stat. }302 (2010).

40. See 18 Pa. Cons. Stat. }}2705-2710 (2010).

41. Guy et al., supra note 5, at 187.

294 PRIVATE SECURITY AND THE LAW

Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:20:29.

C op

yr ig

ht ©

2 01

1. E

ls ev

ie r S

ci en

ce &

T ec

hn ol

og y.

A ll

rig ht

s re

se rv

ed .

42. Model Penal Code }212.1 (1962).

43. See State v. Williams, 526 P.2d 1244 (Ariz. 1 974); People v. Caudillo, 580 P. 2d 274 (Cal. 1978); see also Richard Sanders, “Double Offense” Problems in Kidnapping and False Imprisonment Cases, Fla. B.J., Dec. 2003, at 10.

44. Model Penal Code }212.3 (1962).

45. Kelley V. Rea, The Legal Risks of Conducting a Security-Initiated Investigation, 28 Sec. 23 (1991); see also Richard A. Bales & Jeffrey A.McCormick,Workplace Investigations in Ohio, 30 Cap. U. L. Rev. 29 (2002).

46. Robert L. Rabin, Pain and Suffering and Beyond: Some Thoughts on Recovery for Intangible Loss, 55 DePaul L. Rev. 359 (2006).

47. Brenda V. Smith, Checklist Of State Criminal Laws Prohibiting The Sexual Abuse Of Persons In Custody Of Law Enforcement, Lock-Up And Jail Authorities (2008) available at http://www.wcl .american.edu/nic/legal_responses_to_prison_rape/lock-up_fifty_state_checklist.pdf?rd¼1.

48. John Ashby, Employment References: Should Employers Have An Affirmative Duty To Report Employee Misconduct To Inquiring Prospective Employers? 46 Ariz. L. Rev. 117 (2004); Mark Minuti, Employer Liability Under The Doctrine Of Negligent Hiring: Suggested Methods For Avoiding The Hiring Of Dangerous Employees, 13 Del. J. Corp. L. 501 (1988); Henley v. Prince George’s County, 479 A.2d 1375, 1381 (Md. App. 1984), aff ’d in part and rev’d in part, 503 A.2d 1333 (Md. 1986).

49. See Nemeth, Criminal, supra note 2, at 205; Henry L. Chambers, Jr., (Un)Welcome Conduct and the Sexually Hostile Environment, 53 Ala. L. Rev. 733 (2002); NiloofarNejat-Bina, Employers as Vigilant Chaperones Armed with Dating Waivers: The Intersection of Unwelcomeness and Employer Liability in Hostile Work Environment Sexual Harassment Law, 20 Berkeley J. Emp. & Lab. L. 325 (1999).

50. Model Penal Code }213.1 (1962).

51. See Charles P. Nemeth, Judicial Doubt or Distrust: Court Ordered Psychiatric Examination of Rape Victims, 12 Hum. Rights 1 (1984); David P. Bryden, Forum on the Law of Rape: Redefining Rape, 3 Buff. Crim. L.R. 317 (2000).

52. 18 Pa. Cons. Stat. }3126 (2010).

53. Id. at }3127.

54. Kurt A. Decker, A Manager’s Guide to Employee Privacy (1989).

55. 33 Am. Jur. Trials, 286-289.

56. See William C. Cunningham & Todd H. Taylor, The Hallcrest Report, Private Security and Private Police in America (1985).

57. See Nemeth, Criminal, supra note 2, at 310.

58. Robert A. Neale, Arson: The Overlooked Threat to Homeland Security, Emergency Management Online Issue, Sept. 7, 2010, at http://www.emergencymgmt.com/safety/Arson-Homeland-Security.html.

59. Model Penal Code }220.1 (1962).

60. Id. at }220.1 (1962); see Nemeth, Criminal, supra note 2, at 315-319.

61. See Dix & Sharlot, supra note 6, at }410.

62. See 18 Pa. Cons. Stat. }}3301-3307 (2010).

63. Charles P. Nemeth, Private Security and the Investigative Process 263-264 (3rd ed. 2010).

64. Clark & Marshall, supra note 1.

65. Id. at 984.

66. Id. at 986-987.

67. See Nemeth, Criminal, supra note 2, at 298-302.

68. See N.Y. Criminal Law }}140 (McKinney 1980); Nemeth, Criminal, supra note 2, at 302.

Chapter 6 • Collection, Preservation, and Interpretation of Evidence 295

Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:20:29.

C op

yr ig

ht ©

2 01

1. E

ls ev

ie r S

ci en

ce &

T ec

hn ol

og y.

A ll

rig ht

s re

se rv

ed .

69. Nemeth, Private Security, supra note 63, at 245.

70. See Albert Coates, Criminal Intent in Burglary, 2 N.C. L. Rev. 110 (1924); see also Champlin v. State, 267 N.W.2d 295 (Wis. 1978); State v. Ortiz, 584 P.2d 1306 (N.M. 1978).

71. Clark & Marshall, supra note 1, at 1007.

72. See Nemeth, Criminal, supra note 2, at 307-310.

73. Model Penal Code }221.2 (1) (1962).

74. John Francis, Security Officer Manual (1992).

75. See Nemeth, Criminal, supra note 2, at 168-172.

76. Model Penal Code }222.1 (1) (1962).

77. Wayne R. Lafave & Austin W. Scott, Sr., Criminal Law 698-699 (1972); see also People v. Woods, 360 N.E.2d 1082 (N.Y. 1977); Commonwealth v. Mays, 375 A.2d 116 (Pa. Super. 1977).

78. Lafave & Scott, supra note 77, at 200.

79. See People v. Beebe, 245 N.W.2d 547 (Mich. App. 1976).

80. See Nemeth, Criminal, supra note 2, at 253.

81. James Cleary, Prosecuting the Shoplifter, A Loss Prevention Strategy (1986); Anne-Marie G. Harris, Shopping While Black: Applying 42 U.S.C. }1981 To Cases of Consumer Racial Profiling, 23 B.C. Third World L.J. 1 (2003); see also Center for Retail Research, The Global Retail Theft Barometer (10th ed. 2010) available at http://www.globalretailtheftbarometer.com/pdf/grtb-2010-summary.pdf

82. Clark & Marshall, supra note 1, at 802.

83. Id. at 804-807.

84. Md. Code Ann. Criminal Law }3-401 (West 2010).

85. Model Penal Code }223.2 (Proposed Official Draft 1962).

86. Guy et al., supra note 5, at 152.

87. Model Penal Code 56 (Tentative Draft 1953).

88. Model Penal Code }223.3 (1962).

89. See Nemeth, Criminal, supra note 2, at 275.

90. R.I. Gen. Laws }11-41-4 (2009).

91. Model Penal Code }223.4 (1962).

92. See Nemeth, Criminal, supra note 2, at 270-274.

93. Model Penal Code }223.5 (1962).

94. Id. at }223.6; see Nemeth, Criminal, supra note 2, at 269-270.

95. Id. at }223.7; see Nemeth, Criminal, supra note 2, at 264-265.

96. See Nemeth, Criminal, supra note 2, at 265-267.

97. 18 Pa. Cons. Stat. }3929 (2010).

98. For a thorough analysis of retail theft and its legal and commercial applications, review James Cleary, Prosecuting the Shoplifter, A Loss Prevention Strategy (1986).

99. Id. at 19.

100. Nemeth, Private Security, supra note 63, at 234-238 (2010).

101. Bill Zalud, Retail’s 7 Greatest Security Hits! 28 Sec. 34, 35 (1991).

102. See Nemeth, Criminal, supra note 2, at 275-277.

296 PRIVATE SECURITY AND THE LAW

Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:20:29.

C op

yr ig

ht ©

2 01

1. E

ls ev

ie r S

ci en

ce &

T ec

hn ol

og y.

A ll

rig ht

s re

se rv

ed .

103. Note, Insurance Firms Toughen Fraud Fight, 29 Sec. 65 (1992).

104. See Nemeth, Criminal, supra note 2, at 277-283.

105. Clark & Marshall, supra note 1, at 954; see Me. Rev. Stat. Ann. tit. 17-A }702 (2009); Or. Rev. Stat. }165.013 (2009); State v. Tarrence, 985 P.2d 225 (Ore. App. 1999); U.S. v. Sherman, 52 M.J. 856 (U.S. Army Ct. Crim. App. 2000).

106. Iowa Code }715A.2 (2008).

107. 18 Pa. Cons. Stat. }4102 (2010).

108. Id. at }}4103-4104.

109. Id. at }}4105-4106; see also Md. Code. Ann. Criminal Law }}8-103, 8-214 (West 2010).

110. See Cunningham & Taylor, supra note 56.

111. 18 Pa. Cons. Stat. }5501 (2010).

112. Id. at }5104.

113. Id. at }5507.

114. Id. at }7506.

115. Id. at }5502.

116. Id. at }5503; see Nemeth, Criminal, supra note 2, at 56, 102.

117. 35 PA. CONS. STAT. }780-102; 18 Pa. Cons. Stat. }5505 (2010).

118. Ohio Rev. Code Ann. }2917.11(B)(1) (West 2010).

119. 18 Pa. Cons. Stat. }5506 (2010).

120. Id. at }5507.

121. Id. at }5508; Ohio Rev. Code Ann. }2917.12(7) (West 2010).

122. Id. at }5509.

123. Miss. Code Ann. }97-35-37 (2010).

124. Wis. Stat. }947.02 (2010).

125. See Charles P. Nemeth, Law and Evidence 68-74 (2011).

126. See Arnold Markle, Criminal Investigation and the Preservation of Evidence (1977); Jill Witkowski, Can Juries Really Believe What They See? New Foundational Requirements for the Authentication of Digital Images, 10 Wash. U. J.L. & Pol’y 267 (2002).

127. John R. Waltz, Criminal Evidence 389-390 (1975); see also Ignacio v. Territory of Guam, 413 F.2d 513 (9th Cir. 1969), cert. denied, 397 U.S. 943 (1970).

128. See Nemeth, Evidence, supra note 125, at 66.

129. Charles P. Nemeth, Evidence Handbook for Paralegals 41 (1993).

130. See Robert Aronson & Jacqueline McMurtrie, Symposium: Ethics and Evidence: III. The Ethical Lim- itations on Prosecutors When Preparing and Presenting Evidence: The Use and Misuse of High-Tech Evidence by Prosecutors: Ethical and Evidentiary Issues, 76 Fordham L. Rev. 1453 (2007); James W. McElhaney, Proving Your Evidence Is Genuine, A.B.A. J., May 1993, at 96; Joshua A. Perper et al., Suggested Guidelines for the Management of High-Profile Fatality Cases, 132 Archives Pathology & Laboratory Med. 1630 (2008).

131. Model Rules of Prof’l Conduct R. 3.4 cmt. (1989).

132. Jamie S. Gorelick, Stephen Marzen, and Lawrence Solum, Destruction of Evidence 200-202 (1989).

133. Fed. R. Evid. }803 (6).

134. Nemeth, Evidence, supra note 125, at 150-151.

Chapter 6 • Collection, Preservation, and Interpretation of Evidence 297

Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:20:29.

C op

yr ig

ht ©

2 01

1. E

ls ev

ie r S

ci en

ce &

T ec

hn ol

og y.

A ll

rig ht

s re

se rv

ed .

135. See U.S. v. Reese, 568 F.2d 1246 (6th Cir. 1977).

136. John A. Tarantino, Trial Evidence Foundations 6-24 (1986); see also Cascade Lumber v. Cvitanovich, 332 P.2d 1061 (Ore. 1958); contra Liner v. J.B. Tully and Co., 617 F.2d 327 (5th Cir. 1980); Jill Wit- kowski, Can Juries Really Believe What They See? New Foundational Requirements for the Authenti- cation of Digital Images, 10 Wash. U. J.L. & Pol’y 267 (2002); Heather M. Bell, The Year In Review 2001: Cases from Alaska Supreme Court, Alaska Court of Appeals, U.S. Court of Appeals for the Ninth Circuit, and U.S. District Court for the District of Alaska, 19 Alaska L. Rev. 201(2002); Lance Cole, The Fifth Amendment and Compelled Production of Personal Documents after United States v. Hubbell—New Protection for Private Papers? 29 Am. J. Crim. L. 123 (2002).

137. Nemeth, Evidence, supra note 125, at 49-79; see also Nicole J. De Sario, Merging Technology with Justice: How Electronic Courtrooms Shape Evidentiary Concerns, 50 Clev. St. L. Rev. 57 (2002- 2003); Richard Mahoney, Evidence, 2003 N.Z. L. Rev. 141 (2003).

138. Nemeth, Paralegals, supra note 129, at 32.

139. Nemeth, Evidence, supra note 125, at 83-129; see also Katherine A. Godden, Cartoon Criminals: The Unclear Future of Computer Animation in the Minnesota Criminal Courtroom—State v. Stewart, 30 Wm. Mitchell L. Rev. 355 (2003); De Sario, supra note 137; Mahoney, supra note 137.

140. Nemeth, Paralegals, supra note 129, at 55.

141. See Moore v. Illinois, 408 U.S. 786 (1972); State v. Kazold, 521 P.2d 990 (Ariz.1974); In Re Air Crash Disaster, 635 F.2d 67 (2d Cir. 1980); McCormick v. Smith, 98 S.E.2d 448 (N.C. 1957); U.S. v. Addeson, 498 F.2d 741 (D.C. Cir. 1974); State v. Mills, 328 A.2d 410 (Vt. 1974); Prouda v. McLaughlin, 479 A.2d 447 (N.J. Super. Ct. Law Div. 1984).

142. See Stewart M. Casper, Looking Fraudulent Surveillance in the Eye: How to Refute Distorted Evi- dence, Trial, Jan. 1993, at 137; Greg Joseph, Demonstrative Videotape Evidence, Trial, June 1986, at 60, 63; Robert D. Peltz, Admissibility of “Day in the Life” Films, Fla. Bar J., Jan. 1989, at 55; Martha A. Churchill, Day in the Life Films Subject to Court Challenge, For Def., Dec. 1990, at 24; Grimes v. Employer Mutual Liability Insurance Co., 73 F.R.D. 607 (D. Ala. 1977); Bolstridge v. Central Maine Power Co., 621 F. Supp. 1202 (D. Me. 1985); Joyce Lynee Maderia, Lashing Reason to the Mast: Understanding Judicial Constraints on Emotion in Personal Injury, 40 U.C. Davis L. Rev. 137 (2006); Philip K. Anthony & Donald E. Vinson, Demonstrative Exhibits; A Key to Effective Jury Pre- sentation, For Def., Nov. 1986, at 13; David Tait, Rethinking the Role of the Image in Justice: Visual Evidence and Science in the Trial Process, 6 Law, Probability & Risk 311 (2007).

143. Nemeth, Evidence, supra note 125, at 172-182; see also Jerome A. Hoffman, Special Section on Alabama Law: The Alabama Rules of Evidence: Their First Half-Dozen Years, 54 Ala. L. Rev. 241 (2002); Ida-Gaye Warburton, The Commandeering of Free Will: Brainwashing as a Legitimate Defense, 16 Cap. Def. J. 73 (2003); Lawrence M. Solan & Peter M. Tiersma, Hearing Voices: Speaker Identification in Court, 54 Hastings L.J. 373 (2003).

144. See Fed. R. Evid. }602; see also Michael Graham, Handbook of Federal Evidence (1981); Comment, Witness under Article VI of the Proposed Federal Rules of Evidence, 15 Way. L. Rev. 1236 (1969); C. R. Kingston, Law of Probabilities and the Credibility of Witnesses and Evidence, 15 J. For. Sci. 18 (1970).

145. Frederick Overby, Preparing Lay Witnesses, Trial, Apr. 1990, at 88, 91; Judy Clarke, Trial Preparation: The Trial Notebook, Champion, June 1995, at 4; Sandra Guerra Thompson, Beyond a Reasonable Doubt? Reconsidering Uncorroborated Eyewitness Identification Testimony, 41 U.C. Davis L. Rev. 1487 (2008).

146. See U.S. v. Lyon, 567 F.2d 777 (8th Cir. 1977) cert. denied, 435 U.S. 918; U.S. v. Mandel, 591 F. 2d 1347 (4th Cir. 1979).

147. Tarantino, supra note 136, at 3-11–3-22.

148. Marcus T. Boccaccini & Stanley L. Brodsky, Believability of Expert and Lay Witnesses: Implications for Trial Consultation, 33 Prof. Psychol. Res. & Prac. 384-388 (2002).

298 PRIVATE SECURITY AND THE LAW

Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:20:29.

C op

yr ig

ht ©

2 01

1. E

ls ev

ie r S

ci en

ce &

T ec

hn ol

og y.

A ll

rig ht

s re

se rv

ed .

149. Nancy Schleifer, Litigation Forms and Checklists 13-25 (1991).

150. McCormick on Evidence }}43-108 (1972); Alan W. Mewitt, Psychiatric Testimony as to Credibility in Criminal Cases, 13 Crim. L.Q. 79 (1970).

151. William Pipkin, Expert Opinion Testimony: Experts, Where Did They Come from and Why are They Here?, 13 Law & Psychol. Rev. 103 (1989); Anne Bowen Poulin, Credibility: A Fair Subject for Expert Testimony?, 59 Fla. L. Rev. 991 (2007); Jennifer L. Mnookin, Idealizing Science and Demonizing Experts: An Intellectual History of Expert Evidence, 52 Vill. L. Rev. 763 (2007); James S. Schutz, The Expert Witness and Jury Comprehension: An Expert’s Perspective, 7 Cornell J.L. & Pub. Pol’y 107 (1997); Ric Simmons, Conquering the Province of the Jury: Expert Testimony and the Profession- alization of Fact-Finding, 74 U. Cin. L. Rev. 1013 (2006); Harold A. Feder, The Care and Feeding of Experts, Trial, June 1985, at 49; Stephen D. Easton, “Red Rover, Red Rover, Send that Expert Right Over”: Clearing the Way for Parties to Introduce the Testimony of Their Opponents’ Expert Witnesses, 55 SMU L. Rev. 1427 (2002).

152. Nemeth, Evidence, supra note 125, at 202.

153. See Fed. R. Evid. }701; see also U.S. v. Burnette, 698 F.2d 1038 (9th Cir 1983), cert. denied, 103 S. Ct. 2106 (1983); U.S. v. Jackson, 569 F.2d 1003 (7th Cir. 1978), cert. denied, 437 U.S. 907.

154. Fed. R. Evid. }703.

155. Id. at }704.

156. Nemeth, Evidence, supra note 125, at 195-228.

157. Tarantino, supra note 136, at 4-5.

158. Nemeth, Evidence, supra note 125, at 186-189, 221-228; see also Fred Ferguson, Advocacy in the New Millennium, 41 Alberta L. Rev. 527 (2003); Sanja Kutnjak Ivkovic et al., Jurors’ Evaluations of Expert Testimony: Judging the Messenger and the Message, 28 Law & Soc. Inquiry 441 (2003).

159. Pinkerton’s Inc., Investigations Department Training Manual (1990).

160. Note, Expert Witness: Corrupt or Inept?, 30 Sec. 98 (1993).

161. 575 Market St. Suite 2125 San Francisco, CA 94105; Phone: (1) 415-536-0288; Fax: (1) 415-764-4915.

162. Nemeth, Paralegals, supra note 129, at 167-168.

163. Nemeth, Evidence, supra note 125, at 34-39; see also Kevin M. Clermont & Emily Sherwin, A Com- parative View of Standards of Proof, 50 Am. J. Comp. L. 243 (2002); Michele Taruffo, Rethinking the Standards of Proof, 51 Am. J. Comp. L. 659 (2003).

164. Waltz, supra note 127, at 11; See Nemeth, Evidence, supra note 125, at 16; Major Charles H. Rose III, New Developments: Crop Circles in the Field of Evidence, Army L., April/May 2003, at 43.

165. Waltz, supra note 127, at 13; Nemeth, Evidence, supra note 125, at 16-17.

166. Nemeth, Evidence, supra note 125, at 18.

167. Waltz, supra note 127, at 13.

168. Id.; see Nemeth, Evidence, supra note 125, at 11-15; see also Scott Brewer, Scientific Expert Testi- mony and Intellectual Due Process, 107 Yale L.J. 1535 (1998).

Chapter 6 • Collection, Preservation, and Interpretation of Evidence 299

Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:20:29.

C op

yr ig

ht ©

2 01

1. E

ls ev

ie r S

ci en

ce &

T ec

hn ol

og y.

A ll

rig ht

s re

se rv

ed .

Intentionally left as blank

Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:20:29.

C op

yr ig

ht ©

2 01

1. E

ls ev

ie r S

ci en

ce &

T ec

hn ol

og y.

A ll

rig ht

s re

se rv

ed .

7 Public and Private Law Enforcement

A Blueprint for Cooperation

CHAPTER OUTLINE

Introduction: The Relationship between the Public and Private Sectors ................................. 301

Public Interest versus Private Concerns....................................................................................306

Moral or Egalitarian Purpose ...................................................................................................307

A Caste System of Professionalism...........................................................................................308

A Failure to Communicate and Cooperate..............................................................................310

Positive Programs on Interaction and Cooperation ................................................................... 314

College and Municipal Police Forces........................................................................................316

Transit and Municipal Police Forces.........................................................................................319

Private Security Industry and Law Enforcement Agencies .....................................................321

Recommendations......................................................................................................................... 324

National Advisory Committee on Criminal Justice..................................................................324

The Hallcrest Report..................................................................................................................326

The Private Sector Office of the Department of Homeland Security ....................................327

Summary........................................................................................................................................ 328

Discussion Questions.................................................................................................................... 329

Notes.............................................................................................................................................. 329

Introduction: The Relationship between the Public and Private Sectors The interplay between public and private law enforcement and the modern delivery of

public safety from privatized interest continue unabated. Everywhere across this rich

country, public police entities engage the private sector, governments employ private

sector companies for security of facilities and asset protection, communities turn to

both arms of the justice model, and the military industrial complex appreciates the

value of private sector involvement in military operations. It is the commonality of inter-

ests that spurs on this unbridled growth in cooperation. Despite the differences in legal

powers, employers, and mission, private security officers and public police have many

similarities.1

The historical legacy that characterizes the relationship between the public and private

justice systems is less than positive though continuously improving. In 1976, the Private

Security Advisory Council, through the U.S. Department of Justice, delivered an insightful

Private Security and the Law

Copyright © 2012 by Elsevier Inc. All rights of reproduction in any form reserved. 301

Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:21:28.

C op

yr ig

ht ©

2 01

1. E

ls ev

ie r

S ci

en ce

& T

ec hn

ol og

y. A

ll rig

ht s

re se

rv ed

.

critique on the barriers to full and unbridled cooperation between the public and private

law enforcement systems. Struggling with role definition and resource deployment, the

relationship has been an uneasy but steady one. The council stressed the need to clarify

role definitions and end the absurd and oft-practiced negative stereotyping.2 The council

cited various areas of conflict and ranked them in order of importance:

1. Lack of mutual respect

2. Lack of communication

3. Lack of cooperation

4. Lack of security enforcement knowledge of private security

5. Perceived competition

6. Lack of standards

7. Perceived corruption3

Put another way, each side operates from a series of perceptions, some accurate, others

not. For the most part, the caricatures inhibit full cooperation. The Hallcrest Report I4

decisively addressed this issue. In characterizing the police role as inclined toward crime

detection, prevention, and control, security will always be to some extent the public

police’s antagonist. Private police give less attention to apprehension, crime detection,

prevention, and technology than do their public counterparts. Comparatively, private

security addresses similar subject matter but still dwells intently on the protection of

assets, immediate deterrence, and commercial enforcement. Figure 7.1 note 5 provides

a graphic illustration of the major distinctions between these two entities. Tables 7.1

note 6 and 7.2 note 7 further edify these occupational distinctions.

n n n

Learn about Hallcrest Systems, the consulting firm that produces outlook reports on the

private sector at http://www.hallcrestsystems.com.

n n n

A cursory assessment of these figures shows fundamental agreement on the protec-

tion of lives and property. Departure occurs in the upper classifications of law enforce-

ment since the thrust of any public police department must be for the eventual arrest

and prosecution of suspects. In contrast, the private justice function is still concerned

Input Role/Function Targets Delivery System Output

Citizen Crime Prevention General Government Enforcement & Apprehension

Client Crime Prevention Specific Profit-Oriented Enterprise Loss Reduction/Assets Protection

Private PublicSecurity Services

FIGURE 7.1 Comparison between

public and private police functions.

302 PRIVATE SECURITY AND THE LAW

Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:21:28.

C op

yr ig

ht ©

2 01

1. E

ls ev

ie r

S ci

en ce

& T

ec hn

ol og

y. A

ll rig

ht s

re se

rv ed

.

with preventive activities in the area of crime loss, fire prevention, and other order-

maintenance functions. In the security manager rankings, criminal investigation and

arrest and prosecution show up in the lower rankings. This prioritization, in and of itself,

is a telling distinction, though it should not be viewed as justification for a sharp divi-

sion. If anything, both public and private law enforcement share a generic goal—namely,

the general enforcement of laws. As Bill Strudal points out in his article, “Giving the

Police a Sense of Security”:

Our goal, usually not shared by police and security is law enforcement . . . if we accept

the premise that police and security have the same goals, then why don’t we work

together on a regular basis? There are differences; nobody can deny that . . . there

are many other gaps between the two forces, but none is insurmountable with good

training and dialogue.8

Table 7.1 Security Manager Rankings of Private Security Functions (Rank Ordered)

Proprietary Managers Contractual Managers

1. Protection of lives and property 1. Protection of lives and property

2. Crime prevention 2. Crime prevention

3. Loss prevention 3. Loss prevention

4. Fire prevention 4. Fire prevention

5. Access control 5. Access control

6. Crime investigation 6. Order maintenance

7. Employee identification 7. Employee identification

8. Order maintenance 8. Crime reporting

9. Arrest/prosecution 9. Arrest/prosecution

10. Accident prevention 10. Information security

11. Crime reporting 11. Crime investigation

12. Information security 12. Accident prevention

13. Traffic control 13. Traffic control

N ¼ 676 N ¼ 545

Table 7.2 Law Enforcement Executive Ratings of Law Enforcement Function (Rank Ordered)

1. Protection of lives and property

2. Arrest and prosecution of criminals

3. Investigation of criminal incidents

4. Maintaining public order

5. Crime prevention

6. Community relations

7. General assistance to the public

8. Traffic enforcement

9. Traffic control

N ¼ 384

Chapter 7 • Public and Private Law Enforcement 303

Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:21:28.

C op

yr ig

ht ©

2 01

1. E

ls ev

ie r

S ci

en ce

& T

ec hn

ol og

y. A

ll rig

ht s

re se

rv ed

.

The similarities between function, duty, and obligation are very apparent when the tasks

of investigation are considered. The skills of the private sector are essentially identical to

those of the public sector. Review Figure 7.2 to see the diverse opportunities shared and

borne by both the private and public sectors.

Given the equal occupational capacity of both the private and public sectors to

engage in these many activities, cooperation rather than division appears a wiser tactic.

Surely, the concerns of private sector justice increasingly mirror that of the public

model. Security’s threats and concerns are charted at Table 7.3.9

Employee theft, property crime, and access controls are the top concerns of security

professionals. Computer and information security concerns continue to increase as the

most important security-related concerns.

Another recurring stumbling block, at least perceptually, is public law enforcement’s

attitude of superiority. Table 7.410 indicates that traditional law enforcement takes a dim

view of the contribution of proprietary and contractual security when compared to its

own role, though the merger of functions and roles will likely shrink this chasm in the

near future. But there is a road to travel.11

FIGURE 7.2 Common tasks of private and public officers.

Table 7.3 Security 2001 Profile: Security Threats, Concerns

2001 1999 1998 1997

1. Property crime 1. Employee theft 1. Employee theft 1. Employee theft

2. Employee theft 2. Property crime 2. Property crime 2. Property crime

3. Violent crime 3. Access/egress 3. Access/egress 3. Fire/safety*

4. Computer sec 4. Computer sec 4. Violence** 4. Access/egress

5. Access/egress 5. Parking sec 5. Computer sec 5. Computer sec

6. Parking sec 6. Violent crime 6. Parking sec 6. Work violence

7. White collar 7. Burglary 7. Burglary 7. Violent crime

*Fire and life safety concerns broken out as a separate question since 1998.

**Workplace violence broken out as a category under life safety concerns since 1998. On the security side, workplace violence and

violent crime combine together this year into one category called violent crime.

304 PRIVATE SECURITY AND THE LAW

Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:21:28.

C op

yr ig

ht ©

2 01

1. E

ls ev

ie r

S ci

en ce

& T

ec hn

ol og

y. A

ll rig

ht s

re se

rv ed

.

In appraising the findings of this perceptual study, the Hallcrest II authors suggest:

Here again, law enforcement executives gave markedly lower ratings than did the

private security managers. They agreed, however, on the areas that deserved the

highest and lowest ratings. Thus, both the law enforcement executives and the secu-

rity managers felt that private security was relatively effective in reducing the dollar

loss of crime, and relatively ineffective in apprehending larger numbers of crim-

inals. This ranking is consistent with the preventive orientation of private security,

which is more concerned with loss control than with arrest and prosecution for

crimes. Consistent, too, is the finding that proprietary security managers gave

themselves highest marks for maintaining order.12

Unfortunately, slight differences in approach and methodology have increased the divide

between these camps. And with these attitudes in place, it becomes a much more difficult

task to partner and cooperate. A 2004 Policy Summit co-sponsored by public and private

law enforcement associations lists the main reasons why these alliances falter:

• Egos and turf battles

• Lack of resources (funds, staff)

• Lack of a product

• Overemphasis on structure or resource needs

• Insufficient commitment and support from higher levels of participating

organizations

• Overemphasis on the social aspect and underemphasis on business

• Unwillingness of partners to share information, especially information that would

reflect poorly on the sharer

• Insufficient alignment of interests 13

To the detriment of all, these petty differences continue to the present.14 John

Driscoll, in his article “Public and Private Security Forces Unite in Dallas,” asserts “this

negative approach prevents the two similar entities from realizing their commonalities

Table 7.4 Private Security Contributions to Crime Prevention and Control: Ratings by Law Enforcement and Private Security Managers

Law Enforcement Proprietary Security Contractual Security

Overall contribution 2.2 1.5 1.2

Reduction in volume of crime 2.4 1.7 1.5

Reduction in direct dollar crime loss 2.2 1.6 1.5

Number of criminal suspects apprehended 2.6 1.9 2.0

Order maintenance 2.4 1.4 1.7

N ¼ 384 N ¼ 676 N ¼ 545 SCALE: 1 ¼ very effective, 2 ¼ somewhat effective, 3 ¼ not effective.

Chapter 7 • Public and Private Law Enforcement 305

Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:21:28.

C op

yr ig

ht ©

2 01

1. E

ls ev

ie r

S ci

en ce

& T

ec hn

ol og

y. A

ll rig

ht s

re se

rv ed

.

and capitalizing upon mutual cooperation.”15 Driscoll recounts the “Dallas experiment”

that stresses interaction between the parties in sharing “criminal information bulletins,

recruit[ing] class training blocks, field training officer and security officer meetings, and

additional joint information seminars.”16 The elitist attitude taken by public law

enforcement fosters a polarization between the public and private sectors. Though role

conflicts and perceptual views of the public and private sectors are compelling argu-

ments, there are other forceful explanations for the natural tension between these com-

peting interests. What is undeniable is the march forward into the public realm, with

examples so numerous it is now difficult to catalog. Private sector operatives now watch

over airports and parks, act as first responders and protectors of federal and state instal-

lations, deliver safety and security to the Olympics and sporting events, conduct surveil-

lance, and assess critical infrastructure. In the final analysis, the playing field will be

leveled a little more each day by the ever-growing numbers of private security forces.17

Public Interest versus Private Concerns

Public law enforcement is and has always been tasked with the needs of the public good.

Few private security companies have to be concerned with domestic disputes, the trans-

portation of the deceased, stray animals, or protection of the homeless and other down-

trodden individuals.18 The Private Security Advisory Council characterized police work

as a public interest function. Public police have “a wide range of responsibilities to pro-

tect essentially public concerns and their efforts are closely tied to statutorily mandated

duties and the criminal justice system.”19 The advisory council further relates that the

police are burdened with constitutional limitations and must interpret and implement

certain guidelines in the performance of their law enforcement duties. Additionally,

public policing is further restrained by public budgeting and financing processes. Police

management policies and an administrative hierarchy within most major police depart-

ments must evaluate and allocate resources according to the needs and demands

presently operating within this community structure.20

Norman Spain and Gary Elkin, in their article, “Private Security versus Law Enforce-

ment,” relate with precision:

One of the traditional functions of the public police is to deter crime. In reality, their

ability to do this is drastically limited. The primary reasons are that the police have

little authority to change the conditions that foster crime and they have no author-

ity to decide who will reside in their jurisdiction, whom they will police. Private

security forces, on the other hand, may alter—at times drastically—the environ-

ment in which they operate. They can have walls and fences erected, doors sealed,

windows screened, lights put up, and intrusion detectors installed. They can often

play a decisive role in determining whom they have to monitor—who is to be an

employee of the company—by conducting background investigations of potential

employees.21

306 PRIVATE SECURITY AND THE LAW

Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:21:28.

C op

yr ig

ht ©

2 01

1. E

ls ev

ie r

S ci

en ce

& T

ec hn

ol og

y. A

ll rig

ht s

re se

rv ed

.

Such a supposition is difficult to dispute, since private security is primarily concerned

with the private concerns of private property assets and particular individuals. “Indivi-

duals and privately funded organizations and businesses undertake measures to provide

protection for the perceived security needs that involve their private interests, not in the

public domain. Private security is an option exercised to provide an additional or

increased level of protection than that afforded by public law enforcement, which must

respond to the larger concerns of the public.”22

Moral or Egalitarian Purpose

Entrance into the vocation of public law enforcement is considered by most a moral

and social commitment—a vocation rather than a mere job. This career distinction is

generally not applied to individuals who commit their lives to the service of private

security. But is such a viewpoint fair and rational? Is not the protection of assets, gov-

ernmental facilities, communities, business interests, private proprietary holdings, or

contributions in military and security initiatives a noble endeavor? If private security

were not involved, what would be the state of American industry and its physical

plants, the security of courthouses and judicial centers, transportation facilities, and

neighborhood associations? How would the dynamic of the battlefield change in for-

eign wars? How would the allocation of military personnel be impacted? For that mat-

ter, how many more employees would the public sector have to hire, on the backs of

already beleaguered taxpayers, to cover the diverse functions of private sector justice?

By what standards are these judgments of moral superiority or social importance

designed? Critics and theoreticians who scathingly condemn the nature of private jus-

tice often forget the historical contribution private security has provided. Long before

the establishment of a formal, publicly funded police department in pre- and postco-

lonial America, private security interests were the only entities providing protection

for individual persons, assets, and business interests. Remember that the nature of a

system of town watches, the “hue and cry,” calling for posse formation and community

cooperation, constables, and part-time sheriffs could hardly be characterized as public

in design.23

Judgments about private sector justice cannot be made in a vacuum but must be

evaluated in light of the range of services the industry provides a troubled world. To

be more particular, who would protect the majority of federal installations? Who would

protect the majority of American museums? What force or body would ensure safety and

protection in the college and university environment? What other bodies would provide

adequate crowd control at entertainment events? What cost would society incur to

ensure a public police officer in each bank? Should taxpayers’ money be spent in

the transportation of money and other negotiable instruments? What police depart-

ment would provide adequate security for American corporations? How far could city

budgets be stretched to provide a secured environment for its multiple retail establish-

ments if security services were absent? When these queries are explored, public law

Chapter 7 • Public and Private Law Enforcement 307

Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:21:28.

C op

yr ig

ht ©

2 01

1. E

ls ev

ie r

S ci

en ce

& T

ec hn

ol og

y. A

ll rig

ht s

re se

rv ed

.

enforcement’s tendency to preach from a high moral pedestal is not as convincing.

Richard Kobetz and H. H. Antony Cooper, in their article “Two Armies: One Flag,”

cogently state:

It is no exaggeration to aver that without the aid of those presently engaged in the

various tasks of private security, the resources of public law enforcement would

have to be expanded far beyond the limits that the taxpayer could afford and would

pay. Even those who do not contribute directly to the cost of providing private secu-

rity services benefit to some notable extent from their existence. Private security is

not a public luxury. It represents a substantial contribution to the general security

of the community. In their impact on the community public and private law

enforcement are one and indivisible.24

A Caste System of Professionalism

Private security has long been an underclass when compared to public law enforcement.

Differences in orientation, training, requirements, and social status accorded these posi-

tions have a great deal to do with the class or status differentiation. While much time

and energy has been expended in the professionalization of public law enforcement,25

negative stereotypes, justified or not, still exist concerning private security personnel.

The most powerful trend is the continued growth of the private security industry, both

in real terms and relative to law enforcement. In 1987, the director of the U.S. Justice

Department’s National Institute of Justice (NIJ) wrote that

cooperation becomes increasingly essential with the growth of the private security

industry. [In policing,] resources to meet the increasing demand have dwindled.

In most major cities, police personnel have declined, and the number of police

employees per 1,000 population dropped 10 percent between 1975 and 1985.

Shrinking tax revenues throughout the country and outright taxpayer revolts . . .

have curtailed growth in government. Police, like other public administrators, have

become familiar with cutback management.26

The Private Advisory Council expounds that these attitudes

are based on incorrect assumptions that private security personnel perform the

same job duties as patrol officers and investigators in law enforcement, and that

a broad generalization can be made about the nature and personnel of all compo-

nents of proprietary and contractual security—guards, private patrol services, pri-

vate investigators, armored car guards and armed couriers, and alarm response

runners and installers. Certainly, the security industry and private justice practi-

tioners must concede there is a distinction between the level of training and

308 PRIVATE SECURITY AND THE LAW

Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:21:28.

C op

yr ig

ht ©

2 01

1. E

ls ev

ie r

S ci

en ce

& T

ec hn

ol og

y. A

ll rig

ht s

re se

rv ed

.

qualifications for certification. The security industry has been its own worst enemy

in this area by failing to promote high level, sophisticated standards of educational

requirements.27

In response to the call for increased state and local regulation of the private security

force, Richard Lukins, in his article “Security Training for the Guard Force,” castigates

the industry for its lack of action:

This trend has not caught the affected components of the private security industry—

the guard services and proprietary security managers—completely by surprise but it

does not appear that they were totally prepared either. And certainly no one can say

that our industry has established an imposing record of self-regulation.28

Lukins further relates that the present impression of a security guard as not more

than “half a cop” will be deleterious to future professionalism in the security industry. 29

The quest for professionalism requires more than rhetoric. As outlined in Chapter 2 on

regulation, licensing, and qualifications, the road to professionalism is filled with impe-

diments. Those impediments—a lack of educational discipline or cogent body of knowl-

edge, an accepted code of ethics, a prestige or status consensus on occupational roles,

or a seal of social and governmental legitimacy—are all attainable goals.30 To get beyond

the characterization that a private security practitioner is nothing more than a play

policeman, the industry will have to aggressively implement the standards of profession-

alism. On the other hand, much of that judgment is the result of prejudice and stereo-

type. “Private security is aware of this status differential imposed by many law

enforcement personnel and deeply resent it since they feel that law enforcement neither

understands nor empathizes with their crime prevention role. This in turn leads to a

lower level of esteem by private security for law enforcement personnel.”31 Petty bicker-

ing and hate mongering further erodes the ambition of professionalism. Constructive

suggestions regarding increased standards and performance objectives are more in

order. Certification programs such as that offered by ASIS International and its Certified

Protection Professional programs make a real contribution to substantive professional-

ism. The CPP program’s chief objectives are as follows:

1. To raise the professional standing of the field and to improve the practice of security

management by giving special recognition to those security practitioners who, by

passing examinations and fulfilling prescribed standards of performance, conduct,

and education, have demonstrated a high level of competence and ethical fitness.

2. To identify sources of professional knowledge of the principles and practices of

security and loss prevention, related disciplines, and laws governing and affecting the

practice of security.

3. To encourage security professionals to carry out a continuing program of

professional development.32

Chapter 7 • Public and Private Law Enforcement 309

Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:21:28.

C op

yr ig

ht ©

2 01

1. E

ls ev

ie r

S ci

en ce

& T

ec hn

ol og

y. A

ll rig

ht s

re se

rv ed

.

Attaining professionalism will require both dedication and perseverance. Howard

C. Shook, former president of the International Association of Chiefs of Police (IACP),

remarks that the private security sector has “proven its worth and can defend itself from

detractors rather easily.”33 Harold Peterson, in his work “Private Security v. Public Law

Enforcement,”34 calls for a natural respect between the public and private sectors and

highlights the unique and extremely sophisticated expertise exhibited by the private jus-

tice system. He warns the traditionalist in law enforcement:

There are those in both the community and law enforcement who believe that the

public police alone are responsible for crime reduction. If, as a chief, you think like

this, I’m afraid that your agency will fail the public you serve.35

A Failure to Communicate and Cooperate

Predictably, a lack of respect between the public and private sector leads to a lack of

communication. The Private Security Advisory Council cogently concludes:

Since many law enforcement personnel perceive themselves as having a higher

degree of status than private security, and do not properly appreciate the role of pri-

vate security in crime prevention, there will be a tendency to avoid communication

with private security personnel. One might expect that private security would com-

municate freely with law enforcement as a perceived higher status group. But the

intensity of feelings expressed by private security and the ambiguity of their rela-

tionship with law enforcement . . . would seem to indicate an uncertainty as to

the equality of status with law enforcement. Private security, then, would generally

tend to avoid communication with law enforcement; without effective communica-

tion cooperation cannot be imposed.36

Like squabbling relatives, this state of interaction is counterproductive but easily cor-

rectable. Many of the perceptions, viewpoints, and preconceived notions about the role

of private security as it relates to public law enforcement that each party possesses are

highly biased and unscientific. For example, it is ludicrous to argue that the training

and educational requirements for all public law enforcement positions are markedly

higher. Some major police departments, such as the one in the city of Philadelphia, with

a metropolitan area of more than 6 million people, historically required no more than an

eighth-grade education. While this may be an exception to the general requirement of a

high school diploma, it is folly for public police personnel to perceive their educational

requirements as always being more rigorous. Of course, there has been a strong ten-

dency toward higher educational requirements with a recent flurry of legislative activity

concerning the regulation, licensing, and education mandated for private security.37 The

perception that only public policing has erudite training is fundamentally flawed.

310 PRIVATE SECURITY AND THE LAW

Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:21:28.

C op

yr ig

ht ©

2 01

1. E

ls ev

ie r

S ci

en ce

& T

ec hn

ol og

y. A

ll rig

ht s

re se

rv ed

.

Another rationale often espoused by the public sector, which justifies its lack of com-

munication, is functional separation. Some see no benefits to communication because

of distinct occupational roles. The perception that private security protects only those

interests that are strictly private is incorrect. Consider Table 7.5,38 which charts the pub-

lic functions performed by the private justice sector.

Table 7.5 Sites with Experience in Private Provision of Protection Services

State Jurisdiction Type of Service

Alaska Anchorage Parking meter enforcement

Parking meter collection

Parking lot security

Arizona State Parking lot enforcement

Flagstaff School crossing guards

Maricopa County Building security

Phoenix Crowd control

California Federal U.S. Department of Energy facility security

Hawthorns Traffic control during peak hours

Los Angeles Patrol streets surrounding private university

Traffic and security for special events

Los Angeles County Building security

Park security

Norwalk Park security

San Diego Housing project security

Park security

San Francisco Building security

Santa Barbara Airport security

Prison transport

Colorado Denver Building security

Fort Collins Building security

Connecticut Hartford Sport arena security

Florida Dade County Courts, building security

Fort Lauderdale Airport, building security

Pensacola Airport security

St. Petersburg Park security

Hawaii State Parking lot enforcement

Idaho State Regional medical center security

Idaho Falls School crossing guards

Kentucky Lexington Housing project security

Massachusetts Boston Hospital, courts, library security—city

Library security—federal

Nevada Federal Nuclear test site security

New Jersey Sport Authority Sports arena security

New York State Response to burglar alarms in state office

Buffalo County security—federal

(Continued)

Chapter 7 • Public and Private Law Enforcement 311

Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:21:28.

C op

yr ig

ht ©

2 01

1. E

ls ev

ie r

S ci

en ce

& T

ec hn

ol og

y. A

ll rig

ht s

re se

rv ed

.

Those asserting a limited public role for private security inaccurately portray the

industry. Private security personnel have willingly taken on, been legislatively granted,

or freely pursued these traditionally public functions:

• Community protection and services

• Public housing protection

• Parking authority control and security

• Enforcement of motor vehicle laws

• Natural resource activities

• Waterways and port services

• Air and rail protection

• Animal control

• Court security

• Governmental office security

• Private prisons

• Code violation inspectors

• Special event security

• Governmental investigations

Table 7.5 Sites with Experience in Private Provision of Protection Services—Cont’d

State Jurisdiction Type of Service

New York City Security compounds for towed cars

Shelter security

Human Resources Administration security

Building security

Locate cars with outstanding tickets

Arrests for retail store theft

Management training, police

Campus security

Pennsylvania State Unemployment offices security

Welfare offices security

Philadelphia Parking enforcement

Pittsburgh Court security—federal

Patrol city park

High school stadium security

School crossing guards

Transfer of prisoners

Texas Dallas/Fort Worth

Houston

Airport security including baggage checking Building security

Utah State Building security

Training for transit police

Washington Seattle

Tacoma

Building security

Sports arena security

Washington, D.C. District of Columbia Federal Planning and management

building security

312 PRIVATE SECURITY AND THE LAW

Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:21:28.

C op

yr ig

ht ©

2 01

1. E

ls ev

ie r

S ci

en ce

& T

ec hn

ol og

y. A

ll rig

ht s

re se

rv ed

.

The call for cooperation and professional interchange is earnest and well grounded.

Professional associations and groups such as the American Society for Industrial

Security have formulated liaison committees. Additionally, the International Association

of Chiefs of Police has emphasized the unique capacities of the security industry, stating

that it should be viewed as a complement to public law enforcement.39 Even the current

structure and bureaucratic makeup of the Department of Homeland Security includes

a Private Sector Commission that is considered a significant contributor in the war

on terror.40

There can be little dispute that privatization of public services or contracting out

a government responsibility to private employers is a major trend. Not unexpectedly,

much of this activity has been viewed with distrust and apprehension, particularly from

those authorities that intend to ensure the vested interest of police. The Hallcrest Report

I notes that this type of bickering and failure to communicate borders on the inane. The

interest of the public will be better served through “constructive dialogue and creative

planning by law enforcement and private security to facilitate contracting out of certain

non-crime activities.”41 The report further notes that energy, time, and resources are

being wasted in this debate and “could be better utilized in identifying areas for contract-

ing out and developing tightly prescribed contract specifications of performance.” 42

The momentum of privatization makes public reticence to private sector justice even

more unjustified. “But the trick to privatization is not only lowering costs, but also

maintaining quality of service—particularly when the service in question is security.”43

The transference of public obligation to private interest is a trend likely to continue.

See Table 7.6.44

The failure of public and private policing to communicate undermines and

hinders the social order. Public law enforcement, in its own ignorance of the processes

and functions of private law enforcement, simply chooses to disregard the reality of

its professional counterpart. In the same vein, private security, particularly through its

own internal decision making, management, and personnel practices, has done

little to dissuade its reputation that it is a business first and foremost. As one commen-

tator states:

Table 7.6 Possibility of Transferring Responsibility to Private Security

Activity Law Enforcement

Executives Proprietary Security

Managers Contract Security

Managers

Responding to burglar alarms 57% 69% 68%

Preliminary investigations 40% 88% 68%

Completing incident reports

(a) victim declines prosecution;

for insurance purposes only

68% 87% 66%

(b) misdemeanors 45% 81% 63%

Supplemental case reports 38% 78% 63%

Transporting citizen arrests 35% 32% 38%

Chapter 7 • Public and Private Law Enforcement 313

Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:21:28.

C op

yr ig

ht ©

2 01

1. E

ls ev

ie r

S ci

en ce

& T

ec hn

ol og

y. A

ll rig

ht s

re se

rv ed

.

Many problems are constant and intractable while the barriers remain; solutions

become possible only as they fall away. Familiar roles are exchanged for others less

accustomed. The experience is designed expressly to give practical insight into the

domain and responsibility of others. It is a sobering feeling to have once in a while

the privilege of walking a mile in someone else’s moccasins. It is hoped that these

shared experiences may be carried over into the day-to-day realities of professional

life and provide a positive inspiration for cooperation and understanding.45

Failure of both the public and private justice systems to communicate and cooperate

is a staggering loss of human and professional resources. The Private Security Advisory

Council revealed an exceptionally low level of interaction between the public and pri-

vate sectors. Its more salient findings included the following:

1. Less than one-half had conducted a survey to find out how many and what types of

private security agencies operated in their areas;

2. Only one-third of the agencies stated that they had an office or officer to provide

liaison with private security;

3. Only 25 percent of the agencies had policies or procedures for defining working roles

of law enforcement in private security;

4. Only 25 percent had policies covering interchange of information with private

security;

5. Less than 20 percent had procedures for cooperative actions with private security.46

The lack of cooperation and communication negatively impacts both systems, as evi-

dent in Table 7.7. 47

Both law enforcement and the private security industry have a moral and legal obli-

gation to open channels of communication and to cooperate professionally. To maintain

the current relationship is debilitating to efforts to reduce criminality and assure a safer

world. The continued practice of turf protection, stereotyping, and prejudicial analysis

benefits no one. As Kobetz and Cooper relate:

As soon as the essential unity of a mission is perceived and accepted, the special diffi-

culties of responsibility and approach can be studied in detail. For too long, the other

side—our common antisocial enemy—has seen matters in terms of “them versus us,”

is it not time that we, the public and the private providers of security, truly end this

and in a practical and professional fashion begin to think of “us versus them”? 48

Positive Programs on Interaction and Cooperation The best remedy for the unfortunate divide between the public and private justice

model is success by cooperation and integration.49 Instead of diverse worlds, there need

be the forging of a solid professional alliance. Public and private needs see each system

314 PRIVATE SECURITY AND THE LAW

Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:21:28.

C op

yr ig

ht ©

2 01

1. E

ls ev

ie r

S ci

en ce

& T

ec hn

ol og

y. A

ll rig

ht s

re se

rv ed

.

as distinct yet complimentary, unique yet dedicated to a similar mission. “While healthy

competition and fraternal camaraderie are still in the distant future, the likelihood that

more and more local police departments will recognize the hidden wealth that lies in

police private security relations seems closer than ever.”50 To accomplish the objective

of mutual cooperation and communication, certain goals, objectives, and responsibil-

ities have to be met. Daniel E. McElory, in his article “A Professional Alliance,” holds

the following to be essential:

• Recognize certain prescribed standards of performance, education and high level of

professional competence of individuals entering the field or presently employed in

the industry.

• Encourage the use of sound practices, principles of security and loss prevention.

• Promote mutual respect, cooperation, and communication between both sectors as

well as increasing the knowledge of each other’s functions.

• Speak in a unified voice on issues that promote the industry at large.

• Stress and promote programs designed for increasing professional development at all

levels of employment.

• Work to establish liaisons wherever possible that will serve to benefit the entire industry.

• Pursue a program of true professionalism in thought, word, and deed. 51

Table 7.7 Private Security Perceptions of Law Enforcement Cooperation on Criminal Incidents/Assistance Calls

Security Managers Degree of Law Enforcement Cooperation Proprietary Contract

Don’t cooperate

Cooperative reluctantly

Cooperate fully

Interfere with private security investigation

Withhold needed information

2%

23%

71%

2%

9%

N ¼ 676

7%

33%

34%

4%

15%

N ¼ 545 Security Employees

Law Enforcement Response to Assistance Requests Proprietary Contract

Respond promptly

Respond slowly

Depends on situation

Have never called police

59%

3%

32%

6%

35%

10%

36%

19%

Law Enforcement Support for Security Employee Decisions

Support decisions

Do not support

Sometimes support

N/R

75%

1%

11%

13%

N ¼ 110

52%

4%

23%

22%

N ¼ 78

Chapter 7 • Public and Private Law Enforcement 315

Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:21:28.

C op

yr ig

ht ©

2 01

1. E

ls ev

ie r

S ci

en ce

& T

ec hn

ol og

y. A

ll rig

ht s

re se

rv ed

.

Factionalism is surely not a fixed state for either side of the policing model. What

appears more likely on the horizon is the recognition that these are two armies

operating under one flag. The present landscape has many a story to tell about how

these two theaters work in unity. For a sampling of these partnerships, see Appendix 4.

These are the true success stories in the life of private security—the ones where public

and private work as comrades in arms.52

n n n

Review the current state of partnering between the public and private sector at http://www

.ilj.org/publications/docs/Operation_Partnership_Private_Security.pdf.

n n n

College and Municipal Police Forces

The cooperation exhibited between city or municipal police and college and university

security forces is a long-standing example of how these two worlds can effectively

cooperate. William Bess, director of campus safety at Bowling Green State University,

and Galen Ash, director at the Bowling Green Police Department, feel confident that

they have mastered the art of interaction by identifying the essential elements in the

recipe for successful cooperation:

1. Mutual assistance agreement

2. Support from the courts

3. Shared training programs

4. Efficient communications (technical)

5. Ongoing administrative working relations

6. Police/advisory committee participation

7. Shared crime prevention programs

8. Cooperative investigations and sharing of information

9. College educational programs

10. Informal daily contacts.53

At Bowling Green, the private and public police model overcomes the preconceptions

and caricatures so often applied to each model. Both parties indicate that rhetoric is

easy, but activities that are planned and concerted are the elixirs that smooth over the

distrustful state of affairs. The interaction between public and private security, especially

between college and university departments and the city or municipalities in which they

are located, is an ongoing departmental obligation. The National Association of College

and University Business Officers affirms the need for continuing interplay:

The security department must be largely self-sufficient, but able to work harmoni-

ously with other institutional departments. It should also maintain effective liaison

with other law enforcement agencies, the courts, the prosecuting agencies and the

316 PRIVATE SECURITY AND THE LAW

Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:21:28.

C op

yr ig

ht ©

2 01

1. E

ls ev

ie r

S ci

en ce

& T

ec hn

ol og

y. A

ll rig

ht s

re se

rv ed

.

press. It is also advisable that the local chief of police be informed of public func-

tions to be held at the institution, so that he may be prepared to assist if necessary.54

n n n

Find out about the International Association of Campus Law Enforcement Association at

http://www.iaclea.org/visitors/about.

n n n

Not all relationships are born from good will. For example, at both the University of

Pennsylvania and Temple University, the cost cutting of once public police forces

erected a newer private sector model, which has resulted in efforts to unionize the

private guard force. Allied Barton, the replacement company, has been met with severe

labor organizing activities that reflect disgruntlement. On October 10, 2010, the private

force voted to unionize.55

The influence of private sector policing on college campuses is multidimensional.

With the implementation of new federal legislation on the reporting of the campus

crime rate, under the Crime Awareness and Campus Security Act of 1990, 56

private

sector justice computes the crime data. Campuses are required to collect and publish

the following data:

(A) A statement of current campus policies regarding procedures and facilities

for students and others to report criminal actions or other emergencies

occurring on campus and policies concerning the institution’s response to

such reports.

(B) A statement of current policies concerning security and access to campus facilities,

including campus residences, and security considerations used in the maintenance

of campus facilities.

(C) A statement of current policies concerning campus law enforcement, including—

(i) the law enforcement authority of campus security personnel;

(ii) the working relationship of campus security personnel with State and local law

enforcement agencies, including whether the institution has agreements with

such agencies, such as written memoranda of understanding, for the

investigation of alleged criminal offenses; and

(iii) policies which encourage accurate and prompt reporting of all crimes to the

campus police and the appropriate law enforcement agencies.

(D) A description of the type and frequency of programs designed to inform students

and employees about campus security procedures and practices and to encourage

students and employees to be responsible for their own security and the security of

others.

(E) A description of programs designed to inform students and employees about the

prevention of crimes.

Chapter 7 • Public and Private Law Enforcement 317

Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:21:28.

C op

yr ig

ht ©

2 01

1. E

ls ev

ie r

S ci

en ce

& T

ec hn

ol og

y. A

ll rig

ht s

re se

rv ed

.

(F) Statistics concerning the occurrence on campus, in or on non-campus buildings or

property, and on public property during the most recent calendar year, and during

the 2 preceding calendar years for which data are available—

(i) of the following criminal offenses reported to campus security authorities or

local police agencies:

(I) murder;

(II) sex offenses, forcible or non-forcible;

(III) robbery;

(IV) aggravated assault;

(V) burglary;

(VI) motor vehicle theft;

(VII) manslaughter;

(VIII) arson; and

(IX) arrests or persons referred for campus disciplinary action for liquor law

violations, drug-related violations, and weapons possession; and

(ii) of the crimes described in sub clauses (I) through (VIII) of clause (i), of larceny-

theft, simple assault, intimidation, and destruction, damage, or vandalism of

property, and of other crimes involving bodily injury to any person, in which the

victim is intentionally selected because of the actual or perceived race, gender,

religion, sexual orientation, ethnicity, or disability of the victim that are reported

to campus security authorities or local police agencies, which data shall be

collected and reported according to category of prejudice. (G) A statement of policy concerning the monitoring and recording through local police

agencies of criminal activity at off-campus student organizations which are recognized

by the institution and that are engaged in by students attending the institution,

including those student organizations with off-campus housing facilities.

(H) A statement of policy regarding the possession, use, and sale of alcoholic beverages

and enforcement of State underage drinking laws and a statement of policy

regarding the possession, use, and sale of illegal drugs and enforcement of Federal

and State drug laws and a description of any drug or alcohol abuse education

programs as required under section 1011i of this title.

(I) A statement advising the campus community where law enforcement agency

information provided by a State under section 14071(j) of Title 42, concerning

registered sex offenders may be obtained, such as the law enforcement office of the

institution, a local law enforcement agency with jurisdiction for the campus, or a

computer network address.

(J) A statement of current campus policies regarding immediate emergency response

and evacuation procedures, including the use of electronic and cellular

communication (if appropriate), which policies shall include procedures to—

(i) immediately notify the campus community upon the confirmation of a significant

emergency or dangerous situation involving an immediate threat to the health or

safety of students or staff occurring on the campus, as defined in paragraph (6),

unless issuing a notification will compromise efforts to contain the emergency;

318 PRIVATE SECURITY AND THE LAW

Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:21:28.

C op

yr ig

ht ©

2 01

1. E

ls ev

ie r

S ci

en ce

& T

ec hn

ol og

y. A

ll rig

ht s

re se

rv ed

.

(ii) publicize emergency response and evacuation procedures on an annual basis in

a manner designed to reach students and staff; and

(iii) test emergency response and evacuation procedures on an annual basis.57

The International Association of Campus Law Enforcement Administration (IACLEA)

has been a major implementer of the new policy. While the reporting requirements are

administratively cumbersome, the “law has, however, delivered some good. Besides

placating many victims’ rights groups, it directs attention toward campus security with

real and positive impact. As prospective students focus more on crime statistics as

criteria for choosing a college, campuses will tend to beef up onsite security programs

by specifying integrated access control, communications, and monitoring systems in

dormitories, classrooms, parking lots, and other facilities.”58 Local police departments,

as well as state entities, increasingly rely on this information.

Crime is a growing reality on college campuses, as is the paucity of funds to control

and eradicate it. Universities and colleges are increasingly looking to the private sector

to deliver safety and security on campus. Allied Barton is entrusted with the University

of Pennsylvania, works closely with the Philadelphia Police Department, and delivers a

wide array of services to the educational community including the following:

• Campus Fire Safety

• Evacuation Planning

• Drug and Alcohol Abuse

• Domestic Abuse

• High Risk/Confrontational Situation Management

• Clery Act

• Access Control

• Lock-outs and Vehicle Assists

• Campus Escort Services

• Residential Life Security

• Campus Emergency Preparedness

Other companies are major players in the delivery of law enforcement services, and all

of these entities work closely and cooperatively with public law enforcement.

Transit and Municipal Police Forces

In the areas of transit, transportation systems, and other public facilities from airports to

bus stations, the role of private sector justice is clearly evident. Transit systems are often

large and complicated and present serious and significant security challenges for

security professionals.

n n n

See how the Sacramento California Transit system utilizes both public and private police in

the operation of its system at http://www.sacrt.com/lightrail.stm#Security.

n n n

Chapter 7 • Public and Private Law Enforcement 319

Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:21:28.

C op

yr ig

ht ©

2 01

1. E

ls ev

ie r

S ci

en ce

& T

ec hn

ol og

y. A

ll rig

ht s

re se

rv ed

.

Some transit systems, such as the city of Los Angeles and its five surrounding

counties, employ full-time transit police to oversee the safety of its operations.59 Cou-

pling a massive metropolitan area with a highly visible bus and transit service provides

opportune laboratory conditions to test public/private cooperation. So sophisticated is

the interaction between the private transit police and the surrounding city of Los

Angeles and counties that in 1982 Los Angeles County was awarded a grant of

$375,000 for the purposes of “hiring off-duty local police officers to work on a part-time

basis.”60 The benefits of the program over the years since its inception have been many

and include a massive infusion of manpower, which has resulted in a decline of violent

criminality in transit locations.61 The intangible and indirect benefits of interaction and

cooperation seem to be held in the highest regard. Harry Buzz, then assistant chief of the

Transit Police Department, has written:

The indirect benefits include development of working relationships between

members of our local enforcement agencies. The part-time officers have gained

respect for the professionalism of our department which they take back to their

own agency. They have become more sensitized to transit crime and can, while

working with their primary agency, handle unique transit related problems with

confidence.

Transit police officers have benefited from the exposure to highly trained and

experienced officers of other agencies. Also, since transit police officers patrol most

streets in Los Angeles County, especially the high crime areas, they are frequently

called upon to provide backup to local jurisdictions. This is particularly true in

the city of Los Angeles where [the Los Anglese Police Department, LAPD] is operating

with extremely limited personnel resources. On many of these occasions, the officer

being assisted has worked part time for our department and the other officers know

each other.62

Aside from these remarkable benefits, the transit-LAPD experiment has dramatically

increased the public’s perception of safety. That, of course, is the greatest benefit of any

policing process whether public or private.63 Other transit programs which utilize

private sector entities and officers include Seattle, Washington, Milwaukee, Wisconsin,

and Phoenix, Arizona.

n n n

Review the U.S. Department of Transportation’s Guide on security guidelines for mass transit

at http://transit-safety.volpe.dot.gov/publications/security/PlanningGuide.pdf.

n n n

While in many cases interaction and cooperation between public and private law

enforcement is impeded by an atmosphere of distrust and elitism, these examples indi-

cate the capacity to change and to benefit from mutual dedication.

320 PRIVATE SECURITY AND THE LAW

Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:21:28.

C op

yr ig

ht ©

2 01

1. E

ls ev

ie r

S ci

en ce

& T

ec hn

ol og

y. A

ll rig

ht s

re se

rv ed

.

Private Security Industry and Law Enforcement Agencies

Public and private policing have a significant relational history. At the federal level,

various agencies of government, from the Department of Homeland Security (DHS) to

the military branches, have come to heavily depend upon the services of private sector

justice. As the Bureau of Justice Assistance notes in its Engaging Private Security to

Promote Homeland Security, private sector justice can jump in with feet first. Private

security can do the following:

• Coordinate plans with the public sector regarding evacuation, transportation, and

food services during emergencies.

• Gain information from law enforcement regarding threats and crime trends.

• Develop relationships so that private practitioners know whom to contact when they

need help or want to report information.

• Build law enforcement understanding of corporate needs (e.g., confidentiality).

• Boost law enforcement’s respect for the security field. 64

The entire mission of homeland security presumes cooperation and alliances. Even

the president’s guiding mission statement on the defense of this nation notes:

We will help ensure that the Federal Government works with states and local

governments, and the private sector as close partners in a national approach to

prevention, mitigation, and response.65

In homeland defense, the private sector justice model achieves extraordinary benefits

for the collective. According to the Homeland Security Research Corporation, by 2011

the private sector “will trail only DHS in HLS industry procurement volume. This stems

from the forecasted 50% private sector procurement growth from 2007–2011, totaling an

accumulated $28.5B.”66 The face of private sector justice can be discovered across the

DHS spectrum; from privatized forces seeking out terrorists in Iraq and Afghanistan to

the protection of federal installations across the mainland, private sector justice makes

extraordinary contributions in the defense of the country.67

This same mentality extends to both states and localities. Each of these entities seeks

the promotion of safety and security by mutually agreed upon responsibilities and the

appropriate delegation of power and authority to those properly entrusted. Public and

private police must work together since the benefits are so measurable. Partnerships

advance

• Creative problem solving,

• Increased training opportunities,

• Information, data, and intelligence sharing,

• Force multiplier opportunities,

• Access to the community through private sector communications technology, and

• Reduced recovery time following disasters. 68

Chapter 7 • Public and Private Law Enforcement 321

Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:21:28.

C op

yr ig

ht ©

2 01

1. E

ls ev

ie r

S ci

en ce

& T

ec hn

ol og

y. A

ll rig

ht s

re se

rv ed

.

Another successful forging between public and private security forces is between the

city of Amarillo, Texas, and a private security company Allstate Security Industries,

Inc. The president of Allstate and the chief of the Amarillo Police Department recognize

that mutual cooperation benefits both departments. Commencing in August 1981, both

entities devised a program whereby Allstate Security would begin responding to all

alarm calls. In reviewing the findings of an internal study, the department revealed that

“this procedure relieved the police department of the time consuming responsibility of

answering an average of 8 alarms per day and saved the Department approximately

3,428 man hours, or the equivalent of adding 13/4 men per year to their police depart-

ment. All of this was at no cost to the taxpayers.”69 The results of such mutual coopera-

tion are advantageous from an economic as well as a human point of view. As Allstate

continues to pursue alarm calls, the policy frees up other public officers to perform

more critical functions relating to investigative and apprehension processes. As it

spreads out the many responsibilities, the policy reduces the stress level in the entire

department and builds or affirms goodwill between the department, the security

company, and the public at large. Given the success of this relationship, the program

of mutual cooperation was expanded to include a neighborhood patrol program and

a canine program. Current internal studies of these activities indicate a positive

outcome.70

In the early 1980s, Washington State embarked on an ambitious joint endeavor

between the public and private sector entitled the Washington Law Enforcement

Executive Forum (WLEEF). “Membership is composed of 26 individuals equally divided

between the private sector and law enforcement executives, including sheriffs, chiefs,

the state patrol chief, and special agents in charge of the Seattle offices of the FBI and

Secret Service, as well as representation from the state attorney general’s office. Close

relationship and open communication exist between the WLEEF and the Washington

Association of Sheriffs and Police Chiefs.”71 WLEEF’S achievements include the

following:

• funding a statewide loan executive program to enhance management of local police

agencies;

• providing support for the Law Enforcement Executive Journal, the nation’s first law

enforcement/business publication;

• support computer crime control legislation;

• funding and developing a state-wide toll-free hotline for reporting drunk drivers;

• sponsoring legislation for regulation and training of private security personnel;

• promoting a Business Watch program to prevent crimes against businesses; and

• creating an Economic Crime Task Force;

• to assess the nature and extent of white-collar crime in the state,

• to develop strategies to reduce such crime,

• to promote appropriate legislative initiatives and revisions, and

• to collect and disseminate information on economic crime. 72

322 PRIVATE SECURITY AND THE LAW

Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:21:28.

C op

yr ig

ht ©

2 01

1. E

ls ev

ie r

S ci

en ce

& T

ec hn

ol og

y. A

ll rig

ht s

re se

rv ed

.

More recently, WLEEF has been an active participant in the state’s 1991 legislation

on the regulation and licensing of the private security industry. This joint endeavor

produced a variety of positive results, including these:

1. The philosophical and operational “gap” between public law enforcement and

private security is not nearly as wide as often imagined.

2. Competitive security companies can work well together for legitimate common

causes, such as training.

3. A high-quality training program can be put together in a short four-hour block.

4. Good communication between government and the security industry can go a long

way toward making a licensing law workable and meaningful.

5. There are a lot of community resources available for training.73

n n n

Visit WLEEF’S webpage at http://www.wastatesecuritycouncil.org/about.html.

n n n

WLEEF, by and through its Operation Cooperation program, educates both ends of

the justice spectrum on the benefits of cooperation. It designates particular structures

and goals as well for the public-private consortium and delineates how intimate, how

formal or informal, these associations might be. Calling these partnerships, WLEEF finds

plenty of room for distinctive relationships:

Degree of formality. Some programs are formal, incorporated ventures, such as 501(c)

(3) nonprofits; others are merely “clubs” with bylaws and officers; while others are

completely informal.

Specificity of mission. Some exist to solve specific problems, while others are general-

purpose, networking organizations.

Leadership. Some collaborative programs are led by law enforcement, others by the

private sector, and still others jointly by both fields.

Funding. Some programs have no budget, while others are well funded. There are

many models for funding. For example, a partnership may receive money from

participating organizations (including police agencies), from sponsors, or from police

foundations or crime commissions.

Inclusiveness. A partnership may be a collaboration between law enforcement and

private security or between law enforcement and the larger business sector, including

more than security operations. On the law enforcement side, collaboration may

include not only municipal police and sheriffs, but also state and federal law

enforcement officers and school district and campus police. Cooperation also can be

arranged between a single company and the local police department or between a

federal agency and businesses throughout the country.74

WLEEF continues its aggressive promotion of cooperation between the public and

private sector by laying out the essential ways in which these two worlds can cooperate.

Chapter 7 • Public and Private Law Enforcement 323

Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:21:28.

C op

yr ig

ht ©

2 01

1. E

ls ev

ie r

S ci

en ce

& T

ec hn

ol og

y. A

ll rig

ht s

re se

rv ed

.

In the final analysis, mutual cooperation, respect and a passionate orientation toward

professionalism all lead to safer communities. James A. Kirkley, then director of the

Department of Public Safety at the Claremont Colleges in Claremont, California,

critiques the traditional separation of authority and power:

It is now time for a total community effort. The high percentage of non-crime calls

for service, the percentage of non-observable crimes, and the fiscal constraints

placed upon you, make it ludicrous to expect the public police alone to be respon-

sible for reducing crimes.

Teamwork has long been recognized as an essential ingredient in winning. It is

used in all sports, war, business, and even in police work. . . .

The time has come for the public sector and the private sector in law enforcement

to work as a team.75

The consensus building for continual interaction and cooperation between the public

and private sector has come of age.

Recommendations

National Advisory Committee on Criminal Justice

Most professional associations, groups, think tanks, and institutes stress the essentiality

of cooperation between the public and private sectors. Most issue unequivocal recom-

mendations on the sensibility of working closely for a similar goal and cause. The

National Advisory Committee on Criminal Justice Standards and Goals, in its Report of

the Task Force on Private Security, urges significant interaction and close cooperation.

The report concludes:

Over the past decade, the resources devoted to both public law enforcement and the

private security industry have increased as the awareness of the need for greater

crime prevention and control has grown. National leaders have called upon every

private citizen, institution, and business to join their efforts with the criminal

justice system to prevent crime. Although a closer cooperation between the private

security and public law enforcement spheres offers a special opportunity for

improved crime prevention, the relationship has often been ignored, overlooked or

restrained. Recently, however, the potential of that meaningful working relationship

between law enforcement and private security has been recognized.76

Theoretical concerns aside, practical, pragmatic considerations justify and even com-

pel a policy of interaction. As this work has delved into the complex legal and policy

questions involved in private security, one striking, recurring observation occurs—that

for all the clamor about the differences of public and private security, there is really very

little difference between the two entities. Therefore, the limitations and hesitations

about a unified purpose are largely the result of hyperbole and exaggerated positions.

324 PRIVATE SECURITY AND THE LAW

Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:21:28.

C op

yr ig

ht ©

2 01

1. E

ls ev

ie r

S ci

en ce

& T

ec hn

ol og

y. A

ll rig

ht s

re se

rv ed

.

The National Advisory Committee enunciated specific standards, steadfastly

encouraging cooperation, mutual respect, and regular interaction. Stated as specific

goals, the report recommends:

Goal 6.1: Interaction Policies

Effective interaction between the private security industry and law enforcement

agencies is imperative for successful crime prevention and depends to a large extent

on published clear and understandable policies developed by their administrators.

Policies should be developed to serve as guides for modification by appropriate

agencies.77

Goal 6.2: Survey and Liaison with Private Security

Law enforcement agencies should conduct a survey and maintain a current roster of

those security industry components operating in the agencies’ jurisdictions, and

designate at least one staff officer to serve as liaison with them. 78

Goal 6.3: Policy and Procedures

For law enforcement agencies and the private security industry to most effectively

work within the same jurisdiction, policies and procedures should be developed

covering:

(a) the delineation of working roles of law enforcement officers and private security

personnel;

(b) the continuous prompt and reasonable interchange of information; and

(c) cooperative actions between law enforcement agencies and the private security

industry.79

Goal 6.4: Multi-Level Law Enforcement Training in Private Security

There should be a multi-level training program for public law enforcement officials,

including but not limited to:

1. Role and mission of the private security industry;

2. Legal status and types of services provided by private service companies;

3. Interchange of information, crime reporting, and cooperative actions with the

industry; and

4. Orientation in technical and operational procedures.80

Goal 6.5: Mistaken Identity of Private Security Personnel

Title, terms, verbal representations, and visual items that cause the public to mistake

private security personnel for law enforcement officers should be eliminated; security

employers should ensure that their personnel and equipment are easily distinguishable

from public law enforcement personnel and equipment.81

Goal 6.6: State Regulation of Private Security, Uniforms, Equipment and Job Titles

Each state should develop regulations covering use and wear of private

security uniforms, equipment, company names and personnel titles that do not

conflict with those in use by law enforcement agencies within the state.82

Goal 6.7: Law Enforcement Personnel Secondary Employment

Law enforcement administrators should insure that secondary employment of public

law enforcement personnel in the private security industry does not create a conflict

of interest and that public resources are not used for private purposes.83

Chapter 7 • Public and Private Law Enforcement 325

Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:21:28.

C op

yr ig

ht ©

2 01

1. E

ls ev

ie r

S ci

en ce

& T

ec hn

ol og

y. A

ll rig

ht s

re se

rv ed

.

Goal 6.8: Law Enforcement Officer Employment as a Security Manager

No law enforcement officer should be a principal or a manager of a private security

operation where such an association creates a conflict of interest.84

Goal 6.9: Private Investigatory Work

Law enforcement officers should be strictly forbidden from performing any

investigatory work.85

The National Advisory Committee approaches the dilemma on multiple fronts. First,

in order to ensure a cooperative environment between public and private sectors, it har-

kens for continuous and regular interaction and calls for the creation of a liaison officer

and other committees to facilitate the interchange between public and private factions.

The committee also urges the elimination of all conflict of interest situations, especially

as relates to moonlighting and industrial involvement where either an actual or a per-

ceived conflict might exist. Finally, the committee, while insisting on mutual respect

and emulation of each other’s tasks and duties, reminds the private sector that it cannot

be copycat police officers and should not hold itself out, whether by uniform, badge, or

other representation, as operating under the authority of the state or municipality where

it is located. Such actions foster potential abuse and cause confusion in the public eye.

n n n

The Private Sector Office frequently lends its business expertise when evaluating particular

security procedures such as air safety. See: http://tinet.ita.doc.gov/research/programs/ifs/

DHS-OTTI_PilotStudyReport_v7-FINAL.pdf.

n n n

The Hallcrest Report

The Hallcrest Report I accepts the fact that private security has “got its head together

and found its purpose in life.” Its recommendations now insist on a more proactive

and participatory role in the elimination, prevention, and detection of criminality in

society. Some of the following recommendations attest to this philosophical direction:

• Private security should be involved in community crime prevention. 86

• Private security should be participants in the development of an Economic Crime

Institute.87

• Private security should be required, through its associations, to develop crime loss

reporting data and information. 88

• Private industrial security firms should formulate employee awareness programs and

specific corporate policies on business, business ethics, and crime.89

• Private security concerns should be involved in strategic planning, alternative policing

arrangements, and the transfer of selected police activities to the private sector.90

• Private security should provide the resources necessary to design a Private Security

Resource Institute.91

• Private security should establish standard industrial classifications. 92

326 PRIVATE SECURITY AND THE LAW

Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:21:28.

C op

yr ig

ht ©

2 01

1. E

ls ev

ie r

S ci

en ce

& T

ec hn

ol og

y. A

ll rig

ht s

re se

rv ed

.

• Private security should have total access to criminal histories. 93

• Private security should be permitted to achieve an identity through uniforms and

appropriate advertising.94

• Private security should develop the capacity to transfer its technology to the public sector. 95

• Private security should support efforts to standardize qualifications, educational

training, and certification.96

• Private security should provide educational opportunities for public law enforcement

officials.97

• Private security should establish a task force of police and private security personnel

for various purposes.98

As propounded earlier, these recommendations call for a more active involvement in

crime prevention, deterrence, and apprehension than traditionally has been expected.

Private security as an industry can no longer expect to be insulated from either the gov-

ernment’s regulatory process or public scrutiny. As the role of private security expands,

both legally and socially, new responsibilities and obligations must be tackled. Given the

high rate of public dissatisfaction over the performance of the public police systems, pri-

vate police should view increased demands as a sign of confidence. The world’s overall

complexity makes it likely that security is here to stay and flourish. “The world has

shrunk and most industries now face global competition. Businesses are not only

concerned with the ethics and mores of a domestic environment, but must now deal

with the values of a dynamic world market. Vast new technologies in communications

have placed enormous pressures on businesses to protect their data and the assets that

pass through these technologies.”99 Public policing, with its numerous restrictions and

difficulties, can only envy the private police process.

The Private Sector Office of the Department of Homeland Security

Aside from professional associations, think tanks, and other groups, the future for the

private sector will be bound tightly to the activities of the DHS. From its earliest days,

when it was referred to as the Office of Homeland Security, the National Strategy

for Homeland Security,100 states that the role of private security and public law enforce-

ment in terrorism planning and detection was to be a “close partnership.”101 Federal

spending “on anti-terror since 9/11 has tripled.102. . . Estimates of private sector direct

spending on increased security range from $10 billion to $127 billion.”103 Presidential

executive orders since 9/11 repeatedly encourage cooperation between the two sectors

in infrastructure, critical cybercrimes, incident response, and maritime and health pol-

icy.104 The Bureau of Justice Assistance in the Department of Justice urges the creation

of partnerships between the public and private sector. To be a successful partnership,

12 essential components are needed:

• Common goals

• Common tasks

Chapter 7 • Public and Private Law Enforcement 327

Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:21:28.

C op

yr ig

ht ©

2 01

1. E

ls ev

ie r

S ci

en ce

& T

ec hn

ol og

y. A

ll rig

ht s

re se

rv ed

.

• Knowledge of participating agencies’ capabilities and missions

• Well-defined projected outcomes

• A timetable

• Education for all involved

• A tangible purpose

• Clearly identified leaders

• Operational planning

• Agreement by all partners as to how the partnership will proceed

• Mutual commitment to providing necessary resources

• Assessment and reporting 105

DHS formally encourages these sorts of arrangements. Throughout DHS policy

making is the perpetual recognition that it cannot go it alone and that it needs the daily

cooperation of the private sector. Within its Office of Policy, DHS has erected a Private

Sector Office, its chief aims being as follows:

• To engage individual businesses, trade associations, and other nongovernmental

organizations to foster dialogue with the department;

• To advise the secretary on prospective policies and regulations and in many cases on

their economic impact;

• To promote public-private partnerships and best practices to improve the nation’s

homeland security; and

• To promote department policies to the private sector.

Outreach by both sectors is critical to partnering success, though DHS appears to expect

the first initiative from the public sector.

n n n

Visit the Private Sector Office of the Department of Homeland Security (DHS) at http://www

.dhs.gov/xabout/structure/gc_1166220191042.shtm.

n n n

Summary This chapter pragmatically examines the current cooperative programs between public

and private law enforcement. While efforts to stress the commonality of interest between

private and public justice are ongoing, there are still glaring differences regarding legal

authority, rights, and obligations. There have been judicial and social efforts to extend

constitutional protections to private justice. While numerous attempts have been made

to color the activities of private policing as a state action or a governmental exercise,

which in turn affords more significant constitutional protections to the aggrieved suspect,

no permanent bridge has yet been built. Private security, for all of its shortcomings, still

has the upper hand procedurally when compared to the restraints of public policing.

Much of the chapter was concerned with the distinct, yet complementary functional

approaches to crime prevention, deterrence, and policy interests of the public and

328 PRIVATE SECURITY AND THE LAW

Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:21:28.

C op

yr ig

ht ©

2 01

1. E

ls ev

ie r

S ci

en ce

& T

ec hn

ol og

y. A

ll rig

ht s

re se

rv ed

.

private sectors, requirements in training and other qualifications, and a critical review of

stereotypic and prejudicial perceptions of both law enforcement interests. In the final

analysis, the preponderance of the evidence demonstrates that the public/private

division is more an exercise in human prejudice than in logic or knowledge. Public/

private cooperation would be an intelligent exercise of combined resources to combat

criminality in American society. Examples of the cooperation between college and

municipal police departments, private transit police forces, and other private/public

joint ventures were presented. While these examples are not scientifically probative,

they are illustrative success stories.

Finally, recommendations from the National Committee on Criminal Justice

Standards and Goals as well as the findings of the Hallcrest Reports I and II and the

Private Sector Office of the Department of Homeland Security were covered in depth.

The private security industry’s involvement in public justice activities, tasks, and obliga-

tions signals increased responsibility for the industry and demands it to be a major

contributor and policymaker in the elimination of crime and a safer world.

Discussion Questions 1. Offer a few recommendations on how to improve the interaction of private police

and public law enforcement.

2. Do police and private security have any common interests?

3. Does private sector justice have a moral or egalitarian purpose?

4. In your jurisdiction, are there any examples of mutual cooperation between public

and private law enforcement?

5. What are some drawbacks of having a state or local police commission exercising

regulatory oversight over the private security industry?

6. Pose three suggestions on how to equalize the status of public and private law

enforcement.

7. Would it be feasible for state or other governmental regulators to require the security

industry to donate time to assist public law enforcement in public order or public

safety activities?

Notes 1. Arthur J. Bilek, James C. Klotter, & R. Keegan Federal, Legal Aspects of Private Security 180 (1980);

James Pastor, Security Law and Methods (2006); James F. Pastor, Terrorism and Public Safety Polic- ing: Implications for the Obama Presidency (2009).

2. National Advisory Committee on Criminal Justice Standards and Goals, Private Security: Report of the Task Force on Private Security (1976); see also Operation Cooperation, Guidelines for Partner- ships Between Law Enforcement & Private Security Organizations 11 (2000).

3. National Advisory Committee, supra note 2, at 2; see also Operation Cooperation, supra note 2.

Chapter 7 • Public and Private Law Enforcement 329

Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:21:28.

C op

yr ig

ht ©

2 01

1. E

ls ev

ie r

S ci

en ce

& T

ec hn

ol og

y. A

ll rig

ht s

re se

rv ed

.

4. William C. Cunningham & Todd H. Taylor, Private Security and Police in America (1986); see also Experts Salute Public & Private Sectors on Crime Reduction Collaboration, Security Letter, July 8, 2002; Chris A. Bradford & Clifford A. Simonsen, The Need for Cooperative Efforts between Private Security and Public Law Enforcement in the Prevention, Investigation, and Prosecution of Fraud- Related Criminal Activity, 10 Security J. 161 (1998).

5. William C. Cunningham, John J. Strauchs, & Clifford W. VanMeter, Private Security Trends 1970 to 2000: The Hallcrest Report II 116 (1990); see also Operation Cooperation, supra note 2.

6. Cunningham et al., supra note 5, at 120; see also Operation Cooperation, supra note 2.

7. Cunningham et al., supra note 5, at 118.

8. Bill Strudel, The Private Security Connection: Giving the Police a Sense of Security, Police Chief, Feb. 1982, at 28-29; Law Commission of Canada, In Search of Security: The Roles of Public Police and Private Agencies (2002); George S. Rigakos, The New Parapolice (2002).

9. 2001 Industry Forecast, Security Mag., Chart 2 (2001).

10. Cunningham et al., supra note 5, at 121; see also Operation Cooperation, supra note 2.

11. International Chiefs of Police, National Policy Summit: Building Private Security/Public Policing Partnerships to Prevent and Respond to Terrorism and Public Disorder (2004), available at http:// www.cops.usdoj.gov/files/ric/Publications/national_policy_summit.pdf.

12. Cunningham et al., supra note 5, at 121.

13. International Chiefs of Police, supra note 11, at 18.

14. John E. Driscoll, Public and Private Security Forces Unite in Dallas, Police Chief, 1988, at 48; see also S. Ronald Hauri, Public-Private Security Liaison: The Synergy of Cooperation, Crime & Just. Int’l, Oct. 1997, at 16; Operation Cooperation, supra note 2.

15. Driscoll, supra note 14, at 48; see also Hauri, supra note 14.

16. Driscoll, supra note 14, at 48; see also Hauri, supra note 14.

17. Operation Cooperation, supra note 2, at 11; see also Pastor, Terrorism, supra note 1; James F. Pastor, The Privatization of Police in America: An Analysis and Case Study (2003).

18. Richard A. Lukins, Securing Training for the Guard Force, Security Mgmt., May 1976, at 32.

19. National Advisory Committee, supra note 2, at 5; see Mahesh K. Nalla & Don Hummer, Relations between Police Officers and Security Professionals: A Study of Perceptions, 12 Security J. 31 (1999).

20. National Advisory Committee, supra note 2, at 5; Hauri, supra note 14; Operation Cooperation, supra note 2, at 2-3.

21. Norman M. Spain & Gary L. Elkin, Private Security versus Law Enforcement, 16 Security World 32 (1979); see Nalla & Hummer, supra note 19; Hauri, supra note 14.

22. National Advisory Committee, supra note 2, at 5.

23. E. J. Criscuoli, Jr., Building a Professional Complement to Law Enforcement, Police Chief, 1978, at 28; see also Robert R. Rockwell, Private Guards: A Viewpoint, Security Mgmt., 1975, at 5; Nalla & Hummer, supra note 19; Hauri, supra note 14.

24. Richard W. Kobetz & H. H. A. Cooper, Two Armies: One Flag, Police Chief, 1978, at 28.

25. See generally Charles P. Nemeth, Status Report on Contemporary Criminal Justice Education (discussing education and its correlation to police professionalism) (1988).

26. Operation Cooperation, supra note 2.

27. National Advisory Committee, supra note 2, at 11.

28. Lukins, supra note 18, at 32.

29. Id.

330 PRIVATE SECURITY AND THE LAW

Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:21:28.

C op

yr ig

ht ©

2 01

1. E

ls ev

ie r

S ci

en ce

& T

ec hn

ol og

y. A

ll rig

ht s

re se

rv ed

.

30. Id. at 34; see also Pastor, Terrorism, supra note 1; Pastor, Privatization of Police, supra note 17.

31. See generally Private Security Advisory Council, Codes of Ethics for Private Security Management and Private Security Employees (1976); Private Security Advisory Council, Model Security Guard Training Curricula (1977); Private Security Advisory Council, Report on the Meeting of April 21-23, 1976 (1976); Nemeth, supra note 25.

32. Note, Certified Protection Security and Law Enforcement, Security Mgmt., 1980, at 75.

33. Howard C. Shook, Certified Protection Professional Progress Report, Security Mgmt., 1980, at 75.

34. Harold I. Peterson, Private Security v. Public Law Enforcement, Police Chief, 1983, at 26; see Nalla & Hummer, supra note 19; Hauri, supra note 14.

35. Peterson, supra note 34, at 27; see Nalla & Hummer, supra note 19; Hauri, supra note 14.

36. National Advisory Committee, supra note 2, at 12.

37. See Nemeth, supra note 25; see also Charles P. Nemeth, Directory of Criminal Justice Education, Including Criminology, Law and Justice Related Education (1991); Olson, A Comparison of Some Characteristics of Public and Private Security Personnel, 1 J. Security Admin. 51 (1978) (for further breakdown of the stereotypes on age, income, and educational level).

38. Cunningham et al., supra note 5, at 275-76.

39. Kobetz & Cooper, supra note 24, at 33.

40. See Charles P. Nemeth, Introduction to Homeland Security: Principles and Practice (2010); see also K. C. Poulin & Charles P. Nemeth, Private Security and Public Safety: A Community-Based Approach (2004).

41. Cunningham & Taylor, supra note 1, at 185; see Nalla & Hummer, supra note 19; Hauri, supra note 14.

42. Cunningham & Taylor, supra note 1, at 186.

43. Stephen C. George, Privatization & Integration, 29 Security 5 (1992).

44. Cunningham et al., supra note 5, at 272.

45. Cunningham & Taylor, supra note 1, at 187.

46. National Advisory Committee, supra note 2, at 14.

47. Cunningham & Taylor, supra note 1, at 196.

48. Kobetz & Cooper, supra note 24, at 32.

49. The Law Enforcement-Private Security Consortium, Operation Partnership: Trends and Practices in Law Enforcement and Private Security Collaborations (2005) http://www.ilj.org/publications/docs/ Operation_Partnership_Private_Security.pdf; see also Pastor, Terrorism, supra note 1; Pastor, Priva- tization of Police, supra note 17.

50. Harold W. Gray, Private Security—Some Comments, Police Chief, 1978, at 34; see also Bilek et al., supra note 1, at 206.

51. Daniel E. McElory, A Professional Alliance, Security World, 1979, at 34, 37-38.

52. Andrew Morabito & Sheldon Greenberg, Engaging the Private Sector To Promote Homeland Secu- rity: Law Enforcement-Private Security Partnerships(2005) at http://www.ncjrs.gov/pdffiles1/bja/ 210678.pdf.

53. William R. Bess & Galen L. Ash, City/University Cooperation, Police Chief, 1982, at 42; see also Ronso, The U.S. Air Force Security Police: Is There a Civilian Counterpart? Police Chief, 1982, at 32.

54. Bess & Ash, supra note 53.

55. Fabricio Rodriguea, Philadelphia Security Officer Union, Social Policy 4, 6 (Winter 2010).

56. 20 U.S.C.A. }1092 (West 2010).

Chapter 7 • Public and Private Law Enforcement 331

Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:21:28.

C op

yr ig

ht ©

2 01

1. E

ls ev

ie r

S ci

en ce

& T

ec hn

ol og

y. A

ll rig

ht s

re se

rv ed

.

57. 20 U.S.C.A. }1092(f) (West 2010).

58. Note, Federal Guidance Lacking as Colleges Report Crime Statistics, 30 Security 12 (1993).

59. John W. Powell, Security, 3 Coll. Univ. Bus. Admin. 5 (1974).

60. Harry Budds, Los Angeles Transit Police: A Unique Agency Taking on Unique Challenges, Police Chief, 1982, at 30.

61. Id. at 31.

62. Id.

63. U.S. Dept. of Transportation, Federal Transit Administration, Transit Security Handbook (1998); 4 Transportation Research Board, Public Transportation Security: Intrusion Detection for Public Transportation Facilities Handbook (2004) at http://trb.org/publications/tcrp/tcrp_rpt_86v4.pdf.

64. Bureau of Justice Assistance, Engaging the Private Sector to Promote Homeland Security: Law Enforcement-Private Security Partnerships 11 (2003).

65. The White House Web site, Homeland Security Page, at http://www.whitehouse.gov/issues/ homeland-security.

66. Press Release, Homeland Security Research Corporation, Private Sector to Become 2nd Largest Homeland Security Industry Customer by 2011 (April 9, 2008).

67. For an examination of how these privatized practices prompt ethical concerns, see Kateri Carmola, Private Security Contractors in the Age of New Wars: Risk, Law & Ethics (2008).

68. Bureau of Justice Assistance, supra note 64, at 11.

69. Dale Pancake, The New Professionals: Cooperation between Police Departments and Private Security, Police Chief, 1983, at 34; see also James McGuire, Michael O’Mara & Albert Ware, Training: The Bridge that Connects Public and Private Police, Police Chief, 1983, at 38.

70. Pancake, supra note 69, at 35; David H. Bayley & Clifford D. Shearing, The New Structure of Polic- ing: Description, Conceptualization, and Research Agenda—NCJ 187083 (2001).

71. Cunningham et al., supra note 5, at 255.

72. Id. at 255-256.

73. Note, Private Security and Police Join Training Forces in Washington, Police Chief, Oct. 1992, at 170. Information regarding the program can be obtained from: Washington State Security Council, 6632 S. 191st Place, E-107, Kent, Washington 98032; (206) 872-2450; fax: (206) 872-1403.

74. Bureau of Justice Assistance, Operation Cooperation: Guidelines for Partnerships between Law Enforcement & Private Security Organizations 5 (2000), available at http://www.ilj.org/ publications/docs/Operation_Cooperation.pdf

75. James A. Kirkley, The Role of the Police in Private Security, Police Chief, 1982 at, 35; see Nalla & Hummer, supra note 19; Hauri, supra note 14.

76. National Advisory Committee, supra note 2.

77. National Advisory Committee, supra note 2.

78. National Advisory Committee, supra note 2, at 207.

79. National Advisory Committee, supra note 2, at 211.

80. National Advisory Committee, supra note 2, at 214.

81. National Advisory Committee, supra note 2, at 210.

82. National Advisory Committee, supra note 2, at 222.

83. National Advisory Committee, supra note 2, at 226.

84. National Advisory Committee, supra note 2, at 231.

332 PRIVATE SECURITY AND THE LAW

Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:21:28.

C op

yr ig

ht ©

2 01

1. E

ls ev

ie r

S ci

en ce

& T

ec hn

ol og

y. A

ll rig

ht s

re se

rv ed

.

85. National Advisory Committee, supra note 2, at 236.

86. Cunningham & Taylor, supra note 4, at 237; for a summary of the entire Report see, William C. Cunningham & Todd H. Taylor, Crime and Protection in America: A Study of Private Security and Law Enforcement Resources and Relationships, NCJ Number: 93660 (1984).

87. Cunningham & Taylor, supra note 4, at 241.

88. Cunningham & Taylor, supra note 4, at 242.

89. Cunningham & Taylor, supra note 4, at 242 (1986).

90. Cunningham & Taylor, supra note 4, at 242 (1986).

91. Cunningham & Taylor, supra note 4, at 247 (1986).

92. Cunningham & Taylor, supra note 4, at 249 (1986).

93. Cunningham & Taylor, supra note 4, at 250 (1986).

94. Cunningham & Taylor, supra note 4, at 254 (1986).

95. Cunningham & Taylor, supra note 4, at 259 (1986).

96. Cunningham & Taylor, supra note 4, at 262 (1986).

97. Cunningham & Taylor, supra note 4, at 265-266 (1986).

98. Cunningham & Taylor, supra note 4, at 271 (1986).

99. Ira S. Somerson, Preface to Security @ the Millennium, presentation at ASIS International Seminar and Exhibits, Sept. 27-29, 1999.

100. Office of Homeland Security, Office of the President, National Strategy for Homeland Security 12 (2002).

101. Id.

102. Bart Hobijn, What Will Homeland Security Cost?, Fed. Res. Bank N.Y. Econ. Pol’y Rev., Nov. 2002, at 23, available at http://www.ny.frb.org/research/epr/02v08n2/0211hobi.html.

103. Id. at 28.

104. Diane Ritchey, Public and Private Security: Bridging the Gap, Security Mag. Online, June 1, 2010, at 2, available at http://www.securitymagazine.com/articles/public-and-private-security-bridging- the-gap-1.

105. Bureau of Justice Assistance, supra note 64, at 13.

Chapter 7 • Public and Private Law Enforcement 333

Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:21:28.

C op

yr ig

ht ©

2 01

1. E

ls ev

ie r

S ci

en ce

& T

ec hn

ol og

y. A

ll rig

ht s

re se

rv ed

.

Intentionally left as blank

Nemeth, C. (2011). Private security and the law. ProQuest Ebook Central <a onclick=window.open('http://ebookcentral.proquest.com','_blank') href='http://ebookcentral.proquest.com' target='_blank' style='cursor: pointer;'>http://ebookcentral.proquest.com</a> Created from apus on 2020-10-13 13:21:28.

C op

yr ig

ht ©

2 01

1. E

ls ev

ie r

S ci

en ce

& T

ec hn

ol og

y. A

ll rig

ht s

re se

rv ed

.

Get help from top-rated tutors in any subject.

Efficiently complete your homework and academic assignments by getting help from the experts at homeworkarchive.com