OPSEC

2) Understanding that protection of sensitive unclassified information is: 

The responsibility of only the OPSEC Program Managers

***** The responsibility of all persons, including civilians and contractors

The responsibility of Contractors

The responsibility of Military members

The responsibility of Military and Government Civilians


5) OPSEC is concerned with: 
The daily administrative activities associated with military operations.

Identifying and controlling classified information.
Identifying and controlling classified and unclassified information.
Controlling the operations of daily activities.

****** Identifying, controlling, and protecting unclassified information that is associated with specific military operations and activities.



7) Where is the CIL located? 
In the EUCOM J2/Intelligence Directorate.
On the EUCOM NIPR and SIPR homepages and accessed via the OPSEC ICON.
On the wall of the EUCOM J3/Joint Operations Center.
On both the NIPR and SIPR desktops via the OPSEC ICON
******** On NIRP and SIPR desktops and on the EUCOM NIPR and SIPR homepages and accessed via the OPSEC ICON.
________________________________________
8) What is the CIL? 
None of the answers are correct.

The Consolidated Intelligence Listing.

The Center for Information at Langley.

The Classification of Intelligence List. 

****** The Critical Information List.

________________________________________
________________________________________
10) OPSEC countermeasures can be used to: 
Assist in the development of daily support to secure all unclassified information.

***** Prevent the adversary from detecting an indicator and from exploiting a vulnerability.

Prevent the adversary from detecting an indicator.
Assist in the identification of OPSEC vulnerabilities.

Prevent the adversary from exploiting a vulnerability.





11) OPSEC is: 
A COMSEC function and not a security function.
****** An operations function, not a security function.
A security function not an operations function.
None of the answers are correct.

All of the answers are correct.

________________________________________
12) The Joint COMSEC Monitoring Activity provides OPSEC assistance by: 
****** Monitoring unclassified government telephones and monitoring NIPR email traffic.

Monitoring communications only for specific named operations.

Monitoring unclassified government telephones.

Monitoring NIPR email traffic.

Monitoring of COMMAND SECURITY (COMSEC) processes and procedures.



13) Operations Security (OPSEC) defines Critical Information as: 


Classified information critical to the development of operational plans.


Information needed by NATO forces in order to coordinate coalition and multinational operations.

Classified information critical to the development of all military activities


All answers are correct.


****** Specific facts about friendly intentions, capabilities, and activities needed by adversaries to plan and act effectively against friendly mission accomplishment.

________________________________________

2) The purpose of OPSEC is to: 

Inform all members of the military the dangers associated with improper handling of operational plans.
Increase the amount of time required to develop a CONOP or standing plan.
Prevent the adversary from gaining access to classified information.

****** Reduce the vulnerability of US and multinational forces from successful adversary exploitation of critical information.
All answers apply.



1. OPSEC is : A process that is a systematic method used to identify , control and protect critical information.
2. OPSEC''S most important characteristic is that: IT IS A PROCESS
3. OPSEC Planning should focus on: IDENTIFYING AND PROTECTING CRITICAL INFORMATION
4. OPSEC is: AN OPERATIONS FUNCTION, NOT A SECURITY FUNCTION
5. OPSEC is concerned with: IDENTIFYING, CONTROLLING AND PROTECTING UNCLASSIFIED INFORMATION THAT IS ASSOCIATED WITH SPECIFIC
MILITARY OPERATIONS AND ACTIVITIES
6. A vulnerability exists when: THE ADVERSARY IS CAPABLE OF COLLECTING CRITICAL INFORMATION, CORRECTLY ANALYZING IT AND THEN TAKING
TIMELY ACTION
7. Where is the CIL located:
8. All EUCOM personnel must know the difference between: OPSEC AND TRADITIONAL SECURITY
9. OPSEC as a capability of Information Operations: DENIES THE ADVERSARY THE INFORMATION NEEDED TO CORRECTLY ASSESS FRIENDLY
CAPABILITIES AND INTENTIONS.
10. OPSEC countermeasures can be used to: PREVENT THE ADVERSARY FROM DETECTING AN INDICATOR AND FROM EXPLOITING A VULNERABILITY.


What is the condition achieved from the denial of critical information to the adversary?

Essential Security

OPSEC

Operations Security

What does OODA stand for?

Observe, Orient, Decide and Act

What document/regulation created OPSEC

NSDD 298 passed in 1988 by President Ronald Regan

What are the four core features of the OPSEC program

Written appointment orders, 5 step process , Completed SOP with CIL list (unclassified) , Coordination of traditional and OPSEC programs

What are the five characteristics of indicators

Signature, Profile, Association, Contrast , Exposure

What factor is OPSEC driven by?

Threat

What are the categories of OPSEC measures

Action control , Countermeasures , Counteranalysis

Essential secrecy is required to maintain the element of _________

Surprise

What are the categories of threats?

Intelligence, Foreign/Domestic, Traditional/Non-Traditional, Combination of the above

What are the five main methods of Intelligence Collection?

HUMINT, OSINT, MAISNT, SIGNIT, GEOINT

What condition exists when an adversary can and does conduct OODA effectively against a unit/organization?

Vulnerability

Shred and Burn is an example of what OPSEC measure?

Action Control

What two things must there be for a threat to exist?

Intent and Capability

Information that is important to the mission is called_________

Critical information

Essential Secrecy is a combination of ______

Traditional and OPSEC programs

Controlled unclassified information is a form of ________

Critical info

What AR covers OPSEC

AR 530-1

True or False; Intelligence Collection is a random effort?

False

What is recommended for the widest dissemination of OPSEC Information and plans?

Unclassified CIL

What is CALI?

Capabilities, Activities, Limitations, Intentions

Disclosure of critical information is known as what?

OPSEC Compromise

Data derived from open sources or from detectable actions that adversaries can piece together to reach conclusions on friendly activities, capabilities and actions is known as what?

Indicators

Who decides how much risk to accept?

The Commander

What does RAM stand for?

Random anti-terrorism measure

IIA is the title of what Army Pub?

FM 3-13

________ Effectiveness comes in large part in changing daily routine?

RAM's

Each Sap will have a written OPSEC program from _____ to _______

Conception to Disestablishment

OPSEC can conflict with other elements of IO?

True

Each _______will have a full time Security Manager

SAP

What is the probability that an adversary will compromise critical info and impact if they are successful

Risk

MCTL stands for what?

Military Critical Technologies List

MEVA is defined as?

Mission Essential Vulnerable Area

Manufacturing know how, technical data, Keystone manufacturing are examples of?

Technology transfer restricted items

Who decides what risk to take

The commander

FOUO, LES, SBU, DEA, LIMDIN etc are caveats for what?

Controlled unclassified information (CUI)

What is the Risk Equation?

Impact x(threat x vulnerability) =r

_____ is defined as the risk left over after measures are put in place

Residual Risk

OPSEC is what kind of IO element?

Defensive (it can be offensive )

OPSEC measures are drawn from which areas?

Any Discipline

What does APP stand for?

Army Protection Program

How many FOIA exemptions exist?

Nine

What is referred to as the global domain?

Cyberspace

In Force Protection there are two phases, in which phase does OPSEC work best? (APP linked)

Proactive

When looking at Risk, which method achieves an acceptable level of risk at an acceptable level of cost?

Risk Management

What is the art of persuading someone to give up info?

Social Engineering

What are the two classes of designation of technology?

Existing and Proposed

80% of terrorist collection is through open source method

True (Manchester doc)

What is the disclosure of critical or sensitive info that jeopardizes mission and personnel etc?

OPSEC Compromise

Who decides which measures to implement and when?

The Commander

Opsec docs should be updated

Annually

Two types of Opsec assessments

Requested and directed

_________should be conducted with on the spot corrections

Self assessments

Joint Opsec docs/ formats are stated and required by what guidance ?

Cjcsm 3213 and JOPES II

Opsec in contracts matter

Almost all units need contractors. Allows for guidance etc

OPSEC ASSESSMENTS ARE CONDUCTED TO DETERMINE

Posture and compliance

In contracting, what doc outlines Opsec req

DD254

Minimum Opsec training req

Initial, annually, pre and post deployment

Opsec review is a formal process T/ F

True

Purpose of Opsec reviews are to ?

technically correct evaluation etc

PAO clearances are the same as OPSEC clearances . True or false

False


OPSEC Level II

Operations Security

What does OPSEC stand for?

5 Step OPSEC Process

Critical Info; Threat; Vulnerability; Risk and Apply OPSEC measures (mitigation)

2 base components of Essential Secrecy

Traditional Security and Operations Security (OPSEC)

A category of OPSEC indicators is?

SPACE (signature; profile; association; contrast and exposure)

Good characteristics of a good CIL

Unclassified; 10 items or less; widest dissemination

Why conduct an OPSEC review?

Evaluate compliance to regulatory guidance, prevent potential release of critical information; to evaluate a product or document with new eyes

What is CALI?

Capabilities, Activities, Limitations, and Intentions

What is RISK?

The probability that an adversary will compromise your Critical Information and the resulting impact if successful

In order to have a threat, you must have what two components?

Intent and capability

What is VULNERABILITY?

It is the action of an adversary after careful observation, and positioning in order to plan to effectively act against a friendly organization

What is the regulation for SAP?

AR 380-381

What is the Army Regulation for OPSEC?

AR 530-1

When did Regan sign NSDD 298?

1988

Simple version of the OPSEC 5 step process

1. problem, 2. it could get worse, 3. damage, 4. timing (odds of it getting worse), 5. mitigation...

Essential Secrecy is?

The condition achieved from denial of critical information to adversaries through the combined efforts of:
a.) Traditional Security programs and
b.) the Operations Security process...

Essential Secrecy is?

A two-pronged approached, managing National requirements at the Strategic; Operational, and Tactical levels...

CALI maintains our "Element of Surprise" by?

Denying enemies information... It is a key part of Essential Secrecy

Who owns the OPSEC program...?

The Commander

Who determines what will and will not be protected?

The Commander

What is a key responsibility/duty of the OPSEC officer?

To support the Commander

Other responsibilities/duties of the OPSEC officer include?

1. Producing Official Policy Letter
2. Coordinating functions within a Working Group
3. Publishing an OPSEC SOP
4. Interagency Integration
5. Develop a CIL
6. Publish an Annual Report
7. Conduct/Promote OPSEC Training and Awareness
8. Conduct OPSEC Reviews
9. Take part in self/external program Assessments

Critical Information comes from?

1. Protected Sources
2. Open Sources
3. Detectible Actions
NOTE: Intelligence Collection is not a Random Effort

All OPSEC measures are implemented to?

Protect Critical Information

Critical Information may be____________ or ____________ sensitive.

"Time" or "Event"

What is Threat driven?

OPSEC... Threat = Intent + Capability

What are some of the traditional Collection Methods?

HUMINT; SIGINT; GEOINT; OSINT and MASINT

Two types of HUMINT collection are?

Overt and Covert

Foreign Intelligence Services employ the following HUMINT methods?

1. Recruiting (R)
2. Elicitation (E)
3. Planting (P)

Thinking like an Adversary collecting Critical Information UNDERSTAND and REMEMBER that...

Collection is "not" a Random Effort

Levels of Vulnerabilities exist at the?

1. Strategic Level, (S)
2. Operational Level, and the (O)
3. Tactical Level (T)

Adversary analysts develop perceptions by?

1. Piecing the Indicators Together
2. Conducting a Comparative Analysis identifying Trends
3. Report Observations for Review Cand await Guidance

3 Categories of OPSEC Measures include?

1. Action Control (A)
2. Countermeasures (C)
3. Counter Analysis (C)

Action Control measures are?

Means of Mitigation, to include TRAINING...

Countermeasures can look like?

Signal Jamming

Counter analysis can look like?

Use of Deceptions / Decoys and False leads...

A form of Risk Management is a Table Top Exercise, why is this employed?

It helps leaders learn to make informed decisions regarding available courses of action.

What is the OPSEC definition of Risk?

The "probability" an adversary will compromise Critical Information and the "impact" is the severity of the damage taken when they are successful

What does R = I x ( T x V ) mean?

Risk equals Impact x threat x vulnerability

What is the current risk without OPSEC measures

Failure

FOIA is?

A public record. ANY official writing or recording.

How many FOIA exemptions are there?

(9) Nine

OPSEC Review supports a responsible release of records tagged under?

FOIA documents requests...

DD Form 254

Classified / Uncalssified Contract Review...

PAO is NOT the same as an?

OPSEC Review

How many Functional Elements are there?

(2) Two -- Warfighter & Non Warfighter

What is the purpose / possible uses for OPSEC Working Groups?

1. Awareness for the Cmd
2. Review Websites
3. Review Contracts

OPSEC Measures are?

The Cmdrs option

OPSEC Measures are?

Directive in nature

Risk Management?

Helps leaders make informed decisions regarding course of action

Probability is referred to as?

Hazard

Impact is referred to as?

Severity

Cyberspace is?

A global domain within the information environment

Cyberspace Operations consist if (3) three functions

1. Offensive cyber ops
2. Defensive cyber ops
3. DoD info network ops

What are some Types of cyber threats

1. FIS
2. Cyber Terrorist
3.. Criminals
4. Insiders
5. Hackers

Social Media uses are

1. Official
2. Professional
3. Personal

Critical Program Information ( CPI )

1. DoD 5230.25
2. DoD 5230.24


Security and OPSEC

Revoking

DoN Central Adjudification Facility - Lost clearance completely

Suspended

CO - 10 days

SF-86

Form to initiate or renew a clearance

Visitor's Request

Through JPAS

Spillage

Classified info put on NIPR

How often do you change your password

90 days

JPAS

Joint Personnel Adjudication System

DoD CAF

Department of Defense Central Adjudication Facility

Sanitize

Lock workstations; Cover Classified Info; Put material away; Stop Convo; Announce Visitor

ATFP

Anti-terrorism; Force Protection - Detect/Recover

FVEY

Releasing designator that tells which countries may view the info

RAM

Random Antiterrorism Measures

Emergency Destruct

CO may initiate emergency destruction (all classified material is destroyed)

Order to destruct

TS/S/C/U

Who can initiate E.D.

CO

Methods of destroying

Shred, Burn, Pulp, Smash, (Jettisoned)

SCI

Sensitive Compartmented Information

SCIF

Sensitive Compartmented Information Facility

SCIF onboard

JIC, SSES, EXPLOT

INFOCON 5

Nets are fully operational

INFOCON 4

Impact to end users is negligible

INFOCON 3

Impact to end users is minor

INFOCON 2

Impact to end users can be significant

INFOCON 1

Highest readiness condition

COR Audit and Time Frame

Every 24 months a formal inspection is held of all COMSEC related equipment

Pre COR Audit and Time Frame

6 months prior to COR audit, a courtesy one

DCS

Defense Courier Service - Network of couriers that carry classified material around world

TSCO (LT Heinen)

Top Secret Control Officer - Responsible for all TS material

THREATCON

Progressive level of protective measures implemented by all DoD components in response to terrorist threats

SF 700

Combo Card / Secure Container Information Form

SF 701

End of Day / Activity Secure Checklist

SF 702

Open Closure / Secure Container Checklist

SF 703

TS Cover Sheet

When MUST combo be changed

Default / Taken out of service / Compromise / Maintenance has been done / Personnel Transfer / Personnel loses clearance / Every two years; if none the above occurs

FDO

Foreign Disclosure Officer - Decides what classified info can be given to foreign nations

SSO

Special Security Officer

SSO (LT Tortora)

Special Security Officer - Responsible for all SCI material on ship; Make sure all SCIF's onboard as well as equipment in accordance with Security Regulations - Maintain security standards while in secure spaces - Oversee and make sure no Practices Dangerous to Security or Security Violations occur (Leaks, Spillage, Compromise)

TS

Top Secret - Orange - Exceptionally Grave Danger

S

Secret - Red - Serious Damage

C

Confidential - Blue - Damage

U

Unclassified - Green - No Damage

Need to know

Info a person needs to know to do their job

TS or TS/SCI (Renewal)

5 years

S (Renewal)

10 years

C (Renewal)

15 years

SAER

Secure Access Eligibility Report - Up/Downgrade Clearance

When would SAER be used

If person loses clearance

Vulnerabilities w/ Wireless Devices

Can be hacked via wireless connection, info can be stolen or contacts spammed

ATO

Authority to Operate - Allowed to put something on a Navy network

IATO

Interim Authority to Operate - Holds approval to test the info on the network, then receives ATO

OPSEC

Systematic process that controls and protects info about mission

Responsibility of Command OPSECO

Notify CO of all OPSEC matters / Coordinating the development of OPSEC-related portions of operations / IO Planning / Command's OPSEC program / EDU / Training

OPSEC consider Public Affairs

What info should be released to public

WRA

Web Risk Assessment - Content is assessed for compliance w/ all applicable DoD and DoN policies and Guidelines

OPSEC Countermeasures

Prevent the adversary from detecting an indicator

OPSEC Countermeasure examples

Rivercity, EMCON, COMPUSEC, COMSEC

NOST

Naval OPSEC Support Team - Conducts inspection on command OPSEC programs

IOSS

Interagency OPSEC Support Staff - Services to the OPSEC officer, both prospective and current, in the form of OPSEC-Related materials and most importantly, training

JCMA

Joint COMSEC Monitoring Activity - Are hired by customers to provide COMSEC monitoring on COMMS

NCIS

Naval Criminal Investigation Service - Prevent terrorism - Protect against compromise, reduce criminal (all against DoN)

PURPOSE of EW

The control of the Electromagnetic Spectrum

3 parts of EW

Electronic Attack (Jamming / CHAFF) - Electronic Protect (PCMS / EMCON) - Electronic Support (Signal Collection / Dissemination)

3 Basic Components of Radar

Transmitter / Receiver / Antenna

SONAR

Sound Navigation and Ranging - Like radar but underwater

HULTEC

Hull to Emitter Correlation (I see Signal -> Signal from Radar -> Radar from Ship)

MISO

Military Info Support Ops - Aimed at influencing general population

EEFI

Essential Elements of Friendly Information - Key info about intentions, capabilities and activities adversaries try to acquire - Answers to EEFI can potentially lead to Critical Information

Critical Information

Info about friendly activities, intentions, capabilities, or limitations an adversary seeks in order to gain a military advantage.

Ramification of Critical Info

Endangers missions, the loss of service members and/or family


OPSEC ATI GOM

Revoking

DoN Central Adjudification Facility - Lost clearance completely

Suspended

CO - 10 days

SF-86

Form to initiate or renew a clearance

Visitor's Request

Through JPAS

Spillage

Classified info put on NIPR

How often do you change your password

90 days

JPAS

Joint Personnel Adjudication System

DoD CAF

Department of Defense Central Adjudication Facility

Sanitize

Lock workstations; Cover Classified Info; Put material away; Stop Convo; Announce Visitor

ATFP

Anti-terrorism; Force Protection - Detect/Recover

FVEY

Releasing designator that tells which countries may view the info

RAM

Random Antiterrorism Measures

Emergency Destruct

CO may initiate emergency destruction (all classified material is destroyed)

Order to destruct

TS/S/C/U

Who can initiate E.D.

CO

Methods of destroying

Shred, Burn, Pulp, Smash, (Jettisoned)

SCI

Sensitive Compartmented Information

SCIF

Sensitive Compartmented Information Facility

SCIF onboard

JIC, SSES, EXPLOT

INFOCON 5

Nets are fully operational

INFOCON 4

Impact to end users is negligible

INFOCON 3

Impact to end users is minor

INFOCON 2

Impact to end users can be significant

INFOCON 1

Highest readiness condition

COR Audit and Time Frame

Every 24 months a formal inspection is held of all COMSEC related equipment

Pre COR Audit and Time Frame

6 months prior to COR audit, a courtesy one

DCS

Defense Courier Service - Network of couriers that carry classified material around world

TSCO (LT Heinen)

Top Secret Control Officer - Responsible for all TS material

THREATCON

Progressive level of protective measures implemented by all DoD components in response to terrorist threats

SF 700

Combo Card / Secure Container Information Form

SF 701

End of Day / Activity Secure Checklist

SF 702

Open Closure / Secure Container Checklist

SF 703

TS Cover Sheet

When MUST combo be changed

Default / Taken out of service / Compromise / Maintenance has been done / Personnel Transfer / Personnel loses clearance / Every two years; if none the above occurs

FDO

Foreign Disclosure Officer - Decides what classified info can be given to foreign nations

SSO

Special Security Officer

SSO (LT Tortora)

Special Security Officer - Responsible for all SCI material on ship; Make sure all SCIF's onboard as well as equipment in accordance with Security Regulations - Maintain security standards while in secure spaces - Oversee and make sure no Practices Dangerous to Security or Security Violations occur (Leaks, Spillage, Compromise)

TS

Top Secret - Orange - Exceptionally Grave Danger

S

Secret - Red - Serious Damage

C

Confidential - Blue - Damage

U

Unclassified - Green - No Damage

Need to know

Info a person needs to know to do their job

TS or TS/SCI (Renewal)

5 years

S (Renewal)

10 years

C (Renewal)

15 years

SAER

Secure Access Eligibility Report - Up/Downgrade Clearance

When would SAER be used

If person loses clearance

Vulnerabilities w/ Wireless Devices

Can be hacked via wireless connection, info can be stolen or contacts spammed

ATO

Authority to Operate - Allowed to put something on a Navy network

IATO

Interim Authority to Operate - Holds approval to test the info on the network, then receives ATO

OPSEC

Systematic process that controls and protects info about mission

Responsibility of Command OPSECO

Notify CO of all OPSEC matters / Coordinating the development of OPSEC-related portions of operations / IO Planning / Command's OPSEC program / EDU / Training

OPSEC consider Public Affairs

What info should be released to public

WRA

Web Risk Assessment - Content is assessed for compliance w/ all applicable DoD and DoN policies and Guidelines

OPSEC Countermeasures

Prevent the adversary from detecting an indicator

OPSEC Countermeasure examples

Rivercity, EMCON, COMPUSEC, COMSEC

NOST

Naval OPSEC Support Team - Conducts inspection on command OPSEC programs

IOSS

Interagency OPSEC Support Staff - Services to the OPSEC officer, both prospective and current, in the form of OPSEC-Related materials and most importantly, training

JCMA

Joint COMSEC Monitoring Activity - Are hired by customers to provide COMSEC monitoring on COMMS

NCIS

Naval Criminal Investigation Service - Prevent terrorism - Protect against compromise, reduce criminal (all against DoN)

PURPOSE of EW

The control of the Electromagnetic Spectrum

3 parts of EW

Electronic Attack (Jamming / CHAFF) - Electronic Protect (PCMS / EMCON) - Electronic Support (Signal Collection / Dissemination)

3 Basic Components of Radar

Transmitter / Receiver / Antenna

SONAR

Sound Navigation and Ranging - Like radar but underwater

HULTEC

Hull to Emitter Correlation (I see Signal -> Signal from Radar -> Radar from Ship)

MISO

Military Info Support Ops - Aimed at influencing general population

EEFI

Essential Elements of Friendly Information - Key info about intentions, capabilities and activities adversaries try to acquire - Answers to EEFI can potentially lead to Critical Information

Critical Information

Info about friendly activities, intentions, capabilities, or limitations an adversary seeks in order to gain a military advantage.

Ramification of Critical Info

Endangers missions, the loss of service members and/or family


Operations Security/ Officer Liability/ Federal Criminal Las / Fourth Amendment/ Arrest

OFFICER LIABILITY-EPO #1: Identify the five-step OPSEC process.

Identification of Critical Information, Analysis of Threat, Analysis of Vulnerabilities, Assessment of Risks, Application of Countermeasures

Enables OPSEC practitioners to accurately assume the perspective of an adversary.

Analysis of Threat

Two elements of threat

Intent & Capability

Ways that adversaries use to gather information

Communications, imagery, Trash, Open Source, Human, Computer Accessing

Enables the identification of indicators that could be exploited by an adversary

Analysis of Vulnerabilities

Critical Information posted on the internet and Non-secure communication are-

Examples of Vulnerabilities

Vulnerabilities and specific threats must be matched.

Assessment of Risks

Risk is determined by analyzing three factors

Threat, Vulnerability, and Impact

Anything that effectively negates an adversary's ability to exploit vulnerabilities.

Application of Countermeasures

Limiting web page access, shredding sensitive documents, sanitizing bulletin boards, monitoring public conversations, not using e-mail to discuss sensitive operations.

Individual Application of Countermeasures

Procedure changes, deception, background checks, physical security, perception management, speed of execution, stopping the mission,

Agency wide Application of Countermeasures

OFFICER LIABILITY-EPO #2: Identify the elements, applicability, and scope of 42 U.S.C. § 1983 and the Bivens Analogy.

An Act, Committed under color of state law, That deprives a person
Of rights, privileges, or immunities guaranteed by the Constitution of federal law.

A civil wrong, other than breach of contract, for which the court will provide a remedy in the form of an action for damages. The remedy can involve money damages or an injunction.

Tort

OFFICER LIABILITY- EPO #3: Recognize the most common incidents of civil liability for Federal Law Enforcement Officers under Bivens and the defense of qualified immunity.

Unlawful Searches and Seizures, False/Misleading Warrant Affidavits, Excessive Use of Force and Failure to Intervene

OFFICER LIABILITY-EPO #4: Recognize incidents of potential civil liability for Federal Law Enforcement Officers under state tort theories and the FTCA protection from individual liability

Negligent torts & Intentional torts - Federal Tort Claims Act (FTCA)

Sued six federal agents under § 1983, when agents entered apartment without warrant and searched apartment and arrested Bivens. - Trial court dismissed

Bivens v. Six Unknown Agents of the Federal Bureau of Narcotics (1971)

The Supreme Court in essence created an analogy to 42 U.S.C. § 1983 under which federal officers and agents may be sued in civil court for violating a person's Constitutional rights.

a "Bivens Action."

When a federal law enforcement officer makes an arrest without probable cause or unlawfully conducts a search,

A Bivens suit can be filed against the officer.

In determining whether a Bivens suit for an unlawful warrantless arrest is proper, the courts must determine whether

a reasonable officer could have believed the arrest to be lawful, and the information the arresting officers possessed.

Officials such as legislators in their legislative functions, judges in their judicial functions, and certain executive branch officials such as the President, and prosecutors, whose special functions or constitutional status requires complete protection from suit, may assert the defense of

Absolute immunity

Immunity has its common law roots in England under the theory that "the King can do no wrong." This theory was an outgrowth of the divine rights of kings, and, in effect, prevented any and all lawsuits against the Crown.

Sovereign (governmental) immunity

Absolute immunity is conferred because of the status or position of the favored defendant to

Avoids personal civil liability.

Based on violation of rights found in the U.S. Constitution.

Constitutional Torts

Principles of civil liability that exist under the laws of the states.

State Law Torts

Only for state, local, DC, territorial officials in federal court (NO Federal officers/agents)

Title 42 USC § 1983 Civil Action for Deprivation of Rights

Applies to federal action- Limited to 4th, 5th, and 8th Amendment violations
"Objectively reasonable" standard

Bivens Actions

Immunity from civil suit and entitles an officer to avoid standing trail or face the burdens associated with civil litigation. This immunity applies to LEO when that LEO is sued for a constitutional tort ONLY.

Qualified immunity

LEO acted reasonable and in "good faith" and
conduct of LEO does not violate "clearly established" constitutional/statutory rights of which a reasonable LEO would have known.

Protects LEO from civil liability

Elements of Negligent torts

Duty, Breach of Duty; Causation; and Damages

Negligent torts and Intentional torts

State law torts

Intentional torts is a state law torts applicable to federal law enforcement officers includes:

battery, assault, false imprisonment

The care exercised was below the standard of care established by custom or usage

Breach of duty

The defendant's act that breached the duty of care must be the cause of plaintiff's damages

Causation

Willful and intentional act that causes the damages
- Intentional torts to persons: battery, assault, false imprisonment, false arrest, and intentional infliction of emotional stress.

Intentional Tort to person

Trespass (damage) to Land (real property); trespass (damage) to Chattels (personal property); Conversion (personal property) (theft);

Intentional Tort to property

Makes the US liable for acts of employees NOT FOR CONSTITUTIONAL TORTS

Federal Tort Claims Act FTCA

Partial waiver of sovereign immunity to provide redress to citizens. Protects federal employees from personal liability for torts committed within the scope of their employment.

FTCA Purpose

Only covers employees from negligent torts if they are operating in the "course and scope" of employment, BUT covers federal LEO (anyone with full arrest or seizure authority) for intentional torts

FTCA

Determination of whether the employee was performing the employer's (federal gov't) business at the time of the occurrence.

Scope of Employment

FTCA statute of limitations

Two Years

FTCA claim must be file first, cannot sue in court initially and must be in a U.S. District Court, with no jury, and judged by -

federal judge

In essence the Act extends the federal scope of employment to non-federal crimes of violence being committed in the federal officer's presence.

"Federal Law Enforcement Officers' Good Samaritan Act."

Provides that they are within the scope of employment when taking reasonable action, including the use of force: (1) to protect an individual in the presence of an officer from a crime of violence; or (2) to provide immediate assistance to individuals who have suffered or who are threatened with bodily harm; or (3) to prevent the escape of any individual whom the officer reasonably believes to have committed in the presence of the officer a crime of violence.

The Federal LEO "Good Samaritan Act."

Protects federal employees from personal liability for torts committed within the scope of their employment.

Federal Tort Claims Act (FTCA)

Title18 U.S.C. § 3109is commonly referred to as the

"Knock-and-announce statutes"

Protective Sweep is conducted to

protect the officers and others

Officers may only "sweep" those spaces where

an individual might be found.

Incriminating evidence found during a lawful protective sweep may be seized under the-

Plain View doctrine

Allows officers to seize evidence they discover while in a public place or lawfully inside an REP-protected area.

The Plain View Seizure Doctrine

Officer must have a lawful reason to be in the location from which he or she observed the item.

The first requirement of any plain view seizure.

The Incriminating Nature of the Item Must Be Immediately-

Apparent

The item incriminating character must also be immediately apparent.

The second requirement of any plain view seizure.

An officer's personal observations may establish that criminal evidence is inside a premises. But even when the evidence is contraband, the basic rule is that the government may not enter and seize it without-

without consent, or exigent circumstances.

Even if the officer can see the object from a place where he or she is lawfully present, the officer may not seize it unless he or she also has

a lawful right of access to the object itself.

when the evidence is contraband, the basic rule is that the government may not enter and seize it without -

a warrant, consent, or exigent circumstances.

Within the federal system, arrest warrants may be obtained in several ways, including

a criminal complaint, a grand jury indictment, or an information.

A "complaint" is defined by Rule 3 as "a written statement of the essential facts constituting

the offense charged.

Rule 4 addresses the issuance of federal arrest warrants based upon a

Complaint

A federal arrest warrant must contain the following:

Signature of the Judge, Name of the Defendant, The Offense Charged: and Command to Arrest:

The defendant must arrested and brought without unnecessary delay before a magistrate judge or, if none is reasonably available, before a state or local judicial officer."

Command to Arrest:

The warrant must "describe the offense charged in the complaint."

The Offense Charged

The defendant's name or, if it is unknown, a name or description by which the defendant can be identified with reasonable certainty."

Name of Defendant

The warrant must be "signed by the

magistrate judge

An arrest warrant "may be executed ... within the jurisdiction of the United States or anywhere else a federal statute authorizes an arrest."

Territorial Limits

Only a marshal or other authorized officer may

execute a warrant

Unlike a search warrant, there is typically no
timeframe in which an arrest warrant is required to be executed.

Time Limits

A warrant is executed upon the arrest of the defendant.

Manner of Execution

Probable cause, arrest authority, and lawful right of access of the suspect are -

the requirements for a lawful arrest

When an officer has probable cause to believe that a suspect located in a public place has committed a felony offense, he or she may make-

a warrantless arrest of that person.

Depends on whether the crime is a felony or a misdemeanor, and whether the suspect is in a public or private area.

the legality of a warrantless arrest

An arrest warrant does not allow the government to lawfully enter a home where the target-

does not reside to make the arrest.

In determining whether a suspect is present in the home before executing the arrest warrant, courts look to

the totality of the circumstances known to the officer

Officer must have: (1) a reasonable belief that the suspect lives at the home to be entered, and (2) a reasonable belief that the suspect is currently present in the home.

Entering the Suspect's Home to Make an Arrest

Unless authorized by statute, federal law enforcement officers are not authorized to arrest individuals-

on outstanding state warrants

Authority to arrest is limited to statutory authority. The officer should verify that the warrant is still valid, and that the person arrested is the individual specified on the warrant.

Outstanding Federal Arrest Warrant

Most federal law enforcement officers have statutory grants of authority provided to them by

Congress

Authority to make arrests comes from three different sources.

Statutory Authority, Peace Officer Status, and Citizen's Arrest Authority

Allows a citizen with probable cause of a felony to make an arrest for that crime.

Citizen's Arrest Authority

Federal officers may, in certain states, make arrests for violations of state law.

Peace Officer Status

Most federal law enforcement officers have statutory grants of authority provided to them by Congress.

Statutory Authority

In the federal system, the authority to make arrests varies from agency to agency. The scope of arrest authority is established by statute.

Arrest Authority

A warrant is not always required for an arrest to be lawful. However, when an individual is arrested, both-

statutory and constitutional requirements must be satisfied.

He or she may make a warrantless arrest of that person when an officer has probable cause to believe that a suspect located in a public place has committed a

Felony

He or she may make a arrest of that person when an officer has probable cause to believe that an individual has committed a misdemeanor offense in his or her

presence

lawful entry into a person's home to make a warrantless arrest for a misdemeanor requires either

consent or an exigent circumstance

The exigent circumstance of "hot pursuit," is Only available when pursuing a suspect who is believed to have committed a "serious crime." While some misdemeanors may qualify, the hot pursuit exigency is most often limited to use in

felony pursuits

It places specific requirements upon federal law enforcement officers when executing warrants in dwellings.

The "knock-and-announce statute." Title 18 U.S.C. § 3109

The Supreme Court has held The statute requires that before the government executes a search or arrest warrant in a residence, it must first announce its authority and purpose. e.g., "Federal agents with a search warrant"

the knock-and-announce statute

(1) to reduce the potential for violence to both the officers and the occupants of the house; (2) to prevent, or at least reduce, the needless destruction of private property; and (3) to recognize an individual's right of privacy in his or her home

knock-and-announce three primary purposes

Under § 3109 is that the officers be refused or denied admittance. Once the officers have been refused or denied admittance, they can use force to "break" into the residence

and executed the warrant

Where a "reasonable" period of time has passed after your command, a refusal to comply with an officer's order to "open up" can be inferred from

silence

allows officers to dispense with the knock-and-announce requirement in certain situations. To lawfully use force to enter a residence without complying with the knock-and-announce" requirements, officers must have a reasonable suspicion, under the particular circumstances, that knocking and announcing their presence would be dangerous or futile, or
Fourth Amendment 331
that it would inhibit the effective investigation of the crime

Exigent Circumstances and § 3109

A quick and limited search of a premises incident to an arrest, which is conducted to protect the safety of officers and others.

Protective Sweeps

A protective sweep is not a full search of a dwelling. Officers may only "sweep" those spaces where an

an individual might be found

Incriminating evidence found during a lawful protective sweep may be seized under the-

plain view doctrine

The Supreme Court has ruled that a protective sweep may last "no longer than it takes to complete the

arrest and depart the premises." Maryland v. Buie.

The Supreme Court has identified two types of protective sweeps. The first, which requires no articulable suspicion, involves looking in closets and other people-sized places immediately adjoining the place of arrest from which

an attack could be immediately launched.

The Supreme Court has identified two types of protective sweeps. The second, which requires reasonable suspicion, allows a

greater intrusion into the premises.

Officers armed with an arrest warrant (or a search warrant for a person to be arrested) may enter the premises and search for the arrestee in any area that could conceal a person.

Automatic Protective Sweeps

In Buie, the Supreme Court held that if officers wish to sweep beyond the area immediately adjacent to the place of arrest, "there must be articulable facts which, taken together with the rational inferences from those facts, would warrant a reasonably prudent officer in believing that the area to be swept harbors an individual posing a danger to those on the arrest scene."

Extended Protective Sweeps

The wrongful taking and carrying away of property to the U. S. government or any agency thereof with the intent to deprive the use or benefit of the property so taken.

Theft

The wrongful, intentional taking of property of another by a individual to whom the property had been lawfully given

Theft by Embezzlement

An individual lawfully comes into possession of United States property and wrongfully converts it to his or her own use.

Theft by conversion

A federal agency has a government vehicle for its employees to use for official purposes. At lunch one afternoon, one of the employees uses the government vehicle to go shopping for a couple of hours at a local mall.

The employee is guilty of conversion under § 641

Kowingly receiving stolen, embezzled, or converted United States government property. Because the individual receiving the property knows that it has been stolen, embezzled or converted,

Theft by Receipt of Stolen Property

Individuals who assist or help to commit the offense, provide assistance before the crime is committed, and after the crime has been committed. May have knowledge that a federal crime was committed, yet take steps to conceal this knowledge from federal officers.

Parties to Criminal Offense

Any person who knowingly aids, abets, counsels, commands, induces or procures the commission of an offense may be found guilty of that offense.

Aiding and Abetting18 U.S.C. §§ 641 and 2.

An accessory after the fact is one who, with knowledge that an offense was committed, receives, relieves, comforts or assists the offender with the intent to hinder or prevent the offender's apprehension, trial or punishment.

Accessory After The Fact 18 USC € 3

Individuals who have knowledge of a felony offense and take affirmative steps to conceal the crime and fail to disclose their knowledge to criminal investigators.

Misprision of Felony

The defendant, Regarding certain federal matters;
Knowingly and willfully;
Made a false material statement, or; Concealed or covered up a material fact, or;Made or used a document containing a false material statement

Elements of False Statement 18 U.S.C. § 1001

When a crime is committed, the individual who actually commits the crime is referred to as the

principal

When a family member lies to an officer about the whereabouts of a sibling who is involved in a theft of government property in order to protect the sibling from being arrested and punished for the theft, the family member is -

an accessory after the fact

In order to convict a defendant of misprision of felony, the government must prove a federal felony was committed and

the defendant had knowledge of the felony that was committed

For a person to be convicted of making a false statement under § 1001, the false statement must be-

material

The Supreme Court now holds § 1001 covers any false material statement, of whatever kind, including the use of the word

no

An act, or failure to act, prohibited by law and punishable by the government.

a crime

An act, or failure to act, in which the law provides a remedy for the victim through a civil action (claim and/or lawsuit).

A tort

If the value of the property stolen, embezzled, converted, or received is more than $1,000, the offense is

a felony

If the value of the property stolen, embezzled, converted, or received is $1,000 or less, the offense is

a misdemeanor

The defendant voluntarily, intentionally, and knowingly; Stole property belonging to the United States or any department or agency thereof; With the intent to deprive the United States of the use or benefit of the property so taken.

Three elements that must be proven to convict a defendant of "theft"

A defendant takes a vehicle that belongs to the United States government and paints the vehicle a different color, intending to keep it for his own use and enjoyment. The defendant is guilty of

theft of government property.

A federal postal employee is responsible for selling stamps to the public. At the end of the work day when the employee is obligated to deposit the days cash receipts into the government account, the employee pockets the money for his personal use. The employee has committed the crime

of embezzlement

A federal employee steals a computer belonging to the United States government. The employee takes it to a friend and asks him if he would like to buy it at a discount. When asked about the origin of the computer, the employee admits to the friend that it was stolen. The friend decides to purchase the computer for his own use.

Theft by Receipt of Stolen Property

All four types of theft set forth in the statute apply to government property to include

property made under contract for the United States.

If two or more persons conspire either to commit any offense against the United States, or to defraud the United States, or any agency thereof in any manner or for any purpose, and one or more of such persons perform any act to effect the object of the conspiracy, each shall be fined under this title or imprisoned not more than five years or both

The general federal conspiracy statute, 18 U.S.C. § 371

Two or more persons;
2. Intentionally;
3. Agree; 4. To violate federal law or defraud the United States; 5. Commit an overt act in furtherance of the
agreement.

Five essential elements to establish a violation of § 371.

A conspiracy requires the participation

of "two or more persons."

The statute of limitations for conspiracy is

five years

Mobile Conveyance Exception

Carroll Doctrine

Carroll verus United States, the Carroll Doctrine

Established by the Supreme Court in 1925

A well-recognized exception to the warrant requirement. Evidence found may be used against the defendant in a later trial.

Inventory Search

Search to locate and safeguard personal property

Inventory

Scope of inventory is base upon your

Proable Cause

Exist when a reasonable person would believe that, based on the available facts, an immediate entry or search is necessary to prevent the escape of a suspect, the destruction of evidence, or the death or injury of a person.

Exigent Circumstances

For hot pursuit to be a lawful exigent circumstance:

There must be an "immediate or continuous" pursuit of the suspect. Probable Cause to Arrest for a Serious Crime.

A second common exigent circumstance involves the actual or potential -

Destruction or Removal of Evidence

Must meet two requirements: (1) officers must have objectively reasonable grounds to believe that there is an emergency at hand and an immediate need for their assistance for the protection of life or property; and (2) there must be some reasonable basis, approximating probable cause, to associate the emergency with the area or place to be searched

A valid emergency scene search

There must be an "immediate or continuous" pursuit of the suspect. Probable Cause to Arrest for a Serious Crime.

Hot Pursuit

Once the exigent circumstances that justified the warrantless search no longer exist,

the right to conduct a warrantless search also ends

Facts exist that would lead a reasonable person to believe that a person is in some type of danger

Probable cause in the context of an emergency scene situation

As with any lawful warrantless search, officers may seize any evidence that is in

plain view during the course of emergency activities

There is no murder-scene or crime scene exception to the

Fourth Amendment

Officers may enter an emergency scene without a warrant to tend to victims and locate suspects, but when the emergency ends, so does an officer's right to be present in the location

without a warrant

When an occupant of a home, upon seeing law enforcement officers standing on her porch, hurriedly begins to pour illegal drugs down a drain.

An example of when the potential destruction of evidence may allow a warrantless entry and search

There is no exigency required to conduct a warrantless vehicle search; all that is required is a

mobile conveyance and probable cause

The majority rule, (followed in the Sixth, Eighth, and D.C. Circuit Courts of Appeal), holds that a warrantless search to prevent the destruction or removal of evidence is justified if it proving that there is

a reasonable belief that third parties are inside the dwelling; and that the loss or destruction of evidence is imminent.

A suspect may not defeat an arrest which has been set in motion in a public place by-

escaping to a private place

"Hot pursuit" occurs when a suspect enters an area of REP

From a Public Place

Under the Carroll Doctrine, the requirement to obtain the warrant is

excused

First established by the Supreme Court in the 1925 case of Carroll v. United States.

The Carroll Doctrine, Mobile Conveyance Exception

Provides that if officers have probable cause to believe that a mobile conveyance located in a public place has evidence of a crime or contraband located within it, they may search it without first obtaining a warrant.

The Carroll Doctrine

The plain-smell corollary to the plain view doctrine may also allow officers to establish probable cause to search a vehicle based upon their

sense of smell

To Conduct a Search Under the Carroll Doctrine There is

No "Exigency" Required

Must be voluntarily obtained.

Consent

The consent must be voluntarily given and must be by an individual with either actual or apparent authority over a place to be search.

A valid consent to search

When LEO obtains a valid consent to search a giving area or object, neither reasonable suspicion or proable cause is

required

Criminal evidence discovered during a valid administrative search may be seized under the

Plain view doctrine

The Supreme Court has never approved a checkpoint program whose primary purpose was to detect

evidence of ordinary criminal wrongdoing

City of Indianapolis verus Edmond

Police set up a checkpoint to discover drugs.

Border intrusion are categorized into two types:

Routine and non-routine.

An inventory will not be valid if the property searched is not lawfully in the custody of

the law enforcement officers who perform the inventory.

"The standard for measuring the scope of a suspect's consent under the Fourth Amendment is that of

objective' reasonableness

An individual may say something like, "You may search here but not there."

limit the scope of consent

An individual may
also revoke consent. When consent is revoked, the government is required

to stop searching

A searched is not valid if another party with authority is present and expressly

refuses to give consent

An individual who shares a residence with another person assumes the risk that the other person might consent to a search of

all common areas of the residence

one roommate may not generally give consent to search the personal property or exclusive spaces (e.g., bedroom) of

the other roommate

These types of administrative searches can include inspecting both personal and real property

Generally termed "inspections,"

The Supreme Court has allowed searches for certain administrative purposes without particularized

suspicion of misconduct,

Administrative searches must be conducted as part of a general regulatory scheme in furtherance of an administrative purpose, rather than

to secure evidence of a crime.

May be seized under the plain view doctrine and may be used to establish probable cause to obtain a criminal search warrant.

Criminal evidence

The use of highway sobriety checkpoints does not violate the

Fourth Amendment

Security screening searches at facilities such as airports, military bases, courthouses, and other sensitive government facilities fall within the class of-

administrative searches

In airports, for instance, persons who have not attempted to access the secure terminal are not subject to an

administrative search.

Someone who begins the security screening process no longer has the right to avoid a search by electing to

turn back

A full strip search, an X-ray examination of the body, a demand to remove an artificial leg and a body cavity search are examples of

non-routine border searches.

At a minimum, officers must have reasonable suspicion of a violation for

non-routine border searches and seizures.

Sealed letters which apparently contain only correspondence cannot be opened without

consent or a search warrant.

Where the checkpoint is set up to gather information regarding a previous crime. In Lidster, police set up a checkpoint in the area of a fatal accident one week after it occurred.

Information-Gathering Checkpoints

In City of Indianapolis v. Edmond, police officers set up a checkpoint to discover drugs. The Supreme Court determined because the primary purpose of the checkpoint was to advance "the general interest in crime the checkpoint was

unlawful

For an administrative warrant, probable cause in the criminal law sense is not required. Instead, courts will look to see if a valid public interest justifies

the inspection.

This statute provides a civil cause of action against state and local law enforcement officers who, acting under color of law, deprive an individual of any civil right.

Title 42 U.S.C. § 1983 (Civil Action for Deprivation of
Rights)

The issue in cases involving claims of excessive force is whether the arresting officer's actions were-

objectively reasonable

If a law enforcement officer fails or refuses to intervene when a constitutional violation such as an unprovoked beating takes place in his presence, the officer can be held liable under

Bivens

Is immunity from civil suit and entitles a law enforcement officer to avoid standing trial or facing the burdens associated with civil litigation.

Qualified Immunity

When the defense of qualified immunity is applicable in a lawsuit alleging a constitutional tort, officers will not be held personally liable as long as their actions

are reasonable in light of current law.

The traditional state law torts applicable to federal law enforcement officers are:

negligent torts; and intentional torts

A violation of statutory rules of the road by a federal employee in driving a motor vehicle in the course of employment in a violation of agency policies and practices.

Breach of Duty

The officer may break open any outer or inner door or window of a house, or any part of a house, or anything therein, to execute a search warrant, if, after notice of his authority and purpose, he is refused admittance

The "knock and announce" statute

The defendant's act that breached the duty of care.

Causation

In civil suits, the plaintiff may recover for the personal injury or property damage caused by defendant's breach of duty.

Damages which is generally compensatory

The elements of an intentional tort are similar to those of a negligent tort except that the act that causes the damages must be

willful and intentional.

Intentional torts can be against a person, or

against property

Trespass to Land: Damage to real property; Trespass to Chattels; Damage to personal property ; Conversion: Personal property, theft.

Intentional Torts to Property

In 1946, the Federal Tort Claims Act (FTCA). was enacted by

Congress

This act makes the United States liable under the local law of the place where the tort occurs for the negligent or wrongful acts or omissions of federal employees within the scope of their employment.

The Federal Tort Claims Act

The executive departments, the judicial and legislative branches, the military departments, and corporations primarily acting as instrumentalities or agencies of the United States, but expressly excludes any contractor with the United States.

Under the FTCA, a "federal agency"

Officers or employees of any federal agency, members of the military or naval forces of the United States, members of the National Guard while engaged in training or duty, and persons acting on behalf of a federal agency in an official capacity.

Under the FTCA, an "employee of the government"

Covers lawsuits for negligent or wrongful acts or omissions of federal employees within the scope of their employment that cause loss of property, personal injury or death.

The FTCA

A tort action against the United States is the sole remedy available to a

plaintiff

The FTCA specifically does not apply to intentional torts committed by federal employees who are

not law enforcement officers.

Intentional torts such as Assault, battery, false imprisonment, false arrest, and malicious prosecution are common allegations against

law enforcement officers

Means any officer of the United States who is empowered by law to: execute searches; or seize evidence, or make arrests for violations of federal law.

investigative or law enforcement officer

The FTCA now provides that the government will permit itself to be sued with respect to assault, battery, false imprisonment, false arrest, malicious prosecution, or abuse of process if

the act was that of an investigative or law enforcement officer

The FTCA covers lawsuits for negligent or wrongful acts or omissions of

federal employees

A law enforcement officer found to have used a government vehicle outside the scope of employment will not be protected by the FTCA and will, therefore -

be personally liable for the injury and damages caused

Assumption of Risk; Contributory/Comparative Negligence; Consent:

Defenses to Negligent Torts:

Under Negligent Torts, the Plaintiff has assumed the risk of injury.

Assumption of Risk:

Under Negligent Torts, the plaintiff has been negligent, and that negligence is a cause of the plaintiff's damages.

Contributory/Comparative Negligence

Self-Defense and Defense of Others is a

Defenses to Intentional Torts

Under Intentional Torts, Knowing and voluntary consent by plaintiff will bar recovery against defendant.

Consent

Under Intentional Torts, A defendant who acts to prevent a threatened injury from some force of nature, or other cause

Necessity

Local police officers arrested the defendant without a warrant at his place of employment. Other officers went to his home. After a neighbor told the officers where the defendant secreted a key, they entered the house. The officers searched and found evidence of gambling paraphernalia that they turned over to the U.S. Marshal. Later that day, the Marshal returned to the house and found additional evidence. Neither the Marshal nor the local officers had a search warrant. The government used this evidence to convict the defendant of using the mails to transport gambling paraphernalia.
ISSUE: Whether the evidence seized by the U.S. Marshal was admissible?

No. As the evidence was obtained through unconstitutional means, it was not admissible.

The Supreme Court created i Its or the purpose to deter unreasonable activity - to compel respect for the constitutional guaranty to be free from unreasonable searches

The exclusionary rule

DEA agents suspected the defendant of manufacturing controlled substances on his ranch. The ranch was completely encircled by a perimeter fence, and contained several interior barbed wire fences, including one around the house approximately fifty yards from the barn, and a wooden, corral fence enclosing the front of the barn. The barn had an open overhang and locked, waist high gates. Agents, without a warrant, climbed over the perimeter fence, several of the barbed wire fences, and the wooden fence in front of the barn. They were led there by the smell of chemicals, and while there, could hear a motor running inside. They shined a flashlight inside and observed a drug lab. Using this information, the agents obtained and executed a search warrant.
ISSUE: Whether the officers' observations were made in the open field?

Yes. The officers did not intrude upon an area where the defendant had a REP

Officers had information indicating that the defendant was involved in trafficking narcotics. They obtained garbage bags from his regular trash collection left on the curb in front of his house. The officers developed probable cause and obtained a search warrant based on evidence found in the garbage. The search warrant yielded quantities of controlled substances. The defendant and others were arrested and released on bail. The officers again received information that the defendant was engaged in narcotics trafficking. Again the officers obtained his garbage from the regular trash collector. A second warrant was executed and the officers found more evidence of trafficking in narcotics. Did the defendant have a reasonable expectation of privacy in garbage left for collection outside the curtilage of his home.,

No. The defendant abandoned any reasonable expectation of privacy

Two officers were on patrol in a high-crime area. They discovered a group of youths huddled around a car. The youths, including the defendant, fled when they observed the approaching unmarked police car. A police officer, wearing a "raid" jacket, left the patrol car to give chase. The officer took a circuitous route that brought him in direct contact with the defendant. The defendant was looking behind as he ran and did not turn to see the officer until the officer was almost upon him, whereupon the defendant tossed away a small rock. The officer tackled him, handcuffed him, and radioed for assistance. Officers recovered the rock, which proved to be crack cocaine. ISSUE: Whether the defendant was "seized" at the time he dropped the controlled substance?
Fourth

No. The government had not seized the defendant until it engaged in physical contact with him.

Officers lawfully stopped the defendant for driving a vehicle with an expired license plate. One of the officers approached and asked the defendant to step out of the car and produce his driver's license and registration. It was the common practice of the officer to order all drivers out of their vehicles whenever they conducted a stop for a traffic violation. As the defendant got out of the car, the officer noticed a large bulge under the defendant's sport jacket. Fearing that the bulge might be a weapon, the officer frisked the defendant and discovered a loaded handgun. The defendant was immediately arrested for carrying a concealed deadly weapon and for Fourth Amendment 93
carrying a firearm without a license.
ISSUES: 1. Whether the officer's order to get out of the car during a lawful traffic stop was reasonable under the Fourth Amendment? during a lawful traffic stop was reasonable under the Fourth Amendment?
2. Whether the frisk of the defendant was lawful under the Fourth Amendment

Yes. The officer's order to get out of the car did not violate the Fourth Amendment and Yes. The frisk of the defendant, conducted was lawful.

The defendant was stopped for speeding. While the officer wrote the defendant a ticket, a second officer arrived at the scene with a drug-detection dog and walked the dog around the defendant's vehicle. After the dog alerted on the trunk of the car, the officers opened the trunk, discovered a controlled substance, and arrested the defendant.
ISSUE: Whether the Fourth Amendment requires reasonable suspicion to justify the use of a drug-detection dog during a lawful traffic stop?

No. No suspicion is required to use a drug-detecting dog during a traffic stop.

York City at Miami International Airport under an assumed name, which was legal at the time. The defendant also checked his two suitcases bearing identification tags with the same assumed name. Two officers had previously observed him and believed that his characteristics fit a "drug courier profile." They approached him. Upon request the defendant produced his airline ticket and driver's license, which bore his correct name. The defendant explained that a friend had made the ticket reservations in the assumed name. The officers told the defendant that they were narcotics investigators and that they had reason to suspect him of transporting narcotics. Without returning his ticket or driver's license, the officers asked him to accompany them to a small room about forty feet away. Without the defendant's consent, one of the officers retrieved his luggage and brought it to the room. Although he did not orally consent to a search of the luggage, the defendant produced a key and unlocked a suitcase in which marijuana was found. ISSUES: 1. Whether the seizure of the defendant was unreasonable, tainting his consent?

Yes. The officers exceeded the scope of their stop, turning it into an arrest without probable cause.

Investigative detentions ("stops") must be temporary and last no longer than is necessary to effectuate the

purpose of the stop.

There are three types of police-citizen encounters:

a consensual encounter; an investigative detention or "Terry stop"; and an arrest.

Are considered "seizures" for Fourth Amendment purposes.

Terry stop and arrest

A brief, voluntary encounter between law enforcement officers and citizens.

Consensual Encounters (Voluntary Contacts)

The officer may approach an individual and ask questions, even incriminating questions, may request to see an individual's identification, may identify him or herself and display credentials and may seek consent for a search or a frisk

Police-citizen consensual encounter

In Terry v. Ohio, the Supreme Court recognized a third type of police-citizen encounter, known as an

Investigative Detentions; Terry Stops

A law enforcement officer must have a reasonable, articulable suspicion that criminal activity is afoot and the person detained is somehow involved in order to make an-

investigative detention,

the officer must have explainable (articulable) reasons to justify a temporary seizure of a person. "Criminal activity is afoot" means that the officer must reasonably suspect that:

A crime is about to be committed, being committed; or been committed.

Law enforcement officers may use a variety of different investigative techniques to obtain enough information to establish reasonable suspicion to detain a person through-

Personal observation, information from other officers, from witness or victims and informants

Some common factors officers can use to justify investigative detentions include, but are not limited to:

A suspect behavior, criminal history, flight from officer, time and location etc.

An investigative detention must be temporary and last no longer than is necessary to effectuate the purpose of the stop. If an investigative detention is extended, a judge may find that

a de facto arrest has occurred

In Terry, the Supreme Court outlined the legal requirements for what has become known as a Terry frisk. If, during an investigative detention, an officer develops reasonable suspicion that

the individual is presently armed and dangerous

If a de facto arrest occurred and it was not supported by probable cause, it is an illegal arrest and any evidence derived from it result of a search incident to the unlawful arrest will be

inadmissible

A suspect, through past criminal history or association with violent gangs, has a reputation for being armed and dangerous; A bulge in a suspect's clothing indicating the possible presence of a weapon; A "furtive" or other movement by the suspect indicating he is checking or adjusting a hidden weapon or ensuring that it remains concealed; are some common factors to

reasonable suspicion that a suspect is presently armed and dangerous

While the purpose of a Terry frisk is to discover weapons, not evidence of a crime, the Supreme Court has already held that an officer may seize contraband detected during the

lawful execution of a Terry frisk

The Fourth Amendment applies to seizures of the person, including brief investigatory stops such as the stop of a vehicle. Stopping an automobile and detaining its occupants constitutes a 'seizure' within the meaning of

The Fourth Amendment

If an officer has reasonable suspicion to believe the driver or passenger in a vehicle is dangerous and may gain immediate control of a weapon, the officer may "frisk" that person, as well as the

entire passenger compartment of the vehicle include any unlocked containers

The third type of "citizen-police" encounter is an arrest based upon-

probable cause

The Fourth Amendment provides that "no Warrant shall issue but upon probable cause ...." In cases in which the Fourth Amendment requires that a search warrant be obtained, "probable cause" is the standard by which a particular decision to search is tested against the constitutional mandate of

reasonableness

probable cause to "arrest" or "search" have been formulated. Probable cause to "search" exists where the known facts and circumstances are sufficient to warrant a man of reasonable prudence in the belief that contraband or evidence of a crime will be found in

the place to be searched.

Probable cause to "arrest" exists when the known facts and circumstances are sufficient to warrant a prudent person in believing that the suspect had

committed or was committing an offense

Personnel roster, unmarked vehicles, equipment, frequencies and capabilities

EEFI

Are aspect of an operation that if known by the adversary, would subsequently compromise, lead to failure, or limit the success of the operation

Essentials Elements of Friendly Information (EEFI)

Are simple procedural adjustments that eliminate or minimize the generation indicators.

The most effective countermeasure

Risk is determine by analyzing three factors

Threat, Vulnerability, and impact

During this step, OPSEC address the capability of the adversary to use the information that has been collected in an attempt to utilize the information against us.

Analysis of Vulnerability

Using published material that describes how we do things, who we are, and where we are located.

Open Source

Open Source can provide the criminal with an excellent profile of the

Agency

The use of electronic devices to obtain information on police operation and personnel,

Communications

The uses of still video cameras to obtain visual representation of law enforcement personnel or operations.

Imagery

The process of searching trash to gather data on people and activities

Trash, dumpster diving

The process of watching, listing, and asking question about the abilities and intention of law enforcement agency.

Human

Anyone who opposes, or acts against, law enforcement interest

An adversary

Does an adversary intend to gain our sensitive/ critical information?

Intend

Is the adversary capable of gaining the information

Capability

Defined information in need of protection and analyzes how that information may be inadvertently compromised.

Identification of Critical Information

Elements of operational/mission sensitive information that require safeguarding.

Current operation, Suspects, Informants, Warrants, Location of operations, Surveillance

May range from highly sophisticated foreign intelligence organizations to criminal entities and terrorist groups

Adversary capabilities

If risk is great then high priority for protection of information should be

enforced and corrective action taken

Officer Smith used force to seize Jones. Jones sued for excessive force under the Fourth Amendment. Pick the correct statement about qualified immunity.

Officer Smith may get qualified immunity even if the judge finds that the force was unconstitutional

The Court identified the opening of a closed but unlocked door, lifting a latch, turning a door knob, unhooking a chain, pushing open a hasp, or pushing open a closed door of entrance to a house, even a closed screen door, as a

breaking (with respect to § 3109)

The length of time an officer must wait before using force to enter a home with a warrant is determined by the

"totality of the circumstances."

Federal agents obtain a valid premises search warrant to look for pornographic materials in Black's home. When the warrant is executed, the agents properly knock, announce their identity and purpose, and demand admittance. Black opens the door and the agents enter. Immediately, the agents notice that four other people are inside the house. One of the individuals is recognized as Black's live-in girlfriend, Courtney. The other three persons are unknown. Without hesitating, the agents order all five people to stand and face the wall, where a frisk is conducted for the safety of the officers. During the frisk of Courtney, one agent discovers what is immediately apparent to him to be crack cocaine. He reaches in, retrieves the item, and confirms that it is cocaine. Courtney is arrested. At her trial for narcotics possession, Courtney makes a motion to suppress the cocaine. According to the law, this motion will be:

Granted, because, pursuant to the premises search warrant, the agents could not conduct a frisk of Courtney

A premises search warrant does not allow law enforcement officers to either frisk or search persons who may be present on the premises at the time the

warrant is executed

An undercover officer purchased controlled substances from King yesterday and today a warrant was issued for King's arrest. Officers spotted King in his usual place in a high crime area where he had been seen selling drugs the day before from his car. King was arrested on the warrant. After arresting King and placing him in handcuffs, the officer had him sit in the back of the officer's vehicle. The officer then returned to King's vehicle and began to search it. Under the front passenger seat, the officer found a bag containing cocaine. Under the back seat, the officer found rolling papers. The officer then opened the trunk of the vehicle and began to search it. Immediately, 6 bricks of marijuana were discovered. At his trial for possession of controlled substances, King makes a motion to suppress all of the evidence found in his vehicle. According to the law:

All of the evidence is admissible.

The defendant was arrested for driving with a suspended license. He was handcuffed and locked in the back of a patrol car. There were five officers at the scene and two other suspects who had already been arrested, handcuffed, and locked in patrol cars. The officers searched the defendant's vehicle incident to his arrest and found a gun and cocaine in the pocket of a jacket in the back seat. ISSUE: Whether the government may automatically search a vehicle incident to arrest when the arrestee has been secured and no longer has access to weapons or evidence? (Arizona v. Gant)

No. there is no longer any risk that he will access weapons or evidence contained in the vehicle.

The justifications for searching a vehicle incident to arrest are

officer safety, and evidence preservation.

Police Detective McFadden had been a police officer for 39 years. He served 35 years of those years as a detective and 30 of those years walking a beat in downtown Cleveland. At approximately 2:30 p.m. on October 31, 1963, Officer McFadden was patrolling in plain clothes. Two men, Chilton and the defendant, standing on a corner, attracted his attention. He had never seen the men before, and he was unable to say precisely what first drew his eye to them. His interest aroused, Officer McFadden watched the two men. He
Fourth Amendment 85
saw one man leave the other and walk past several stores. The suspect paused and looked in a store window, then walked a short distance, turned around and walked back toward the corner, pausing again to look in the same store window. Then the second suspect did the same. This was repeated approximately a dozen times. At one point, a third man approached the suspects, engaged them in a brief conversation, and left. Chilton and the defendant resumed their routine for another 10-12 minutes before leaving to meet with the third man.
Officer McFadden suspected the men were "casing a job, a stick-up," and that he feared "they may have a gun." Officer McFadden approached the three men, identified himself and asked for their names. The suspects "mumbled something" in response. Officer McFadden grabbed the defendant, spun him around and patted down the outside of his clothing. Officer McFadden felt a pistol in the defendant's left breast pocket of his overcoat, which he retrieved. Officer McFadden then patted down Chilton. He felt and retrieved another handgun from his overcoat. Officer McFadden patted down the third man, Katz, but found no weapon. The government charged Chilton and the defendant with carrying concealed weapons. ISSUES: Whether the detective's actions constituted a seizure?
and a search? (Terry v. Ohio)

Yes. Detective McFadden did seized and search the defendant.

The Court acknowledged that limited intrusions, based on articulated, reasonable suspicion can be

reasonable

Marsh checked a suitcase at the airline counter and got onto an airplane. Before the suitcase was placed on the airplane, it was sniffed by a drug detection dog. The dog indicated that drugs were located inside which established probable cause to search the suitcase. With this knowledge, two DEA agents entered the airplane, approached Marsh, identified themselves, and asked him if they could look in the suitcase he had checked at the counter. Marsh stated, "I'm not traveling with a suitcase." Because the plane wasn't scheduled to take off for an hour (and Marsh didn't think he would miss the plane), Marsh voluntarily agreed to accompany the agents to the suitcase, was shown the suitcase, and was asked again if they could open it. Again, Marsh denied ever seeing the suitcase. The agents opened the suitcase and discovered contraband inside. At trial, the contraband should be -

Admitted, because Marsh abandoned the suitcase.

Two officers develop reasonable suspicion that Smith is about to rob a convenience store. The officers approach Smith, place him under arrest, and search him. The officer conducting the search feels what is immediately apparent to him to be crack cocaine. The officer then retrieved the substance. At trial, Smith makes a motion to suppress the crack cocaine found during the search. According to the law, this motion should be:

Granted. The officers arrested Smith when they only had reasonable suspicions.

An officer receives a report from the dispatcher about an armed robbery in the area, along with a description of the vehicle and the three men believed to have committed the crime. Spotting a vehicle matching the description, with three male occupants inside, the officer stops the vehicle to investigate. She directs the three occupants from the vehicle, and examines the vehicle for weapons. Under the front passenger seat, the officer finds a sawed-off shotgun and some ski masks. All three men are then arrested. At trial, the men file a motion to suppress the evidence found in the vehicle. According to the law, this motion should be:

Denied, because the officer was justified in looking under the front passenger seat for weapons.

The report, the description, and the fact the vehicle and occupants generally matching the description is RS criminal activity is afoot. Because the crime under suspicion (robbery) is one in which a weapon is often used, there is also RS the occupants are

armed and dangerous

The defendant was arrested for DUI. During an inventory search of the car, the officer found a locked suitcase in the trunk. The officer opened the suitcase and found a garbage bag containing marijuana. ISSUE: Whether a container found during an inventory search may be opened where there is no agency policy regarding the opening of containers?

No. Absent a routine agency policy regarding the opening of containers found during an inventory search, a container may not be opened.

The defendant was federally licensed to deal in sporting weapons. An ATF inspector inspected the defendant's books and requested entry into his locked gun storeroom. The defendant asked the inspector if he had a search warrant. The inspector explained that the Gun Control Act, 18 U.S.C. § 921, authorized such searches, known as compliance checks. After the search, the inspector seized two sawed-off rifles that the defendant was not licensed to possess. ISSUE: Whether the search of the business premises was reasonable?

Yes. Compliance checks are reasonable.

Tom sees Bob putting some of their office government computers into the trunk of his personal vehicle. Tom, thinking that Bob is stealing the computers, calls the local FBI office to report the theft. The FBI, as a result of a simple investigation, determines there was no theft, as Bob was simply taking the computers to the disposal office for turn-in prior to the office receiving new computers. Based on these facts, Tom can be charged with:

Nothing.

Bubba calls the Secret Service and says he knows about a plot to kill the Attorney General of the US. This conversation is oral, and is not recorded, and not sworn. The Secret Service discovers that there is no plot to kill the Attorney General, Bubba made the whole thing up to get attention from his girlfriend. Has Bubba committed a federal offense under 18 U.S.C. §1001.

Yes

The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.

The Fourth Amendment to the United States Constitution

The Fourth Amendment regulates the actions of government officials. The term "government" does not solely refer to law enforcement conduct. Instead, the Fourth Amendment acts as a restraint on the-

entire government

The Fourth Amendment prohibits government intrusion upon the privacy and property rights of the

people