Law Enforcement Patrol Basics PDF
Document Details
Uploaded by LawAbidingTonalism
null
Tags
Related
- Apopka Police Department Patrol Operations PDF
- LE Chapter 5 Fundamentals of Patrol PDF
- Kansas City Missouri Police Department Procedural Instruction 21-09 PDF
- Kansas City Missouri Police Department Procedural Instruction 21-09 PDF
- Kansas City Missouri Police Department Procedural Instruction 21-09 PDF
- Law Enforcement Book 5 PDF
Summary
This document covers the fundamentals of patrolling for law enforcement officers, including community partnerships, reactive and proactive patrol strategies, equipment inspection, and safety protocols. It delves into community-oriented policing and the importance of officer safety.
Full Transcript
5 Unit 1: Patrol Basics Lesson 1: Patrolling Lesson Goal At the end of this lesson, you will know how to create community partnerships and become familiar with your assigned patrol area. Think About This You are a new officer and have just been assigned to p...
5 Unit 1: Patrol Basics Lesson 1: Patrolling Lesson Goal At the end of this lesson, you will know how to create community partnerships and become familiar with your assigned patrol area. Think About This You are a new officer and have just been assigned to patrol a new community you are not familiar with. What are some ways you can get to know your community while on patrol? Why is this important? Patrolling is the main activity that you will perform daily. This chapter provides an overview of the law enforcement techniques and tactics that you will use while on patrol. This includes the use of communica- tions equipment, community-oriented policing, and officer safety and survival skills. It also explains how to respond to non-criminal calls and conduct structure and area searches, and provides resources that officers use while on patrol. The primary purposes of patrolling are to maintain a public presence, enforce laws and ordinances, and deter crime. Patrolling an assigned area also includes building a relationship with your com- munity by developing resident and community contacts and providing informa- tion to residents. Reactive patrol is about responding to or dealing with a crime after it occurs. It requires responding im- mediately to an incident to increase the likelihood of catching a subject. This strategy exists in traditional policing, where you are more likely to answer calls and take reports about recurring problems in your community. Proactive patrol discourages criminal activity by having an officer regularly present in the area. To make your presence known, you must continuously travel through the patrol area and speak to people for short periods. You must talk to residents and interact with the public so that you can establish close ties with your community members, who you can turn to for information in the future. ; LE511.1. Differentiate between reactive and proactive patrol activities Chapter 5 Fundamentals of Patrol / 163 Community-Oriented Policing Community-oriented policing is a concept that encourages the community to work with law enforcement and address what causes crime and other issues affecting the community. The goal of community policing is to look at issues that are typical of certain neighborhoods and to work with the community to fight these problems. Community-oriented policing has two main parts: community partnerships and problem solving. Com- munity partnerships increase understanding and trust between law enforcement agencies and their com- munities. Community partners can include law enforcement representatives (elected, sworn, or civilian), government representatives (such as public housing and mental health agencies), and community repre- sentatives (local businesses, professional groups, and neighborhood leaders). The second part of community-oriented policing is problem solving. Community partnerships allow law enforcement agencies to develop long-term, proactive programs and ways to address problems in the community. For example, you can make conversation with the owners of a local restaurant and the people who are dining there. Another way you can build community partnerships is by stopping to play basketball with youth you see while out on patrol. Positive and professional relationships allow information sharing to learn about crime-related issues in the community. They also establish a bond and inform the community about the methods that law enforcement agencies use to perform their duties. ; LE511.2. Explain the concepts that contribute to community-oriented policing Preparing to Patrol Duty Equipment Inspection The equipment used while on patrol is vital to an officer’s safety and effectiveness. Because you will rely on these tools, you must routinely make sure that each piece of equipment is working and is stored safely. At the beginning of your shift, check all of the items on your duty belt to make sure all equipment is present and functional. You should have a working flashlight for every shift. Inspect patrol vehicles to make sure that all equipment is working, and make sure that the preventive maintenance on your vehicle is up to date. Regularly check the functionality of emergency equipment, such as fire extinguishers, biohazard gear, and first-aid kits. Never assume that others have maintained equipment. If your agency permits or requires you to wear a body camera, you will be trained on its proper use, main- tenance, and storage. You will also be trained on the types of law enforcement activities that you can or are required to record. Make sure you know these legal requirements, as well as how long you must keep any data the body camera records. ; LE511.3. Describe how to inspect duty equipment for functionality and safety 164 / Florida Basic Recruit Training Program (LE): Volume 1 Roll Call Roll call is a brief operational meeting that officers attend before starting a shift. It provides information about current issues to keep in mind while on patrol. Information shared at roll call comes from the oral instruction of supervisors and the records and reports of officers from previous shifts. Some agencies broadcast information using computer systems, radios, telephones, or other media. Record all roll call information that may affect your shift, including BOLOs, addresses that require or request extra patrol, wanted and missing persons, stolen vehicles, stolen and lost vehicle license plates, suspicious incidents, officer safety bulletins, and safety concerns. ; LE511.4. Describe the purpose of a roll call Becoming Familiar With the Patrol Area One of the first things you will learn as a patrol officer is the layout of your assigned area, district, or juris- diction. Your patrol area may remain the same or change daily depending upon factors related to staffing, the number of calls your agency receives, and individual assignments. Before going on patrol, identify the boundaries of your assigned patrol area. Become familiar with your assigned area by learning about the major roads, landmarks, and community resources so you can respond quickly. Always have a map with important landmarks and patrol areas highlighted. Identify people in the area, such as neighborhood watches, business owners, mail carriers, utility and sani- tation workers, newspaper delivery people, or anyone who walks or drives through the neighborhood regularly. Be familiar with your community’s resources, such as shelters, social service agencies, or internal agency resources. ; LE511.5. Explain how to become familiar with your assigned patrol area Throughout a shift, your patrol status will change. Inform dispatch about any changes to your availability and location while on duty. Know your patrol area so you can recognize suspicious activity, which is any activity that is abnormal for a specific time of day in a particular area. Knowledge of the law and community, and good observational skills will help you determine whether any suspicious activity is a crime in progress. For example, while patrolling a neighborhood at 2 a.m., you notice an interior vehicle light on. This could be an indicator of criminal activity, such as a vehicle burglary. Identify and remove dangers that can be a threat to public safety, such as removing the door of a discarded refrigerator or reporting a broken street light. This kind of proactive patrolling anticipates and removes potential hazards and protects your community. Patrol Methods You can patrol in a variety of ways. The three most common types are motor vehicle, foot, and bicycle. Forms of specialized patrol include marine, mounted, air, all-terrain vehicle (ATV), motorcycle, and per- sonal transporters. The area you are patrolling dictates which patrol method to use. While using a vehicle allows you to cover larger areas, it can also isolate you from residents and divert your attention. Chapter 5 Fundamentals of Patrol / 165 Foot patrol has many advantages, such as allowing you to be visible to the public and accessible to your community. You will also be able to closely investigate community concerns and observe activity in specific areas. Patrolling on foot during the day or during the night has different advantages. During the day, you are highly visible to your community members and have greater access to the environment you are patrol- ling. This increased access can help you observe minor details in your surroundings more efficiently. At night, you can use darkness to conceal your approach to calls for service. Day or night, keep changing your patrol routine to keep others from predicting your patrol patterns. A combination of vehicle and foot patrol allows you to cover a large area and closely observe specific areas. ; LE511.6. Compare the advantages and disadvantages of patrolling by vehicle and by foot 166 / Florida Basic Recruit Training Program (LE): Volume 1 5 Unit 1: Patrol Basics Lesson 2: Officer Safety and Survival Lesson Goal At the end of this lesson, you will be able to use your senses, training, and mental and physical fit- ness to preserve public and officer safety when serving your community. Think About This While on patrol you approach a suspect when he pulls a gun out of his pocket. Which would be the best option for cover, a dumpster on your left or a wooden fence on your right? Safety is an important aspect of your job as a law enforcement officer. To properly protect the public, you must also keep yourself safe. Officer safety should be assessed constantly. Stay alert at all times and maintain situational awareness. Improper training, poor planning, carelessness, and complacency can all contribute to officer fatalities and injuries. Other factors that impact your safety include the people you interact with, whether you have a clear view of the scene or people involved, whether a suspect is armed or can easily reach a makeshift weapon, or your ability to communicate with dispatch. The community partnership that you establish can help keep you safe. It is important to be aware of the entire situation as it evolves during a call for service, traffic stop, or any other encounter. Observational Skills Observation is the act of recognizing an occurrence using your senses by noticing people, things, or circum- stances. You can improve your observational skills through practice, such as memorizing descriptions of cars, people, and details at a scene. When observing others, take note of their appearance, height, weight, hair, clothing, approximate age, and other personal details. Focus on situations or behaviors that are im- portant to law enforcement, including what is usual or unusual activity within a certain area. Do not get distracted by a few elements. Observe the entire scene before making a judgment. ; LE512.1. Explain the role of observation while on duty Cover and Concealment When you arrive at a scene, immediately identify cover and concealment areas. You can use a cover or concealment area to observe activity. Cover is anything that creates a bullet-resistant barrier between an officer and a threat. Cover protects you from incoming gunfire. Examples of cover may include automobile engine blocks, brick walls, dirt embank- ments, concrete, steel, and thick wood. Keep your head and body protected by moving from cover to cover as you approach or advance on a shooter. Chapter 5 Fundamentals of Patrol / 167 Concealment is an object or group of objects that creates a visual barrier between an officer and a threat but may not stop a projectile. The object provides camouflage but will not stop incoming gunfire. Examples of concealment may include shrubs, fences, interior walls, and objects that keep you hidden from view and provide a position from which you can observe. It is preferable to use cover rather than concealment. ; LE512.2. Explain the difference between cover and concealment techniques Using the Senses Sight is often the starting point for observation. Be aware of various environmental and physical factors that can affect your vision. Visual defects like nearsightedness and farsightedness limit your vision if you do not wear corrective lenses. Lighting from objects, such as streetlights or fluorescent lamps, can distort color perception. Dimly lit objects tend to blend into the background and are hard to distinguish. Hearing that is affected by background noises, such as traffic, noises from residences, or environmental sounds, may prevent you from recognizing specific sounds that indicate a crime or incident is in progress. Smell can help you identify dangerous or illegal substances. If you smell gasoline, petroleum products, nat- ural gas, or gunpowder, you may determine that there is a potential threat. However, weather conditions or your health can affect your sense of smell. Odors in an outdoor environment can hide other smells. Sub- stances with strong odors, like gasoline or ether, can inhibit your ability to smell. Some easily identifiable hazardous materials, such as chlorine gas or ammonia, are harmful if inhaled. Some hazardous substances are not easily recognized. Fentanyl, in a fine-powdered form, can be fatal if inhaled and left untreated. Use caution when opening and closing containers (coolers, boxes, thermos-style containers) to identify contents. Do not smell the contents of the container, especially when dealing with any unknown substance. Touch can help you identify items during a search. Always wear gloves and appropriate personal protective equipment (PPE) to avoid touching something hazardous, such as biohazardous materials or fentanyl-laced drugs. Wearing gloves will also ensure you do not disturb the crime scene. Touching tires or engines to check for heat will help determine if a vehicle was recently driven. You can become very sick or die if you taste a hazardous substance, such as a drug or poison, to identify it. While taste is a sense, never use taste as a way to identify any unknown substance. ; LE512.3. Explain how to use your senses to identify safety concerns Safety and Survival Procedures Under the stress of a survival situation, revert to your training. Survival readiness may include tactical preparedness, such as always having a plan anytime you enter a building, firearm proficiency, physical fit- ness, situational awareness, and first-aid skills. Use mental conditioning, or the will to survive, and practice tactical preparedness to respond quickly and safely to a situation. By studying, mentally rehearsing, and regularly practicing safety procedures, you can be prepared for difficult situations. 168 / Florida Basic Recruit Training Program (LE): Volume 1 The circumstances of a situation will dictate the tactics you use. Always be alert, and use your observa- tional skills to identify potential dangers. Remember several basic safety tips when on duty: Practice situational awareness, which is the ability to pay attention to what is going on around you. It requires staying aware of your environment so that you remain alert and are able to re- spond appropriately. Do not become complacent. Visually assess your surroundings, the number of people at the scene, the position of their hands, and threats, such as weapons or items that could be used as weapons. Avoid tunnel vision, sometimes referred to as funnel vision, which is the narrowing of the field of view during a stressful event, such as a vehicle pursuit, foot chase, or armed confrontation. Tunnel vision can cause you to miss other possible danger signs. To avoid tunnel vision, scan your surroundings, practice controlled breathing and task-relevant self-talk. Always identify yourself as a law enforcement officer and give direct commands, such as, “Stop!” or, “Don’t move!” Speak in the appropriate tone of voice for the situation. If you believe a suspect is armed, call for backup units and use appropriate tactics to contact, control, and disarm the suspect. Disarm a suspect before leaving cover, if possible. If you shoot a suspect, notify dispatch as soon as possible. Do not holster your weapon or rush to the injured suspect until you have deemed the suspect is no longer a threat or there are no other shooters or accomplices. Perform a self-check to make sure you are not injured, and communicate with responding backup. Stay behind cover and wait for backup officers before approaching the sus- pect. When appropriate, handcuff the suspect and provide first aid as needed. While in a patrol vehicle, you may face attack from gunfire, firebombs, rocks, or other projectiles. If this happens, immediately get away from the area, roll up the windows, and turn off air con- ditioning to prevent chemicals from getting into the vehicle. Abandon your vehicle if it becomes disabled or there is no other avenue of escape. If you are on foot and come under gunfire, seek immediate cover, call for assistance, and deter- mine a safe approach for responding officers. ; LE512.4. Identify basic tactics to ensure officer safety and survival Factors That Compromise Officer Safety Officers have a variety of equipment, including firearms, intermediate weapons, ballistic vests, flashlights, electronic devices, and handcuffs. Vehicles may have spotlights, takedown lights, a public address (PA) system, emergency lights, and sirens. Check all equipment regularly and keep it clean and in good working order at all times. Make sure all electronic devices are charged. If you do not use and maintain your equip- ment and it breaks down, you could be seriously injured or killed. Train regularly and know how to use your equipment. If you do not keep yourself updated on training, you can cause serious injury or death to you or others. You might fire your weapon only once in the line of duty, and when that time comes, you must be fully prepared to use the firearm safely and effectively. Constant training will help you develop the mindset and attitude required to keep you and the public safe. Chapter 5 Fundamentals of Patrol / 169 You need to be in good physical condition to handle the demands of dangerous situations. Being in poor shape puts you, other officers, and the public in danger. An exercise and wellness program is an important part of your fitness for duty. Get enough sleep to do your job well. ; LE512.5. Describe the importance of maintaining equipment, level of training, and physical fitness Your ability to observe danger and signs of criminal activity is another important part of patrolling. If you are busy or distracted, you can miss potential danger signs and cause injury and even death to yourself, other officers, or civilians. When interacting with anyone, pay attention to non-verbal cues. These cues involve a person’s body lan- guage, such as where they place their hands and if they are leaning away from or toward you. Always be aware of a person’s hand placement, because you may be able to stop them from using a weapon, if they have one. Never assume that any call is routine. Each call is different, and you must be prepared to react properly to each situation. Responding to a call without the appropriate mindset or attitude may cause you to become complacent during a potentially life-threatening situation. The ability to remain alert and observe sur- roundings is crucial for any officer. You are expected to confront dangerous situations. Rely on your training and experience, not emotional reactions, to perform your duties safely. ; LE512.6. Recognize the importance of maintaining an appropriate mindset and situational awareness 170 / Florida Basic Recruit Training Program (LE): Volume 1 5 Unit 1: Patrol Basics Lesson 3: Electronic Communications Lesson Goal At the end of this lesson, you will be able to practice professional use of mobile communication devices when on duty. Think About This Dispatch is routinely missing the first half of radio transmissions from Officer Rollins. What can she do to fix this situation? Law enforcement relies heavily on mobile communication devices. These include radios, laptops, tablets, and smartphones. You may use mobile communication devices to access information regarding criminal records, driving history, and agency records. You may also use these devices to help complete a number of daily routine tasks, such as checking in and out when on and off duty, viewing and receiving calls for service, receiving dispatch information to minimize radio traffic, and sending electronic reports to a supervisor. ; LE513.1. Identify the role of mobile communication devices while on duty Database access agreements and agency policies set rules on the dissemination of electronic information. All computer activity is recorded per FBI security policy and subject to review under public records law. With this in mind, always be professional whenever you use any form of electronic communication. This includes texting, emailing, and communicating via the radio. While mobile communication devices are useful, they can often distract and reduce your observation skills and safety. Minimize the use of these mobile devices while driving a patrol vehicle to avoid causing a crash. Using the Radio The radio is the most common communication device that officers use. You will use the radio to send and receive vital information to and from dispatch or other officers, call for backup, or identify a suspect or wanted person. For your safety, it is essential to know how to use the radio. ; LE513.2. Identify the importance of radio communication Basic police radio communication depends on three types of equipment: dispatch console or base station vehicle-mounted radio portable or handheld radio Chapter 5 Fundamentals of Patrol / 171 Most agency radio systems consist of multiple channels, such as, primary dispatch, talk around, and spe- cialized. During critical incidents, dispatch can patch, or merge, radio channels so multiple agencies can communicate. Law enforcement uses many brands, models, and types of radios. However, radios generally have controls and indicators for power, volume, channel selection, and transmission. ; LE513.3. Describe the main components of radio equipment Figure 5-1: Handheld radio Figure 5-2: Vehicle radio Figure 5-3: Shoulder microphone Communications Personnel Public safety telecommunicators (PSTs), also known as dispatchers, are the hub of contact for patrol of- ficers. Dispatchers transmit calls, receive calls for assistance from officers, broadcast information about wanted and missing persons, check records, and perform many other tasks daily to assist patrol officers. Dispatchers are generally non-sworn personnel who operate the radio and telecommunications systems. They typically work in a centralized area with access to telephones and other resources to assist you. Their duties include answering, receiving, transferring, and dispatching functions related to 911 calls. Dispatchers: dispatch law enforcement officers dispatch fire, rescue, and emergency medical services (EMS) dispatch other public safety services to the scene of an emergency provide real-time information from federal, state, and local crime databases ; LE513.4. Identify the duties of dispatch personnel 172 / Florida Basic Recruit Training Program (LE): Volume 1 Radio Conduct and Procedures When using the radio, conduct all radio communication in a professional manner. Understand that you should have no expectation of privacy. Transmit sensitive information or criminal history details by radio only when there is an officer or public safety concern. Specialized units may use technology such as scram- bled or encrypted channels to increase operational security. Make sure you set your portable radio at the proper volume level. It should be loud enough for you to hear, but not so loud that it is disruptive. You may use an earpiece to prevent eavesdropping. Transmit only information related to law enforcement business. Appropriate radio system use includes relaying: law enforcement-related messages to other agencies driver’s license status and driver history calls for service criminal records checks hazardous material queries vehicle, boat, and aircraft registration queries road and weather conditions ; LE513.5. Describe the professional use of law enforcement radio transmissions Radio Protocol Radio protocol describes the customs and regulations for constructing and transmitting radio messages. It also includes the proper use of codes and signals, which may be different among agencies and regions. Some agencies use a phonetic-alphabet or uniform codes, while others prefer plain talk (speaking in a clear, concise, professional manner without signals or codes). Radio codes and signals save airtime and express exact and definite meanings. They also keep radio communications consistent and professional. Use the appropriate codes when you are near a suspect to reduce the risks and dangers of exposing your actions. There are four basic radio codes: Signals communication is a system that uses the word “signal” before numbers; for example, “signal 0” often means an armed person. The phonetic-alphabet system uses the letters of the English alphabet to identify letters in voice communication; for example, “A” = Alpha, “B” = Bravo. Chapter 5 Fundamentals of Patrol / 173 The numeric or 10-code system uses the number “10” before other numbers that represent spe- cific activities; for example, “10-15” often means prisoner in custody. The alphanumeric code system combines letters and numbers that may include officer call signs or vehicle license plate numbers; for example, “RVB632” may be spoken as “Romeo Victor Bravo Six Three Two.” Your agency might use codes that are different from these and will train you in their radio language. You are expected to become proficient in your agency’s language when using a radio to communicate. ; LE513.6. Describe basic radio code systems Before making a voice transmission, listen to make sure there is no other radio traffic. Press and hold the transmit button down for about one second before speaking, otherwise your first words will be lost. Use proper microphone techniques to send clear radio transmissions. Speak directly into the microphone with a clear, even tone of voice. In stressful situations, your voice may fluctuate, which can make the radio message difficult to understand. Keep your voice from fluctuating by controlling your breathing and using other stress management tech- niques. Be professional at all times. Officers working high-priority calls may ask dispatch to designate a radio channel for emergency traffic only. Dispatch will then alert other officers to refrain from transmitting on that channel. Monitor transmis- sions from other units at all times in case other units need backup. If your radio doesn’t work, use another means of communicating. You may need to switch to another chan- nel or call dispatch to report the failure. Interactions With Dispatch Depending on your agency policies, you may have to notify dispatch whenever you go on or off duty. Check- ing in and out during your shift is important for your safety. Communicate with dispatch throughout your shift, so that dispatch can send calls for service to you and monitor your status and safety. ; LE513.7. Describe how to communicate with dispatch Receiving and Answering Calls Stay aware of all radio transmissions in case another officer is in trouble. When you receive a call from dis- patch, respond with your assigned identification and current location. Record the information that dispatch provides; do not leave anything to memory. This may include the type of complaint, incident location, and the suspect’s description. Advise dispatch when you arrive at the scene of the call and if you need backup or any additional resources. Constructing the Message Provide accurate information that is brief and concise. Plan your messages before transmitting them. Mes- sages should provide essential information, such as officer identification, current location, the reason for the call, and information specific to the situation. 174 / Florida Basic Recruit Training Program (LE): Volume 1 Officer-Initiated Transmission While on patrol, you may see a situation that you need to investigate. Whenever you take self-initiated ac- tion during patrol, give dispatch the following information, as applicable: your identification and location the type of situation (such as vehicle crash, fire, or disturbance) the type of assistance needed (such as backup, ambulance, or tow truck) a description of involved people or groups a description of the vehicle(s) (license information, color, make, and model) Chapter 5 Fundamentals of Patrol / 175 5 Unit 1: Patrol Basics Lesson 4: Electronic Sources of Information Lesson Goal At the end of this lesson, you will be able to use criminal justice information systems, including the Florida Crime Information Center (FCIC) and the National Crime Information Center (NCIC), while performing law enforcement duties. Think About This You have a new neighbor moving into your subdivision and you want to do a background check on him. What are the potential consequences of this action? Querying is the process of gathering information by entering or running a search in a database for law enforcement purposes. It is sometimes called a vehicle check, records check, or wants and warrants check. When you are on patrol and need information quickly, dispatch may conduct queries for you. You may also run the information yourself using a computer in your patrol vehicle. This lesson discusses some of the databases you will use and rely on in your daily work. Florida Crime Information Center (FCIC)/National Crime Information Center (NCIC) The Florida Crime Information Center (FCIC) is a database housed at the Florida Department of Law En- forcement (FDLE) that provides statewide information on: people and property driver’s licenses and registrations wanted and missing persons stolen guns, vehicles, securities, and other property person’s status files and computerized criminal histories concealed weapon licenses FCIC is connected to the National Crime Information Center (NCIC). NCIC is a national database maintained by the FBI. The NCIC system has records of stolen, abandoned, and recovered property, and wanted and missing person files. 176 / Florida Basic Recruit Training Program (LE): Volume 1 It also contains the National Sex Offender Registry and the files of people on supervised release, protec- tion orders, foreign fugitives, immigration violators, and known or suspected terrorists or gang members. These records are from all 50 states, Canada, the U.S. Virgin Islands, the Commonwealth of Puerto Rico, and the District of Columbia. ; LE514.1. Describe the type of information available through the FCIC and NCIC databases FCIC Information Sources FCIC contains the criminal histories of people who have been arrested in Florida. When a person is arrest- ed, the booking agency first submits the person’s arrest information and fingerprints to FDLE. FDLE then reviews the information and the fingerprints and creates a computerized criminal history (CCH) in FCIC. A state attorney’s office, a clerk of court, and the Department of Corrections can add more charges, arrests, dispositions, and other information. CCH information is always changing. After using printed CCH informa- tion, destroy it by shredding or burning any copies. To create a reliable record, agencies must enter information into FCIC accurately. That is why the informa- tion you record in arrest reports or on fingerprint cards must be correct, from the spelling of suspects’ names to the laws they violated. You must provide the original report and any supplemental documents to enter the information into FCIC/ NCIC. Follow your agency policies and procedures when adding information to the system or when query- ing a database. Only law enforcement agencies that are open 24 hours a day, seven days a week can enter data about stolen property and wanted and missing persons into FCIC. The entering agency is responsible for the accuracy, timeliness, and detail of the records entered and the removal of the information when it is no longer needed. FCIC/NCIC Access and Restrictions FCIC/NCIC is a large system that contains sensitive information. For this reason, you must complete a Crimi- nal Justice Information Services (CJIS) certification training course and pass a certification exam before you are allowed access to FCIC/NCIC. Users must also agree to a state and national fingerprint-based back- ground check within 30 days of starting their job or of being assigned to an FCIC terminal. Computers with CJIS access must have physical security so that unauthorized persons do not have access to the system. All information contained in criminal justice databases is strictly for law enforcement use. The only excep- tion is that you may give registration and lien information to towing companies. Using the FCIC/NCIC system for purposes other than your law enforcement duties may result in disciplinary action, loss of your certification, and criminal charges. In addition, the agency that you work for may be held liable and could potentially lose access to the system. FCIC/NCIC logs all user transactions; these can be electronically retrieved when requested. The logs are used for system compliance, criminal investigations, suspected system misuse, public records requests, and administrative purposes. ; LE514.2. Identify the certification requirements and restrictions for using the FCIC/NCIC system Chapter 5 Fundamentals of Patrol / 177 Using the FCIC/NCIC System You need to provide dispatch with as much of the following information as possible to perform an accurate FCIC/NCIC query: person query—provide the person’s name, race, date of birth, and sex. stolen property query—provide basic information about the item. firearm—provide the serial number and the manufacturer. vehicle—provide the vehicle registration, the vehicle identification number (VIN), or the registration decal number. vessel—provide the hull identification number (HIN), the vessel registration number, or the registration decal number. The FCIC/NCIC reply will describe the vehicle or vessel and include the owner’s name and address. other stolen property—provide information such as the item category and manufacturer and a description of the property, any distinct markings, its shape, or any other special identifiers. When you query the FCIC/NCIC database, the results will show a list of possible matches if the data are the same or similar to the information submitted. To make sure that the person or property is an exact match, you may need to provide additional informa- tion, such as the person’s height, weight, scars, tattoos, birthmarks, Social Security number, and driver’s license number and the licensing state or authority; the vehicle’s make, model, year, and bumper stickers; the firearm’s model and caliber; and the property’s engravings. An exact match in a database is called a hit. You, or your agency’s designee, must confirm a hit to make sure that it matches the person or item before you arrest a wanted person, or recover a missing person or stolen property. To confirm a hit, contact the agency that entered the information into the database to verify that the information is correct. ; LE514.3. Explain how to perform a database query of a person or property using the FCIC/NCIC system The purpose of the hit confirmation process is to make sure that the information in the system is active and matches the person or property of interest. The process also helps you avoid arresting someone by mistake when the warrant has expired or the information is incorrect. In addition, a hit confirmation provides more details on what action may be taken, such as arresting the suspect or confiscating the stolen property. Even if the hit indicates that the entering agency does not require a wanted person’s extradition, you should still contact the entering agency in case they desire a follow-up report. Extradition is the surrender of a fugitive to another state or nation that has jurisdiction. 178 / Florida Basic Recruit Training Program (LE): Volume 1 Criminal Justice Databases Sometimes, you may need to use other criminal justice databases when conducting a person or property check. Agencies may use additional criminal justice databases that are not listed here. The Florida Department of Highway Safety and Motor Vehicles (DHSMV) maintains an online search data- base known as the Driver and Vehicle Information Database (DAVID). Authorized users have the ability to view: driver’s license applications, information, photographs, and signatures state-issued identification cards identification documents used by noncitizens driving and vehicle history for motorists insurance information records of vehicles or vessels registered in Florida You can also request that a driver be reassessed for a driver’s license or a medical review through DAVID. Chapter 12 discusses this in more detail. When you query DAVID about a vehicle or vessel registration, DHSMV will also check the FCIC/NCIC database for stolen vehicles or vessels. Members of the criminal justice community use the Criminal Justice Network (CJNet) to access many other valuable information databases. These include InSite (a statewide crime intelligence database), Florida’s In- tegrated Criminal History System (FALCON), Child Abduction Response Team (CART), and the Florida Sexual Offender and Predator database. Agency policies and procedures explain which databases are available to officers and how to access them. ; LE514.4. Identify the information available through criminal justice online sources Improper management of criminal databases and information is a misuse of your position. The Florida Statutes state that it is a felony to willfully, knowingly, and without authorization access or allow access to any criminal justice computer, computer system, or computer network. The computer networks in criminal justice that require authorized access include the Florida Driver and Vehicle Information Database (DAVID) and the Florida Crime Information Center/National Crime Information Center (FCIC/NCIC). An officer who accesses or allows access to any criminal justice computer, computer system, or computer network with- out authorization may be subject to prosecution. Chapter 5 Fundamentals of Patrol / 179 5 Unit 2: Duties on Patrol Lesson 1: Initial Response Lesson Goal At the end of this lesson, you will be able to safely respond and approach the scene, gather initial information, and respond to a BOLO. Think About This You are dispatched to conduct a welfare check. You advise dispatch that you are en route, but you remain at lunch. An officer arrives first on scene to back you up and is attacked by a subject. What would have been a better initial response on your part? When receiving a call, evaluate the situation based on the information you receive from dispatch. Even though incidents vary, use the same basic steps when responding to calls for service. Once dispatch has notified you of an incident, respond and let them know you are on your way. Responding to a Call Determine the safest response to the scene that will protect you, other officers, and the public. You may have access to electronic mapping systems to locate areas quickly. Keep these systems updated to have the most current maps, but also keep physical maps in your patrol vehicle. When selecting a route, identify the safest and quickest route to the location. The most direct route may not always be the quickest because of construction projects, street closings, or special events. Always consider traffic, time of day, school zones, and congested areas before deciding which route to take. Collect as much information as possible about the call. Identify the type of incident, the location, the complainant’s name, and their relationship to the location. Ask if this location has had other incidents. Use personal knowledge or information from dispatch to identify the risks in the area. Dispatch may also tell you if someone is injured. While on your way, consider the safest arrival point and the possible threats at the incident. Threats may include weapons (firearms, knives, or explosives), things that can be used as weapons (broken glass, stones, sticks, baseball bats, or branches), and hazards (fire, downed electrical lines, or bad weather). These factors determine the number of officers that respond to a scene. Plan how you will drive to the scene. You may not always want to use emergency lights and sirens. De- pending on the nature of the call and agency policies, you may turn off the vehicle headlights at night to avoid detection when nearing a scene, such as when responding to a robbery in progress. You may need to reduce speed and avoid driving past the address, which would let the suspects know you are there. Turn down the volume on your radio when you notify dispatch that you have arrived at the location. ; LE521.1. Describe how to respond to a location using information from dispatch 180 / Florida Basic Recruit Training Program (LE): Volume 1 Arriving at the Scene of a Call Once you have arrived, stop a short distance from the address. If other units are responding, you and other officers should coordinate the direction from which you all will arrive. You will have to determine the best place to park. To do this, consider factors such as a safe distance from the incident, availability of cover and concealment, access to the scene by other first responders and backup units, and the ability to evacuate quickly. Assess the area immediately surrounding the patrol car. Let dispatch know of suspicious vehicles or people leaving the area. These descriptions may help when arresting suspects. Be aware of parked cars with mo- tors running and watch for hidden suspects who may attack you by surprise. An accomplice could be acting as a lookout or waiting in the area. If the call is a crime in progress, look for suspects leaving the scene. Check for obvious clues, such as a vehicle parked in a lot that is normally empty at that time of day or the absence of a vehicle usually parked in a specific location. When exiting the patrol car, close the door gently and quietly. Be aware of items on you that make noise, such as loose change or keys. Follow these safety techniques before you exit your patrol vehicle and approach the scene: Secure the contents of your pockets and equipment on your duty belt. Turn cell phone to silent mode. Scan the area for potential threats. Identify areas for cover and concealment. Avoid backlighting and silhouetting other officers. Maintain contact with dispatch throughout the incident. ; LE521.2. Explain how to approach an incident scene safely Officer Safety When Approaching a Scene As you approach the scene: Take and maintain the best tactical position, especially if you are waiting for backup. Approach suspicious vehicles on foot and carefully check for occupants. Feel the hood of a vehicle for heat to determine if the vehicle was driven recently. Get close to buildings by moving behind parked cars, fences, trashcans, or shrubbery. Walking in a low crouching position and taking an indirect route will help minimize the chances of detec- tion. Constantly survey the building entrances and surrounding areas to ensure safety. When checking the exterior perimeter of a building, be careful approaching corners, windows, and doors. Keep an eye out for animals, clotheslines, garbage cans, sprinkler heads, swimming pools, and other possible hazards. When using a flashlight to examine the perimeter of a building, carry it in your support hand (your non- dominant hand). Hold it away from your body, so you do not make yourself a clear target. After shining the flashlight in an area, immediately move to a new position. Keep track of where other officers are, making Chapter 5 Fundamentals of Patrol / 181 sure not to shine the light on them. Since a flashlight temporarily impairs night vision, know where to aim the light before turning it on so you do not blind other officers. As soon as possible, determine the type of incident and if there is a need for backup. Determine if anyone has been injured and the extent of the injuries. Apply first aid and request medical assistance if needed. If you need to preserve the scene for investigation, use the available resources based on location. Gathering Information From Complainants, Victims, and Witnesses At the scene of an incident, you must identify everyone involved. These include complainants, victims, wit- nesses, and suspects. As you gather information, remember to treat everyone involved with dignity and respect. By assessing the scene and making these initial contacts, you can determine the type of complaint (civil, criminal, felony, or misdemeanor). Identify how much time has passed since the incident occurred. If the suspect has left the scene and cannot be readily pursued, you can interview victims and witnesses for in- formation that can help identify the suspect. When interviewing a complainant, victim, or witness remember to: Ask for identification and personal information, such as proper names, addresses, phone num- bers, and other contact information. Be personal yet professional by introducing yourself by name and by using the person’s name to establish rapport. Separate everyone and ask each complainant, victim, or witness to describe what happened. Then ask follow-up questions to clarify the incident. Ask them to describe the suspect. Are they willing to identify the suspect later? These questions will help establish probable cause in the investigation. Take detailed notes of these accounts for documentation. If they know the suspect, they may also have other information that can help find that person. Ask if they know: the suspect’s location the suspect’s identity and description if the suspect can be violent or if the suspect has access to weapons the suspect’s mode and direction of travel These facts may help you find the suspect. If required, get written statements; these will help establish probable cause for arrest. ; LE521.3. Describe techniques for interviewing complainants, witnesses, and victims 182 / Florida Basic Recruit Training Program (LE): Volume 1 BOLO Recall that a BOLO (Be on the Look Out) gives a description of the subject, the subject’s name, and any additional information that would help apprehend or locate them. Local, state, or national agencies issue BOLOs that may include descriptions of missing or wanted persons, stolen property, suspicious activity, or areas needing extra patrol attention. BOLOs can contain a range of information, and they have no standard format or content. They may in- clude printed information, photographs, verbal reports, electronic messages, or internet postings. A BOLO should include as much of the following information as possible: the subject’s name and identifying information the location of the incident the reason for the BOLO the alleged violation or reason the subject is wanted the suspect’s last known location and direction of travel a description or photograph of the person, vehicle, or property involved BOLOs are also issued for: AMBER (America’s Missing Broadcast Emergency Response) Alerts for missing and endangered children Silver Alerts for missing and endangered adults Blue Alerts for the capture of violent criminals who kill or seriously injure law enforcement officers Purple Alerts for missing disabled adults Chapter 7 discusses these in greater detail. Note the major points of each BOLO. Review information from current BOLOs to keep the information fresh while patrolling the assigned area. ; LE521.4. Describe valuable information a BOLO can provide when identifying a suspect Follow your agency policies when initiating a BOLO. If you arrive at the scene of an incident and are re- quired to initiate an immediate BOLO, relay all significant information to dispatch. If you do not need to initiate a BOLO immediately, continue to gather and verify information to prepare a written BOLO. If you do not have enough information on a suspect, run a criminal justice database check for outstanding warrants, criminal history, and any additional information to include in the BOLO. Possible sources of photographs are prior arrest photos, driver’s license photos, security videos, and photos from family members. Cancel a BOLO when the subject of the alert is found or the BOLO is deemed no longer necessary. You, a fellow officer, or dispatch should make sure that the cancellation goes through the appropriate messaging system. ; LE521.5. Explain how to initiate and cancel a BOLO Chapter 5 Fundamentals of Patrol / 183 5 Unit 2: Duties on Patrol Lesson 2: Approaching and Contacting a Suspect Lesson Goal At the end of this lesson, you will understand the importance of safely approaching and interacting with a suspect using contact and cover officers. Think About This You approach a female suspect. Upon initial sighting, you observe that she is wearing tight clothing with no layers, and you see no obvious signs of a concealed weapon. You direct her to stop walking, but she turns and keeps going in another direction. You catch up to her to escort her to your vehicle, and she pulls out a large knife. What would have been a safer way to handle this situation? Approaching a Suspect When developing a plan for contacting a suspect, decide if you should contact the suspect right away or wait for backup. Select an appropriate location and identify possible hazards. When approaching a suspect, consider their criminal history, behavior, and possible weapons. Always watch the person’s hands and body language when talking with anyone. Watch for inconsistencies, such as if the suspect tells you they came from one direction while pointing in another. Be aware of the presence of other people and possible escape routes for the suspect. Multiple suspects have the potential for adding extreme risk to your safety. Coordi- nating backup officers and establishing suspect control is critical to your safety. ; LE522.1. Describe how to safely approach a suspect Keeping safe when approaching a suspect is a coordinated effort between a contact officer and a backup or cover officer. Each officer fills a different role in the approach. Usually, the primary officer on the call is the contact officer. This officer is responsible for leading the approach and handling all communication with the suspect, including commands and interviews. This allows the suspect to be focused on one officer’s voice, instead of having multiple officers giving different directions at the same time. The backup officer is the cover officer and is strictly responsible for officer safety concerns at the scene. The cover officer’s responsibilities include observing the contact officer’s interaction with the suspect and watching for hazards such as hostile crowds, traffic, or escape routes. Additional officers share cover re- sponsibilities and assist the contact officer as requested. ; LE522.2. Explain the different roles of the contact and cover officer 184 / Florida Basic Recruit Training Program (LE): Volume 1 Initiating Contact and Establishing Communication With a Suspect When moving toward a suspect: Approach the suspect carefully. Keep your eyes on the suspect. Make sure that you keep a safe distance from the suspect. Stay alert to possible resistance or threats. Observe the suspect’s position and body movements for indications of flight or assault. Continuously scan for weapons. During contact, ask the suspect for information such as name, date of birth, address, Social Security num- ber, and legal identification cards. Verify a suspect’s identity via criminal justice databases, and check this information by comparing it with the information that the suspect has provided. If a criminal justice data- base, such as FCIC/NCIC, shows an outstanding warrant, you have the authority to detain the suspect pend- ing confirmation and extradition. Once confirmed, arrest the suspect and transport them to the appropri- ate facility. If the issuing agency waives extradition, you must release the suspect. Follow agency policies and procedures regarding the documentation of your actions. Continue to seek information by interviewing and observing the suspect. If you have a justifiable reason to believe that the suspect poses a threat or may flee, handcuff them upon initiating contact. If you believe the suspect is armed with a dangerous weapon, conduct a pat down search. If at any point the person is no longer considered a threat or deemed a suspect, remove the handcuffs. Share all current information on the suspect with backup officers. If appropriate, establish rapport with the suspect to create a noncustodial atmosphere. This can help with other investigative efforts, such as obtain- ing the suspect’s consent for a search. ; LE522.3. Describe how to initiate contact with a suspect When initiating contact with a suspect, you may have to deal with uncooperative subjects. Common situa- tions you will encounter while dealing with the public are resisting an officer with or without violence and giving false information when arrested or lawfully detained. Resisting an officer without violence occurs when a person nonviolently resists, obstructs, or opposes a law enforcement officer while they are performing their legal duties, for example, not obeying lawful verbal commands, refusing to be handcuffed, or refusing to provide identification. You should always request voluntary compliance but when this is not possible, ask the person to comply. If the person still does not comply, tell the person to comply. If the asking and the telling do not work, you have the authority to make the subject comply with the lawful order using techniques explained in Defensive Tactics. Even though the subject may be resisting, remember your obligation to maintain professionalism and treat the subject with respect. Chapter 5 Fundamentals of Patrol / 185 Resisting an officer with violence occurs when a person knowingly resists or obstructs a law enforcement officer by committing or offering to commit a violent act toward a law enforcement officer while the of- ficer is performing their legal duties, for example, violently fighting with officers while being restrained and handcuffed. A person can still resist with violence while in handcuffs. Never assume the person is being compliant. Be ready to respond to violent resistance and use techniques explained in Defensive Tactics to maintain your safety and gain control of the person. ; LE522.4. Explain what to do if a person resists arrest People will sometimes provide false information, such as a fake name and date of birth, to disguise their real identity. Giving false identification occurs when a person who has been arrested or lawfully detained by a law enforcement officer gives a false name, or otherwise falsely identifies themselves in any way to the officer. You may or may not pick up on the false information. Techniques to help identify people when you believe they are providing false information include: running a search of the person in DAVID asking for a Social Security number and compare it with FCIC/NCIC asking for an address and compare it to FCIC/NCIC or DAVID using a portable finger print scanner to establish identity 186 / Florida Basic Recruit Training Program (LE): Volume 1 5 Unit 2: Duties on Patrol Lesson 3: Responding as Backup Lesson Goal At the end of this lesson, you will be able to respond to a call as the backup officer while maintaining officer safety. Think About This You are called to a scene as the backup officer to transport an arrestee. Officer Smith arrested a woman for narcotics possession and placed her in your patrol vehicle. At the request of the arrestee, you leave the window of your vehicle down. You leave your vehicle to assist Officer Smith with a search of the arrestee’s vehicle. You return to your vehicle to find that the arrestee is gone. What course of action should you have taken to prevent this situation from happening? You will frequently be called to help other officers during calls for service, or you may decide yourself to pro- vide backup based on the circumstances. Calls for backup may involve responding to non-life-threatening, high-risk, or life-threatening situations. Non-life-threatening situations can range from assisting with administrative paperwork to providing addi- tional equipment. High-risk situations may include assisting with serving a warrant, responding to a vehicle pursuit, or responding to a scene where the suspect is still present. Life-threatening situations may include dealing with an active shooter or a vehicle crash with serious injuries. Backup officers can determine how to respond to a call based on several factors. These may include the nature of the call, the type of assistance needed, their familiarity with the area, or the demeanor of the requesting officer. Always stay in communication with the requesting officer, including visual and verbal contact. As more information is provided, you can change your response according to the situation. For instance, a backup officer may respond in emergency mode to assist another officer engaged in a foot pur- suit. If the primary officer advises dispatch that the suspect has been arrested and the situation is under control, the backup officer should downgrade their response. Upon arrival, survey the scene and maintain situational awareness. Backup officers should minimize flash- light use to keep others safe on the scene. Make visual or verbal contact with the primary officer to de- termine what type of assistance is needed. Always remain alert and avoid distractions, such as using your cell phone. The role of the backup officer on a scene is to provide whatever assistance the primary officer needs. ; LE523.1. Describe how to respond safely to the scene when providing officer backup Chapter 5 Fundamentals of Patrol / 187 Unit 2: Duties on Patrol 5 Lesson 4: Behavioral Threat Assessment and Management Lesson Goal At the end of this lesson, you will understand the role of behavioral threat assessment and manage- ment (BTAM) in identifying and preventing acts of targeted violence. Think About This You are notified of a local high school student’s social-media threat to shoot up his school. After responding to the student’s residence, you find that he has access to his father’s firearm. The student claims the social- media post was just a joke. What would your next steps be? Despite a decrease in the overall violent crime rate over the past three decades, the United States has experienced a recent increase in the frequency and deadliness of targeted violence incidents, including mass targeted violence, such as active shooter incidents. Targeted violence refers to incidents of violence involving an identifiable person of concern (a perpetrator) who possesses the intent and capability to cause physical harm to an identifiable target (an intended victim). These incidents are goal-directed, premeditat- ed, and predatory. They may occur in or across many locations: homes, workplaces, schools, government offices, public events, hospitals, and places of worship. Practical research conducted by the U.S. Secret Service, FBI, and other government entities has revealed some key findings. Human behavior, particularly violent behavior, cannot be reliably predicted, but it may be prevented. No psychological or demographic profile exists for an active shooter or perpetrator of targeted violence, so profiling is not an effective tool for preventing targeted violence. Targeted violence is almost never impulsive or random. It is the result of organized thinking and behaviors, such as planning and preparation, which can be observed and reported. Mental health issues are rarely the main cause of targeted violence incidents. While communicated threats should never be ignored, persons of concern for targeted violence often do not communicate threats to a target or to law enforcement before they attack. Know that there is a difference between making a threat and actually posing a threat. ; LE524.1. Describe the key findings regarding research on targeted violence 188 / Florida Basic Recruit Training Program (LE): Volume 1 Behavioral Threat Assessment and Management Process Behavioral threat assessment and management (BTAM) is a proactive, investigative process used to iden- tify, assess, and manage the risk of targeted violence posed by an identified or identifiable person. BTAM uses the law enforcement intelligence cycle to collect and analyze behavioral information about a person of concern. This includes observable, attack-related behaviors that indicate the perpetrator may be on a “pathway to violence.” These behaviors may warn of future targeted violence against an identifiable target or the community in general. The primary goal of BTAM is to prevent or mitigate acts of targeted violence, especially incidents of mass targeted violence. The primary functions of BTAM are to identify, assess, and manage persons of concern within the local community. Identify On patrol, you will respond to a variety of calls for service where you may see or hear something that leads you to identify a person of concern for future targeted violence. Collecting and reporting that information is critical to successfully preventing or mitigating targeted violence. Always follow your agency’s policies and procedures for collecting and reporting this type of information. Information relevant to identifying persons of concern may include, but is not limited to: a detailed description of the encounter that prompted concern your reasons for concern personally identifiable information for the person and any relevant witnesses Assess The core of BTAM is to assess a person’s risk for future targeted violence against an identifiable target. As- sessment involves collecting and analyzing behavioral information from all possible sources, including your own observations and knowledge. Trained BTAM professionals will primarily be responsible for this type of investigation. The quantity and quality of information reported directly impacts the accuracy of any assess- ment. Often, the best sources of information are relatives, friends, and close associates of the person of concern. You should consider the person of concern’s current life circumstances, intimate relationships and close associations, financial status and resources, education and training, and mental and physical health. Information of critical importance includes, but is not limited to: the person of concern’s motive and intent communicated to third-parties the person of concern’s ability and means to act, especially immediate access to firearms or other weapons their access to the intended target the target’s vulnerabilities Chapter 5 Fundamentals of Patrol / 189 Manage In BTAM, law enforcement agencies manage a person of concern, using strategies based on the assess- ment, to prevent or mitigate acts of targeted violence. You may be asked to assist BTAM investigators in managing persons of concern. A management strategy could include disrupting an immediate threat through arrest or protective custody, monitoring a person of concern’s behaviors over time, enforcing legal process (for example, delivering a restraining order or a risk protection order), or referring the person to a mental or behavioral health care provider. Remember that you may be the only member of law enforcement to observe critical information regarding a person of concern progressing along a “pathway to violence” before they attack. Reporting that informa- tion promptly and accurately is necessary to help prevent targeted violence. ; LE524.2. Describe the core functions of the behavioral threat assessment and management process 190 / Florida Basic Recruit Training Program (LE): Volume 1