- Law enforcement agency powers
A
law enforcement agency (LEA) has powers, which other government subjects do not, to enable the LEA to undertake its responsibilities. These powers are generally in one of six forms:
*Exemptions from laws
*Intrusive powers, for search, seizure, and interception
*Legaldeception
*Use of force and constraint of liberty
*Jurisdictional override
*DirectionThe types of powers and law exemptions available to a LEA vary from country to country.They depend on the social, legal, and technical maturity of the country, and on the resources available to LEAs generally in the country. Some countries may have no laws regarding a particular type of activity by its subjects at all, while other countries might have very stringent laws on the same type of activity. This will impact significantly on the legal structures, if any, that govern how an LEA can operate, and on how the LEA's use of powers is overviewed.
Law enforcement agency powers are part of a broad range of techniques used for law enforcement, many of which require no specific legislative support or indepenant overview.:"See for a list of other law enforcement techniques."
Overview of use of powers
The powers and law exemptions granted to an LEA allow the LEA to act in a way which would typically be regarded as violating the rights of law complying subjects. Accordingly, to minimse the risk that these powers and law exemptions might be misused or abused, many countries have in place strong overview regimes to monitor the use and application of the LEA's powers and law exemptions. Overview regimes can involve judicial officers, be provided by internal audit services, by independent authorities, by the LEA's governing body, or some other civil mechanism.
Generally, the use of powers and law exemptions fall into two loose categories:
*those that are deemed to be intrusive and might significantly impact theright s of a subject
*those that are relatively unintrusive and do not significantly impact the rights of a subject.While a LEA's powers and law exemptions are not usually explicitly categorised in this way, they do fall into these two broad categories in this manner and can be identified by the types and level of overview applied to the use of the powers and law exemptions. The former group can have strong and multiple levels of overview, typically for every exercising of the power or law exemption, and the latter group can have no overview other than an exceptional response for some extreme malutilisation of the power or law exemption.
Due to their nature, specifically allocated powers have a greater impact on subjects, whereas law exemptions have a lesser impact on subjects. For example, the use of deadly force is normally an explicitly granted power. This is distinct from the carrying of a firearm in a public place. The latter is normally a law exemption. The discharging of a
firearm is normally subject to significant overview, whether or not person injury or property damage occurred, whereas the carrying of a firearm in compliance with the law exemption requiries no reporting or overview.Approval and internal overview
Typically personnel of an LEA cannot just exercise a power of their own volition. In order to exercise a power, an officer of an LEA must argue for and get approval, from either a senior officer of the LEA or a
judicial officer . The senior officer or the judicial officer have a responsibility to ensure that use of a power is necessary and does not unnecessarily violate theright s of subjects.Judicial overview
Judicial overview of LEA powers is typically in the form of the LEA having to provide grounds for the exercising of the power to ajudicial officer in order to get approval, each time the power is to be exercised. Typically, in line with the separation of authority, the judicial officer is external to the LEA. Judicial overview is typically required for the more intrusive powers. The judicial approval for the use of a power is usually called a warrant, for example, asearch warrant for the instrusive search and seizure of a subject's property, or a telecommunications interception warrant to listen to and copy subjects' communications.Civil and external overview
Civil oveview can be applied to internally approved use of powers and also to jusidicial approval of powers. Civil overview is normally after the event reporting on the frequency and effectiveness of the use the powers to open fora, accessible to the public.
External overview can be done by
auditor s, or specifically created general overview authorities, for example ombudsmen. The reports, or at least summaries of the reports, of these entities on the LEA's use of powers or law exemptions is typlically available to the public. For example, theAustralian Federal Police 's controlled operations are subject to open civil review by its governing body, theParliament of Australia [cite web |title=Controlled Operations Annual Report 2006-07 |publisher=Australian Federal Police |url=http://www.afp.gov.au/__data/assets/pdf_file/61384/ControlledOps07Senate.pdf |accessdate=2008-02-04] [cite web |title=Controlled Operations Inspections Report 2005-06 |publisher=Commonwealth Ombudsman |url=http://www.ombudsman.gov.au/commonwealth/publish.nsf/content/publications_inspectionreports |accessdate=2008-02-05] .Internal review
Internal review involves formal reviews done by the LEA itself on the use of its powers and law exemptions. Often, as part of this process, every time a certain power is used an incident report detailing the circumstances requiring the use of the power and the outcomes of the use of the power must be completed. For example a use of force report. These reports are then collated and analysed to determine if there are any patterns of misuse, overuse, or process change or LEA personnel training requirements required [ [http://www.afp.gov.au/__data/assets/pdf_file/2229/01062005_209.pdf ACT Policing media release Police weapon discharge report 1 June 2005] ] .
Abuse of powers and law exemptions
The abuse, or perceived abuse, or lack of openness and reporting on the use, of powers and law exemptions by an LEA, can give rise to lack of confidence and respect by subjects in the LEA. Where there is abuse of its powers and law exemptions by an LEA and no of ineffective overview of its activities, the LEA can become to be referred to as a secret police agency.
Exemption from laws
Exemption from laws can include:
*Working animals in otherwise restricted places
*Weapons in otherwise restricted places
*Controlled operations
*Access to private and confidential informationWorking animals in otherwise restricted places
The animals most often used by LEAs are dogs and horses. Dogs are used for search and rescue, chasing and subduing suspects, searching for drugs and explosives, etc. main|Police dog|Police horseTo enable LEAs to use dogs, they are typically given specific exemption from laws controlling where dogs can be taken, for example
Australian Federal Police dogs [ [http://www.austlii.edu.au/au/legis/cth/consol_act/afpa1979225/s12a.html Australian Federal POlice Act 1979 Section 12A - Immunity from State and Territory laws in relation to entry etc. of police dogs on premises etc.] ] andAustralian Customs Service dogs [ [http://www.austlii.edu.au/au/legis/cth/consol_act/ca1901124/s185.html Customs Act 1901 Section 185 - Power to board and search etc. ships and aircraft] ] .Weapons in otherwise restricted places
Many countries have laws forbidding the carrying of weapons in public places. Law enforcement agency personnel, typically police officers, are required to carry firearms in public places. In order to allow LEA personnel to carry firearms, their governing body will enact laws to enable them to do so, for example in the
United States [http://www.law.cornell.edu/uscode/search/display.html?terms=3107&url=/uscode/html/uscode18/usc_sec_18_00003052----000-.html United States Code Title 18 Part II Chapter 203 Section 3052 - Powers of Federal Bureau of Investigation] ] . LEAs which are allowed to carry firearms when dealing with subjects, will be subject to strict protocols in the use of firearms.Controlled operations
Controlled operations requires both exemption from laws and deception.In an open jurisdiction, governing bodies give their law enforcement agencies specific powers to undertake controlled operations via specific laws [http://www.austlii.edu.au/au/legis/cth/consol_act/ca191482/ Crimes Act 1914 Part IAB - Controlled Operatation for Obtaining Evidence about Commonwealth Offences] ] .
Access to private and confidential information
Private and confidential information can include:
*Medical records
*Banking and other financial records
*Utility records, such as water and power use
*Telecommunications records, such as subscribed details and service use details of telephone calls made, received, and where.Communications Interception
The interception of communications is usually the interception of electronic voice or data connections, and is typically called telecommunications interception (TI). In some countries TI is called wire tapping.Other forms of communications interception can be intercepting radion transmissions, and physical mail items.
In a civil society or democratic society, governing bodies give their law enforcement agencies specific powers to intercept telecommunications via specific laws, for example, in
Australia [http://www.austlii.edu.au/au/legis/cth/consol_act/taaa1979410/ Telecommunications (Interception and Access) Act 1979] ] and in theUnited States [ [http://www4.law.cornell.edu/uscode/html/uscode18/usc_sec_18_00002516----000-.html United States Code Title 18 Part I Chapter 119 Section 2516 - Authorization for interception of wire, oral, or electronic communications] ] .The use of TI powers by a LEA is typically subject to strong overview from outside of the LEA, for example, in
Australia anombudsman has strong intrusive powers to monitor and review an LEA utilising TI [http://www.austlii.edu.au/au/legis/cth/consol_act/taaa1979410/ Telecommunications (Interception and Access) Act 1979] ] .Intrusive seizure
Intrusive seizure can include:
*Property seizure by entering premises
*Taking from a subject finger prints, palm prints, sole prints, teeth impressions, lip prints, blood samples, DNA samples, etc.
*Information seizure by accessing information systemsProperty seizure by entering premises
Law enforcement agencies are specifically given the authority to seize property, for the example the
Federal Bureau of Investigation [ [http://www.law.cornell.edu/uscode/search/display.html?terms=3107&url=/uscode/html/uscode18/usc_sec_18_00003107----000-.html United States Code Title 18 Part II Chapter 205 Section 3107 - Service of warrants and seizures by Federal Bureau of Investigation] ] The power to search and seize property is typically granted in an instance via an instrument called asearch warrant .Legal deception
Legal deception powers can include:
*Assumed identities
*Controlled operations
*Intrusive surveillanceAssumed identities
Law enforcement agency personnel when they take on assumed identities are often referred to as
covert officers orundercover officers.The use of such methods in open societies are typically explicitly authorised and is subject to overview, for example in
Australia [http://www.austlii.edu.au/au/legis/cth/consol_act/ca191482 Part IAC of the Crimes Act 1914 - Assumed Identities] ] , and in theUnited Kingdom [http://www.opsi.gov.uk/acts/acts2000/ukpga_20000023_en_5#pt2 Regulation of Investigatory Powers Act 2000 Part II - Survaillance and Covert Human Intelligence Sources] ] .Controlled operations
Controlled operations, an action by a law enforcement agency to allow a criminal act to occur, for example the importation of illicit substances, so that as many of the subjects involved in the act can be idenitified as possible during the process of importation. A controlled operation typically includes the substitution of all of the illicit substances, or the significant majority of them, by the law enforcement agency with similar looking but benign materials.
In open societies, controlled operations are specifically legislated for to be used by law enforcement agencies and are subject to overview, for example in
Australia [http://www.austlii.edu.au/au/legis/cth/consol_act/ca191482/ Crimes Act 1914 Part IAB - Controlled Operatation for Obtaining Evidence about Commonwealth Offences] ] .Intrusive surveillance
Intrusive surveillance typically means entering or interfering with the private and confidential space and property of a subject. Intrusive surveillance typically requires the law enforcement agency to be enabled for a law enforcement agency, for example in
Australia [ [http://www.austlii.edu.au/au/legis/cth/consol_act/sda2004210 Surveillance Devices Act 2004] ] , and in theUnited Kingdom [http://www.opsi.gov.uk/acts/acts2000/ukpga_20000023_en_5#pt2 Regulation of Investigatory Powers Act 2000 Part II - Survaillance and Covert Human Intelligence Sources] ] .Use of force
Use of force powers can include:
*Non lethal forceNon lethal force can include either non lethal weapons or temporary physical holds and contact to immobilise subjects.
*Lethal force
*Immobilisation and restraintConstraint of liberty
Constraint of liberty powers can include:
*ArrestThe power to arrest is typically granted in an instance via an instrument called anarrest warrant . The power to arrest is also typically granted to a member of an LEA for whenever the member hasprobable cause to do so.
Wikimedia Foundation. 2010.