By Sadie Gurman and Eric Tucker
DENVER — Police officers across the country misuse confidential law enforcement databases to get information on romantic partners, business associates, neighbors, journalists and others for reasons that have nothing to do with daily police work, an Associated Press investigation has found.
Criminal-history and driver databases give officers critical information about people they encounter on the job. But the AP’s review shows how those systems also can be exploited by officers who, motivated by romantic quarrels, personal conflicts or voyeuristic curiosity, sidestep policies and sometimes the law by snooping. In the most egregious cases, officers have used information to stalk or harass, or have tampered with or sold records they obtained. This week, part two of the Associated Press report on police officers abusing confidential databases.
‘SENSE OF BEING VULNERABLE’
Violations frequently arise from romantic pursuits or domestic entanglements, including when a Denver officer became acquainted with a hospital employee during a sex-assault investigation, then searched out her phone number and called her at home. A Mancos, Colorado, marshal asked co-workers to run license plate checks for every white pickup truck they saw because his girlfriend was seeing a man who drove a white pickup, an investigative report shows.
In Florida, a Polk County sheriff’s deputy investigating a battery complaint ran driver’s license information of a woman he met and then messaged her unsolicited through Facebook.
Officers have sought information for purely personal purposes, including criminal records checks of co-workers at private businesses. A Phoenix officer ran searches on a neighbor during the course of a longstanding dispute. A North Olmsted, Ohio, officer pleaded guilty this year to searching for a female friend’s landlord and showing up in the middle of the night to demand the return of money he said was owed her.
The officer, Brian Bielozer, told the AP he legitimately sought the landlord’s information as a safety precaution to determine if she had outstanding warrants or a weapons permit. But he promised as part of a plea agreement never to seek a job again in law enforcement. He said he entered the plea to avoid mounting legal fees.
Some database misuse occurred in the course of other misbehavior, including a Phoenix officer who gave a woman involved in a drug and gun-trafficking investigation details about stolen cars in exchange for arranging sexual encounters for him. She told an undercover detective about a department source who could “get any information on anybody,” a disciplinary report says.
Eric Paull, the Akron police sergeant who pleaded guilty last year to stalking Dekany, also ran searches on her mother, men she’d been close with and students from a course he taught, prosecutors said. A lawyer for Paull, who was sentenced to prison, said Paull has accepted responsibility for his actions.
“A lot of people have complicated personal lives and very strong passions,” said Jay Stanley, an American Civil Liberties Union privacy expert. “There’s greed, there’s lust, there’s all the deadly sins. And often, accessing information is a way for people to act on those human emotions.”
Other police employees searched for family members, sometimes at relatives’ requests, to check what information was stored or to see if they were the subjects of warrants.
Still other searchers were simply curious, including a Miami-Dade officer who admitted checking dozens of officers and celebrities including basketball star LeBron James.
Political motives occasionally surface.
Deb Roschen, a former county commissioner in Minnesota, alleged in a 2013 lawsuit that law enforcement and government employees inappropriately ran repeated queries on her and other politicians over 10 years. The searches were in retaliation for questioning county spending and sheriff’s programs, she contended.
She filed an open-records request that revealed her husband and daughter were also researched, sometimes at odd hours. But an appeals court rejected her suit and several similar cases this month, saying the plaintiffs failed to demonstrate the searches were unpermitted.
“Now there are people who do not like me that have all my private information … any information that could be used against me. They could steal my identity, they could sell it to someone,” Roschen said.
“The sense of being vulnerable,” she added, “there’s no fix to that.”
BETRAYAL OF TRUST
Violations are committed by patrol officers, dispatchers, civilian employees, court personnel and high-ranking police officials. Some made dozens of improper searches. Some were under investigation for multiple infractions when they were punished, making it unclear whether database misuse was always the sole reason for discipline.
Agencies uncover some violations during audits, or during investigations into other misconduct. Some emerge after a citizen, often the target of a search, finds out or grows suspicious. A Jacksonville, Florida, sheriff’s officer was found to have run queries on his ex-girlfriend and her new boyfriend after she raised concerns she was being harassed, an internal affairs report says.
The AP sought to focus on officers who improperly accessed information on others but also counted some cases in which officers divulged information to someone not authorized to receive it, or ran their own names for strictly personal purposes, including to check their car registrations.
The tally also includes some cases in which little is known about the offense because some agencies provided no details – only that they resulted in discipline.
The AP tried when possible to exclude benign violations, such as new employees who ran only their own names during training or system troubleshooting. But the variability in record-keeping made it impossible to weed out all such violations.
Agencies in California, for instance, reported more than 75 suspensions, resignations and terminations between 2013 and 2015 arising from misuse of the California Law Enforcement Telecommunications System, state records show. But because the records didn’t identify officers or specify the allegations, it’s unclear whether multiple violations were committed by the same person or how egregious the infractions were.
Colorado disclosed about 35 misuse violations without specifying punishment. Indiana listed 12 cases of abuse but revealed nothing about them. The Florida Department of Highway Safety and Motor Vehicles reported about 400 violations in 2014 and 2015 of its Driver and Vehicle Information Database, or DAVID, but didn’t include the allegations or punishment.
The FBI’s Criminal Justice Information Services Division offers training to state and local law enforcement agencies on NCIC use, and conducts audits every three years that include a sample of local departments, said spokesman Stephen Fischer.
But it doesn’t track how often NCIC information is misused. Violations, which are not required to be reported directly to the FBI, are inconsistently disclosed to the federal government. The FBI relies on local agencies to address violations that are identified, Fischer said.
The AP requested records from large police departments and state agencies tasked with administering NCIC usage within their districts. The responses included cases where officers misused motor vehicle data, including driver’s license and registration information, and also more sensitive criminal history records.
Officers are only occasionally prosecuted, and rarely at the federal level.
One recent exception is a former Cumming, Georgia, officer charged in June with accepting a bribe to search a woman’s license plate number to see if she was an undercover officer. Another involved Ronald Buell, a retired New York Police Department sergeant who received probation for selling NCIC information to a private investigator for defense attorneys.
At his July sentencing, Buell said he hoped other officers would learn “to never put themselves in the position I’m in.”
It’s unsettled whether improper database access is necessarily a federal crime and whether it violates a trespass statute that criminalizes using a computer for other than authorized purposes.
A federal appeals court last year reversed the computer-crime conviction of ex-NYPD officer Gilberto Valle, whom tabloids dubbed the “cannibal cop” for his online exchanges about kidnapping and eating women and who improperly used a police database to gather information. Valle argued that as an officer, he was legally authorized to access the database. The court deemed the statute ambiguous and said it risked criminalizing a broad array of computer use.
Misuse has occasionally prompted federal lawsuits under a statute meant to protect driver’s license data.
A Florida Highway Trooper, Donna Watts, accused dozens of officers of searching her in the state’s driver database after she stopped a Miami-Dade officer for speeding in 2011. She alleged in lawsuits that she was harassed with prank calls, threatening posts on law enforcement websites and unfamiliar cars that idled near her home.
Each unlawful access, she said in a court document, “has either caused or worsened anxiety, depression, insomnia, and other medical/physical/psychological conditions I suffer.”
Law enforcement officials have taken steps to try to limit abuse, though they say they know of no foolproof safeguard given the volume of inquiries and the need for officers to have information at their fingertips.
“There’s no system that could prohibit you from looking up your ex-wife’s new boyfriend, because your ex-wife’s new boyfriend could come in contact with the criminal justice system,” said Peggy Bell, executive director of the Delaware Criminal Justice Information System.
The Minnesota Department of Public Safety said it changed the way officers access a state driver database after a 2013 legislative audit found over half of the 11,000 law enforcement personnel who use it made searches that appeared questionable. The audit was conducted after a former state employee was charged with illegally viewing thousands of driver’s license records.
In Florida, a memorandum of understanding this year increased the amount of field audits law enforcement agencies must undergo regarding DAVID usage. Troopers in the Florida Highway Patrol sign usage warnings when they access the DAVID system and a criminal sanctions acknowledgment. Users are audited and instructed to select a reason for a search before making inquiries.
Denver’s independent monitor, Nicholas Mitchell, argued for strong policies and strict discipline as a safeguard, especially as increasing amounts of information are added to databases. His review found most of the 25 Denver officers punished for misusing databases over 10 years received at most reprimands.
Miami-Dade police cracked down after the Watts scandal and other high-profile cases. The department now does quarterly audits in which officers can be randomly asked to explain searches. A sergeant’s duties have been expanded to include daily reviews of proper usage and troubleshooting, said Maj. Christopher Carothers of the professional compliance bureau.
Even if the public is unaware of the amount of available information, Carothers said, “The idea that police would betray that trust out of curious entertainment or truly bad intent, that’s very disturbing and unsettling.”
Leave a Comment