Law files! Various text files covering some various laws.
Return to The Skeptic Tank's main Index page.
1CHANG~1.LAW
September 1991 COUNTERINTELLIGENCE CHALLENGES IN A CHANGING WORLD By William S. Sessions Director Federal Bureau of Investigati
1URBAN~1.LAW
October 1991 URBAN TRANSPORTATION SECURITY By Robert W. Dart Commander Gang Crimes Section Chicago
250LAW.LAW
The text of Section 250.12 of the Model Penal Code follows. Many states have adopted parts of the Model Penal Code. (New Jersey and Pennsylvania have adopted the code in great part.)
251LAW.LAW
The Model Penal Code (MPC) is arguably the most important work on criminal law in the past 30 years. This Model Code has been used as the basis of many state's criminal codes. New Jer
2CORRU~1.LAW
September 1991 CORRUPTION: A CONTINUING CHALLENGE FOR LAW ENFORCEMENT By Otis E. Cooksey Major, Military P
2DEVEL~1.LAW
October 1991 DEVELOPING POLICE LEADERSHIP By Paul Hansen Sergeant Irondequoit Police Department Rochester, New York Effe
3FBIPR~1.LAW
September 1991 FOREIGN COUNTERIANTELLIGENCE: AN FBI PRIORITY By James E. Tomlinson Special Agent in Charge Foreign Counterintellige
3POLPR~1.LAW
October 1991 POLICE PRACTICES TELEMARKETING CRIME PREVENTION By David I. Rechenmacher
4POLPR~1.LAW
September 1991 POLICE PRACTICES: MINISTERS TEAM WITH POLICE TO KEEP THE PEACE By D. R. Staton Minist
4PUSHE~1.LAW
October 1991 THE RESPECTABLE PUSHER By Jeffrey D. Lane Agent serving as Director of Investig
5BADCH~1.LAW
October 1991 TAKING THE BOUNCE OUT OF BAD CHECKS By Vinse J. Gilliam Senior District Atto
5ESPIO~1.LAW
September 1991 ESPIONAGE AWARENESS PROGRAMS By Freddie L. Capps, Jr. Special Agent FBI National DECA Coordinator Intelligence Divisi
6POVIE~1.LAW
September 1991 POINT OF VIEW: MANAGING FOR EXCELLENCE By David A. King Chief of Police Perkasie, Pennsylvania, Police Department So much has bee
6RESFO~1.LAW
October 1991 RESEARCH FORUM MCGRUFF ROBOT TEACHES KIDS (RESULTS OF A SPRINGFIELD, MISSOURI, PILOT PROGRAM) Once considered a science
7CROWD~1.LAW
October 1991 EFFECTIVE CROWD CONTROL By Steven J. Schmidt Lieutenant Colonel Assistant Chi
7DRUGT~1.LAW
September 1991 THE KENTUCKY STATE POLICE DRUG TESTING POLICY By W. Michael Troop Acting Kentucky State Police Commissioner Secretary of Justice and Jerry Lovitt Major Commander, Opera
8CIVIL~1.LAW
October 1991 CIVIL FORFEITURE: REAL PROPERTY USED IN DRUG TRAFFICKING By Thomas V. Kukura J.D., Special Agent Drug
8INTER~1.LAW
September 1991 CUSTODIAL INTERROGATION: IMPACT OF MINNICK V. MISSISSIPPI By Kimberly A. Crawford Special Agent L
9BRIEF~1.LAW
LEGAL BRIEF By Special Agent Jeffrey Higginbotham, Legal Instructor, FBI Academy In May 13, 1991, the U.S. Supreme Court decided in 'County of Riverside v. McLaughlin' that the U.S. C
ABOUTEFF.LAW
General Information about the Electronic Frontier Foundation
ACADEM~1.LAW
August 1991 CITIZEN POLICE ACADEMIES By Martin Alan Greenberg, M.A. Professor Chairman, Depa
AFIS.LAW
November 1990 POLICE PRACTICES WIN: AFIS TECHNOLOGY FOR RURAL STATES Large law enforcement
AICNEWS.1
Arizona Identification Council Newsletter President: Dwane Hilderbrand Editor: Mitchell Small July, 1990 様様様様様様様様様様様様様様様様様様様様様様様様様様様様様様様様 Latent Shoepr
AL_LAW~1.LAW
Here's the Alabama Computer Crimes Law, adopted 1985, see Al.Code. Section 13A-8. ALABAMA COMPUTER CRIME ACT SECTION 13A-8-100. Short title. This article may be cited as the Alabama C
ANTI-HAC.TXT
ANTI-HACKING A BILL To create offences of unauthorised access to electronically stored data and its transmission; to confer powers of monitoring, search, seizure and destruction of su
ARTICLES.LAW
BIBLIOGRAPHY OF COMPUTER SECURITY ARTICLES 1983 THROUGH 1988 (Note: A bibliograpghy is now being developed to encompass 1989.) AUTHORS SPECIFIED ABUSEMISUSECRIME AUTHOR: Associated Pr
AR_LAW~1.LAW
Arkansas has one of the most comprehensive set of regulations on computer use.... The computer crimes law was adopted in 1987. Arkansas Code of 1987, Section 5- 41-101 SECTION 5-41-10
AZ_LAW~1.LAW
Here's the Arizona Computer Crimes Law, effective in 1978, see section 13-2301, Arizona Revised Statutes. SECTION 13-2301 Definitions We are omitting sections A through D of this sect
BABBS001.TXT
BABBS001.TXT ANTI-FED BBS SECURITY _ _ _
BBSDEFA.LAW
D E F A M A T I O N L I A B I L I T Y O F C O M P U T E R I Z E D B U L L E T I N B O A R D O P E R A T O R S A N D P R O B L E M S O F P R O O F John R. Kahn CHTLJ Comment Computer L
BBSLAW.MAN
Version 1.1 - BBS LEGAL GUIDE Including legal forms, statutes and 'how to do it' information Copyright 1993, Clary and Kraft March, 1993 All Rights Reserved Will I get in trouble for
BBSLAWS.TXT
THE LEGAL ASPECTS OF TELECOMMUNICATIONS AND ELECTRONIC BULLETIN BOARD SYSTEMS By: James J. Spinelli, President VITRON Management Consulting, Inc. Sysop: Activity Bulletin Board Servic
BBS_LAW.LAW
THE ELECTRONIC PAMPHLETCOMPUTER BULLETIN BOARDS AND THE LAW Submitted in Partial Fulfillment Of the Requirements of Mass Communications by Michael H. Riddle 72446.3241@compuserve.com
BLUE.LAW
DEATH OF THE BLUE BOX This article is reprinted from Full Disclosure. Copyright (c) 1991 Full Disclosure. Permission granted by publisher to reprint when subscription information prov
BRAVE.YES
This proves that you reading this are probably a motorist traveling and not a driver driving. But your schools, parents, and friends all told you that driving is a privelege and not a
CADDRAFT.LAW
February 1991 POLICE PRACTICES: COMPUTER AIDED DRAFTING FOR LAW ENFORCEMENT Today, computers are used extensively in police work. Current compute
CANDP.LAW
CRIME AND PUZZLEMENT by John Perry Barlow barlow@well.sf.ca.us Desperados of the DataSphere So me and my sidekick Howard, we was sitting out in front of the 40 Rod Saloon one evening
CANDP2.LAW
THE ELECTRONIC FRONTIER FOUNDATION One Cambridge Center, Suite 300 Cambridge, MA 02142 617577-1385 617225-2347 fax eff@well.sf.ca.us Saturday, July 21, 1990 Good people, Greetings. So
CARDOZO.TXT
Subject: Cardozo Law Forum article on the Craig Neidorf Computer-Crime Date: Tue, 1 Dec 1992 15:58:23 GMT Readers of misc.legal and comp.org.eff.talk may be interested in the followin
CELLMATE.LAW
December 1990 CELLMATE INFORMANTS: A CONSTITUTIONAL GUIDE TO THEIR USE By Kimberly Kingston Crawford, J.D. Sp
CHOMLOOT.TXT
Article 934 of misc.activism.progressive: Subject: Chomsky: LOOT 591 Date: 5 Oct 91 08:18:04 GMT Sender: rich@pencil.cs.missouri.edu (Rich Winkel) Followup-To: alt.activism.d Approved
CIABWASH.LAW
SEE NOTES AT END FOR INFO ON SOURCES OF THESE DOCUMENTS CENTRAL INTELLIGENCE AGENCY WASHINGTON 25, D. C. OFFICE OF THE DIRECTOR 25 APR 1956 MEMORANDUM FOR: The Honorable J. Edgar Hoov
CIVIL.DIS
Civil Disobedience by Henry David Thoreau I heartily accept the motto, 'That government is best which governs least'; and I should like to see it acted up to more rapidly and systemat
CIVLIB.LAW
Civil Liberties in Cyberspace: When does hacking turn from an exercise of civil liberties into crime? by Mitchell Kapor published in Scientific American, September, 1991. On March 1,
CIVLRG~1.LAW
August 1991 CIVIL RIGHTS CASES AND POLICE MISCONDUCT By John Epke, M.A. Special Agent Supervisor, Civil Rights Unit Criminal Investigative Divisio
CLOSENET.LAW
'Closing the Net' by Greg Costikyan [Reproduced with permission from the January 1991 issue of _Reason_ magazine. A one-year subscription (11 issues) is $19.95. Copyright 1991 by the
COG_INTE.LAW
March 1991 COGNITIVE INTERVIEWING By Margo Bennett, M.Ed. and John E. Hess, M.Ed. Special Agents and Instructors FBI Academy
COMPCRIM.TXT
February 1991 COMPUTER CRIMES: AN ESCALATING CRIME TREND By William S. Sessions Director Federal Bu
COMPRIV.LAW
COMPUTER PRIVACY VS. FIRST AND FOURTH AMENDMENT RIGHTS (By Michael S. Borella) Technical Communication from Clarkson University (1991). He is currently a graduate student and teaching
COMPUSER.LAW
Date: Thursday, 3 December 1987 07:16-MST To: info-modems Re: Copyright: The Gospel according to CompuServe! (Their position) WHAT IS A COMPILATION COPYRIGHT? CompuServe has copyright
COMPUTER.CRI
Computer Crime: Current Practices, Problems and Proposed Solutions Second Draft Brian J. Peretti It would have been surprising if there had been satisfactory road traffic legislation
CONFESS.LAW
March 1991 WHY SUSPECTS CONFESS By David D. Tousignant, M.A. Inspector Lowell, Massachusetts, Pol
CONSOLI.LAW
February 1991 PUBLIC SERVICES CONSOLIDATION: THE ANSWER TO YOUR COMMUNITY'S NEEDS By Robert L. Sobba
CONST_IN.CYB
Laurence H. Tribe, 'The Constitution in Cyberspace' PREPARED REMARKS KEYNOTE ADDRESS AT THE FIRST CONFERENCE ON COMPUTERS, FREEDOM PRIVACY Copyright, 1991, Jim Warren Computer Profess
COPYRIT1.LAW
Copyright 1991 by S. Kitterman Jr. and the Las Vegas PC Users Group, 316 Bridger Avenue, Suite 240; Las Vegas, NV 89101. All rights reserved. This file was originally printed in the O
COPYRIT2.LAW
Copyright 1991 by S. Kitterman Jr. and the Las Vegas PC Users Group, 316 Bridger Avenue, Suite 240; Las Vegas, NV 89101. All rights reserved. This file was originally printed in the N
COPYRIT3.LAW
Copyright 1991 by S. Kitterman Jr. and the Las Vegas PC Users Group, 316 Bridger Avenue, Suite 240; Las Vegas, NV 89101. All rights reserved. This file was originally printed in the D
COPYRIT4.LAW
Copyright 1992 by S. Kitterman Jr. and the Las Vegas PC Users Group, 316 Bridger Avenue, Suite 240; Las Vegas, NV 89101. All rights reserved. This file was originally printed in the J
COPYRIT5.LAW
Copyright 1992 by S. Kitterman Jr. and the Las Vegas PC Users Group, 316 Bridger Avenue, Suite 240; Las Vegas, NV 89101. All rights reserved. This file was originally printed in the M
COPYRITE.LAW
Part 1: What Copyright Is On January 1, 1978, the Copyright Act of 1976 (title 17 of the United States Code) came into effect. This general revision of the copyright law of the United
CORRECT.TXT
CORRECT ABUSE Now let's look into the process of how we can protect ourselves from this brand of justice. All federal judges, that is, ones who are selected by the
COURIE~1.LAW
June 1991 DETAINING SUSPECTED DRUG COURIERS: RECENT COURT DECISIONS By William U. McCormack Special Agent Legal In
COURT.LAW
by his legal counsel, to whom we are indebted. The page numbers correspond to transcript pagination. The document was retyped by CuD, and cross-checked against the original. A spell c
CO_LAW~1.LAW
R FRINGE COMMENTARY: Here's the Colorado Computer Crimes Law, Colorado Revised Statutes, Criminal Code, Section 18-5.5-101. SECTION 18-5.5-101. Definitions As used in this article, un
CRIME.TXT
The Electronic Encyclopedia (TM) (C) 1988 Grolier Electronic Publishing, Inc. crime In the broadest legal sense, a crime in most countries is an act committed in violation of a law fo
CRIMEC~1.CMP
C R I M E F I G H T E R S' C A T A L O G of Special Purpose Books and Videos (Where to Get CrimeFighter Training) TABLE OF CONTENTS (and Tutorial, below) Chap 0 Table of Contents and
CRIMEF~1.CMP
(Quick Tutorial below - please read) C R I M E F I G H T E R S Chap 0 Table of Contents and Quick Tutorial (2 pages) Chap 1 FloppyBooks info, CopyrightTrademarks (2 pgs) Chap 2 Why Po
CRIMINAL.LAW
December 1990 CRIMINAL INFORMANTS: AN ADMISTRATOR'S DREAM OR NIGHTMARE? By Harry A. Mount, Jr. Special Agent FBI
CSA87.LAW
101 STAT. 1724 PUBLIC LAW 100-235JAN. 8, 1988 Public Law 100-235 100th Congress AN ACT To provide for a computer standards program within the Nat
CSBYLAWS.LAW
BY-LAWS OF THE COMMUNICATIONS SECURITY ASSOCIATION, INC. (COMSEC ASSOCIATION) FINAL DRAFT 6-22-89 ARTICLE I GENERAL Section 1. Organization. The Communications Security Association is
CSLAW.LAW
Gary S. Morris GSM Associates Suite 202 7338 Lee Highway Falls Church, Virginia 22046 (703) 685-3021 Computer Security and the Law I. Introduction You are a computer administrator for
CT_LAW~1.LAW
R FRINGE COMMENTARY: 'Computer-Related Offenses' from the Connecticut General Statutes. PART XXII SECTION 53a-250 For the purposes of this part and section 52-570b: (1) 'Access' means
CYBERLAW.LAW
Cyberspace and the Legal Matrix: Laws or Confusion? Cyberspace, the 'digital world', is emerging as a global arena of social, commercial and political relations. By 'Cyberspace', I me
CYBSPACE.TXT
Cyberspace and the Legal Matrix: Laws or Confusion? Cyberspace, the 'digital world', is emerging as a global arena of social, commercial and political relations. By 'Cyberspace', I me
CYCRIME0.TXT
Date: Tue, 15 May 90 02:40:28 pdt Subject: 2600 Articles: The Phrack E911 Affair THE FOLLOWING TWO ARTICLES ARE FROM THE JUST-R
DBLAW.TXT
LEGAL PROTECTION OF COMPUTER DATABASES ~ 1991 Losey 4919 words 17 pages RALPH C. LOSEY Subin, Shams, Rosenbluth Moran, P.A. 111 N. Orange Ave., Suite 900 Orlando, Florida 32801 407-84
DEFINE.STB
DEFINITIONS OF LEGAL TERMS GLOSSARY THE ON LINE LEGAL PHRASE BOOK HELLO! We try and make the tutorials and other materials as simple and easy to read as possible. Here are definitions
DEFLIB.BBS
D E F A M A T I O N L I A B I L I T Y O F C O M P U T E R I Z E D B U L L E T I N B O A R D O P E R A T O R S A N D P R O B L E M S O F P R O O F John R. Kahn CHTLJ Comment Computer L
DELIBERA.LEB
October 1990 DELIBERATE INDIFFERENCE: THE STANDARD FOR MUNICIPAL AND SUPERVISORY LIABILITY By Michael Callahan, J.D.
DENNIS.HAY
DENNY HAYES STR FOCUS? EXCLUSIVE! '..if I single someone out..' THE PRICE OF COPYRIGHT VIOLATION STReport has obtained directly from DENNIS HAYES his very own statements concerning hi
DIR_ME~1.LAW
May 1991 DIRECTOR'S MESSAGE By William S. Sessions FBI Director Law Day 1991
DISABI~1.LAW
August 1991 THE AMERICANS WITH DISABILITIES ACT By Jeffrey Higginbotham J.D. Special Agent Legal Instructor FBI Ac
DISASTER.LAW
December 1990 DIASTER OPERATIONS: NOT BUSINESS AS USUAL By Michael Guerin Assistant Chief, Law Enforcement Division Governor's
DISCLAIM.TXT
DISCLAIMERS, RULES AND REGULATIONS All users are required to read the following notices. If you are unwilling to abide by the following terms, then you must stop using this Bulletin B
DISPATCH.LAW
November 1990 POINT OF VIEW DISPATCHING UNITS: IMPROVEMENTS FOR THE 'FIRST LINE' By Bob Blankenship Chief Redding, California, Police Department Uniformed p
DMESSAGE.LAW
April 1991 DIRECTOR'S MESSAGE By William S. Sessions FBI Director
DMESSAGE.LEB
October 1990 DIRECTOR'S MESSAGE: POLICE AND CITIZENS WORKING TOGETHER by William S. Sessions Director Federal Bureau of Investigation October is Nationa
DOGGIE.TXT
The Great American Dog Trial Vendetta! By P. Remington Adams COPYRIGHT (C) 1991 BY FULL DISCLOSURE. ALL RIGHTS RESERVED. Several years ago, one Clayton Longacre was present at the sce
DOMESTIV.LAW
January 1991 DOMESTIC VIOLENCE: WHEN DO POLICE HAVE A CONSTITUTIONAL DUTY TO PROTECT? By Daniel L. Scho
DOWNTIME.BUL
POLICY REGARDING BBS DOWNTIME This BBS operates 24 hours daily, with scheduled maintainence from 4 a.m. to 5 a.m. daily. This schedule may be altered upon 7 days notice to users. Ever
DRIVERS.LAW
February 1991 RESEARCH FORUM SURVEY RESULTS: DRIVER LICENSE SUSPENSION PROGRAMS Editor's note: As used here, administrative driver license suspensio
DRIVING.BAR
Subject: The (Almost) Definitive Answer to Driving Barefoot in America (LONG) Date: 27 Jul 1994 22:11:28 GMT NOTE: I sent my initial letters to all 50 states, and the District of Colu
DRUGDI~1.LAW
June 1991 PHARMACEUTICAL DIVERSION AND ABUSE: OUR NATION'S OTHER DRUG PROBLEM By Thomas C. Babick
DRUGTE~1.LAW
June 1991 DRUG ABUSE AND TESTING IN LAW ENFORCEMENT: NO EASY ANSWERS By Andrew J. Harvey Sergeant Alhambr
DUNNEL.TXT
STATE OF NEW YORK 5604 1989-1990 Regular Sessions I N S E N A T E May 15, 1989 Introduced by Sen. Dunne read twice and ordered printed, and when printed to be committed to the Committ
E-LAW.TXT
This paper first appeared in the Albany Law Journal of Science and Technology, Volume 3, Number 1. Care has been taken so that each printed page has been indicated in this file (by st
ECPA.LAY
THE ELECTRONIC COMMUNICATIONS PRIVACY ACT OF 1986 A LAYMAN'S VIEW by Michael H. Riddle (Copyright 1988, Michael H. Riddle. This article may be further reproduced and disseminated prov
ECPA1LAW.LAW
The Electronic Communication's Privacy Act follows. This 'Watergate' inspired statute affects BBS systems in many ways. The full annotated text follows. CHAPTER 119 WIRE AND ELECTRONI
ECPA2LAW.LAW
(i) any violation of section 1679a(c)(2) (relating to destruction of a natural gas pipeline) or subsection (i) or (n) of section 1472 (relating to aircraft piracy) of title 49, of the
ECPA3LAW.LAW
(3) with the lawful consent of the originator or an addressee or intended recipient of such communication, or the subscriber in the case of remote computing service; (4) to a person e
ECPALAY.LAW
THE ELECTRONIC COMMUNICATIONS PRIVACY ACT OF 1986 A LAYMAN'S VIEW by Michael H. Riddle (Copyright 1988, Michael H. Riddle. This article may be further reproduced and disseminated prov
EDWARDS.LAW
Marion Edwards, Plaintiff-Appellant, v. State Farm Insurance Company and 'John Doe,' Defendants-Appellees Nos. 86-3686, 86-3840 UNITED STATES COURT OF APPEALS FOR THE FIFTH CIRCUIT 83
EFF.LAW
THE ELECTRONIC FRONTIER FOUNDATION One Cambridge Center, Suite 300 Cambridge, MA 02142 617577-1385 617225-2347 fax eff@well.sf.ca.us Saturday, July 21, 1990 Good people, Greetings. So
EFFBOR.LAW
LEGAL OVERVIEW THE ELECTRONIC FRONTIER AND THE BILL OF RIGHTS Advances in computer technology have brought us to a new front
EFFSS.LAW
Article 8 of comp.org.eff.news: Xref: vpnet comp.org.eff.news:8 comp.org.eff.talk:868 misc.legal:1503 Subject: Less intrusive, more efficient searches and seizures Summary: Need sugge
ELECTRIF.LAW
July 1992 Vol. 4; Issue 5 ELECTRIFYING SPEECH New Communications Technologies and Traditional Civil Liberties -
ELEC_BBS.LAW
March 1991 ELECTRONIC BULLETIN BOARDS: A NEW RESOURCE FOR LAW ENFORCEMENT By Seth F. Jacobs Director, Research Statistics Program SEARCH Group, In
EMAILPRI.LAW
The recent discussion on email privacy provoked me into trying to formalize the employee privacy policy we have here at Digital Research. Currently, there is nothing in writing concer
EMAILPRV.LAW
Here, at long last, is the next bibliography installment... There's a small bit of overlap with the first one, particularly the articles on the Shoars vs. Epson case, but most of this
EMBEZZLE.LAW
April 1991 BANK EMPLOYEE EMBEZZLEMENT By Denise M. Dube Supervisory Investigator Los Ang
EMPLOY~1.LAW
September 1990 EMPLOYEE DEVELOPMENT PROGRAMS By John L. Pape, Chief of Police Weslaco, Texas, Police Department Police administ
ENTRAP~1.LAW
The Defense of Entrapment As it Applies to Bulletin Board System Operators By Randy B. Singer, Esq. Copyright (C) 1992 Randy B. Singer. All rights reserved. This document may be freel
EP_FORUM.LAW
April 1991 THE ENVIRONMENTAL PROTECTION FORUM By Michael A. O'Brien Assistant State's Attorne
ETHICS.LAW
January 1991 POINT OF VIEW REDEDICATING OURSELVES TO LEADERSHIP AND ETHICS IN LAW ENFORCEMENT By Vane R. King Li
ETHICS.TXT
ETHICS FOR BBS USERS The following are a few points of general BBS etiquette. If you wish to maintain your welcome on whatever system you happen to call, it would be to your advantage
FBIAUG01.LAW
August 1990 ACCREDITATION: A SMALL DEPARTMENT'S EXPERIENCE By Raymond E. Arthurs Chief, Willowbrook, Illinois, Police Department
FBIAUG02.LAW
August 1990 ODOMETER ROLLBACK SCHEMES By James E. Scripture Special Agent, FBI Boston, Massachusetts With the expense associated with purchasin
FBIAUG03.LAW
August 1990 POLICE PRACTICES: CUSTOM'S BET PROGRAM An effective interdiction effort requires the cooperation of all law enforcement agencies. To wo
FBIAUG04.LAW
August 1990 THE TACTICAL INCIDENT: A TOTAL POLICE RESPONSE By Nicholas F. Kaiser, M.A. Assistant Chief, Chief of Patrol Troy, New Yo
FBIAUG05.LAW
August 1990 A NEW APPROACH TO FTO TRAINING By Blair Rankin Captain, High Point Police Department, North Carolina
FBIAUG06.LAW
August 1990 FOCUS ON NCIC: IDENTIFYING THE UNIDENTIFIED 'Hunters find the torso of a white male in a field. A close examina
FBIAUG07.LAW
August 1990 THE FEDERAL GRAND JURY: EXCEPTIONS TO THE RULE OF SECRECY (PART I) By Austin A. Andersen Special Agent, Legal Instruct
FBIJUL01.LAW
July 1990 LATERAL ENTRY: A MOVE TOWARD THE FUTURE By J. Eddie Nix Lieutenant, Training Se
FBIJUL02.LAW
July 1990 CONFRONTING THE TERRORIST HOSTAGE TAKER By G. Dwayne Fuselier Special Agent, Special Operations and Research U
FBIJUL03.LAW
July 1990 POLICE PRACTICES: BOMB DOG TEAMS There are times when police departments may require the services of an explosives detection dog team.
FBIJUL04.LAW
July 1990 CAMPUS SECURITY: THE MULE PATROL By James A. Huff Director, Public Safety Central Missouri State University, War
FBIJUL05.LAW
July 1990 THE FORENSIC ANTHROPOLOGIST By Robert W. Mann, M.A. and Douglas H. Ubelaker, Ph.D. Physical Ant
FBIJUL06.LAW
July 1990 FOCUS ON CRIME PREVENTION: BUSINESS AND GOVERNMENT WORKING TOGETHER A joint crime prevention program has been initia
FBIJUL07.LAW
July 1990 ANTICIPATORY SEARCH WARRANTS By A. Louis DiPietro, J.D. Special Agent and Legal Instructor, FBI Academy
FBIJUN01.LAW
June 1990 THE YARDIES: ENGLAND'S EMERGING CRIME PROBLEM By Roy A. C. Ramm Detective Chief Superintendent International and Organized Crime Branch Scot
FBIJUN02.LAW
June 1990 FOCUS ON FORENSICS: LATENT SHOEPRINT ANALYSIS For decades, fingerprints have provided investigator
FBIJUN03.LAW
June 1990 TOWING COMPANIES: FRIENDS OR FOES? By Michael C. Gillo Investigator Broward County State Attorney's Office Ft. Lauderdale, F
FBIJUN04.LAW
June 1990 POLICE PRACTICES: THE NELSON-DENNY EXPERIMENT The Arizona Law Enforcement Training Academy (ALETA) provides statewide law enforcement basic training to office
FBIJUN05.LAW
June 1990 FACILITY PLANNING IN COLORADO: FORM VS.FUNCTION By James D. Munger Chief, Colorado Springs Police Department Colorado Springs, Colorado and Edw
FBIJUN06.LAW
June 1990 RECORDS MANAGEMENT IN THE 1990s By Daniel L. Arkenau Lieutenant, Commander of the Records Unit Cincinnati, Ohio, Pol
FBIJUN07.LAW
June 1990 RESEARCH FORUM: FBINA GRADUATE SURVEY During 1988, the Institutional Research and Development Unit (IRDU) at the FBI Academy surveyed FB
FBIJUN08.LAW
June 1990 B.L.O.C.: BUSINESS LEADERS AGAINST ORGANIZED CRIME By Mike King Administrative Assistant Weber County, Utah, Attorney's Office How many times
FBIJUN09.LAW
June 1990 DNA TESTING AND THE FRYE STANDARD By Robert A. Fiatal, J.D. Special Agent Legal Instructor, FBI Academy The a
FBITOP10.HUM
A:TEXTFBIJAN86.TXT (01-Jan-86) 73 lines7-bit ASCII - edited at VANC0 'The NATIONAL FBI TOP 10 FUGITIVE COUNTDOWN' The FBI's 'Ten Most Wanted Fugitives' program began on March 14, 1950
FBI_MAIL.TXT
FOR IMMEDIATE RELEASE July 26, 1989 APPEAL FILED IN TEENAGER v. FBI CASE Attorneys for Todd Patterson today filed a brief in the United States Court of Appeals in Philadelphi
FEB01.LAW
FEBRUARY 1990 PRIVATIZATION OF PRISONS: FAD OR FUTURE By Lt. David K. Burright Linn County Sheriff's Office Albany, OR Very fe
FEB02.LAW
FEBRUARY 1990 THE ADMINISTRATIVE WARNING TICKET PROGRAM By Lt. Andrew J. Barto Village of Romeoville Police Department Romeovil
FEB03.LAW
FEBRUARY 1990 ARSON INVESTIGATIONS By William A. Tobin Spe
FEB04.LAW
FEBRUARY 1990 THE CRIMINAL BEHAVIOR OF THE SERIAL RAPIST By Robert R. Hazelwood, M.S. Spec
FEB05.LAW
FEBRUARY 1990 LARGE VEHICLE STOPS Standards and accepted procedures for vehicle stops involving cars and other passenger vehicles are part of the cur
FEB06.LAW
FEBRUARY 1990 CRITICAL INCIDENT STRESS DEBRIEFING By Capt. Richard J. Conroy, M.S. Ass
FEB07.LAW
FEBRUARY 1990 FOREIGN SEARCHES AND THE FOURTH AMENDMENT By Austin A. Andersen, LL.B. Special Agent Legal Instruction Unit FBI Ac
FEB08.LAW
FEBRUARY 1990 FLORIDA'S COMPUTER CRIME In an attempt to gauge the impact of computer crime in the State, th
FEDBBS3.LST
FEDERAL PUBLIC ACCESS BULLETIN BOARDS MARCH, 1989 Set modem to 2400,8,N,1 unless otherwise indicated. BBS's have 24-hour availability unless otherwise indicated. AUTOMATED LIBRARY INF
FEDERAL.LEB
September 1990 THE FEDERAL GRAND JURY: EXCEPTIONS TO THE RULE OF SECRECY (PART II) By Austin A. Anderse
FED_LA~1.LAW
BBS LEGAL GUIDE COMMENTARY: Here's the federal computer crimes law, 18 U.S.C. 1030,adopted 1984, amended 1986) SECTION 1030 (a) Whoever- (1) knowingly access a computer without author
FENCES~1.LAW
June 1991 ROP-ing IN FENCES By James Rainum Officer Repeat Offender Project Metropolitan Police Department Washington, D.C
FILES.TUT
#help.tut PRESS ENTER FOR HELP #define.stb Definitions of legal terms TUTORIAL FILE TRANSFER LIABILITY A few stories about the law. Don't shut down your BBS and hide in a sanitized pa
FINALMO.TXT
Southwestern Bell Telephone 'The One to Call' 100 North Tucker Boulevard St. Louis, MO 63101 Phone 314 247-2216 March 12, 1992 Mr. William Hirt 7205 North Rhode Av. Kansas City, MO 64
FL_LAW~1.LAW
R FRINGE COMMENTARY- Here with go with the Florida Computer Crimes Act, Florida Statutes Chapter 815, F.S. 815.01, adopted in 1978. SECTION 815.01 Short title. This provisions of this
FOIA.DOC
FOIA FILES KIT - INSTRUCTIONS USING THE FREEDOM OF INFORMATION ACT REVISED EDITION Fund for Open Information and Accountability, Inc. 339 Lafayette Street, New York, NY 10012 (212) 47
FOIA-PA.TXT
PLEASE DO NOT BREAK THIS FILE UP INTO SMALLER SECTIONS FOR ANY REASON Filename: FOIA-PA.DOC (FOIA-PA.ZIP) Type : Document Author : Unknown Date : 092091 Desc : Citizen's Guide to the
FORBES.TXT
'A Little Perspective, Please' by Mitchell Kapor Forbes Magazine June 21, 1993 (Permission granted for electronic redistribution) In Its Dec.21, 1992 cover story, headlined 'The playg
FORENP11.LAW
July 1991 THE FBI'S FORENSIC DNA ANALYSIS PROGRAM By Jay V. Miller Program Manager Nat
GA_LAW~1.LAW
R FRINGE COMMENTARY- The Georgia Computer Crimes Law follows, Official Code of Georgia, Title 16 Section 9-91, adopted 1981 SECTION 16-9-91 Legislative intent The General Assembly fin
GUNSHO~1.LAW
June 1991 GUNSHOT PRIMER RESIDUE: THE INVISIBLE CLUE By Roger W. Aaron Special Agent FBI Laboratory Washington, D.C.
GVTSCRCY.TXT
President Ronald Reagan nicknamed 1987 'The Year of the Reader,' but throughout 1987 the Reagan administration outdid itself in its efforts to control, interpret, manipulate, disinfor
HACKERS0.LAW
Here is a case where the police were eager to catch the computer criminals before they did their homework. Read the articles in order; HACKERS1, HACKERS2 HACKERS3. Also read the respo
HACKERS1.LAW
AMATEUR HACKERS TRIPPED UP By Danna Dykstra Coy This article appeared in the Telegram-Tribune Newspaper, San Luis Obispo, CA. March 23, 1991. Permission to electronically reproduce th
HACKERS2.LAW
COMPUTER CASE TAKES A TWIST By Danna Dykstra Coy This article appeared in the Telegram-Tribune Newspaper, San Luis Obispo, CA. March 29, 1991. Permission to electronically reproduce t
HACKERS3.LAW
HACKERS' OFF HOOK, PROPERTY RETURNED By Danna Dykstra Coy This article appeared in the Telegram-Tribune Newspaper, San Luis Obispo, CA. April 12, 1991. Permission to electronically re
HACKERS4.LAW
A Case for Mistaken Identity... Who's Privacy was Really Invaded? By Jim Bigeloww SLO Bytes PCUG According to the San Luis Obispo County (California) Telegram-Tribune, dated Saturday,
HANDBOOK.TXT
198889 Revised Edition W H A T Y O U S H O U L D K N O W I F Y O U ' R E A C C U S E D O F A C R I M E by Joyce B. David, Esq. Foreword by the Hon. Milton Mollen Presiding Justice App
HATEGROU.LAW
January 1991 HATE VIOLENCE IN THE UNITED STATES By Floyd I. Clarke Deputy Director Federal Bureau of Investigation On October 8, 1988, members o
HIGHTECH.LAW
November 1990 A LOW COST APPROACH TO HIGH TECHNOLOGY By Mark Clark Lieutenant South Portland, Maine, Police Department How does a department move out of the time-honored carb
HI_LAW~1.LAW
R FRINGE COMMENTARY: Hawaii's computer crimes law follows. Section 708-890 of the Hawaii penal code, adopted 1984. SECTION 708-890 Definitions of terms in this part. In this part, unl
HOMELESS.LAW
November 1990 POLICE AND THE HOMELESS By Barney Melekian Lieutenant Santa Monica, California, Police Department All across the country, fr
HOSTAGE.LAW
January 1991 HOSTAGEBARRICADE INCIDENTS: HIGH RISK FACTORS AND THE ACTION CRITERIA By G. Dwayne Fu
HOTEL.LAW
December 1990 POLICE PRACTICES OPERATION HOTEL-MOTEL The transient nature of drug deale
IA_LAW~1.LAW
The Iowa Computer Crime law follows. This statute was enacted in 1984. CHAPTER 716A.1. Definitions As used in this chapter, unless the context otherwise requires: 1 'Access' means to
IDENTP01.LAW
July 1991 IDENTIFICATION: A MOVE TOWARD THE FUTURE By Bruce J. Brotman Special Agent and Section Chief Automation, Rese
ID_LAW~1.LAW
R FRINGE COMMENTARY- The Idaho Computer Crimes Law follows, Idaho Code, 18-2201, adopted 1982 SECTION 18-2201 Definitions. As used in this chapter: (1) To 'access' means to instruct,
IL_LAW~1.LAW
The Illinois Computer Crime Prevention law, adopted in 1981, and amended in 1987. This is article 16D of the 'Criminal Code of 1961.' 16D-1. Short title Section 16D-1. Short title. Th
INVBASIC.LAW
April 1991 ENVIRONMENTAL CRIMES: INVESTIGATIVE BASICS By Martin Wright Deputy Assistant Director Office of Criminal Investig
IN_LAW~1.LAW
The Indiana Computer tampering laws follows. This law was adopted in 1986. 35-43-1-4. Computer tampering.- (a) As used in this section: 'Computer network' and 'computer system' have t
JAN01.LAW
January 1990 DIRECTOR'S MESSAGEFACING THE FUTURE By William S. Sessions Director I am delighted to have an opportunity to
JAN02.LAW
January 1990 THE FUTURE OF LAW ENFORCEMENT: DANGEROUS AND DIFFERENT By Alvin and Heidi Toffler Before we begin, a question. Does anyone reading this think the years ahead are likely t
JAN03.LAW
January 1990 THE CHANGING FACE OF AMERICA By Robert C. Trojanowicz, Ph.D. and David L. Carter, Ph.D. In the next century America's population will cha
JAN04.LAW
January 1990 The Future of Policing By William L. Tafoya, Ph.D. In August 1982, law enforcement executives
JAN05.LAW
January 1990 PUBLIC LAW ENFORCEMENTPRIVATE SECURITY: A NEW PARTNERSHIP? By Terrence J. Mangan and Michael G. Shanahan As the industrialized n
JAN06.LAW
January 1990 A LOOK AHEAD: VIEWS OF TOMORROW'S FBI By Richard Sonnichsen Gail O. Burton and Thomas Lyons The la
JAN07.LAW
January 1990 TOMORROW'S AMERICA: LAW ENFORCEMENT'S COMING CHALLENGE By Rob McCord and Elaine Wicker Powerful economic and social indicators
JOBHOME.LAW
November 1990 TAKING THE JOB HOME By Richard N. Southworth Criminal Investigator Virginia Office of the Attorney General One day, while
JUDNAP26.LAW
July 1991 JUDICIAL ACCEPTANCE OF DNA PROFILING By John T. Sylvester, J.D. and John H. Stafford, J.D. Special Agents DNA
JURYNUL.TXT
JURY NULLIFICATION EACH PERSON ON A JURY HAS THE POWER TO VOTE 'NOT GUILTY' IN ANY CRIMINAL CASE EVEN IF IT IS OBVIOUS THE DEFENDANT BROKE THE LAW (PENAL CODE). THIS TREMENDOUS 'POWER
KS_LAW~1.LAW
R FRINGE COMMENTARY- The Kansas Computer Crimes Law follows, Kansas, Section 21-3755, adopted 1985 SECTION 21-3755 Computer crime, unlawful computer access (1) As used in this section
KY_LAW~1.LAW
The Kentucky Computer Crime law follows. This statute was enacted in 1984. SECTION 434.840 Unlawful access to a Computer 434.840. Definitions. For the purposes of KRS 434.845 and 434.
LAWBBS.TXT
Compiled and Maintained by F R O L I C D E T O U R LAW BBS 919-893-5206 400 downloadable business-oriented files. For legal professionals only. (Last Updated November 10, 1986) . . .
LAWS.TXT
Interesting USA laws - from USENET. Here's a listing of some rather interesting laws which were passed in the U.S. Taken from the Seattle P-I (Tuesday, Sep. 4 page B-9) with no permis
LA_LAW~1.LAW
The Louisiana Computer Related Crime, passed in 1984. Louisiana Revised Statutes 14:73.1 Definitions. As used in this Subpart unless the context clearly indicates otherwise: (1) 'Acce
LEBMAY01.LAW
May 1990 DIRECTOR'S MESSAGE LAW DAY 1990 By William S. Sessions
LEBMAY02.LAW
May 1990 G.R.A.M.P.A. COPS By Jere L. Spurlin Police Chief and Steve Schwein Captain Fort Myers, Florida, Police Department
LEBMAY03.LAW
May 1990 HIGH SCHOOL SUICIDE CRISIS INTERVENTION By David Fisher, M.A. Deputy Pinnell
LEBMAY04.LAW
May 1990 POLICE PRACTICES 1 ELDERWATCH In the summer of 1986, because of
LEBMAY05.LAW
May 1990 POLICE PRACTICE 2 DARE: SELECTING THE RIGHT OFFICER The Drug Abuse Resi
LEBMAY06.LAW
May 1990 ANALYTICAL INTELLIGENCE TRAINING By Marilyn B. Peterson Analytical Supervisor New Jersey Division of Criminal
LEBMAY07.LAW
May 1990 LAW ENFORCEMENT EXPLORING By Steve Farish President Texas Law Enforcement Explorer Advisor's Asso
LEBMAY08.LAW
May 1990 CURTILAGE: THE FOURTH AMENDMENT IN THE GARDEN By John Gales Sauls Special Agent and Legal I
LEBMAY09.LAW
May 1990 LEGAL BRIEF Maryland v. Buie U.S. Supreme Court Decision On February 28, 1990, the Supreme Court deci
LEN.ROS
The following information was compiled by Brendan Kehoe, CuD archivist, on the LEN ROSE events for those who seek more background information. The Following is the original press rele
LISTCOUN.TXT
AK ALEUTIAN ISLANDS ANCHORAGE BARROW BETHEL BRISTOL BAY CARDOVA-MCCARTHY FAIRBANKS JUNEAU KENAI-COOK INLET KETCHIKAN KOBUK KODIAK KUSKOKWIM LYNN CANAL-ICY STRAITS NOME PALMER WASILLA
LITH_LAW.TXT
LEGALLY, LITHUANIA'S CASE IS OPEN AND SHUT By Vytautas Landsbergis President of Lithuania There is no shortage of advice for solving the Lithuanian question these days. But to solve t
LOTUS.TXT
-forwarded message followscut here888 IMPORTANT THIS IS VERY IMPORTANT PLEASE READ Date: 26 Nov 90 13:57:58 0000 From: rs
MANAGE05.LAW
August 1991 WHAT THEY DIDN'T TEACH IN MANAGEMENT SCHOOL By James D. Sewell, Ph.D. Director Florid
MAPS_COP.IN
From dog.ee.lbl.gov!tennyson.lbl.gov!twcaps Mon Oct 14 16:45:22 PDT 1991 Article 25859 of alt.folklore.urban: From: twcaps@tennyson.lbl.gov (Terry Chan) Subject: Cecil Adams on Copyri
MAR90_1.LAW
March 1990 THE PRELIMINARY INVESTIGATION PROCESS By Chief Gordon F. Urlacher and Lt. Robert J. Duffy Rochester
MAR90_2.LAW
March 1990 STORE DIVERSION BURGLARIES By Detective Robert P. Meiners Lincolnwood, Illinois, Po
MAR90_3.LAW
March 1990 POLICE PRACTICES: OPERATION ALERT By Captain Mark Willingham
MAR90_4.LAW
March 1990 POLICE RETIREMENT: THE IMPACT OF CHANGE By John M. Violenti, Ph.D Department of Social and Pre
MAR90_5.LAW
March 1990 MANAGING POLICE BASIC TRAINING CURRICULUM By Rene A. Browett Curriculum Manager
MAR90_6.LAW
March 1990 PERSONAL LIABILITY: THE QUALIFIED IMMUNITY DEFENSE By Daniel L. Schofield, S.J.D. Special Age
MASSMO~1.LAW
New Massachusetts Modem Tax Proposed (For Real) Channel 1 BBS in Cambridge is having the unpleasant experience of being targeted for an 'experiment' in revenue collection by the Massa
MD_LAW~1.LAW
R FRINGE COMMENTARY- Here's the Maryland Computer Crimes Law, with comments; Article 27, Section 146, Code of Maryland, 'Crimes and Punishments (a) Definitions- In this section the fo
MEDIALAW.LAW
Here's a short article excerpted from my upcoming book tentatively entitled 'Communication in Peace and War' (Brooks-Cole, 1992). 'Media Performance and International Law' by Howard H
MEDICP21.LAW
July 1991 MEDICAID FRAUD By Larry L. Bailey Deputy Chief Investigator Colo
MILITA~1.LAW
June 1991 MILITARY SUPPORT TO CIVILIAN LAW ENFORCEMENT AGENCIES By R. Barry Cronin Major U.S. Mar
MI_LAW~1.LAW
R FRINGE COMMENTARY: Here's the Michigan Computer Crimes law, Michigan Compiled Laws 752.791 SECTION 752.791 Meanings of words and phrases Sec. 1. For the purpose of this act, the wor
MN_LAW~1.LAW
The Minnesota Computer Crimes Law follows, Section 609.87. SECTION 609.87 Computer crime, Definitions Subdivision 1. Applicability. For purposes of section 609.87 to 609.89, and secti
MOBILE.LAW
January 1991 POLICE PRACTICES MOBILE COMMAND POSTS As service providers, law enforcement agencies respond to a broad ra
MORRIS.APP
928 F.2d 504 59 U.S.L.W. 2603 (CITE AS: 928 F.2D 504) UNITED STATES of America, Appellee, v. Robert Tappan MORRIS, Defendant-Appellant. No. 774, Docket 90-1336. United States Court of
MO_LAW~1.LAW
R FRINGE COMMENTARY- The Missouri Computer Crimes Law follows, Missouri Statutes, 569.093, adopted 1982 SECTION 569.093 Definitions As used in this sections 569.094 to 569.099 and in
MS_LAW~1.LAW
R FRINGE COMMENTARY: Mississippi Computer Crimes Law, effective July 1, 1985 SECTION 97-45-1 Definitions. For the purposes of this chapter, the following words shall have the followin
MT_LAW~1.LAW
R FRINGE COMMENTARY: Here's the Montana Computer Law Statute. Section 45-2-101, Montana Code SECTION 45-2-101 General definitions. Unless otherwise specified in the statute,, all word
MURPHY.TXT
Murphys Law and those of similar ilk. Murphys Law: If anything can go wrong, it will. Schmidts Law: If you fiddle with something long enough, it will break. Fudds First Law of Opposit
MVTLEB.LAW
September 1990 MOTOR VEHICLE THEFT INVESTIGATIONS: EMERGING INTERNATIONAL TRENDS By Mary Ellen Beekman Special Agent, FBI, New Yo
NCIC.LAW
January 1991 NCIC TRAINING: HIT OR MISS By Don M. Johnson Special Agent FBI Headquarters, Washington, DC Today, the National Crime Information Center (NCIC) continues to be the best e
NC_LAW~1.LAW
R FRINGE COMMENTARY- The North Carolina Computer Crimes Law follows, General Statutes of North Carolina, Section 14-453, adopted 1979 SECTION 14-453 Definitions As used in this sectio
ND_LAW~1.LAW
The North Dakota Computer fraud and crime statute follows, Chapter 12.1-06.1-08, originally passed in 1983 and amended in 1987. Chapter 12.1-06.1-08 Computer fraud-computer crime- Cla
NE_LAW~1.LAW
R FRINGE COMMENTARY: The Nebraska Computer Crimes Law, effective 1985, Nebraska Criminal Code, Section 28-1343 SECTION 28-1343. Terms, defined. For the purposes of sections 28-1343 to
NH_LAW~1.LAW
R FRINGE COMMENTARY: Here's the New Hampshire Computer Crimes Law, adopted in January, 1986, New Hampshire Revised Statutes [1955] section 638:16. SECTION 638:16 Computer Crime; Defin
NJ_LAW~1.LAW
BBS LEGAL GUIDE COMMENTARY- The New Jersey Computer -Related Crimes law. It is section 2C:20 of the Code of Criminal Justice of New Jersey, adopted in 1984. 2C20-23. Definitions. As u
NOV_1.LAW
THE FBI'S 10MM PISTOL By JOHN C. HALL Special AgentUnit Chief Firearms Training Unit FBI Academy Quantico, VA November 1989 For several decades, FBI Agents carried the .38 caliber rev
NOV_2.LAW
AMMUNITION SELECTION: RESEARCH AND MEASUREMENT ISSUES By N.J. SCHEERS, Ph.D Operations Research Analyst and STEPHEN R. BAND, Ph.D. Special Agent Institutional Research and Development
NOV_3.LAW
Utilizing Job Task Analysis By THOMAS J. JURKANIN, Ph.D. Illinois Local Governmental Law Enforcement Officers Training Board Champaign, IL November 1989 The relevance and quality of t
NOV_4.LAW
THE JUDICIAL SEALING REQUIREMENT IN ELECTRONIC SURVEILLANCE -A MATTER OF IMMEDIACY BY ROBERT A. FIATAL, J.D. Special Agent Legal Counsel Division FBI Academy Quantico, VA November 198
NSA.TXT
At 12:01 ON the morning of November 4, 1952, a new federal agency was born. Unlike other such bureaucratic births, however, this one arrived in silence. No news coverage, no congressi
NV_LAW~1.LAW
R FRINGE COMMENTARY: Here's the Nevada Computer Unfair Trade Practice law law, Nevada Revised Statutes, Section 603.010, adopted in 1983 SECTION 603.010 Definitions As used in this ch
NYAPPL.LAW
February 1991 NYPD'S APPL PROGRAM: A NEW PARTNERSHIP By Anthony M. Voelker Chief of Org
NY_LAW~1.LAW
New York Penal Law, Computer Crime, Section 156.00. This act became effective in 1986. Section 156.00 Offenses involving computers; definitions of terms The following definitions are
OFC_LO~1.LAW
May 1991 LAW ENFORCEMENT OFFICERS KILLED: 1980 1989 By Victoria L. Major Supervisor, Unifo
OH_LAW~1.LAW
R FRINGE COMMENTARY: Here's Ohio's computer crimes law, one of the shortest on record SECTIOn 2913.81 Denying access to a computer (A) No person, without privilege to do so, shall kno
OLW1.TXT
OUR LAWYER WRITES: Dear Our Lawyer: A few days ago, I opened a bottle of milk purchased at a local supermarket and found a rat inside it. What should I do about this? It is interestin
OLW3.TXT
Dear Our Lawyer, I should like a divorce, but I cannot prove anything against my husband, I am just sick of his face looking at me from behind things. What do I need to prove my marri
OLW5.TXT
Dear Our Lawyer, In the light of the Lee Marvin case, I was wondering if there might be anything in it for me. While I am not exactly a mistress, there is no doubt that the man from t
OP-CLEAN.LEB
October 1990 OPERATION CLEAN: RECLAIMING CITY NEIGHBORHOODS By Richard W. Hatler Deputy Chief Dallas, Te
PATROL.LAW
February 1991 PERSPECTIVE: THE PATROL FUNCTION By Patrick V. Murphy Former Police Commissioner
PA_LAW~1.LAW
R FRINGE COMMENTARY: Here is Pennsylvania's computer crimes law, adopted in 1983 with changes in 1986, Pennsylvania consolidated statutes title 18 section 3933. SECTION 3933 Unlawful
PLATEA~1.LAW
June 1991 PLATEAUING IN LAW ENFORCEMENT By James M. Childers Sergeant Lubbock, Texas, Police Department Burnout is a very familiar concept to law enfor
POL-COM.LEB
October 1990 COMMUNITY POLICING IS NOT POLICE COMMUNITY RELATIONS By Robert C. Trojanowicz, Ph.D. Director, School
POL-PRAC.LEB
October 1990 POLICE PRACTICES: SEAT BELT AWARENESS PROGRAM The use of seat belts is probably
POLPRA~1.LAW
July 1991 POLICE PRACTICES: OPERATION STAR Miami, Florida, attracts a significant number of tourists eac
POLPRA~2.LAW
August 1991 POLICE PRACTICES: MIAMI'S ETHNIC SHARING PROGRAM Over the past several years, Miami, Florida, has
POL_PR~1.LAW
May 1991 POLICE PRACTICES: BAITED VEHICLE DETAIL Property crimes present a challenge to law enf
POL_PR~2.LAW
June 1991 POLICE PRACTICES: ALTERNATE FUEL PROGRAM During the late 1970s, as
POSTER.TXT
The following is a manual transcription of the wanted poster issued by the Federal Bureau of Investigation April 4, 1988. Any errors are inadvertant. INTERSTATE FLIGHT - ATTEMPTED CAP
PRACTICE.LAW
April 1991 POLICE PRACTICES: CHP'S HAZARDOUS WASTE INVESTIGATIVE UNIT The amount of hazardous waste generated in this country changed dramatically with the industrial growth that foll
PRACTICE.TXT
March 1991 POLICE PRACTICES: COMMUNITY OUTREACH PROGRAM In an effort to improve police-community relations,
PRACTI~1.LAW
September 1990 POLICE PRACTICES: PENNSYLVANIA'S INTERDEPARTMENTAL COMMUNICATIONS SYSTEM No one can argue t
PRIMES.TXT
Primes, Codes and the National Security Agency Susan Landau Physicists lost their innocence and freedom from government controls with Los Alamos. For biologists that time came in 1976
PRIVATIZ.NRE
'The Privatized NREN' Mitchell Kapor Electronic Frontier Foundation February 14, 1991 A Note on Terminology: Use of terms in discussions on networking is notoriously subject to confus
PRIVSOC.LAW
THE PRIVATE AND OPEN SOCIETY BY JOHN GILMORE A transcript of remarks given by John Gilmore at the First Conference on Computers, Freedom, and Privacy, March 28,1991 My talk concerns t
PRODIGY.LAW
PRODIGY STUMBLES AS A FORUM ... AGAIN By Mike Godwin On some days, Prodigy representatives tell us they're running 'the Disney Channel of online services.' On other days the service i
PROMOT~1.LAW
September 1990 PROMOTION TO CHIEF: KEYS TO SUCCESS IN A SMALL DEPARTMENT By Carl L. Spicocchi Chief of Police Swatara Townsh
PROSECUT.LAW
April 1991 ENVIRONMENTAL CRIMES PROSECUTION: A LAW ENFORCEMENT PARTNERSHIP By Vincent A. Matulewich Supervisory S
PVIEWP18.LAW
JULY 1991 POINT OF VIEW: EUROPEAN LAW ENFORCEMENT AFTER 1992 By Jan Blaauw Some 200 years ag
P_VIEW.LAW
April 1991 POINT OF VIEW A MANAGER'S GUIDE TO COMPUTER PROJECTS By Charles Brennan
P_VIEW~1.LAW
May 1991 POINT OF VIEW CAMPUS POLICE: A DIFFERENT VIEW By Gigi Ray
RATPATRO.LAW
January 1991 THE RAT PATROL RIDES! By Paul C. Ricks Deputy Chief of Police Colorado Springs, Colorado, Police Department I
REBUTTAL.TXT
INSLAW's ANALYSIS and REBUTTAL of the BUA REPORT Memorandum in Response to the March 1993 Report of Special Counsel Nicholas J. Bua to the Attorney General of the United States Respon
RES-REV.LEB
October 1990 RESEARCH REVIEW POLICE USE OF DISCRETION: A COMPARISON OF COMMUNITY, SYSTEM, AND OFFICER EXPECTATIONS
RESPONSE.TXT
A Case for Mistaken Identity... Who's Privacy was Really Invaded? By Jim Bigeloww SLO Bytes PCUG According to the San Luis Obispo County (California) Telegram-Tribune, dated Saturday,
REVIEWL.LAW
REGARDING Book Review: Liability If you have read Peter Huber's recent _Galileo's Revenge_, or Walter Olson's _The Litigation Explosion_, or if you've been following some of the recen
RIPCO.LAW
DR. RIPCO SEIZURE This article is reprinted from Full Disclosure. Copyright (c) 1991 Full Disclosure. Permission granted by publisher to reprint when subscription information provided
RIPCO-WA.RRA
SEIZURE WARRANT DOCUMENTS FOR RIPCO BBS On May 8, 1990, RIPCO BBS was closed and the equipment seized as the result of a sei
RI_LAW~1.LAW
R FRINGE Commentary: Here's the Rhode Island Computer Crimes Law, General Laws of Rhode Island, Section 11-52, adopted in 1979 SECTION 11-52-2 Access to computer for fraudulent purpos
SAFETY~1.LAW
October 1990 SAFETY ACTION TEAM By Rod Englert Lieutenant Multnomah County, Oregon, She
SCHOOL.LAW
February 1991 PREPARING FOR SCHOOL CRISIS By David Nichols, Ph.D. Director, Public Safety Jacksonville
SCHOOLCR.LAW
December 1990 SCHOOL CRIME STOPPERS By Bob Chance Major, Commander of the Uniform Division Southwest Tulsa, Oklahoma, Police Dep
SC_LAW~1.LAW
R FRINGE COMMENTARY: Here's the South Carolina Computer Crimes Law, adopted 1984, see Code of Laws of South Carolina, 16-16-10 SOUTH CAROLINA COMPUTER CRIME ACT SECTION 16-16-10. Defi
SD_LAW~1.LAW
R FRINGE COMMENTARY- Here's the South Dakota Computer Crimes Law, adopted 1982. SECTION 43-43B-1 Unlawful uses of a computer A person is guilty of unlawful use of a computer when he:
SEARCH.TXT
April 1991 SEARCHES OF PREMISES INCIDENT TO ARREST By A. Louis DiPietro, J.D. Special Agent an
SEARCHES.TXT
March 1991 EMERGENCY SEARCHES OF EFFECTS By John Gales Sauls Special Agent and Legal Instructor FBI Academy Quantico, Virginia A police department rece
SEARCH~1.LAW
May 1991 INVENTORY SEARCHES: THE ROLE OF DISCRETION By Austin A. Andersen Special Agent and Le
SENTGUID.LAW
March 15, 1993 United States Sentencing Commission One Columbus Circle, NE Suite 2-500, South Lobby Washington, DC 20002-9002 Attention: Public Information Re: Proposed Amendent #59 t
SEROLO~1.LAW
October 1990 SEROLOGICAL EVIDENCE IN SEXUAL ASSAULT INVESTIGATIONS By Robert R.J. Grispino, M.A. Special Age
SNIPER~1.LAW
September 1990 POLICE SNIPER TRAINING By John Plaster, Major Director of Instruction Minnesota National Guard Counter Sniper School St. Paul, Minnesota
SOFTMA~1.LAW
INFORMATION AND DOCUMENTS NEEDED FOR SOFTWARE COPYRIGHT APPLICATION M. Lee Murrah Attorney at Law 6504 Hillcrest Rd. Roanoke, Texas 76262 Metro 430-3760 (Area 817) Information Needed
SOFTPAT.TXT
Partial List Of Software Patents maintained by Michael Ernst mernst@theory.lcs.mit.edu You can ftp this file from mintaka.lcs.mit.edu:mitlpfaipatent-list. That site is mirrored by jup
STEROI~1.LAW
August 1991 ABUSE OF ANABOLIC STEROIDS By Charles Swanson, Ph.D. Faculty Member Vinson Institute of Government University o
STRIPE~1.LAW
May 1991 HONOLULU'S STRIPES: TRAINING FOR SERGEANTS By Robert D. Prasser Captain Honolulu,
SUC-INTE.TXT
March 1991 SUCCESSFUL INTERVIEWING By James R. Ryals Commander Long Beach, California, Police Departmen
SUMMARY.TXT
THE INSLAW AFFAIR SEPTEMBER 10, 1992.-Committed to the Committee of the Whole House on the State of the Union and ordered to be printed Mr. BROOKS, from the Committee on the Judiciary
SUPREME.LAW
November 1990 SELECTED SUPREME COURT CASES: 1989-1990 TERM By William U. McCormack Special Agent Legal Instructor FBI Academy
SURVIV~1.LAW
August 1991 THE WILL TO SURVIVE By Stephen R. Band, Ph.D. Special Agent Operations Resource and Assessment Unit FBI Academy and I. John Vasquez, M.Ed
SWISS.TXT
About the Editor Adam Starchild can occassionally be persuaded to take time off from his private entrepreneurship activities to write. During these interludes he has written over a do
SWT.TXT
The Wall Street Journal 92093 Seizing Wire Transfers The government can intercept international wire transfers without a warrant, a federal appeals court said, further expanding the s
TARGETD.LAW
November 1990 WASHINGTON, D.C.'S OPERATION 'ON TARGET' By Eric W. Witzig Retired Detective Washington, D.C., Metropolitan Police Department and George R. Wilson
TAXOTHER.TUT
#help.tut PRESS ENTER FOR HELP #define.stb Definitions of legal terms #183.sta Internal Revenue Regulations, tax losses TAX DEDUCTIBILITY OF BBS OPERATIONS There are 3 subjects regard
TEAMWO~1.LAW
May 1991 TEAMWORK: AN INNOVATIVE APPROACH By Alan Youngs Captain Lakewood, Colorado, Police Department and Eric K. Malmborg
TEMPEST.LAW
Date: Fri, 19 Jan 90 19:13:44 -0500 The following is a prepublication draft of an article on TEMPEST. I am posting it to this news group in the hope that it will: (1) stimulate discus
THEFACTS.LAW
PUSH BUTTON FELONIES
THEFT_OF.SOF
December 1989 FBI 1. THEFT OF COMPUTER SOFTWARE: A NATIONAL SECURITY THREAT By William J. Cook Assistant U.S. Attorney Chicago, IL Between July and September 1987, a Chicago youth att
TM.TUT
#help.tut EXTRA HELP FOR TUTORIALS #define.stb ON LINE LEGAL GLOSSARY The world of Trademarks was subject to a major change last year. Here is an informational text direct from the ni
TN_LAW~1.LAW
R FRINGE COMMENTARY- Here with go with the Tennessee Computer Crimes Act, Tenn. Code 39-3-1401, adopted 1983. SECTION 39-3-1401.Short title. This part shall be known, and may be cited
TRASH.LAW
February 1991 TRASH INSPECTIONS AND THE FOURTH AMENDMENT By Thomas V. Kukura, J.D.
TX_LAW~1.LAW
R FRINGE COMMENTARY: Texas' Computer Crimes Law follows. TITLE 7, Texas Penal Code SECTION 33.01 Definitions In this chapter: (1) 'Communications common carrier' means a person who ow
UIC.LAW
Note that these arguments don't assume that software should be free. They are addressed to ordinary developers of proprietary software. input texinfo @setfilename look-and-feel @setti
USCON.LAW
THE CONSTITUTION OF THE UNITED STATES Preamble We the People of the United States, in Order to form a more perfect Union, establish Justice, insure domestic Tranquility, provide for t
UT_LAW~1.LAW
R FRINGE COMMENTARY: Here's the Utah Computer Crimes Act adopted in 1979, with a major revision in 1986 SECTION 76-6-701. Computer crimes actshort title This part is known as the 'Uta
VA_LAW~1.LAW
Article 7.1. Computer Crimes. Sections 18.2-152.1. Short title. - This article shall be known and may be cited as the 'Virginia Computer Crimes Act.' (1984, c. 751.) Sections 18.2-152
VIC-WIT.TXT
March 1991 VICTIM-WITNESS ASSISTANCE By Joseph R. Luteran Supervisor, Victim-Witness Assistance Program U.S. Capitol Police
VISIOP08.LAW
July 1991 VISIOPHONES: FRENCH HIGH TECH SECURITY By Pierre Marie Bourniquel Commissaire Principal, Chie
WAIVER.TXT
WAIVER OF CLAIMS WAIVER OF PROSECUTION PERTAINING TO ADULT SECTIONS OF RYAN'S BAR BBS I, _, being an adult over the age of [] TWENTY-ONE SIGN: _
WAY.LAW
THERE'S GOTTA BE A BETTER WAY By Glen Roberts Bill Vajk This article is reprinted from Full Disclosure. Copyright (c) 1991 Full Disclosure. Permission granted by publisher to reprint
WA_LAW~1.LAW
Chapter 9A.52 of the Revised Code of Washington follows. This chapter was adopted in 1984. 9A.52.010. Definitions The following definitions apply in this chapter: Sections 1, 2 and 3
WEAPON~1.LAW
May 1991 VEHICULAR LONG BARREL WEAPONS MOUNT By David W. Pisenti Special Agent Firearms Traini
WI_LAW~1.LAW
The Wisconsin Computer crimes law, Wisconsin statutes section 943.70. . SECTION 943.70. Computer crimes (1) Definitions. In this section: (a) 'Computer' means an electronic device tha
WV_LAW.LAW
West Virginia State Law Contact -U1E63@WVNVM 'Bruce M. MacIsaac' 2-MAY-1989 13:27 The following is the first part of a newly elected state law in West Vriginia. Computer Fraud Any per
WY_LAW~1.LAW
R FRINGE COMMENTARY: Here's the Wyoming Computer Crimes Law, Wyoming Criminal Code, Section 6-3-501, adopted in 19821983 SECTION 6-3-501 Definitions As used in this article: (i) 'Acce
The views and opinions stated within this web page are those of the
author or authors which wrote them and may not reflect the views and
opinions of the ISP or account user which hosts the web page. The
opinions may or may not be those of the Chairman of The Skeptic Tank.