Bill Summary Status H.RES.251 Amending the articles of impeachment impeaching Walter L. Nixon, Federal agencies in the investigation and prosecution of crimes relating to http://thomas.loc.gov/cgi-bin/bdquery/?&Db=d101&querybd=@FIELD(FLD003 @4((@1(Rep
Bill Summary Status HR50 To regulate the conduct of the Federal Bureau of investigation in HR829 To amend title I of the Omnibus crime Control and Safe Streets Act of http://thomas.loc.gov/cgi-bin/bdquery/?&Db=d103&querybd=@FIELD(FLD003 @4((@1(Rep
Criminal Justice Washington Bureau of investigation, US Dept. of Justice. Nash, Jay R.Encyclopedia of World crime Criminal Justice, Criminology, and Law Enforcement http://www2.lib.udel.edu/subj/crjs/resguide/crim.htm
Chapter Ten this special report (`Torture committed by the police in Sri Lanka, article2, vol. Do they have more pressing concerns than crime investigations, http://www.ahrchk.net/pub/mainfile.php/r2speakloudly/146/
Extractions: Advanced Search Print This Article The right to speak loudly ISBN 962-8161-0509 chapter ten The case studies of torture committed by the police in Sri Lanka outlined in this special report (`Torture committed by the police in Sri Lanka, article 2, vol. 1, no. 4, 2002) are exceptional when compared to cases of torture in other countries, in that they all relate to inquiries into common crimes, or mere grievances between a police officer and his victim. They indicate a severe crisis in the way the Sri Lankan police conduct criminal investigations. Under the law, there are prescribed procedures for criminal investigations. These procedures seem to be completely ignored. The type of assaults committed also show that police officers are not making any attempts to collect information relating to crimes in an independent or rational manner, as the law requires of them. In all these cases, and many others, the very first thing the police seem to do is to beat people mercilessly, with the hope that some information may come from their suspects. However, the extraordinary level of torture frequently committed makes the victim incapable of giving a normal answer. Gerald Perera's case demonstrates the problem very clearly. The police were inquiring into a triple murder that had taken place some time before his arrest. The police apparently were under enormous pressure to show the results of their investigations into this very serious crime. They were unable to deal with forensic evidence. They were also not qualified in the
EFF "Privacy - Surveillance" Archive Aka International Computer crime Enforcement Assistance Act of 2000 960722_deadbeat_databases_article.excerpt Excerpt from Reuters article regarding http://www2.cddc.vt.edu/www.eff.org/pub/Privacy/Surveillance/
Extractions: Files Subdirectories On-Site Links Off-Site Links 20000607_s2448_cdt.comments CDT comments to Senate Judiciary Committee Chairman Orrin Hatch about problems in S. 2448, "Internet Integrity and Critical Infrastructure Protection Act of 2000", a bill relating principally to enhancing law enforcement ability to investigate computer crimes. It includes a number of troubling provisions, included expanded wiretapping authority, snooping on citizens who've violated no laws, vagueness that could result in criminalization of political expression, and weaker privacy standards for satellite as opposed to cable subscribers. Also criticizes S. 2092. s2448_net_security_2000_bill.html S. 2448, "Internet Integrity and Critical Infrastructure Protection Act of 2000", a bill relating principally to enhancing law enforcement ability to investigate computer crimes. It includes a number of troubling provisions, included expanded wiretapping authority, snooping on citizens who've violated no laws, vagueness that could result in criminalization of political expression, and weaker privacy standards for satellite as opposed to cable subscribers. A.k.a. "International Computer Crime Enforcement Assistance Act of 2000" s2092_net_security_2000_bill.html
Computer Crime Investigator's Toolkit Fortunately for computer investigators, most users do not use them. A goodarticle giving an overview of examining a computer is in the March 1997 issue http://www.secinf.net/misc/Computer_Crime_Investigators_Toolkit.html
Extractions: Anti Virus Section By Authors By Topics Authors ... Wireless Security Featured Product Recommended Sites Date Launched: Oct 16, 2002 Last Updated: Oct 16, 2002 Section: Misc Author: Ronald L. Mendell Rating: 3.3/5 - 23 Votes Also Practical explanation. Unix, DOS, Windows, Browsers, e-mail and networks covered. What I've tried to do is devise a summary of basic, practical knowledge, "tricks," if you like, that should interest all computer crime investigators. While they may not be the final word in preparing for an examination, these techniques will provide some insight into the ways and means of computer criminals. I hope to get you into the spirit of the hunt. Learning to think how a criminal looks at twisting, altering, hiding, and diverting information will definitely make the game more interesting. This is a pathfinder, a starting point to discovering other resources. Part One will cover: DOS Tricks Unix Tricks Part Two continues with: Windows Tricks Browsers Passwords Part Three will discuss: Perl Scripting Networking Fundamentals Tracing Email Part Four concludes with: Understanding Slack Files Understanding Cryptography Basics Not So Dead DOS For those who grew up in the IT field with MS-DOS, they found Unix and scripting not all that cryptic. Knowing command line instructions gives one a backstage pass to what's happening behind the GUI. Understanding how to examine a computer using MS-DOS with Windows 95 and 98 gives an investigator a firm foundation for other tricks of the trade. When users get cute with trying to hide information, MS-DOS can uncover the hidden structure. So, forget any notion that MS-DOS is dead; it will be a valuable forensic tool for some time to come.
CIC Canada | Public Report: Canada's War Crimes Program Inactive files routine investigative checks and surveys negative Article 1Fof the 1951 UN Convention relating to the Status of Refugees is an http://www.cic.gc.ca/english/pub/war1998.html
Extractions: This report, which focuses on both the World War II and modern-day aspects of the War Crimes Program undertaken by the departments of Justice and Citizenship and Immigration (CIC), is the first in a series of annual reports that will provide information about the Program and its achievements. The government of Canada has made a commitment that Canada will not become a safe haven for individuals who have committed war crimes or crimes against humanity. Together with the RCMP, the Department of Justice and CIC are working to uphold this objective. The government has allocated $46.8 million over the next three years in order to bring to justice those persons in Canada responsible for war crimes, crimes against humanity and other reprehensible acts in times of war, regardless of when those acts occurred.
Extractions: The policy of the Government of Canada is clear. Canada will not become a safe haven for those individuals who have committed war crimes, crimes against humanity or any other reprehensible act during times of conflict. Over the past several years, the Government of Canada has taken significant measures, both within and outside of our borders, to ensure that appropriate enforcement action is taken against suspected war criminals, regardless of when or where the crimes occurred. These measures include co-operation with international courts, foreign governments and enforcement action by one of the three departments mandated to deliver Canada's War Crimes Program. Canada is actively involved in supporting the International Criminal Tribunals for the former Yugoslavia (ICTY) and Rwanda (ICTR) and has ratified both the International Criminal Court Statute (ICC) and the Optional Protocol to the Convention on the Rights of the Child on the Involvement of Children in Armed Conflicts. Canada was the first country to introduce comprehensive legislation incorporating the provisions of the ICC Statute into domestic law. This legislation
Totse.com | Computer Crime Investigator's Toolkit Computer crime investigators come from differing backgrounds. A good articlegiving an overview of examining a computer is in the March 1997 issue of http://www.totse.com/en/hack/introduction_to_hacking/162449.html
Extractions: About Community Bad Ideas Drugs ... ABOUT NOTICE: TO ALL CONCERNED Certain text files and messages contained on this site deal with activities and devices which would be in violation of various Federal, State, and local laws if actually carried out or constructed. The webmasters of this site do not advocate the breaking of any law. Our text files and message bases are for informational purposes only. We recommend that you contact your local law enforcement officials before undertaking any project based upon any information obtained from this or any other web site. We do not guarantee that any of the information contained on this system is correct, workable, or factual. We are not responsible for, nor do we assume any liability for, damages resulting from the use of any information on this site. Computer Crime Investigator's Toolkit: Part I Tuesday, January 02, 2001 Ronald L. Mendell (ronmen9938@britannica.com) for SecurityPortal Computer crime investigators come from differing backgrounds. In the private sector a wide range of certifications exist: CISSP, MCSE, Internet Security Specialist, Computer Forensics Specialist, and the like. Developing a common body of knowledge is often a response to the particular examination program one wishes to pass through. Yet, professional practice often dictates the areas of an investigator's expertise. Those with an emphasis on forensic issues (such as police investigators) may concentrate on techniques pertaining to "black" or illegal email, illegal pornography, and common-law crimes committed using a computer. Those with an emphasis on security issues may deal with technologies related to combating hacking, denial of service (DoS), intrusion, and business espionage.
EFF: about the civilliberties issues raised by computer-crime investigations. INTERNET WORLD readers will recall that I recently published an article in http://www.eff.org/legal/?f=feds_on_the_net_godwin.article.txt
EFF: Legal Issues And Policy: Cyberspace And The Law law enforcement s investigations and prosecutions of computercrime cases . good_fences_johnson.article Electronic Communications Privacy Good http://www.eff.org/legal/
Extractions: ** = no commerical/for-profit redistribution w/o author's permission access_rights_johnson.article "Access Rights All Power to the Sysop?", article by David Johnson. Excerpt: "Some enlightened sysops will create mechanisms by means of which users can participate in making rules and overseeing their enforcement. Will those sysops prosper in preference to others who act less accountably? Will the existence of checks on arbitrary exercises of raw power help to keep other, external, regulators at bay?" anon_juris.article "The Coming Jurisdictional Swamp of Global Internetworking (Or, How I Learned to Stop Worrying and Love Anonymity)", by Douglas Barnes. Overview of several reasons why anonymity on the Net is a good idea, and a look at the many ways in which a foreign jurisdiction can exercise authority over citizens of other countries. anonymity_online_johnson.article
Anthony John Hardy, England's Famous Camden Ripper - The Crime Library Upon their arrival at the crime scene, investigators immediately cordoned According to a December 2002 BBC News article, the torso of a young woman was http://www.crimelibrary.com/serial_killers/predators/anthony_hardy/3.html?sect=2
Print Article Article Last Updated. Hate weighed in killing. Police investigate possible Police are investigating as a possible hate crime the slaying of a Montrose http://www.denverpost.com/portlet/article/html/fragments/print_article.jsp?artic
Criminal Justice Resources : Environmental Crime Article courtesy of Theodore M. Hammett and Joel Epstein, Lectic Law Library Environmental crime Evidence Gathering and Investigative Techniques (Book http://www.lib.msu.edu/harris23/crimjust/envcr.htm
Extractions: EPA achieves cleaner air, purer water and better-protected land in many different ways. Compliance with the nation's environmental laws is the goal, but enforcement is a vital part of encouraging governments, companies and others who are regulated to meet their environmental obligations. Enforcement deters those who might otherwise profit from violating the law, and levels the playing field with environmentally complaint companies. This web page provides links to civil, cleanup, and criminal enforcement activities. EPA's OECA, working in partnership with EPA's regional offices, State governments, Tribal governments and other federal agencies, ensures compliance with environmental laws. OECA's website includes its accomplishments, highlights of enforcement and compliance activities, and links to partners in the Environmental Crime Task Force.
.: EUROPEAN ROMA RIGHTS CENTER :. Specifically, during the pretrial investigation, BF claimed that TK had ordered 7 Article 44(2) states, ?In the proceedings held in respect of crimes http://www.errc.org/cikk.php?cikk=1800
FDA, Additional Enforced Laws USC TITLE 18 CRIMES AND CRIMINAL PROCEDURE. PART I - CRIMES 18, 1988, pub.L. 100-690, title VI, Sec. 6487(a), 102 Stat. 4386; Sept. 13, 1994, pub. http://www.fda.gov/opacom/laws/addlenf.htm
Extractions: U.S.C. TITLE 18 - CRIMES AND CRIMINAL PROCEDURE PART I - CRIMES CHAPTER 1 - GENERAL PROVISIONS CHAPTER 7 - ASSAULT (a) In General. - Whoever - (1) forcibly assaults, resists, opposes, impedes, intimidates, or interferes with any person designated in section 1114 of this title while engaged in or on account of the performance of official duties; or (2) forcibly assaults or intimidates any person who formerly served as a person designated in section 1114 on account of the performance of official duties during such person's term of service, shall, where the acts in violation of this section constitute only simple assault, be fined under this title or imprisoned not more than one year, or both, and in all other cases, be fined under this title or imprisoned not more than three years, or both. (b) Enhanced Penalty. -
Summary: Privacy Laws Of The State Of California NS300.219.1. (Smith, 1992, 1994). Investigative Consumer Reports Cal.pub Util Code 2872. Any person violating this article is guilty of a civil http://www.privacyrights.org/ar/callaw.htm
Extractions: HOME Privacy Laws of the State of California NOTES: This digest is compiled by the Privacy Rights Clearinghouse, March 1997, for the California Legislature's Joint Task Force on Personal Information and Privacy (Senator Steve Peace, Chair). Information obtained from Robert Ellis Smith's Compilation of State and Federal Privacy Laws is cited as "Smith, 1992, 1994." The California Office of Privacy Protection provides a more up-to-date list of California privacy-related laws at www.privacy.ca.gov/califlegis.htm The OPP's list is particularly more current on laws related to identity theft. Arrest Records Whenever a person is acquitted of a charge and it appears to a judge that the person was innocent of the charge, the judge may order the case sealed and later destroyed. The person may then claim that he/she was not arrested. Cal. Penal Code 851.8 Records of arrest prior to 1976 may be destroyed upon petition to a court. Cal. Health and Safety Code 11361.5 Cable Television State law prohibits a cable television corporation from using any electronic device to record, transmit, or observe events inside a subscriber's premises and from disclosing any information about the subscriber without their consent. Companies may sell lists of subscribers and addresses if they permit a subscriber to be deleted from such lists. Customers have a right to inspect and correct information about them. Cal. Penal Code 637.5. (Smith, 1992, 1994)
Welcome To The Los Angeles County Bar Association Website By reading this article and answering the accompanying test questions, Thus, you never have to be convicted of a crime to lose your property. http://www.lacba.org/showpage.cfm?pageid=3327
Japan Installs Caution Signal For Sex Traffic Many women were enraged by an article in the Asahi Shimbun, a major dailynewspaper in But they also need to strike at the center of organized crime. http://womensenews.org/article.cfm/dyn/aid/2378
Extractions: WeNews correspondent Japan has revised its criminal law to stipulate human trafficking as a crime and punish those involved. Activists, however, remain alarmed by foreign-staffed sex parlors that have made the country a haven for traffickers. TOKYO (WOMENSENEWS)There are about 10,000 parlors in Japan that offer sex to patrons. Many advertise that they have foreign women by using such names as Filipina Pub, Russian Bar or Thai Delight. The patrons pay $60 to $100 for drinks and then an additional $150 to $300 to take women out of the bar to have sex with them. Most of these women come to Japan on falsified passports or with entertainer or short-term visas, says Hidenori Sakanaka, who until a year ago was the director of the Tokyo Immigration Bureau. They are told that they have to pay off fake debts and their passports often are taken away upon arrival in Japan. The women are beaten and controlled by threats to family members in their home countries. "Most women are moved from place to place and are too scared to complain," Sakanaka says.
Extractions: Week of July 8, 2000; Vol. 158, No. 2 , p. 20 Peter Weiss Presidencies have teetered because of information captured on audiotapes. Tape-recorded evidence of Richard Nixon's Watergate misdeeds led to his 1974 resignation. More recently, information gathered secretly on tapes in the Monica Lewinsky scandal almost unseated President Clinton. Tampering clue? (Left) Magnetoresistive image of FBI sample shows magnetic ridge (arrow) created as audiotape passes beneath erase head. (Right) Although tape later passes under the write head, ridge (arrow) remains. Pappas A device under development by government scientists in Colorado may soon help investigators both judge the authenticity of magnetically recorded evidence and glean information from magnetic media that have been damaged—intentionally or otherwise. David P. Pappas of the National Institute of Standards and Technology (NIST) in Boulder and his colleagues have come up with a microscope that can reveal the landscape of magnetic bumps and dips found on recorded audiotapes, floppy disks, and other sorts of magnetic media. The instrument, a type of so-called magnetoresistive microscope, slowly and repeatedly passes a sample piece of tape or other medium under a tiny read-write head from a computer hard drive. As the sample moves back and forth, the head detects the strength and direction of the magnetic field at millions of points. A computer then can make a topographic image from the data or interpret the data directly—into sound, for instance.