Geometry.Net - the online learning center
Home  - Basic_C - Crime Investigation Articles & Pub
e99.com Bookstore
  
Images 
Newsgroups
Page 5     81-100 of 102    Back | 1  | 2  | 3  | 4  | 5  | 6  | Next 20
A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z  

81. Bill Summary Status
H.RES.251 Amending the articles of impeachment impeaching Walter L. Nixon, Federal agencies in the investigation and prosecution of crimes relating to
http://thomas.loc.gov/cgi-bin/bdquery/?&Db=d101&querybd=@FIELD(FLD003 @4((@1(Rep

82. Bill Summary Status
HR50 To regulate the conduct of the Federal Bureau of investigation in HR829 To amend title I of the Omnibus crime Control and Safe Streets Act of
http://thomas.loc.gov/cgi-bin/bdquery/?&Db=d103&querybd=@FIELD(FLD003 @4((@1(Rep

83. Criminal Justice
Washington Bureau of investigation, US Dept. of Justice. Nash, Jay R.Encyclopedia of World crime Criminal Justice, Criminology, and Law Enforcement
http://www2.lib.udel.edu/subj/crjs/resguide/crim.htm
Criminal Justice:
A Research Guide
Contents: Guides to Criminal Justice Research DELCAT Current Sources Periodical Indexes and Abstracts ... Handbooks, Fact Books and Directories
Guides to Criminal Justice Research
Benamati, Dennis C. Criminal Justice Information: How to Find It, How to Use It . Phoenix: Oryx Press, 1998.
LOCATION: Morris Library - Reference (Ref HV 7419 .5 .C75 1998)
Excellent easy-to-read guide to criminal justice resources. Handbook includes chapters on statistical sources, legal research, and world wide web sites.
Nelson, Bonnie R. Criminal Justice Research in Libraries and Internet . Westport: Greenwood Press, 1997.
LOCATION: Morris Library - Reference (Ref HV 7419 .N45x 1997)
This handbook contains basic criminal justice research information. Several chapters on "special problems" including research in forensic science and primary sources.
O'Block, Robert L. Criminal Justice Research Sources . Cincinnati: Anderson Pub. Co., 1992.
LOCATION: Morris Library - Reference (Ref HV7419 .O25x 1992)
"Comprehensive handbook of criminal justice sources." Handbook includes sections on collecting original data, historical research sources, and sources for international data.

84. Chapter Ten
this special report (`Torture committed by the police in Sri Lanka, article2, vol. Do they have more pressing concerns than crime investigations,
http://www.ahrchk.net/pub/mainfile.php/r2speakloudly/146/
Asian Human Rights Commission - Publications Home Book List Online Books Magazines ... AHRC Website Search the web site:
Advanced Search
Print This Article The right to speak loudly ISBN 962-8161-0509 chapter ten
Trying to understand the police crisis in Sri Lanka
The case studies of torture committed by the police in Sri Lanka outlined in this special report (`Torture committed by the police in Sri Lanka, article 2, vol. 1, no. 4, 2002) are exceptional when compared to cases of torture in other countries, in that they all relate to inquiries into common crimes, or mere grievances between a police officer and his victim. They indicate a severe crisis in the way the Sri Lankan police conduct criminal investigations. Under the law, there are prescribed procedures for criminal investigations. These procedures seem to be completely ignored. The type of assaults committed also show that police officers are not making any attempts to collect information relating to crimes in an independent or rational manner, as the law requires of them. In all these cases, and many others, the very first thing the police seem to do is to beat people mercilessly, with the hope that some information may come from their suspects. However, the extraordinary level of torture frequently committed makes the victim incapable of giving a normal answer. Gerald Perera's case demonstrates the problem very clearly. The police were inquiring into a triple murder that had taken place some time before his arrest. The police apparently were under enormous pressure to show the results of their investigations into this very serious crime. They were unable to deal with forensic evidence. They were also not qualified in the

85. EFF "Privacy - Surveillance" Archive
Aka International Computer crime Enforcement Assistance Act of 2000 960722_deadbeat_databases_article.excerpt Excerpt from Reuters article regarding
http://www2.cddc.vt.edu/www.eff.org/pub/Privacy/Surveillance/
EFFWeb Welcome Page Alerts Topic Index Index Search
EFF "Privacy - Surveillance" Archive
http://www.eff.org/pub/Privacy/Surveillance/ Last Updated Fri Jul 28 17:15:41 PDT 2000
Files
Subdirectories On-Site Links Off-Site Links
Files in this Archive
20000607_s2448_cdt.comments
CDT comments to Senate Judiciary Committee Chairman Orrin Hatch about problems in S. 2448, "Internet Integrity and Critical Infrastructure Protection Act of 2000", a bill relating principally to enhancing law enforcement ability to investigate computer crimes. It includes a number of troubling provisions, included expanded wiretapping authority, snooping on citizens who've violated no laws, vagueness that could result in criminalization of political expression, and weaker privacy standards for satellite as opposed to cable subscribers. Also criticizes S. 2092.
s2448_net_security_2000_bill.html
S. 2448, "Internet Integrity and Critical Infrastructure Protection Act of 2000", a bill relating principally to enhancing law enforcement ability to investigate computer crimes. It includes a number of troubling provisions, included expanded wiretapping authority, snooping on citizens who've violated no laws, vagueness that could result in criminalization of political expression, and weaker privacy standards for satellite as opposed to cable subscribers. A.k.a. "International Computer Crime Enforcement Assistance Act of 2000"
s2092_net_security_2000_bill.html

86. Computer Crime Investigator's Toolkit
Fortunately for computer investigators, most users do not use them. A goodarticle giving an overview of examining a computer is in the March 1997 issue
http://www.secinf.net/misc/Computer_Crime_Investigators_Toolkit.html

Anti Virus Section
Authors Books Email Security Test ... Security Library Site Search
Anti Virus Section By Authors By Topics Authors ... Wireless Security Featured Product Recommended Sites
Computer Crime Investigator's Toolkit
Date Launched: Oct 16, 2002 Last Updated: Oct 16, 2002 Section: Misc Author: Ronald L. Mendell Rating: 3.3/5 - 23 Votes Also Practical explanation. Unix, DOS, Windows, Browsers, e-mail and networks covered. What I've tried to do is devise a summary of basic, practical knowledge, "tricks," if you like, that should interest all computer crime investigators. While they may not be the final word in preparing for an examination, these techniques will provide some insight into the ways and means of computer criminals. I hope to get you into the spirit of the hunt. Learning to think how a criminal looks at twisting, altering, hiding, and diverting information will definitely make the game more interesting. This is a pathfinder, a starting point to discovering other resources. Part One will cover:
  • DOS Tricks
  • Unix Tricks
  • Part Two continues with:
  • Windows Tricks
  • Browsers
  • Passwords
  • Part Three will discuss:
  • Perl Scripting
  • Networking Fundamentals
  • Tracing Email
  • Part Four concludes with:
  • Understanding Slack Files
  • Understanding Cryptography Basics

  • Not So Dead DOS
    For those who grew up in the IT field with MS-DOS, they found Unix and scripting not all that cryptic. Knowing command line instructions gives one a backstage pass to what's happening behind the GUI. Understanding how to examine a computer using MS-DOS with Windows 95 and 98 gives an investigator a firm foundation for other tricks of the trade. When users get cute with trying to hide information, MS-DOS can uncover the hidden structure. So, forget any notion that MS-DOS is dead; it will be a valuable forensic tool for some time to come.

    87. CIC Canada | Public Report: Canada's War Crimes Program
    Inactive files routine investigative checks and surveys negative Article 1Fof the 1951 UN Convention relating to the Status of Refugees is an
    http://www.cic.gc.ca/english/pub/war1998.html
    Contact Us Help Search Canada Site ... Citizenship Public Report
    Canada's War Crimes Program Department of Justice
    Department of Citizenship and Immigration
    Introduction
    This report, which focuses on both the World War II and modern-day aspects of the War Crimes Program undertaken by the departments of Justice and Citizenship and Immigration (CIC), is the first in a series of annual reports that will provide information about the Program and its achievements. The government of Canada has made a commitment that Canada will not become a safe haven for individuals who have committed war crimes or crimes against humanity. Together with the RCMP, the Department of Justice and CIC are working to uphold this objective. The government has allocated $46.8 million over the next three years in order to bring to justice those persons in Canada responsible for war crimes, crimes against humanity and other reprehensible acts in times of war, regardless of when those acts occurred.

    88. CIC Canada | Canada's War Crimes Program, Annual Report 2000-2001
    The War Crimes and Special Investigations Unit of the RCMP, first established Schedule Sections E and F of Article 1 of the United Nations Convention
    http://www.cic.gc.ca/english/pub/war2001.html
    Contact Us Help Search Canada Site ... Citizenship CANADA'S WAR CRIMES PROGRAM ANNUAL REPORT
    INTRODUCTION
    The policy of the Government of Canada is clear. Canada will not become a safe haven for those individuals who have committed war crimes, crimes against humanity or any other reprehensible act during times of conflict. Over the past several years, the Government of Canada has taken significant measures, both within and outside of our borders, to ensure that appropriate enforcement action is taken against suspected war criminals, regardless of when or where the crimes occurred. These measures include co-operation with international courts, foreign governments and enforcement action by one of the three departments mandated to deliver Canada's War Crimes Program. Canada is actively involved in supporting the International Criminal Tribunals for the former Yugoslavia (ICTY) and Rwanda (ICTR) and has ratified both the International Criminal Court Statute (ICC) and the Optional Protocol to the Convention on the Rights of the Child on the Involvement of Children in Armed Conflicts. Canada was the first country to introduce comprehensive legislation incorporating the provisions of the ICC Statute into domestic law. This legislation

    89. Totse.com | Computer Crime Investigator's Toolkit
    Computer crime investigators come from differing backgrounds. A good articlegiving an overview of examining a computer is in the March 1997 issue of
    http://www.totse.com/en/hack/introduction_to_hacking/162449.html
    About Community Bad Ideas Drugs ... ABOUT
    Computer Crime Investigator's Toolkit
    by Ronald L. Mendell
    NOTICE: TO ALL CONCERNED Certain text files and messages contained on this site deal with activities and devices which would be in violation of various Federal, State, and local laws if actually carried out or constructed. The webmasters of this site do not advocate the breaking of any law. Our text files and message bases are for informational purposes only. We recommend that you contact your local law enforcement officials before undertaking any project based upon any information obtained from this or any other web site. We do not guarantee that any of the information contained on this system is correct, workable, or factual. We are not responsible for, nor do we assume any liability for, damages resulting from the use of any information on this site. Computer Crime Investigator's Toolkit: Part I Tuesday, January 02, 2001 Ronald L. Mendell (ronmen9938@britannica.com) for SecurityPortal Computer crime investigators come from differing backgrounds. In the private sector a wide range of certifications exist: CISSP, MCSE, Internet Security Specialist, Computer Forensics Specialist, and the like. Developing a common body of knowledge is often a response to the particular examination program one wishes to pass through. Yet, professional practice often dictates the areas of an investigator's expertise. Those with an emphasis on forensic issues (such as police investigators) may concentrate on techniques pertaining to "black" or illegal email, illegal pornography, and common-law crimes committed using a computer. Those with an emphasis on security issues may deal with technologies related to combating hacking, denial of service (DoS), intrusion, and business espionage.

    90. EFF:
    about the civilliberties issues raised by computer-crime investigations. INTERNET WORLD readers will recall that I recently published an article in
    http://www.eff.org/legal/?f=feds_on_the_net_godwin.article.txt

    91. EFF: Legal Issues And Policy: Cyberspace And The Law
    law enforcement s investigations and prosecutions of computercrime cases . good_fences_johnson.article Electronic Communications Privacy Good
    http://www.eff.org/legal/
    @import url(/stylesheets/eff-2box.css); @import url(/stylesheets/eff-nav.css); SITE MAP CASES ACTION CENTER PRESS ROOM ... Legal
    Legal Issues and Policy: Cyberspace and the Law
    Note:
    * = not to be reposted beyond this site w/o author's permission.
    ** = no commerical/for-profit redistribution w/o author's permission
    Files in this Archive
    access_rights_johnson.article
    "Access Rights All Power to the Sysop?", article by David Johnson. Excerpt: "Some enlightened sysops will create mechanisms by means of which users can participate in making rules and overseeing their enforcement. Will those sysops prosper in preference to others who act less accountably? Will the existence of checks on arbitrary exercises of raw power help to keep other, external, regulators at bay?"
    anon_juris.article
    "The Coming Jurisdictional Swamp of Global Internetworking (Or, How I Learned to Stop Worrying and Love Anonymity)", by Douglas Barnes. Overview of several reasons why anonymity on the Net is a good idea, and a look at the many ways in which a foreign jurisdiction can exercise authority over citizens of other countries.
    anonymity_online_johnson.article

    92. Anthony John Hardy, England's Famous Camden Ripper - The Crime Library
    Upon their arrival at the crime scene, investigators immediately cordoned According to a December 2002 BBC News article, the torso of a young woman was
    http://www.crimelibrary.com/serial_killers/predators/anthony_hardy/3.html?sect=2

    93. Print Article
    Article Last Updated. Hate weighed in killing. Police investigate possible Police are investigating as a possible hate crime the slaying of a Montrose
    http://www.denverpost.com/portlet/article/html/fragments/print_article.jsp?artic

    94. Criminal Justice Resources : Environmental Crime
    Article courtesy of Theodore M. Hammett and Joel Epstein, Lectic Law Library Environmental crime Evidence Gathering and Investigative Techniques (Book
    http://www.lib.msu.edu/harris23/crimjust/envcr.htm
    CRIMINAL JUSTICE RESOURCES:
    Environmental Crime Selected Web Sites U.S. Environmental Protection Agency : Enforcement Activities
    http://www.epa.gov/compliance/index-e.html

    EPA achieves cleaner air, purer water and better-protected land in many different ways. Compliance with the nation's environmental laws is the goal, but enforcement is a vital part of encouraging governments, companies and others who are regulated to meet their environmental obligations. Enforcement deters those who might otherwise profit from violating the law, and levels the playing field with environmentally complaint companies. This web page provides links to civil, cleanup, and criminal enforcement activities.
    (Last checked 06/30/05) U.S. Environmental Protection Agency
    Office of Enforcement and Compliance Assurance (OECA)

    http://www.epa.gov/compliance/

    EPA's OECA, working in partnership with EPA's regional offices, State governments, Tribal governments and other federal agencies, ensures compliance with environmental laws. OECA's website includes its accomplishments, highlights of enforcement and compliance activities, and links to partners in the Environmental Crime Task Force.
    (Last checked 06/30/05) American Bar Association Environmental Crime Update: What is the State of Federal Environmental Crime Enforcement/ CHMIA News : Newsletter of the California Hazardous Materials Investigators Association
    http://www.chmia.com/Newsletter/newsletter.htm

    95. .: EUROPEAN ROMA RIGHTS CENTER :.
    Specifically, during the pretrial investigation, BF claimed that TK had ordered 7 Article 44(2) states, ?In the proceedings held in respect of crimes
    http://www.errc.org/cikk.php?cikk=1800

    96. FDA, Additional Enforced Laws
    USC TITLE 18 CRIMES AND CRIMINAL PROCEDURE. PART I - CRIMES 18, 1988, pub.L. 100-690, title VI, Sec. 6487(a), 102 Stat. 4386; Sept. 13, 1994, pub.
    http://www.fda.gov/opacom/laws/addlenf.htm
    Additional Enforcement Laws
    U.S.C. TITLE 18 - CRIMES AND CRIMINAL PROCEDURE PART I - CRIMES CHAPTER 1 - GENERAL PROVISIONS
    • (a) Whoever commits an offense against the United States or aids, abets, counsels, commands, induces or procures its commission, is punishable as a principal. (b) Whoever willfully causes an act to be done which if directly performed by him or another would be an offense against the United States, is punishable as a principal.
    CHAPTER 7 - ASSAULT
    • (a) In General. - Whoever -
      • (1) forcibly assaults, resists, opposes, impedes, intimidates, or interferes with any person designated in section 1114 of this title while engaged in or on account of the performance of official duties; or (2) forcibly assaults or intimidates any person who formerly served as a person designated in section 1114 on account of the performance of official duties during such person's term of service, shall, where the acts in violation of this section constitute only simple assault, be fined under this title or imprisoned not more than one year, or both, and in all other cases, be fined under this title or imprisoned not more than three years, or both. (b) Enhanced Penalty. -

    97. Summary: Privacy Laws Of The State Of California
    NS300.219.1. (Smith, 1992, 1994). Investigative Consumer Reports Cal.pub Util Code 2872. Any person violating this article is guilty of a civil
    http://www.privacyrights.org/ar/callaw.htm
    Privacy Laws of the State of California Posted: April 1997 By Beth Given s , PRC Director
    bgivens@privacyrights.org

    3100 - 5th Ave., Suite B
    San Diego, CA 92103
    Voice: (619) 298-3396
    Fax: (619) 298-5681
    Web: www.privacyrights.org
    Contact Us:
    www.privacyrights.org/inquiryform.html

    HOME
    Privacy Laws of the State of California NOTES: This digest is compiled by the Privacy Rights Clearinghouse, March 1997, for the California Legislature's Joint Task Force on Personal Information and Privacy (Senator Steve Peace, Chair). Information obtained from Robert Ellis Smith's Compilation of State and Federal Privacy Laws is cited as "Smith, 1992, 1994." The California Office of Privacy Protection provides a more up-to-date list of California privacy-related laws at www.privacy.ca.gov/califlegis.htm The OPP's list is particularly more current on laws related to identity theft. Arrest Records Whenever a person is acquitted of a charge and it appears to a judge that the person was innocent of the charge, the judge may order the case sealed and later destroyed. The person may then claim that he/she was not arrested. Cal. Penal Code 851.8 Records of arrest prior to 1976 may be destroyed upon petition to a court. Cal. Health and Safety Code 11361.5 Cable Television State law prohibits a cable television corporation from using any electronic device to record, transmit, or observe events inside a subscriber's premises and from disclosing any information about the subscriber without their consent. Companies may sell lists of subscribers and addresses if they permit a subscriber to be deleted from such lists. Customers have a right to inspect and correct information about them. Cal. Penal Code 637.5. (Smith, 1992, 1994)

    98. Welcome To The Los Angeles County Bar Association Website
    By reading this article and answering the accompanying test questions, Thus, you never have to be convicted of a crime to lose your property.
    http://www.lacba.org/showpage.cfm?pageid=3327

    99. Japan Installs Caution Signal For Sex Traffic
    Many women were enraged by an article in the Asahi Shimbun, a major dailynewspaper in But they also need to strike at the center of organized crime.
    http://womensenews.org/article.cfm/dyn/aid/2378
    September 20, 2005
    Japan Installs Caution Signal for Sex Traffic Run Date: 07/18/05 By Catherine Makino
    WeNews correspondent Japan has revised its criminal law to stipulate human trafficking as a crime and punish those involved. Activists, however, remain alarmed by foreign-staffed sex parlors that have made the country a haven for traffickers. TOKYO (WOMENSENEWS)There are about 10,000 parlors in Japan that offer sex to patrons. Many advertise that they have foreign women by using such names as Filipina Pub, Russian Bar or Thai Delight. The patrons pay $60 to $100 for drinks and then an additional $150 to $300 to take women out of the bar to have sex with them. Most of these women come to Japan on falsified passports or with entertainer or short-term visas, says Hidenori Sakanaka, who until a year ago was the director of the Tokyo Immigration Bureau. They are told that they have to pay off fake debts and their passports often are taken away upon arrival in Japan. The women are beaten and controlled by threats to family members in their home countries. "Most women are moved from place to place and are too scared to complain," Sakanaka says.

    100. Magnifier May Crack Crimes, Crashes: Science News Online, July 8, 2000
    Investigators of an airplane crash or explosion may want to play back little Available at http//nvl.nist.gov/pub/nistpubs/jres/105/2/j52nbr.pdf.
    http://www.sciencenews.org/20000708/fob1.asp

    Science News
    Books.
    Subscribe to
    Science News ...
    Science News for Kids
    Math Trek
    Möbius and his Band
    Food for Thought
    Chocolate Therapies (with recipe for Janet’s Chocolate Medicinal Mousse Pie)
    Science Safari
    Classic Body
    TimeLine
    70 Years Ago in
    Science News
    Science News
    e-LETTER. ...
    Week of July 8, 2000; Vol. 158, No. 2 , p. 20
    Magnifier May Crack Crimes, Crashes
    Peter Weiss Presidencies have teetered because of information captured on audiotapes. Tape-recorded evidence of Richard Nixon's Watergate misdeeds led to his 1974 resignation. More recently, information gathered secretly on tapes in the Monica Lewinsky scandal almost unseated President Clinton. Tampering clue? (Left) Magnetoresistive image of FBI sample shows magnetic ridge (arrow) created as audiotape passes beneath erase head. (Right) Although tape later passes under the write head, ridge (arrow) remains.
    Pappas A device under development by government scientists in Colorado may soon help investigators both judge the authenticity of magnetically recorded evidence and glean information from magnetic media that have been damaged—intentionally or otherwise. David P. Pappas of the National Institute of Standards and Technology (NIST) in Boulder and his colleagues have come up with a microscope that can reveal the landscape of magnetic bumps and dips found on recorded audiotapes, floppy disks, and other sorts of magnetic media. The instrument, a type of so-called magnetoresistive microscope, slowly and repeatedly passes a sample piece of tape or other medium under a tiny read-write head from a computer hard drive. As the sample moves back and forth, the head detects the strength and direction of the magnetic field at millions of points. A computer then can make a topographic image from the data or interpret the data directly—into sound, for instance.

    A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z  

    Page 5     81-100 of 102    Back | 1  | 2  | 3  | 4  | 5  | 6  | Next 20

    free hit counter