---

Law files! Various text files covering some various laws.


* 1CHANG~1.LAW September 1991 COUNTERINTELLIGENCE CHALLENGES IN A CHANGING WORLD By William S. Sessions Director Federal Bureau of Investigati
* 1URBAN~1.LAW October 1991 URBAN TRANSPORTATION SECURITY By Robert W. Dart Commander Gang Crimes Section Chicago
* 250LAW.LAW The text of Section 250.12 of the Model Penal Code follows. Many states have adopted parts of the Model Penal Code. (New Jersey and Pennsylvania have adopted the code in great part.)
* 251LAW.LAW The Model Penal Code (MPC) is arguably the most important work on criminal law in the past 30 years. This Model Code has been used as the basis of many state's criminal codes. New Jer
* 2CORRU~1.LAW September 1991 CORRUPTION: A CONTINUING CHALLENGE FOR LAW ENFORCEMENT By Otis E. Cooksey Major, Military P
* 2DEVEL~1.LAW October 1991 DEVELOPING POLICE LEADERSHIP By Paul Hansen Sergeant Irondequoit Police Department Rochester, New York Effe
* 3FBIPR~1.LAW September 1991 FOREIGN COUNTERIANTELLIGENCE: AN FBI PRIORITY By James E. Tomlinson Special Agent in Charge Foreign Counterintellige
* 3POLPR~1.LAW October 1991 POLICE PRACTICES TELEMARKETING CRIME PREVENTION By David I. Rechenmacher
* 4POLPR~1.LAW September 1991 POLICE PRACTICES: MINISTERS TEAM WITH POLICE TO KEEP THE PEACE By D. R. Staton Minist
* 4PUSHE~1.LAW October 1991 THE RESPECTABLE PUSHER By Jeffrey D. Lane Agent serving as Director of Investig
* 5BADCH~1.LAW October 1991 TAKING THE BOUNCE OUT OF BAD CHECKS By Vinse J. Gilliam Senior District Atto
* 5ESPIO~1.LAW September 1991 ESPIONAGE AWARENESS PROGRAMS By Freddie L. Capps, Jr. Special Agent FBI National DECA Coordinator Intelligence Divisi
* 6POVIE~1.LAW September 1991 POINT OF VIEW: MANAGING FOR EXCELLENCE By David A. King Chief of Police Perkasie, Pennsylvania, Police Department So much has bee
* 6RESFO~1.LAW October 1991 RESEARCH FORUM MCGRUFF ROBOT TEACHES KIDS (RESULTS OF A SPRINGFIELD, MISSOURI, PILOT PROGRAM) Once considered a science
* 7CROWD~1.LAW October 1991 EFFECTIVE CROWD CONTROL By Steven J. Schmidt Lieutenant Colonel Assistant Chi
* 7DRUGT~1.LAW September 1991 THE KENTUCKY STATE POLICE DRUG TESTING POLICY By W. Michael Troop Acting Kentucky State Police Commissioner Secretary of Justice and Jerry Lovitt Major Commander, Opera
* 8CIVIL~1.LAW October 1991 CIVIL FORFEITURE: REAL PROPERTY USED IN DRUG TRAFFICKING By Thomas V. Kukura J.D., Special Agent Drug
* 8INTER~1.LAW September 1991 CUSTODIAL INTERROGATION: IMPACT OF MINNICK V. MISSISSIPPI By Kimberly A. Crawford Special Agent L
* 9BRIEF~1.LAW LEGAL BRIEF By Special Agent Jeffrey Higginbotham, Legal Instructor, FBI Academy In May 13, 1991, the U.S. Supreme Court decided in 'County of Riverside v. McLaughlin' that the U.S. C
* ABOUTEFF.LAW General Information about the Electronic Frontier Foundation
* ACADEM~1.LAW August 1991 CITIZEN POLICE ACADEMIES By Martin Alan Greenberg, M.A. Professor Chairman, Depa
* AFIS.LAW November 1990 POLICE PRACTICES WIN: AFIS TECHNOLOGY FOR RURAL STATES Large law enforcement
* AICNEWS.1 Arizona Identification Council Newsletter President: Dwane Hilderbrand Editor: Mitchell Small July, 1990 様様様様様様様様様様様様様様様様様様様様様様様様様様様様様様様様 Latent Shoepr
* AL_LAW~1.LAW Here's the Alabama Computer Crimes Law, adopted 1985, see Al.Code. Section 13A-8. ALABAMA COMPUTER CRIME ACT SECTION 13A-8-100. Short title. This article may be cited as the Alabama C
* ANTI-HAC.TXT ANTI-HACKING A BILL To create offences of unauthorised access to electronically stored data and its transmission; to confer powers of monitoring, search, seizure and destruction of su
* ARTICLES.LAW BIBLIOGRAPHY OF COMPUTER SECURITY ARTICLES 1983 THROUGH 1988 (Note: A bibliograpghy is now being developed to encompass 1989.) AUTHORS SPECIFIED ABUSEMISUSECRIME AUTHOR: Associated Pr
* AR_LAW~1.LAW Arkansas has one of the most comprehensive set of regulations on computer use.... The computer crimes law was adopted in 1987. Arkansas Code of 1987, Section 5- 41-101 SECTION 5-41-10
* AZ_LAW~1.LAW Here's the Arizona Computer Crimes Law, effective in 1978, see section 13-2301, Arizona Revised Statutes. SECTION 13-2301 Definitions We are omitting sections A through D of this sect
* BABBS001.TXT BABBS001.TXT ANTI-FED BBS SECURITY _ _ _
* BBSDEFA.LAW D E F A M A T I O N L I A B I L I T Y O F C O M P U T E R I Z E D B U L L E T I N B O A R D O P E R A T O R S A N D P R O B L E M S O F P R O O F John R. Kahn CHTLJ Comment Computer L
* BBSLAW.MAN Version 1.1 - BBS LEGAL GUIDE Including legal forms, statutes and 'how to do it' information Copyright 1993, Clary and Kraft March, 1993 All Rights Reserved Will I get in trouble for
* BBSLAWS.TXT THE LEGAL ASPECTS OF TELECOMMUNICATIONS AND ELECTRONIC BULLETIN BOARD SYSTEMS By: James J. Spinelli, President VITRON Management Consulting, Inc. Sysop: Activity Bulletin Board Servic
* BBS_LAW.LAW THE ELECTRONIC PAMPHLETCOMPUTER BULLETIN BOARDS AND THE LAW Submitted in Partial Fulfillment Of the Requirements of Mass Communications by Michael H. Riddle 72446.3241@compuserve.com
* BLUE.LAW DEATH OF THE BLUE BOX This article is reprinted from Full Disclosure. Copyright (c) 1991 Full Disclosure. Permission granted by publisher to reprint when subscription information prov
* BRAVE.YES This proves that you reading this are probably a motorist traveling and not a driver driving. But your schools, parents, and friends all told you that driving is a privelege and not a
* CADDRAFT.LAW February 1991 POLICE PRACTICES: COMPUTER AIDED DRAFTING FOR LAW ENFORCEMENT Today, computers are used extensively in police work. Current compute
* CANDP.LAW CRIME AND PUZZLEMENT by John Perry Barlow barlow@well.sf.ca.us Desperados of the DataSphere So me and my sidekick Howard, we was sitting out in front of the 40 Rod Saloon one evening
* CANDP2.LAW THE ELECTRONIC FRONTIER FOUNDATION One Cambridge Center, Suite 300 Cambridge, MA 02142 617577-1385 617225-2347 fax eff@well.sf.ca.us Saturday, July 21, 1990 Good people, Greetings. So
* CARDOZO.TXT Subject: Cardozo Law Forum article on the Craig Neidorf Computer-Crime Date: Tue, 1 Dec 1992 15:58:23 GMT Readers of misc.legal and comp.org.eff.talk may be interested in the followin
* CELLMATE.LAW December 1990 CELLMATE INFORMANTS: A CONSTITUTIONAL GUIDE TO THEIR USE By Kimberly Kingston Crawford, J.D. Sp
* CHOMLOOT.TXT Article 934 of misc.activism.progressive: Subject: Chomsky: LOOT 591 Date: 5 Oct 91 08:18:04 GMT Sender: rich@pencil.cs.missouri.edu (Rich Winkel) Followup-To: alt.activism.d Approved
* CIABWASH.LAW SEE NOTES AT END FOR INFO ON SOURCES OF THESE DOCUMENTS CENTRAL INTELLIGENCE AGENCY WASHINGTON 25, D. C. OFFICE OF THE DIRECTOR 25 APR 1956 MEMORANDUM FOR: The Honorable J. Edgar Hoov
* CIVIL.DIS Civil Disobedience by Henry David Thoreau I heartily accept the motto, 'That government is best which governs least'; and I should like to see it acted up to more rapidly and systemat
* CIVLIB.LAW Civil Liberties in Cyberspace: When does hacking turn from an exercise of civil liberties into crime? by Mitchell Kapor published in Scientific American, September, 1991. On March 1,
* CIVLRG~1.LAW August 1991 CIVIL RIGHTS CASES AND POLICE MISCONDUCT By John Epke, M.A. Special Agent Supervisor, Civil Rights Unit Criminal Investigative Divisio
* CLOSENET.LAW 'Closing the Net' by Greg Costikyan [Reproduced with permission from the January 1991 issue of _Reason_ magazine. A one-year subscription (11 issues) is $19.95. Copyright 1991 by the
* COG_INTE.LAW March 1991 COGNITIVE INTERVIEWING By Margo Bennett, M.Ed. and John E. Hess, M.Ed. Special Agents and Instructors FBI Academy
* COMPCRIM.TXT February 1991 COMPUTER CRIMES: AN ESCALATING CRIME TREND By William S. Sessions Director Federal Bu
* COMPRIV.LAW COMPUTER PRIVACY VS. FIRST AND FOURTH AMENDMENT RIGHTS (By Michael S. Borella) Technical Communication from Clarkson University (1991). He is currently a graduate student and teaching
* COMPUSER.LAW Date: Thursday, 3 December 1987 07:16-MST To: info-modems Re: Copyright: The Gospel according to CompuServe! (Their position) WHAT IS A COMPILATION COPYRIGHT? CompuServe has copyright
* COMPUTER.CRI Computer Crime: Current Practices, Problems and Proposed Solutions Second Draft Brian J. Peretti It would have been surprising if there had been satisfactory road traffic legislation
* CONFESS.LAW March 1991 WHY SUSPECTS CONFESS By David D. Tousignant, M.A. Inspector Lowell, Massachusetts, Pol
* CONSOLI.LAW February 1991 PUBLIC SERVICES CONSOLIDATION: THE ANSWER TO YOUR COMMUNITY'S NEEDS By Robert L. Sobba
* CONST_IN.CYB Laurence H. Tribe, 'The Constitution in Cyberspace' PREPARED REMARKS KEYNOTE ADDRESS AT THE FIRST CONFERENCE ON COMPUTERS, FREEDOM PRIVACY Copyright, 1991, Jim Warren Computer Profess
* COPYRIT1.LAW Copyright 1991 by S. Kitterman Jr. and the Las Vegas PC Users Group, 316 Bridger Avenue, Suite 240; Las Vegas, NV 89101. All rights reserved. This file was originally printed in the O
* COPYRIT2.LAW Copyright 1991 by S. Kitterman Jr. and the Las Vegas PC Users Group, 316 Bridger Avenue, Suite 240; Las Vegas, NV 89101. All rights reserved. This file was originally printed in the N
* COPYRIT3.LAW Copyright 1991 by S. Kitterman Jr. and the Las Vegas PC Users Group, 316 Bridger Avenue, Suite 240; Las Vegas, NV 89101. All rights reserved. This file was originally printed in the D
* COPYRIT4.LAW Copyright 1992 by S. Kitterman Jr. and the Las Vegas PC Users Group, 316 Bridger Avenue, Suite 240; Las Vegas, NV 89101. All rights reserved. This file was originally printed in the J
* COPYRIT5.LAW Copyright 1992 by S. Kitterman Jr. and the Las Vegas PC Users Group, 316 Bridger Avenue, Suite 240; Las Vegas, NV 89101. All rights reserved. This file was originally printed in the M
* COPYRITE.LAW Part 1: What Copyright Is On January 1, 1978, the Copyright Act of 1976 (title 17 of the United States Code) came into effect. This general revision of the copyright law of the United
* CORRECT.TXT CORRECT ABUSE Now let's look into the process of how we can protect ourselves from this brand of justice. All federal judges, that is, ones who are selected by the
* COURIE~1.LAW June 1991 DETAINING SUSPECTED DRUG COURIERS: RECENT COURT DECISIONS By William U. McCormack Special Agent Legal In
* COURT.LAW by his legal counsel, to whom we are indebted. The page numbers correspond to transcript pagination. The document was retyped by CuD, and cross-checked against the original. A spell c
* CO_LAW~1.LAW R FRINGE COMMENTARY: Here's the Colorado Computer Crimes Law, Colorado Revised Statutes, Criminal Code, Section 18-5.5-101. SECTION 18-5.5-101. Definitions As used in this article, un
* CRIME.TXT The Electronic Encyclopedia (TM) (C) 1988 Grolier Electronic Publishing, Inc. crime In the broadest legal sense, a crime in most countries is an act committed in violation of a law fo
* CRIMEC~1.CMP C R I M E F I G H T E R S' C A T A L O G of Special Purpose Books and Videos (Where to Get CrimeFighter Training) TABLE OF CONTENTS (and Tutorial, below) Chap 0 Table of Contents and
* CRIMEF~1.CMP (Quick Tutorial below - please read) C R I M E F I G H T E R S Chap 0 Table of Contents and Quick Tutorial (2 pages) Chap 1 FloppyBooks info, CopyrightTrademarks (2 pgs) Chap 2 Why Po
* CRIMINAL.LAW December 1990 CRIMINAL INFORMANTS: AN ADMISTRATOR'S DREAM OR NIGHTMARE? By Harry A. Mount, Jr. Special Agent FBI
* CSA87.LAW 101 STAT. 1724 PUBLIC LAW 100-235JAN. 8, 1988 Public Law 100-235 100th Congress AN ACT To provide for a computer standards program within the Nat
* CSBYLAWS.LAW BY-LAWS OF THE COMMUNICATIONS SECURITY ASSOCIATION, INC. (COMSEC ASSOCIATION) FINAL DRAFT 6-22-89 ARTICLE I GENERAL Section 1. Organization. The Communications Security Association is
* CSLAW.LAW Gary S. Morris GSM Associates Suite 202 7338 Lee Highway Falls Church, Virginia 22046 (703) 685-3021 Computer Security and the Law I. Introduction You are a computer administrator for
* CT_LAW~1.LAW R FRINGE COMMENTARY: 'Computer-Related Offenses' from the Connecticut General Statutes. PART XXII SECTION 53a-250 For the purposes of this part and section 52-570b: (1) 'Access' means
* CYBERLAW.LAW Cyberspace and the Legal Matrix: Laws or Confusion? Cyberspace, the 'digital world', is emerging as a global arena of social, commercial and political relations. By 'Cyberspace', I me
* CYBSPACE.TXT Cyberspace and the Legal Matrix: Laws or Confusion? Cyberspace, the 'digital world', is emerging as a global arena of social, commercial and political relations. By 'Cyberspace', I me
* CYCRIME0.TXT Date: Tue, 15 May 90 02:40:28 pdt Subject: 2600 Articles: The Phrack E911 Affair THE FOLLOWING TWO ARTICLES ARE FROM THE JUST-R
* DBLAW.TXT LEGAL PROTECTION OF COMPUTER DATABASES ~ 1991 Losey 4919 words 17 pages RALPH C. LOSEY Subin, Shams, Rosenbluth Moran, P.A. 111 N. Orange Ave., Suite 900 Orlando, Florida 32801 407-84
* DEFINE.STB DEFINITIONS OF LEGAL TERMS GLOSSARY THE ON LINE LEGAL PHRASE BOOK HELLO! We try and make the tutorials and other materials as simple and easy to read as possible. Here are definitions
* DEFLIB.BBS D E F A M A T I O N L I A B I L I T Y O F C O M P U T E R I Z E D B U L L E T I N B O A R D O P E R A T O R S A N D P R O B L E M S O F P R O O F John R. Kahn CHTLJ Comment Computer L
* DELIBERA.LEB October 1990 DELIBERATE INDIFFERENCE: THE STANDARD FOR MUNICIPAL AND SUPERVISORY LIABILITY By Michael Callahan, J.D.
* DENNIS.HAY DENNY HAYES STR FOCUS? EXCLUSIVE! '..if I single someone out..' THE PRICE OF COPYRIGHT VIOLATION STReport has obtained directly from DENNIS HAYES his very own statements concerning hi
* DIR_ME~1.LAW May 1991 DIRECTOR'S MESSAGE By William S. Sessions FBI Director Law Day 1991
* DISABI~1.LAW August 1991 THE AMERICANS WITH DISABILITIES ACT By Jeffrey Higginbotham J.D. Special Agent Legal Instructor FBI Ac
* DISASTER.LAW December 1990 DIASTER OPERATIONS: NOT BUSINESS AS USUAL By Michael Guerin Assistant Chief, Law Enforcement Division Governor's
* DISCLAIM.TXT DISCLAIMERS, RULES AND REGULATIONS All users are required to read the following notices. If you are unwilling to abide by the following terms, then you must stop using this Bulletin B
* DISPATCH.LAW November 1990 POINT OF VIEW DISPATCHING UNITS: IMPROVEMENTS FOR THE 'FIRST LINE' By Bob Blankenship Chief Redding, California, Police Department Uniformed p
* DMESSAGE.LAW April 1991 DIRECTOR'S MESSAGE By William S. Sessions FBI Director
* DMESSAGE.LEB October 1990 DIRECTOR'S MESSAGE: POLICE AND CITIZENS WORKING TOGETHER by William S. Sessions Director Federal Bureau of Investigation October is Nationa
* DOGGIE.TXT The Great American Dog Trial Vendetta! By P. Remington Adams COPYRIGHT (C) 1991 BY FULL DISCLOSURE. ALL RIGHTS RESERVED. Several years ago, one Clayton Longacre was present at the sce
* DOMESTIV.LAW January 1991 DOMESTIC VIOLENCE: WHEN DO POLICE HAVE A CONSTITUTIONAL DUTY TO PROTECT? By Daniel L. Scho
* DOWNTIME.BUL POLICY REGARDING BBS DOWNTIME This BBS operates 24 hours daily, with scheduled maintainence from 4 a.m. to 5 a.m. daily. This schedule may be altered upon 7 days notice to users. Ever
* DRIVERS.LAW February 1991 RESEARCH FORUM SURVEY RESULTS: DRIVER LICENSE SUSPENSION PROGRAMS Editor's note: As used here, administrative driver license suspensio
* DRIVING.BAR Subject: The (Almost) Definitive Answer to Driving Barefoot in America (LONG) Date: 27 Jul 1994 22:11:28 GMT NOTE: I sent my initial letters to all 50 states, and the District of Colu
* DRUGDI~1.LAW June 1991 PHARMACEUTICAL DIVERSION AND ABUSE: OUR NATION'S OTHER DRUG PROBLEM By Thomas C. Babick
* DRUGTE~1.LAW June 1991 DRUG ABUSE AND TESTING IN LAW ENFORCEMENT: NO EASY ANSWERS By Andrew J. Harvey Sergeant Alhambr
* DUNNEL.TXT STATE OF NEW YORK 5604 1989-1990 Regular Sessions I N S E N A T E May 15, 1989 Introduced by Sen. Dunne read twice and ordered printed, and when printed to be committed to the Committ
* E-LAW.TXT This paper first appeared in the Albany Law Journal of Science and Technology, Volume 3, Number 1. Care has been taken so that each printed page has been indicated in this file (by st
* ECPA.LAY THE ELECTRONIC COMMUNICATIONS PRIVACY ACT OF 1986 A LAYMAN'S VIEW by Michael H. Riddle (Copyright 1988, Michael H. Riddle. This article may be further reproduced and disseminated prov
* ECPA1LAW.LAW The Electronic Communication's Privacy Act follows. This 'Watergate' inspired statute affects BBS systems in many ways. The full annotated text follows. CHAPTER 119 WIRE AND ELECTRONI
* ECPA2LAW.LAW (i) any violation of section 1679a(c)(2) (relating to destruction of a natural gas pipeline) or subsection (i) or (n) of section 1472 (relating to aircraft piracy) of title 49, of the
* ECPA3LAW.LAW (3) with the lawful consent of the originator or an addressee or intended recipient of such communication, or the subscriber in the case of remote computing service; (4) to a person e
* ECPALAY.LAW THE ELECTRONIC COMMUNICATIONS PRIVACY ACT OF 1986 A LAYMAN'S VIEW by Michael H. Riddle (Copyright 1988, Michael H. Riddle. This article may be further reproduced and disseminated prov
* EDWARDS.LAW Marion Edwards, Plaintiff-Appellant, v. State Farm Insurance Company and 'John Doe,' Defendants-Appellees Nos. 86-3686, 86-3840 UNITED STATES COURT OF APPEALS FOR THE FIFTH CIRCUIT 83
* EFF.LAW THE ELECTRONIC FRONTIER FOUNDATION One Cambridge Center, Suite 300 Cambridge, MA 02142 617577-1385 617225-2347 fax eff@well.sf.ca.us Saturday, July 21, 1990 Good people, Greetings. So
* EFFBOR.LAW LEGAL OVERVIEW THE ELECTRONIC FRONTIER AND THE BILL OF RIGHTS Advances in computer technology have brought us to a new front
* EFFSS.LAW Article 8 of comp.org.eff.news: Xref: vpnet comp.org.eff.news:8 comp.org.eff.talk:868 misc.legal:1503 Subject: Less intrusive, more efficient searches and seizures Summary: Need sugge
* ELECTRIF.LAW July 1992 Vol. 4; Issue 5 ELECTRIFYING SPEECH New Communications Technologies and Traditional Civil Liberties -
* ELEC_BBS.LAW March 1991 ELECTRONIC BULLETIN BOARDS: A NEW RESOURCE FOR LAW ENFORCEMENT By Seth F. Jacobs Director, Research Statistics Program SEARCH Group, In
* EMAILPRI.LAW The recent discussion on email privacy provoked me into trying to formalize the employee privacy policy we have here at Digital Research. Currently, there is nothing in writing concer
* EMAILPRV.LAW Here, at long last, is the next bibliography installment... There's a small bit of overlap with the first one, particularly the articles on the Shoars vs. Epson case, but most of this
* EMBEZZLE.LAW April 1991 BANK EMPLOYEE EMBEZZLEMENT By Denise M. Dube Supervisory Investigator Los Ang
* EMPLOY~1.LAW September 1990 EMPLOYEE DEVELOPMENT PROGRAMS By John L. Pape, Chief of Police Weslaco, Texas, Police Department Police administ
* ENTRAP~1.LAW The Defense of Entrapment As it Applies to Bulletin Board System Operators By Randy B. Singer, Esq. Copyright (C) 1992 Randy B. Singer. All rights reserved. This document may be freel
* EP_FORUM.LAW April 1991 THE ENVIRONMENTAL PROTECTION FORUM By Michael A. O'Brien Assistant State's Attorne
* ETHICS.LAW January 1991 POINT OF VIEW REDEDICATING OURSELVES TO LEADERSHIP AND ETHICS IN LAW ENFORCEMENT By Vane R. King Li
* ETHICS.TXT ETHICS FOR BBS USERS The following are a few points of general BBS etiquette. If you wish to maintain your welcome on whatever system you happen to call, it would be to your advantage
* FBIAUG01.LAW August 1990 ACCREDITATION: A SMALL DEPARTMENT'S EXPERIENCE By Raymond E. Arthurs Chief, Willowbrook, Illinois, Police Department
* FBIAUG02.LAW August 1990 ODOMETER ROLLBACK SCHEMES By James E. Scripture Special Agent, FBI Boston, Massachusetts With the expense associated with purchasin
* FBIAUG03.LAW August 1990 POLICE PRACTICES: CUSTOM'S BET PROGRAM An effective interdiction effort requires the cooperation of all law enforcement agencies. To wo
* FBIAUG04.LAW August 1990 THE TACTICAL INCIDENT: A TOTAL POLICE RESPONSE By Nicholas F. Kaiser, M.A. Assistant Chief, Chief of Patrol Troy, New Yo
* FBIAUG05.LAW August 1990 A NEW APPROACH TO FTO TRAINING By Blair Rankin Captain, High Point Police Department, North Carolina
* FBIAUG06.LAW August 1990 FOCUS ON NCIC: IDENTIFYING THE UNIDENTIFIED 'Hunters find the torso of a white male in a field. A close examina
* FBIAUG07.LAW August 1990 THE FEDERAL GRAND JURY: EXCEPTIONS TO THE RULE OF SECRECY (PART I) By Austin A. Andersen Special Agent, Legal Instruct
* FBIJUL01.LAW July 1990 LATERAL ENTRY: A MOVE TOWARD THE FUTURE By J. Eddie Nix Lieutenant, Training Se
* FBIJUL02.LAW July 1990 CONFRONTING THE TERRORIST HOSTAGE TAKER By G. Dwayne Fuselier Special Agent, Special Operations and Research U
* FBIJUL03.LAW July 1990 POLICE PRACTICES: BOMB DOG TEAMS There are times when police departments may require the services of an explosives detection dog team.
* FBIJUL04.LAW July 1990 CAMPUS SECURITY: THE MULE PATROL By James A. Huff Director, Public Safety Central Missouri State University, War
* FBIJUL05.LAW July 1990 THE FORENSIC ANTHROPOLOGIST By Robert W. Mann, M.A. and Douglas H. Ubelaker, Ph.D. Physical Ant
* FBIJUL06.LAW July 1990 FOCUS ON CRIME PREVENTION: BUSINESS AND GOVERNMENT WORKING TOGETHER A joint crime prevention program has been initia
* FBIJUL07.LAW July 1990 ANTICIPATORY SEARCH WARRANTS By A. Louis DiPietro, J.D. Special Agent and Legal Instructor, FBI Academy
* FBIJUN01.LAW June 1990 THE YARDIES: ENGLAND'S EMERGING CRIME PROBLEM By Roy A. C. Ramm Detective Chief Superintendent International and Organized Crime Branch Scot
* FBIJUN02.LAW June 1990 FOCUS ON FORENSICS: LATENT SHOEPRINT ANALYSIS For decades, fingerprints have provided investigator
* FBIJUN03.LAW June 1990 TOWING COMPANIES: FRIENDS OR FOES? By Michael C. Gillo Investigator Broward County State Attorney's Office Ft. Lauderdale, F
* FBIJUN04.LAW June 1990 POLICE PRACTICES: THE NELSON-DENNY EXPERIMENT The Arizona Law Enforcement Training Academy (ALETA) provides statewide law enforcement basic training to office
* FBIJUN05.LAW June 1990 FACILITY PLANNING IN COLORADO: FORM VS.FUNCTION By James D. Munger Chief, Colorado Springs Police Department Colorado Springs, Colorado and Edw
* FBIJUN06.LAW June 1990 RECORDS MANAGEMENT IN THE 1990s By Daniel L. Arkenau Lieutenant, Commander of the Records Unit Cincinnati, Ohio, Pol
* FBIJUN07.LAW June 1990 RESEARCH FORUM: FBINA GRADUATE SURVEY During 1988, the Institutional Research and Development Unit (IRDU) at the FBI Academy surveyed FB
* FBIJUN08.LAW June 1990 B.L.O.C.: BUSINESS LEADERS AGAINST ORGANIZED CRIME By Mike King Administrative Assistant Weber County, Utah, Attorney's Office How many times
* FBIJUN09.LAW June 1990 DNA TESTING AND THE FRYE STANDARD By Robert A. Fiatal, J.D. Special Agent Legal Instructor, FBI Academy The a
* FBITOP10.HUM A:TEXTFBIJAN86.TXT (01-Jan-86) 73 lines7-bit ASCII - edited at VANC0 'The NATIONAL FBI TOP 10 FUGITIVE COUNTDOWN' The FBI's 'Ten Most Wanted Fugitives' program began on March 14, 1950
* FBI_MAIL.TXT FOR IMMEDIATE RELEASE July 26, 1989 APPEAL FILED IN TEENAGER v. FBI CASE Attorneys for Todd Patterson today filed a brief in the United States Court of Appeals in Philadelphi
* FEB01.LAW FEBRUARY 1990 PRIVATIZATION OF PRISONS: FAD OR FUTURE By Lt. David K. Burright Linn County Sheriff's Office Albany, OR Very fe
* FEB02.LAW FEBRUARY 1990 THE ADMINISTRATIVE WARNING TICKET PROGRAM By Lt. Andrew J. Barto Village of Romeoville Police Department Romeovil
* FEB03.LAW FEBRUARY 1990 ARSON INVESTIGATIONS By William A. Tobin Spe
* FEB04.LAW FEBRUARY 1990 THE CRIMINAL BEHAVIOR OF THE SERIAL RAPIST By Robert R. Hazelwood, M.S. Spec
* FEB05.LAW FEBRUARY 1990 LARGE VEHICLE STOPS Standards and accepted procedures for vehicle stops involving cars and other passenger vehicles are part of the cur
* FEB06.LAW FEBRUARY 1990 CRITICAL INCIDENT STRESS DEBRIEFING By Capt. Richard J. Conroy, M.S. Ass
* FEB07.LAW FEBRUARY 1990 FOREIGN SEARCHES AND THE FOURTH AMENDMENT By Austin A. Andersen, LL.B. Special Agent Legal Instruction Unit FBI Ac
* FEB08.LAW FEBRUARY 1990 FLORIDA'S COMPUTER CRIME In an attempt to gauge the impact of computer crime in the State, th
* FEDBBS3.LST FEDERAL PUBLIC ACCESS BULLETIN BOARDS MARCH, 1989 Set modem to 2400,8,N,1 unless otherwise indicated. BBS's have 24-hour availability unless otherwise indicated. AUTOMATED LIBRARY INF
* FEDERAL.LEB September 1990 THE FEDERAL GRAND JURY: EXCEPTIONS TO THE RULE OF SECRECY (PART II) By Austin A. Anderse
* FED_LA~1.LAW BBS LEGAL GUIDE COMMENTARY: Here's the federal computer crimes law, 18 U.S.C. 1030,adopted 1984, amended 1986) SECTION 1030 (a) Whoever- (1) knowingly access a computer without author
* FENCES~1.LAW June 1991 ROP-ing IN FENCES By James Rainum Officer Repeat Offender Project Metropolitan Police Department Washington, D.C
* FILES.TUT #help.tut PRESS ENTER FOR HELP #define.stb Definitions of legal terms TUTORIAL FILE TRANSFER LIABILITY A few stories about the law. Don't shut down your BBS and hide in a sanitized pa
* FINALMO.TXT Southwestern Bell Telephone 'The One to Call' 100 North Tucker Boulevard St. Louis, MO 63101 Phone 314 247-2216 March 12, 1992 Mr. William Hirt 7205 North Rhode Av. Kansas City, MO 64
* FL_LAW~1.LAW R FRINGE COMMENTARY- Here with go with the Florida Computer Crimes Act, Florida Statutes Chapter 815, F.S. 815.01, adopted in 1978. SECTION 815.01 Short title. This provisions of this
* FOIA.DOC FOIA FILES KIT - INSTRUCTIONS USING THE FREEDOM OF INFORMATION ACT REVISED EDITION Fund for Open Information and Accountability, Inc. 339 Lafayette Street, New York, NY 10012 (212) 47
* FOIA-PA.TXT PLEASE DO NOT BREAK THIS FILE UP INTO SMALLER SECTIONS FOR ANY REASON Filename: FOIA-PA.DOC (FOIA-PA.ZIP) Type : Document Author : Unknown Date : 092091 Desc : Citizen's Guide to the
* FORBES.TXT 'A Little Perspective, Please' by Mitchell Kapor Forbes Magazine June 21, 1993 (Permission granted for electronic redistribution) In Its Dec.21, 1992 cover story, headlined 'The playg
* FORENP11.LAW July 1991 THE FBI'S FORENSIC DNA ANALYSIS PROGRAM By Jay V. Miller Program Manager Nat
* GA_LAW~1.LAW R FRINGE COMMENTARY- The Georgia Computer Crimes Law follows, Official Code of Georgia, Title 16 Section 9-91, adopted 1981 SECTION 16-9-91 Legislative intent The General Assembly fin
* GUNSHO~1.LAW June 1991 GUNSHOT PRIMER RESIDUE: THE INVISIBLE CLUE By Roger W. Aaron Special Agent FBI Laboratory Washington, D.C.
* GVTSCRCY.TXT President Ronald Reagan nicknamed 1987 'The Year of the Reader,' but throughout 1987 the Reagan administration outdid itself in its efforts to control, interpret, manipulate, disinfor
* HACKERS0.LAW Here is a case where the police were eager to catch the computer criminals before they did their homework. Read the articles in order; HACKERS1, HACKERS2 HACKERS3. Also read the respo
* HACKERS1.LAW AMATEUR HACKERS TRIPPED UP By Danna Dykstra Coy This article appeared in the Telegram-Tribune Newspaper, San Luis Obispo, CA. March 23, 1991. Permission to electronically reproduce th
* HACKERS2.LAW COMPUTER CASE TAKES A TWIST By Danna Dykstra Coy This article appeared in the Telegram-Tribune Newspaper, San Luis Obispo, CA. March 29, 1991. Permission to electronically reproduce t
* HACKERS3.LAW HACKERS' OFF HOOK, PROPERTY RETURNED By Danna Dykstra Coy This article appeared in the Telegram-Tribune Newspaper, San Luis Obispo, CA. April 12, 1991. Permission to electronically re
* HACKERS4.LAW A Case for Mistaken Identity... Who's Privacy was Really Invaded? By Jim Bigeloww SLO Bytes PCUG According to the San Luis Obispo County (California) Telegram-Tribune, dated Saturday,
* HANDBOOK.TXT 198889 Revised Edition W H A T Y O U S H O U L D K N O W I F Y O U ' R E A C C U S E D O F A C R I M E by Joyce B. David, Esq. Foreword by the Hon. Milton Mollen Presiding Justice App
* HATEGROU.LAW January 1991 HATE VIOLENCE IN THE UNITED STATES By Floyd I. Clarke Deputy Director Federal Bureau of Investigation On October 8, 1988, members o
* HIGHTECH.LAW November 1990 A LOW COST APPROACH TO HIGH TECHNOLOGY By Mark Clark Lieutenant South Portland, Maine, Police Department How does a department move out of the time-honored carb
* HI_LAW~1.LAW R FRINGE COMMENTARY: Hawaii's computer crimes law follows. Section 708-890 of the Hawaii penal code, adopted 1984. SECTION 708-890 Definitions of terms in this part. In this part, unl
* HOMELESS.LAW November 1990 POLICE AND THE HOMELESS By Barney Melekian Lieutenant Santa Monica, California, Police Department All across the country, fr
* HOSTAGE.LAW January 1991 HOSTAGEBARRICADE INCIDENTS: HIGH RISK FACTORS AND THE ACTION CRITERIA By G. Dwayne Fu
* HOTEL.LAW December 1990 POLICE PRACTICES OPERATION HOTEL-MOTEL The transient nature of drug deale
* IA_LAW~1.LAW The Iowa Computer Crime law follows. This statute was enacted in 1984. CHAPTER 716A.1. Definitions As used in this chapter, unless the context otherwise requires: 1 'Access' means to
* IDENTP01.LAW July 1991 IDENTIFICATION: A MOVE TOWARD THE FUTURE By Bruce J. Brotman Special Agent and Section Chief Automation, Rese
* ID_LAW~1.LAW R FRINGE COMMENTARY- The Idaho Computer Crimes Law follows, Idaho Code, 18-2201, adopted 1982 SECTION 18-2201 Definitions. As used in this chapter: (1) To 'access' means to instruct,
* IL_LAW~1.LAW The Illinois Computer Crime Prevention law, adopted in 1981, and amended in 1987. This is article 16D of the 'Criminal Code of 1961.' 16D-1. Short title Section 16D-1. Short title. Th
* INVBASIC.LAW April 1991 ENVIRONMENTAL CRIMES: INVESTIGATIVE BASICS By Martin Wright Deputy Assistant Director Office of Criminal Investig
* IN_LAW~1.LAW The Indiana Computer tampering laws follows. This law was adopted in 1986. 35-43-1-4. Computer tampering.- (a) As used in this section: 'Computer network' and 'computer system' have t
* JAN01.LAW January 1990 DIRECTOR'S MESSAGEFACING THE FUTURE By William S. Sessions Director I am delighted to have an opportunity to
* JAN02.LAW January 1990 THE FUTURE OF LAW ENFORCEMENT: DANGEROUS AND DIFFERENT By Alvin and Heidi Toffler Before we begin, a question. Does anyone reading this think the years ahead are likely t
* JAN03.LAW January 1990 THE CHANGING FACE OF AMERICA By Robert C. Trojanowicz, Ph.D. and David L. Carter, Ph.D. In the next century America's population will cha
* JAN04.LAW January 1990 The Future of Policing By William L. Tafoya, Ph.D. In August 1982, law enforcement executives
* JAN05.LAW January 1990 PUBLIC LAW ENFORCEMENTPRIVATE SECURITY: A NEW PARTNERSHIP? By Terrence J. Mangan and Michael G. Shanahan As the industrialized n
* JAN06.LAW January 1990 A LOOK AHEAD: VIEWS OF TOMORROW'S FBI By Richard Sonnichsen Gail O. Burton and Thomas Lyons The la
* JAN07.LAW January 1990 TOMORROW'S AMERICA: LAW ENFORCEMENT'S COMING CHALLENGE By Rob McCord and Elaine Wicker Powerful economic and social indicators
* JOBHOME.LAW November 1990 TAKING THE JOB HOME By Richard N. Southworth Criminal Investigator Virginia Office of the Attorney General One day, while
* JUDNAP26.LAW July 1991 JUDICIAL ACCEPTANCE OF DNA PROFILING By John T. Sylvester, J.D. and John H. Stafford, J.D. Special Agents DNA
* JURYNUL.TXT JURY NULLIFICATION EACH PERSON ON A JURY HAS THE POWER TO VOTE 'NOT GUILTY' IN ANY CRIMINAL CASE EVEN IF IT IS OBVIOUS THE DEFENDANT BROKE THE LAW (PENAL CODE). THIS TREMENDOUS 'POWER
* KS_LAW~1.LAW R FRINGE COMMENTARY- The Kansas Computer Crimes Law follows, Kansas, Section 21-3755, adopted 1985 SECTION 21-3755 Computer crime, unlawful computer access (1) As used in this section
* KY_LAW~1.LAW The Kentucky Computer Crime law follows. This statute was enacted in 1984. SECTION 434.840 Unlawful access to a Computer 434.840. Definitions. For the purposes of KRS 434.845 and 434.
* LAWBBS.TXT Compiled and Maintained by F R O L I C D E T O U R LAW BBS 919-893-5206 400 downloadable business-oriented files. For legal professionals only. (Last Updated November 10, 1986) . . .
* LAWS.TXT Interesting USA laws - from USENET. Here's a listing of some rather interesting laws which were passed in the U.S. Taken from the Seattle P-I (Tuesday, Sep. 4 page B-9) with no permis
* LA_LAW~1.LAW The Louisiana Computer Related Crime, passed in 1984. Louisiana Revised Statutes 14:73.1 Definitions. As used in this Subpart unless the context clearly indicates otherwise: (1) 'Acce
* LEBMAY01.LAW May 1990 DIRECTOR'S MESSAGE LAW DAY 1990 By William S. Sessions
* LEBMAY02.LAW May 1990 G.R.A.M.P.A. COPS By Jere L. Spurlin Police Chief and Steve Schwein Captain Fort Myers, Florida, Police Department
* LEBMAY03.LAW May 1990 HIGH SCHOOL SUICIDE CRISIS INTERVENTION By David Fisher, M.A. Deputy Pinnell
* LEBMAY04.LAW May 1990 POLICE PRACTICES 1 ELDERWATCH In the summer of 1986, because of
* LEBMAY05.LAW May 1990 POLICE PRACTICE 2 DARE: SELECTING THE RIGHT OFFICER The Drug Abuse Resi
* LEBMAY06.LAW May 1990 ANALYTICAL INTELLIGENCE TRAINING By Marilyn B. Peterson Analytical Supervisor New Jersey Division of Criminal
* LEBMAY07.LAW May 1990 LAW ENFORCEMENT EXPLORING By Steve Farish President Texas Law Enforcement Explorer Advisor's Asso
* LEBMAY08.LAW May 1990 CURTILAGE: THE FOURTH AMENDMENT IN THE GARDEN By John Gales Sauls Special Agent and Legal I
* LEBMAY09.LAW May 1990 LEGAL BRIEF Maryland v. Buie U.S. Supreme Court Decision On February 28, 1990, the Supreme Court deci
* LEN.ROS The following information was compiled by Brendan Kehoe, CuD archivist, on the LEN ROSE events for those who seek more background information. The Following is the original press rele
* LISTCOUN.TXT AK ALEUTIAN ISLANDS ANCHORAGE BARROW BETHEL BRISTOL BAY CARDOVA-MCCARTHY FAIRBANKS JUNEAU KENAI-COOK INLET KETCHIKAN KOBUK KODIAK KUSKOKWIM LYNN CANAL-ICY STRAITS NOME PALMER WASILLA
* LITH_LAW.TXT LEGALLY, LITHUANIA'S CASE IS OPEN AND SHUT By Vytautas Landsbergis President of Lithuania There is no shortage of advice for solving the Lithuanian question these days. But to solve t
* LOTUS.TXT -forwarded message followscut here888 IMPORTANT THIS IS VERY IMPORTANT PLEASE READ Date: 26 Nov 90 13:57:58 0000 From: rs
* MANAGE05.LAW August 1991 WHAT THEY DIDN'T TEACH IN MANAGEMENT SCHOOL By James D. Sewell, Ph.D. Director Florid
* MAPS_COP.IN From dog.ee.lbl.gov!tennyson.lbl.gov!twcaps Mon Oct 14 16:45:22 PDT 1991 Article 25859 of alt.folklore.urban: From: twcaps@tennyson.lbl.gov (Terry Chan) Subject: Cecil Adams on Copyri
* MAR90_1.LAW March 1990 THE PRELIMINARY INVESTIGATION PROCESS By Chief Gordon F. Urlacher and Lt. Robert J. Duffy Rochester
* MAR90_2.LAW March 1990 STORE DIVERSION BURGLARIES By Detective Robert P. Meiners Lincolnwood, Illinois, Po
* MAR90_3.LAW March 1990 POLICE PRACTICES: OPERATION ALERT By Captain Mark Willingham
* MAR90_4.LAW March 1990 POLICE RETIREMENT: THE IMPACT OF CHANGE By John M. Violenti, Ph.D Department of Social and Pre
* MAR90_5.LAW March 1990 MANAGING POLICE BASIC TRAINING CURRICULUM By Rene A. Browett Curriculum Manager
* MAR90_6.LAW March 1990 PERSONAL LIABILITY: THE QUALIFIED IMMUNITY DEFENSE By Daniel L. Schofield, S.J.D. Special Age
* MASSMO~1.LAW New Massachusetts Modem Tax Proposed (For Real) Channel 1 BBS in Cambridge is having the unpleasant experience of being targeted for an 'experiment' in revenue collection by the Massa
* MD_LAW~1.LAW R FRINGE COMMENTARY- Here's the Maryland Computer Crimes Law, with comments; Article 27, Section 146, Code of Maryland, 'Crimes and Punishments (a) Definitions- In this section the fo
* MEDIALAW.LAW Here's a short article excerpted from my upcoming book tentatively entitled 'Communication in Peace and War' (Brooks-Cole, 1992). 'Media Performance and International Law' by Howard H
* MEDICP21.LAW July 1991 MEDICAID FRAUD By Larry L. Bailey Deputy Chief Investigator Colo
* MILITA~1.LAW June 1991 MILITARY SUPPORT TO CIVILIAN LAW ENFORCEMENT AGENCIES By R. Barry Cronin Major U.S. Mar
* MI_LAW~1.LAW R FRINGE COMMENTARY: Here's the Michigan Computer Crimes law, Michigan Compiled Laws 752.791 SECTION 752.791 Meanings of words and phrases Sec. 1. For the purpose of this act, the wor
* MN_LAW~1.LAW The Minnesota Computer Crimes Law follows, Section 609.87. SECTION 609.87 Computer crime, Definitions Subdivision 1. Applicability. For purposes of section 609.87 to 609.89, and secti
* MOBILE.LAW January 1991 POLICE PRACTICES MOBILE COMMAND POSTS As service providers, law enforcement agencies respond to a broad ra
* MORRIS.APP 928 F.2d 504 59 U.S.L.W. 2603 (CITE AS: 928 F.2D 504) UNITED STATES of America, Appellee, v. Robert Tappan MORRIS, Defendant-Appellant. No. 774, Docket 90-1336. United States Court of
* MO_LAW~1.LAW R FRINGE COMMENTARY- The Missouri Computer Crimes Law follows, Missouri Statutes, 569.093, adopted 1982 SECTION 569.093 Definitions As used in this sections 569.094 to 569.099 and in
* MS_LAW~1.LAW R FRINGE COMMENTARY: Mississippi Computer Crimes Law, effective July 1, 1985 SECTION 97-45-1 Definitions. For the purposes of this chapter, the following words shall have the followin
* MT_LAW~1.LAW R FRINGE COMMENTARY: Here's the Montana Computer Law Statute. Section 45-2-101, Montana Code SECTION 45-2-101 General definitions. Unless otherwise specified in the statute,, all word
* MURPHY.TXT Murphys Law and those of similar ilk. Murphys Law: If anything can go wrong, it will. Schmidts Law: If you fiddle with something long enough, it will break. Fudds First Law of Opposit
* MVTLEB.LAW September 1990 MOTOR VEHICLE THEFT INVESTIGATIONS: EMERGING INTERNATIONAL TRENDS By Mary Ellen Beekman Special Agent, FBI, New Yo
* NCIC.LAW January 1991 NCIC TRAINING: HIT OR MISS By Don M. Johnson Special Agent FBI Headquarters, Washington, DC Today, the National Crime Information Center (NCIC) continues to be the best e
* NC_LAW~1.LAW R FRINGE COMMENTARY- The North Carolina Computer Crimes Law follows, General Statutes of North Carolina, Section 14-453, adopted 1979 SECTION 14-453 Definitions As used in this sectio
* ND_LAW~1.LAW The North Dakota Computer fraud and crime statute follows, Chapter 12.1-06.1-08, originally passed in 1983 and amended in 1987. Chapter 12.1-06.1-08 Computer fraud-computer crime- Cla
* NE_LAW~1.LAW R FRINGE COMMENTARY: The Nebraska Computer Crimes Law, effective 1985, Nebraska Criminal Code, Section 28-1343 SECTION 28-1343. Terms, defined. For the purposes of sections 28-1343 to
* NH_LAW~1.LAW R FRINGE COMMENTARY: Here's the New Hampshire Computer Crimes Law, adopted in January, 1986, New Hampshire Revised Statutes [1955] section 638:16. SECTION 638:16 Computer Crime; Defin
* NJ_LAW~1.LAW BBS LEGAL GUIDE COMMENTARY- The New Jersey Computer -Related Crimes law. It is section 2C:20 of the Code of Criminal Justice of New Jersey, adopted in 1984. 2C20-23. Definitions. As u
* NOV_1.LAW THE FBI'S 10MM PISTOL By JOHN C. HALL Special AgentUnit Chief Firearms Training Unit FBI Academy Quantico, VA November 1989 For several decades, FBI Agents carried the .38 caliber rev
* NOV_2.LAW AMMUNITION SELECTION: RESEARCH AND MEASUREMENT ISSUES By N.J. SCHEERS, Ph.D Operations Research Analyst and STEPHEN R. BAND, Ph.D. Special Agent Institutional Research and Development
* NOV_3.LAW Utilizing Job Task Analysis By THOMAS J. JURKANIN, Ph.D. Illinois Local Governmental Law Enforcement Officers Training Board Champaign, IL November 1989 The relevance and quality of t
* NOV_4.LAW THE JUDICIAL SEALING REQUIREMENT IN ELECTRONIC SURVEILLANCE -A MATTER OF IMMEDIACY BY ROBERT A. FIATAL, J.D. Special Agent Legal Counsel Division FBI Academy Quantico, VA November 198
* NSA.TXT At 12:01 ON the morning of November 4, 1952, a new federal agency was born. Unlike other such bureaucratic births, however, this one arrived in silence. No news coverage, no congressi
* NV_LAW~1.LAW R FRINGE COMMENTARY: Here's the Nevada Computer Unfair Trade Practice law law, Nevada Revised Statutes, Section 603.010, adopted in 1983 SECTION 603.010 Definitions As used in this ch
* NYAPPL.LAW February 1991 NYPD'S APPL PROGRAM: A NEW PARTNERSHIP By Anthony M. Voelker Chief of Org
* NY_LAW~1.LAW New York Penal Law, Computer Crime, Section 156.00. This act became effective in 1986. Section 156.00 Offenses involving computers; definitions of terms The following definitions are
* OFC_LO~1.LAW May 1991 LAW ENFORCEMENT OFFICERS KILLED: 1980 1989 By Victoria L. Major Supervisor, Unifo
* OH_LAW~1.LAW R FRINGE COMMENTARY: Here's Ohio's computer crimes law, one of the shortest on record SECTIOn 2913.81 Denying access to a computer (A) No person, without privilege to do so, shall kno
* OLW1.TXT OUR LAWYER WRITES: Dear Our Lawyer: A few days ago, I opened a bottle of milk purchased at a local supermarket and found a rat inside it. What should I do about this? It is interestin
* OLW3.TXT Dear Our Lawyer, I should like a divorce, but I cannot prove anything against my husband, I am just sick of his face looking at me from behind things. What do I need to prove my marri
* OLW5.TXT Dear Our Lawyer, In the light of the Lee Marvin case, I was wondering if there might be anything in it for me. While I am not exactly a mistress, there is no doubt that the man from t
* OP-CLEAN.LEB October 1990 OPERATION CLEAN: RECLAIMING CITY NEIGHBORHOODS By Richard W. Hatler Deputy Chief Dallas, Te
* PATROL.LAW February 1991 PERSPECTIVE: THE PATROL FUNCTION By Patrick V. Murphy Former Police Commissioner
* PA_LAW~1.LAW R FRINGE COMMENTARY: Here is Pennsylvania's computer crimes law, adopted in 1983 with changes in 1986, Pennsylvania consolidated statutes title 18 section 3933. SECTION 3933 Unlawful
* PLATEA~1.LAW June 1991 PLATEAUING IN LAW ENFORCEMENT By James M. Childers Sergeant Lubbock, Texas, Police Department Burnout is a very familiar concept to law enfor
* POL-COM.LEB October 1990 COMMUNITY POLICING IS NOT POLICE COMMUNITY RELATIONS By Robert C. Trojanowicz, Ph.D. Director, School
* POL-PRAC.LEB October 1990 POLICE PRACTICES: SEAT BELT AWARENESS PROGRAM The use of seat belts is probably
* POLPRA~1.LAW July 1991 POLICE PRACTICES: OPERATION STAR Miami, Florida, attracts a significant number of tourists eac
* POLPRA~2.LAW August 1991 POLICE PRACTICES: MIAMI'S ETHNIC SHARING PROGRAM Over the past several years, Miami, Florida, has
* POL_PR~1.LAW May 1991 POLICE PRACTICES: BAITED VEHICLE DETAIL Property crimes present a challenge to law enf
* POL_PR~2.LAW June 1991 POLICE PRACTICES: ALTERNATE FUEL PROGRAM During the late 1970s, as
* POSTER.TXT The following is a manual transcription of the wanted poster issued by the Federal Bureau of Investigation April 4, 1988. Any errors are inadvertant. INTERSTATE FLIGHT - ATTEMPTED CAP
* PRACTICE.LAW April 1991 POLICE PRACTICES: CHP'S HAZARDOUS WASTE INVESTIGATIVE UNIT The amount of hazardous waste generated in this country changed dramatically with the industrial growth that foll
* PRACTICE.TXT March 1991 POLICE PRACTICES: COMMUNITY OUTREACH PROGRAM In an effort to improve police-community relations,
* PRACTI~1.LAW September 1990 POLICE PRACTICES: PENNSYLVANIA'S INTERDEPARTMENTAL COMMUNICATIONS SYSTEM No one can argue t
* PRIMES.TXT Primes, Codes and the National Security Agency Susan Landau Physicists lost their innocence and freedom from government controls with Los Alamos. For biologists that time came in 1976
* PRIVATIZ.NRE 'The Privatized NREN' Mitchell Kapor Electronic Frontier Foundation February 14, 1991 A Note on Terminology: Use of terms in discussions on networking is notoriously subject to confus
* PRIVSOC.LAW THE PRIVATE AND OPEN SOCIETY BY JOHN GILMORE A transcript of remarks given by John Gilmore at the First Conference on Computers, Freedom, and Privacy, March 28,1991 My talk concerns t
* PRODIGY.LAW PRODIGY STUMBLES AS A FORUM ... AGAIN By Mike Godwin On some days, Prodigy representatives tell us they're running 'the Disney Channel of online services.' On other days the service i
* PROMOT~1.LAW September 1990 PROMOTION TO CHIEF: KEYS TO SUCCESS IN A SMALL DEPARTMENT By Carl L. Spicocchi Chief of Police Swatara Townsh
* PROSECUT.LAW April 1991 ENVIRONMENTAL CRIMES PROSECUTION: A LAW ENFORCEMENT PARTNERSHIP By Vincent A. Matulewich Supervisory S
* PVIEWP18.LAW JULY 1991 POINT OF VIEW: EUROPEAN LAW ENFORCEMENT AFTER 1992 By Jan Blaauw Some 200 years ag
* P_VIEW.LAW April 1991 POINT OF VIEW A MANAGER'S GUIDE TO COMPUTER PROJECTS By Charles Brennan
* P_VIEW~1.LAW May 1991 POINT OF VIEW CAMPUS POLICE: A DIFFERENT VIEW By Gigi Ray
* RATPATRO.LAW January 1991 THE RAT PATROL RIDES! By Paul C. Ricks Deputy Chief of Police Colorado Springs, Colorado, Police Department I
* REBUTTAL.TXT INSLAW's ANALYSIS and REBUTTAL of the BUA REPORT Memorandum in Response to the March 1993 Report of Special Counsel Nicholas J. Bua to the Attorney General of the United States Respon
* RES-REV.LEB October 1990 RESEARCH REVIEW POLICE USE OF DISCRETION: A COMPARISON OF COMMUNITY, SYSTEM, AND OFFICER EXPECTATIONS
* RESPONSE.TXT A Case for Mistaken Identity... Who's Privacy was Really Invaded? By Jim Bigeloww SLO Bytes PCUG According to the San Luis Obispo County (California) Telegram-Tribune, dated Saturday,
* REVIEWL.LAW REGARDING Book Review: Liability If you have read Peter Huber's recent _Galileo's Revenge_, or Walter Olson's _The Litigation Explosion_, or if you've been following some of the recen
* RIPCO.LAW DR. RIPCO SEIZURE This article is reprinted from Full Disclosure. Copyright (c) 1991 Full Disclosure. Permission granted by publisher to reprint when subscription information provided
* RIPCO-WA.RRA SEIZURE WARRANT DOCUMENTS FOR RIPCO BBS On May 8, 1990, RIPCO BBS was closed and the equipment seized as the result of a sei
* RI_LAW~1.LAW R FRINGE Commentary: Here's the Rhode Island Computer Crimes Law, General Laws of Rhode Island, Section 11-52, adopted in 1979 SECTION 11-52-2 Access to computer for fraudulent purpos
* SAFETY~1.LAW October 1990 SAFETY ACTION TEAM By Rod Englert Lieutenant Multnomah County, Oregon, She
* SCHOOL.LAW February 1991 PREPARING FOR SCHOOL CRISIS By David Nichols, Ph.D. Director, Public Safety Jacksonville
* SCHOOLCR.LAW December 1990 SCHOOL CRIME STOPPERS By Bob Chance Major, Commander of the Uniform Division Southwest Tulsa, Oklahoma, Police Dep
* SC_LAW~1.LAW R FRINGE COMMENTARY: Here's the South Carolina Computer Crimes Law, adopted 1984, see Code of Laws of South Carolina, 16-16-10 SOUTH CAROLINA COMPUTER CRIME ACT SECTION 16-16-10. Defi
* SD_LAW~1.LAW R FRINGE COMMENTARY- Here's the South Dakota Computer Crimes Law, adopted 1982. SECTION 43-43B-1 Unlawful uses of a computer A person is guilty of unlawful use of a computer when he:
* SEARCH.TXT April 1991 SEARCHES OF PREMISES INCIDENT TO ARREST By A. Louis DiPietro, J.D. Special Agent an
* SEARCHES.TXT March 1991 EMERGENCY SEARCHES OF EFFECTS By John Gales Sauls Special Agent and Legal Instructor FBI Academy Quantico, Virginia A police department rece
* SEARCH~1.LAW May 1991 INVENTORY SEARCHES: THE ROLE OF DISCRETION By Austin A. Andersen Special Agent and Le
* SENTGUID.LAW March 15, 1993 United States Sentencing Commission One Columbus Circle, NE Suite 2-500, South Lobby Washington, DC 20002-9002 Attention: Public Information Re: Proposed Amendent #59 t
* SEROLO~1.LAW October 1990 SEROLOGICAL EVIDENCE IN SEXUAL ASSAULT INVESTIGATIONS By Robert R.J. Grispino, M.A. Special Age
* SNIPER~1.LAW September 1990 POLICE SNIPER TRAINING By John Plaster, Major Director of Instruction Minnesota National Guard Counter Sniper School St. Paul, Minnesota
* SOFTMA~1.LAW INFORMATION AND DOCUMENTS NEEDED FOR SOFTWARE COPYRIGHT APPLICATION M. Lee Murrah Attorney at Law 6504 Hillcrest Rd. Roanoke, Texas 76262 Metro 430-3760 (Area 817) Information Needed
* SOFTPAT.TXT Partial List Of Software Patents maintained by Michael Ernst mernst@theory.lcs.mit.edu You can ftp this file from mintaka.lcs.mit.edu:mitlpfaipatent-list. That site is mirrored by jup
* STEROI~1.LAW August 1991 ABUSE OF ANABOLIC STEROIDS By Charles Swanson, Ph.D. Faculty Member Vinson Institute of Government University o
* STRIPE~1.LAW May 1991 HONOLULU'S STRIPES: TRAINING FOR SERGEANTS By Robert D. Prasser Captain Honolulu,
* SUC-INTE.TXT March 1991 SUCCESSFUL INTERVIEWING By James R. Ryals Commander Long Beach, California, Police Departmen
* SUMMARY.TXT THE INSLAW AFFAIR SEPTEMBER 10, 1992.-Committed to the Committee of the Whole House on the State of the Union and ordered to be printed Mr. BROOKS, from the Committee on the Judiciary
* SUPREME.LAW November 1990 SELECTED SUPREME COURT CASES: 1989-1990 TERM By William U. McCormack Special Agent Legal Instructor FBI Academy
* SURVIV~1.LAW August 1991 THE WILL TO SURVIVE By Stephen R. Band, Ph.D. Special Agent Operations Resource and Assessment Unit FBI Academy and I. John Vasquez, M.Ed
* SWISS.TXT About the Editor Adam Starchild can occassionally be persuaded to take time off from his private entrepreneurship activities to write. During these interludes he has written over a do
* SWT.TXT The Wall Street Journal 92093 Seizing Wire Transfers The government can intercept international wire transfers without a warrant, a federal appeals court said, further expanding the s
* TARGETD.LAW November 1990 WASHINGTON, D.C.'S OPERATION 'ON TARGET' By Eric W. Witzig Retired Detective Washington, D.C., Metropolitan Police Department and George R. Wilson
* TAXOTHER.TUT #help.tut PRESS ENTER FOR HELP #define.stb Definitions of legal terms #183.sta Internal Revenue Regulations, tax losses TAX DEDUCTIBILITY OF BBS OPERATIONS There are 3 subjects regard
* TEAMWO~1.LAW May 1991 TEAMWORK: AN INNOVATIVE APPROACH By Alan Youngs Captain Lakewood, Colorado, Police Department and Eric K. Malmborg
* TEMPEST.LAW Date: Fri, 19 Jan 90 19:13:44 -0500 The following is a prepublication draft of an article on TEMPEST. I am posting it to this news group in the hope that it will: (1) stimulate discus
* THEFACTS.LAW PUSH BUTTON FELONIES
* THEFT_OF.SOF December 1989 FBI 1. THEFT OF COMPUTER SOFTWARE: A NATIONAL SECURITY THREAT By William J. Cook Assistant U.S. Attorney Chicago, IL Between July and September 1987, a Chicago youth att
* TM.TUT #help.tut EXTRA HELP FOR TUTORIALS #define.stb ON LINE LEGAL GLOSSARY The world of Trademarks was subject to a major change last year. Here is an informational text direct from the ni
* TN_LAW~1.LAW R FRINGE COMMENTARY- Here with go with the Tennessee Computer Crimes Act, Tenn. Code 39-3-1401, adopted 1983. SECTION 39-3-1401.Short title. This part shall be known, and may be cited
* TRASH.LAW February 1991 TRASH INSPECTIONS AND THE FOURTH AMENDMENT By Thomas V. Kukura, J.D.
* TX_LAW~1.LAW R FRINGE COMMENTARY: Texas' Computer Crimes Law follows. TITLE 7, Texas Penal Code SECTION 33.01 Definitions In this chapter: (1) 'Communications common carrier' means a person who ow
* UIC.LAW Note that these arguments don't assume that software should be free. They are addressed to ordinary developers of proprietary software. input texinfo @setfilename look-and-feel @setti
* USCON.LAW THE CONSTITUTION OF THE UNITED STATES Preamble We the People of the United States, in Order to form a more perfect Union, establish Justice, insure domestic Tranquility, provide for t
* UT_LAW~1.LAW R FRINGE COMMENTARY: Here's the Utah Computer Crimes Act adopted in 1979, with a major revision in 1986 SECTION 76-6-701. Computer crimes actshort title This part is known as the 'Uta
* VA_LAW~1.LAW Article 7.1. Computer Crimes. Sections 18.2-152.1. Short title. - This article shall be known and may be cited as the 'Virginia Computer Crimes Act.' (1984, c. 751.) Sections 18.2-152
* VIC-WIT.TXT March 1991 VICTIM-WITNESS ASSISTANCE By Joseph R. Luteran Supervisor, Victim-Witness Assistance Program U.S. Capitol Police
* VISIOP08.LAW July 1991 VISIOPHONES: FRENCH HIGH TECH SECURITY By Pierre Marie Bourniquel Commissaire Principal, Chie
* WAIVER.TXT WAIVER OF CLAIMS WAIVER OF PROSECUTION PERTAINING TO ADULT SECTIONS OF RYAN'S BAR BBS I, _, being an adult over the age of [] TWENTY-ONE SIGN: _
* WAY.LAW THERE'S GOTTA BE A BETTER WAY By Glen Roberts Bill Vajk This article is reprinted from Full Disclosure. Copyright (c) 1991 Full Disclosure. Permission granted by publisher to reprint
* WA_LAW~1.LAW Chapter 9A.52 of the Revised Code of Washington follows. This chapter was adopted in 1984. 9A.52.010. Definitions The following definitions apply in this chapter: Sections 1, 2 and 3
* WEAPON~1.LAW May 1991 VEHICULAR LONG BARREL WEAPONS MOUNT By David W. Pisenti Special Agent Firearms Traini
* WI_LAW~1.LAW The Wisconsin Computer crimes law, Wisconsin statutes section 943.70. . SECTION 943.70. Computer crimes (1) Definitions. In this section: (a) 'Computer' means an electronic device tha
* WV_LAW.LAW West Virginia State Law Contact -U1E63@WVNVM 'Bruce M. MacIsaac' 2-MAY-1989 13:27 The following is the first part of a newly elected state law in West Vriginia. Computer Fraud Any per
* WY_LAW~1.LAW R FRINGE COMMENTARY: Here's the Wyoming Computer Crimes Law, Wyoming Criminal Code, Section 6-3-501, adopted in 19821983 SECTION 6-3-501 Definitions As used in this article: (i) 'Acce

---

The views and opinions stated within this web page are those of the author or authors which wrote them and may not reflect the views and opinions of the ISP or account user which hosts the web page. The opinions may or may not be those of the Chairman of The Skeptic Tank.

Return to The Skeptic Tank's main Index page.

E-Mail Fredric L. Rice / The Skeptic Tank