💾 Archived View for gemini.spam.works › mirrors › textfiles › law captured on 2022-04-29 at 11:40:42. Gemini links have been rewritten to link to archived content
⬅️ Previous capture (2020-10-31)
-=-=-=-=-=-=-
From the first time a rumor went by that the FCC was going to institute a
"modem tax" (this one shows up about every two years without fault), BBS
users took an interest in the funny little laws that govern the country and
how the jackasses in the funny white building were going to mess up the
fun. To this end, transcripts and discussions about laws have been around
for a long time.
Because of the somewhat odd subject matter of some of the files, some of
the files you would expect to be located in this section are also located
in the <A HREF="/politics">politics</A> section. Some of these files would
probably be better put in the Politics section as well.
Oh, and this would normally go without saying, but it's probably not a good
idea to depend on these files for actual, your-property-and-well-being
law advice. Sometimes the law has radically changed since the file was
written, or the file falls under that special "The US never submitted a
full approval to all 50 states so actually you can punch a cop" type of
conspiratorial section. See also <A HREF="/conspiracy">conspiracy</A>.
Counterintelligence Challenges in a Changing World, by William S. Sessions, Director, FBI
A Showdown Over Computer Crime, by Brooks Boliek (August 5, 1990)
Urban Transportation Security, by Robert W. Dart, Chicago Police
Section 250.12 of the Model Penal Code: Violation of Privacy
Section 251.4 of the Model Penal Code: Obscenity
Corruption: A Continuing Challenge for Law Enforcement, by Otis E. Cooksey, Military Advisor
Developing Police Leadership, by Paul Mansen, Sergeant, Rochester Police
Foreign Counterintelligence: An FBI Priority, by James E. Tomlinson, FBI
Police Practices: Ministers Team With Police to Keep the Peace
The Respectable Pusher, by Jeffrey D. Lane, Office of the Secretary of State, Atlanta
Taking the Bounce Out of Bad Checks, by Vinse J. Gilliam, DA's Office, Ventura Country CA
Espionage Awareness Programs, by Freddie L. Capps, Jr. Special Agent, FBI
Point of View: Managing for Excellent, by David A. King, Chief of Police, Perkasie Police
Research Forum: McGruff Robot Teaches Kids
Effective Crowd Control, by Steven J. Schmidt, Kentucky Police
The Kentucky State Police Drug Testing Policy, by W. Michael Troop, State Police of Kentucky
Civil Forfeiture: Real Property Used in Drug Trafficking
Custodial Interrogation: Impact of Minnick V. Mississippi by Kimberly A. Crawford
Leadership in the Nineties, by Ronnie Garner, M.P.A.
Employee Empowerment by Shelia Berglund
Police Practices: Citizen Advisory Committees by Major Dan Flynn, M.P.A.
Positive Organizational Culture: A Preactical Approach by Randall Aragon, M.A.
The Family and Medical Leave Act by Jeffrey Higginbotham, J.D.
Eyesight Standards: Correcting Myths, by Richard N. Holden, Ph.D.
The Computer: High-Tech Instrument of Crime by Michael G. Noblett
Elevator Vandalism Squad by Ronald Welsh
Police Pracices: Drug Educaiton Saving America's Youth, by Damon Davis
Police Violence: Addressing the Issue, by Daniel B. Boyle
Focus on Training: The Americans with Disabilities Act, by John A. Leonard
Computer Searches and Seizures: Challenges for Investigators, by John Gales Sauls
A Legal Brief by Special Agent Jeffrey Higginbotham (Probable Cause Determination)
Legal Brief by S.A. Jeffrey Migginbotham, Legal Instructor, FBI
General Information about the Electronic Frontier Foundation
Police Practices: AFIS Technology for Rural States
Arizona Identification Council NEwsletter, July, 1990
The Alabama Computer Crime Act, 1985
ALCOR Files Suit Over Electronic Mail Seizure, by David Bloom, Feb 24, 1990
Additional Filings in ALCOR BBS Case
Response of ALCOR Lawyer to Motion Filed
File Round of Motion Filed in Alcor Court Case
The Resolution of the Alcor E-mail privacy Case
Response of William F. Murphy to ALCOR Suit
Bill Submitted in ALCOR BBS Case
Appeal of dismissal in ALCOR BBS Case
The Modern Speeders Guide to Radar and State Troopers, by Exilic Xyth (January 11, 1988)
A Bill Against Hacking, from Emma Nicholson
Arkansas Regulations on Computer Crime, 1987
Your Rights and What to Do Upon Arrest, by Michael J. Elliott, Criminal Defense Attorney
Bibliography of Computer Security Articles 1983 through 1988
American Society of Magazine Photographers 1991 Copyright Guide
Arizona Computer Crimes Law, 1978
Anti Federal Agent BBS Protection, by Babbs Boy
Civial Action No. IP-88 93C: Linda Thompson vs. Bob Predaina
The Electronic Pamphlet: Computer Bulletin Boards and the Law by Michael H. Riddle (1990)
Computer Bulletin Boards and the Law, by Michael M. Riddle (Law Study)
Defamation Liability of Computerized Bulletin Board Operators and Problems of Proof, by John R. Kahn
Version 1.1 - BBS LEGAL GUIDE by Clary and Kraft, 1993
THe Legal Aspects of Telecommunications and Electronic Bulletin Board SYstems, by James J. Spinelli
The Future of Telecommunications.......
Crosley Bendix (Negativland) Discusses The Copyright Act (November 9, 1992)
Death of the Blue Box, by Full Disclosure, 1991
Smart Brave Lady indicates that we are not Drivers, and therefore do not need a license.
Police Practices: Computer Aided Drafting for Law Enforcement
Crime and Puzzlement by John Perry Barlow
Update on Crime and Puzzlement by John Perry Barlow, 1990
Some "Property" Problems in a Computer Crime Prosecution by Mike Godwin of the EFF
Cellmate Informants: A Constitutional Guide to Their Use, by Kimberly Kingston Crawford, FBI Academy
Cellmate Informants: A Constitutional Guide to Their Use, by Kimberly Kingston Crawford
Noam Chomsky writes a letter to Lies Of Our Times, May 1991
CIA Memorandums on Brainwashing
Studies in Constitutional Law: A Treatist on American Citizenship by John S. Wise
Chapter 2: How American Citizenship May be Acquired in the Nation
Chapter 3: Of the Obligation and Duties of the Citizen to the Nation and the States
Chapter 4: Of the Rights, Privileges, and Immunities of the Citizen
Chapter 5: Privileges and Immunities Under the War Amendments
Civil Disobedience, by Henry David Thoreau
Civil Rights Cases and Police Misconduct, by John Epke
Civil Rights and Police Misconduct, by John Epke and Linda Davis
Remarks by Bruce Sterling at the Fourth Annual Conference on Computers, Freedom, and Privacy
Closing the Net, by Greg Costikyan (On Operation Sun-Devil)
Cognitive Interviewing, by Margo Bennett, FBI
The Limits of the Law in Restricting Computer Misuse, by Peter Sommer (March 19, 1991)
Computer Crimes: An Escalating Crime Trend by William S. Sessions
Computer Privacy vs. First and Fourth Amendment Rights, by Michael S. Borella
Revised Computer Crime Sentencing Guidelines, from Jack King (1992)
What is a Compilation Copyright? The Gospel According to Compuserve (December 3, 1987)
Compuserve's Position: What is a Compilation Copyright?
Computer Crime: Current Practices, Problems and Proposed Solutions, Second Draft, Brian J. Peretti
Why Suspects Confess, by David D. Tousignant, Inspector, Lowell Massachusetts
Why Suspects Confess, by David D. Tousignant
Laurence H. Tribe, "The Constitution in Cyberspace"
How to Copyright Software, by Locus, Inc. (1990)
If YOu Have to Ask, Get Out of the Way, by Chuck Milland
Why Cops Hate You: If You Have to Ask, Get Out of the Way
Police Tampering: How Often and Where, by Alan Deshowitz
Don't Talk to Cops, by Robert W. Zeuner, Member of the New York State Bar
Software and Copyrights: Registration, Notice and Why by Charles B. Kramer (January 8, 1992)
Copyright Information, by Inez Harrison
Legal Brief: Software Copyright Law (December 1985)
Copyrights and Computer Software: An Introduction, by Sam Kitterman, Jr.
Copyrights and Computer Software: Part II, by Sam Kitterman, Jr.
Copyrights and Computer Software: Part III, by Sam Kitterman, Jr.
Copyrights and Computer Software: Part IV, by Sam Kitterman, Jr.
Copyrights and Computer Software: Part V, by Sam Kitterman, Jr.
Commodore's Extremely Silly Liscence for Workbench 1.3.2
Copyright Information for Computer Software Hacks from June B. Moore
Large Overview of American Copyright Law
Copyright Law from Jordan J. Breslow (February 13, 1986)
Copyright law and Liscence Law as Applies to Computer Software
The Principle of Correct Absue
Detaining Suspected Drug Couriers: Recent Court Decisions
The Transcript of Craig Neidorf's Trial
Disorder in the Court! (Funny Court Transcripts)
Copyrighting Public Domain Programs by June B. Moore, JD
The Grolier Electronic Encyclopedia Definition of Crime
The Crimefighters' Catalog of Special Purpose Books and Videos
Table of Contents and Quick Tutorial
Why Police Can't Cope, and The Need for CrimeFighters
Crime Stoppers and We-Tip's Formula for Rewards
Catch-all Reward Law: $25,000 - All Felonies, All States
Fines & Forfeiture Laws: 50% Paid to CrimeFighters!
Misdemeanors and Do-It-Yourself Lawsuits
Qui Tam Law: Be the Prosecutor - Control Plea Bargaining
Drunk Driver Terminators (D.D.T.) Patrols - to Get Started
Drug Laws & Drug Wars - Unlimited Business Opportunities
Polluter Tooters: Anti-Pollution laws, MEGABUCK Rewards
Terrorists, Assassins, and Police Corruption
Bounty Hunters, Bail Bond Agents and Skip Tracers
U.S. Customs/Coast Guard Laws, Mechanics' Laws
Post Office Rewards, Scams, Cons, Frauds
Wildlife Protection/Poaching, Conservationists Laws
National Forests (Vandalism, Pot Growing, other laws)
Wiretap and Blackmail Laws & Rewards for CrimeFighters
Misc Rewards for This and That (Dozens of them)
Crime Information, Your Right to Withhold for Rewards
Citizen Arrests - What you Need to Know
High Speed Pursuits - Unlike Smokey and the Bandit!
Rules of Evidence - Entrapment Explained
Where to Get CrimeFighter Training
High Tech Tools of the Trade - Where to Get Them
Problems with Prosecutors and Plea Bargaining
How to Calculate Rewards, Proposed CrimeFighters Reward Law
CrimeFighters International, Inc. Membership info.
Criminal Informants: An Administrator's Dream or Nightmare? By Harry A. Mount, Jr.
Criminal Informants: An Administrator's Dream or Nightmare? By Harry A. Mount, Jr.
The Experience of a Shareware Author by Frank Bell of NEWKEY
Crypto-Law Survey by Bert-Jaap Koops (July, 1995)
National Act on Computer Crime, Act 100-235
By-Laws of the Communications Security Association, Inc.
Computer Security And the Law, by Gary S. Morris
Computer-Related Offenses from the Connecticut General Statutes
Cyberspace and the Legal Matrix: Laws or Confusion?
Cyberspace and the Legal Matrix: Laws or Confusion?
Cyberspace and the Legal Matrix: Laws or Confusion?
Emmanuel Goldstein on the E911 Affair
Legal Protection of Computer Databases, by Ralph C. Losey
Defamation Liability of Computerized BBS Operators and Problems of Proof by John R. Kahn
Deliverate Indifference: The Standard for Municipal and Supervisory Liability by Michael Callahan
Concerning Hackers Who Break into Computer Systems, by Dorothy Denning, October 1st, 1990
The Price of Copyright Violation from Dennis Jayes
Dial 911 and Die by Aaron Zelman and Jay Simkin (December 15, 1992)
Director's Message, May 1991, by William S. Sessions, FBI
The Americans With Disabilities Act, by Jeffrey Higginbotham, FBI
An Example Set of Disclaimers, Rules and Regulations
The Great "Disk Fee" Fallacy for Public Software Distribution
Director's Message, April 1991, by William S. Sessions, FBI
Director's Message: Police and Citizens Working Together by William Sessions
The Great American Dog Trial Vendetta by P. Remington Adams (1991)
Domestic Violence: When do Police Have a Constitutional Duty to Protect? by Daniel L. Schofield, FBI
Example of a Policy Regarding BBS Downtime
Research Forum Survey Results: Driver License Suspension programs
The (Almost) Definitive Answer to Driving Barefoot in America (1994)
Pharmaceutical Diversion and Abuse: Our Nation's Other Drug Problem, by Thomas C. Babicke
Drug Abuse and Testing in Law Enforcement: No Easy Answers, by Andrew J. Harvey
The Dunne Act Introduced in NY for Computer BBSes (May 15, 1989)
The Electronics Communications Privacy Act of 1986, a Layman's View by Michael H. Riddle
Electronic Communication Privacy Act: Chapter 119
Electronic Communication Privacy Act: Part II
Electronic Communication Privacy Act: Part III
The Electronic Communications Privacy Act of 1986: A Layman's View, by Michael M. Riddle
Edwards vs. State Farm Insurance
The Processes by which the Secret Service Investigates Computer Crimes
Legal Overview: The Electronic Frontier and the Bill of Rights (July 10, 1990)
The Founder of the Electronic Frontier Foundation get back to you about Their Plans
The Foundation of the Electronic Frontier Foundation (July 10, 1990)
Legal Overview: The Electronic Frontier and the Bill of Rights
Electronic Bar Association Announced by Paul Bernstein
Electronic Bulletin Boards: A New Resource for Law Enforcement by Seth Jacobs, SEARCH Group
Electrifying Speech: New Communications Technologies and Traditional Civil Liberties
Some Policies on Electronic Mail: A Summary by Todd Hooper
Computer Electronic Mail and Privacy: The Law, by Ruel T. Hernandez, January 11, 1987
Overview of the Employee Privacy Laws as Currently Apply
Bibliography on Law and Computers
Bank Employee Embezzlement by Denise M. Dube, LA DA
Employee Development Programs, by John L. Pape, Chief of Police
The Defense of Entrapment as it Applies to Bulletin Board System Operators, by Randy B. Singer, Esq.
The Environmental Movement and the Value of "Moderation" by Brian K. Yoder (1992)
The Environmental Protection Forum, by Michael A. O'Brien, Start Attorney Office, Florida.
Excerpts from the FBI & Your BBS (From Ripco)
Appeal Filed in Todd Patterson v FBI Case (July 26, 1989)
Accreditation: A Small Department's Experience by Raymond E. Arthurs, Chief, Willowbrook Police
Odometer Rollback Schemes, by James E. Scripture, Special Agent, FBI, Boston Massachusetts
Police Practices: Custom's BET Program
The Tactical Incident: A Total Police Response by Nicholas F. Kaiser, MA, Troy Police
A New Approach to FTO Training by Blair Rankin, North Carolina Police
Focus on NCIC: Identifying the Unidentified
The Federal Grand Jry: Exceptions to the Rule of Secrecy (Part I)
Lateral Entry: A Move Toward the Future, by J. Eddie Nix, Leut. Cobb County, Georgia Police
Confronting the Terrorist Hostage Taker, by G. Dwayne Fuselier, FBI
Police Practices: Bomb Dog Teams
Campus Security: The Mule Patrol, by James A Huff, Central Missouri State University Campus Police
The Forensic Anthropologist, by Robert W. Mann, MA, Smithsonian Institution
Focus on Crime Prevention: Business and Government Working Together
Anticipatory Search Warrants, by A. Louis DiPietro, FBI
Focus on Forensics: Latent Shoeprint Analysis
Towing Companies: Friends or Foes? By Michael C. Gillo, Attorney's Office, Ft. Lauderdale, Florida
Police Practices: The Nelson-Denny Experiment
Facility Planning In Colorado: Form Vs. Function by James D. Munger, Colorado Springs
Records Management in the 1990s by Daniel L. Arkenau
Research Forum: FBINA Graduate Survey
DNA Testing and the Frye Standard, by Robert A. Fiatal, FBI
FBI Top Ten Countdown, January, 1986
The Administrative Warning Ticket Program by Lt. Andrew J. Barto, Romeoville, IL
Arson Investigations by William A. Tobin, FBI Laboratory
Critical Incident Stress Debriefing
Foriegn Searches and the Fourth Amendment, by Austin A Andersen, LL.B>, FBI
Federal Computer Crimes Law, 1984/1986
Federal Public Access Bulletin Boards, March 1989
The Federal Computer Seizure Guidelines (1994)
The Federal Grand Jury: Exceptions to the Rule of Secrecy (Part II) by Austin A. Anderson
ROP-ing In Fences, by James Rainum, Officer, Repeat Offender Project, Washington DC
A New Hope for Freedom: Fully Inform Jurors by Don Diog
If You're Called for Jury Duty, by Don Doig
An Attempt to Modify Phone Rules for BBS Lines by Missouri, 1992
Florida Computer Crimes Act, 1978
Using the Freedom of Information Act
A Little Perspective, Please, by Mitchell Kapor of the EFF (June 21, 1993)
The FBI's Forensic DNA Analysis Program, by Jay V. Miller, FBI
Very Large Rant and Sales Pitch about Paper Money Being Evil
The Georgia Computer Crimes Law
The Federal Grand Jury: Exceptions to the Rule of Secrecy by Austin A Andersen
Gunshot Primer Residue: The Invisible Clue by Roger W. Aaron
Gunshot Primer Residue: The Invisible Clue, by Roger W. Aaron, FBI Laboratory
The Government's Mania for Secrecy, 1987
Introduction to the San Luis Obispo Incident
Amateur Hackers Tripped Up, by Danna Dykstra Coy
Computer Case Takes a Twist, by Danna Dykstra Coy
Hackers Off Hook, Property Returned, by Danna Dykstra Coy
A Case for Mistaken Identity... Who's Privacy Was Really Invaded?
What You Should Know if You're Accused of a Crime by Joyce B. David Esq.
hate Violence In the United States, by Floyd I. Clarke, FBI
Hate Violence in the United States, by Floyd I. Clarke
Hawaii Computer Crimes Law, 1984
A Low Cost Approach to High Technology, by Mark Clark, Lt. South Portland, ME Police
A Low Cost Approach to High Technology by Lt. Mark Clark
Police and the Homeless, by Barney Melekian, Lt. Santa Monica, California Police
Police and the Homeless by Barney Melekian
Hostage/Barricade Incidents: High Risk Factors and the Action Criteria by G. Dwayne Fuselier
Hostage/Barricade Incidents: High Risk Factors and the Action Criteria by G. Drawyne Fuselier
Confronting the Terrorist Hostage Taker by G. Dwayne Fuselier
Police Practices: Operation Hotel-Motel
Tax Resistance Primer: How to Beat the IRS
Making Shareware Pay, by Gary Raymond
Iowa Computer Crimes Law, 1984
The Idaho Computer Crimes Law, 1982
Identification: A Move Towards the Future by Bruce J. Brotman
Identification: A Move Towards the Future, by Brice J. Brotman
The Illinois Computer Crimes Law, 1981/1987
The Indiana Computer Tampering Law, 1986
An Introduction to the Computer Underground, by The Butler (February 26, 1991)
Environmental Crimes: Investigative Basics, by Martin Wright, Dept. Assistant Director, EPA
Environmental Crimes: Investigative Basics by Martin Wright
IRS and Business Taxpayers Disagree Over Who Should be Considered Employees: Why, Results, Solutions
Director's Message: Facing the Future, by William S. Sessions, Director, FBI
The Future of Law Enforcement: Dangerous and Different, by Alvin and Heidi Toffler
The Changing Face of America, by Robert C. Trojanowicz, Ph.D.
The Future of Policing, by William l. Tafoyna, Ph.D.
Public Law Enforcement/Private Security: A New Partnership? By Terrence J. Mangan
A Look Ahead: Views of Tomorrow's FBI, by Richard Sonnichsen
Tomorrow's America: Law Enforcement's Coming Challenge, by Rob McCord
Taking the Job Home, by Richard N. Southworth, Attorney General's Office, Virginia
Joint Custody: A Simplistic Solution by Robert D. Felner and Lisa Terre
Judicial Acceptance of DNA Profiling by John T. Sylvester and John H. Stafford
Judicial Acceptance of DNA Profiling, by John T. Sylvester, J.D.
Local Jury Banned by Judge After Ruling Man Innocent
Information on Jury Nullification
How they Stack the Jury in Georgia
Kansas Computer Crimes Law, 1985
Kentucky Computer Crime Law, 1984
The Louisiana Computer Related Crime Bill, passed in 1984
Directory of Law-Oriented Bulletin Boards, 1986
Interesting US Laws, taken from the Seattle P-I
Director's Message, Law Day 1990, by William S. Sessions, FBI
G.R.A.M.P.A. COPS, by Jere L. Spurlin, Chief of Police, Ft. Meyers, Florida
High School Suicide Case Intervention, by David Fisher, Pinnellas County, Florida, Sheriff's Office
Police Practices: Selecting the Right Officers: DARE
Analytical Intelligence Training, by Marilyn B. Peterson
Law Enforcement Exploring, by Steve Farish, Texas Law Enforcement Explorer Advisor's Association
Curtilage: The Fourth Amendment in the Garden, by John Gales Sauls, FBI
Legal Brief: Maryland v. Buie, Supreme Court Decision
Some Examples of Legal Loopholes by Keith K (February 13, 1994)
US Copyright Office Rules Font Software is Not Copyrightable (November 30, 1989)
Legal Bytes Volume 1 Number 1 by George, Donaldson and Ford (1993)
Legal Bytes Volume 1 Number 1, by George Donaldson and Ford (1993)
Complete information on the Len Rose (Legion of Doom Source Code) Case
Large List of United States Counties
Legally, Lithuania's Case is Open and Shut, by Vytautas Landsbergis, President of Lithuania
Discussion of Lotus' Plan to Sell personal Information
Large Vehicle Stops from William D. Dean
Obtaining Host and Address Information by Ron Ray
How to Successfully Buy Through Mail Order and Protect Your Rights
Cecil Adams on Copyright Traps in Maps (well, sort of)
Store Diversion Burglaries, by Detective Robert P. Meiners, Lincolnwood, Illinois, Police Department
Personal Liability: The Qualified Immunity Defense, by Daniel L. Schofield, S.J.D., FBI
New Massachusetts Modem Tax Proposed (For Real)
The Maryland Computer Crimes Law
Media Performance and International Law, by Howard H. Frederick, Ph.D.
The Michigan Computer Crimes Law
Military Support to Civilian Law Enforcement Agencies by R. Barry Cronin
Minnesota Invokes Computer Law by Rachel Parker
The Minnesota Computer Crimes Law
The Missouri Computer Crimes Law, 1982
Police Policies: Mobile Command Posts
The Court Case against Robert Tappan Morris, 1990-1991
Mississippi Computer Crimes Law, 1985
Campus Security: The Mule Patrol, by James A. Huff
Motor Vehicle Theft Investigations: Emerging International Trends by Mary Ellen Beekman
Motor Vehicle Theft Investigations: Emerging International Trends
Complete Text of the North American Free Trade Agreement (NAFTA) Act (1993)
Natural Laws and Natural Rights by James A. Donald (February 28, 1993)
North Carolina Computer Crime Law
NCIC Training: Hit or Miss, by Don M. Johnson, FBI
Focus on NCIC: Identifying the Unidentified
NCIC Training: Hit or Miss by Don M. Johnson of the FBI
The North Dakota Computer Fraud and Crime Statute, 1987
The Nebraska Computer Crimes Law, 1985
Dangerous Copyright Law by Stephen Haynes (October 2, 1990)
New Hampshire Computer Crimes, 1986
New Jersey Computer-Related Crimes Law, 1984
The FBI's 10mm Pistol, by John C. All, FBI
Ammunition Selection: Research and Measurement Issues, by N. J. Scheers, Ph.D.
Utilizing Job Task Analysis, by Thomas J. Jurkanin
Harry S. Truman's Declaration of the Creation of the National Security Agency (NSA)
Nevada Computer Unfair Trade Practice Law, 1983
New York Penal Law, Computer Crime, 1986
New York's APPL Program: A New Partnetship, by Anthony M. Voelker
Odometer Rollback Schemes by James E. Scripture of FBI
Law Officers Killed: 1980-1989, Victoria L. Major, FBI
Our Lawyer Writes #1: Rodent Milk
Our Lawyer Writes #3: Getting a Divorce, Quick and Easy
Our Lawyer Writes #5: I'm a Mistress, can I Get Anything?
Operation Clean: Reclaiming City Neighborhoods by Richard W. Hatler
Point of View: Campus Police by Gigi Ray of the Arlington Campus Police Department
Pennsylvania's computer crimes law, 1983/1986
Perspective: The Patrol Function, by Patrick V. Murphy, Former Police Commissioner of New York City
Plateauing in Law Enforcement, by James M. Childers, Lubbock, Texas, Police Department
Point of View: A Manager's Guide to Computer Products by Charles Brennan
Community Policing is Not Police Community Relations by Robert C. Trojanowicz
Police Practices: Seat Belt Awareness Program
Community Policing is not Police Community Relations by Robert C. Trojanowicz
Police Practices: Baited Vehicle Detail
Police Practices: Alternate Fuel Program
Police Practices: Baited Vehicle Program
Exilic Xyth's Guide to 1st Level Police Evation (November 10, 1990)
Exilic Xyth's Guide to 1st level Police Evasion (November 10, 1990)
Calling a Policeman a Pig: A New Concept From The Anarchist Cookbook, by The Norwegian Monk
Police Practices: Miami's Ethnic Sharing Program
Police Practices: Operation Star
U.S. Computer Investigation Targets Austinites by Kyle Pope (March 17, 1990)
Wanted Poster for John Richard, the Scofflaw Sysop
The Risks of Posting to the Internet
The Dangers of Posting to the Net (A Visit from the FBI)
Police Practices: CHP Hazardous Waste Investigation Unit
Police Practices: The Community Outreach Program
Police Practices: Pennsylvania's Interdepartmental Communications System
The Federal Zone: Cracking the Code of Internal Revenue by Mitch Modeleski (January, 1994)
The Preliminary Investigation Process by Cheif Gordon F. Urlacher
Presumed Guilty: The Law's Victims in the War on Drugs, 1991 by Andrew Schneider
Primes, Codes and the National Security Agency by Susan Landau
Computer Privacy vs. First and Fourth Amendment Rights, by Michael S. Borella, 1991
The Privatized NREN, by Mitchell Kapor, Electronic Frontier Foundation, February 14, 1991
Privitization of Prisons: Fad or Future by Lr. David K. Burright
The Private and Open Society, by John Gilmore
Prodigy Stumbles as a Forum.. Again
Promotion to Chief: Keys to Success in a Small Department
Freedom From War: The United States Program for General and Complete Disarmament in a Peaceful World
Point of View: European Law Enforcement after 1992 by Jan Blaauw
Point of View: Eurpoean Law Enforcement after 1945
Quotes from Many Historical Figures about Juries
The Rat Patrol Rides! By Paul C. Ricks, Deputy Chief of Police, Colorado Springs
The Rat Patrol Rides! By Paul C. Ricks of Colorado Springs P.D.
Inslaw's Analysis and Rebuttal of the BUA Report
Ammunition Selection: Research and Measurement Issues by N.J. Scheers and Stephen R. Band
A Case for Mistaken Identity... Who's Privacy was Really Invaded? by Jim Bigeloww
Book Review, "Liability" by Peter Huber
Rhode Island Computer Crimes Law, 1979
United States Vs. Riggs: Jacking into the Net with the Illinois District Court
Why Your Rights are Guaranteed and should Not Be Taken Away
Seizure Warrant for the Ripco BBS
Seizure Warrant Documents for the RIPCO BBS
Safety Action Team, by Rod Englert, Oregon Sheriff
The Shareware Author and User Case Study by Daniel Corbier (1994)
South Carolina Computer Crime Act
Preparing for School Crisis, by David Nichols, Ph. D.
Preparing for School Crisis, by David Nichols of Jacksonville State University (1991)
School Crime Stoppers, by Bob Chance, Tulsa Oklahoma Police
School Crime Stoppers by Bob Chance of the Tulsa Police Department
South Dakota Computer Crimes Law, 1982
Searches of Premises Incident to Arrest, by A. Louis DiPietro
Emergency Searchs of Effects, by John Gales Sauls of the FBI Academy
Inventory Searches: The Role of Discretion, by Austin A Anderson
Proposed Amendment #59 to the Sentencing Guidelines for United States Courts
Serolgical Evidence in Sexual Assault Investigations, by Robert R.J. Grispino, MA, Serolgy Unit, FBI
An Introduction to Computer Security for Lawyers by Simson Garfinkel (1987)
Police Sniper Training by John Plaster of the Minnesota National Guard
Police Sniper Training, by John Plaster, Instructor, MN Guard Counter Sniper School
Information and Documents Needed for Software Copyright Application
Information and Documents Needed for Software Copyright Application
A Partial List of Software Patents, compiled by Michael Ernst (April 12, 1992)
The Criminal Behavior of the Serial Rapist, by Robert R. Hazelwood
A Cross-Reference of US States and Laws Written for Them
The Abuse of Anabolic Steroids by Charles Swanson, University of Georgia
Abuse of Anabolic Steroids, by Charles Swanson, Ph. D., U of Georgia
Successful Interviewing by James R. Ryals, March 1991
Successful Interviewing by James R. Ryals
The High Scool Suicide Crisis Intervention by David Fisher of the Pinnellas Sheriff's Office
The INSLAW affair: September 10, 1992
Selected Supreme Court Cases: 1989-1990 Term: William U. McCormack, FBI
The Rules of the U.S. Supreme Court
The Rules of the U.S. Supreme Court (Part II)
The Rules of the U.S. Supreme Court (Part III)
The Will to Survive, by Stephen R. Band
Getting a Discretionary Swiss Banking Account
Seizing Wire Transfers, by The Wall Street Journal (September 20, 1993)
What Files are Legal for Distribution on a BBS?
Washington D.C.'s Operation "On Target" by Eric W. Witzig, Ret., Washington DC Police
Tax Deductibility of BBS Operations
Teamwork: An Innovative Approach, by Alan Youngs, Captain, Lakewood Colorado Police
Push Button Felonies: KPFA-FM Radio Broadcast July 26, 1990
Theft of Computer Software: A National Security Threat by William J. Cook
Trademarks in Brief (Overview)
A Look Ahead: Views of Tomorrow's FBI by Richard Sonnichsen, Gail O. Burton and Thomas Lyons
Towing Companies: Friends or Foes? By Michael C. Gillo
Trash Inspections and the Fourth Amendment, by Thomas W. Kukura, JD
Trash Inspections and the Fourth Amendment, by Thomas V. Kukura of the FBI
The League for Programming Freedom Statement
The Charter of the United Nations (July 7, 1994)
The United States and the States under the Constitution, by C. Stuart Patterson
The United States and the States under the Constitution, by C. Stuart Patterson (Part 2)
The United States and the States under the Constitution, by C. Stuart Patterson (Part 3)
The United States and the States under the Constitution, by C. Stuart Patterson (Part 4)
The United States and the States under the Constitution, by C. Stuart Patterson (Part 5)
The United States and the States under the Constitution, by C. Stuart Patterson (Part 6)
The Constitution of the United States
Protecting Rights in User Interface Designs by Ben Shneiderman (November 27, 1992)
The Virgina Computer Crimes Act
Victim-Witness Assistance by Joseph R. Luteran, March 1991
Visiophones: French High Tech Security, by Pierre Marie Bourniquel, Biarritz, France
Computer Crimes Law in Washington State
The Text of the Search Warrant from Waco, Texas
A Waiver of Claims pertaining to Adult Sections of Ryan's Bar BBS
There's Gotta Be a Better Way, by Glen Roberts and Bill Wajk
Vehicular Long Barrel Weapons Mount, by David W. Pisenti, FBI
West Virginia Computer Crimes Law
The Yardies: England's Emerging Crime Problem, by Roy A.C. Ramm (January, 1988)