💾 Archived View for spam.works › mirrors › textfiles › law captured on 2023-06-14 at 14:25:15. Gemini links have been rewritten to link to archived content

View Raw

More Information

-=-=-=-=-=-=-

T E X T F I L E S

Laws and Law Discussion

From the first time a rumor went by that the FCC was going to institute a

"modem tax" (this one shows up about every two years without fault), BBS

users took an interest in the funny little laws that govern the country and

how the jackasses in the funny white building were going to mess up the

fun. To this end, transcripts and discussions about laws have been around

for a long time.

Because of the somewhat odd subject matter of some of the files, some of

the files you would expect to be located in this section are also located

in the <A HREF="/politics">politics</A> section. Some of these files would

probably be better put in the Politics section as well.

Oh, and this would normally go without saying, but it's probably not a good

idea to depend on these files for actual, your-property-and-well-being

law advice. Sometimes the law has radically changed since the file was

written, or the file falls under that special "The US never submitted a

full approval to all 50 states so actually you can punch a cop" type of

conspiratorial section. See also <A HREF="/conspiracy">conspiracy</A>.

1changin01.law

Counterintelligence Challenges in a Changing World, by William S. Sessions, Director, FBI

1stamend.txt

A Showdown Over Computer Crime, by Brooks Boliek (August 5, 1990)

1urbanp01.law

Urban Transportation Security, by Robert W. Dart, Chicago Police

250law.law

Section 250.12 of the Model Penal Code: Violation of Privacy

251law.law

Section 251.4 of the Model Penal Code: Obscenity

2corrupt05.law

Corruption: A Continuing Challenge for Law Enforcement, by Otis E. Cooksey, Military Advisor

2developp04.law

Developing Police Leadership, by Paul Mansen, Sergeant, Rochester Police

3fbipri10.law

Foreign Counterintelligence: An FBI Priority, by James E. Tomlinson, FBI

3polpracp09.law

Police Practices: Telemarketing Crime Prevention, by David I. Rechenmacher, Illinois Police Department

4polprac14.law

Police Practices: Ministers Team With Police to Keep the Peace

4pusherp10.law

The Respectable Pusher, by Jeffrey D. Lane, Office of the Secretary of State, Atlanta

5badchecp15.law

Taking the Bounce Out of Bad Checks, by Vinse J. Gilliam, DA's Office, Ventura Country CA

5espion17.law

Espionage Awareness Programs, by Freddie L. Capps, Jr. Special Agent, FBI

6poview20.law

Point of View: Managing for Excellent, by David A. King, Chief of Police, Perkasie Police

6resforup20.law

Research Forum: McGruff Robot Teaches Kids

7crowdcop22.law

Effective Crowd Control, by Steven J. Schmidt, Kentucky Police

7drugtes22.law

The Kentucky State Police Drug Testing Policy, by W. Michael Troop, State Police of Kentucky

8civilfop26.law

Civil Forfeiture: Real Property Used in Drug Trafficking

8interro28.law

Custodial Interrogation: Impact of Minnick V. Mississippi by Kimberly A. Crawford

93dec001.txt

Leadership in the Nineties, by Ronnie Garner, M.P.A.

93dec002.txt

Employee Empowerment by Shelia Berglund

93dec003.txt

Police Practices: Citizen Advisory Committees by Major Dan Flynn, M.P.A.

93dec004.txt

Positive Organizational Culture: A Preactical Approach by Randall Aragon, M.A.

93dec005.txt

The Family and Medical Leave Act by Jeffrey Higginbotham, J.D.

93jun001.txt

Eyesight Standards: Correcting Myths, by Richard N. Holden, Ph.D.

93jun002.txt

The Computer: High-Tech Instrument of Crime by Michael G. Noblett

93jun003.txt

Elevator Vandalism Squad by Ronald Welsh

93jun004.txt

Police Pracices: Drug Educaiton Saving America's Youth, by Damon Davis

93jun005.txt

Police Violence: Addressing the Issue, by Daniel B. Boyle

93jun006.txt

Focus on Training: The Americans with Disabilities Act, by John A. Leonard

93jun007.txt

Computer Searches and Seizures: Challenges for Investigators, by John Gales Sauls

9brief.txt

A Legal Brief by Special Agent Jeffrey Higginbotham (Probable Cause Determination)

9briefp32.law

Legal Brief by S.A. Jeffrey Migginbotham, Legal Instructor, FBI

abouteff.law

General Information about the Electronic Frontier Foundation

academy10.law

Citizen Police Academies by Martin Alan Greenberg, Dept. of Criminal Justice, Ulster Community College

afis.law

Police Practices: AFIS Technology for Rural States

aicnews.1

Arizona Identification Council NEwsletter, July, 1990

al_lawsta.law

The Alabama Computer Crime Act, 1985

alcor-1

ALCOR Files Suit Over Electronic Mail Seizure, by David Bloom, Feb 24, 1990

alcor-2

Transcript of Suit by ALCOR

alcor-3

Additional Filings in ALCOR BBS Case

alcor-4

Response of ALCOR Lawyer to Motion Filed

alcor-5

File Round of Motion Filed in Alcor Court Case

alcor-6

The Resolution of the Alcor E-mail privacy Case

alcor-7

Response of William F. Murphy to ALCOR Suit

alcor-8

Bill Submitted in ALCOR BBS Case

alcor-9

Appeal of dismissal in ALCOR BBS Case

anarchy.ripco

The Modern Speeders Guide to Radar and State Troopers, by Exilic Xyth (January 11, 1988)

anti-hac.txt

A Bill Against Hacking, from Emma Nicholson

ar_lawsta.law

Arkansas Regulations on Computer Crime, 1987

arrest.txt

Your Rights and What to Do Upon Arrest, by Michael J. Elliott, Criminal Defense Attorney

articles.law

Bibliography of Computer Security Articles 1983 through 1988

asmp-gui

American Society of Magazine Photographers 1991 Copyright Guide

az_lawsta.law

Arizona Computer Crimes Law, 1978

babbs001.txt

Anti Federal Agent BBS Protection, by Babbs Boy

banking.off

Privacy and Offshore Banking... What the IRS Doesn't Want You to Know! By David Johnson (July 5, 1994)

bbs-suit.txt

Civial Action No. IP-88 93C: Linda Thompson vs. Bob Predaina

bbs_and_

The Electronic Pamphlet: Computer Bulletin Boards and the Law by Michael H. Riddle (1990)

bbs_law.law

Computer Bulletin Boards and the Law, by Michael M. Riddle (Law Study)

bbsdefa.law

Defamation Liability of Computerized Bulletin Board Operators and Problems of Proof, by John R. Kahn

bbslaw.man

Version 1.1 - BBS LEGAL GUIDE by Clary and Kraft, 1993

bbslaws.txt

THe Legal Aspects of Telecommunications and Electronic Bulletin Board SYstems, by James J. Spinelli

bellraid.txt

The Future of Telecommunications.......

bendix.txt

Crosley Bendix (Negativland) Discusses The Copyright Act (November 9, 1992)

blue.law

Death of the Blue Box, by Full Disclosure, 1991

brave.yes

Smart Brave Lady indicates that we are not Drivers, and therefore do not need a license.

caddraft.law

Police Practices: Computer Aided Drafting for Law Enforcement

candp.law

Crime and Puzzlement by John Perry Barlow

candp2.law

Update on Crime and Puzzlement by John Perry Barlow, 1990

cardozo.txt

Some "Property" Problems in a Computer Crime Prosecution by Mike Godwin of the EFF

cellmate.law

Cellmate Informants: A Constitutional Guide to Their Use, by Kimberly Kingston Crawford, FBI Academy

cellmate.txt

Cellmate Informants: A Constitutional Guide to Their Use, by Kimberly Kingston Crawford

chomloot.txt

Noam Chomsky writes a letter to Lies Of Our Times, May 1991

ciabwash.law

CIA Memorandums on Brainwashing

citizen1.txt

Studies in Constitutional Law: A Treatist on American Citizenship by John S. Wise

citizen2.txt

Chapter 2: How American Citizenship May be Acquired in the Nation

citizen3.txt

Chapter 3: Of the Obligation and Duties of the Citizen to the Nation and the States

citizen4.txt

Chapter 4: Of the Rights, Privileges, and Immunities of the Citizen

citizen5.txt

Chapter 5: Privileges and Immunities Under the War Amendments

citizens.gui

A Citizen's Guide on using the Freedom of Information Act and the Privacy Act of 1974 to Request Government Records (July 10, 1991)

civil.dis

Civil Disobedience, by Henry David Thoreau

civlib.law

Civil Liberties in Cyberspace: When does Hacking Turn from an Exercise of Civil Liberties into Crime? By Mitch Kapor, Scientific American, 1991

civlrght.txt

Civil Rights Cases and Police Misconduct, by John Epke

civlrght14.law

Civil Rights and Police Misconduct, by John Epke and Linda Davis

clipper1.asc

Remarks by Bruce Sterling at the Fourth Annual Conference on Computers, Freedom, and Privacy

closenet.law

Closing the Net, by Greg Costikyan (On Operation Sun-Devil)

co_lawsta.law

Colorado Crimes Law,

cog_inte.law

Cognitive Interviewing, by Margo Bennett, FBI

compacs.txt

The Limits of the Law in Restricting Computer Misuse, by Peter Sommer (March 19, 1991)

compcrim.txt

Computer Crimes: An Escalating Crime Trend by William S. Sessions

compriv.law

Computer Privacy vs. First and Fourth Amendment Rights, by Michael S. Borella

compsent

Revised Computer Crime Sentencing Guidelines, from Jack King (1992)

compuser

What is a Compilation Copyright? The Gospel According to Compuserve (December 3, 1987)

compuser.law

Compuserve's Position: What is a Compilation Copyright?

computer.cri

Computer Crime: Current Practices, Problems and Proposed Solutions, Second Draft, Brian J. Peretti

confess.law

Why Suspects Confess, by David D. Tousignant, Inspector, Lowell Massachusetts

confess.txt

Why Suspects Confess, by David D. Tousignant

consoli.law

Public Services Consolidation: The Answer to your Community's Needs, by Robert L. Sobba, Chief of Police, Idaho Police

const_in.cyb

Laurence H. Tribe, "The Constitution in Cyberspace"

copr.txt

How to Copyright Software, by Locus, Inc. (1990)

cops

If YOu Have to Ask, Get Out of the Way, by Chuck Milland

cops.txt

Why Cops Hate You: If You Have to Ask, Get Out of the Way

copstamp.txt

Police Tampering: How Often and Where, by Alan Deshowitz

coptalk.txt

Don't Talk to Cops, by Robert W. Zeuner, Member of the New York State Bar

copy.txt

Software and Copyrights: Registration, Notice and Why by Charles B. Kramer (January 8, 1992)

copyr

Copyright Information, by Inez Harrison

copyrigh.txt

Legal Brief: Software Copyright Law (December 1985)

copyrit1.law

Copyrights and Computer Software: An Introduction, by Sam Kitterman, Jr.

copyrit2.law

Copyrights and Computer Software: Part II, by Sam Kitterman, Jr.

copyrit3.law

Copyrights and Computer Software: Part III, by Sam Kitterman, Jr.

copyrit4.law

Copyrights and Computer Software: Part IV, by Sam Kitterman, Jr.

copyrit5.law

Copyrights and Computer Software: Part V, by Sam Kitterman, Jr.

copyrite.c64

Commodore's Extremely Silly Liscence for Workbench 1.3.2

copyrite.doc

Copyright Information for Computer Software Hacks from June B. Moore

copyrite.inf

Answering Some Questions about the Ditribution of Public Domain Software by Ron Fowler (April 12, 1984)

copyrite.law

Large Overview of American Copyright Law

copyrite.txt

Copyright Law from Jordan J. Breslow (February 13, 1986)

copyrt.txt

Copyright law and Liscence Law as Applies to Computer Software

copyso.txt

Software and Copyrights: Registeration, Notice and Why by Charles B. Kramer, Esq. (September 25, 1991)

correct.txt

The Principle of Correct Absue

couriers.txt

Detaining Suspected Drug Couriers: Recent Court Decisions

couriersp27.law

Detaining Suspected Drug Couriers: Recent Court Decisions, by William U. McCormack, Special Agent, FBI Academy

court.law

The Transcript of Craig Neidorf's Trial

court.txt

Disorder in the Court! (Funny Court Transcripts)

cright3.txt

Copyrighting Public Domain Programs by June B. Moore, JD

crime.txt

The Grolier Electronic Encyclopedia Definition of Crime

crimecatalog.cmp

The Crimefighters' Catalog of Special Purpose Books and Videos

crimefighter.cmp

The Crimefighters Compilation

crimeftr.000

Table of Contents and Quick Tutorial

crimeftr.002

Why Police Can't Cope, and The Need for CrimeFighters

crimeftr.003

Crime Stoppers and We-Tip's Formula for Rewards

crimeftr.004

Catch-all Reward Law: $25,000 - All Felonies, All States

crimeftr.005

Fines & Forfeiture Laws: 50% Paid to CrimeFighters!

crimeftr.006

Misdemeanors and Do-It-Yourself Lawsuits

crimeftr.007

Qui Tam Law: Be the Prosecutor - Control Plea Bargaining

crimeftr.008

Civil & Criminal RICO Laws

crimeftr.009

Drunk Driver Terminators (D.D.T.) Patrols - to Get Started

crimeftr.010

Drug Laws & Drug Wars - Unlimited Business Opportunities

crimeftr.011

Polluter Tooters: Anti-Pollution laws, MEGABUCK Rewards

crimeftr.012

Terrorists, Assassins, and Police Corruption

crimeftr.013

Bounty Hunters, Bail Bond Agents and Skip Tracers

crimeftr.014

U.S. Customs/Coast Guard Laws, Mechanics' Laws

crimeftr.015

Post Office Rewards, Scams, Cons, Frauds

crimeftr.016

Wildlife Protection/Poaching, Conservationists Laws

crimeftr.017

National Forests (Vandalism, Pot Growing, other laws)

crimeftr.018

Wiretap and Blackmail Laws & Rewards for CrimeFighters

crimeftr.019

Misc Rewards for This and That (Dozens of them)

crimeftr.020

State Reward Laws

crimeftr.021

Crime Information, Your Right to Withhold for Rewards

crimeftr.022

Citizen Arrests - What you Need to Know

crimeftr.023

High Speed Pursuits - Unlike Smokey and the Bandit!

crimeftr.024

Rules of Evidence - Entrapment Explained

crimeftr.025

Where to Get CrimeFighter Training

crimeftr.026

High Tech Tools of the Trade - Where to Get Them

crimeftr.027

Problems with Prosecutors and Plea Bargaining

crimeftr.028

How to Calculate Rewards, Proposed CrimeFighters Reward Law

crimeftr.029

CrimeFighters International, Inc. Membership info.

crimeftr.030

Membership Application

criminal.law

Criminal Informants: An Administrator's Dream or Nightmare? By Harry A. Mount, Jr.

criminal.txt

Criminal Informants: An Administrator's Dream or Nightmare? By Harry A. Mount, Jr.

cripple.txt

The Experience of a Shareware Author by Frank Bell of NEWKEY

cryptlaw

Crypto-Law Survey by Bert-Jaap Koops (July, 1995)

csa87.law

National Act on Computer Crime, Act 100-235

csbylaws.law

By-Laws of the Communications Security Association, Inc.

cslaw.law

Computer Security And the Law, by Gary S. Morris

ct_lawsta.law

Computer-Related Offenses from the Connecticut General Statutes

cyberlaw.law

Cyberspace and the Legal Matrix: Laws or Confusion?

cyblaw.txt

Cyberspace and the Legal Matrix: Laws or Confusion?

cybspace.txt

Cyberspace and the Legal Matrix: Laws or Confusion?

cycrime0.txt

Emmanuel Goldstein on the E911 Affair

dblaw.txt

Legal Protection of Computer Databases, by Ralph C. Losey

define.stb

Definitions of Legal Terms

deflib.bbs

Defamation Liability of Computerized BBS Operators and Problems of Proof by John R. Kahn

delibera.leb

Deliverate Indifference: The Standard for Municipal and Supervisory Liability by Michael Callahan

denning

Concerning Hackers Who Break into Computer Systems, by Dorothy Denning, October 1st, 1990

dennis_h

The Price of Copyright Violation from Dennis Jayes

dial911.die

Dial 911 and Die by Aaron Zelman and Jay Simkin (December 15, 1992)

dir_mesgp01.law

Director's Message, May 1991, by William S. Sessions, FBI

disabil25.law

The Americans With Disabilities Act, by Jeffrey Higginbotham, FBI

disaster.law

Disaster Operations: Not Business as Usual, by Michael Guerin, Governor's Office, Ontario, California

disclaim.txt

An Example Set of Disclaimers, Rules and Regulations

disk-fee.txt

The Great "Disk Fee" Fallacy for Public Software Distribution

dispatch.law

Point of View: Dispatching Units: Improvements for the First List, by Bob Blankenship, Chief, Redding, California Police

dmessage.law

Director's Message, April 1991, by William S. Sessions, FBI

dmessage.leb

Director's Message: Police and Citizens Working Together by William Sessions

doggie.txt

The Great American Dog Trial Vendetta by P. Remington Adams (1991)

domestiv.law

Domestic Violence: When do Police Have a Constitutional Duty to Protect? by Daniel L. Schofield, FBI

downtime.bul

Example of a Policy Regarding BBS Downtime

drivers.law

Research Forum Survey Results: Driver License Suspension programs

driving.bar

The (Almost) Definitive Answer to Driving Barefoot in America (1994)

drugdiv.txt

Pharmaceutical Diversion and Abuse: Our Nation's Other Drug Problem, by Thomas C. Babicke

drugdivp01.law

Pharmaceutical Diversion and Abuse: Our Nation's Other Drug Problem, by Thomas C. Babicke, DEA, Virginia

drugtest.txt

Drug Abuse and Testing in Law Enforcement: No Easy Answers, by Andrew J. Harvey

drugtestp12.law

Drug Abuse and Testing in Law Enforcement: No Easy Answers by Andrew J. Harvey, Sergeant, California Police

dunnel.txt

The Dunne Act Introduced in NY for Computer BBSes (May 15, 1989)

e-law.txt

E-Law: legal Issues Affecting Computer Information Systems and System operator Liability, by David J. Loundy

ecpa.lay

The Electronics Communications Privacy Act of 1986, a Layman's View by Michael H. Riddle

ecpa1law.law

Electronic Communication Privacy Act: Chapter 119

ecpa2law.law

Electronic Communication Privacy Act: Part II

ecpa3law.law

Electronic Communication Privacy Act: Part III

ecpalay.law

The Electronic Communications Privacy Act of 1986: A Layman's View, by Michael M. Riddle

edwards.law

Edwards vs. State Farm Insurance

edwards_

The Processes by which the Secret Service Investigates Computer Crimes

eff-righ.txt

Legal Overview: The Electronic Frontier and the Bill of Rights (July 10, 1990)

eff.law

The Founder of the Electronic Frontier Foundation get back to you about Their Plans

eff.txt

The Foundation of the Electronic Frontier Foundation (July 10, 1990)

effbor.law

Legal Overview: The Electronic Frontier and the Bill of Rights

effss.law

Civil Liberties Implications of Computer Search and Seizures: Some Proposed Guidelines for Magistrates Who Issue Search Warrants

elbarasn.107

Electronic Bar Association Announced by Paul Bernstein

elec_bbs.law

Electronic Bulletin Boards: A New Resource for Law Enforcement by Seth Jacobs, SEARCH Group

electrif.law

Electrifying Speech: New Communications Technologies and Traditional Civil Liberties

email

Some Policies on Electronic Mail: A Summary by Todd Hooper

email_pr

Computer Electronic Mail and Privacy: The Law, by Ruel T. Hernandez, January 11, 1987

emailpri.law

Overview of the Employee Privacy Laws as Currently Apply

emailprv.law

Bibliography on Law and Computers

embezzle.law

Bank Employee Embezzlement by Denise M. Dube, LA DA

employleb.law

Employee Development Programs, by John L. Pape, Chief of Police

entrapmtdoc.law

The Defense of Entrapment as it Applies to Bulletin Board System Operators, by Randy B. Singer, Esq.

envhook.txt

The Environmental Movement and the Value of "Moderation" by Brian K. Yoder (1992)

ep_forum.law

The Environmental Protection Forum, by Michael A. O'Brien, Start Attorney Office, Florida.

ethics.law

Point of View: Rededicating Ourselves to Leadership and Ethics in Law Enforcement, by Vane. R. King, Flint Michigan Police Department

ethics.txt

Ethics for BBS Users

fbi

Excerpts from the FBI & Your BBS (From Ripco)

fbi-miss.txt

The FBI Mission Statement

fbi_mail.txt

Appeal Filed in Todd Patterson v FBI Case (July 26, 1989)

fbiaug01.law

Accreditation: A Small Department's Experience by Raymond E. Arthurs, Chief, Willowbrook Police

fbiaug02.law

Odometer Rollback Schemes, by James E. Scripture, Special Agent, FBI, Boston Massachusetts

fbiaug03.law

Police Practices: Custom's BET Program

fbiaug04.law

The Tactical Incident: A Total Police Response by Nicholas F. Kaiser, MA, Troy Police

fbiaug05.law

A New Approach to FTO Training by Blair Rankin, North Carolina Police

fbiaug06.law

Focus on NCIC: Identifying the Unidentified

fbiaug07.law

The Federal Grand Jry: Exceptions to the Rule of Secrecy (Part I)

fbijul01.law

Lateral Entry: A Move Toward the Future, by J. Eddie Nix, Leut. Cobb County, Georgia Police

fbijul02.law

Confronting the Terrorist Hostage Taker, by G. Dwayne Fuselier, FBI

fbijul03.law

Police Practices: Bomb Dog Teams

fbijul04.law

Campus Security: The Mule Patrol, by James A Huff, Central Missouri State University Campus Police

fbijul05.law

The Forensic Anthropologist, by Robert W. Mann, MA, Smithsonian Institution

fbijul06.law

Focus on Crime Prevention: Business and Government Working Together

fbijul07.law

Anticipatory Search Warrants, by A. Louis DiPietro, FBI

fbijun01.law

The Yardies: England's Emerging Crime Problem, by Roy A. C. Ramm, Detective Chief Superintendent, London England

fbijun02.law

Focus on Forensics: Latent Shoeprint Analysis

fbijun03.law

Towing Companies: Friends or Foes? By Michael C. Gillo, Attorney's Office, Ft. Lauderdale, Florida

fbijun04.law

Police Practices: The Nelson-Denny Experiment

fbijun05.law

Facility Planning In Colorado: Form Vs. Function by James D. Munger, Colorado Springs

fbijun06.law

Records Management in the 1990s by Daniel L. Arkenau

fbijun07.law

Research Forum: FBINA Graduate Survey

fbijun08.law

B.L.O.C.: Business Leaders Against Organized Crime, by Mike King, Administrative Assistant, Weber County, UT Attorney's Office

fbijun09.law

DNA Testing and the Frye Standard, by Robert A. Fiatal, FBI

fbitop10.hum

FBI Top Ten Countdown, January, 1986

feb01.law

Privitization of Prisons: Fad or Future, by Lt. David K. Burright, Linn County Sheriff's Office, Albany, OR

feb02.law

The Administrative Warning Ticket Program by Lt. Andrew J. Barto, Romeoville, IL

feb03.law

Arson Investigations by William A. Tobin, FBI Laboratory

feb04.law

The Criminal Behavior of the Serial Rapist, by Robert R. Hazelwood, MS, Behavioral Science Instruction/Research Unit

feb05.law

Large Vehicle Stops

feb06.law

Critical Incident Stress Debriefing

feb07.law

Foriegn Searches and the Fourth Amendment, by Austin A Andersen, LL.B>, FBI

feb08.law

Florida's Computer Crime

fed_lawsta.law

Federal Computer Crimes Law, 1984/1986

fedbbs3.lst

Federal Public Access Bulletin Boards, March 1989

fedcompseize.txt

The Federal Computer Seizure Guidelines (1994)

federal.leb

The Federal Grand Jury: Exceptions to the Rule of Secrecy (Part II) by Austin A. Anderson

fencesp06.law

ROP-ing In Fences, by James Rainum, Officer, Repeat Offender Project, Washington DC

fija.txt

A New Hope for Freedom: Fully Inform Jurors by Don Diog

fija02.txt

If You're Called for Jury Duty, by Don Doig

files.tut

File Transfer Liability

finalmo.txt

An Attempt to Modify Phone Rules for BBS Lines by Missouri, 1992

fl_lawsta.law

Florida Computer Crimes Act, 1978

foia-pa.txt

A Citizen's Guide on Using the Freedom of Information Act and the Privacy Act of 1974 to Request Government Records (September 20, 1991)

foia.txt

Using the Freedom of Information Act

foiacit.txt

A Citizen's Guide to using the Using the Freedom of Information Act and the Privacy Act of 1974 to Request Government Records (July 10, 1991)

forbes.txt

A Little Perspective, Please, by Mitchell Kapor of the EFF (June 21, 1993)

forenp11.law

The FBI's Forensic DNA Analysis Program, by Jay V. Miller, FBI

funny.txt

Very Large Rant and Sales Pitch about Paper Money Being Evil

ga_lawsta.law

The Georgia Computer Crimes Law

grandjur.txt

The Federal Grand Jury: Exceptions to the Rule of Secrecy by Austin A Andersen

gunshot.txt

Gunshot Primer Residue: The Invisible Clue by Roger W. Aaron

gunshotp19.law

Gunshot Primer Residue: The Invisible Clue, by Roger W. Aaron, FBI Laboratory

gvtscrcy.txt

The Government's Mania for Secrecy, 1987

hackers0.law

Introduction to the San Luis Obispo Incident

hackers1.law

Amateur Hackers Tripped Up, by Danna Dykstra Coy

hackers2.law

Computer Case Takes a Twist, by Danna Dykstra Coy

hackers3.law

Hackers Off Hook, Property Returned, by Danna Dykstra Coy

hackers4.law

A Case for Mistaken Identity... Who's Privacy Was Really Invaded?

hakharas.txt

Hackers and the Authorities: A Question of Harassment, as Seen in an Article from a Recent Newspaper on November 15, 1992

handbook.txt

What You Should Know if You're Accused of a Crime by Joyce B. David Esq.

hategrou.law

hate Violence In the United States, by Floyd I. Clarke, FBI

hategrou.txt

Hate Violence in the United States, by Floyd I. Clarke

hi_lawsta.law

Hawaii Computer Crimes Law, 1984

hightech.law

A Low Cost Approach to High Technology, by Mark Clark, Lt. South Portland, ME Police

hightech.txt

A Low Cost Approach to High Technology by Lt. Mark Clark

homeless.law

Police and the Homeless, by Barney Melekian, Lt. Santa Monica, California Police

homeless.txt

Police and the Homeless by Barney Melekian

hostage.law

Hostage/Barricade Incidents: High Risk Factors and the Action Criteria by G. Dwayne Fuselier

hostage.txt

Hostage/Barricade Incidents: High Risk Factors and the Action Criteria by G. Drawyne Fuselier

hostaker.txt

Confronting the Terrorist Hostage Taker by G. Dwayne Fuselier

hotel.law

Police Practices: Operation Hotel-Motel

howtobeattheirs.txt

Tax Resistance Primer: How to Beat the IRS

howtosel.txt

Making Shareware Pay, by Gary Raymond

ia_lawsta.law

Iowa Computer Crimes Law, 1984

id_lawsta.law

The Idaho Computer Crimes Law, 1982

ident.txt

Identification: A Move Towards the Future by Bruce J. Brotman

identp01.law

Identification: A Move Towards the Future, by Brice J. Brotman

il_lawsta.law

The Illinois Computer Crimes Law, 1981/1987

in_lawsta.law

The Indiana Computer Tampering Law, 1986

intrundg.txt

An Introduction to the Computer Underground, by The Butler (February 26, 1991)

invbasic.law

Environmental Crimes: Investigative Basics, by Martin Wright, Dept. Assistant Director, EPA

invbasic.txt

Environmental Crimes: Investigative Basics by Martin Wright

irs-20q.txt

IRS and Business Taxpayers Disagree Over Who Should be Considered Employees: Why, Results, Solutions

jan01.law

Director's Message: Facing the Future, by William S. Sessions, Director, FBI

jan02.law

The Future of Law Enforcement: Dangerous and Different, by Alvin and Heidi Toffler

jan03.law

The Changing Face of America, by Robert C. Trojanowicz, Ph.D.

jan04.law

The Future of Policing, by William l. Tafoyna, Ph.D.

jan05.law

Public Law Enforcement/Private Security: A New Partnership? By Terrence J. Mangan

jan06.law

A Look Ahead: Views of Tomorrow's FBI, by Richard Sonnichsen

jan07.law

Tomorrow's America: Law Enforcement's Coming Challenge, by Rob McCord

jobhome.law

Taking the Job Home, by Richard N. Southworth, Attorney General's Office, Virginia

joint-cu.art

Joint Custody: A Simplistic Solution by Robert D. Felner and Lisa Terre

joyce

Beyond the Orality/Literacy Dichotomy: James Joyce and the pre-History of Cyberspace by Donald F. Theall (May 1992)

judna.txt

Judicial Acceptance of DNA Profiling by John T. Sylvester and John H. Stafford

judnap26.law

Judicial Acceptance of DNA Profiling, by John T. Sylvester, J.D.

judseal.txt

The Judicial Sealing Requirement in Electronic Surveillance: A Matter of Immediacy by Robert A. Fiatal

juryban.txt

Local Jury Banned by Judge After Ruling Man Innocent

jurynul.txt

Information on Jury Nullification

juryrig.txt

How they Stack the Jury in Georgia

juryrite.inf

Fully Informed Juries

juryrite.txt

Toward a Bill of Jury Rights

ks_lawsta.law

Kansas Computer Crimes Law, 1985

ky_lawsta.law

Kentucky Computer Crime Law, 1984

la_lawsta.law

The Louisiana Computer Related Crime Bill, passed in 1984

lawbbs.txt

Directory of Law-Oriented Bulletin Boards, 1986

laws.txt

Interesting US Laws, taken from the Seattle P-I

lebmay01.law

Director's Message, Law Day 1990, by William S. Sessions, FBI

lebmay02.law

G.R.A.M.P.A. COPS, by Jere L. Spurlin, Chief of Police, Ft. Meyers, Florida

lebmay03.law

High School Suicide Case Intervention, by David Fisher, Pinnellas County, Florida, Sheriff's Office

lebmay04.law

Police Practices: Elderwatch

lebmay05.law

Police Practices: Selecting the Right Officers: DARE

lebmay06.law

Analytical Intelligence Training, by Marilyn B. Peterson

lebmay07.law

Law Enforcement Exploring, by Steve Farish, Texas Law Enforcement Explorer Advisor's Association

lebmay08.law

Curtilage: The Fourth Amendment in the Garden, by John Gales Sauls, FBI

lebmay09.law

Legal Brief: Maryland v. Buie, Supreme Court Decision

legal.tec

Some Examples of Legal Loopholes by Keith K (February 13, 1994)

legalfnt.txt

US Copyright Office Rules Font Software is Not Copyrightable (November 30, 1989)

leglbyt1.txt

Legal Bytes Volume 1 Number 1 by George, Donaldson and Ford (1993)

leglbyt2.txt

Legal Bytes Volume 1 Number 1, by George Donaldson and Ford (1993)

len.ros

Complete information on the Len Rose (Legion of Doom Source Code) Case

listcoun.txt

Large List of United States Counties

lith_law.txt

Legally, Lithuania's Case is Open and Shut, by Vytautas Landsbergis, President of Lithuania

lotus.txt

Discussion of Lotus' Plan to Sell personal Information

lvstops.txt

Large Vehicle Stops from William D. Dean

mail_exp

Obtaining Host and Address Information by Ron Ray

mailordr

How to Successfully Buy Through Mail Order and Protect Your Rights

manage05.law

What They Didn't Teach in Management School, by James D. Sewell, Ph.D., Florida Criminal Justice Executive Institute

maps_cop.in

Cecil Adams on Copyright Traps in Maps (well, sort of)

mar90_1.law

The Preliminary Investigative Process, by Chief Gordon F. Urlacher, Rochester, New York, Police Department

mar90_2.law

Store Diversion Burglaries, by Detective Robert P. Meiners, Lincolnwood, Illinois, Police Department

mar90_3.law

Police Practices: Operation Alert, by Captain Mark Willingham, Division of Alcoholic Beverages and Tobacco

mar90_4.law

Police Retirement: The Impact of Change, by John M. Violenti, Ph.D, Department of Social and Preventive Medicine, SUNY New York

mar90_5.law

Managing Police Basic Training Cirriculum, by Rene A. Browett, Northern Virginia Criminal Justice Academy

mar90_6.law

Personal Liability: The Qualified Immunity Defense, by Daniel L. Schofield, S.J.D., FBI

massmodmtax.law

New Massachusetts Modem Tax Proposed (For Real)

md_lawsta.law

The Maryland Computer Crimes Law

medialaw.law

Media Performance and International Law, by Howard H. Frederick, Ph.D.

medicp21.law

Medicaid Fraud, by Larry L. Bailey, Colorado Attorney General's Office, Medicaid Fraud Control Unit, Denver Colorado

mi_lawsta.law

The Michigan Computer Crimes Law

military.txt

Military Support to Civilian Law Enforcement Agencies by R. Barry Cronin

militaryp24.law

Military Support to Civilian Law Enforcement Agencies, by R. Barry Cronin, U.S. Marine Corps Headquarters

minnesot

Minnesota Invokes Computer Law by Rachel Parker

mn_lawsta.law

The Minnesota Computer Crimes Law

mo_lawsta.law

The Missouri Computer Crimes Law, 1982

mobile.law

Police Policies: Mobile Command Posts

morris.app

The Court Case against Robert Tappan Morris, 1990-1991

ms_lawsta.law

Mississippi Computer Crimes Law, 1985

mt_lawsta.law

Montana Computer Law Statute

mulepat.txt

Campus Security: The Mule Patrol, by James A. Huff

murphy.txt

Murhpy's Law, and Similar Ilk

mvt.txt

Motor Vehicle Theft Investigations: Emerging International Trends by Mary Ellen Beekman

mvtleb.law

Motor Vehicle Theft Investigations: Emerging International Trends

nafta.txt

Complete Text of the North American Free Trade Agreement (NAFTA) Act (1993)

natural.law

Natural Laws and Natural Rights by James A. Donald (February 28, 1993)

nc_lawsta.law

North Carolina Computer Crime Law

ncic.law

NCIC Training: Hit or Miss, by Don M. Johnson, FBI

ncic.txt

Focus on NCIC: Identifying the Unidentified

ncic2.txt

NCIC Training: Hit or Miss by Don M. Johnson of the FBI

nd_lawsta.law

The North Dakota Computer Fraud and Crime Statute, 1987

ne_lawsta.law

The Nebraska Computer Crimes Law, 1985

newlaw.txt

Dangerous Copyright Law by Stephen Haynes (October 2, 1990)

nh_lawsta.law

New Hampshire Computer Crimes, 1986

nj_lawsta.law

New Jersey Computer-Related Crimes Law, 1984

nov_1.law

The FBI's 10mm Pistol, by John C. All, FBI

nov_2.law

Ammunition Selection: Research and Measurement Issues, by N. J. Scheers, Ph.D.

nov_3.law

Utilizing Job Task Analysis, by Thomas J. Jurkanin

nov_4.law

The Judicial Sealing Requirement In Electronic Surveillance: A Matter of Immediacy, by Robert J. Fiatal

nsa.txt

Harry S. Truman's Declaration of the Creation of the National Security Agency (NSA)

nv_lawsta.law

Nevada Computer Unfair Trade Practice Law, 1983

ny_lawsta.law

New York Penal Law, Computer Crime, 1986

nyappl.law

New York's APPL Program: A New Partnetship, by Anthony M. Voelker

odomroll.txt

Odometer Rollback Schemes by James E. Scripture of FBI

ofc_lostp02.law

Law Officers Killed: 1980-1989, Victoria L. Major, FBI

oh_lawsta.law

Ohio's Computer Crime Law

olw1.txt

Our Lawyer Writes #1: Rodent Milk

olw3.txt

Our Lawyer Writes #3: Getting a Divorce, Quick and Easy

olw5.txt

Our Lawyer Writes #5: I'm a Mistress, can I Get Anything?

op-clean.leb

Operation Clean: Reclaiming City Neighborhoods by Richard W. Hatler

p_view.law

Point of View: A Manager's Guide to Computer Projects, by Charles Brennan, Philadelphia, Pennsylvania, Police Department

p_view.txt

Point of View: Campus Police by Gigi Ray of the Arlington Campus Police Department

p_viewp14.law

Point of View: Campus Police

pa_lawsta.law

Pennsylvania's computer crimes law, 1983/1986

passport.txt

How to Get a State Passport

patrol.law

Perspective: The Patrol Function, by Patrick V. Murphy, Former Police Commissioner of New York City

penreg.txt

PENREG: A Database Management System Designed to Maintain and Manipulate Data Obtained through a Pen Register or DNR (1989)

plateaup16.law

Plateauing in Law Enforcement, by James M. Childers, Lubbock, Texas, Police Department

pntview.txt

Point of View: A Manager's Guide to Computer Products by Charles Brennan

pol-com.leb

Community Policing is Not Police Community Relations by Robert C. Trojanowicz

pol-prac.leb

Police Practices: Seat Belt Awareness Program

pol_com.txt

Community Policing is not Police Community Relations by Robert C. Trojanowicz

pol_prac.txt

Police Practices: Baited Vehicle Detail

pol_pracp10.law

Police Practices: Alternate Fuel Program

pol_pracp24.law

Police Practices: Baited Vehicle Program

police.evasion

Exilic Xyth's Guide to 1st Level Police Evation (November 10, 1990)

policeevasion.txt

Exilic Xyth's Guide to 1st level Police Evasion (November 10, 1990)

policemen.pig

Calling a Policeman a Pig: A New Concept From The Anarchist Cookbook, by The Norwegian Monk

polprac08.law

Police Practices: Miami's Ethnic Sharing Program

polpracp16.law

Police Practices: Operation Star

pope.txt

U.S. Computer Investigation Targets Austinites by Kyle Pope (March 17, 1990)

poster.txt

Wanted Poster for John Richard, the Scofflaw Sysop

posting-

The Risks of Posting to the Internet

posting_

The Dangers of Posting to the Net (A Visit from the FBI)

practice.law

Police Practices: CHP Hazardous Waste Investigation Unit

practice.txt

Police Practices: The Community Outreach Program

practiceleb.law

Police Practices: Pennsylvania's Interdepartmental Communications System

preface.txt

The Federal Zone: Cracking the Code of Internal Revenue by Mitch Modeleski (January, 1994)

prelimin.txt

The Preliminary Investigation Process by Cheif Gordon F. Urlacher

presumed

Presumed Guilty: The Law's Victims in the War on Drugs, 1991 by Andrew Schneider

primes.txt

Primes, Codes and the National Security Agency by Susan Landau

privacy

Computer Privacy vs. First and Fourth Amendment Rights, by Michael S. Borella, 1991

privatiz.nre

The Privatized NREN, by Mitchell Kapor, Electronic Frontier Foundation, February 14, 1991

privpris.txt

Privitization of Prisons: Fad or Future by Lr. David K. Burright

privsoc.law

The Private and Open Society, by John Gilmore

prodigy.law

Prodigy Stumbles as a Forum.. Again

promoteleb.law

Promotion to Chief: Keys to Success in a Small Department

prosecut.law

Evironmental Crimes Prosecution: A Law Enforcement Partnership, by Vincent A. Matulewich, Environmental Protections Bureau, New Jersey

pub_7277.asc

Freedom From War: The United States Program for General and Complete Disarmament in a Peaceful World

pubprivs.txt

Public Law Enforcement/Private Security: A New Partnership? by Terrence J. Mangan and Michael G. Shanahan

pview.txt

Point of View: European Law Enforcement after 1992 by Jan Blaauw

pviewp18.law

Point of View: Eurpoean Law Enforcement after 1945

quotes.txt

Quotes from Many Historical Figures about Juries

ratpatro.law

The Rat Patrol Rides! By Paul C. Ricks, Deputy Chief of Police, Colorado Springs

ratpatro.txt

The Rat Patrol Rides! By Paul C. Ricks of Colorado Springs P.D.

rebuttal.txt

Inslaw's Analysis and Rebuttal of the BUA Report

res-rev.leb

Research Review: Police Use of Discretion: A Comparison of Community, System, And Officer Expectations

resmeas.txt

Ammunition Selection: Research and Measurement Issues by N.J. Scheers and Stephen R. Band

response.txt

A Case for Mistaken Identity... Who's Privacy was Really Invaded? by Jim Bigeloww

reviewl.law

Book Review, "Liability" by Peter Huber

ri_lawsta.law

Rhode Island Computer Crimes Law, 1979

riggs_co

United States Vs. Riggs: Jacking into the Net with the Illinois District Court

rights.txt

Why Your Rights are Guaranteed and should Not Be Taken Away

ripco-wa.rra

Seizure Warrant for the Ripco BBS

ripco.law

The RipCO BBS Seizure

ripcobbs

Seizure Warrant Documents for the RIPCO BBS

safetyleb.law

Safety Action Team, by Rod Englert, Oregon Sheriff

saucs1.txt

The Shareware Author and User Case Study by Daniel Corbier (1994)

sc_lawsta.law

South Carolina Computer Crime Act

school.law

Preparing for School Crisis, by David Nichols, Ph. D.

school.txt

Preparing for School Crisis, by David Nichols of Jacksonville State University (1991)

schoolcr.law

School Crime Stoppers, by Bob Chance, Tulsa Oklahoma Police

schoolcr.txt

School Crime Stoppers by Bob Chance of the Tulsa Police Department

sd_lawsta.law

South Dakota Computer Crimes Law, 1982

search.txt

Searches of Premises Incident to Arrest, by A. Louis DiPietro

searches.txt

Emergency Searchs of Effects, by John Gales Sauls of the FBI Academy

searchp26.law

Inventory Searches: The Role of Discretion, by Austin A Anderson

sentguid.law

Proposed Amendment #59 to the Sentencing Guidelines for United States Courts

serologyleb.law

Serolgical Evidence in Sexual Assault Investigations, by Robert R.J. Grispino, MA, Serolgy Unit, FBI

simson.sec

An Introduction to Computer Security for Lawyers by Simson Garfinkel (1987)

sniper.txt

Police Sniper Training by John Plaster of the Minnesota National Guard

sniperleb.law

Police Sniper Training, by John Plaster, Instructor, MN Guard Counter Sniper School

softmark.asc

Information and Documents Needed for Software Copyright Application

softmarkdoc.law

Information and Documents Needed for Software Copyright Application

softpat.txt

A Partial List of Software Patents, compiled by Michael Ernst (April 12, 1992)

srrapist.txt

The Criminal Behavior of the Serial Rapist, by Robert R. Hazelwood

stcomplw

A Cross-Reference of US States and Laws Written for Them

steroids.txt

The Abuse of Anabolic Steroids by Charles Swanson, University of Georgia

steroids19.law

Abuse of Anabolic Steroids, by Charles Swanson, Ph. D., U of Georgia

stripesp16.law

Honolulu's Stripes: Training for Sergeants, by Robert D. Prasser, Captain, Honolulu Hawaii Police Department

suc-inte.txt

Successful Interviewing by James R. Ryals, March 1991

sucinte.txt

Successful Interviewing by James R. Ryals

sueirs.txt

Wage Earners Should Consider Possibility of Suing IRS for Tax Refunds Rather Than Filing Exempt W-4 Forms by Bill Conklin

suicide.txt

The High Scool Suicide Crisis Intervention by David Fisher of the Pinnellas Sheriff's Office

summary.txt

The INSLAW affair: September 10, 1992

supreme.law

Selected Supreme Court Cases: 1989-1990 Term: William U. McCormack, FBI

suprule1.txt

The Rules of the U.S. Supreme Court

suprule2.txt

The Rules of the U.S. Supreme Court (Part II)

suprule3.txt

The Rules of the U.S. Supreme Court (Part III)

survive01.law

The Will to Survive, by Stephen R. Band

swiss.txt

Getting a Discretionary Swiss Banking Account

swt.txt

Seizing Wire Transfers, by The Wall Street Journal (September 20, 1993)

sysops

What Files are Legal for Distribution on a BBS?

targetd.law

Washington D.C.'s Operation "On Target" by Eric W. Witzig, Ret., Washington DC Police

taxother.tut

Tax Deductibility of BBS Operations

teamworkp06.law

Teamwork: An Innovative Approach, by Alan Youngs, Captain, Lakewood Colorado Police

tempest.law

Eavesdropping on the Electromagnetic Eminations of Digital Equipment: The Laws of Canada, England, and the United States

thefacts.law

Push Button Felonies: KPFA-FM Radio Broadcast July 26, 1990

theft_of.sof

Theft of Computer Software: A National Security Threat by William J. Cook

tm.tut

Trademarks in Brief (Overview)

tn_lawsta.law

Tennesse Computer Crimes Act

tomorfbi.txt

A Look Ahead: Views of Tomorrow's FBI by Richard Sonnichsen, Gail O. Burton and Thomas Lyons

towingco.txt

Towing Companies: Friends or Foes? By Michael C. Gillo

trash.law

Trash Inspections and the Fourth Amendment, by Thomas W. Kukura, JD

trash.txt

Trash Inspections and the Fourth Amendment, by Thomas V. Kukura of the FBI

travel.rgt

A How-To Information Sheet for Sovereigns: A Challenge to the 6th Amendment's Jurisdiction by Howard J. Freeman (March 23, 1993)

tx_lawsta.law

Texas Computer Crime Law

uic.law

The League for Programming Freedom Statement

uncharte

The Charter of the United Nations (July 7, 1994)

us&scon1.txt

The United States and the States under the Constitution, by C. Stuart Patterson

us&scon2.txt

The United States and the States under the Constitution, by C. Stuart Patterson (Part 2)

us&scon3.txt

The United States and the States under the Constitution, by C. Stuart Patterson (Part 3)

us&scon4.txt

The United States and the States under the Constitution, by C. Stuart Patterson (Part 4)

us&scon5.txt

The United States and the States under the Constitution, by C. Stuart Patterson (Part 5)

us&scon6.txt

The United States and the States under the Constitution, by C. Stuart Patterson (Part 6)

uscon.law

The Constitution of the United States

userintf.cp

Protecting Rights in User Interface Designs by Ben Shneiderman (November 27, 1992)

ut_lawsta.law

The Utah Computer Crimes Act

va_lawsta.law

The Virgina Computer Crimes Act

vic-wit.txt

Victim-Witness Assistance by Joseph R. Luteran, March 1991

visiop08.law

Visiophones: French High Tech Security, by Pierre Marie Bourniquel, Biarritz, France

wa_lawsta.law

Computer Crimes Law in Washington State

waco.txt

The Text of the Search Warrant from Waco, Texas

waiver.txt

A Waiver of Claims pertaining to Adult Sections of Ryan's Bar BBS

way.law

There's Gotta Be a Better Way, by Glen Roberts and Bill Wajk

weaponsp10.law

Vehicular Long Barrel Weapons Mount, by David W. Pisenti, FBI

wi_lawsta.law

Wisconson Computer Crimes Law

wv_law.law

West Virginia Computer Crimes Law

wy_lawsta.law

Wyoming Computer Crimes Law

yardies.txt

The Yardies: England's Emerging Crime Problem, by Roy A.C. Ramm (January, 1988)