1
0
mirror of https://github.com/opsxcq/mirror-textfiles.com.git synced 2025-08-30 14:29:56 +02:00
Files
mirror-textfiles.com/law/.windex.html

569 lines
86 KiB
HTML

<HTML>
<TITLE>T E X T F I L E S</TITLE>
<BODY BGCOLOR="#FFFFFF" TEXT="#000000" LINK="#000000" ALINK="#004400" VLINK="#004400">
<H1>Laws and Law Discussion</H1>
<P>
From the first time a rumor went by that the FCC was going to institute a
"modem tax" (this one shows up about every two years without fault), BBS
users took an interest in the funny little laws that govern the country and
how the jackasses in the funny white building were going to mess up the
fun. To this end, transcripts and discussions about laws have been around
for a long time.
<P>
Because of the somewhat odd subject matter of some of the files, some of
the files you would expect to be located in this section are also located
in the <A HREF="../politics.html">politics</A> section. Some of these files would
probably be better put in the Politics section as well.
<P>
Oh, and this would normally go without saying, but it's probably not a good
idea to depend on these files for actual, your-property-and-well-being
law advice. Sometimes the law has radically changed since the file was
written, or the file falls under that special "The US never submitted a
full approval to all 50 states so actually you can punch a cop" type of
conspiratorial section. See also <A HREF="../conspiracy.html">conspiracy</A>.
<P>
<TABLE WIDTH=100%>
<TD BGCOLOR=#000000><FONT COLOR=#FFFFFF><B>Filename</B><BR></FONT></TD>
<TD BGCOLOR=#002200><FONT COLOR=#FFFFFF><B>Size</B><BR></FONT></TD>
<TD BGCOLOR=#004400><FONT COLOR=#FFFFFF><B>Description of the Textfile</B><BR></TD></TR>
<tab indent=60 id=T><br>
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="1changin01.law">1changin01.law</A> <tab to=T><TD> 12257<BR><TD> Counterintelligence Challenges in a Changing World, by William S. Sessions, Director, FBI
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="1stamend.txt">1stamend.txt</A> <tab to=T><TD> 7883<BR><TD> A Showdown Over Computer Crime, by Brooks Boliek (August 5, 1990)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="1urbanp01.law">1urbanp01.law</A> <tab to=T><TD> 10189<BR><TD> Urban Transportation Security, by Robert W. Dart, Chicago Police
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="250law.law">250law.law</A> <tab to=T><TD> 3164<BR><TD> Section 250.html2 of the Model Penal Code: Violation of Privacy
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="251law.law">251law.law</A> <tab to=T><TD> 4324<BR><TD> Section 251.4 of the Model Penal Code: Obscenity
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="2corrupt05.law">2corrupt05.law</A> <tab to=T><TD> 16903<BR><TD> Corruption: A Continuing Challenge for Law Enforcement, by Otis E. Cooksey, Military Advisor
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="2developp04.law">2developp04.law</A> <tab to=T><TD> 17004<BR><TD> Developing Police Leadership, by Paul Mansen, Sergeant, Rochester Police
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="3fbipri10.law">3fbipri10.law</A> <tab to=T><TD> 15488<BR><TD> Foreign Counterintelligence: An FBI Priority, by James E. Tomlinson, FBI
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="3polpracp09.law">3polpracp09.law</A> <tab to=T><TD> 4273<BR><TD> Police Practices: Telemarketing Crime Prevention, by David I. Rechenmacher, Illinois Police Department
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="4polprac14.law">4polprac14.law</A> <tab to=T><TD> 9088<BR><TD> Police Practices: Ministers Team With Police to Keep the Peace
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="4pusherp10.law">4pusherp10.law</A> <tab to=T><TD> 17880<BR><TD> The Respectable Pusher, by Jeffrey D. Lane, Office of the Secretary of State, Atlanta
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="5badchecp15.law">5badchecp15.law</A> <tab to=T><TD> 15290<BR><TD> Taking the Bounce Out of Bad Checks, by Vinse J. Gilliam, DA's Office, Ventura Country CA
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="5espion17.law">5espion17.law</A> <tab to=T><TD> 10534<BR><TD> Espionage Awareness Programs, by Freddie L. Capps, Jr. Special Agent, FBI
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="6poview20.law">6poview20.law</A> <tab to=T><TD> 7395<BR><TD> Point of View: Managing for Excellent, by David A. King, Chief of Police, Perkasie Police
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="6resforup20.law">6resforup20.law</A> <tab to=T><TD> 6022<BR><TD> Research Forum: McGruff Robot Teaches Kids
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="7crowdcop22.law">7crowdcop22.law</A> <tab to=T><TD> 11710<BR><TD> Effective Crowd Control, by Steven J. Schmidt, Kentucky Police
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="7drugtes22.law">7drugtes22.law</A> <tab to=T><TD> 12058<BR><TD> The Kentucky State Police Drug Testing Policy, by W. Michael Troop, State Police of Kentucky
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="8civilfop26.law">8civilfop26.law</A> <tab to=T><TD> 24042<BR><TD> Civil Forfeiture: Real Property Used in Drug Trafficking
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="8interro28.law">8interro28.law</A> <tab to=T><TD> 21091<BR><TD> Custodial Interrogation: Impact of Minnick V. Mississippi by Kimberly A. Crawford
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="93dec001.txt">93dec001.txt</A> <tab to=T><TD> 11014<BR><TD> Leadership in the Nineties, by Ronnie Garner, M.P.A.
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="93dec002.txt">93dec002.txt</A> <tab to=T><TD> 10340<BR><TD> Employee Empowerment by Shelia Berglund
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="93dec003.txt">93dec003.txt</A> <tab to=T><TD> 5183<BR><TD> Police Practices: Citizen Advisory Committees by Major Dan Flynn, M.P.A.
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="93dec004.txt">93dec004.txt</A> <tab to=T><TD> 12706<BR><TD> Positive Organizational Culture: A Preactical Approach by Randall Aragon, M.A.
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="93dec005.txt">93dec005.txt</A> <tab to=T><TD> 20150<BR><TD> The Family and Medical Leave Act by Jeffrey Higginbotham, J.D.
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="93jun001.txt">93jun001.txt</A> <tab to=T><TD> 20680<BR><TD> Eyesight Standards: Correcting Myths, by Richard N. Holden, Ph.D.
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="93jun002.txt">93jun002.txt</A> <tab to=T><TD> 8259<BR><TD> The Computer: High-Tech Instrument of Crime by Michael G. Noblett
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="93jun003.txt">93jun003.txt</A> <tab to=T><TD> 11852<BR><TD> Elevator Vandalism Squad by Ronald Welsh
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="93jun004.txt">93jun004.txt</A> <tab to=T><TD> 7200<BR><TD> Police Pracices: Drug Educaiton Saving America's Youth, by Damon Davis
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="93jun005.txt">93jun005.txt</A> <tab to=T><TD> 14677<BR><TD> Police Violence: Addressing the Issue, by Daniel B. Boyle
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="93jun006.txt">93jun006.txt</A> <tab to=T><TD> 5655<BR><TD> Focus on Training: The Americans with Disabilities Act, by John A. Leonard
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="93jun007.txt">93jun007.txt</A> <tab to=T><TD> 34650<BR><TD> Computer Searches and Seizures: Challenges for Investigators, by John Gales Sauls
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="9brief.txt">9brief.txt</A> <tab to=T><TD> 2274<BR><TD> A Legal Brief by Special Agent Jeffrey Higginbotham (Probable Cause Determination)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="9briefp32.law">9briefp32.law</A> <tab to=T><TD> 2278<BR><TD> Legal Brief by S.A. Jeffrey Migginbotham, Legal Instructor, FBI
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="abouteff.law">abouteff.law</A> <tab to=T><TD> 9090<BR><TD> General Information about the Electronic Frontier Foundation
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="academy10.law">academy10.law</A> <tab to=T><TD> 12379<BR><TD> Citizen Police Academies by Martin Alan Greenberg, Dept. of Criminal Justice, Ulster Community College
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="afis.law">afis.law</A> <tab to=T><TD> 6899<BR><TD> Police Practices: AFIS Technology for Rural States
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="aicnews.html">aicnews.html</A> <tab to=T><TD> 33391<BR><TD> Arizona Identification Council NEwsletter, July, 1990
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="al_lawsta.law">al_lawsta.law</A> <tab to=T><TD> 7521<BR><TD> The Alabama Computer Crime Act, 1985
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="alcor-1">alcor-1</A> <tab to=T><TD> 2506<BR><TD> ALCOR Files Suit Over Electronic Mail Seizure, by David Bloom, Feb 24, 1990
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="alcor-2">alcor-2</A> <tab to=T><TD> 10036<BR><TD> Transcript of Suit by ALCOR
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="alcor-3">alcor-3</A> <tab to=T><TD> 21192<BR><TD> Additional Filings in ALCOR BBS Case
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="alcor-4">alcor-4</A> <tab to=T><TD> 13439<BR><TD> Response of ALCOR Lawyer to Motion Filed
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="alcor-5">alcor-5</A> <tab to=T><TD> 7727<BR><TD> File Round of Motion Filed in Alcor Court Case
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="alcor-6">alcor-6</A> <tab to=T><TD> 4381<BR><TD> The Resolution of the Alcor E-mail privacy Case
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="alcor-7">alcor-7</A> <tab to=T><TD> 14366<BR><TD> Response of William F. Murphy to ALCOR Suit
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="alcor-8">alcor-8</A> <tab to=T><TD> 37303<BR><TD> Bill Submitted in ALCOR BBS Case
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="alcor-9">alcor-9</A> <tab to=T><TD> 10212<BR><TD> Appeal of dismissal in ALCOR BBS Case
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="anarchy.ripco">anarchy.ripco</A> <tab to=T><TD> 273415<BR><TD> The Modern Speeders Guide to Radar and State Troopers, by Exilic Xyth (January 11, 1988)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="anti-hac.txt">anti-hac.txt</A> <tab to=T><TD> 8315<BR><TD> A Bill Against Hacking, from Emma Nicholson
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="ar_lawsta.law">ar_lawsta.law</A> <tab to=T><TD> 5628<BR><TD> Arkansas Regulations on Computer Crime, 1987
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="arrest.txt">arrest.txt</A> <tab to=T><TD> 10256<BR><TD> Your Rights and What to Do Upon Arrest, by Michael J. Elliott, Criminal Defense Attorney
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="articles.law">articles.law</A> <tab to=T><TD> 146119<BR><TD> Bibliography of Computer Security Articles 1983 through 1988
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="asmp-gui">asmp-gui</A> <tab to=T><TD> 17486<BR><TD> American Society of Magazine Photographers 1991 Copyright Guide
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="az_lawsta.law">az_lawsta.law</A> <tab to=T><TD> 3086<BR><TD> Arizona Computer Crimes Law, 1978
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="babbs001.txt">babbs001.txt</A> <tab to=T><TD> 8498<BR><TD> Anti Federal Agent BBS Protection, by Babbs Boy
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="banking.off">banking.off</A> <tab to=T><TD> 16949<BR><TD> Privacy and Offshore Banking... What the IRS Doesn't Want You to Know! By David Johnson (July 5, 1994)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="bbs-suit.txt">bbs-suit.txt</A> <tab to=T><TD> 12289<BR><TD> Civial Action No. IP-88 93C: Linda Thompson vs. Bob Predaina
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="bbs_and_">bbs_and_</A> <tab to=T><TD> 58600<BR><TD> The Electronic Pamphlet: Computer Bulletin Boards and the Law by Michael H. Riddle (1990)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="bbs_law.law">bbs_law.law</A> <tab to=T><TD> 58671<BR><TD> Computer Bulletin Boards and the Law, by Michael M. Riddle (Law Study)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="bbsdefa.law">bbsdefa.law</A> <tab to=T><TD> 106099<BR><TD> Defamation Liability of Computerized Bulletin Board Operators and Problems of Proof, by John R. Kahn
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="bbslaw.man">bbslaw.man</A> <tab to=T><TD> 40181<BR><TD> Version 1.html - BBS LEGAL GUIDE by Clary and Kraft, 1993
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="bbslaws.txt">bbslaws.txt</A> <tab to=T><TD> 54725<BR><TD> THe Legal Aspects of Telecommunications and Electronic Bulletin Board SYstems, by James J. Spinelli
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="bellraid.txt">bellraid.txt</A> <tab to=T><TD> 12560<BR><TD> The Future of Telecommunications.......
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="bendix.txt">bendix.txt</A> <tab to=T><TD> 20856<BR><TD> Crosley Bendix (Negativland) Discusses The Copyright Act (November 9, 1992)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="blue.law">blue.law</A> <tab to=T><TD> 27975<BR><TD> Death of the Blue Box, by Full Disclosure, 1991
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="brave.yes">brave.yes</A> <tab to=T><TD> 4352<BR><TD> Smart Brave Lady indicates that we are not Drivers, and therefore do not need a license.
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="caddraft.law">caddraft.law</A> <tab to=T><TD> 7144<BR><TD> Police Practices: Computer Aided Drafting for Law Enforcement
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="candp.law">candp.law</A> <tab to=T><TD> 64505<BR><TD> Crime and Puzzlement by John Perry Barlow
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="candp2.law">candp2.law</A> <tab to=T><TD> 8090<BR><TD> Update on Crime and Puzzlement by John Perry Barlow, 1990
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="cardozo.txt">cardozo.txt</A> <tab to=T><TD> 21349<BR><TD> Some "Property" Problems in a Computer Crime Prosecution by Mike Godwin of the EFF
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="cellmate.law">cellmate.law</A> <tab to=T><TD> 29382<BR><TD> Cellmate Informants: A Constitutional Guide to Their Use, by Kimberly Kingston Crawford, FBI Academy
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="cellmate.txt">cellmate.txt</A> <tab to=T><TD> 29316<BR><TD> Cellmate Informants: A Constitutional Guide to Their Use, by Kimberly Kingston Crawford
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="chomloot.txt">chomloot.txt</A> <tab to=T><TD> 43325<BR><TD> Noam Chomsky writes a letter to Lies Of Our Times, May 1991
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="ciabwash.law">ciabwash.law</A> <tab to=T><TD> 48132<BR><TD> CIA Memorandums on Brainwashing
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="citizen1.txt">citizen1.txt</A> <tab to=T><TD> 94984<BR><TD> Studies in Constitutional Law: A Treatist on American Citizenship by John S. Wise
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="citizen2.txt">citizen2.txt</A> <tab to=T><TD> 31969<BR><TD> Chapter 2: How American Citizenship May be Acquired in the Nation
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="citizen3.txt">citizen3.txt</A> <tab to=T><TD> 43595<BR><TD> Chapter 3: Of the Obligation and Duties of the Citizen to the Nation and the States
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="citizen4.txt">citizen4.txt</A> <tab to=T><TD> 202375<BR><TD> Chapter 4: Of the Rights, Privileges, and Immunities of the Citizen
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="citizen5.txt">citizen5.txt</A> <tab to=T><TD> 122539<BR><TD> Chapter 5: Privileges and Immunities Under the War Amendments
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="citizens.gui">citizens.gui</A> <tab to=T><TD> 94355<BR><TD> A Citizen's Guide on using the Freedom of Information Act and the Privacy Act of 1974 to Request Government Records (July 10, 1991)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="civil.dis">civil.dis</A> <tab to=T><TD> 63050<BR><TD> Civil Disobedience, by Henry David Thoreau
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="civlib.law">civlib.law</A> <tab to=T><TD> 24676<BR><TD> Civil Liberties in Cyberspace: When does Hacking Turn from an Exercise of Civil Liberties into Crime? By Mitch Kapor, Scientific American, 1991
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="civlrght.txt">civlrght.txt</A> <tab to=T><TD> 15090<BR><TD> Civil Rights Cases and Police Misconduct, by John Epke
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="civlrght14.law">civlrght14.law</A> <tab to=T><TD> 15156<BR><TD> Civil Rights and Police Misconduct, by John Epke and Linda Davis
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="clipper1.asc">clipper1.asc</A> <tab to=T><TD> 13335<BR><TD> Remarks by Bruce Sterling at the Fourth Annual Conference on Computers, Freedom, and Privacy
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="closenet.law">closenet.law</A> <tab to=T><TD> 31990<BR><TD> Closing the Net, by Greg Costikyan (On Operation Sun-Devil)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="co_lawsta.law">co_lawsta.law</A> <tab to=T><TD> 3697<BR><TD> Colorado Crimes Law,
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="cog_inte.law">cog_inte.law</A> <tab to=T><TD> 18187<BR><TD> Cognitive Interviewing, by Margo Bennett, FBI
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="compacs.txt">compacs.txt</A> <tab to=T><TD> 62976<BR><TD> The Limits of the Law in Restricting Computer Misuse, by Peter Sommer (March 19, 1991)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="compcrim.txt">compcrim.txt</A> <tab to=T><TD> 13559<BR><TD> Computer Crimes: An Escalating Crime Trend by William S. Sessions
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="compriv.law">compriv.law</A> <tab to=T><TD> 46706<BR><TD> Computer Privacy vs. First and Fourth Amendment Rights, by Michael S. Borella
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="compsent">compsent</A> <tab to=T><TD> 13603<BR><TD> Revised Computer Crime Sentencing Guidelines, from Jack King (1992)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="compuser">compuser</A> <tab to=T><TD> 9768<BR><TD> What is a Compilation Copyright? The Gospel According to Compuserve (December 3, 1987)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="compuser.law">compuser.law</A> <tab to=T><TD> 9839<BR><TD> Compuserve's Position: What is a Compilation Copyright?
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="computer.cri">computer.cri</A> <tab to=T><TD> 101985<BR><TD> Computer Crime: Current Practices, Problems and Proposed Solutions, Second Draft, Brian J. Peretti
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="confess.law">confess.law</A> <tab to=T><TD> 15893<BR><TD> Why Suspects Confess, by David D. Tousignant, Inspector, Lowell Massachusetts
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="confess.txt">confess.txt</A> <tab to=T><TD> 15834<BR><TD> Why Suspects Confess, by David D. Tousignant
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="consoli.law">consoli.law</A> <tab to=T><TD> 17512<BR><TD> Public Services Consolidation: The Answer to your Community's Needs, by Robert L. Sobba, Chief of Police, Idaho Police
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="const_in.cyb">const_in.cyb</A> <tab to=T><TD> 47714<BR><TD> Laurence H. Tribe, "The Constitution in Cyberspace"
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="copr.txt">copr.txt</A> <tab to=T><TD> 35200<BR><TD> How to Copyright Software, by Locus, Inc. (1990)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="cops">cops</A> <tab to=T><TD> 19373<BR><TD> If YOu Have to Ask, Get Out of the Way, by Chuck Milland
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="cops.txt">cops.txt</A> <tab to=T><TD> 22258<BR><TD> Why Cops Hate You: If You Have to Ask, Get Out of the Way
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="copstamp.txt">copstamp.txt</A> <tab to=T><TD> 5209<BR><TD> Police Tampering: How Often and Where, by Alan Deshowitz
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="coptalk.txt">coptalk.txt</A> <tab to=T><TD> 3509<BR><TD> Don't Talk to Cops, by Robert W. Zeuner, Member of the New York State Bar
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="copy.txt">copy.txt</A> <tab to=T><TD> 10702<BR><TD> Software and Copyrights: Registration, Notice and Why by Charles B. Kramer (January 8, 1992)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="copyr">copyr</A> <tab to=T><TD> 29718<BR><TD> Copyright Information, by Inez Harrison
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="copyrigh.txt">copyrigh.txt</A> <tab to=T><TD> 3949<BR><TD> Legal Brief: Software Copyright Law (December 1985)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="copyrit1.law">copyrit1.law</A> <tab to=T><TD> 6569<BR><TD> Copyrights and Computer Software: An Introduction, by Sam Kitterman, Jr.
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="copyrit2.law">copyrit2.law</A> <tab to=T><TD> 7671<BR><TD> Copyrights and Computer Software: Part II, by Sam Kitterman, Jr.
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="copyrit3.law">copyrit3.law</A> <tab to=T><TD> 10500<BR><TD> Copyrights and Computer Software: Part III, by Sam Kitterman, Jr.
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="copyrit4.law">copyrit4.law</A> <tab to=T><TD> 7459<BR><TD> Copyrights and Computer Software: Part IV, by Sam Kitterman, Jr.
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="copyrit5.law">copyrit5.law</A> <tab to=T><TD> 8454<BR><TD> Copyrights and Computer Software: Part V, by Sam Kitterman, Jr.
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="copyrite.c64">copyrite.c64</A> <tab to=T><TD> 11596<BR><TD> Commodore's Extremely Silly Liscence for Workbench 1.3.2
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="copyrite.doc">copyrite.doc</A> <tab to=T><TD> 4352<BR><TD> Copyright Information for Computer Software Hacks from June B. Moore
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="copyrite.inf">copyrite.inf</A> <tab to=T><TD> 5888<BR><TD> Answering Some Questions about the Ditribution of Public Domain Software by Ron Fowler (April 12, 1984)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="copyrite.law">copyrite.law</A> <tab to=T><TD> 47252<BR><TD> Large Overview of American Copyright Law
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="copyrite.txt">copyrite.txt</A> <tab to=T><TD> 23296<BR><TD> Copyright Law from Jordan J. Breslow (February 13, 1986)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="copyrt.txt">copyrt.txt</A> <tab to=T><TD> 35833<BR><TD> Copyright law and Liscence Law as Applies to Computer Software
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="copyso.txt">copyso.txt</A> <tab to=T><TD> 7534<BR><TD> Software and Copyrights: Registeration, Notice and Why by Charles B. Kramer, Esq. (September 25, 1991)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="correct.txt">correct.txt</A> <tab to=T><TD> 11036<BR><TD> The Principle of Correct Absue
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="couriers.txt">couriers.txt</A> <tab to=T><TD> 25253<BR><TD> Detaining Suspected Drug Couriers: Recent Court Decisions
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="couriersp27.law">couriersp27.law</A> <tab to=T><TD> 25319<BR><TD> Detaining Suspected Drug Couriers: Recent Court Decisions, by William U. McCormack, Special Agent, FBI Academy
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="court.law">court.law</A> <tab to=T><TD> 43260<BR><TD> The Transcript of Craig Neidorf's Trial
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="court.txt">court.txt</A> <tab to=T><TD> 7683<BR><TD> Disorder in the Court! (Funny Court Transcripts)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="cright3.txt">cright3.txt</A> <tab to=T><TD> 12068<BR><TD> Copyrighting Public Domain Programs by June B. Moore, JD
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="crime.txt">crime.txt</A> <tab to=T><TD> 26658<BR><TD> The Grolier Electronic Encyclopedia Definition of Crime
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="crimecatalog.cmp">crimecatalog.cmp</A> <tab to=T><TD> 463516<BR><TD> The Crimefighters' Catalog of Special Purpose Books and Videos
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="crimefighter.cmp">crimefighter.cmp</A> <tab to=T><TD> 714942<BR><TD> The Crimefighters Compilation
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="crimeftr.000">crimeftr.000</A> <tab to=T><TD> 7079<BR><TD> Table of Contents and Quick Tutorial
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="crimeftr.002">crimeftr.002</A> <tab to=T><TD> 17723<BR><TD> Why Police Can't Cope, and The Need for CrimeFighters
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="crimeftr.003">crimeftr.003</A> <tab to=T><TD> 15130<BR><TD> Crime Stoppers and We-Tip's Formula for Rewards
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="crimeftr.004">crimeftr.004</A> <tab to=T><TD> 8493<BR><TD> Catch-all Reward Law: $25,000 - All Felonies, All States
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="crimeftr.005">crimeftr.005</A> <tab to=T><TD> 20017<BR><TD> Fines & Forfeiture Laws: 50% Paid to CrimeFighters!
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="crimeftr.006">crimeftr.006</A> <tab to=T><TD> 40146<BR><TD> Misdemeanors and Do-It-Yourself Lawsuits
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="crimeftr.007">crimeftr.007</A> <tab to=T><TD> 22381<BR><TD> Qui Tam Law: Be the Prosecutor - Control Plea Bargaining
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="crimeftr.008">crimeftr.008</A> <tab to=T><TD> 24285<BR><TD> Civil & Criminal RICO Laws
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="crimeftr.009">crimeftr.009</A> <tab to=T><TD> 30886<BR><TD> Drunk Driver Terminators (D.D.T.) Patrols - to Get Started
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="crimeftr.010">crimeftr.010</A> <tab to=T><TD> 29385<BR><TD> Drug Laws & Drug Wars - Unlimited Business Opportunities
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="crimeftr.011">crimeftr.011</A> <tab to=T><TD> 46642<BR><TD> Polluter Tooters: Anti-Pollution laws, MEGABUCK Rewards
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="crimeftr.012">crimeftr.012</A> <tab to=T><TD> 17812<BR><TD> Terrorists, Assassins, and Police Corruption
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="crimeftr.013">crimeftr.013</A> <tab to=T><TD> 23155<BR><TD> Bounty Hunters, Bail Bond Agents and Skip Tracers
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="crimeftr.014">crimeftr.014</A> <tab to=T><TD> 29522<BR><TD> U.S. Customs/Coast Guard Laws, Mechanics' Laws
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="crimeftr.015">crimeftr.015</A> <tab to=T><TD> 23075<BR><TD> Post Office Rewards, Scams, Cons, Frauds
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="crimeftr.016">crimeftr.016</A> <tab to=T><TD> 34324<BR><TD> Wildlife Protection/Poaching, Conservationists Laws
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="crimeftr.017">crimeftr.017</A> <tab to=T><TD> 28625<BR><TD> National Forests (Vandalism, Pot Growing, other laws)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="crimeftr.018">crimeftr.018</A> <tab to=T><TD> 33379<BR><TD> Wiretap and Blackmail Laws & Rewards for CrimeFighters
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="crimeftr.019">crimeftr.019</A> <tab to=T><TD> 22056<BR><TD> Misc Rewards for This and That (Dozens of them)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="crimeftr.020">crimeftr.020</A> <tab to=T><TD> 9940<BR><TD> State Reward Laws
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="crimeftr.021">crimeftr.021</A> <tab to=T><TD> 15252<BR><TD> Crime Information, Your Right to Withhold for Rewards
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="crimeftr.022">crimeftr.022</A> <tab to=T><TD> 45203<BR><TD> Citizen Arrests - What you Need to Know
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="crimeftr.023">crimeftr.023</A> <tab to=T><TD> 19144<BR><TD> High Speed Pursuits - Unlike Smokey and the Bandit!
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="crimeftr.024">crimeftr.024</A> <tab to=T><TD> 19490<BR><TD> Rules of Evidence - Entrapment Explained
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="crimeftr.025">crimeftr.025</A> <tab to=T><TD> 17904<BR><TD> Where to Get CrimeFighter Training
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="crimeftr.026">crimeftr.026</A> <tab to=T><TD> 23422<BR><TD> High Tech Tools of the Trade - Where to Get Them
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="crimeftr.027">crimeftr.027</A> <tab to=T><TD> 25320<BR><TD> Problems with Prosecutors and Plea Bargaining
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="crimeftr.028">crimeftr.028</A> <tab to=T><TD> 18991<BR><TD> How to Calculate Rewards, Proposed CrimeFighters Reward Law
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="crimeftr.029">crimeftr.029</A> <tab to=T><TD> 16496<BR><TD> CrimeFighters International, Inc. Membership info.
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="crimeftr.030">crimeftr.030</A> <tab to=T><TD> 4828<BR><TD> Membership Application
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="criminal.law">criminal.law</A> <tab to=T><TD> 17091<BR><TD> Criminal Informants: An Administrator's Dream or Nightmare? By Harry A. Mount, Jr.
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="criminal.txt">criminal.txt</A> <tab to=T><TD> 17025<BR><TD> Criminal Informants: An Administrator's Dream or Nightmare? By Harry A. Mount, Jr.
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="cripple.txt">cripple.txt</A> <tab to=T><TD> 2387<BR><TD> The Experience of a Shareware Author by Frank Bell of NEWKEY
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="cryptlaw">cryptlaw</A> <tab to=T><TD> 12456<BR><TD> Crypto-Law Survey by Bert-Jaap Koops (July, 1995)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="csa87.law">csa87.law</A> <tab to=T><TD> 27719<BR><TD> National Act on Computer Crime, Act 100-235
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="csbylaws.law">csbylaws.law</A> <tab to=T><TD> 27217<BR><TD> By-Laws of the Communications Security Association, Inc.
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="cslaw.law">cslaw.law</A> <tab to=T><TD> 14407<BR><TD> Computer Security And the Law, by Gary S. Morris
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="ct_lawsta.law">ct_lawsta.law</A> <tab to=T><TD> 10096<BR><TD> Computer-Related Offenses from the Connecticut General Statutes
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="cyberlaw.law">cyberlaw.law</A> <tab to=T><TD> 21266<BR><TD> Cyberspace and the Legal Matrix: Laws or Confusion?
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="cyblaw.txt">cyblaw.txt</A> <tab to=T><TD> 22150<BR><TD> Cyberspace and the Legal Matrix: Laws or Confusion?
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="cybspace.txt">cybspace.txt</A> <tab to=T><TD> 21027<BR><TD> Cyberspace and the Legal Matrix: Laws or Confusion?
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="cycrime0.txt">cycrime0.txt</A> <tab to=T><TD> 28434<BR><TD> Emmanuel Goldstein on the E911 Affair
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="dblaw.txt">dblaw.txt</A> <tab to=T><TD> 33393<BR><TD> Legal Protection of Computer Databases, by Ralph C. Losey
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="define.stb">define.stb</A> <tab to=T><TD> 8490<BR><TD> Definitions of Legal Terms
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="deflib.bbs">deflib.bbs</A> <tab to=T><TD> 103794<BR><TD> Defamation Liability of Computerized BBS Operators and Problems of Proof by John R. Kahn
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="delibera.leb">delibera.leb</A> <tab to=T><TD> 23079<BR><TD> Deliverate Indifference: The Standard for Municipal and Supervisory Liability by Michael Callahan
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="denning">denning</A> <tab to=T><TD> 58773<BR><TD> Concerning Hackers Who Break into Computer Systems, by Dorothy Denning, October 1st, 1990
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="dennis_h">dennis_h</A> <tab to=T><TD> 76080<BR><TD> The Price of Copyright Violation from Dennis Jayes
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="dial911.die">dial911.die</A> <tab to=T><TD> 26086<BR><TD> Dial 911 and Die by Aaron Zelman and Jay Simkin (December 15, 1992)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="dir_mesgp01.law">dir_mesgp01.law</A> <tab to=T><TD> 3432<BR><TD> Director's Message, May 1991, by William S. Sessions, FBI
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="disabil25.law">disabil25.law</A> <tab to=T><TD> 34116<BR><TD> The Americans With Disabilities Act, by Jeffrey Higginbotham, FBI
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="disaster.law">disaster.law</A> <tab to=T><TD> 17512<BR><TD> Disaster Operations: Not Business as Usual, by Michael Guerin, Governor's Office, Ontario, California
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="disclaim.txt">disclaim.txt</A> <tab to=T><TD> 4911<BR><TD> An Example Set of Disclaimers, Rules and Regulations
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="disk-fee.txt">disk-fee.txt</A> <tab to=T><TD> 9087<BR><TD> The Great "Disk Fee" Fallacy for Public Software Distribution
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="dispatch.law">dispatch.law</A> <tab to=T><TD> 5902<BR><TD> Point of View: Dispatching Units: Improvements for the First List, by Bob Blankenship, Chief, Redding, California Police
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="dmessage.law">dmessage.law</A> <tab to=T><TD> 3883<BR><TD> Director's Message, April 1991, by William S. Sessions, FBI
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="dmessage.leb">dmessage.leb</A> <tab to=T><TD> 3505<BR><TD> Director's Message: Police and Citizens Working Together by William Sessions
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="doggie.txt">doggie.txt</A> <tab to=T><TD> 25984<BR><TD> The Great American Dog Trial Vendetta by P. Remington Adams (1991)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="domestiv.law">domestiv.law</A> <tab to=T><TD> 24459<BR><TD> Domestic Violence: When do Police Have a Constitutional Duty to Protect? by Daniel L. Schofield, FBI
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="downtime.bul">downtime.bul</A> <tab to=T><TD> 806<BR><TD> Example of a Policy Regarding BBS Downtime
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="drivers.law">drivers.law</A> <tab to=T><TD> 3462<BR><TD> Research Forum Survey Results: Driver License Suspension programs
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="driving.bar">driving.bar</A> <tab to=T><TD> 49544<BR><TD> The (Almost) Definitive Answer to Driving Barefoot in America (1994)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="drugdiv.txt">drugdiv.txt</A> <tab to=T><TD> 13651<BR><TD> Pharmaceutical Diversion and Abuse: Our Nation's Other Drug Problem, by Thomas C. Babicke
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="drugdivp01.law">drugdivp01.law</A> <tab to=T><TD> 13717<BR><TD> Pharmaceutical Diversion and Abuse: Our Nation's Other Drug Problem, by Thomas C. Babicke, DEA, Virginia
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="drugtest.txt">drugtest.txt</A> <tab to=T><TD> 13065<BR><TD> Drug Abuse and Testing in Law Enforcement: No Easy Answers, by Andrew J. Harvey
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="drugtestp12.law">drugtestp12.law</A> <tab to=T><TD> 13131<BR><TD> Drug Abuse and Testing in Law Enforcement: No Easy Answers by Andrew J. Harvey, Sergeant, California Police
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="dunnel.txt">dunnel.txt</A> <tab to=T><TD> 3708<BR><TD> The Dunne Act Introduced in NY for Computer BBSes (May 15, 1989)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="e-law.txt">e-law.txt</A> <tab to=T><TD> 203190<BR><TD> E-Law: legal Issues Affecting Computer Information Systems and System operator Liability, by David J. Loundy
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="ecpa.lay">ecpa.lay</A> <tab to=T><TD> 10286<BR><TD> The Electronics Communications Privacy Act of 1986, a Layman's View by Michael H. Riddle
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="ecpa1law.law">ecpa1law.law</A> <tab to=T><TD> 40796<BR><TD> Electronic Communication Privacy Act: Chapter 119
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="ecpa2law.law">ecpa2law.law</A> <tab to=T><TD> 34493<BR><TD> Electronic Communication Privacy Act: Part II
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="ecpa3law.law">ecpa3law.law</A> <tab to=T><TD> 33464<BR><TD> Electronic Communication Privacy Act: Part III
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="ecpalay.law">ecpalay.law</A> <tab to=T><TD> 10524<BR><TD> The Electronic Communications Privacy Act of 1986: A Layman's View, by Michael M. Riddle
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="edwards.law">edwards.law</A> <tab to=T><TD> 25695<BR><TD> Edwards vs. State Farm Insurance
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="edwards_">edwards_</A> <tab to=T><TD> 11517<BR><TD> The Processes by which the Secret Service Investigates Computer Crimes
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="eff-righ.txt">eff-righ.txt</A> <tab to=T><TD> 31722<BR><TD> Legal Overview: The Electronic Frontier and the Bill of Rights (July 10, 1990)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="eff.law">eff.law</A> <tab to=T><TD> 69535<BR><TD> The Founder of the Electronic Frontier Foundation get back to you about Their Plans
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="eff.txt">eff.txt</A> <tab to=T><TD> 42240<BR><TD> The Foundation of the Electronic Frontier Foundation (July 10, 1990)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="effbor.law">effbor.law</A> <tab to=T><TD> 13014<BR><TD> Legal Overview: The Electronic Frontier and the Bill of Rights
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="effss.law">effss.law</A> <tab to=T><TD> 35098<BR><TD> Civil Liberties Implications of Computer Search and Seizures: Some Proposed Guidelines for Magistrates Who Issue Search Warrants
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="elbarasn.html07">elbarasn.html07</A> <tab to=T><TD> 14592<BR><TD> Electronic Bar Association Announced by Paul Bernstein
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="elec_bbs.law">elec_bbs.law</A> <tab to=T><TD> 12761<BR><TD> Electronic Bulletin Boards: A New Resource for Law Enforcement by Seth Jacobs, SEARCH Group
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="electrif.law">electrif.law</A> <tab to=T><TD> 56463<BR><TD> Electrifying Speech: New Communications Technologies and Traditional Civil Liberties
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="email">email</A> <tab to=T><TD> 21657<BR><TD> Some Policies on Electronic Mail: A Summary by Todd Hooper
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="email_pr">email_pr</A> <tab to=T><TD> 19636<BR><TD> Computer Electronic Mail and Privacy: The Law, by Ruel T. Hernandez, January 11, 1987
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="emailpri.law">emailpri.law</A> <tab to=T><TD> 14786<BR><TD> Overview of the Employee Privacy Laws as Currently Apply
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="emailprv.law">emailprv.law</A> <tab to=T><TD> 5801<BR><TD> Bibliography on Law and Computers
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="embezzle.law">embezzle.law</A> <tab to=T><TD> 12290<BR><TD> Bank Employee Embezzlement by Denise M. Dube, LA DA
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="employleb.law">employleb.law</A> <tab to=T><TD> 20142<BR><TD> Employee Development Programs, by John L. Pape, Chief of Police
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="entrapmtdoc.law">entrapmtdoc.law</A> <tab to=T><TD> 10624<BR><TD> The Defense of Entrapment as it Applies to Bulletin Board System Operators, by Randy B. Singer, Esq.
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="envhook.txt">envhook.txt</A> <tab to=T><TD> 59071<BR><TD> The Environmental Movement and the Value of "Moderation" by Brian K. Yoder (1992)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="ep_forum.law">ep_forum.law</A> <tab to=T><TD> 10665<BR><TD> The Environmental Protection Forum, by Michael A. O'Brien, Start Attorney Office, Florida.
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="ethics.law">ethics.law</A> <tab to=T><TD> 13373<BR><TD> Point of View: Rededicating Ourselves to Leadership and Ethics in Law Enforcement, by Vane. R. King, Flint Michigan Police Department
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="ethics.txt">ethics.txt</A> <tab to=T><TD> 8140<BR><TD> Ethics for BBS Users
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="fbi">fbi</A> <tab to=T><TD> 27677<BR><TD> Excerpts from the FBI & Your BBS (From Ripco)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="fbi-miss.txt">fbi-miss.txt</A> <tab to=T><TD> 2678<BR><TD> The FBI Mission Statement
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="fbi_mail.txt">fbi_mail.txt</A> <tab to=T><TD> 3652<BR><TD> Appeal Filed in Todd Patterson v FBI Case (July 26, 1989)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="fbiaug01.law">fbiaug01.law</A> <tab to=T><TD> 19065<BR><TD> Accreditation: A Small Department's Experience by Raymond E. Arthurs, Chief, Willowbrook Police
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="fbiaug02.law">fbiaug02.law</A> <tab to=T><TD> 16027<BR><TD> Odometer Rollback Schemes, by James E. Scripture, Special Agent, FBI, Boston Massachusetts
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="fbiaug03.law">fbiaug03.law</A> <tab to=T><TD> 4768<BR><TD> Police Practices: Custom's BET Program
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="fbiaug04.law">fbiaug04.law</A> <tab to=T><TD> 14228<BR><TD> The Tactical Incident: A Total Police Response by Nicholas F. Kaiser, MA, Troy Police
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="fbiaug05.law">fbiaug05.law</A> <tab to=T><TD> 9910<BR><TD> A New Approach to FTO Training by Blair Rankin, North Carolina Police
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="fbiaug06.law">fbiaug06.law</A> <tab to=T><TD> 8248<BR><TD> Focus on NCIC: Identifying the Unidentified
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="fbiaug07.law">fbiaug07.law</A> <tab to=T><TD> 26013<BR><TD> The Federal Grand Jry: Exceptions to the Rule of Secrecy (Part I)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="fbijul01.law">fbijul01.law</A> <tab to=T><TD> 14832<BR><TD> Lateral Entry: A Move Toward the Future, by J. Eddie Nix, Leut. Cobb County, Georgia Police
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="fbijul02.law">fbijul02.law</A> <tab to=T><TD> 23307<BR><TD> Confronting the Terrorist Hostage Taker, by G. Dwayne Fuselier, FBI
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="fbijul03.law">fbijul03.law</A> <tab to=T><TD> 5432<BR><TD> Police Practices: Bomb Dog Teams
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="fbijul04.law">fbijul04.law</A> <tab to=T><TD> 12651<BR><TD> Campus Security: The Mule Patrol, by James A Huff, Central Missouri State University Campus Police
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="fbijul05.law">fbijul05.law</A> <tab to=T><TD> 15216<BR><TD> The Forensic Anthropologist, by Robert W. Mann, MA, Smithsonian Institution
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="fbijul06.law">fbijul06.law</A> <tab to=T><TD> 3305<BR><TD> Focus on Crime Prevention: Business and Government Working Together
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="fbijul07.law">fbijul07.law</A> <tab to=T><TD> 23458<BR><TD> Anticipatory Search Warrants, by A. Louis DiPietro, FBI
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="fbijun01.law">fbijun01.law</A> <tab to=T><TD> 13907<BR><TD> The Yardies: England's Emerging Crime Problem, by Roy A. C. Ramm, Detective Chief Superintendent, London England
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="fbijun02.law">fbijun02.law</A> <tab to=T><TD> 3243<BR><TD> Focus on Forensics: Latent Shoeprint Analysis
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="fbijun03.law">fbijun03.law</A> <tab to=T><TD> 9597<BR><TD> Towing Companies: Friends or Foes? By Michael C. Gillo, Attorney's Office, Ft. Lauderdale, Florida
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="fbijun04.law">fbijun04.law</A> <tab to=T><TD> 4594<BR><TD> Police Practices: The Nelson-Denny Experiment
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="fbijun05.law">fbijun05.law</A> <tab to=T><TD> 15473<BR><TD> Facility Planning In Colorado: Form Vs. Function by James D. Munger, Colorado Springs
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="fbijun06.law">fbijun06.law</A> <tab to=T><TD> 7208<BR><TD> Records Management in the 1990s by Daniel L. Arkenau
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="fbijun07.law">fbijun07.law</A> <tab to=T><TD> 9548<BR><TD> Research Forum: FBINA Graduate Survey
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="fbijun08.law">fbijun08.law</A> <tab to=T><TD> 7980<BR><TD> B.L.O.C.: Business Leaders Against Organized Crime, by Mike King, Administrative Assistant, Weber County, UT Attorney's Office
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="fbijun09.law">fbijun09.law</A> <tab to=T><TD> 24198<BR><TD> DNA Testing and the Frye Standard, by Robert A. Fiatal, FBI
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="fbitop10.hum">fbitop10.hum</A> <tab to=T><TD> 3926<BR><TD> FBI Top Ten Countdown, January, 1986
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="feb01.law">feb01.law</A> <tab to=T><TD> 15673<BR><TD> Privitization of Prisons: Fad or Future, by Lt. David K. Burright, Linn County Sheriff's Office, Albany, OR
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="feb02.law">feb02.law</A> <tab to=T><TD> 9169<BR><TD> The Administrative Warning Ticket Program by Lt. Andrew J. Barto, Romeoville, IL
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="feb03.law">feb03.law</A> <tab to=T><TD> 3524<BR><TD> Arson Investigations by William A. Tobin, FBI Laboratory
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="feb04.law">feb04.law</A> <tab to=T><TD> 21880<BR><TD> The Criminal Behavior of the Serial Rapist, by Robert R. Hazelwood, MS, Behavioral Science Instruction/Research Unit
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="feb05.law">feb05.law</A> <tab to=T><TD> 5964<BR><TD> Large Vehicle Stops
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="feb06.law">feb06.law</A> <tab to=T><TD> 10325<BR><TD> Critical Incident Stress Debriefing
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="feb07.law">feb07.law</A> <tab to=T><TD> 31199<BR><TD> Foriegn Searches and the Fourth Amendment, by Austin A Andersen, LL.B>, FBI
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="feb08.law">feb08.law</A> <tab to=T><TD> 5297<BR><TD> Florida's Computer Crime
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="fed_lawsta.law">fed_lawsta.law</A> <tab to=T><TD> 8535<BR><TD> Federal Computer Crimes Law, 1984/1986
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="fedbbs3.lst">fedbbs3.lst</A> <tab to=T><TD> 6478<BR><TD> Federal Public Access Bulletin Boards, March 1989
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="fedcompseize.txt">fedcompseize.txt</A> <tab to=T><TD> 315003<BR><TD> The Federal Computer Seizure Guidelines (1994)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="federal.leb">federal.leb</A> <tab to=T><TD> 24029<BR><TD> The Federal Grand Jury: Exceptions to the Rule of Secrecy (Part II) by Austin A. Anderson
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="fencesp06.law">fencesp06.law</A> <tab to=T><TD> 15145<BR><TD> ROP-ing In Fences, by James Rainum, Officer, Repeat Offender Project, Washington DC
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="fija.txt">fija.txt</A> <tab to=T><TD> 9501<BR><TD> A New Hope for Freedom: Fully Inform Jurors by Don Diog
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="fija02.txt">fija02.txt</A> <tab to=T><TD> 6668<BR><TD> If You're Called for Jury Duty, by Don Doig
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="files.tut">files.tut</A> <tab to=T><TD> 2360<BR><TD> File Transfer Liability
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="finalmo.txt">finalmo.txt</A> <tab to=T><TD> 24624<BR><TD> An Attempt to Modify Phone Rules for BBS Lines by Missouri, 1992
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="fl_lawsta.law">fl_lawsta.law</A> <tab to=T><TD> 8475<BR><TD> Florida Computer Crimes Act, 1978
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="foia-pa.txt">foia-pa.txt</A> <tab to=T><TD> 162806<BR><TD> A Citizen's Guide on Using the Freedom of Information Act and the Privacy Act of 1974 to Request Government Records (September 20, 1991)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="foia.txt">foia.txt</A> <tab to=T><TD> 30272<BR><TD> Using the Freedom of Information Act
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="foiacit.txt">foiacit.txt</A> <tab to=T><TD> 92726<BR><TD> A Citizen's Guide to using the Using the Freedom of Information Act and the Privacy Act of 1974 to Request Government Records (July 10, 1991)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="forbes.txt">forbes.txt</A> <tab to=T><TD> 5241<BR><TD> A Little Perspective, Please, by Mitchell Kapor of the EFF (June 21, 1993)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="forenp11.law">forenp11.law</A> <tab to=T><TD> 12226<BR><TD> The FBI's Forensic DNA Analysis Program, by Jay V. Miller, FBI
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="funny.txt">funny.txt</A> <tab to=T><TD> 17655<BR><TD> Very Large Rant and Sales Pitch about Paper Money Being Evil
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="ga_lawsta.law">ga_lawsta.law</A> <tab to=T><TD> 7868<BR><TD> The Georgia Computer Crimes Law
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="grandjur.txt">grandjur.txt</A> <tab to=T><TD> 25954<BR><TD> The Federal Grand Jury: Exceptions to the Rule of Secrecy by Austin A Andersen
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="gunshot.txt">gunshot.txt</A> <tab to=T><TD> 11888<BR><TD> Gunshot Primer Residue: The Invisible Clue by Roger W. Aaron
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="gunshotp19.law">gunshotp19.law</A> <tab to=T><TD> 11954<BR><TD> Gunshot Primer Residue: The Invisible Clue, by Roger W. Aaron, FBI Laboratory
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="gvtscrcy.txt">gvtscrcy.txt</A> <tab to=T><TD> 3328<BR><TD> The Government's Mania for Secrecy, 1987
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hackers0.law">hackers0.law</A> <tab to=T><TD> 464<BR><TD> Introduction to the San Luis Obispo Incident
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hackers1.law">hackers1.law</A> <tab to=T><TD> 5653<BR><TD> Amateur Hackers Tripped Up, by Danna Dykstra Coy
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hackers2.law">hackers2.law</A> <tab to=T><TD> 6889<BR><TD> Computer Case Takes a Twist, by Danna Dykstra Coy
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hackers3.law">hackers3.law</A> <tab to=T><TD> 2883<BR><TD> Hackers Off Hook, Property Returned, by Danna Dykstra Coy
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hackers4.law">hackers4.law</A> <tab to=T><TD> 8012<BR><TD> A Case for Mistaken Identity... Who's Privacy Was Really Invaded?
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hakharas.txt">hakharas.txt</A> <tab to=T><TD> 4186<BR><TD> Hackers and the Authorities: A Question of Harassment, as Seen in an Article from a Recent Newspaper on November 15, 1992
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="handbook.txt">handbook.txt</A> <tab to=T><TD> 74752<BR><TD> What You Should Know if You're Accused of a Crime by Joyce B. David Esq.
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hategrou.law">hategrou.law</A> <tab to=T><TD> 13409<BR><TD> hate Violence In the United States, by Floyd I. Clarke, FBI
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hategrou.txt">hategrou.txt</A> <tab to=T><TD> 13345<BR><TD> Hate Violence in the United States, by Floyd I. Clarke
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hi_lawsta.law">hi_lawsta.law</A> <tab to=T><TD> 7266<BR><TD> Hawaii Computer Crimes Law, 1984
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hightech.law">hightech.law</A> <tab to=T><TD> 14116<BR><TD> A Low Cost Approach to High Technology, by Mark Clark, Lt. South Portland, ME Police
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hightech.txt">hightech.txt</A> <tab to=T><TD> 14103<BR><TD> A Low Cost Approach to High Technology by Lt. Mark Clark
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="homeless.law">homeless.law</A> <tab to=T><TD> 16425<BR><TD> Police and the Homeless, by Barney Melekian, Lt. Santa Monica, California Police
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="homeless.txt">homeless.txt</A> <tab to=T><TD> 16418<BR><TD> Police and the Homeless by Barney Melekian
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hostage.law">hostage.law</A> <tab to=T><TD> 25433<BR><TD> Hostage/Barricade Incidents: High Risk Factors and the Action Criteria by G. Dwayne Fuselier
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hostage.txt">hostage.txt</A> <tab to=T><TD> 25367<BR><TD> Hostage/Barricade Incidents: High Risk Factors and the Action Criteria by G. Drawyne Fuselier
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hostaker.txt">hostaker.txt</A> <tab to=T><TD> 23235<BR><TD> Confronting the Terrorist Hostage Taker by G. Dwayne Fuselier
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hotel.law">hotel.law</A> <tab to=T><TD> 6493<BR><TD> Police Practices: Operation Hotel-Motel
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="howtobeattheirs.txt">howtobeattheirs.txt</A> <tab to=T><TD> 10834<BR><TD> Tax Resistance Primer: How to Beat the IRS
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="howtosel.txt">howtosel.txt</A> <tab to=T><TD> 4224<BR><TD> Making Shareware Pay, by Gary Raymond
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="ia_lawsta.law">ia_lawsta.law</A> <tab to=T><TD> 7233<BR><TD> Iowa Computer Crimes Law, 1984
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="id_lawsta.law">id_lawsta.law</A> <tab to=T><TD> 3358<BR><TD> The Idaho Computer Crimes Law, 1982
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="ident.txt">ident.txt</A> <tab to=T><TD> 20441<BR><TD> Identification: A Move Towards the Future by Bruce J. Brotman
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="identp01.law">identp01.law</A> <tab to=T><TD> 20508<BR><TD> Identification: A Move Towards the Future, by Brice J. Brotman
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="il_lawsta.law">il_lawsta.law</A> <tab to=T><TD> 10564<BR><TD> The Illinois Computer Crimes Law, 1981/1987
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="in_lawsta.law">in_lawsta.law</A> <tab to=T><TD> 2091<BR><TD> The Indiana Computer Tampering Law, 1986
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="intrundg.txt">intrundg.txt</A> <tab to=T><TD> 18096<BR><TD> An Introduction to the Computer Underground, by The Butler (February 26, 1991)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="invbasic.law">invbasic.law</A> <tab to=T><TD> 12444<BR><TD> Environmental Crimes: Investigative Basics, by Martin Wright, Dept. Assistant Director, EPA
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="invbasic.txt">invbasic.txt</A> <tab to=T><TD> 12378<BR><TD> Environmental Crimes: Investigative Basics by Martin Wright
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="irs-20q.txt">irs-20q.txt</A> <tab to=T><TD> 14464<BR><TD> IRS and Business Taxpayers Disagree Over Who Should be Considered Employees: Why, Results, Solutions
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="jan01.law">jan01.law</A> <tab to=T><TD> 2790<BR><TD> Director's Message: Facing the Future, by William S. Sessions, Director, FBI
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="jan02.law">jan02.law</A> <tab to=T><TD> 16437<BR><TD> The Future of Law Enforcement: Dangerous and Different, by Alvin and Heidi Toffler
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="jan03.law">jan03.law</A> <tab to=T><TD> 28766<BR><TD> The Changing Face of America, by Robert C. Trojanowicz, Ph.D.
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="jan04.law">jan04.law</A> <tab to=T><TD> 24159<BR><TD> The Future of Policing, by William l. Tafoyna, Ph.D.
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="jan05.law">jan05.law</A> <tab to=T><TD> 20355<BR><TD> Public Law Enforcement/Private Security: A New Partnership? By Terrence J. Mangan
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="jan06.law">jan06.law</A> <tab to=T><TD> 17733<BR><TD> A Look Ahead: Views of Tomorrow's FBI, by Richard Sonnichsen
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="jan07.law">jan07.law</A> <tab to=T><TD> 19135<BR><TD> Tomorrow's America: Law Enforcement's Coming Challenge, by Rob McCord
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="jobhome.law">jobhome.law</A> <tab to=T><TD> 19064<BR><TD> Taking the Job Home, by Richard N. Southworth, Attorney General's Office, Virginia
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="joint-cu.art">joint-cu.art</A> <tab to=T><TD> 12288<BR><TD> Joint Custody: A Simplistic Solution by Robert D. Felner and Lisa Terre
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="joyce">joyce</A> <tab to=T><TD> 61696<BR><TD> Beyond the Orality/Literacy Dichotomy: James Joyce and the pre-History of Cyberspace by Donald F. Theall (May 1992)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="judna.txt">judna.txt</A> <tab to=T><TD> 27647<BR><TD> Judicial Acceptance of DNA Profiling by John T. Sylvester and John H. Stafford
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="judnap26.law">judnap26.law</A> <tab to=T><TD> 27713<BR><TD> Judicial Acceptance of DNA Profiling, by John T. Sylvester, J.D.
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="judseal.txt">judseal.txt</A> <tab to=T><TD> 22490<BR><TD> The Judicial Sealing Requirement in Electronic Surveillance: A Matter of Immediacy by Robert A. Fiatal
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="juryban.txt">juryban.txt</A> <tab to=T><TD> 2227<BR><TD> Local Jury Banned by Judge After Ruling Man Innocent
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="jurynul.txt">jurynul.txt</A> <tab to=T><TD> 7467<BR><TD> Information on Jury Nullification
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="juryrig.txt">juryrig.txt</A> <tab to=T><TD> 2013<BR><TD> How they Stack the Jury in Georgia
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="juryrite.inf">juryrite.inf</A> <tab to=T><TD> 3553<BR><TD> Fully Informed Juries
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="juryrite.txt">juryrite.txt</A> <tab to=T><TD> 6849<BR><TD> Toward a Bill of Jury Rights
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="ks_lawsta.law">ks_lawsta.law</A> <tab to=T><TD> 4861<BR><TD> Kansas Computer Crimes Law, 1985
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="ky_lawsta.law">ky_lawsta.law</A> <tab to=T><TD> 6331<BR><TD> Kentucky Computer Crime Law, 1984
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="la_lawsta.law">la_lawsta.law</A> <tab to=T><TD> 5581<BR><TD> The Louisiana Computer Related Crime Bill, passed in 1984
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="lawbbs.txt">lawbbs.txt</A> <tab to=T><TD> 13440<BR><TD> Directory of Law-Oriented Bulletin Boards, 1986
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="laws.txt">laws.txt</A> <tab to=T><TD> 3394<BR><TD> Interesting US Laws, taken from the Seattle P-I
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="lebmay01.law">lebmay01.law</A> <tab to=T><TD> 4214<BR><TD> Director's Message, Law Day 1990, by William S. Sessions, FBI
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="lebmay02.law">lebmay02.law</A> <tab to=T><TD> 10020<BR><TD> G.R.A.M.P.A. COPS, by Jere L. Spurlin, Chief of Police, Ft. Meyers, Florida
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="lebmay03.law">lebmay03.law</A> <tab to=T><TD> 12413<BR><TD> High School Suicide Case Intervention, by David Fisher, Pinnellas County, Florida, Sheriff's Office
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="lebmay04.law">lebmay04.law</A> <tab to=T><TD> 7456<BR><TD> Police Practices: Elderwatch
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="lebmay05.law">lebmay05.law</A> <tab to=T><TD> 6272<BR><TD> Police Practices: Selecting the Right Officers: DARE
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="lebmay06.law">lebmay06.law</A> <tab to=T><TD> 18893<BR><TD> Analytical Intelligence Training, by Marilyn B. Peterson
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="lebmay07.law">lebmay07.law</A> <tab to=T><TD> 12961<BR><TD> Law Enforcement Exploring, by Steve Farish, Texas Law Enforcement Explorer Advisor's Association
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="lebmay08.law">lebmay08.law</A> <tab to=T><TD> 28146<BR><TD> Curtilage: The Fourth Amendment in the Garden, by John Gales Sauls, FBI
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="lebmay09.law">lebmay09.law</A> <tab to=T><TD> 2569<BR><TD> Legal Brief: Maryland v. Buie, Supreme Court Decision
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="legal.tec">legal.tec</A> <tab to=T><TD> 10585<BR><TD> Some Examples of Legal Loopholes by Keith K (February 13, 1994)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="legalfnt.txt">legalfnt.txt</A> <tab to=T><TD> 9872<BR><TD> US Copyright Office Rules Font Software is Not Copyrightable (November 30, 1989)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="leglbyt1.txt">leglbyt1.txt</A> <tab to=T><TD> 18370<BR><TD> Legal Bytes Volume 1 Number 1 by George, Donaldson and Ford (1993)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="leglbyt2.txt">leglbyt2.txt</A> <tab to=T><TD> 26724<BR><TD> Legal Bytes Volume 1 Number 1, by George Donaldson and Ford (1993)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="len.ros">len.ros</A> <tab to=T><TD> 190622<BR><TD> Complete information on the Len Rose (Legion of Doom Source Code) Case
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="listcoun.txt">listcoun.txt</A> <tab to=T><TD> 37317<BR><TD> Large List of United States Counties
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="lith_law.txt">lith_law.txt</A> <tab to=T><TD> 6728<BR><TD> Legally, Lithuania's Case is Open and Shut, by Vytautas Landsbergis, President of Lithuania
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="lotus.txt">lotus.txt</A> <tab to=T><TD> 13425<BR><TD> Discussion of Lotus' Plan to Sell personal Information
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="lvstops.txt">lvstops.txt</A> <tab to=T><TD> 5898<BR><TD> Large Vehicle Stops from William D. Dean
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="mail_exp">mail_exp</A> <tab to=T><TD> 24161<BR><TD> Obtaining Host and Address Information by Ron Ray
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="mailordr">mailordr</A> <tab to=T><TD> 4321<BR><TD> How to Successfully Buy Through Mail Order and Protect Your Rights
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="manage05.law">manage05.law</A> <tab to=T><TD> 12078<BR><TD> What They Didn't Teach in Management School, by James D. Sewell, Ph.D., Florida Criminal Justice Executive Institute
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="maps_cop.in">maps_cop.in</A> <tab to=T><TD> 5959<BR><TD> Cecil Adams on Copyright Traps in Maps (well, sort of)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="mar90_1.law">mar90_1.law</A> <tab to=T><TD> 17540<BR><TD> The Preliminary Investigative Process, by Chief Gordon F. Urlacher, Rochester, New York, Police Department
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="mar90_2.law">mar90_2.law</A> <tab to=T><TD> 12111<BR><TD> Store Diversion Burglaries, by Detective Robert P. Meiners, Lincolnwood, Illinois, Police Department
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="mar90_3.law">mar90_3.law</A> <tab to=T><TD> 5618<BR><TD> Police Practices: Operation Alert, by Captain Mark Willingham, Division of Alcoholic Beverages and Tobacco
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="mar90_4.law">mar90_4.law</A> <tab to=T><TD> 13090<BR><TD> Police Retirement: The Impact of Change, by John M. Violenti, Ph.D, Department of Social and Preventive Medicine, SUNY New York
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="mar90_5.law">mar90_5.law</A> <tab to=T><TD> 16601<BR><TD> Managing Police Basic Training Cirriculum, by Rene A. Browett, Northern Virginia Criminal Justice Academy
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="mar90_6.law">mar90_6.law</A> <tab to=T><TD> 26939<BR><TD> Personal Liability: The Qualified Immunity Defense, by Daniel L. Schofield, S.J.D., FBI
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="massmodmtax.law">massmodmtax.law</A> <tab to=T><TD> 12184<BR><TD> New Massachusetts Modem Tax Proposed (For Real)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="md_lawsta.law">md_lawsta.law</A> <tab to=T><TD> 4666<BR><TD> The Maryland Computer Crimes Law
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="medialaw.law">medialaw.law</A> <tab to=T><TD> 20297<BR><TD> Media Performance and International Law, by Howard H. Frederick, Ph.D.
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="medicp21.law">medicp21.law</A> <tab to=T><TD> 9547<BR><TD> Medicaid Fraud, by Larry L. Bailey, Colorado Attorney General's Office, Medicaid Fraud Control Unit, Denver Colorado
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="mi_lawsta.law">mi_lawsta.law</A> <tab to=T><TD> 3615<BR><TD> The Michigan Computer Crimes Law
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="military.txt">military.txt</A> <tab to=T><TD> 8855<BR><TD> Military Support to Civilian Law Enforcement Agencies by R. Barry Cronin
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="militaryp24.law">militaryp24.law</A> <tab to=T><TD> 8925<BR><TD> Military Support to Civilian Law Enforcement Agencies, by R. Barry Cronin, U.S. Marine Corps Headquarters
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="minnesot">minnesot</A> <tab to=T><TD> 2115<BR><TD> Minnesota Invokes Computer Law by Rachel Parker
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="mn_lawsta.law">mn_lawsta.law</A> <tab to=T><TD> 12662<BR><TD> The Minnesota Computer Crimes Law
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="mo_lawsta.law">mo_lawsta.law</A> <tab to=T><TD> 7198<BR><TD> The Missouri Computer Crimes Law, 1982
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="mobile.law">mobile.law</A> <tab to=T><TD> 6210<BR><TD> Police Policies: Mobile Command Posts
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="morris.app">morris.app</A> <tab to=T><TD> 31927<BR><TD> The Court Case against Robert Tappan Morris, 1990-1991
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="ms_lawsta.law">ms_lawsta.law</A> <tab to=T><TD> 7894<BR><TD> Mississippi Computer Crimes Law, 1985
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="mt_lawsta.law">mt_lawsta.law</A> <tab to=T><TD> 3082<BR><TD> Montana Computer Law Statute
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="mulepat.txt">mulepat.txt</A> <tab to=T><TD> 12585<BR><TD> Campus Security: The Mule Patrol, by James A. Huff
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="murphy.txt">murphy.txt</A> <tab to=T><TD> 6620<BR><TD> Murhpy's Law, and Similar Ilk
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="mvt.txt">mvt.txt</A> <tab to=T><TD> 13602<BR><TD> Motor Vehicle Theft Investigations: Emerging International Trends by Mary Ellen Beekman
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="mvtleb.law">mvtleb.law</A> <tab to=T><TD> 13668<BR><TD> Motor Vehicle Theft Investigations: Emerging International Trends
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="nafta.txt">nafta.txt</A> <tab to=T><TD> 2639231<BR><TD> Complete Text of the North American Free Trade Agreement (NAFTA) Act (1993)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="natural.law">natural.law</A> <tab to=T><TD> 72219<BR><TD> Natural Laws and Natural Rights by James A. Donald (February 28, 1993)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="nc_lawsta.law">nc_lawsta.law</A> <tab to=T><TD> 4713<BR><TD> North Carolina Computer Crime Law
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="ncic.law">ncic.law</A> <tab to=T><TD> 8537<BR><TD> NCIC Training: Hit or Miss, by Don M. Johnson, FBI
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="ncic.txt">ncic.txt</A> <tab to=T><TD> 8180<BR><TD> Focus on NCIC: Identifying the Unidentified
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="ncic2.txt">ncic2.txt</A> <tab to=T><TD> 8613<BR><TD> NCIC Training: Hit or Miss by Don M. Johnson of the FBI
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="nd_lawsta.law">nd_lawsta.law</A> <tab to=T><TD> 1422<BR><TD> The North Dakota Computer Fraud and Crime Statute, 1987
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="ne_lawsta.law">ne_lawsta.law</A> <tab to=T><TD> 4539<BR><TD> The Nebraska Computer Crimes Law, 1985
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="newlaw.txt">newlaw.txt</A> <tab to=T><TD> 8949<BR><TD> Dangerous Copyright Law by Stephen Haynes (October 2, 1990)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="nh_lawsta.law">nh_lawsta.law</A> <tab to=T><TD> 8661<BR><TD> New Hampshire Computer Crimes, 1986
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="nj_lawsta.law">nj_lawsta.law</A> <tab to=T><TD> 8133<BR><TD> New Jersey Computer-Related Crimes Law, 1984
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="nov_1.law">nov_1.law</A> <tab to=T><TD> 16726<BR><TD> The FBI's 10mm Pistol, by John C. All, FBI
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="nov_2.law">nov_2.law</A> <tab to=T><TD> 17796<BR><TD> Ammunition Selection: Research and Measurement Issues, by N. J. Scheers, Ph.D.
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="nov_3.law">nov_3.law</A> <tab to=T><TD> 15201<BR><TD> Utilizing Job Task Analysis, by Thomas J. Jurkanin
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="nov_4.law">nov_4.law</A> <tab to=T><TD> 22164<BR><TD> The Judicial Sealing Requirement In Electronic Surveillance: A Matter of Immediacy, by Robert J. Fiatal
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="nsa.txt">nsa.txt</A> <tab to=T><TD> 15721<BR><TD> Harry S. Truman's Declaration of the Creation of the National Security Agency (NSA)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="nv_lawsta.law">nv_lawsta.law</A> <tab to=T><TD> 5744<BR><TD> Nevada Computer Unfair Trade Practice Law, 1983
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="ny_lawsta.law">ny_lawsta.law</A> <tab to=T><TD> 8412<BR><TD> New York Penal Law, Computer Crime, 1986
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="nyappl.law">nyappl.law</A> <tab to=T><TD> 12970<BR><TD> New York's APPL Program: A New Partnetship, by Anthony M. Voelker
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="odomroll.txt">odomroll.txt</A> <tab to=T><TD> 15958<BR><TD> Odometer Rollback Schemes by James E. Scripture of FBI
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="ofc_lostp02.law">ofc_lostp02.law</A> <tab to=T><TD> 11067<BR><TD> Law Officers Killed: 1980-1989, Victoria L. Major, FBI
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="oh_lawsta.law">oh_lawsta.law</A> <tab to=T><TD> 1100<BR><TD> Ohio's Computer Crime Law
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="olw1.txt">olw1.txt</A> <tab to=T><TD> 2432<BR><TD> Our Lawyer Writes #1: Rodent Milk
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="olw3.txt">olw3.txt</A> <tab to=T><TD> 2432<BR><TD> Our Lawyer Writes #3: Getting a Divorce, Quick and Easy
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="olw5.txt">olw5.txt</A> <tab to=T><TD> 2688<BR><TD> Our Lawyer Writes #5: I'm a Mistress, can I Get Anything?
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="op-clean.leb">op-clean.leb</A> <tab to=T><TD> 12668<BR><TD> Operation Clean: Reclaiming City Neighborhoods by Richard W. Hatler
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="p_view.law">p_view.law</A> <tab to=T><TD> 12141<BR><TD> Point of View: A Manager's Guide to Computer Projects, by Charles Brennan, Philadelphia, Pennsylvania, Police Department
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="p_view.txt">p_view.txt</A> <tab to=T><TD> 4991<BR><TD> Point of View: Campus Police by Gigi Ray of the Arlington Campus Police Department
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="p_viewp14.law">p_viewp14.law</A> <tab to=T><TD> 5057<BR><TD> Point of View: Campus Police
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="pa_lawsta.law">pa_lawsta.law</A> <tab to=T><TD> 4695<BR><TD> Pennsylvania's computer crimes law, 1983/1986
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="passport.txt">passport.txt</A> <tab to=T><TD> 1766<BR><TD> How to Get a State Passport
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="patrol.law">patrol.law</A> <tab to=T><TD> 8785<BR><TD> Perspective: The Patrol Function, by Patrick V. Murphy, Former Police Commissioner of New York City
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="penreg.txt">penreg.txt</A> <tab to=T><TD> 30184<BR><TD> PENREG: A Database Management System Designed to Maintain and Manipulate Data Obtained through a Pen Register or DNR (1989)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="plateaup16.law">plateaup16.law</A> <tab to=T><TD> 9155<BR><TD> Plateauing in Law Enforcement, by James M. Childers, Lubbock, Texas, Police Department
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="pntview.txt">pntview.txt</A> <tab to=T><TD> 12266<BR><TD> Point of View: A Manager's Guide to Computer Products by Charles Brennan
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="pol-com.leb">pol-com.leb</A> <tab to=T><TD> 18679<BR><TD> Community Policing is Not Police Community Relations by Robert C. Trojanowicz
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="pol-prac.leb">pol-prac.leb</A> <tab to=T><TD> 4546<BR><TD> Police Practices: Seat Belt Awareness Program
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="pol_com.txt">pol_com.txt</A> <tab to=T><TD> 18613<BR><TD> Community Policing is not Police Community Relations by Robert C. Trojanowicz
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="pol_prac.txt">pol_prac.txt</A> <tab to=T><TD> 5620<BR><TD> Police Practices: Baited Vehicle Detail
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="pol_pracp10.law">pol_pracp10.law</A> <tab to=T><TD> 6019<BR><TD> Police Practices: Alternate Fuel Program
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="pol_pracp24.law">pol_pracp24.law</A> <tab to=T><TD> 5686<BR><TD> Police Practices: Baited Vehicle Program
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="police.evasion">police.evasion</A> <tab to=T><TD> 20608<BR><TD> Exilic Xyth's Guide to 1st Level Police Evation (November 10, 1990)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="policeevasion.txt">policeevasion.txt</A> <tab to=T><TD> 21345<BR><TD> Exilic Xyth's Guide to 1st level Police Evasion (November 10, 1990)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="policemen.pig">policemen.pig</A> <tab to=T><TD> 3328<BR><TD> Calling a Policeman a Pig: A New Concept From The Anarchist Cookbook, by The Norwegian Monk
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="polprac08.law">polprac08.law</A> <tab to=T><TD> 4973<BR><TD> Police Practices: Miami's Ethnic Sharing Program
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="polpracp16.law">polpracp16.law</A> <tab to=T><TD> 5678<BR><TD> Police Practices: Operation Star
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="pope.txt">pope.txt</A> <tab to=T><TD> 11449<BR><TD> U.S. Computer Investigation Targets Austinites by Kyle Pope (March 17, 1990)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="poster.txt">poster.txt</A> <tab to=T><TD> 2432<BR><TD> Wanted Poster for John Richard, the Scofflaw Sysop
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="posting-">posting-</A> <tab to=T><TD> 5290<BR><TD> The Risks of Posting to the Internet
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="posting_">posting_</A> <tab to=T><TD> 5289<BR><TD> The Dangers of Posting to the Net (A Visit from the FBI)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="practice.law">practice.law</A> <tab to=T><TD> 6079<BR><TD> Police Practices: CHP Hazardous Waste Investigation Unit
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="practice.txt">practice.txt</A> <tab to=T><TD> 3680<BR><TD> Police Practices: The Community Outreach Program
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="practiceleb.law">practiceleb.law</A> <tab to=T><TD> 7257<BR><TD> Police Practices: Pennsylvania's Interdepartmental Communications System
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="preface.txt">preface.txt</A> <tab to=T><TD> 20480<BR><TD> The Federal Zone: Cracking the Code of Internal Revenue by Mitch Modeleski (January, 1994)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="prelimin.txt">prelimin.txt</A> <tab to=T><TD> 17474<BR><TD> The Preliminary Investigation Process by Cheif Gordon F. Urlacher
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="presumed">presumed</A> <tab to=T><TD> 157447<BR><TD> Presumed Guilty: The Law's Victims in the War on Drugs, 1991 by Andrew Schneider
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="primes.txt">primes.txt</A> <tab to=T><TD> 22238<BR><TD> Primes, Codes and the National Security Agency by Susan Landau
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="privacy">privacy</A> <tab to=T><TD> 45299<BR><TD> Computer Privacy vs. First and Fourth Amendment Rights, by Michael S. Borella, 1991
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="privatiz.nre">privatiz.nre</A> <tab to=T><TD> 15151<BR><TD> The Privatized NREN, by Mitchell Kapor, Electronic Frontier Foundation, February 14, 1991
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="privpris.txt">privpris.txt</A> <tab to=T><TD> 15691<BR><TD> Privitization of Prisons: Fad or Future by Lr. David K. Burright
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="privsoc.law">privsoc.law</A> <tab to=T><TD> 10232<BR><TD> The Private and Open Society, by John Gilmore
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="prodigy.law">prodigy.law</A> <tab to=T><TD> 5118<BR><TD> Prodigy Stumbles as a Forum.. Again
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="promoteleb.law">promoteleb.law</A> <tab to=T><TD> 15620<BR><TD> Promotion to Chief: Keys to Success in a Small Department
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="prosecut.law">prosecut.law</A> <tab to=T><TD> 21204<BR><TD> Evironmental Crimes Prosecution: A Law Enforcement Partnership, by Vincent A. Matulewich, Environmental Protections Bureau, New Jersey
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="pub_7277.asc">pub_7277.asc</A> <tab to=T><TD> 48987<BR><TD> Freedom From War: The United States Program for General and Complete Disarmament in a Peaceful World
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="pubprivs.txt">pubprivs.txt</A> <tab to=T><TD> 20291<BR><TD> Public Law Enforcement/Private Security: A New Partnership? by Terrence J. Mangan and Michael G. Shanahan
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="pview.txt">pview.txt</A> <tab to=T><TD> 10861<BR><TD> Point of View: European Law Enforcement after 1992 by Jan Blaauw
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="pviewp18.law">pviewp18.law</A> <tab to=T><TD> 10927<BR><TD> Point of View: Eurpoean Law Enforcement after 1945
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="quotes.txt">quotes.txt</A> <tab to=T><TD> 20330<BR><TD> Quotes from Many Historical Figures about Juries
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="ratpatro.law">ratpatro.law</A> <tab to=T><TD> 11360<BR><TD> The Rat Patrol Rides! By Paul C. Ricks, Deputy Chief of Police, Colorado Springs
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="ratpatro.txt">ratpatro.txt</A> <tab to=T><TD> 11294<BR><TD> The Rat Patrol Rides! By Paul C. Ricks of Colorado Springs P.D.
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="rebuttal.txt">rebuttal.txt</A> <tab to=T><TD> 300445<BR><TD> Inslaw's Analysis and Rebuttal of the BUA Report
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="res-rev.leb">res-rev.leb</A> <tab to=T><TD> 3696<BR><TD> Research Review: Police Use of Discretion: A Comparison of Community, System, And Officer Expectations
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="resmeas.txt">resmeas.txt</A> <tab to=T><TD> 18051<BR><TD> Ammunition Selection: Research and Measurement Issues by N.J. Scheers and Stephen R. Band
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="response.txt">response.txt</A> <tab to=T><TD> 7842<BR><TD> A Case for Mistaken Identity... Who's Privacy was Really Invaded? by Jim Bigeloww
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="reviewl.law">reviewl.law</A> <tab to=T><TD> 8806<BR><TD> Book Review, "Liability" by Peter Huber
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="ri_lawsta.law">ri_lawsta.law</A> <tab to=T><TD> 1950<BR><TD> Rhode Island Computer Crimes Law, 1979
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="riggs_co">riggs_co</A> <tab to=T><TD> 55329<BR><TD> United States Vs. Riggs: Jacking into the Net with the Illinois District Court
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="rights.txt">rights.txt</A> <tab to=T><TD> 30658<BR><TD> Why Your Rights are Guaranteed and should Not Be Taken Away
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="ripco-wa.rra">ripco-wa.rra</A> <tab to=T><TD> 75314<BR><TD> Seizure Warrant for the Ripco BBS
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="ripco.law">ripco.law</A> <tab to=T><TD> 13511<BR><TD> The RipCO BBS Seizure
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="ripcobbs">ripcobbs</A> <tab to=T><TD> 73736<BR><TD> Seizure Warrant Documents for the RIPCO BBS
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="safetyleb.law">safetyleb.law</A> <tab to=T><TD> 10578<BR><TD> Safety Action Team, by Rod Englert, Oregon Sheriff
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="saucs1.txt">saucs1.txt</A> <tab to=T><TD> 95531<BR><TD> The Shareware Author and User Case Study by Daniel Corbier (1994)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="sc_lawsta.law">sc_lawsta.law</A> <tab to=T><TD> 7604<BR><TD> South Carolina Computer Crime Act
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="school.law">school.law</A> <tab to=T><TD> 13599<BR><TD> Preparing for School Crisis, by David Nichols, Ph. D.
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="school.txt">school.txt</A> <tab to=T><TD> 13534<BR><TD> Preparing for School Crisis, by David Nichols of Jacksonville State University (1991)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="schoolcr.law">schoolcr.law</A> <tab to=T><TD> 10368<BR><TD> School Crime Stoppers, by Bob Chance, Tulsa Oklahoma Police
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="schoolcr.txt">schoolcr.txt</A> <tab to=T><TD> 10303<BR><TD> School Crime Stoppers by Bob Chance of the Tulsa Police Department
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="sd_lawsta.law">sd_lawsta.law</A> <tab to=T><TD> 3184<BR><TD> South Dakota Computer Crimes Law, 1982
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="search.txt">search.txt</A> <tab to=T><TD> 21769<BR><TD> Searches of Premises Incident to Arrest, by A. Louis DiPietro
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="searches.txt">searches.txt</A> <tab to=T><TD> 30108<BR><TD> Emergency Searchs of Effects, by John Gales Sauls of the FBI Academy
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="searchp26.law">searchp26.law</A> <tab to=T><TD> 26342<BR><TD> Inventory Searches: The Role of Discretion, by Austin A Anderson
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="sentguid.law">sentguid.law</A> <tab to=T><TD> 9050<BR><TD> Proposed Amendment #59 to the Sentencing Guidelines for United States Courts
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="serologyleb.law">serologyleb.law</A> <tab to=T><TD> 24819<BR><TD> Serolgical Evidence in Sexual Assault Investigations, by Robert R.J. Grispino, MA, Serolgy Unit, FBI
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="simson.sec">simson.sec</A> <tab to=T><TD> 62214<BR><TD> An Introduction to Computer Security for Lawyers by Simson Garfinkel (1987)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="sniper.txt">sniper.txt</A> <tab to=T><TD> 20441<BR><TD> Police Sniper Training by John Plaster of the Minnesota National Guard
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="sniperleb.law">sniperleb.law</A> <tab to=T><TD> 20505<BR><TD> Police Sniper Training, by John Plaster, Instructor, MN Guard Counter Sniper School
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="softmark.asc">softmark.asc</A> <tab to=T><TD> 4237<BR><TD> Information and Documents Needed for Software Copyright Application
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="softmarkdoc.law">softmarkdoc.law</A> <tab to=T><TD> 4295<BR><TD> Information and Documents Needed for Software Copyright Application
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="softpat.txt">softpat.txt</A> <tab to=T><TD> 86156<BR><TD> A Partial List of Software Patents, compiled by Michael Ernst (April 12, 1992)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="srrapist.txt">srrapist.txt</A> <tab to=T><TD> 21884<BR><TD> The Criminal Behavior of the Serial Rapist, by Robert R. Hazelwood
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="stcomplw">stcomplw</A> <tab to=T><TD> 3165<BR><TD> A Cross-Reference of US States and Laws Written for Them
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="steroids.txt">steroids.txt</A> <tab to=T><TD> 16332<BR><TD> The Abuse of Anabolic Steroids by Charles Swanson, University of Georgia
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="steroids19.law">steroids19.law</A> <tab to=T><TD> 16398<BR><TD> Abuse of Anabolic Steroids, by Charles Swanson, Ph. D., U of Georgia
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="stripesp16.law">stripesp16.law</A> <tab to=T><TD> 13643<BR><TD> Honolulu's Stripes: Training for Sergeants, by Robert D. Prasser, Captain, Honolulu Hawaii Police Department
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="suc-inte.txt">suc-inte.txt</A> <tab to=T><TD> 6281<BR><TD> Successful Interviewing by James R. Ryals, March 1991
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="sucinte.txt">sucinte.txt</A> <tab to=T><TD> 6620<BR><TD> Successful Interviewing by James R. Ryals
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="sueirs.txt">sueirs.txt</A> <tab to=T><TD> 6016<BR><TD> Wage Earners Should Consider Possibility of Suing IRS for Tax Refunds Rather Than Filing Exempt W-4 Forms by Bill Conklin
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="suicide.txt">suicide.txt</A> <tab to=T><TD> 12347<BR><TD> The High Scool Suicide Crisis Intervention by David Fisher of the Pinnellas Sheriff's Office
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="summary.txt">summary.txt</A> <tab to=T><TD> 42517<BR><TD> The INSLAW affair: September 10, 1992
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="supreme.law">supreme.law</A> <tab to=T><TD> 25869<BR><TD> Selected Supreme Court Cases: 1989-1990 Term: William U. McCormack, FBI
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="suprule1.txt">suprule1.txt</A> <tab to=T><TD> 42376<BR><TD> The Rules of the U.S. Supreme Court
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="suprule2.txt">suprule2.txt</A> <tab to=T><TD> 36427<BR><TD> The Rules of the U.S. Supreme Court (Part II)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="suprule3.txt">suprule3.txt</A> <tab to=T><TD> 36204<BR><TD> The Rules of the U.S. Supreme Court (Part III)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="survive01.law">survive01.law</A> <tab to=T><TD> 11830<BR><TD> The Will to Survive, by Stephen R. Band
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="swiss.txt">swiss.txt</A> <tab to=T><TD> 54666<BR><TD> Getting a Discretionary Swiss Banking Account
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="swt.txt">swt.txt</A> <tab to=T><TD> 2009<BR><TD> Seizing Wire Transfers, by The Wall Street Journal (September 20, 1993)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="sysops">sysops</A> <tab to=T><TD> 21329<BR><TD> What Files are Legal for Distribution on a BBS?
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="targetd.law">targetd.law</A> <tab to=T><TD> 14371<BR><TD> Washington D.C.'s Operation "On Target" by Eric W. Witzig, Ret., Washington DC Police
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="taxother.tut">taxother.tut</A> <tab to=T><TD> 9940<BR><TD> Tax Deductibility of BBS Operations
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="teamworkp06.law">teamworkp06.law</A> <tab to=T><TD> 12002<BR><TD> Teamwork: An Innovative Approach, by Alan Youngs, Captain, Lakewood Colorado Police
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="tempest.law">tempest.law</A> <tab to=T><TD> 53840<BR><TD> Eavesdropping on the Electromagnetic Eminations of Digital Equipment: The Laws of Canada, England, and the United States
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="thefacts.law">thefacts.law</A> <tab to=T><TD> 105795<BR><TD> Push Button Felonies: KPFA-FM Radio Broadcast July 26, 1990
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="theft_of.sof">theft_of.sof</A> <tab to=T><TD> 12513<BR><TD> Theft of Computer Software: A National Security Threat by William J. Cook
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="tm.tut">tm.tut</A> <tab to=T><TD> 5077<BR><TD> Trademarks in Brief (Overview)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="tn_lawsta.law">tn_lawsta.law</A> <tab to=T><TD> 7152<BR><TD> Tennesse Computer Crimes Act
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="tomorfbi.txt">tomorfbi.txt</A> <tab to=T><TD> 17669<BR><TD> A Look Ahead: Views of Tomorrow's FBI by Richard Sonnichsen, Gail O. Burton and Thomas Lyons
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="towingco.txt">towingco.txt</A> <tab to=T><TD> 9557<BR><TD> Towing Companies: Friends or Foes? By Michael C. Gillo
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="trash.law">trash.law</A> <tab to=T><TD> 21269<BR><TD> Trash Inspections and the Fourth Amendment, by Thomas W. Kukura, JD
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="trash.txt">trash.txt</A> <tab to=T><TD> 21203<BR><TD> Trash Inspections and the Fourth Amendment, by Thomas V. Kukura of the FBI
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="travel.rgt">travel.rgt</A> <tab to=T><TD> 18188<BR><TD> A How-To Information Sheet for Sovereigns: A Challenge to the 6th Amendment's Jurisdiction by Howard J. Freeman (March 23, 1993)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="tx_lawsta.law">tx_lawsta.law</A> <tab to=T><TD> 5722<BR><TD> Texas Computer Crime Law
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="uic.law">uic.law</A> <tab to=T><TD> 19541<BR><TD> The League for Programming Freedom Statement
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="uncharte">uncharte</A> <tab to=T><TD> 62233<BR><TD> The Charter of the United Nations (July 7, 1994)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="us&amp;scon1.txt">us&scon1.txt</A> <tab to=T><TD> 126412<BR><TD> The United States and the States under the Constitution, by C. Stuart Patterson
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="us&amp;scon2.txt">us&scon2.txt</A> <tab to=T><TD> 74338<BR><TD> The United States and the States under the Constitution, by C. Stuart Patterson (Part 2)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="us&amp;scon3.txt">us&scon3.txt</A> <tab to=T><TD> 162306<BR><TD> The United States and the States under the Constitution, by C. Stuart Patterson (Part 3)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="us&amp;scon4.txt">us&scon4.txt</A> <tab to=T><TD> 112100<BR><TD> The United States and the States under the Constitution, by C. Stuart Patterson (Part 4)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="us&amp;scon5.txt">us&scon5.txt</A> <tab to=T><TD> 200455<BR><TD> The United States and the States under the Constitution, by C. Stuart Patterson (Part 5)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="us&amp;scon6.txt">us&scon6.txt</A> <tab to=T><TD> 101176<BR><TD> The United States and the States under the Constitution, by C. Stuart Patterson (Part 6)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="uscon.law">uscon.law</A> <tab to=T><TD> 57050<BR><TD> The Constitution of the United States
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="userintf.cp">userintf.cp</A> <tab to=T><TD> 11618<BR><TD> Protecting Rights in User Interface Designs by Ben Shneiderman (November 27, 1992)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="ut_lawsta.law">ut_lawsta.law</A> <tab to=T><TD> 6859<BR><TD> The Utah Computer Crimes Act
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="va_lawsta.law">va_lawsta.law</A> <tab to=T><TD> 11468<BR><TD> The Virgina Computer Crimes Act
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="vic-wit.txt">vic-wit.txt</A> <tab to=T><TD> 16276<BR><TD> Victim-Witness Assistance by Joseph R. Luteran, March 1991
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="visiop08.law">visiop08.law</A> <tab to=T><TD> 8300<BR><TD> Visiophones: French High Tech Security, by Pierre Marie Bourniquel, Biarritz, France
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="wa_lawsta.law">wa_lawsta.law</A> <tab to=T><TD> 2035<BR><TD> Computer Crimes Law in Washington State
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="waco.txt">waco.txt</A> <tab to=T><TD> 38784<BR><TD> The Text of the Search Warrant from Waco, Texas
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="waiver.txt">waiver.txt</A> <tab to=T><TD> 10310<BR><TD> A Waiver of Claims pertaining to Adult Sections of Ryan's Bar BBS
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="way.law">way.law</A> <tab to=T><TD> 9031<BR><TD> There's Gotta Be a Better Way, by Glen Roberts and Bill Wajk
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="weaponsp10.law">weaponsp10.law</A> <tab to=T><TD> 13094<BR><TD> Vehicular Long Barrel Weapons Mount, by David W. Pisenti, FBI
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="wi_lawsta.law">wi_lawsta.law</A> <tab to=T><TD> 5655<BR><TD> Wisconson Computer Crimes Law
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="wv_law.law">wv_law.law</A> <tab to=T><TD> 8732<BR><TD> West Virginia Computer Crimes Law
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="wy_lawsta.law">wy_lawsta.law</A> <tab to=T><TD> 7182<BR><TD> Wyoming Computer Crimes Law
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="yardies.txt">yardies.txt</A> <tab to=T><TD> 13795<BR><TD> The Yardies: England's Emerging Crime Problem, by Roy A.C. Ramm (January, 1988)
</TABLE><P><TABLE WIDTH=100%><TR><TD ALIGN=RIGHT><SMALL>There are 533 files for a total of 16,062,590 bytes.</SMALL></TABLE><P>
</BODY>
</HTML>
<P>If you wish to have the entire directory conveniently archived and compressed into one file, please download
either <A HREF="http://archives.textfiles.com/law.tar.gz"><B>law.tar.gz</B></A> (4797986 bytes) or <A HREF="http://archives.textfiles.com/law.zip"><B>law.zip</B></A> (5315618 bytes) instead of all the files separately. <P>