mirror of
https://github.com/opsxcq/mirror-textfiles.com.git
synced 2025-08-30 14:29:56 +02:00
569 lines
86 KiB
HTML
569 lines
86 KiB
HTML
<HTML>
|
|
<TITLE>T E X T F I L E S</TITLE>
|
|
<BODY BGCOLOR="#FFFFFF" TEXT="#000000" LINK="#000000" ALINK="#004400" VLINK="#004400">
|
|
<H1>Laws and Law Discussion</H1>
|
|
<P>
|
|
From the first time a rumor went by that the FCC was going to institute a
|
|
"modem tax" (this one shows up about every two years without fault), BBS
|
|
users took an interest in the funny little laws that govern the country and
|
|
how the jackasses in the funny white building were going to mess up the
|
|
fun. To this end, transcripts and discussions about laws have been around
|
|
for a long time.
|
|
<P>
|
|
Because of the somewhat odd subject matter of some of the files, some of
|
|
the files you would expect to be located in this section are also located
|
|
in the <A HREF="../politics.html">politics</A> section. Some of these files would
|
|
probably be better put in the Politics section as well.
|
|
<P>
|
|
Oh, and this would normally go without saying, but it's probably not a good
|
|
idea to depend on these files for actual, your-property-and-well-being
|
|
law advice. Sometimes the law has radically changed since the file was
|
|
written, or the file falls under that special "The US never submitted a
|
|
full approval to all 50 states so actually you can punch a cop" type of
|
|
conspiratorial section. See also <A HREF="../conspiracy.html">conspiracy</A>.
|
|
<P>
|
|
<TABLE WIDTH=100%>
|
|
<TD BGCOLOR=#000000><FONT COLOR=#FFFFFF><B>Filename</B><BR></FONT></TD>
|
|
<TD BGCOLOR=#002200><FONT COLOR=#FFFFFF><B>Size</B><BR></FONT></TD>
|
|
<TD BGCOLOR=#004400><FONT COLOR=#FFFFFF><B>Description of the Textfile</B><BR></TD></TR>
|
|
|
|
<tab indent=60 id=T><br>
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="1changin01.law">1changin01.law</A> <tab to=T><TD> 12257<BR><TD> Counterintelligence Challenges in a Changing World, by William S. Sessions, Director, FBI
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="1stamend.txt">1stamend.txt</A> <tab to=T><TD> 7883<BR><TD> A Showdown Over Computer Crime, by Brooks Boliek (August 5, 1990)
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="1urbanp01.law">1urbanp01.law</A> <tab to=T><TD> 10189<BR><TD> Urban Transportation Security, by Robert W. Dart, Chicago Police
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="250law.law">250law.law</A> <tab to=T><TD> 3164<BR><TD> Section 250.html2 of the Model Penal Code: Violation of Privacy
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="251law.law">251law.law</A> <tab to=T><TD> 4324<BR><TD> Section 251.4 of the Model Penal Code: Obscenity
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="2corrupt05.law">2corrupt05.law</A> <tab to=T><TD> 16903<BR><TD> Corruption: A Continuing Challenge for Law Enforcement, by Otis E. Cooksey, Military Advisor
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="2developp04.law">2developp04.law</A> <tab to=T><TD> 17004<BR><TD> Developing Police Leadership, by Paul Mansen, Sergeant, Rochester Police
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="3fbipri10.law">3fbipri10.law</A> <tab to=T><TD> 15488<BR><TD> Foreign Counterintelligence: An FBI Priority, by James E. Tomlinson, FBI
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="3polpracp09.law">3polpracp09.law</A> <tab to=T><TD> 4273<BR><TD> Police Practices: Telemarketing Crime Prevention, by David I. Rechenmacher, Illinois Police Department
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="4polprac14.law">4polprac14.law</A> <tab to=T><TD> 9088<BR><TD> Police Practices: Ministers Team With Police to Keep the Peace
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="4pusherp10.law">4pusherp10.law</A> <tab to=T><TD> 17880<BR><TD> The Respectable Pusher, by Jeffrey D. Lane, Office of the Secretary of State, Atlanta
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="5badchecp15.law">5badchecp15.law</A> <tab to=T><TD> 15290<BR><TD> Taking the Bounce Out of Bad Checks, by Vinse J. Gilliam, DA's Office, Ventura Country CA
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="5espion17.law">5espion17.law</A> <tab to=T><TD> 10534<BR><TD> Espionage Awareness Programs, by Freddie L. Capps, Jr. Special Agent, FBI
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="6poview20.law">6poview20.law</A> <tab to=T><TD> 7395<BR><TD> Point of View: Managing for Excellent, by David A. King, Chief of Police, Perkasie Police
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="6resforup20.law">6resforup20.law</A> <tab to=T><TD> 6022<BR><TD> Research Forum: McGruff Robot Teaches Kids
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="7crowdcop22.law">7crowdcop22.law</A> <tab to=T><TD> 11710<BR><TD> Effective Crowd Control, by Steven J. Schmidt, Kentucky Police
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="7drugtes22.law">7drugtes22.law</A> <tab to=T><TD> 12058<BR><TD> The Kentucky State Police Drug Testing Policy, by W. Michael Troop, State Police of Kentucky
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="8civilfop26.law">8civilfop26.law</A> <tab to=T><TD> 24042<BR><TD> Civil Forfeiture: Real Property Used in Drug Trafficking
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="8interro28.law">8interro28.law</A> <tab to=T><TD> 21091<BR><TD> Custodial Interrogation: Impact of Minnick V. Mississippi by Kimberly A. Crawford
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="93dec001.txt">93dec001.txt</A> <tab to=T><TD> 11014<BR><TD> Leadership in the Nineties, by Ronnie Garner, M.P.A.
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="93dec002.txt">93dec002.txt</A> <tab to=T><TD> 10340<BR><TD> Employee Empowerment by Shelia Berglund
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="93dec003.txt">93dec003.txt</A> <tab to=T><TD> 5183<BR><TD> Police Practices: Citizen Advisory Committees by Major Dan Flynn, M.P.A.
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="93dec004.txt">93dec004.txt</A> <tab to=T><TD> 12706<BR><TD> Positive Organizational Culture: A Preactical Approach by Randall Aragon, M.A.
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="93dec005.txt">93dec005.txt</A> <tab to=T><TD> 20150<BR><TD> The Family and Medical Leave Act by Jeffrey Higginbotham, J.D.
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="93jun001.txt">93jun001.txt</A> <tab to=T><TD> 20680<BR><TD> Eyesight Standards: Correcting Myths, by Richard N. Holden, Ph.D.
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="93jun002.txt">93jun002.txt</A> <tab to=T><TD> 8259<BR><TD> The Computer: High-Tech Instrument of Crime by Michael G. Noblett
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="93jun003.txt">93jun003.txt</A> <tab to=T><TD> 11852<BR><TD> Elevator Vandalism Squad by Ronald Welsh
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="93jun004.txt">93jun004.txt</A> <tab to=T><TD> 7200<BR><TD> Police Pracices: Drug Educaiton Saving America's Youth, by Damon Davis
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="93jun005.txt">93jun005.txt</A> <tab to=T><TD> 14677<BR><TD> Police Violence: Addressing the Issue, by Daniel B. Boyle
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="93jun006.txt">93jun006.txt</A> <tab to=T><TD> 5655<BR><TD> Focus on Training: The Americans with Disabilities Act, by John A. Leonard
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="93jun007.txt">93jun007.txt</A> <tab to=T><TD> 34650<BR><TD> Computer Searches and Seizures: Challenges for Investigators, by John Gales Sauls
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="9brief.txt">9brief.txt</A> <tab to=T><TD> 2274<BR><TD> A Legal Brief by Special Agent Jeffrey Higginbotham (Probable Cause Determination)
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="9briefp32.law">9briefp32.law</A> <tab to=T><TD> 2278<BR><TD> Legal Brief by S.A. Jeffrey Migginbotham, Legal Instructor, FBI
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="abouteff.law">abouteff.law</A> <tab to=T><TD> 9090<BR><TD> General Information about the Electronic Frontier Foundation
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="academy10.law">academy10.law</A> <tab to=T><TD> 12379<BR><TD> Citizen Police Academies by Martin Alan Greenberg, Dept. of Criminal Justice, Ulster Community College
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="afis.law">afis.law</A> <tab to=T><TD> 6899<BR><TD> Police Practices: AFIS Technology for Rural States
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="aicnews.html">aicnews.html</A> <tab to=T><TD> 33391<BR><TD> Arizona Identification Council NEwsletter, July, 1990
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="al_lawsta.law">al_lawsta.law</A> <tab to=T><TD> 7521<BR><TD> The Alabama Computer Crime Act, 1985
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="alcor-1">alcor-1</A> <tab to=T><TD> 2506<BR><TD> ALCOR Files Suit Over Electronic Mail Seizure, by David Bloom, Feb 24, 1990
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="alcor-2">alcor-2</A> <tab to=T><TD> 10036<BR><TD> Transcript of Suit by ALCOR
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="alcor-3">alcor-3</A> <tab to=T><TD> 21192<BR><TD> Additional Filings in ALCOR BBS Case
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="alcor-4">alcor-4</A> <tab to=T><TD> 13439<BR><TD> Response of ALCOR Lawyer to Motion Filed
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="alcor-5">alcor-5</A> <tab to=T><TD> 7727<BR><TD> File Round of Motion Filed in Alcor Court Case
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="alcor-6">alcor-6</A> <tab to=T><TD> 4381<BR><TD> The Resolution of the Alcor E-mail privacy Case
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="alcor-7">alcor-7</A> <tab to=T><TD> 14366<BR><TD> Response of William F. Murphy to ALCOR Suit
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="alcor-8">alcor-8</A> <tab to=T><TD> 37303<BR><TD> Bill Submitted in ALCOR BBS Case
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="alcor-9">alcor-9</A> <tab to=T><TD> 10212<BR><TD> Appeal of dismissal in ALCOR BBS Case
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="anarchy.ripco">anarchy.ripco</A> <tab to=T><TD> 273415<BR><TD> The Modern Speeders Guide to Radar and State Troopers, by Exilic Xyth (January 11, 1988)
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="anti-hac.txt">anti-hac.txt</A> <tab to=T><TD> 8315<BR><TD> A Bill Against Hacking, from Emma Nicholson
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="ar_lawsta.law">ar_lawsta.law</A> <tab to=T><TD> 5628<BR><TD> Arkansas Regulations on Computer Crime, 1987
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="arrest.txt">arrest.txt</A> <tab to=T><TD> 10256<BR><TD> Your Rights and What to Do Upon Arrest, by Michael J. Elliott, Criminal Defense Attorney
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="articles.law">articles.law</A> <tab to=T><TD> 146119<BR><TD> Bibliography of Computer Security Articles 1983 through 1988
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="asmp-gui">asmp-gui</A> <tab to=T><TD> 17486<BR><TD> American Society of Magazine Photographers 1991 Copyright Guide
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="az_lawsta.law">az_lawsta.law</A> <tab to=T><TD> 3086<BR><TD> Arizona Computer Crimes Law, 1978
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="babbs001.txt">babbs001.txt</A> <tab to=T><TD> 8498<BR><TD> Anti Federal Agent BBS Protection, by Babbs Boy
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="banking.off">banking.off</A> <tab to=T><TD> 16949<BR><TD> Privacy and Offshore Banking... What the IRS Doesn't Want You to Know! By David Johnson (July 5, 1994)
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="bbs-suit.txt">bbs-suit.txt</A> <tab to=T><TD> 12289<BR><TD> Civial Action No. IP-88 93C: Linda Thompson vs. Bob Predaina
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="bbs_and_">bbs_and_</A> <tab to=T><TD> 58600<BR><TD> The Electronic Pamphlet: Computer Bulletin Boards and the Law by Michael H. Riddle (1990)
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="bbs_law.law">bbs_law.law</A> <tab to=T><TD> 58671<BR><TD> Computer Bulletin Boards and the Law, by Michael M. Riddle (Law Study)
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="bbsdefa.law">bbsdefa.law</A> <tab to=T><TD> 106099<BR><TD> Defamation Liability of Computerized Bulletin Board Operators and Problems of Proof, by John R. Kahn
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="bbslaw.man">bbslaw.man</A> <tab to=T><TD> 40181<BR><TD> Version 1.html - BBS LEGAL GUIDE by Clary and Kraft, 1993
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="bbslaws.txt">bbslaws.txt</A> <tab to=T><TD> 54725<BR><TD> THe Legal Aspects of Telecommunications and Electronic Bulletin Board SYstems, by James J. Spinelli
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="bellraid.txt">bellraid.txt</A> <tab to=T><TD> 12560<BR><TD> The Future of Telecommunications.......
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="bendix.txt">bendix.txt</A> <tab to=T><TD> 20856<BR><TD> Crosley Bendix (Negativland) Discusses The Copyright Act (November 9, 1992)
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="blue.law">blue.law</A> <tab to=T><TD> 27975<BR><TD> Death of the Blue Box, by Full Disclosure, 1991
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="brave.yes">brave.yes</A> <tab to=T><TD> 4352<BR><TD> Smart Brave Lady indicates that we are not Drivers, and therefore do not need a license.
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="caddraft.law">caddraft.law</A> <tab to=T><TD> 7144<BR><TD> Police Practices: Computer Aided Drafting for Law Enforcement
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="candp.law">candp.law</A> <tab to=T><TD> 64505<BR><TD> Crime and Puzzlement by John Perry Barlow
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="candp2.law">candp2.law</A> <tab to=T><TD> 8090<BR><TD> Update on Crime and Puzzlement by John Perry Barlow, 1990
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="cardozo.txt">cardozo.txt</A> <tab to=T><TD> 21349<BR><TD> Some "Property" Problems in a Computer Crime Prosecution by Mike Godwin of the EFF
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="cellmate.law">cellmate.law</A> <tab to=T><TD> 29382<BR><TD> Cellmate Informants: A Constitutional Guide to Their Use, by Kimberly Kingston Crawford, FBI Academy
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="cellmate.txt">cellmate.txt</A> <tab to=T><TD> 29316<BR><TD> Cellmate Informants: A Constitutional Guide to Their Use, by Kimberly Kingston Crawford
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="chomloot.txt">chomloot.txt</A> <tab to=T><TD> 43325<BR><TD> Noam Chomsky writes a letter to Lies Of Our Times, May 1991
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="ciabwash.law">ciabwash.law</A> <tab to=T><TD> 48132<BR><TD> CIA Memorandums on Brainwashing
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="citizen1.txt">citizen1.txt</A> <tab to=T><TD> 94984<BR><TD> Studies in Constitutional Law: A Treatist on American Citizenship by John S. Wise
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="citizen2.txt">citizen2.txt</A> <tab to=T><TD> 31969<BR><TD> Chapter 2: How American Citizenship May be Acquired in the Nation
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="citizen3.txt">citizen3.txt</A> <tab to=T><TD> 43595<BR><TD> Chapter 3: Of the Obligation and Duties of the Citizen to the Nation and the States
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="citizen4.txt">citizen4.txt</A> <tab to=T><TD> 202375<BR><TD> Chapter 4: Of the Rights, Privileges, and Immunities of the Citizen
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="citizen5.txt">citizen5.txt</A> <tab to=T><TD> 122539<BR><TD> Chapter 5: Privileges and Immunities Under the War Amendments
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="citizens.gui">citizens.gui</A> <tab to=T><TD> 94355<BR><TD> A Citizen's Guide on using the Freedom of Information Act and the Privacy Act of 1974 to Request Government Records (July 10, 1991)
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="civil.dis">civil.dis</A> <tab to=T><TD> 63050<BR><TD> Civil Disobedience, by Henry David Thoreau
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="civlib.law">civlib.law</A> <tab to=T><TD> 24676<BR><TD> Civil Liberties in Cyberspace: When does Hacking Turn from an Exercise of Civil Liberties into Crime? By Mitch Kapor, Scientific American, 1991
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="civlrght.txt">civlrght.txt</A> <tab to=T><TD> 15090<BR><TD> Civil Rights Cases and Police Misconduct, by John Epke
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="civlrght14.law">civlrght14.law</A> <tab to=T><TD> 15156<BR><TD> Civil Rights and Police Misconduct, by John Epke and Linda Davis
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="clipper1.asc">clipper1.asc</A> <tab to=T><TD> 13335<BR><TD> Remarks by Bruce Sterling at the Fourth Annual Conference on Computers, Freedom, and Privacy
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="closenet.law">closenet.law</A> <tab to=T><TD> 31990<BR><TD> Closing the Net, by Greg Costikyan (On Operation Sun-Devil)
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="co_lawsta.law">co_lawsta.law</A> <tab to=T><TD> 3697<BR><TD> Colorado Crimes Law,
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="cog_inte.law">cog_inte.law</A> <tab to=T><TD> 18187<BR><TD> Cognitive Interviewing, by Margo Bennett, FBI
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="compacs.txt">compacs.txt</A> <tab to=T><TD> 62976<BR><TD> The Limits of the Law in Restricting Computer Misuse, by Peter Sommer (March 19, 1991)
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="compcrim.txt">compcrim.txt</A> <tab to=T><TD> 13559<BR><TD> Computer Crimes: An Escalating Crime Trend by William S. Sessions
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="compriv.law">compriv.law</A> <tab to=T><TD> 46706<BR><TD> Computer Privacy vs. First and Fourth Amendment Rights, by Michael S. Borella
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="compsent">compsent</A> <tab to=T><TD> 13603<BR><TD> Revised Computer Crime Sentencing Guidelines, from Jack King (1992)
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="compuser">compuser</A> <tab to=T><TD> 9768<BR><TD> What is a Compilation Copyright? The Gospel According to Compuserve (December 3, 1987)
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="compuser.law">compuser.law</A> <tab to=T><TD> 9839<BR><TD> Compuserve's Position: What is a Compilation Copyright?
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="computer.cri">computer.cri</A> <tab to=T><TD> 101985<BR><TD> Computer Crime: Current Practices, Problems and Proposed Solutions, Second Draft, Brian J. Peretti
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="confess.law">confess.law</A> <tab to=T><TD> 15893<BR><TD> Why Suspects Confess, by David D. Tousignant, Inspector, Lowell Massachusetts
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="confess.txt">confess.txt</A> <tab to=T><TD> 15834<BR><TD> Why Suspects Confess, by David D. Tousignant
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="consoli.law">consoli.law</A> <tab to=T><TD> 17512<BR><TD> Public Services Consolidation: The Answer to your Community's Needs, by Robert L. Sobba, Chief of Police, Idaho Police
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="const_in.cyb">const_in.cyb</A> <tab to=T><TD> 47714<BR><TD> Laurence H. Tribe, "The Constitution in Cyberspace"
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="copr.txt">copr.txt</A> <tab to=T><TD> 35200<BR><TD> How to Copyright Software, by Locus, Inc. (1990)
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="cops">cops</A> <tab to=T><TD> 19373<BR><TD> If YOu Have to Ask, Get Out of the Way, by Chuck Milland
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="cops.txt">cops.txt</A> <tab to=T><TD> 22258<BR><TD> Why Cops Hate You: If You Have to Ask, Get Out of the Way
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="copstamp.txt">copstamp.txt</A> <tab to=T><TD> 5209<BR><TD> Police Tampering: How Often and Where, by Alan Deshowitz
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="coptalk.txt">coptalk.txt</A> <tab to=T><TD> 3509<BR><TD> Don't Talk to Cops, by Robert W. Zeuner, Member of the New York State Bar
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="copy.txt">copy.txt</A> <tab to=T><TD> 10702<BR><TD> Software and Copyrights: Registration, Notice and Why by Charles B. Kramer (January 8, 1992)
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="copyr">copyr</A> <tab to=T><TD> 29718<BR><TD> Copyright Information, by Inez Harrison
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="copyrigh.txt">copyrigh.txt</A> <tab to=T><TD> 3949<BR><TD> Legal Brief: Software Copyright Law (December 1985)
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="copyrit1.law">copyrit1.law</A> <tab to=T><TD> 6569<BR><TD> Copyrights and Computer Software: An Introduction, by Sam Kitterman, Jr.
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="copyrit2.law">copyrit2.law</A> <tab to=T><TD> 7671<BR><TD> Copyrights and Computer Software: Part II, by Sam Kitterman, Jr.
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="copyrit3.law">copyrit3.law</A> <tab to=T><TD> 10500<BR><TD> Copyrights and Computer Software: Part III, by Sam Kitterman, Jr.
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="copyrit4.law">copyrit4.law</A> <tab to=T><TD> 7459<BR><TD> Copyrights and Computer Software: Part IV, by Sam Kitterman, Jr.
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="copyrit5.law">copyrit5.law</A> <tab to=T><TD> 8454<BR><TD> Copyrights and Computer Software: Part V, by Sam Kitterman, Jr.
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="copyrite.c64">copyrite.c64</A> <tab to=T><TD> 11596<BR><TD> Commodore's Extremely Silly Liscence for Workbench 1.3.2
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="copyrite.doc">copyrite.doc</A> <tab to=T><TD> 4352<BR><TD> Copyright Information for Computer Software Hacks from June B. Moore
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="copyrite.inf">copyrite.inf</A> <tab to=T><TD> 5888<BR><TD> Answering Some Questions about the Ditribution of Public Domain Software by Ron Fowler (April 12, 1984)
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="copyrite.law">copyrite.law</A> <tab to=T><TD> 47252<BR><TD> Large Overview of American Copyright Law
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="copyrite.txt">copyrite.txt</A> <tab to=T><TD> 23296<BR><TD> Copyright Law from Jordan J. Breslow (February 13, 1986)
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="copyrt.txt">copyrt.txt</A> <tab to=T><TD> 35833<BR><TD> Copyright law and Liscence Law as Applies to Computer Software
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="copyso.txt">copyso.txt</A> <tab to=T><TD> 7534<BR><TD> Software and Copyrights: Registeration, Notice and Why by Charles B. Kramer, Esq. (September 25, 1991)
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="correct.txt">correct.txt</A> <tab to=T><TD> 11036<BR><TD> The Principle of Correct Absue
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="couriers.txt">couriers.txt</A> <tab to=T><TD> 25253<BR><TD> Detaining Suspected Drug Couriers: Recent Court Decisions
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="couriersp27.law">couriersp27.law</A> <tab to=T><TD> 25319<BR><TD> Detaining Suspected Drug Couriers: Recent Court Decisions, by William U. McCormack, Special Agent, FBI Academy
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="court.law">court.law</A> <tab to=T><TD> 43260<BR><TD> The Transcript of Craig Neidorf's Trial
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="court.txt">court.txt</A> <tab to=T><TD> 7683<BR><TD> Disorder in the Court! (Funny Court Transcripts)
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="cright3.txt">cright3.txt</A> <tab to=T><TD> 12068<BR><TD> Copyrighting Public Domain Programs by June B. Moore, JD
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="crime.txt">crime.txt</A> <tab to=T><TD> 26658<BR><TD> The Grolier Electronic Encyclopedia Definition of Crime
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="crimecatalog.cmp">crimecatalog.cmp</A> <tab to=T><TD> 463516<BR><TD> The Crimefighters' Catalog of Special Purpose Books and Videos
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="crimefighter.cmp">crimefighter.cmp</A> <tab to=T><TD> 714942<BR><TD> The Crimefighters Compilation
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="crimeftr.000">crimeftr.000</A> <tab to=T><TD> 7079<BR><TD> Table of Contents and Quick Tutorial
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="crimeftr.002">crimeftr.002</A> <tab to=T><TD> 17723<BR><TD> Why Police Can't Cope, and The Need for CrimeFighters
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="crimeftr.003">crimeftr.003</A> <tab to=T><TD> 15130<BR><TD> Crime Stoppers and We-Tip's Formula for Rewards
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="crimeftr.004">crimeftr.004</A> <tab to=T><TD> 8493<BR><TD> Catch-all Reward Law: $25,000 - All Felonies, All States
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="crimeftr.005">crimeftr.005</A> <tab to=T><TD> 20017<BR><TD> Fines & Forfeiture Laws: 50% Paid to CrimeFighters!
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="crimeftr.006">crimeftr.006</A> <tab to=T><TD> 40146<BR><TD> Misdemeanors and Do-It-Yourself Lawsuits
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="crimeftr.007">crimeftr.007</A> <tab to=T><TD> 22381<BR><TD> Qui Tam Law: Be the Prosecutor - Control Plea Bargaining
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="crimeftr.008">crimeftr.008</A> <tab to=T><TD> 24285<BR><TD> Civil & Criminal RICO Laws
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="crimeftr.009">crimeftr.009</A> <tab to=T><TD> 30886<BR><TD> Drunk Driver Terminators (D.D.T.) Patrols - to Get Started
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="crimeftr.010">crimeftr.010</A> <tab to=T><TD> 29385<BR><TD> Drug Laws & Drug Wars - Unlimited Business Opportunities
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="crimeftr.011">crimeftr.011</A> <tab to=T><TD> 46642<BR><TD> Polluter Tooters: Anti-Pollution laws, MEGABUCK Rewards
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="crimeftr.012">crimeftr.012</A> <tab to=T><TD> 17812<BR><TD> Terrorists, Assassins, and Police Corruption
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="crimeftr.013">crimeftr.013</A> <tab to=T><TD> 23155<BR><TD> Bounty Hunters, Bail Bond Agents and Skip Tracers
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="crimeftr.014">crimeftr.014</A> <tab to=T><TD> 29522<BR><TD> U.S. Customs/Coast Guard Laws, Mechanics' Laws
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="crimeftr.015">crimeftr.015</A> <tab to=T><TD> 23075<BR><TD> Post Office Rewards, Scams, Cons, Frauds
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="crimeftr.016">crimeftr.016</A> <tab to=T><TD> 34324<BR><TD> Wildlife Protection/Poaching, Conservationists Laws
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="crimeftr.017">crimeftr.017</A> <tab to=T><TD> 28625<BR><TD> National Forests (Vandalism, Pot Growing, other laws)
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="crimeftr.018">crimeftr.018</A> <tab to=T><TD> 33379<BR><TD> Wiretap and Blackmail Laws & Rewards for CrimeFighters
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="crimeftr.019">crimeftr.019</A> <tab to=T><TD> 22056<BR><TD> Misc Rewards for This and That (Dozens of them)
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="crimeftr.020">crimeftr.020</A> <tab to=T><TD> 9940<BR><TD> State Reward Laws
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="crimeftr.021">crimeftr.021</A> <tab to=T><TD> 15252<BR><TD> Crime Information, Your Right to Withhold for Rewards
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="crimeftr.022">crimeftr.022</A> <tab to=T><TD> 45203<BR><TD> Citizen Arrests - What you Need to Know
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="crimeftr.023">crimeftr.023</A> <tab to=T><TD> 19144<BR><TD> High Speed Pursuits - Unlike Smokey and the Bandit!
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="crimeftr.024">crimeftr.024</A> <tab to=T><TD> 19490<BR><TD> Rules of Evidence - Entrapment Explained
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="crimeftr.025">crimeftr.025</A> <tab to=T><TD> 17904<BR><TD> Where to Get CrimeFighter Training
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="crimeftr.026">crimeftr.026</A> <tab to=T><TD> 23422<BR><TD> High Tech Tools of the Trade - Where to Get Them
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="crimeftr.027">crimeftr.027</A> <tab to=T><TD> 25320<BR><TD> Problems with Prosecutors and Plea Bargaining
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="crimeftr.028">crimeftr.028</A> <tab to=T><TD> 18991<BR><TD> How to Calculate Rewards, Proposed CrimeFighters Reward Law
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="crimeftr.029">crimeftr.029</A> <tab to=T><TD> 16496<BR><TD> CrimeFighters International, Inc. Membership info.
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="crimeftr.030">crimeftr.030</A> <tab to=T><TD> 4828<BR><TD> Membership Application
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="criminal.law">criminal.law</A> <tab to=T><TD> 17091<BR><TD> Criminal Informants: An Administrator's Dream or Nightmare? By Harry A. Mount, Jr.
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="criminal.txt">criminal.txt</A> <tab to=T><TD> 17025<BR><TD> Criminal Informants: An Administrator's Dream or Nightmare? By Harry A. Mount, Jr.
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="cripple.txt">cripple.txt</A> <tab to=T><TD> 2387<BR><TD> The Experience of a Shareware Author by Frank Bell of NEWKEY
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="cryptlaw">cryptlaw</A> <tab to=T><TD> 12456<BR><TD> Crypto-Law Survey by Bert-Jaap Koops (July, 1995)
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="csa87.law">csa87.law</A> <tab to=T><TD> 27719<BR><TD> National Act on Computer Crime, Act 100-235
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="csbylaws.law">csbylaws.law</A> <tab to=T><TD> 27217<BR><TD> By-Laws of the Communications Security Association, Inc.
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="cslaw.law">cslaw.law</A> <tab to=T><TD> 14407<BR><TD> Computer Security And the Law, by Gary S. Morris
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="ct_lawsta.law">ct_lawsta.law</A> <tab to=T><TD> 10096<BR><TD> Computer-Related Offenses from the Connecticut General Statutes
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="cyberlaw.law">cyberlaw.law</A> <tab to=T><TD> 21266<BR><TD> Cyberspace and the Legal Matrix: Laws or Confusion?
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="cyblaw.txt">cyblaw.txt</A> <tab to=T><TD> 22150<BR><TD> Cyberspace and the Legal Matrix: Laws or Confusion?
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="cybspace.txt">cybspace.txt</A> <tab to=T><TD> 21027<BR><TD> Cyberspace and the Legal Matrix: Laws or Confusion?
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="cycrime0.txt">cycrime0.txt</A> <tab to=T><TD> 28434<BR><TD> Emmanuel Goldstein on the E911 Affair
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="dblaw.txt">dblaw.txt</A> <tab to=T><TD> 33393<BR><TD> Legal Protection of Computer Databases, by Ralph C. Losey
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="define.stb">define.stb</A> <tab to=T><TD> 8490<BR><TD> Definitions of Legal Terms
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="deflib.bbs">deflib.bbs</A> <tab to=T><TD> 103794<BR><TD> Defamation Liability of Computerized BBS Operators and Problems of Proof by John R. Kahn
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="delibera.leb">delibera.leb</A> <tab to=T><TD> 23079<BR><TD> Deliverate Indifference: The Standard for Municipal and Supervisory Liability by Michael Callahan
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="denning">denning</A> <tab to=T><TD> 58773<BR><TD> Concerning Hackers Who Break into Computer Systems, by Dorothy Denning, October 1st, 1990
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="dennis_h">dennis_h</A> <tab to=T><TD> 76080<BR><TD> The Price of Copyright Violation from Dennis Jayes
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="dial911.die">dial911.die</A> <tab to=T><TD> 26086<BR><TD> Dial 911 and Die by Aaron Zelman and Jay Simkin (December 15, 1992)
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="dir_mesgp01.law">dir_mesgp01.law</A> <tab to=T><TD> 3432<BR><TD> Director's Message, May 1991, by William S. Sessions, FBI
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="disabil25.law">disabil25.law</A> <tab to=T><TD> 34116<BR><TD> The Americans With Disabilities Act, by Jeffrey Higginbotham, FBI
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="disaster.law">disaster.law</A> <tab to=T><TD> 17512<BR><TD> Disaster Operations: Not Business as Usual, by Michael Guerin, Governor's Office, Ontario, California
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="disclaim.txt">disclaim.txt</A> <tab to=T><TD> 4911<BR><TD> An Example Set of Disclaimers, Rules and Regulations
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="disk-fee.txt">disk-fee.txt</A> <tab to=T><TD> 9087<BR><TD> The Great "Disk Fee" Fallacy for Public Software Distribution
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="dispatch.law">dispatch.law</A> <tab to=T><TD> 5902<BR><TD> Point of View: Dispatching Units: Improvements for the First List, by Bob Blankenship, Chief, Redding, California Police
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="dmessage.law">dmessage.law</A> <tab to=T><TD> 3883<BR><TD> Director's Message, April 1991, by William S. Sessions, FBI
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="dmessage.leb">dmessage.leb</A> <tab to=T><TD> 3505<BR><TD> Director's Message: Police and Citizens Working Together by William Sessions
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="doggie.txt">doggie.txt</A> <tab to=T><TD> 25984<BR><TD> The Great American Dog Trial Vendetta by P. Remington Adams (1991)
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="domestiv.law">domestiv.law</A> <tab to=T><TD> 24459<BR><TD> Domestic Violence: When do Police Have a Constitutional Duty to Protect? by Daniel L. Schofield, FBI
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="downtime.bul">downtime.bul</A> <tab to=T><TD> 806<BR><TD> Example of a Policy Regarding BBS Downtime
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="drivers.law">drivers.law</A> <tab to=T><TD> 3462<BR><TD> Research Forum Survey Results: Driver License Suspension programs
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="driving.bar">driving.bar</A> <tab to=T><TD> 49544<BR><TD> The (Almost) Definitive Answer to Driving Barefoot in America (1994)
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="drugdiv.txt">drugdiv.txt</A> <tab to=T><TD> 13651<BR><TD> Pharmaceutical Diversion and Abuse: Our Nation's Other Drug Problem, by Thomas C. Babicke
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="drugdivp01.law">drugdivp01.law</A> <tab to=T><TD> 13717<BR><TD> Pharmaceutical Diversion and Abuse: Our Nation's Other Drug Problem, by Thomas C. Babicke, DEA, Virginia
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="drugtest.txt">drugtest.txt</A> <tab to=T><TD> 13065<BR><TD> Drug Abuse and Testing in Law Enforcement: No Easy Answers, by Andrew J. Harvey
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="drugtestp12.law">drugtestp12.law</A> <tab to=T><TD> 13131<BR><TD> Drug Abuse and Testing in Law Enforcement: No Easy Answers by Andrew J. Harvey, Sergeant, California Police
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="dunnel.txt">dunnel.txt</A> <tab to=T><TD> 3708<BR><TD> The Dunne Act Introduced in NY for Computer BBSes (May 15, 1989)
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="e-law.txt">e-law.txt</A> <tab to=T><TD> 203190<BR><TD> E-Law: legal Issues Affecting Computer Information Systems and System operator Liability, by David J. Loundy
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="ecpa.lay">ecpa.lay</A> <tab to=T><TD> 10286<BR><TD> The Electronics Communications Privacy Act of 1986, a Layman's View by Michael H. Riddle
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="ecpa1law.law">ecpa1law.law</A> <tab to=T><TD> 40796<BR><TD> Electronic Communication Privacy Act: Chapter 119
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="ecpa2law.law">ecpa2law.law</A> <tab to=T><TD> 34493<BR><TD> Electronic Communication Privacy Act: Part II
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="ecpa3law.law">ecpa3law.law</A> <tab to=T><TD> 33464<BR><TD> Electronic Communication Privacy Act: Part III
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="ecpalay.law">ecpalay.law</A> <tab to=T><TD> 10524<BR><TD> The Electronic Communications Privacy Act of 1986: A Layman's View, by Michael M. Riddle
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="edwards.law">edwards.law</A> <tab to=T><TD> 25695<BR><TD> Edwards vs. State Farm Insurance
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="edwards_">edwards_</A> <tab to=T><TD> 11517<BR><TD> The Processes by which the Secret Service Investigates Computer Crimes
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="eff-righ.txt">eff-righ.txt</A> <tab to=T><TD> 31722<BR><TD> Legal Overview: The Electronic Frontier and the Bill of Rights (July 10, 1990)
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="eff.law">eff.law</A> <tab to=T><TD> 69535<BR><TD> The Founder of the Electronic Frontier Foundation get back to you about Their Plans
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="eff.txt">eff.txt</A> <tab to=T><TD> 42240<BR><TD> The Foundation of the Electronic Frontier Foundation (July 10, 1990)
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="effbor.law">effbor.law</A> <tab to=T><TD> 13014<BR><TD> Legal Overview: The Electronic Frontier and the Bill of Rights
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="effss.law">effss.law</A> <tab to=T><TD> 35098<BR><TD> Civil Liberties Implications of Computer Search and Seizures: Some Proposed Guidelines for Magistrates Who Issue Search Warrants
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="elbarasn.html07">elbarasn.html07</A> <tab to=T><TD> 14592<BR><TD> Electronic Bar Association Announced by Paul Bernstein
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="elec_bbs.law">elec_bbs.law</A> <tab to=T><TD> 12761<BR><TD> Electronic Bulletin Boards: A New Resource for Law Enforcement by Seth Jacobs, SEARCH Group
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="electrif.law">electrif.law</A> <tab to=T><TD> 56463<BR><TD> Electrifying Speech: New Communications Technologies and Traditional Civil Liberties
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="email">email</A> <tab to=T><TD> 21657<BR><TD> Some Policies on Electronic Mail: A Summary by Todd Hooper
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="email_pr">email_pr</A> <tab to=T><TD> 19636<BR><TD> Computer Electronic Mail and Privacy: The Law, by Ruel T. Hernandez, January 11, 1987
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="emailpri.law">emailpri.law</A> <tab to=T><TD> 14786<BR><TD> Overview of the Employee Privacy Laws as Currently Apply
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="emailprv.law">emailprv.law</A> <tab to=T><TD> 5801<BR><TD> Bibliography on Law and Computers
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="embezzle.law">embezzle.law</A> <tab to=T><TD> 12290<BR><TD> Bank Employee Embezzlement by Denise M. Dube, LA DA
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="employleb.law">employleb.law</A> <tab to=T><TD> 20142<BR><TD> Employee Development Programs, by John L. Pape, Chief of Police
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="entrapmtdoc.law">entrapmtdoc.law</A> <tab to=T><TD> 10624<BR><TD> The Defense of Entrapment as it Applies to Bulletin Board System Operators, by Randy B. Singer, Esq.
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="envhook.txt">envhook.txt</A> <tab to=T><TD> 59071<BR><TD> The Environmental Movement and the Value of "Moderation" by Brian K. Yoder (1992)
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="ep_forum.law">ep_forum.law</A> <tab to=T><TD> 10665<BR><TD> The Environmental Protection Forum, by Michael A. O'Brien, Start Attorney Office, Florida.
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="ethics.law">ethics.law</A> <tab to=T><TD> 13373<BR><TD> Point of View: Rededicating Ourselves to Leadership and Ethics in Law Enforcement, by Vane. R. King, Flint Michigan Police Department
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="ethics.txt">ethics.txt</A> <tab to=T><TD> 8140<BR><TD> Ethics for BBS Users
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="fbi">fbi</A> <tab to=T><TD> 27677<BR><TD> Excerpts from the FBI & Your BBS (From Ripco)
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="fbi-miss.txt">fbi-miss.txt</A> <tab to=T><TD> 2678<BR><TD> The FBI Mission Statement
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="fbi_mail.txt">fbi_mail.txt</A> <tab to=T><TD> 3652<BR><TD> Appeal Filed in Todd Patterson v FBI Case (July 26, 1989)
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="fbiaug01.law">fbiaug01.law</A> <tab to=T><TD> 19065<BR><TD> Accreditation: A Small Department's Experience by Raymond E. Arthurs, Chief, Willowbrook Police
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="fbiaug02.law">fbiaug02.law</A> <tab to=T><TD> 16027<BR><TD> Odometer Rollback Schemes, by James E. Scripture, Special Agent, FBI, Boston Massachusetts
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="fbiaug03.law">fbiaug03.law</A> <tab to=T><TD> 4768<BR><TD> Police Practices: Custom's BET Program
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="fbiaug04.law">fbiaug04.law</A> <tab to=T><TD> 14228<BR><TD> The Tactical Incident: A Total Police Response by Nicholas F. Kaiser, MA, Troy Police
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="fbiaug05.law">fbiaug05.law</A> <tab to=T><TD> 9910<BR><TD> A New Approach to FTO Training by Blair Rankin, North Carolina Police
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="fbiaug06.law">fbiaug06.law</A> <tab to=T><TD> 8248<BR><TD> Focus on NCIC: Identifying the Unidentified
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="fbiaug07.law">fbiaug07.law</A> <tab to=T><TD> 26013<BR><TD> The Federal Grand Jry: Exceptions to the Rule of Secrecy (Part I)
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="fbijul01.law">fbijul01.law</A> <tab to=T><TD> 14832<BR><TD> Lateral Entry: A Move Toward the Future, by J. Eddie Nix, Leut. Cobb County, Georgia Police
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="fbijul02.law">fbijul02.law</A> <tab to=T><TD> 23307<BR><TD> Confronting the Terrorist Hostage Taker, by G. Dwayne Fuselier, FBI
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="fbijul03.law">fbijul03.law</A> <tab to=T><TD> 5432<BR><TD> Police Practices: Bomb Dog Teams
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="fbijul04.law">fbijul04.law</A> <tab to=T><TD> 12651<BR><TD> Campus Security: The Mule Patrol, by James A Huff, Central Missouri State University Campus Police
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="fbijul05.law">fbijul05.law</A> <tab to=T><TD> 15216<BR><TD> The Forensic Anthropologist, by Robert W. Mann, MA, Smithsonian Institution
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="fbijul06.law">fbijul06.law</A> <tab to=T><TD> 3305<BR><TD> Focus on Crime Prevention: Business and Government Working Together
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="fbijul07.law">fbijul07.law</A> <tab to=T><TD> 23458<BR><TD> Anticipatory Search Warrants, by A. Louis DiPietro, FBI
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="fbijun01.law">fbijun01.law</A> <tab to=T><TD> 13907<BR><TD> The Yardies: England's Emerging Crime Problem, by Roy A. C. Ramm, Detective Chief Superintendent, London England
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="fbijun02.law">fbijun02.law</A> <tab to=T><TD> 3243<BR><TD> Focus on Forensics: Latent Shoeprint Analysis
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="fbijun03.law">fbijun03.law</A> <tab to=T><TD> 9597<BR><TD> Towing Companies: Friends or Foes? By Michael C. Gillo, Attorney's Office, Ft. Lauderdale, Florida
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="fbijun04.law">fbijun04.law</A> <tab to=T><TD> 4594<BR><TD> Police Practices: The Nelson-Denny Experiment
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="fbijun05.law">fbijun05.law</A> <tab to=T><TD> 15473<BR><TD> Facility Planning In Colorado: Form Vs. Function by James D. Munger, Colorado Springs
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="fbijun06.law">fbijun06.law</A> <tab to=T><TD> 7208<BR><TD> Records Management in the 1990s by Daniel L. Arkenau
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="fbijun07.law">fbijun07.law</A> <tab to=T><TD> 9548<BR><TD> Research Forum: FBINA Graduate Survey
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="fbijun08.law">fbijun08.law</A> <tab to=T><TD> 7980<BR><TD> B.L.O.C.: Business Leaders Against Organized Crime, by Mike King, Administrative Assistant, Weber County, UT Attorney's Office
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="fbijun09.law">fbijun09.law</A> <tab to=T><TD> 24198<BR><TD> DNA Testing and the Frye Standard, by Robert A. Fiatal, FBI
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="fbitop10.hum">fbitop10.hum</A> <tab to=T><TD> 3926<BR><TD> FBI Top Ten Countdown, January, 1986
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="feb01.law">feb01.law</A> <tab to=T><TD> 15673<BR><TD> Privitization of Prisons: Fad or Future, by Lt. David K. Burright, Linn County Sheriff's Office, Albany, OR
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="feb02.law">feb02.law</A> <tab to=T><TD> 9169<BR><TD> The Administrative Warning Ticket Program by Lt. Andrew J. Barto, Romeoville, IL
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="feb03.law">feb03.law</A> <tab to=T><TD> 3524<BR><TD> Arson Investigations by William A. Tobin, FBI Laboratory
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="feb04.law">feb04.law</A> <tab to=T><TD> 21880<BR><TD> The Criminal Behavior of the Serial Rapist, by Robert R. Hazelwood, MS, Behavioral Science Instruction/Research Unit
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="feb05.law">feb05.law</A> <tab to=T><TD> 5964<BR><TD> Large Vehicle Stops
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="feb06.law">feb06.law</A> <tab to=T><TD> 10325<BR><TD> Critical Incident Stress Debriefing
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="feb07.law">feb07.law</A> <tab to=T><TD> 31199<BR><TD> Foriegn Searches and the Fourth Amendment, by Austin A Andersen, LL.B>, FBI
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="feb08.law">feb08.law</A> <tab to=T><TD> 5297<BR><TD> Florida's Computer Crime
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="fed_lawsta.law">fed_lawsta.law</A> <tab to=T><TD> 8535<BR><TD> Federal Computer Crimes Law, 1984/1986
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="fedbbs3.lst">fedbbs3.lst</A> <tab to=T><TD> 6478<BR><TD> Federal Public Access Bulletin Boards, March 1989
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="fedcompseize.txt">fedcompseize.txt</A> <tab to=T><TD> 315003<BR><TD> The Federal Computer Seizure Guidelines (1994)
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="federal.leb">federal.leb</A> <tab to=T><TD> 24029<BR><TD> The Federal Grand Jury: Exceptions to the Rule of Secrecy (Part II) by Austin A. Anderson
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="fencesp06.law">fencesp06.law</A> <tab to=T><TD> 15145<BR><TD> ROP-ing In Fences, by James Rainum, Officer, Repeat Offender Project, Washington DC
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="fija.txt">fija.txt</A> <tab to=T><TD> 9501<BR><TD> A New Hope for Freedom: Fully Inform Jurors by Don Diog
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="fija02.txt">fija02.txt</A> <tab to=T><TD> 6668<BR><TD> If You're Called for Jury Duty, by Don Doig
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="files.tut">files.tut</A> <tab to=T><TD> 2360<BR><TD> File Transfer Liability
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="finalmo.txt">finalmo.txt</A> <tab to=T><TD> 24624<BR><TD> An Attempt to Modify Phone Rules for BBS Lines by Missouri, 1992
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="fl_lawsta.law">fl_lawsta.law</A> <tab to=T><TD> 8475<BR><TD> Florida Computer Crimes Act, 1978
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="foia-pa.txt">foia-pa.txt</A> <tab to=T><TD> 162806<BR><TD> A Citizen's Guide on Using the Freedom of Information Act and the Privacy Act of 1974 to Request Government Records (September 20, 1991)
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="foia.txt">foia.txt</A> <tab to=T><TD> 30272<BR><TD> Using the Freedom of Information Act
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="foiacit.txt">foiacit.txt</A> <tab to=T><TD> 92726<BR><TD> A Citizen's Guide to using the Using the Freedom of Information Act and the Privacy Act of 1974 to Request Government Records (July 10, 1991)
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="forbes.txt">forbes.txt</A> <tab to=T><TD> 5241<BR><TD> A Little Perspective, Please, by Mitchell Kapor of the EFF (June 21, 1993)
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="forenp11.law">forenp11.law</A> <tab to=T><TD> 12226<BR><TD> The FBI's Forensic DNA Analysis Program, by Jay V. Miller, FBI
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="funny.txt">funny.txt</A> <tab to=T><TD> 17655<BR><TD> Very Large Rant and Sales Pitch about Paper Money Being Evil
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="ga_lawsta.law">ga_lawsta.law</A> <tab to=T><TD> 7868<BR><TD> The Georgia Computer Crimes Law
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="grandjur.txt">grandjur.txt</A> <tab to=T><TD> 25954<BR><TD> The Federal Grand Jury: Exceptions to the Rule of Secrecy by Austin A Andersen
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="gunshot.txt">gunshot.txt</A> <tab to=T><TD> 11888<BR><TD> Gunshot Primer Residue: The Invisible Clue by Roger W. Aaron
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="gunshotp19.law">gunshotp19.law</A> <tab to=T><TD> 11954<BR><TD> Gunshot Primer Residue: The Invisible Clue, by Roger W. Aaron, FBI Laboratory
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="gvtscrcy.txt">gvtscrcy.txt</A> <tab to=T><TD> 3328<BR><TD> The Government's Mania for Secrecy, 1987
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hackers0.law">hackers0.law</A> <tab to=T><TD> 464<BR><TD> Introduction to the San Luis Obispo Incident
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hackers1.law">hackers1.law</A> <tab to=T><TD> 5653<BR><TD> Amateur Hackers Tripped Up, by Danna Dykstra Coy
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hackers2.law">hackers2.law</A> <tab to=T><TD> 6889<BR><TD> Computer Case Takes a Twist, by Danna Dykstra Coy
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hackers3.law">hackers3.law</A> <tab to=T><TD> 2883<BR><TD> Hackers Off Hook, Property Returned, by Danna Dykstra Coy
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hackers4.law">hackers4.law</A> <tab to=T><TD> 8012<BR><TD> A Case for Mistaken Identity... Who's Privacy Was Really Invaded?
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hakharas.txt">hakharas.txt</A> <tab to=T><TD> 4186<BR><TD> Hackers and the Authorities: A Question of Harassment, as Seen in an Article from a Recent Newspaper on November 15, 1992
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="handbook.txt">handbook.txt</A> <tab to=T><TD> 74752<BR><TD> What You Should Know if You're Accused of a Crime by Joyce B. David Esq.
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hategrou.law">hategrou.law</A> <tab to=T><TD> 13409<BR><TD> hate Violence In the United States, by Floyd I. Clarke, FBI
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hategrou.txt">hategrou.txt</A> <tab to=T><TD> 13345<BR><TD> Hate Violence in the United States, by Floyd I. Clarke
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hi_lawsta.law">hi_lawsta.law</A> <tab to=T><TD> 7266<BR><TD> Hawaii Computer Crimes Law, 1984
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hightech.law">hightech.law</A> <tab to=T><TD> 14116<BR><TD> A Low Cost Approach to High Technology, by Mark Clark, Lt. South Portland, ME Police
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hightech.txt">hightech.txt</A> <tab to=T><TD> 14103<BR><TD> A Low Cost Approach to High Technology by Lt. Mark Clark
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="homeless.law">homeless.law</A> <tab to=T><TD> 16425<BR><TD> Police and the Homeless, by Barney Melekian, Lt. Santa Monica, California Police
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="homeless.txt">homeless.txt</A> <tab to=T><TD> 16418<BR><TD> Police and the Homeless by Barney Melekian
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hostage.law">hostage.law</A> <tab to=T><TD> 25433<BR><TD> Hostage/Barricade Incidents: High Risk Factors and the Action Criteria by G. Dwayne Fuselier
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hostage.txt">hostage.txt</A> <tab to=T><TD> 25367<BR><TD> Hostage/Barricade Incidents: High Risk Factors and the Action Criteria by G. Drawyne Fuselier
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hostaker.txt">hostaker.txt</A> <tab to=T><TD> 23235<BR><TD> Confronting the Terrorist Hostage Taker by G. Dwayne Fuselier
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hotel.law">hotel.law</A> <tab to=T><TD> 6493<BR><TD> Police Practices: Operation Hotel-Motel
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="howtobeattheirs.txt">howtobeattheirs.txt</A> <tab to=T><TD> 10834<BR><TD> Tax Resistance Primer: How to Beat the IRS
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="howtosel.txt">howtosel.txt</A> <tab to=T><TD> 4224<BR><TD> Making Shareware Pay, by Gary Raymond
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="ia_lawsta.law">ia_lawsta.law</A> <tab to=T><TD> 7233<BR><TD> Iowa Computer Crimes Law, 1984
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="id_lawsta.law">id_lawsta.law</A> <tab to=T><TD> 3358<BR><TD> The Idaho Computer Crimes Law, 1982
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="ident.txt">ident.txt</A> <tab to=T><TD> 20441<BR><TD> Identification: A Move Towards the Future by Bruce J. Brotman
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="identp01.law">identp01.law</A> <tab to=T><TD> 20508<BR><TD> Identification: A Move Towards the Future, by Brice J. Brotman
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="il_lawsta.law">il_lawsta.law</A> <tab to=T><TD> 10564<BR><TD> The Illinois Computer Crimes Law, 1981/1987
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="in_lawsta.law">in_lawsta.law</A> <tab to=T><TD> 2091<BR><TD> The Indiana Computer Tampering Law, 1986
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="intrundg.txt">intrundg.txt</A> <tab to=T><TD> 18096<BR><TD> An Introduction to the Computer Underground, by The Butler (February 26, 1991)
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="invbasic.law">invbasic.law</A> <tab to=T><TD> 12444<BR><TD> Environmental Crimes: Investigative Basics, by Martin Wright, Dept. Assistant Director, EPA
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="invbasic.txt">invbasic.txt</A> <tab to=T><TD> 12378<BR><TD> Environmental Crimes: Investigative Basics by Martin Wright
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="irs-20q.txt">irs-20q.txt</A> <tab to=T><TD> 14464<BR><TD> IRS and Business Taxpayers Disagree Over Who Should be Considered Employees: Why, Results, Solutions
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="jan01.law">jan01.law</A> <tab to=T><TD> 2790<BR><TD> Director's Message: Facing the Future, by William S. Sessions, Director, FBI
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="jan02.law">jan02.law</A> <tab to=T><TD> 16437<BR><TD> The Future of Law Enforcement: Dangerous and Different, by Alvin and Heidi Toffler
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="jan03.law">jan03.law</A> <tab to=T><TD> 28766<BR><TD> The Changing Face of America, by Robert C. Trojanowicz, Ph.D.
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="jan04.law">jan04.law</A> <tab to=T><TD> 24159<BR><TD> The Future of Policing, by William l. Tafoyna, Ph.D.
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="jan05.law">jan05.law</A> <tab to=T><TD> 20355<BR><TD> Public Law Enforcement/Private Security: A New Partnership? By Terrence J. Mangan
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="jan06.law">jan06.law</A> <tab to=T><TD> 17733<BR><TD> A Look Ahead: Views of Tomorrow's FBI, by Richard Sonnichsen
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="jan07.law">jan07.law</A> <tab to=T><TD> 19135<BR><TD> Tomorrow's America: Law Enforcement's Coming Challenge, by Rob McCord
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="jobhome.law">jobhome.law</A> <tab to=T><TD> 19064<BR><TD> Taking the Job Home, by Richard N. Southworth, Attorney General's Office, Virginia
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="joint-cu.art">joint-cu.art</A> <tab to=T><TD> 12288<BR><TD> Joint Custody: A Simplistic Solution by Robert D. Felner and Lisa Terre
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="joyce">joyce</A> <tab to=T><TD> 61696<BR><TD> Beyond the Orality/Literacy Dichotomy: James Joyce and the pre-History of Cyberspace by Donald F. Theall (May 1992)
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="judna.txt">judna.txt</A> <tab to=T><TD> 27647<BR><TD> Judicial Acceptance of DNA Profiling by John T. Sylvester and John H. Stafford
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="judnap26.law">judnap26.law</A> <tab to=T><TD> 27713<BR><TD> Judicial Acceptance of DNA Profiling, by John T. Sylvester, J.D.
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="judseal.txt">judseal.txt</A> <tab to=T><TD> 22490<BR><TD> The Judicial Sealing Requirement in Electronic Surveillance: A Matter of Immediacy by Robert A. Fiatal
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="juryban.txt">juryban.txt</A> <tab to=T><TD> 2227<BR><TD> Local Jury Banned by Judge After Ruling Man Innocent
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="jurynul.txt">jurynul.txt</A> <tab to=T><TD> 7467<BR><TD> Information on Jury Nullification
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="juryrig.txt">juryrig.txt</A> <tab to=T><TD> 2013<BR><TD> How they Stack the Jury in Georgia
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="juryrite.inf">juryrite.inf</A> <tab to=T><TD> 3553<BR><TD> Fully Informed Juries
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="juryrite.txt">juryrite.txt</A> <tab to=T><TD> 6849<BR><TD> Toward a Bill of Jury Rights
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="ks_lawsta.law">ks_lawsta.law</A> <tab to=T><TD> 4861<BR><TD> Kansas Computer Crimes Law, 1985
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="ky_lawsta.law">ky_lawsta.law</A> <tab to=T><TD> 6331<BR><TD> Kentucky Computer Crime Law, 1984
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="la_lawsta.law">la_lawsta.law</A> <tab to=T><TD> 5581<BR><TD> The Louisiana Computer Related Crime Bill, passed in 1984
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="lawbbs.txt">lawbbs.txt</A> <tab to=T><TD> 13440<BR><TD> Directory of Law-Oriented Bulletin Boards, 1986
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="laws.txt">laws.txt</A> <tab to=T><TD> 3394<BR><TD> Interesting US Laws, taken from the Seattle P-I
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="lebmay01.law">lebmay01.law</A> <tab to=T><TD> 4214<BR><TD> Director's Message, Law Day 1990, by William S. Sessions, FBI
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="lebmay02.law">lebmay02.law</A> <tab to=T><TD> 10020<BR><TD> G.R.A.M.P.A. COPS, by Jere L. Spurlin, Chief of Police, Ft. Meyers, Florida
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="lebmay03.law">lebmay03.law</A> <tab to=T><TD> 12413<BR><TD> High School Suicide Case Intervention, by David Fisher, Pinnellas County, Florida, Sheriff's Office
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="lebmay04.law">lebmay04.law</A> <tab to=T><TD> 7456<BR><TD> Police Practices: Elderwatch
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="lebmay05.law">lebmay05.law</A> <tab to=T><TD> 6272<BR><TD> Police Practices: Selecting the Right Officers: DARE
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="lebmay06.law">lebmay06.law</A> <tab to=T><TD> 18893<BR><TD> Analytical Intelligence Training, by Marilyn B. Peterson
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="lebmay07.law">lebmay07.law</A> <tab to=T><TD> 12961<BR><TD> Law Enforcement Exploring, by Steve Farish, Texas Law Enforcement Explorer Advisor's Association
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="lebmay08.law">lebmay08.law</A> <tab to=T><TD> 28146<BR><TD> Curtilage: The Fourth Amendment in the Garden, by John Gales Sauls, FBI
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="lebmay09.law">lebmay09.law</A> <tab to=T><TD> 2569<BR><TD> Legal Brief: Maryland v. Buie, Supreme Court Decision
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="legal.tec">legal.tec</A> <tab to=T><TD> 10585<BR><TD> Some Examples of Legal Loopholes by Keith K (February 13, 1994)
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="legalfnt.txt">legalfnt.txt</A> <tab to=T><TD> 9872<BR><TD> US Copyright Office Rules Font Software is Not Copyrightable (November 30, 1989)
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="leglbyt1.txt">leglbyt1.txt</A> <tab to=T><TD> 18370<BR><TD> Legal Bytes Volume 1 Number 1 by George, Donaldson and Ford (1993)
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="leglbyt2.txt">leglbyt2.txt</A> <tab to=T><TD> 26724<BR><TD> Legal Bytes Volume 1 Number 1, by George Donaldson and Ford (1993)
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="len.ros">len.ros</A> <tab to=T><TD> 190622<BR><TD> Complete information on the Len Rose (Legion of Doom Source Code) Case
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="listcoun.txt">listcoun.txt</A> <tab to=T><TD> 37317<BR><TD> Large List of United States Counties
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="lith_law.txt">lith_law.txt</A> <tab to=T><TD> 6728<BR><TD> Legally, Lithuania's Case is Open and Shut, by Vytautas Landsbergis, President of Lithuania
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="lotus.txt">lotus.txt</A> <tab to=T><TD> 13425<BR><TD> Discussion of Lotus' Plan to Sell personal Information
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="lvstops.txt">lvstops.txt</A> <tab to=T><TD> 5898<BR><TD> Large Vehicle Stops from William D. Dean
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="mail_exp">mail_exp</A> <tab to=T><TD> 24161<BR><TD> Obtaining Host and Address Information by Ron Ray
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="mailordr">mailordr</A> <tab to=T><TD> 4321<BR><TD> How to Successfully Buy Through Mail Order and Protect Your Rights
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="manage05.law">manage05.law</A> <tab to=T><TD> 12078<BR><TD> What They Didn't Teach in Management School, by James D. Sewell, Ph.D., Florida Criminal Justice Executive Institute
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="maps_cop.in">maps_cop.in</A> <tab to=T><TD> 5959<BR><TD> Cecil Adams on Copyright Traps in Maps (well, sort of)
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="mar90_1.law">mar90_1.law</A> <tab to=T><TD> 17540<BR><TD> The Preliminary Investigative Process, by Chief Gordon F. Urlacher, Rochester, New York, Police Department
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="mar90_2.law">mar90_2.law</A> <tab to=T><TD> 12111<BR><TD> Store Diversion Burglaries, by Detective Robert P. Meiners, Lincolnwood, Illinois, Police Department
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="mar90_3.law">mar90_3.law</A> <tab to=T><TD> 5618<BR><TD> Police Practices: Operation Alert, by Captain Mark Willingham, Division of Alcoholic Beverages and Tobacco
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="mar90_4.law">mar90_4.law</A> <tab to=T><TD> 13090<BR><TD> Police Retirement: The Impact of Change, by John M. Violenti, Ph.D, Department of Social and Preventive Medicine, SUNY New York
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="mar90_5.law">mar90_5.law</A> <tab to=T><TD> 16601<BR><TD> Managing Police Basic Training Cirriculum, by Rene A. Browett, Northern Virginia Criminal Justice Academy
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="mar90_6.law">mar90_6.law</A> <tab to=T><TD> 26939<BR><TD> Personal Liability: The Qualified Immunity Defense, by Daniel L. Schofield, S.J.D., FBI
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="massmodmtax.law">massmodmtax.law</A> <tab to=T><TD> 12184<BR><TD> New Massachusetts Modem Tax Proposed (For Real)
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="md_lawsta.law">md_lawsta.law</A> <tab to=T><TD> 4666<BR><TD> The Maryland Computer Crimes Law
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="medialaw.law">medialaw.law</A> <tab to=T><TD> 20297<BR><TD> Media Performance and International Law, by Howard H. Frederick, Ph.D.
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="medicp21.law">medicp21.law</A> <tab to=T><TD> 9547<BR><TD> Medicaid Fraud, by Larry L. Bailey, Colorado Attorney General's Office, Medicaid Fraud Control Unit, Denver Colorado
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="mi_lawsta.law">mi_lawsta.law</A> <tab to=T><TD> 3615<BR><TD> The Michigan Computer Crimes Law
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="military.txt">military.txt</A> <tab to=T><TD> 8855<BR><TD> Military Support to Civilian Law Enforcement Agencies by R. Barry Cronin
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="militaryp24.law">militaryp24.law</A> <tab to=T><TD> 8925<BR><TD> Military Support to Civilian Law Enforcement Agencies, by R. Barry Cronin, U.S. Marine Corps Headquarters
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="minnesot">minnesot</A> <tab to=T><TD> 2115<BR><TD> Minnesota Invokes Computer Law by Rachel Parker
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="mn_lawsta.law">mn_lawsta.law</A> <tab to=T><TD> 12662<BR><TD> The Minnesota Computer Crimes Law
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="mo_lawsta.law">mo_lawsta.law</A> <tab to=T><TD> 7198<BR><TD> The Missouri Computer Crimes Law, 1982
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="mobile.law">mobile.law</A> <tab to=T><TD> 6210<BR><TD> Police Policies: Mobile Command Posts
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="morris.app">morris.app</A> <tab to=T><TD> 31927<BR><TD> The Court Case against Robert Tappan Morris, 1990-1991
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="ms_lawsta.law">ms_lawsta.law</A> <tab to=T><TD> 7894<BR><TD> Mississippi Computer Crimes Law, 1985
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="mt_lawsta.law">mt_lawsta.law</A> <tab to=T><TD> 3082<BR><TD> Montana Computer Law Statute
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="mulepat.txt">mulepat.txt</A> <tab to=T><TD> 12585<BR><TD> Campus Security: The Mule Patrol, by James A. Huff
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="murphy.txt">murphy.txt</A> <tab to=T><TD> 6620<BR><TD> Murhpy's Law, and Similar Ilk
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="mvt.txt">mvt.txt</A> <tab to=T><TD> 13602<BR><TD> Motor Vehicle Theft Investigations: Emerging International Trends by Mary Ellen Beekman
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="mvtleb.law">mvtleb.law</A> <tab to=T><TD> 13668<BR><TD> Motor Vehicle Theft Investigations: Emerging International Trends
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="nafta.txt">nafta.txt</A> <tab to=T><TD> 2639231<BR><TD> Complete Text of the North American Free Trade Agreement (NAFTA) Act (1993)
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="natural.law">natural.law</A> <tab to=T><TD> 72219<BR><TD> Natural Laws and Natural Rights by James A. Donald (February 28, 1993)
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="nc_lawsta.law">nc_lawsta.law</A> <tab to=T><TD> 4713<BR><TD> North Carolina Computer Crime Law
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="ncic.law">ncic.law</A> <tab to=T><TD> 8537<BR><TD> NCIC Training: Hit or Miss, by Don M. Johnson, FBI
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="ncic.txt">ncic.txt</A> <tab to=T><TD> 8180<BR><TD> Focus on NCIC: Identifying the Unidentified
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="ncic2.txt">ncic2.txt</A> <tab to=T><TD> 8613<BR><TD> NCIC Training: Hit or Miss by Don M. Johnson of the FBI
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="nd_lawsta.law">nd_lawsta.law</A> <tab to=T><TD> 1422<BR><TD> The North Dakota Computer Fraud and Crime Statute, 1987
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="ne_lawsta.law">ne_lawsta.law</A> <tab to=T><TD> 4539<BR><TD> The Nebraska Computer Crimes Law, 1985
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="newlaw.txt">newlaw.txt</A> <tab to=T><TD> 8949<BR><TD> Dangerous Copyright Law by Stephen Haynes (October 2, 1990)
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="nh_lawsta.law">nh_lawsta.law</A> <tab to=T><TD> 8661<BR><TD> New Hampshire Computer Crimes, 1986
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="nj_lawsta.law">nj_lawsta.law</A> <tab to=T><TD> 8133<BR><TD> New Jersey Computer-Related Crimes Law, 1984
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="nov_1.law">nov_1.law</A> <tab to=T><TD> 16726<BR><TD> The FBI's 10mm Pistol, by John C. All, FBI
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="nov_2.law">nov_2.law</A> <tab to=T><TD> 17796<BR><TD> Ammunition Selection: Research and Measurement Issues, by N. J. Scheers, Ph.D.
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="nov_3.law">nov_3.law</A> <tab to=T><TD> 15201<BR><TD> Utilizing Job Task Analysis, by Thomas J. Jurkanin
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="nov_4.law">nov_4.law</A> <tab to=T><TD> 22164<BR><TD> The Judicial Sealing Requirement In Electronic Surveillance: A Matter of Immediacy, by Robert J. Fiatal
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="nsa.txt">nsa.txt</A> <tab to=T><TD> 15721<BR><TD> Harry S. Truman's Declaration of the Creation of the National Security Agency (NSA)
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="nv_lawsta.law">nv_lawsta.law</A> <tab to=T><TD> 5744<BR><TD> Nevada Computer Unfair Trade Practice Law, 1983
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="ny_lawsta.law">ny_lawsta.law</A> <tab to=T><TD> 8412<BR><TD> New York Penal Law, Computer Crime, 1986
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="nyappl.law">nyappl.law</A> <tab to=T><TD> 12970<BR><TD> New York's APPL Program: A New Partnetship, by Anthony M. Voelker
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="odomroll.txt">odomroll.txt</A> <tab to=T><TD> 15958<BR><TD> Odometer Rollback Schemes by James E. Scripture of FBI
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="ofc_lostp02.law">ofc_lostp02.law</A> <tab to=T><TD> 11067<BR><TD> Law Officers Killed: 1980-1989, Victoria L. Major, FBI
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="oh_lawsta.law">oh_lawsta.law</A> <tab to=T><TD> 1100<BR><TD> Ohio's Computer Crime Law
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="olw1.txt">olw1.txt</A> <tab to=T><TD> 2432<BR><TD> Our Lawyer Writes #1: Rodent Milk
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="olw3.txt">olw3.txt</A> <tab to=T><TD> 2432<BR><TD> Our Lawyer Writes #3: Getting a Divorce, Quick and Easy
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="olw5.txt">olw5.txt</A> <tab to=T><TD> 2688<BR><TD> Our Lawyer Writes #5: I'm a Mistress, can I Get Anything?
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="op-clean.leb">op-clean.leb</A> <tab to=T><TD> 12668<BR><TD> Operation Clean: Reclaiming City Neighborhoods by Richard W. Hatler
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="p_view.law">p_view.law</A> <tab to=T><TD> 12141<BR><TD> Point of View: A Manager's Guide to Computer Projects, by Charles Brennan, Philadelphia, Pennsylvania, Police Department
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="p_view.txt">p_view.txt</A> <tab to=T><TD> 4991<BR><TD> Point of View: Campus Police by Gigi Ray of the Arlington Campus Police Department
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="p_viewp14.law">p_viewp14.law</A> <tab to=T><TD> 5057<BR><TD> Point of View: Campus Police
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="pa_lawsta.law">pa_lawsta.law</A> <tab to=T><TD> 4695<BR><TD> Pennsylvania's computer crimes law, 1983/1986
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="passport.txt">passport.txt</A> <tab to=T><TD> 1766<BR><TD> How to Get a State Passport
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="patrol.law">patrol.law</A> <tab to=T><TD> 8785<BR><TD> Perspective: The Patrol Function, by Patrick V. Murphy, Former Police Commissioner of New York City
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="penreg.txt">penreg.txt</A> <tab to=T><TD> 30184<BR><TD> PENREG: A Database Management System Designed to Maintain and Manipulate Data Obtained through a Pen Register or DNR (1989)
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="plateaup16.law">plateaup16.law</A> <tab to=T><TD> 9155<BR><TD> Plateauing in Law Enforcement, by James M. Childers, Lubbock, Texas, Police Department
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="pntview.txt">pntview.txt</A> <tab to=T><TD> 12266<BR><TD> Point of View: A Manager's Guide to Computer Products by Charles Brennan
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="pol-com.leb">pol-com.leb</A> <tab to=T><TD> 18679<BR><TD> Community Policing is Not Police Community Relations by Robert C. Trojanowicz
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="pol-prac.leb">pol-prac.leb</A> <tab to=T><TD> 4546<BR><TD> Police Practices: Seat Belt Awareness Program
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="pol_com.txt">pol_com.txt</A> <tab to=T><TD> 18613<BR><TD> Community Policing is not Police Community Relations by Robert C. Trojanowicz
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="pol_prac.txt">pol_prac.txt</A> <tab to=T><TD> 5620<BR><TD> Police Practices: Baited Vehicle Detail
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="pol_pracp10.law">pol_pracp10.law</A> <tab to=T><TD> 6019<BR><TD> Police Practices: Alternate Fuel Program
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="pol_pracp24.law">pol_pracp24.law</A> <tab to=T><TD> 5686<BR><TD> Police Practices: Baited Vehicle Program
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="police.evasion">police.evasion</A> <tab to=T><TD> 20608<BR><TD> Exilic Xyth's Guide to 1st Level Police Evation (November 10, 1990)
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="policeevasion.txt">policeevasion.txt</A> <tab to=T><TD> 21345<BR><TD> Exilic Xyth's Guide to 1st level Police Evasion (November 10, 1990)
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="policemen.pig">policemen.pig</A> <tab to=T><TD> 3328<BR><TD> Calling a Policeman a Pig: A New Concept From The Anarchist Cookbook, by The Norwegian Monk
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="polprac08.law">polprac08.law</A> <tab to=T><TD> 4973<BR><TD> Police Practices: Miami's Ethnic Sharing Program
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="polpracp16.law">polpracp16.law</A> <tab to=T><TD> 5678<BR><TD> Police Practices: Operation Star
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="pope.txt">pope.txt</A> <tab to=T><TD> 11449<BR><TD> U.S. Computer Investigation Targets Austinites by Kyle Pope (March 17, 1990)
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="poster.txt">poster.txt</A> <tab to=T><TD> 2432<BR><TD> Wanted Poster for John Richard, the Scofflaw Sysop
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="posting-">posting-</A> <tab to=T><TD> 5290<BR><TD> The Risks of Posting to the Internet
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="posting_">posting_</A> <tab to=T><TD> 5289<BR><TD> The Dangers of Posting to the Net (A Visit from the FBI)
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="practice.law">practice.law</A> <tab to=T><TD> 6079<BR><TD> Police Practices: CHP Hazardous Waste Investigation Unit
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="practice.txt">practice.txt</A> <tab to=T><TD> 3680<BR><TD> Police Practices: The Community Outreach Program
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="practiceleb.law">practiceleb.law</A> <tab to=T><TD> 7257<BR><TD> Police Practices: Pennsylvania's Interdepartmental Communications System
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="preface.txt">preface.txt</A> <tab to=T><TD> 20480<BR><TD> The Federal Zone: Cracking the Code of Internal Revenue by Mitch Modeleski (January, 1994)
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="prelimin.txt">prelimin.txt</A> <tab to=T><TD> 17474<BR><TD> The Preliminary Investigation Process by Cheif Gordon F. Urlacher
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="presumed">presumed</A> <tab to=T><TD> 157447<BR><TD> Presumed Guilty: The Law's Victims in the War on Drugs, 1991 by Andrew Schneider
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="primes.txt">primes.txt</A> <tab to=T><TD> 22238<BR><TD> Primes, Codes and the National Security Agency by Susan Landau
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="privacy">privacy</A> <tab to=T><TD> 45299<BR><TD> Computer Privacy vs. First and Fourth Amendment Rights, by Michael S. Borella, 1991
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="privatiz.nre">privatiz.nre</A> <tab to=T><TD> 15151<BR><TD> The Privatized NREN, by Mitchell Kapor, Electronic Frontier Foundation, February 14, 1991
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="privpris.txt">privpris.txt</A> <tab to=T><TD> 15691<BR><TD> Privitization of Prisons: Fad or Future by Lr. David K. Burright
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="privsoc.law">privsoc.law</A> <tab to=T><TD> 10232<BR><TD> The Private and Open Society, by John Gilmore
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="prodigy.law">prodigy.law</A> <tab to=T><TD> 5118<BR><TD> Prodigy Stumbles as a Forum.. Again
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="promoteleb.law">promoteleb.law</A> <tab to=T><TD> 15620<BR><TD> Promotion to Chief: Keys to Success in a Small Department
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="prosecut.law">prosecut.law</A> <tab to=T><TD> 21204<BR><TD> Evironmental Crimes Prosecution: A Law Enforcement Partnership, by Vincent A. Matulewich, Environmental Protections Bureau, New Jersey
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="pub_7277.asc">pub_7277.asc</A> <tab to=T><TD> 48987<BR><TD> Freedom From War: The United States Program for General and Complete Disarmament in a Peaceful World
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="pubprivs.txt">pubprivs.txt</A> <tab to=T><TD> 20291<BR><TD> Public Law Enforcement/Private Security: A New Partnership? by Terrence J. Mangan and Michael G. Shanahan
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="pview.txt">pview.txt</A> <tab to=T><TD> 10861<BR><TD> Point of View: European Law Enforcement after 1992 by Jan Blaauw
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="pviewp18.law">pviewp18.law</A> <tab to=T><TD> 10927<BR><TD> Point of View: Eurpoean Law Enforcement after 1945
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="quotes.txt">quotes.txt</A> <tab to=T><TD> 20330<BR><TD> Quotes from Many Historical Figures about Juries
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="ratpatro.law">ratpatro.law</A> <tab to=T><TD> 11360<BR><TD> The Rat Patrol Rides! By Paul C. Ricks, Deputy Chief of Police, Colorado Springs
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="ratpatro.txt">ratpatro.txt</A> <tab to=T><TD> 11294<BR><TD> The Rat Patrol Rides! By Paul C. Ricks of Colorado Springs P.D.
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="rebuttal.txt">rebuttal.txt</A> <tab to=T><TD> 300445<BR><TD> Inslaw's Analysis and Rebuttal of the BUA Report
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="res-rev.leb">res-rev.leb</A> <tab to=T><TD> 3696<BR><TD> Research Review: Police Use of Discretion: A Comparison of Community, System, And Officer Expectations
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="resmeas.txt">resmeas.txt</A> <tab to=T><TD> 18051<BR><TD> Ammunition Selection: Research and Measurement Issues by N.J. Scheers and Stephen R. Band
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="response.txt">response.txt</A> <tab to=T><TD> 7842<BR><TD> A Case for Mistaken Identity... Who's Privacy was Really Invaded? by Jim Bigeloww
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="reviewl.law">reviewl.law</A> <tab to=T><TD> 8806<BR><TD> Book Review, "Liability" by Peter Huber
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="ri_lawsta.law">ri_lawsta.law</A> <tab to=T><TD> 1950<BR><TD> Rhode Island Computer Crimes Law, 1979
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="riggs_co">riggs_co</A> <tab to=T><TD> 55329<BR><TD> United States Vs. Riggs: Jacking into the Net with the Illinois District Court
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="rights.txt">rights.txt</A> <tab to=T><TD> 30658<BR><TD> Why Your Rights are Guaranteed and should Not Be Taken Away
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="ripco-wa.rra">ripco-wa.rra</A> <tab to=T><TD> 75314<BR><TD> Seizure Warrant for the Ripco BBS
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="ripco.law">ripco.law</A> <tab to=T><TD> 13511<BR><TD> The RipCO BBS Seizure
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="ripcobbs">ripcobbs</A> <tab to=T><TD> 73736<BR><TD> Seizure Warrant Documents for the RIPCO BBS
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="safetyleb.law">safetyleb.law</A> <tab to=T><TD> 10578<BR><TD> Safety Action Team, by Rod Englert, Oregon Sheriff
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="saucs1.txt">saucs1.txt</A> <tab to=T><TD> 95531<BR><TD> The Shareware Author and User Case Study by Daniel Corbier (1994)
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="sc_lawsta.law">sc_lawsta.law</A> <tab to=T><TD> 7604<BR><TD> South Carolina Computer Crime Act
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="school.law">school.law</A> <tab to=T><TD> 13599<BR><TD> Preparing for School Crisis, by David Nichols, Ph. D.
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="school.txt">school.txt</A> <tab to=T><TD> 13534<BR><TD> Preparing for School Crisis, by David Nichols of Jacksonville State University (1991)
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="schoolcr.law">schoolcr.law</A> <tab to=T><TD> 10368<BR><TD> School Crime Stoppers, by Bob Chance, Tulsa Oklahoma Police
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="schoolcr.txt">schoolcr.txt</A> <tab to=T><TD> 10303<BR><TD> School Crime Stoppers by Bob Chance of the Tulsa Police Department
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="sd_lawsta.law">sd_lawsta.law</A> <tab to=T><TD> 3184<BR><TD> South Dakota Computer Crimes Law, 1982
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="search.txt">search.txt</A> <tab to=T><TD> 21769<BR><TD> Searches of Premises Incident to Arrest, by A. Louis DiPietro
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="searches.txt">searches.txt</A> <tab to=T><TD> 30108<BR><TD> Emergency Searchs of Effects, by John Gales Sauls of the FBI Academy
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="searchp26.law">searchp26.law</A> <tab to=T><TD> 26342<BR><TD> Inventory Searches: The Role of Discretion, by Austin A Anderson
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="sentguid.law">sentguid.law</A> <tab to=T><TD> 9050<BR><TD> Proposed Amendment #59 to the Sentencing Guidelines for United States Courts
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="serologyleb.law">serologyleb.law</A> <tab to=T><TD> 24819<BR><TD> Serolgical Evidence in Sexual Assault Investigations, by Robert R.J. Grispino, MA, Serolgy Unit, FBI
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="simson.sec">simson.sec</A> <tab to=T><TD> 62214<BR><TD> An Introduction to Computer Security for Lawyers by Simson Garfinkel (1987)
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="sniper.txt">sniper.txt</A> <tab to=T><TD> 20441<BR><TD> Police Sniper Training by John Plaster of the Minnesota National Guard
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="sniperleb.law">sniperleb.law</A> <tab to=T><TD> 20505<BR><TD> Police Sniper Training, by John Plaster, Instructor, MN Guard Counter Sniper School
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="softmark.asc">softmark.asc</A> <tab to=T><TD> 4237<BR><TD> Information and Documents Needed for Software Copyright Application
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="softmarkdoc.law">softmarkdoc.law</A> <tab to=T><TD> 4295<BR><TD> Information and Documents Needed for Software Copyright Application
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="softpat.txt">softpat.txt</A> <tab to=T><TD> 86156<BR><TD> A Partial List of Software Patents, compiled by Michael Ernst (April 12, 1992)
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="srrapist.txt">srrapist.txt</A> <tab to=T><TD> 21884<BR><TD> The Criminal Behavior of the Serial Rapist, by Robert R. Hazelwood
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="stcomplw">stcomplw</A> <tab to=T><TD> 3165<BR><TD> A Cross-Reference of US States and Laws Written for Them
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="steroids.txt">steroids.txt</A> <tab to=T><TD> 16332<BR><TD> The Abuse of Anabolic Steroids by Charles Swanson, University of Georgia
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="steroids19.law">steroids19.law</A> <tab to=T><TD> 16398<BR><TD> Abuse of Anabolic Steroids, by Charles Swanson, Ph. D., U of Georgia
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="stripesp16.law">stripesp16.law</A> <tab to=T><TD> 13643<BR><TD> Honolulu's Stripes: Training for Sergeants, by Robert D. Prasser, Captain, Honolulu Hawaii Police Department
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="suc-inte.txt">suc-inte.txt</A> <tab to=T><TD> 6281<BR><TD> Successful Interviewing by James R. Ryals, March 1991
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="sucinte.txt">sucinte.txt</A> <tab to=T><TD> 6620<BR><TD> Successful Interviewing by James R. Ryals
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="sueirs.txt">sueirs.txt</A> <tab to=T><TD> 6016<BR><TD> Wage Earners Should Consider Possibility of Suing IRS for Tax Refunds Rather Than Filing Exempt W-4 Forms by Bill Conklin
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="suicide.txt">suicide.txt</A> <tab to=T><TD> 12347<BR><TD> The High Scool Suicide Crisis Intervention by David Fisher of the Pinnellas Sheriff's Office
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="summary.txt">summary.txt</A> <tab to=T><TD> 42517<BR><TD> The INSLAW affair: September 10, 1992
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="supreme.law">supreme.law</A> <tab to=T><TD> 25869<BR><TD> Selected Supreme Court Cases: 1989-1990 Term: William U. McCormack, FBI
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="suprule1.txt">suprule1.txt</A> <tab to=T><TD> 42376<BR><TD> The Rules of the U.S. Supreme Court
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="suprule2.txt">suprule2.txt</A> <tab to=T><TD> 36427<BR><TD> The Rules of the U.S. Supreme Court (Part II)
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="suprule3.txt">suprule3.txt</A> <tab to=T><TD> 36204<BR><TD> The Rules of the U.S. Supreme Court (Part III)
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="survive01.law">survive01.law</A> <tab to=T><TD> 11830<BR><TD> The Will to Survive, by Stephen R. Band
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="swiss.txt">swiss.txt</A> <tab to=T><TD> 54666<BR><TD> Getting a Discretionary Swiss Banking Account
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="swt.txt">swt.txt</A> <tab to=T><TD> 2009<BR><TD> Seizing Wire Transfers, by The Wall Street Journal (September 20, 1993)
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="sysops">sysops</A> <tab to=T><TD> 21329<BR><TD> What Files are Legal for Distribution on a BBS?
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="targetd.law">targetd.law</A> <tab to=T><TD> 14371<BR><TD> Washington D.C.'s Operation "On Target" by Eric W. Witzig, Ret., Washington DC Police
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="taxother.tut">taxother.tut</A> <tab to=T><TD> 9940<BR><TD> Tax Deductibility of BBS Operations
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="teamworkp06.law">teamworkp06.law</A> <tab to=T><TD> 12002<BR><TD> Teamwork: An Innovative Approach, by Alan Youngs, Captain, Lakewood Colorado Police
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="tempest.law">tempest.law</A> <tab to=T><TD> 53840<BR><TD> Eavesdropping on the Electromagnetic Eminations of Digital Equipment: The Laws of Canada, England, and the United States
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="thefacts.law">thefacts.law</A> <tab to=T><TD> 105795<BR><TD> Push Button Felonies: KPFA-FM Radio Broadcast July 26, 1990
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="theft_of.sof">theft_of.sof</A> <tab to=T><TD> 12513<BR><TD> Theft of Computer Software: A National Security Threat by William J. Cook
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="tm.tut">tm.tut</A> <tab to=T><TD> 5077<BR><TD> Trademarks in Brief (Overview)
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="tn_lawsta.law">tn_lawsta.law</A> <tab to=T><TD> 7152<BR><TD> Tennesse Computer Crimes Act
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="tomorfbi.txt">tomorfbi.txt</A> <tab to=T><TD> 17669<BR><TD> A Look Ahead: Views of Tomorrow's FBI by Richard Sonnichsen, Gail O. Burton and Thomas Lyons
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="towingco.txt">towingco.txt</A> <tab to=T><TD> 9557<BR><TD> Towing Companies: Friends or Foes? By Michael C. Gillo
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="trash.law">trash.law</A> <tab to=T><TD> 21269<BR><TD> Trash Inspections and the Fourth Amendment, by Thomas W. Kukura, JD
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="trash.txt">trash.txt</A> <tab to=T><TD> 21203<BR><TD> Trash Inspections and the Fourth Amendment, by Thomas V. Kukura of the FBI
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="travel.rgt">travel.rgt</A> <tab to=T><TD> 18188<BR><TD> A How-To Information Sheet for Sovereigns: A Challenge to the 6th Amendment's Jurisdiction by Howard J. Freeman (March 23, 1993)
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="tx_lawsta.law">tx_lawsta.law</A> <tab to=T><TD> 5722<BR><TD> Texas Computer Crime Law
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="uic.law">uic.law</A> <tab to=T><TD> 19541<BR><TD> The League for Programming Freedom Statement
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="uncharte">uncharte</A> <tab to=T><TD> 62233<BR><TD> The Charter of the United Nations (July 7, 1994)
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="us&scon1.txt">us&scon1.txt</A> <tab to=T><TD> 126412<BR><TD> The United States and the States under the Constitution, by C. Stuart Patterson
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="us&scon2.txt">us&scon2.txt</A> <tab to=T><TD> 74338<BR><TD> The United States and the States under the Constitution, by C. Stuart Patterson (Part 2)
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="us&scon3.txt">us&scon3.txt</A> <tab to=T><TD> 162306<BR><TD> The United States and the States under the Constitution, by C. Stuart Patterson (Part 3)
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="us&scon4.txt">us&scon4.txt</A> <tab to=T><TD> 112100<BR><TD> The United States and the States under the Constitution, by C. Stuart Patterson (Part 4)
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="us&scon5.txt">us&scon5.txt</A> <tab to=T><TD> 200455<BR><TD> The United States and the States under the Constitution, by C. Stuart Patterson (Part 5)
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="us&scon6.txt">us&scon6.txt</A> <tab to=T><TD> 101176<BR><TD> The United States and the States under the Constitution, by C. Stuart Patterson (Part 6)
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="uscon.law">uscon.law</A> <tab to=T><TD> 57050<BR><TD> The Constitution of the United States
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="userintf.cp">userintf.cp</A> <tab to=T><TD> 11618<BR><TD> Protecting Rights in User Interface Designs by Ben Shneiderman (November 27, 1992)
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="ut_lawsta.law">ut_lawsta.law</A> <tab to=T><TD> 6859<BR><TD> The Utah Computer Crimes Act
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="va_lawsta.law">va_lawsta.law</A> <tab to=T><TD> 11468<BR><TD> The Virgina Computer Crimes Act
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="vic-wit.txt">vic-wit.txt</A> <tab to=T><TD> 16276<BR><TD> Victim-Witness Assistance by Joseph R. Luteran, March 1991
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="visiop08.law">visiop08.law</A> <tab to=T><TD> 8300<BR><TD> Visiophones: French High Tech Security, by Pierre Marie Bourniquel, Biarritz, France
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="wa_lawsta.law">wa_lawsta.law</A> <tab to=T><TD> 2035<BR><TD> Computer Crimes Law in Washington State
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="waco.txt">waco.txt</A> <tab to=T><TD> 38784<BR><TD> The Text of the Search Warrant from Waco, Texas
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="waiver.txt">waiver.txt</A> <tab to=T><TD> 10310<BR><TD> A Waiver of Claims pertaining to Adult Sections of Ryan's Bar BBS
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="way.law">way.law</A> <tab to=T><TD> 9031<BR><TD> There's Gotta Be a Better Way, by Glen Roberts and Bill Wajk
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="weaponsp10.law">weaponsp10.law</A> <tab to=T><TD> 13094<BR><TD> Vehicular Long Barrel Weapons Mount, by David W. Pisenti, FBI
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="wi_lawsta.law">wi_lawsta.law</A> <tab to=T><TD> 5655<BR><TD> Wisconson Computer Crimes Law
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="wv_law.law">wv_law.law</A> <tab to=T><TD> 8732<BR><TD> West Virginia Computer Crimes Law
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="wy_lawsta.law">wy_lawsta.law</A> <tab to=T><TD> 7182<BR><TD> Wyoming Computer Crimes Law
|
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="yardies.txt">yardies.txt</A> <tab to=T><TD> 13795<BR><TD> The Yardies: England's Emerging Crime Problem, by Roy A.C. Ramm (January, 1988)
|
|
</TABLE><P><TABLE WIDTH=100%><TR><TD ALIGN=RIGHT><SMALL>There are 533 files for a total of 16,062,590 bytes.</SMALL></TABLE><P>
|
|
</BODY>
|
|
</HTML>
|
|
<P>If you wish to have the entire directory conveniently archived and compressed into one file, please download
|
|
either <A HREF="http://archives.textfiles.com/law.tar.gz"><B>law.tar.gz</B></A> (4797986 bytes) or <A HREF="http://archives.textfiles.com/law.zip"><B>law.zip</B></A> (5315618 bytes) instead of all the files separately. <P>
|