T E X T F I L E S
Laws and Law Discussion
From the first time a rumor went by that the FCC was going to institute a
"modem tax" (this one shows up about every two years without fault), BBS
users took an interest in the funny little laws that govern the country and
how the jackasses in the funny white building were going to mess up the
fun. To this end, transcripts and discussions about laws have been around
for a long time.
Because of the somewhat odd subject matter of some of the files, some of
the files you would expect to be located in this section are also located
in the <A HREF="/politics">politics</A> section. Some of these files would
probably be better put in the Politics section as well.
Oh, and this would normally go without saying, but it's probably not a good
idea to depend on these files for actual, your-property-and-well-being
law advice. Sometimes the law has radically changed since the file was
written, or the file falls under that special "The US never submitted a
full approval to all 50 states so actually you can punch a cop" type of
conspiratorial section. See also <A HREF="/conspiracy">conspiracy</A>.
1changin01.law
Counterintelligence Challenges in a Changing World, by William S. Sessions, Director, FBI
1stamend.txt
A Showdown Over Computer Crime, by Brooks Boliek (August 5, 1990)
1urbanp01.law
Urban Transportation Security, by Robert W. Dart, Chicago Police
250law.law
Section 250.12 of the Model Penal Code: Violation of Privacy
251law.law
Section 251.4 of the Model Penal Code: Obscenity
2corrupt05.law
Corruption: A Continuing Challenge for Law Enforcement, by Otis E. Cooksey, Military Advisor
2developp04.law
Developing Police Leadership, by Paul Mansen, Sergeant, Rochester Police
3fbipri10.law
Foreign Counterintelligence: An FBI Priority, by James E. Tomlinson, FBI
3polpracp09.law
Police Practices: Telemarketing Crime Prevention, by David I. Rechenmacher, Illinois Police Department
4polprac14.law
Police Practices: Ministers Team With Police to Keep the Peace
4pusherp10.law
The Respectable Pusher, by Jeffrey D. Lane, Office of the Secretary of State, Atlanta
5badchecp15.law
Taking the Bounce Out of Bad Checks, by Vinse J. Gilliam, DA's Office, Ventura Country CA
5espion17.law
Espionage Awareness Programs, by Freddie L. Capps, Jr. Special Agent, FBI
6poview20.law
Point of View: Managing for Excellent, by David A. King, Chief of Police, Perkasie Police
6resforup20.law
Research Forum: McGruff Robot Teaches Kids
7crowdcop22.law
Effective Crowd Control, by Steven J. Schmidt, Kentucky Police
7drugtes22.law
The Kentucky State Police Drug Testing Policy, by W. Michael Troop, State Police of Kentucky
8civilfop26.law
Civil Forfeiture: Real Property Used in Drug Trafficking
8interro28.law
Custodial Interrogation: Impact of Minnick V. Mississippi by Kimberly A. Crawford
93dec001.txt
Leadership in the Nineties, by Ronnie Garner, M.P.A.
93dec002.txt
Employee Empowerment by Shelia Berglund
93dec003.txt
Police Practices: Citizen Advisory Committees by Major Dan Flynn, M.P.A.
93dec004.txt
Positive Organizational Culture: A Preactical Approach by Randall Aragon, M.A.
93dec005.txt
The Family and Medical Leave Act by Jeffrey Higginbotham, J.D.
93jun001.txt
Eyesight Standards: Correcting Myths, by Richard N. Holden, Ph.D.
93jun002.txt
The Computer: High-Tech Instrument of Crime by Michael G. Noblett
93jun003.txt
Elevator Vandalism Squad by Ronald Welsh
93jun004.txt
Police Pracices: Drug Educaiton Saving America's Youth, by Damon Davis
93jun005.txt
Police Violence: Addressing the Issue, by Daniel B. Boyle
93jun006.txt
Focus on Training: The Americans with Disabilities Act, by John A. Leonard
93jun007.txt
Computer Searches and Seizures: Challenges for Investigators, by John Gales Sauls
9brief.txt
A Legal Brief by Special Agent Jeffrey Higginbotham (Probable Cause Determination)
9briefp32.law
Legal Brief by S.A. Jeffrey Migginbotham, Legal Instructor, FBI
abouteff.law
General Information about the Electronic Frontier Foundation
academy10.law
Citizen Police Academies by Martin Alan Greenberg, Dept. of Criminal Justice, Ulster Community College
afis.law
Police Practices: AFIS Technology for Rural States
aicnews.1
Arizona Identification Council NEwsletter, July, 1990
al_lawsta.law
The Alabama Computer Crime Act, 1985
alcor-1
ALCOR Files Suit Over Electronic Mail Seizure, by David Bloom, Feb 24, 1990
alcor-2
Transcript of Suit by ALCOR
alcor-3
Additional Filings in ALCOR BBS Case
alcor-4
Response of ALCOR Lawyer to Motion Filed
alcor-5
File Round of Motion Filed in Alcor Court Case
alcor-6
The Resolution of the Alcor E-mail privacy Case
alcor-7
Response of William F. Murphy to ALCOR Suit
alcor-8
Bill Submitted in ALCOR BBS Case
alcor-9
Appeal of dismissal in ALCOR BBS Case
anarchy.ripco
The Modern Speeders Guide to Radar and State Troopers, by Exilic Xyth (January 11, 1988)
anti-hac.txt
A Bill Against Hacking, from Emma Nicholson
ar_lawsta.law
Arkansas Regulations on Computer Crime, 1987
arrest.txt
Your Rights and What to Do Upon Arrest, by Michael J. Elliott, Criminal Defense Attorney
articles.law
Bibliography of Computer Security Articles 1983 through 1988
asmp-gui
American Society of Magazine Photographers 1991 Copyright Guide
az_lawsta.law
Arizona Computer Crimes Law, 1978
babbs001.txt
Anti Federal Agent BBS Protection, by Babbs Boy
banking.off
Privacy and Offshore Banking... What the IRS Doesn't Want You to Know! By David Johnson (July 5, 1994)
bbs-suit.txt
Civial Action No. IP-88 93C: Linda Thompson vs. Bob Predaina
bbs_and_
The Electronic Pamphlet: Computer Bulletin Boards and the Law by Michael H. Riddle (1990)
bbs_law.law
Computer Bulletin Boards and the Law, by Michael M. Riddle (Law Study)
bbsdefa.law
Defamation Liability of Computerized Bulletin Board Operators and Problems of Proof, by John R. Kahn
bbslaw.man
Version 1.1 - BBS LEGAL GUIDE by Clary and Kraft, 1993
bbslaws.txt
THe Legal Aspects of Telecommunications and Electronic Bulletin Board SYstems, by James J. Spinelli
bellraid.txt
The Future of Telecommunications.......
bendix.txt
Crosley Bendix (Negativland) Discusses The Copyright Act (November 9, 1992)
blue.law
Death of the Blue Box, by Full Disclosure, 1991
brave.yes
Smart Brave Lady indicates that we are not Drivers, and therefore do not need a license.
caddraft.law
Police Practices: Computer Aided Drafting for Law Enforcement
candp.law
Crime and Puzzlement by John Perry Barlow
candp2.law
Update on Crime and Puzzlement by John Perry Barlow, 1990
cardozo.txt
Some "Property" Problems in a Computer Crime Prosecution by Mike Godwin of the EFF
cellmate.law
Cellmate Informants: A Constitutional Guide to Their Use, by Kimberly Kingston Crawford, FBI Academy
cellmate.txt
Cellmate Informants: A Constitutional Guide to Their Use, by Kimberly Kingston Crawford
chomloot.txt
Noam Chomsky writes a letter to Lies Of Our Times, May 1991
ciabwash.law
CIA Memorandums on Brainwashing
citizen1.txt
Studies in Constitutional Law: A Treatist on American Citizenship by John S. Wise
citizen2.txt
Chapter 2: How American Citizenship May be Acquired in the Nation
citizen3.txt
Chapter 3: Of the Obligation and Duties of the Citizen to the Nation and the States
citizen4.txt
Chapter 4: Of the Rights, Privileges, and Immunities of the Citizen
citizen5.txt
Chapter 5: Privileges and Immunities Under the War Amendments
citizens.gui
A Citizen's Guide on using the Freedom of Information Act and the Privacy Act of 1974 to Request Government Records (July 10, 1991)
civil.dis
Civil Disobedience, by Henry David Thoreau
civlib.law
Civil Liberties in Cyberspace: When does Hacking Turn from an Exercise of Civil Liberties into Crime? By Mitch Kapor, Scientific American, 1991
civlrght.txt
Civil Rights Cases and Police Misconduct, by John Epke
civlrght14.law
Civil Rights and Police Misconduct, by John Epke and Linda Davis
clipper1.asc
Remarks by Bruce Sterling at the Fourth Annual Conference on Computers, Freedom, and Privacy
closenet.law
Closing the Net, by Greg Costikyan (On Operation Sun-Devil)
co_lawsta.law
Colorado Crimes Law,
cog_inte.law
Cognitive Interviewing, by Margo Bennett, FBI
compacs.txt
The Limits of the Law in Restricting Computer Misuse, by Peter Sommer (March 19, 1991)
compcrim.txt
Computer Crimes: An Escalating Crime Trend by William S. Sessions
compriv.law
Computer Privacy vs. First and Fourth Amendment Rights, by Michael S. Borella
compsent
Revised Computer Crime Sentencing Guidelines, from Jack King (1992)
compuser
What is a Compilation Copyright? The Gospel According to Compuserve (December 3, 1987)
compuser.law
Compuserve's Position: What is a Compilation Copyright?
computer.cri
Computer Crime: Current Practices, Problems and Proposed Solutions, Second Draft, Brian J. Peretti
confess.law
Why Suspects Confess, by David D. Tousignant, Inspector, Lowell Massachusetts
confess.txt
Why Suspects Confess, by David D. Tousignant
consoli.law
Public Services Consolidation: The Answer to your Community's Needs, by Robert L. Sobba, Chief of Police, Idaho Police
const_in.cyb
Laurence H. Tribe, "The Constitution in Cyberspace"
copr.txt
How to Copyright Software, by Locus, Inc. (1990)
cops
If YOu Have to Ask, Get Out of the Way, by Chuck Milland
cops.txt
Why Cops Hate You: If You Have to Ask, Get Out of the Way
copstamp.txt
Police Tampering: How Often and Where, by Alan Deshowitz
coptalk.txt
Don't Talk to Cops, by Robert W. Zeuner, Member of the New York State Bar
copy.txt
Software and Copyrights: Registration, Notice and Why by Charles B. Kramer (January 8, 1992)
copyr
Copyright Information, by Inez Harrison
copyrigh.txt
Legal Brief: Software Copyright Law (December 1985)
copyrit1.law
Copyrights and Computer Software: An Introduction, by Sam Kitterman, Jr.
copyrit2.law
Copyrights and Computer Software: Part II, by Sam Kitterman, Jr.
copyrit3.law
Copyrights and Computer Software: Part III, by Sam Kitterman, Jr.
copyrit4.law
Copyrights and Computer Software: Part IV, by Sam Kitterman, Jr.
copyrit5.law
Copyrights and Computer Software: Part V, by Sam Kitterman, Jr.
copyrite.c64
Commodore's Extremely Silly Liscence for Workbench 1.3.2
copyrite.doc
Copyright Information for Computer Software Hacks from June B. Moore
copyrite.inf
Answering Some Questions about the Ditribution of Public Domain Software by Ron Fowler (April 12, 1984)
copyrite.law
Large Overview of American Copyright Law
copyrite.txt
Copyright Law from Jordan J. Breslow (February 13, 1986)
copyrt.txt
Copyright law and Liscence Law as Applies to Computer Software
copyso.txt
Software and Copyrights: Registeration, Notice and Why by Charles B. Kramer, Esq. (September 25, 1991)
correct.txt
The Principle of Correct Absue
couriers.txt
Detaining Suspected Drug Couriers: Recent Court Decisions
couriersp27.law
Detaining Suspected Drug Couriers: Recent Court Decisions, by William U. McCormack, Special Agent, FBI Academy
court.law
The Transcript of Craig Neidorf's Trial
court.txt
Disorder in the Court! (Funny Court Transcripts)
cright3.txt
Copyrighting Public Domain Programs by June B. Moore, JD
crime.txt
The Grolier Electronic Encyclopedia Definition of Crime
crimecatalog.cmp
The Crimefighters' Catalog of Special Purpose Books and Videos
crimefighter.cmp
The Crimefighters Compilation
crimeftr.000
Table of Contents and Quick Tutorial
crimeftr.002
Why Police Can't Cope, and The Need for CrimeFighters
crimeftr.003
Crime Stoppers and We-Tip's Formula for Rewards
crimeftr.004
Catch-all Reward Law: $25,000 - All Felonies, All States
crimeftr.005
Fines & Forfeiture Laws: 50% Paid to CrimeFighters!
crimeftr.006
Misdemeanors and Do-It-Yourself Lawsuits
crimeftr.007
Qui Tam Law: Be the Prosecutor - Control Plea Bargaining
crimeftr.008
Civil & Criminal RICO Laws
crimeftr.009
Drunk Driver Terminators (D.D.T.) Patrols - to Get Started
crimeftr.010
Drug Laws & Drug Wars - Unlimited Business Opportunities
crimeftr.011
Polluter Tooters: Anti-Pollution laws, MEGABUCK Rewards
crimeftr.012
Terrorists, Assassins, and Police Corruption
crimeftr.013
Bounty Hunters, Bail Bond Agents and Skip Tracers
crimeftr.014
U.S. Customs/Coast Guard Laws, Mechanics' Laws
crimeftr.015
Post Office Rewards, Scams, Cons, Frauds
crimeftr.016
Wildlife Protection/Poaching, Conservationists Laws
crimeftr.017
National Forests (Vandalism, Pot Growing, other laws)
crimeftr.018
Wiretap and Blackmail Laws & Rewards for CrimeFighters
crimeftr.019
Misc Rewards for This and That (Dozens of them)
crimeftr.020
State Reward Laws
crimeftr.021
Crime Information, Your Right to Withhold for Rewards
crimeftr.022
Citizen Arrests - What you Need to Know
crimeftr.023
High Speed Pursuits - Unlike Smokey and the Bandit!
crimeftr.024
Rules of Evidence - Entrapment Explained
crimeftr.025
Where to Get CrimeFighter Training
crimeftr.026
High Tech Tools of the Trade - Where to Get Them
crimeftr.027
Problems with Prosecutors and Plea Bargaining
crimeftr.028
How to Calculate Rewards, Proposed CrimeFighters Reward Law
crimeftr.029
CrimeFighters International, Inc. Membership info.
crimeftr.030
Membership Application
criminal.law
Criminal Informants: An Administrator's Dream or Nightmare? By Harry A. Mount, Jr.
criminal.txt
Criminal Informants: An Administrator's Dream or Nightmare? By Harry A. Mount, Jr.
cripple.txt
The Experience of a Shareware Author by Frank Bell of NEWKEY
cryptlaw
Crypto-Law Survey by Bert-Jaap Koops (July, 1995)
csa87.law
National Act on Computer Crime, Act 100-235
csbylaws.law
By-Laws of the Communications Security Association, Inc.
cslaw.law
Computer Security And the Law, by Gary S. Morris
ct_lawsta.law
Computer-Related Offenses from the Connecticut General Statutes
cyberlaw.law
Cyberspace and the Legal Matrix: Laws or Confusion?
cyblaw.txt
Cyberspace and the Legal Matrix: Laws or Confusion?
cybspace.txt
Cyberspace and the Legal Matrix: Laws or Confusion?
cycrime0.txt
Emmanuel Goldstein on the E911 Affair
dblaw.txt
Legal Protection of Computer Databases, by Ralph C. Losey
define.stb
Definitions of Legal Terms
deflib.bbs
Defamation Liability of Computerized BBS Operators and Problems of Proof by John R. Kahn
delibera.leb
Deliverate Indifference: The Standard for Municipal and Supervisory Liability by Michael Callahan
denning
Concerning Hackers Who Break into Computer Systems, by Dorothy Denning, October 1st, 1990
dennis_h
The Price of Copyright Violation from Dennis Jayes
dial911.die
Dial 911 and Die by Aaron Zelman and Jay Simkin (December 15, 1992)
dir_mesgp01.law
Director's Message, May 1991, by William S. Sessions, FBI
disabil25.law
The Americans With Disabilities Act, by Jeffrey Higginbotham, FBI
disaster.law
Disaster Operations: Not Business as Usual, by Michael Guerin, Governor's Office, Ontario, California
disclaim.txt
An Example Set of Disclaimers, Rules and Regulations
disk-fee.txt
The Great "Disk Fee" Fallacy for Public Software Distribution
dispatch.law
Point of View: Dispatching Units: Improvements for the First List, by Bob Blankenship, Chief, Redding, California Police
dmessage.law
Director's Message, April 1991, by William S. Sessions, FBI
dmessage.leb
Director's Message: Police and Citizens Working Together by William Sessions
doggie.txt
The Great American Dog Trial Vendetta by P. Remington Adams (1991)
domestiv.law
Domestic Violence: When do Police Have a Constitutional Duty to Protect? by Daniel L. Schofield, FBI
downtime.bul
Example of a Policy Regarding BBS Downtime
drivers.law
Research Forum Survey Results: Driver License Suspension programs
driving.bar
The (Almost) Definitive Answer to Driving Barefoot in America (1994)
drugdiv.txt
Pharmaceutical Diversion and Abuse: Our Nation's Other Drug Problem, by Thomas C. Babicke
drugdivp01.law
Pharmaceutical Diversion and Abuse: Our Nation's Other Drug Problem, by Thomas C. Babicke, DEA, Virginia
drugtest.txt
Drug Abuse and Testing in Law Enforcement: No Easy Answers, by Andrew J. Harvey
drugtestp12.law
Drug Abuse and Testing in Law Enforcement: No Easy Answers by Andrew J. Harvey, Sergeant, California Police
dunnel.txt
The Dunne Act Introduced in NY for Computer BBSes (May 15, 1989)
e-law.txt
E-Law: legal Issues Affecting Computer Information Systems and System operator Liability, by David J. Loundy
ecpa.lay
The Electronics Communications Privacy Act of 1986, a Layman's View by Michael H. Riddle
ecpa1law.law
Electronic Communication Privacy Act: Chapter 119
ecpa2law.law
Electronic Communication Privacy Act: Part II
ecpa3law.law
Electronic Communication Privacy Act: Part III
ecpalay.law
The Electronic Communications Privacy Act of 1986: A Layman's View, by Michael M. Riddle
edwards.law
Edwards vs. State Farm Insurance
edwards_
The Processes by which the Secret Service Investigates Computer Crimes
eff-righ.txt
Legal Overview: The Electronic Frontier and the Bill of Rights (July 10, 1990)
eff.law
The Founder of the Electronic Frontier Foundation get back to you about Their Plans
eff.txt
The Foundation of the Electronic Frontier Foundation (July 10, 1990)
effbor.law
Legal Overview: The Electronic Frontier and the Bill of Rights
effss.law
Civil Liberties Implications of Computer Search and Seizures: Some Proposed Guidelines for Magistrates Who Issue Search Warrants
elbarasn.107
Electronic Bar Association Announced by Paul Bernstein
elec_bbs.law
Electronic Bulletin Boards: A New Resource for Law Enforcement by Seth Jacobs, SEARCH Group
electrif.law
Electrifying Speech: New Communications Technologies and Traditional Civil Liberties
email
Some Policies on Electronic Mail: A Summary by Todd Hooper
email_pr
Computer Electronic Mail and Privacy: The Law, by Ruel T. Hernandez, January 11, 1987
emailpri.law
Overview of the Employee Privacy Laws as Currently Apply
emailprv.law
Bibliography on Law and Computers
embezzle.law
Bank Employee Embezzlement by Denise M. Dube, LA DA
employleb.law
Employee Development Programs, by John L. Pape, Chief of Police
entrapmtdoc.law
The Defense of Entrapment as it Applies to Bulletin Board System Operators, by Randy B. Singer, Esq.
envhook.txt
The Environmental Movement and the Value of "Moderation" by Brian K. Yoder (1992)
ep_forum.law
The Environmental Protection Forum, by Michael A. O'Brien, Start Attorney Office, Florida.
ethics.law
Point of View: Rededicating Ourselves to Leadership and Ethics in Law Enforcement, by Vane. R. King, Flint Michigan Police Department
ethics.txt
Ethics for BBS Users
fbi
Excerpts from the FBI & Your BBS (From Ripco)
fbi-miss.txt
The FBI Mission Statement
fbi_mail.txt
Appeal Filed in Todd Patterson v FBI Case (July 26, 1989)
fbiaug01.law
Accreditation: A Small Department's Experience by Raymond E. Arthurs, Chief, Willowbrook Police
fbiaug02.law
Odometer Rollback Schemes, by James E. Scripture, Special Agent, FBI, Boston Massachusetts
fbiaug03.law
Police Practices: Custom's BET Program
fbiaug04.law
The Tactical Incident: A Total Police Response by Nicholas F. Kaiser, MA, Troy Police
fbiaug05.law
A New Approach to FTO Training by Blair Rankin, North Carolina Police
fbiaug06.law
Focus on NCIC: Identifying the Unidentified
fbiaug07.law
The Federal Grand Jry: Exceptions to the Rule of Secrecy (Part I)
fbijul01.law
Lateral Entry: A Move Toward the Future, by J. Eddie Nix, Leut. Cobb County, Georgia Police
fbijul02.law
Confronting the Terrorist Hostage Taker, by G. Dwayne Fuselier, FBI
fbijul03.law
Police Practices: Bomb Dog Teams
fbijul04.law
Campus Security: The Mule Patrol, by James A Huff, Central Missouri State University Campus Police
fbijul05.law
The Forensic Anthropologist, by Robert W. Mann, MA, Smithsonian Institution
fbijul06.law
Focus on Crime Prevention: Business and Government Working Together
fbijul07.law
Anticipatory Search Warrants, by A. Louis DiPietro, FBI
fbijun01.law
The Yardies: England's Emerging Crime Problem, by Roy A. C. Ramm, Detective Chief Superintendent, London England
fbijun02.law
Focus on Forensics: Latent Shoeprint Analysis
fbijun03.law
Towing Companies: Friends or Foes? By Michael C. Gillo, Attorney's Office, Ft. Lauderdale, Florida
fbijun04.law
Police Practices: The Nelson-Denny Experiment
fbijun05.law
Facility Planning In Colorado: Form Vs. Function by James D. Munger, Colorado Springs
fbijun06.law
Records Management in the 1990s by Daniel L. Arkenau
fbijun07.law
Research Forum: FBINA Graduate Survey
fbijun08.law
B.L.O.C.: Business Leaders Against Organized Crime, by Mike King, Administrative Assistant, Weber County, UT Attorney's Office
fbijun09.law
DNA Testing and the Frye Standard, by Robert A. Fiatal, FBI
fbitop10.hum
FBI Top Ten Countdown, January, 1986
feb01.law
Privitization of Prisons: Fad or Future, by Lt. David K. Burright, Linn County Sheriff's Office, Albany, OR
feb02.law
The Administrative Warning Ticket Program by Lt. Andrew J. Barto, Romeoville, IL
feb03.law
Arson Investigations by William A. Tobin, FBI Laboratory
feb04.law
The Criminal Behavior of the Serial Rapist, by Robert R. Hazelwood, MS, Behavioral Science Instruction/Research Unit
feb05.law
Large Vehicle Stops
feb06.law
Critical Incident Stress Debriefing
feb07.law
Foriegn Searches and the Fourth Amendment, by Austin A Andersen, LL.B>, FBI
feb08.law
Florida's Computer Crime
fed_lawsta.law
Federal Computer Crimes Law, 1984/1986
fedbbs3.lst
Federal Public Access Bulletin Boards, March 1989
fedcompseize.txt
The Federal Computer Seizure Guidelines (1994)
federal.leb
The Federal Grand Jury: Exceptions to the Rule of Secrecy (Part II) by Austin A. Anderson
fencesp06.law
ROP-ing In Fences, by James Rainum, Officer, Repeat Offender Project, Washington DC
fija.txt
A New Hope for Freedom: Fully Inform Jurors by Don Diog
fija02.txt
If You're Called for Jury Duty, by Don Doig
files.tut
File Transfer Liability
finalmo.txt
An Attempt to Modify Phone Rules for BBS Lines by Missouri, 1992
fl_lawsta.law
Florida Computer Crimes Act, 1978
foia-pa.txt
A Citizen's Guide on Using the Freedom of Information Act and the Privacy Act of 1974 to Request Government Records (September 20, 1991)
foia.txt
Using the Freedom of Information Act
foiacit.txt
A Citizen's Guide to using the Using the Freedom of Information Act and the Privacy Act of 1974 to Request Government Records (July 10, 1991)
forbes.txt
A Little Perspective, Please, by Mitchell Kapor of the EFF (June 21, 1993)
forenp11.law
The FBI's Forensic DNA Analysis Program, by Jay V. Miller, FBI
funny.txt
Very Large Rant and Sales Pitch about Paper Money Being Evil
ga_lawsta.law
The Georgia Computer Crimes Law
grandjur.txt
The Federal Grand Jury: Exceptions to the Rule of Secrecy by Austin A Andersen
gunshot.txt
Gunshot Primer Residue: The Invisible Clue by Roger W. Aaron
gunshotp19.law
Gunshot Primer Residue: The Invisible Clue, by Roger W. Aaron, FBI Laboratory
gvtscrcy.txt
The Government's Mania for Secrecy, 1987
hackers0.law
Introduction to the San Luis Obispo Incident
hackers1.law
Amateur Hackers Tripped Up, by Danna Dykstra Coy
hackers2.law
Computer Case Takes a Twist, by Danna Dykstra Coy
hackers3.law
Hackers Off Hook, Property Returned, by Danna Dykstra Coy
hackers4.law
A Case for Mistaken Identity... Who's Privacy Was Really Invaded?
hakharas.txt
Hackers and the Authorities: A Question of Harassment, as Seen in an Article from a Recent Newspaper on November 15, 1992
handbook.txt
What You Should Know if You're Accused of a Crime by Joyce B. David Esq.
hategrou.law
hate Violence In the United States, by Floyd I. Clarke, FBI
hategrou.txt
Hate Violence in the United States, by Floyd I. Clarke
hi_lawsta.law
Hawaii Computer Crimes Law, 1984
hightech.law
A Low Cost Approach to High Technology, by Mark Clark, Lt. South Portland, ME Police
hightech.txt
A Low Cost Approach to High Technology by Lt. Mark Clark
homeless.law
Police and the Homeless, by Barney Melekian, Lt. Santa Monica, California Police
homeless.txt
Police and the Homeless by Barney Melekian
hostage.law
Hostage/Barricade Incidents: High Risk Factors and the Action Criteria by G. Dwayne Fuselier
hostage.txt
Hostage/Barricade Incidents: High Risk Factors and the Action Criteria by G. Drawyne Fuselier
hostaker.txt
Confronting the Terrorist Hostage Taker by G. Dwayne Fuselier
hotel.law
Police Practices: Operation Hotel-Motel
howtobeattheirs.txt
Tax Resistance Primer: How to Beat the IRS
howtosel.txt
Making Shareware Pay, by Gary Raymond
ia_lawsta.law
Iowa Computer Crimes Law, 1984
id_lawsta.law
The Idaho Computer Crimes Law, 1982
ident.txt
Identification: A Move Towards the Future by Bruce J. Brotman
identp01.law
Identification: A Move Towards the Future, by Brice J. Brotman
il_lawsta.law
The Illinois Computer Crimes Law, 1981/1987
in_lawsta.law
The Indiana Computer Tampering Law, 1986
intrundg.txt
An Introduction to the Computer Underground, by The Butler (February 26, 1991)
invbasic.law
Environmental Crimes: Investigative Basics, by Martin Wright, Dept. Assistant Director, EPA
invbasic.txt
Environmental Crimes: Investigative Basics by Martin Wright
irs-20q.txt
IRS and Business Taxpayers Disagree Over Who Should be Considered Employees: Why, Results, Solutions
jan01.law
Director's Message: Facing the Future, by William S. Sessions, Director, FBI
jan02.law
The Future of Law Enforcement: Dangerous and Different, by Alvin and Heidi Toffler
jan03.law
The Changing Face of America, by Robert C. Trojanowicz, Ph.D.
jan04.law
The Future of Policing, by William l. Tafoyna, Ph.D.
jan05.law
Public Law Enforcement/Private Security: A New Partnership? By Terrence J. Mangan
jan06.law
A Look Ahead: Views of Tomorrow's FBI, by Richard Sonnichsen
jan07.law
Tomorrow's America: Law Enforcement's Coming Challenge, by Rob McCord
jobhome.law
Taking the Job Home, by Richard N. Southworth, Attorney General's Office, Virginia
joint-cu.art
Joint Custody: A Simplistic Solution by Robert D. Felner and Lisa Terre
joyce
Beyond the Orality/Literacy Dichotomy: James Joyce and the pre-History of Cyberspace by Donald F. Theall (May 1992)
judna.txt
Judicial Acceptance of DNA Profiling by John T. Sylvester and John H. Stafford
judnap26.law
Judicial Acceptance of DNA Profiling, by John T. Sylvester, J.D.
judseal.txt
The Judicial Sealing Requirement in Electronic Surveillance: A Matter of Immediacy by Robert A. Fiatal
juryban.txt
Local Jury Banned by Judge After Ruling Man Innocent
jurynul.txt
Information on Jury Nullification
juryrig.txt
How they Stack the Jury in Georgia
juryrite.inf
Fully Informed Juries
juryrite.txt
Toward a Bill of Jury Rights
ks_lawsta.law
Kansas Computer Crimes Law, 1985
ky_lawsta.law
Kentucky Computer Crime Law, 1984
la_lawsta.law
The Louisiana Computer Related Crime Bill, passed in 1984
lawbbs.txt
Directory of Law-Oriented Bulletin Boards, 1986
laws.txt
Interesting US Laws, taken from the Seattle P-I
lebmay01.law
Director's Message, Law Day 1990, by William S. Sessions, FBI
lebmay02.law
G.R.A.M.P.A. COPS, by Jere L. Spurlin, Chief of Police, Ft. Meyers, Florida
lebmay03.law
High School Suicide Case Intervention, by David Fisher, Pinnellas County, Florida, Sheriff's Office
lebmay04.law
Police Practices: Elderwatch
lebmay05.law
Police Practices: Selecting the Right Officers: DARE
lebmay06.law
Analytical Intelligence Training, by Marilyn B. Peterson
lebmay07.law
Law Enforcement Exploring, by Steve Farish, Texas Law Enforcement Explorer Advisor's Association
lebmay08.law
Curtilage: The Fourth Amendment in the Garden, by John Gales Sauls, FBI
lebmay09.law
Legal Brief: Maryland v. Buie, Supreme Court Decision
legal.tec
Some Examples of Legal Loopholes by Keith K (February 13, 1994)
legalfnt.txt
US Copyright Office Rules Font Software is Not Copyrightable (November 30, 1989)
leglbyt1.txt
Legal Bytes Volume 1 Number 1 by George, Donaldson and Ford (1993)
leglbyt2.txt
Legal Bytes Volume 1 Number 1, by George Donaldson and Ford (1993)
len.ros
Complete information on the Len Rose (Legion of Doom Source Code) Case
listcoun.txt
Large List of United States Counties
lith_law.txt
Legally, Lithuania's Case is Open and Shut, by Vytautas Landsbergis, President of Lithuania
lotus.txt
Discussion of Lotus' Plan to Sell personal Information
lvstops.txt
Large Vehicle Stops from William D. Dean
mail_exp
Obtaining Host and Address Information by Ron Ray
mailordr
How to Successfully Buy Through Mail Order and Protect Your Rights
manage05.law
What They Didn't Teach in Management School, by James D. Sewell, Ph.D., Florida Criminal Justice Executive Institute
maps_cop.in
Cecil Adams on Copyright Traps in Maps (well, sort of)
mar90_1.law
The Preliminary Investigative Process, by Chief Gordon F. Urlacher, Rochester, New York, Police Department
mar90_2.law
Store Diversion Burglaries, by Detective Robert P. Meiners, Lincolnwood, Illinois, Police Department
mar90_3.law
Police Practices: Operation Alert, by Captain Mark Willingham, Division of Alcoholic Beverages and Tobacco
mar90_4.law
Police Retirement: The Impact of Change, by John M. Violenti, Ph.D, Department of Social and Preventive Medicine, SUNY New York
mar90_5.law
Managing Police Basic Training Cirriculum, by Rene A. Browett, Northern Virginia Criminal Justice Academy
mar90_6.law
Personal Liability: The Qualified Immunity Defense, by Daniel L. Schofield, S.J.D., FBI
massmodmtax.law
New Massachusetts Modem Tax Proposed (For Real)
md_lawsta.law
The Maryland Computer Crimes Law
medialaw.law
Media Performance and International Law, by Howard H. Frederick, Ph.D.
medicp21.law
Medicaid Fraud, by Larry L. Bailey, Colorado Attorney General's Office, Medicaid Fraud Control Unit, Denver Colorado
mi_lawsta.law
The Michigan Computer Crimes Law
military.txt
Military Support to Civilian Law Enforcement Agencies by R. Barry Cronin
militaryp24.law
Military Support to Civilian Law Enforcement Agencies, by R. Barry Cronin, U.S. Marine Corps Headquarters
minnesot
Minnesota Invokes Computer Law by Rachel Parker
mn_lawsta.law
The Minnesota Computer Crimes Law
mo_lawsta.law
The Missouri Computer Crimes Law, 1982
mobile.law
Police Policies: Mobile Command Posts
morris.app
The Court Case against Robert Tappan Morris, 1990-1991
ms_lawsta.law
Mississippi Computer Crimes Law, 1985
mt_lawsta.law
Montana Computer Law Statute
mulepat.txt
Campus Security: The Mule Patrol, by James A. Huff
murphy.txt
Murhpy's Law, and Similar Ilk
mvt.txt
Motor Vehicle Theft Investigations: Emerging International Trends by Mary Ellen Beekman
mvtleb.law
Motor Vehicle Theft Investigations: Emerging International Trends
nafta.txt
Complete Text of the North American Free Trade Agreement (NAFTA) Act (1993)
natural.law
Natural Laws and Natural Rights by James A. Donald (February 28, 1993)
nc_lawsta.law
North Carolina Computer Crime Law
ncic.law
NCIC Training: Hit or Miss, by Don M. Johnson, FBI
ncic.txt
Focus on NCIC: Identifying the Unidentified
ncic2.txt
NCIC Training: Hit or Miss by Don M. Johnson of the FBI
nd_lawsta.law
The North Dakota Computer Fraud and Crime Statute, 1987
ne_lawsta.law
The Nebraska Computer Crimes Law, 1985
newlaw.txt
Dangerous Copyright Law by Stephen Haynes (October 2, 1990)
nh_lawsta.law
New Hampshire Computer Crimes, 1986
nj_lawsta.law
New Jersey Computer-Related Crimes Law, 1984
nov_1.law
The FBI's 10mm Pistol, by John C. All, FBI
nov_2.law
Ammunition Selection: Research and Measurement Issues, by N. J. Scheers, Ph.D.
nov_3.law
Utilizing Job Task Analysis, by Thomas J. Jurkanin
nov_4.law
The Judicial Sealing Requirement In Electronic Surveillance: A Matter of Immediacy, by Robert J. Fiatal
nsa.txt
Harry S. Truman's Declaration of the Creation of the National Security Agency (NSA)
nv_lawsta.law
Nevada Computer Unfair Trade Practice Law, 1983
ny_lawsta.law
New York Penal Law, Computer Crime, 1986
nyappl.law
New York's APPL Program: A New Partnetship, by Anthony M. Voelker
odomroll.txt
Odometer Rollback Schemes by James E. Scripture of FBI
ofc_lostp02.law
Law Officers Killed: 1980-1989, Victoria L. Major, FBI
oh_lawsta.law
Ohio's Computer Crime Law
olw1.txt
Our Lawyer Writes #1: Rodent Milk
olw3.txt
Our Lawyer Writes #3: Getting a Divorce, Quick and Easy
olw5.txt
Our Lawyer Writes #5: I'm a Mistress, can I Get Anything?
op-clean.leb
Operation Clean: Reclaiming City Neighborhoods by Richard W. Hatler
p_view.law
Point of View: A Manager's Guide to Computer Projects, by Charles Brennan, Philadelphia, Pennsylvania, Police Department
p_view.txt
Point of View: Campus Police by Gigi Ray of the Arlington Campus Police Department
p_viewp14.law
Point of View: Campus Police
pa_lawsta.law
Pennsylvania's computer crimes law, 1983/1986
passport.txt
How to Get a State Passport
patrol.law
Perspective: The Patrol Function, by Patrick V. Murphy, Former Police Commissioner of New York City
penreg.txt
PENREG: A Database Management System Designed to Maintain and Manipulate Data Obtained through a Pen Register or DNR (1989)
plateaup16.law
Plateauing in Law Enforcement, by James M. Childers, Lubbock, Texas, Police Department
pntview.txt
Point of View: A Manager's Guide to Computer Products by Charles Brennan
pol-com.leb
Community Policing is Not Police Community Relations by Robert C. Trojanowicz
pol-prac.leb
Police Practices: Seat Belt Awareness Program
pol_com.txt
Community Policing is not Police Community Relations by Robert C. Trojanowicz
pol_prac.txt
Police Practices: Baited Vehicle Detail
pol_pracp10.law
Police Practices: Alternate Fuel Program
pol_pracp24.law
Police Practices: Baited Vehicle Program
police.evasion
Exilic Xyth's Guide to 1st Level Police Evation (November 10, 1990)
policeevasion.txt
Exilic Xyth's Guide to 1st level Police Evasion (November 10, 1990)
policemen.pig
Calling a Policeman a Pig: A New Concept From The Anarchist Cookbook, by The Norwegian Monk
polprac08.law
Police Practices: Miami's Ethnic Sharing Program
polpracp16.law
Police Practices: Operation Star
pope.txt
U.S. Computer Investigation Targets Austinites by Kyle Pope (March 17, 1990)
poster.txt
Wanted Poster for John Richard, the Scofflaw Sysop
posting-
The Risks of Posting to the Internet
posting_
The Dangers of Posting to the Net (A Visit from the FBI)
practice.law
Police Practices: CHP Hazardous Waste Investigation Unit
practice.txt
Police Practices: The Community Outreach Program
practiceleb.law
Police Practices: Pennsylvania's Interdepartmental Communications System
preface.txt
The Federal Zone: Cracking the Code of Internal Revenue by Mitch Modeleski (January, 1994)
prelimin.txt
The Preliminary Investigation Process by Cheif Gordon F. Urlacher
presumed
Presumed Guilty: The Law's Victims in the War on Drugs, 1991 by Andrew Schneider
primes.txt
Primes, Codes and the National Security Agency by Susan Landau
privacy
Computer Privacy vs. First and Fourth Amendment Rights, by Michael S. Borella, 1991
privatiz.nre
The Privatized NREN, by Mitchell Kapor, Electronic Frontier Foundation, February 14, 1991
privpris.txt
Privitization of Prisons: Fad or Future by Lr. David K. Burright
privsoc.law
The Private and Open Society, by John Gilmore
prodigy.law
Prodigy Stumbles as a Forum.. Again
promoteleb.law
Promotion to Chief: Keys to Success in a Small Department
prosecut.law
Evironmental Crimes Prosecution: A Law Enforcement Partnership, by Vincent A. Matulewich, Environmental Protections Bureau, New Jersey
pub_7277.asc
Freedom From War: The United States Program for General and Complete Disarmament in a Peaceful World
pubprivs.txt
Public Law Enforcement/Private Security: A New Partnership? by Terrence J. Mangan and Michael G. Shanahan
pview.txt
Point of View: European Law Enforcement after 1992 by Jan Blaauw
pviewp18.law
Point of View: Eurpoean Law Enforcement after 1945
quotes.txt
Quotes from Many Historical Figures about Juries
ratpatro.law
The Rat Patrol Rides! By Paul C. Ricks, Deputy Chief of Police, Colorado Springs
ratpatro.txt
The Rat Patrol Rides! By Paul C. Ricks of Colorado Springs P.D.
rebuttal.txt
Inslaw's Analysis and Rebuttal of the BUA Report
res-rev.leb
Research Review: Police Use of Discretion: A Comparison of Community, System, And Officer Expectations
resmeas.txt
Ammunition Selection: Research and Measurement Issues by N.J. Scheers and Stephen R. Band
response.txt
A Case for Mistaken Identity... Who's Privacy was Really Invaded? by Jim Bigeloww
reviewl.law
Book Review, "Liability" by Peter Huber
ri_lawsta.law
Rhode Island Computer Crimes Law, 1979
riggs_co
United States Vs. Riggs: Jacking into the Net with the Illinois District Court
rights.txt
Why Your Rights are Guaranteed and should Not Be Taken Away
ripco-wa.rra
Seizure Warrant for the Ripco BBS
ripco.law
The RipCO BBS Seizure
ripcobbs
Seizure Warrant Documents for the RIPCO BBS
safetyleb.law
Safety Action Team, by Rod Englert, Oregon Sheriff
saucs1.txt
The Shareware Author and User Case Study by Daniel Corbier (1994)
sc_lawsta.law
South Carolina Computer Crime Act
school.law
Preparing for School Crisis, by David Nichols, Ph. D.
school.txt
Preparing for School Crisis, by David Nichols of Jacksonville State University (1991)
schoolcr.law
School Crime Stoppers, by Bob Chance, Tulsa Oklahoma Police
schoolcr.txt
School Crime Stoppers by Bob Chance of the Tulsa Police Department
sd_lawsta.law
South Dakota Computer Crimes Law, 1982
search.txt
Searches of Premises Incident to Arrest, by A. Louis DiPietro
searches.txt
Emergency Searchs of Effects, by John Gales Sauls of the FBI Academy
searchp26.law
Inventory Searches: The Role of Discretion, by Austin A Anderson
sentguid.law
Proposed Amendment #59 to the Sentencing Guidelines for United States Courts
serologyleb.law
Serolgical Evidence in Sexual Assault Investigations, by Robert R.J. Grispino, MA, Serolgy Unit, FBI
simson.sec
An Introduction to Computer Security for Lawyers by Simson Garfinkel (1987)
sniper.txt
Police Sniper Training by John Plaster of the Minnesota National Guard
sniperleb.law
Police Sniper Training, by John Plaster, Instructor, MN Guard Counter Sniper School
softmark.asc
Information and Documents Needed for Software Copyright Application
softmarkdoc.law
Information and Documents Needed for Software Copyright Application
softpat.txt
A Partial List of Software Patents, compiled by Michael Ernst (April 12, 1992)
srrapist.txt
The Criminal Behavior of the Serial Rapist, by Robert R. Hazelwood
stcomplw
A Cross-Reference of US States and Laws Written for Them
steroids.txt
The Abuse of Anabolic Steroids by Charles Swanson, University of Georgia
steroids19.law
Abuse of Anabolic Steroids, by Charles Swanson, Ph. D., U of Georgia
stripesp16.law
Honolulu's Stripes: Training for Sergeants, by Robert D. Prasser, Captain, Honolulu Hawaii Police Department
suc-inte.txt
Successful Interviewing by James R. Ryals, March 1991
sucinte.txt
Successful Interviewing by James R. Ryals
sueirs.txt
Wage Earners Should Consider Possibility of Suing IRS for Tax Refunds Rather Than Filing Exempt W-4 Forms by Bill Conklin
suicide.txt
The High Scool Suicide Crisis Intervention by David Fisher of the Pinnellas Sheriff's Office
summary.txt
The INSLAW affair: September 10, 1992
supreme.law
Selected Supreme Court Cases: 1989-1990 Term: William U. McCormack, FBI
suprule1.txt
The Rules of the U.S. Supreme Court
suprule2.txt
The Rules of the U.S. Supreme Court (Part II)
suprule3.txt
The Rules of the U.S. Supreme Court (Part III)
survive01.law
The Will to Survive, by Stephen R. Band
swiss.txt
Getting a Discretionary Swiss Banking Account
swt.txt
Seizing Wire Transfers, by The Wall Street Journal (September 20, 1993)
sysops
What Files are Legal for Distribution on a BBS?
targetd.law
Washington D.C.'s Operation "On Target" by Eric W. Witzig, Ret., Washington DC Police
taxother.tut
Tax Deductibility of BBS Operations
teamworkp06.law
Teamwork: An Innovative Approach, by Alan Youngs, Captain, Lakewood Colorado Police
tempest.law
Eavesdropping on the Electromagnetic Eminations of Digital Equipment: The Laws of Canada, England, and the United States
thefacts.law
Push Button Felonies: KPFA-FM Radio Broadcast July 26, 1990
theft_of.sof
Theft of Computer Software: A National Security Threat by William J. Cook
tm.tut
Trademarks in Brief (Overview)
tn_lawsta.law
Tennesse Computer Crimes Act
tomorfbi.txt
A Look Ahead: Views of Tomorrow's FBI by Richard Sonnichsen, Gail O. Burton and Thomas Lyons
towingco.txt
Towing Companies: Friends or Foes? By Michael C. Gillo
trash.law
Trash Inspections and the Fourth Amendment, by Thomas W. Kukura, JD
trash.txt
Trash Inspections and the Fourth Amendment, by Thomas V. Kukura of the FBI
travel.rgt
A How-To Information Sheet for Sovereigns: A Challenge to the 6th Amendment's Jurisdiction by Howard J. Freeman (March 23, 1993)
tx_lawsta.law
Texas Computer Crime Law
uic.law
The League for Programming Freedom Statement
uncharte
The Charter of the United Nations (July 7, 1994)
us&scon1.txt
The United States and the States under the Constitution, by C. Stuart Patterson
us&scon2.txt
The United States and the States under the Constitution, by C. Stuart Patterson (Part 2)
us&scon3.txt
The United States and the States under the Constitution, by C. Stuart Patterson (Part 3)
us&scon4.txt
The United States and the States under the Constitution, by C. Stuart Patterson (Part 4)
us&scon5.txt
The United States and the States under the Constitution, by C. Stuart Patterson (Part 5)
us&scon6.txt
The United States and the States under the Constitution, by C. Stuart Patterson (Part 6)
uscon.law
The Constitution of the United States
userintf.cp
Protecting Rights in User Interface Designs by Ben Shneiderman (November 27, 1992)
ut_lawsta.law
The Utah Computer Crimes Act
va_lawsta.law
The Virgina Computer Crimes Act
vic-wit.txt
Victim-Witness Assistance by Joseph R. Luteran, March 1991
visiop08.law
Visiophones: French High Tech Security, by Pierre Marie Bourniquel, Biarritz, France
wa_lawsta.law
Computer Crimes Law in Washington State
waco.txt
The Text of the Search Warrant from Waco, Texas
waiver.txt
A Waiver of Claims pertaining to Adult Sections of Ryan's Bar BBS
way.law
There's Gotta Be a Better Way, by Glen Roberts and Bill Wajk
weaponsp10.law
Vehicular Long Barrel Weapons Mount, by David W. Pisenti, FBI
wi_lawsta.law
Wisconson Computer Crimes Law
wv_law.law
West Virginia Computer Crimes Law
wy_lawsta.law
Wyoming Computer Crimes Law
yardies.txt
The Yardies: England's Emerging Crime Problem, by Roy A.C. Ramm (January, 1988)