Computer Law Enforcement
E-mail Discussion Lists
Site Map
DNA - Forensics
Green River Killer
Historic Crime
Organized Crime
Hate Crimes
Sex Crimes
Juvenile Crime
Child Abuse
Domestic Violence
Unsolved Cases
Missing Persons
Mental Illness
Elder Abuse
Law Enforcement
Drug Wars
White Collar Crime
Media & Crime
Computer Crimes

Crime and Law in Media Culture
by Sheila Brown
How are crime and the law defined by media culture? Why do we need media crime? What is the impact of cyberculture on crime and the law? The range and scope of contemporary media forms are vast, but what is the place of law and criminology in relation to them? The whole of society, including crime and criminal justice, is embraced by media culture. 'The media' are not just a set of institutions, but constitute a way of existence that defines crime and legal forms. In short, the book sets out to assess how crime and the law, and our understanding of them, are produced and reproduced, disturbed, challenged and changed through media culture. The author organizes her inquiry around substantive topic areas set within a theoretical framework. From soaps to President Clinton, globalism to cyberworlds, she provides an accessible critique of 'cultural theory' and a theoretically coherent examination of the relationship between crime, law, media and culture. In all, this innovative and engaging text, containing a wide range of lively examples, aims to open up the boundaries between the more traditional aspects of law and criminology, and the broader concerns of sociological and cultural studies.


Computer Crime
Youth Related
Report PC Crimes

DOJ's Already Monitoring Modems - Officials revealed they are making use of the electronic surveillance powers granted under the USA Patriot Act recently signed into law. At a Senate Judiciary Committee hearing, assistant attorney general Michael Chertoff said the power to obtain information without court allowed the Justice Department to investigate more thoroughly. He added it was helping to bring law enforcement and intelligence investigations closer together. Cable modem users can be monitored without the permission of a judge. Section 211 of the act alters federal law so cable operators can disclose subscribers' identifiable information to government agencies. Chertoff said the government has the power to obtain court orders for logging information from out of district ISPs.

The booming science -- and business -- of computer forensics. With a new wave of tools and techniques for computer criminals to crack into corporate networks, government experts expect 2001 to bring more computer crime than ever before.

Catching Crooks With Computers - Law enforcement agencies are increasingly turning to new, high-tech weapons like computers and digital imaging systems to fight the war on crime. American City & County

2003 Guide to Computer and Internet Crimes and Cybercrime: Hacking, Intellectual Property Crimes, Policy, Cases, Guidance, Laws, Documents, Web Crimes, Targets (Core Federal Information Series CD-ROM) by U.S. Government -- This comprehensive CD-ROM provides the work of the Justice Department on computer crime and intellectual property crimes and the National Infrastructure Protection Center (NIPC), national critical infrastructure threat assessment, warning, vulnerability, law enforcement investigation and response entity, providing timely warnings of international threats, comprehensive analysis and law enforcement investigation and response. Topics include: The new and revised Electronic Search and Seizure Manual (Searching and Seizing Computers and Obtaining Electronic Evidence in Criminal Investigations, July 2002) NIPC - Information Sharing, Legal Issues, Warnings, Publications, Major Investigations, Incident Reports. Legal Issues of Electronic Commerce Encryption and Computer Crime Federal Code Related to Cybercrime Intellectual Property Crime International Aspects of Computer Crime Privacy issues in the High-Tech Context Prosecuting Crimes Facilitated by Computers and the Internet Protecting Critical Infrastructures Cyberethics and Cyberethics for Kids. Nearly 9,000 pages allowing direct viewing on Windows and Apple Macintosh systems. Reader software is included. Our CD-ROMs are privately compiled collections of official public domain US government files and documents. They present thousands of pages that can be rapidly reviewed, searched, or printed. Vast archives of important public domain government information that might otherwise remain inaccessible. A great reference work and educational tool. There is no other reference as fast, convenient, comprehensive, thoroughly researched, and portable.


Kari & Associates
PO Box 6166
Olympia, WA 98507

Copyright Kari Sable 1994-2006

Cyberspace Crime (International Library of Criminology, Criminal Justice & Penology)
by David Wall

Cybersex Cop -- The growth of the web has led to an explosion of a new kind of pornography. But when a web site deals with child pornography, law enforcement gets involved. Don Daufenbach of the U.S. Customs Service pursues leads that result in the arrest of a child pornographer. Along with agent Daufenbach, interviews with a convicted child pornographer, internet experts and a member of the ACLU present a this troubling issue.

Handbook of Applied Cryptography
by Alfred J. Menezes, Paul C. Van Oorschot, Scott A. Vanstone

Cryptography, public-key cryptography, emerged in the last 20 years as the subject of an enormous amount of research for information security. Standards are emerging to meet the demands for cryptographic protection. Public-key cryptographic techniques are in widespread use, in financial services industry, public sector, and individuals for personal privacy, such as in electronic mail. Reference for the novice or expert.

Cyber Crime: Crime and Detection by Charlie Fuller (Editor)

| privacy