|
|||||
|
|
|
|
AntiOnline - This Web site analyzes your computer, remotely, for security problems and tell you how to fix them for free. Confounding Carnivore: How to Protect Your Online Privacy Famous hackers. Infamous crackers. Modern-day Robin Hoods ... or educated thugs? Before you decide, check out our inaugural Hackers' Hall of Fame. 2001 Discovery Doug Muth: UNIX Administrator active in the movement to fight spam. He has advice for administrators as well as lay persons about dealing with security issues online. EPIC - Public interest research center to focus public attention on emerging civil liberties issues and to protect privacy, the First Amendment, and constitutional values. Online Privacy Alliance - Companies operating online must protect the privacy of children. The Privacy Leadership Initiative - Consumers must be able to choose how their personal information is used. Here you can find tips to keep your information private, both online and off through tools and resources to help businesses become more knowledgeable about good privacy practices. The Privacy Rights Clearinghouse - Our publications empower you to take action to control your personal information by providing practical tips on privacy protection. Privacy Rights Clearinghouse DOJ's Already Monitoring Modems - Officials revealed they are making use of the electronic surveillance powers granted under the USA Patriot Act recently signed into law. At a Senate Judiciary Committee hearing, assistant attorney general Michael Chertoff said the power to obtain information without court allowed the Justice Department to investigate more thoroughly. 2003 Guide to Computer and Internet Crimes and Cybercrime: Hacking, Intellectual Property Crimes, Policy, Cases, Guidance, Laws, Documents, Web Crimes, Targets (Core Federal Information Series CD-ROM) by U.S. Government -- This comprehensive CD-ROM provides the work of the Justice Department on computer crime and intellectual property crimes and the National Infrastructure Protection Center (NIPC), national critical infrastructure threat assessment, warning, vulnerability, law enforcement investigation and response entity, providing timely warnings of international threats, comprehensive analysis and law enforcement investigation and response. Topics include: The new and revised Electronic Search and Seizure Manual (Searching and Seizing Computers and Obtaining Electronic Evidence in Criminal Investigations, July 2002) NIPC - Information Sharing, Legal Issues, Warnings, Publications, Major Investigations, Incident Reports. Legal Issues of Electronic Commerce Encryption and Computer Crime Federal Code Related to Cybercrime Intellectual Property Crime International Aspects of Computer Crime Privacy issues in the High-Tech Context Prosecuting Crimes Facilitated by Computers and the Internet Protecting Critical Infrastructures Cyberethics and Cyberethics for Kids. Nearly 9,000 pages allowing direct viewing on Windows and Apple Macintosh systems. Reader software is included. Our CD-ROMs are privately compiled collections of official public domain US government files and documents. They present thousands of pages that can be rapidly reviewed, searched, or printed. Vast archives of important public domain government information that might otherwise remain inaccessible. A great reference work and educational tool. There is no other reference as fast, convenient, comprehensive, thoroughly researched, and portable.
Kari & Associates Our site averages over 65,000 visitors a week!
Copyright Kari Sable 1994-2006 |
Crime
and Law in Media Culture
|