Computer & Internet Security - Privacy
E-mail Discussion Lists
Site Map
DNA - Forensics
Green River Killer
Historic Crime
Organized Crime
Hate Crimes
Sex Crimes
Juvenile Crime
Child Abuse
Domestic Violence
Unsolved Cases
Missing Persons
Mental Illness
Elder Abuse
Law Enforcement
Drug Wars
White Collar Crime
Media & Crime
Computer Crimes

Cyberspace Crime (International Library of Criminology, Criminal Justice & Penology)
by David Wall

Handbook of Applied Cryptography
by Alfred J. Menezes, Paul C. Van Oorschot, Scott A. Vanstone

Cryptography, public-key cryptography, emerged in the last 20 years as the subject of an enormous amount of research for information security. Standards are emerging to meet the demands for cryptographic protection. Public-key cryptographic techniques are in widespread use, in financial services industry, public sector, and individuals for personal privacy, such as in electronic mail. Reference for the novice or expert.

Cyber Crime: Crime and Detection by Charlie Fuller (Editor)

Computer Crime
Youth Related


Report PC/Net Crimes

AntiOnline - This Web site analyzes your computer, remotely, for security problems and tell you how to fix them for free.

Confounding Carnivore: How to Protect Your Online Privacy

Famous hackers. Infamous crackers. Modern-day Robin Hoods ... or educated thugs? Before you decide, check out our inaugural Hackers' Hall of Fame. 2001 Discovery

Doug Muth: UNIX Administrator active in the movement to fight spam. He has advice for administrators as well as lay persons about dealing with security issues online.

EPIC - Public interest research center to focus public attention on emerging civil liberties issues and to protect privacy, the First Amendment, and constitutional values.

Online Privacy Alliance - Companies operating online must protect the privacy of children.

The Privacy Leadership Initiative - Consumers must be able to choose how their personal information is used. Here you can find tips to keep your information private, both online and off through tools and resources to help businesses become more knowledgeable about good privacy practices.

The Privacy Rights Clearinghouse - Our publications empower you to take action to control your personal information by providing practical tips on privacy protection. Privacy Rights Clearinghouse

DOJ's Already Monitoring Modems - Officials revealed they are making use of the electronic surveillance powers granted under the USA Patriot Act recently signed into law. At a Senate Judiciary Committee hearing, assistant attorney general Michael Chertoff said the power to obtain information without court allowed the Justice Department to investigate more thoroughly.

2003 Guide to Computer and Internet Crimes and Cybercrime: Hacking, Intellectual Property Crimes, Policy, Cases, Guidance, Laws, Documents, Web Crimes, Targets (Core Federal Information Series CD-ROM) by U.S. Government -- This comprehensive CD-ROM provides the work of the Justice Department on computer crime and intellectual property crimes and the National Infrastructure Protection Center (NIPC), national critical infrastructure threat assessment, warning, vulnerability, law enforcement investigation and response entity, providing timely warnings of international threats, comprehensive analysis and law enforcement investigation and response. Topics include: The new and revised Electronic Search and Seizure Manual (Searching and Seizing Computers and Obtaining Electronic Evidence in Criminal Investigations, July 2002) NIPC - Information Sharing, Legal Issues, Warnings, Publications, Major Investigations, Incident Reports. Legal Issues of Electronic Commerce Encryption and Computer Crime Federal Code Related to Cybercrime Intellectual Property Crime International Aspects of Computer Crime Privacy issues in the High-Tech Context Prosecuting Crimes Facilitated by Computers and the Internet Protecting Critical Infrastructures Cyberethics and Cyberethics for Kids. Nearly 9,000 pages allowing direct viewing on Windows and Apple Macintosh systems. Reader software is included. Our CD-ROMs are privately compiled collections of official public domain US government files and documents. They present thousands of pages that can be rapidly reviewed, searched, or printed. Vast archives of important public domain government information that might otherwise remain inaccessible. A great reference work and educational tool. There is no other reference as fast, convenient, comprehensive, thoroughly researched, and portable.


Kari & Associates
PO Box 6166
Olympia, WA 98507

Our site averages over 65,000 visitors a week!


Copyright Kari Sable 1994-2006

Crime and Law in Media Culture
by Sheila Brown
How are crime and the law defined by media culture? Why do we need media crime? What is the impact of cyberculture on crime and the law? The range and scope of contemporary media forms are vast, but what is the place of law and criminology in relation to them? The whole of society, including crime and criminal justice, is embraced by media culture. 'The media' are not just a set of institutions, but constitute a way of existence that defines crime and legal forms. In short, the book sets out to assess how crime and the law, and our understanding of them, are produced and reproduced, disturbed, challenged and changed through media culture. The author organizes her inquiry around substantive topic areas set within a theoretical framework. From soaps to President Clinton, globalism to cyberworlds, she provides an accessible critique of 'cultural theory' and a theoretically coherent examination of the relationship between crime, law, media and culture. In all, this innovative and engaging text, containing a wide range of lively examples, aims to open up the boundaries between the more traditional aspects of law and criminology, and the broader concerns of sociological and cultural studies.


| privacy