About
Community
Bad Ideas
Drugs
Ego
Erotica
Fringe
Society
Law
... and Justice for All
High Profile Legal Cases
Legal Forms
Technology
register | bbs | search | rss | faq | about
meet up | add to del.icio.us | digg it

... and Justice for All

Cops don't solve crimes, cops come up with stories that explain crimes. If the legal system can convince a jury that their story is what actually happened, some poor sucker is going to jail. If you're a suspect in a crime, any information you give may fit with the story they've created, or it may not, or the cops may create a new story to fit the information you've given them.

10 Big Myths about Copyright Explained by Brad Templeton
 After April 1, 1989, almost everything created privately in the USA is copyrighted and protected whether it has a notice or not.
A Computer and Information Technologies Platform by CPSR
 As people who design, create, study, and use computer and information technologies, we have taken the initiative to develop a political platform for these technologies. This platform describes a plausible, possible program for research, development, and implementation of computer and information technologies that will move towards resolving our most pressing social needs.
A Look at Organized Crime by Woody Allen
 It is no secret that organized crime in America takes in over forty billion dollars a year. This is quite a profitable sum, especially when one considers that the Mafia spends very little for office supplies.
A New Approach to Field Training Officer Program by Blair Rankin
 Prior to February 1989, the High Point, North Carolina, Police Department was using a traditional field training officer (FTO) program to supplement its academy training. This program had been in place since the 1970s; however, despite a highly structured format, new recruits graduating from the program reflected inconsistent work habits and attitudes.
A Skunk in the Jury Box by Amnesty Int'l
 Victor Saldaño, an Argentine national, was arrested in 1995 in Texas, USA. He was not informed of his rights upon arrest to contact his consulate. He was charged with capital murder. At the trial, the state obtained a conviction, and the proceedings moved into a separate sentencing phase.
Accreditation: A Small Department's Experience by Raymond E. Arthurs
 To this end, CALEA researched, tested, and approved standards for law enforcement administration and operations. These standards were then made available to agencies through an accreditation program. Today, they still serve as the basis for law enforcement agencies to demonstrate voluntarily that they meet professional criteria.
Against User Interface Copyright by The League for Programming Freedom
 In June 1990, Lotus won a copyright infringement suit against Paperback Software, a small company that implemented a spreadsheet that obeys the same keystroke commands used in Lotus 1-2-3. Paperback was not accused of copying code from 1-2-3---only of supporting compatible user commands. Such imitation was common practice until unexpected court decisions in recent years extended the scope of copyright law.
Age of consent in every state
Amateur Action Bust by Keith Henson
 Monday night about 8 pm, Robert called (at that time I had not met him in person). A search warrant was being served at that very moment by the US Postal Inspectors, who (with the help of San Jose cops) were packing up his equipment and carting it out--again.
An International Criminal Court for Transnational Companies? by Francois Rigaux
 Transnational companies (TNCs) are economic agents of private law and are subject in principle to rule of law and to the jurisdiction of its courts. The transnational group does not, in itself, possess an identity which can be distinguished from each of the entities that make it up, so that it can only be obliged to answer for its acts in a fragmented way, so that it benefits from the opposing interests of the States in which it operates.
Analytical Intelligence Training by Marilyn B. Peterson and R. Glen Ridgeway
 The ability to analyze is very important in law enforcement. Every investigator uses analytical ability on the job daily--from the investigation of a single traffic accident to the most complex fraud and money laundering schemes. Analytical ability is what makes a good investigator.
Anticipatory Search Warrants by A. Louis DiPietro
 Rather than risking either loss or suppression of the evidence, the officer can use an anticipatory or prospective search warrant. An anticipatory search warrant is based on a showing of probable cause that at some future time (but not presently) certain evidence of crime will be located at a specific place.
Arson Investigations by William A. Tobin
 Part of the FBI's investigation involved actual test burnings of mattresses of varying inner-spring construction. The mattresses were placed in a room full of furniture at the FBI's Test Burn Facility in Quantico, VA.
Art in the Digital Age
Attica Guards Lobby for Inhumane Treatment by Ian Williams Goddard
 A group of the trigger happy Attica prison guards that massacred 29 prison inmates and the 10 hostages they held during a 1971 riot are apparently not satisfied with their contribution to human suffering. Upset that there are prison inmates they have not destroyed, these guards have formed a national lobbying organization in an effort to halt humane treatment of prisoners.
Audit of the Pittsburg Police Department, Part 1 by Tom Flaherty
 The following audit of Pittsburgh's Police Department was released to the public on Aug. 20, 1996. Interestingly, even though the audit reveals that 59 cops have had five or more complaints launched against them by civilians or other cops, and even though 40 percent of cops on the force have had at least one complaint launched against them, Mayor Tom Murphy claims the audit confirms his contention that problems at the Pittsburgh Police Department amount to only "a few bad apples,".
Audit of the Pittsburg Police Department, Part 2 by Tom Flaherty
 Of these 281 unfounded complaints, 262 were filed against employees of the Police Bureau. The rest were filed against other employees of the Public Safety Department, such as fire fighters, paramedics, building inspectors, etc. Once we compiled the numbers on unfoundeds, we immediately removed them from our data and did not consider them in any of our remaining analysis.
Australian Victorian police Warrant. Duplicated exactly
B.L.O.C.: Business Leaders Against Organized Crime by Mike King
 Most law enforcement budgets can barely pay reactive costs, let alone proactive ones. However, in Weber County, Utah, a funding source has been found that has reaped substantial benefits for both the police department and the community. That funding source is B.L.O.C.--Business Leaders Against Organized Crime.
Bank Employee Embezzlement by Denise M. Dube
 The bank estimated that it experienced approximately 30 employee embezzlement cases a month, with a resultant loss of $2.5 million a year. No figure was projected for losses incurred due to undetected cases.
Beastiality Laws from Around the World
 Details on laws around the world affecting zoophiles.
Biography of Several U.S. Supreme Court Judges
 Biography of several U.S. Supreme Court Judges obtained from the legal archive at info.umd.edu.
Bombmaking Information and the First Amendment by US DOJ
 In order to prove that a person disseminating bombmaking information did so as part of a conspiracy to commit a substantive offense, the government need not prove that the substantive offense occurred; however, the government must show, at the very least, that the disseminator (i) knew of the intended unlawful use of the information and (ii) agreed with other conspirators that an offense would be committed. And, as a general matter, the requisite agreement cannot be proved simply by demonstrating that a person has provided a product to another person knowing that the product would be used in the commission of a crime, where the provider of the product is indifferent to its subsequent use. "[A] conspiracy requires agreement, and there is a difference between knowing that something will occur -- even as an absolute certainty -- and agreeing to bring that same 'something' about."
Breastfeeding Is Child Abuse by Dr. Erik Von Krammer PhD
 Article examines the negative effects of breastfeeding on children and why it should be considered sexual abuse to breastfeed the child.
Canadian Computer Crime Law by Henry Waldock
 When the Canadian Parliament considered computer mis-use, viruses were not a problem, but the legislation they produced isn't bad. (I will attach a copy at the end of this message.) They created a kind of "trespass to information" which they called "unauthorized access to a computer system", and a kind of "vandalism to information", which they called "unauthorized alteration or destruction of computerized data". My major criticism is that they didn't explicitly criminalize the unauthorized consumption of computer resources.
Cellmate Informants: A Constitutional Guide to Their Use by Kimberly Kingston Crawford
 In recent years, legal scholars have debated the legality and propriety of using cellmate informants. While some scholars find the practice a "mere strategic deception [that takes] advantage of a suspect's misplaced trust in one he supposes to be a fellow prisoner," others view the use of cellmate informants as being "so offensive to a civilized system of justice that [the practice] must be condemned."
Charles Manson's 1992 Parole Hearing
 It's best you look into my mind now while you got a chance while I'm still here. I know a lot about law. I know the judge's bench. I know crime and school and doctors and reports and I know bad and good and money and the economy and gambling, prostitution. I see the world from the underworld up.
Civil Forfeiture by Thomas V. Kukura
 The U.S. Department of Justice has determined that a crucial component of effective drug law enforcement is the forfeiture of real property used to facilitate illicit drug trafficking. It was not until 1984 that Congress authorized the civil forfeiture of real property used or intended to be used to facilitate drug trafficking.
Civil Rights Cases and Police Misconduct by John Epke and Linda Davis
 The two major entities involved in civil rights cases are the Civil Rights Division (CRD) of the U.S. Department of Justice (DOJ) and the FBI's Civil Rights Unit (CRU). The Civil Rights Division's mission within the Department of Justice is to enforce Federal criminal civil rights statutes and to make prosecutive decisions about civil rights cases.
Clomon vs. Jackson (Fair Debt Collection Practices) by 2d Cir.
 At the outset, it should be emphasized that the use of ANY false, deceptive, or misleading representation in a collection letter violates  1692e--regardless of whether the representation in question violates a particular subsection of that provision. Given the broad sweep of this provision, it would be possible to uphold the district court's decision to grant summary judgment for the plaintiff even if the facts did not establish a violation of subsection (3). We find, however, that the district court properly concluded that the record establishes a violation of subsection (3).
Cognitive Interviewing by Margo Bennett and John E. Hess
 What happens when even these direct questions fail to produce the details needed from witnesses? The cognitive interview method is a proven technique, effective because it provides interviewers with a structured approach to help retrieve such details from the memories of witnesses.
Community Outreach Program
Computer Aided Drafting for Law Enforcement
Con-man or Struggling Angel? Uganda’s Infamous Ex-pat, Van Brink by Victoria S. Gates
 International U.S. fugitive ex-CEO of bank with assets reportedly at $120-billion (USD) interviewed about intelligence reports labeling him a threat to national security and a federal indictment charging him with 140 criminal counts in January 2004.
Congressman George Hansen: America's Most Famous Political Prisoner
 The idea of political prisoners and the abuse they suffer at the hands of their government is not a new one to the majority of the American public. The possibility that America would have such a thing as a "political prisoner" within its own borders would be, to the majority of this nation's citizens, considered the substance of right wing, militia or separatist paranoia.
Control Unit Prisons in the United States
 Having disposed of the official claims regarding the purpose of control units, we turn to the true function. Ironically, this was clearly stated by Ralph Arons, a former warden at Marion, who testified in federal court: ``The purpose of the Marion Control Unit is to control revolutionary attitudes in the prison system and in the society at large''
Convicted by Juries, Exonerated by Science by DOJ
 Persons convicted of murder and rape before DNA profiling became available have sought to have the evidence in their cases reevaluated using this new technology. In some cases, DNA test results have exonerated those convicted of the offenses and resulted in their release from prison.
Copyright Information for Computer Software Hacks by June B. Moore
 It is not necessary to register the work with the Copyright Office in Washington, D.C. to get copyright protection. In fact, it is not necessary to put the copyright notice on to get protection, but the notice is required if you want to sue for infringement, as is registration with the Copyright Office.
Copyright Information for Programmers
 Copyright is a form of protection provided by the laws of the United States (title 17, U.S. Code) to the authors of "original works of authorship" including literary, dramatic, musical, artistic, and certain other intellectual works. This protection is available to both published and unpublished works.
Copyright Law by Jordan J. Breslow
 I am an attorney practicing copyright law and computer law. I read a series of queries in Net.Legal about copyright law and was dismayed to find that people who had no idea what they were talking about were spreading misinformation over the network.
Copyright Law Part 1 - Introduction by Terry Carroll
 I've noticed that copyright questions seem to come up constantly on usenet, not only in misc.legal, but in many newsgroups, from comp.fonts to rec.classical.music. It also happens to be my favorite area of law, so when I abandoned the misc.legal FAQ, I decided to retain the portions dealing with copyright law, and to fashion that into a Copyright Law FAQ. This document is the result.
Copyright Law Part 2 - Copyright Basics by Terry Carroll
 What is a copyright? What is "public domain?" I just wrote a great program/novel/song/whatever. How can I get a copyright on it? How long does a copyright last? Does it need to be renewed? What advantages are there to registering my work with the Copyright Office? How can I register a copyright with the U.S. Copyright Office? What advantages are there to including a copyright notice on my work? Can I ever use a copyrighted work without permission of the copyright holder, or "What is 'fair use?'" Fair use - the legal basis of the doctrine.
Copyright Law Part 3 - Common Miscellaneous Questions by Terry Carroll
 Who owns the copyright to something I wrote at work, me or my company? Is copyright infringement a crime, or a civil matter? What is the statute of limitation for copyright infringement? Can the government be sued for copyright infringement? Can the government copyright its works? Can I legally make a cassette copy of a musical CD for my own use, so I can play it in my car? Are Usenet postings and email messages copyrighted? Are fonts copyrighted? What does "All Rights Reserved" mean? What's the difference between a copyright and a patent? Why is there so little in this FAQ about patents?
Copyright Law Part 4 - International Aspects by Terry Carroll
 What international treaties exist governing copyright, or "What is this Berne Convention I keep hearing about?" Is Freedonia a signatory to either the Berne Convention or to the Universal Copyright Convention?
Copyright Law Part 5 - Further Copyright Resources by Terry Carroll
 Where can I get more information on copyright? What materials related to copyright are available on the Internet?
Copyright Law Part 6 - Appendix by Terry Carroll
 A note about legal citation form, or, "What's all this '17 U.S.C. 107' and.'977 F.2d 1510' stuff?"
Copyright Law and Copyright Infringement by Jordan J. Breslow
 I am an attorney practicing copyright law and computer law. I read a series of queries in Net.Legal about copyright law and was dismayed to find that people who had no idea what they were talking about were spreading misinformation over the network. Considering that the penalties for copyright infringement can include $50,000.00 damages per infringed work, attorneys' fees, court costs, criminal fines and imprisonment, and considering that ignorance is no excuse and innocent intent is not even a recognized defense, I cringe to see the network used as a soapbox for the ill-informed. For that reason, this article will discuss copyright law and license law as they pertain to computer software.
Copyright Laws... for Those Pirate Types by The Hoppist
 Well, you've done it! Just completed getting a copy of every piece of software ever issued... 126 diskbanks full, not counting the stuff in the closet and under the bed. As you sit down to await the next release, you notice the headlines in the local paper about latest BBS and its members being crashed... amongst the other "crimes" was possession of illegally copied software... something about violation of the Copyright Act.
Copyright Your Software by Charles B. Kramer
 To register your copyright, you must file a two page application with the Copyright Office. Getting the application and filling it out is not difficult, and is a good idea. Here's how to get the application, how to learn to fill it out, and some related things people who create software should know.
Copyright and Globalization in the Age of Computer Networks by Richard Stallman
 The Soviet Union treated it as very important. There this unauthorized copying and re-distribution was known as Samizdat and to stamp it out, they developed a series of methods: First, guards watching every piece of copying equipment to check what people were copying to prevent forbidden copying. Second, harsh punishments for anyone caught doing forbidden copying. Third, soliciting informers, asking everyone to rat on their neighbors and co-workers to the information police.
Copyrighting Public Domain Programs by June B. Moore, JD
 The term "public domain" means, from a legal point of view, a program or other work that does not have copyright protection. The indiscriminate use of the word confuses the copyright issues. A work disclosed to a specific group of people for a limited purpose is not necessarily "public domain" software.
Corruption: A Continuing Challenge for Law Enforcement by Otis E. Cooksey
 All too frequently, the public's confidence in law enforcement is shaken by reports of officers falling victim to corruption. While no profession is untouched by corruption, its effect on law enforcement is especially damaging. As guardians of law and order in a free society, law enforcement officers must maintain a consistently high standard of integrity.
Cradle Robbers: A Study of Infant Abductors by Larry G. Ankrm and Cynthia J. Lent
 In June 1988, a woman dressed in a nurse's uniform entered the hospital room of a new mother and told her she needed to take her baby and have him weighed. Sometime later, a nurse's assistant making her routine rounds realized something was wrong when she saw that the infant's empty bassinet had been left in the room.
Critical Incident Stress Debriefing
Curtilage: The Fourth Amendment
Custodial Interrogation by Kimberly A. Crawford
 In Minnick v. Mississippi, (1) the U.S. Supreme Court announced a rule of law that could have a substantial impact on the way many law enforcement agencies conduct custodial interrogations. Specifically, the Court severely curtailed the law enforcement officer's ability to reinitiate custodial interrogation of suspects who had previously invoked the right to counsel.
Custom's Bet Program
Cyberspace and the Legal Matrix: Laws or Confusion? by Lance Rose
 Many like to view life in the electronic networks as a "new frontier", and in certain ways that remains true. Nonetheless, people remain people, even behind the high tech shimmer. Not surprisingly, a vast matrix of laws and regulations has trailed people right into cyberspace.
DARE: Selecting the Right Officer by Philip W. Tribuzio
 The Drug Abuse Resistance Education Program, D.A.R.E., may be one of the most successful undertakings in the history of modern law enforcement. This highly visible program, developed by the Los Angeles Police Department and the Los Angeles Unified Schools, has become a primary tool to teach children how to resist using drugs. The business community and local governments have also recognized the value of D.A.R.E. and continue to provide financial support to operate this valuable program.
DNA Testing and the Frye Standard by Robert A. Fiatal
 Comparisons and conclusions based upon this scientific technique are strong, if not overwhelming, proof of guilt, and prosecutors, investigators, and forensic scientists should anticipate strong defense objections to the admission of such testimony at trial.
Defeating Computer Forensics by protonigger (a.k.a Murder Mouse)
 A quick guide to keeping your data out of the law's hands.
Deliberate Indifference by Michael Callahan
 The U.S. Supreme Court, in Monell v. New York City Department of Social Services (1) ruled that a municipal corporation may be liable for adopting and executing a formal policy that results in a constitutional deprivation. Moreover, the Court ruled that liability can occur for constitutional violations caused by municipal ``customs'' or informal policies, even though they have not been officially approved by city policymakers.
Destroying Tradition by Fascistsmasher
 Gay Marriage is an issue that shouldn't even be on the national agenda, it should be made legal and that is final. Disagree? Then read on.
Detention, Treatment, and Trial of Certain Non-Citizens by George W. Bush
 To protect the United States and its citizens, and for the effective conduct of military operations and prevention of terrorist attacks, it is necessary for individuals subject to this order pursuant to section 2 hereof to be detained, and, when tried, to be tried for violations of the laws of war and other applicable laws by military tribunals.
Developing Police Leadership
Diaster Operations: Not Business as Usual by Michael Guerin
 All too often, when disasters occur, law enforcement officials simply comment, "It's business as usual, just more of it." Unfortunately, experience has shown that this is not the case. In fact, given any disaster situation, law enforcement agencies must alter their priorities, operations, and schedules to meet emergency demands.
Director's Message
Director's Message
Director's Message- Facing the Future
Dispelling Myths about the GPL and Free Software by John Viega and Bob Fleck
 One of the most disturbing aspects of the hype surrounding the de Tocqueville report is the shockingly wrong implication that free software may leave the United States government open to more risk from terrorist organizations than if using proprietary software. In this paper, we will dispel this myth, along with thirteen other misconceptions that are often used to scare corporations and governments away from using free software, particularly that licensed under the GPL.
Do the Cops Like You or Do They HATE You?
 Do the cops like you? or Do they HATE you? Find out in this file! You'll be suprised!
Domestic Violence
Don't Talk to Cops by Robert W. Zeuner
 In the first place, when law enforcement authorities come to see you, there are no "simple questions". Unless they are investigating a traffic accident, you can be sure that they want information about somebody. And that somebody may be you!
Driver License Suspension Programs
Effective Crowd Control by Steven J. Schmidt
 A step-by-step plan is important to effective crowd control. In order to ensure a well-policed event, police managers should prepare ahead of time for any conceivable problems.
Effective Search and Seizure by Patrick Fagan
 Often at the crux of a search and seizure is probable cause - apparent and reliable facts that create a reasonable belief that a crime has been or is being committed. Officers may now be held liable for technicalities stemming from lack of probable cause.
Eight Reasons the US Should Reject the International Cybercrime Treaty by ACLU
 On November 23, the United States signed an extraordinarily broad new treaty to increase cooperation among law enforcement officials of different nations. Officially, this Cybercrime Convention was drafted by the 43-member Council of Europe, with the U.S., Canada, Japan and other countries participating as "observers." In reality, American law enforcement officials have been among the primary drivers behind the treaty.
Elderwatch by Lt. Bob Chance
 In the summer of 1986, because of a substantial increase in the number of crimes directed against the elderly, officers of the Tulsa, Oklahoma, Police Department met with various citizens groups to discuss possible solutions to this problem. Another area of concern expressed at these meetings was the fact that many elderly citizens were not receiving the help they needed because they lacked the information and resources to assist themselves. As a result, the Tulsa Police Department, in conjunction with several community service agencies, initiated Elderwatch, a program designed specifically for Tulsa's elderly citizens.
Electronic Communications Privacy Act of 1986
 Electronic Communications Privacy Act of 1986
Employee Development Programs by John L. Pape, Chief of Police
 Police administrators of small law enforcement agencies face great challenges as they seek to provide service with severely limited financial resources. An area often overlooked as having revenue-saving potential is employee retention. There is no doubt that excessive employee turnover financially drains any police agency, regardless of size. But, in a smaller agency, it can be fiscally devastating. One option is for administrators to consider using a well-structured employee development program to manage employee turnover effectively.
Enforcing the GPL, I by Eben Moglen
 Because there's nothing complex or controversial about the license's substantive provisions, I have never even seen a serious argument that the GPL exceeds a licensor's powers.
Enforcing the GPL, II by Eben Moglen
 So what happens when the GPL is violated?
FBINA Graduate Survey
FISA Implementation Failures
 The secrecy of individual FISA cases is certainly necessary, but this secrecy has been extended to the most basic legal and procedural aspects of the FISA, which should not be secret. This unnecessary secrecy contributed to the deficiencies that have hamstrung the implementation of the FISA.
FISC Open Opinion by FISC
 A rare open opinion from the super-secret Foreign Intelligence Surveillance Court, complaining of misrepresentation of facts from the Justice Department when obtaining warrants.
FISC: An Interview with Judge Royce Lamberth
 Judge Royce C. Lamberth, U.S. District Court for the District of Columbia, was appointed to the federal bench in 1987. Before joining the Judiciary he was a U.S. Army Captain in the JAG Corps, an assistant U.S. attorney, and Chief of the Department of Justice Civil Division. He recently completed a term as presiding judge of the Foreign Intelligence Surveillance Court.
Facility Planning in Colorado
Father's Rights
 Father's Rights: legal information for men undergoing divorce proceedings.
Federal Guidelines for Searching and Seizing Computers by DOJ
 As computers and telecommunications explode into the next century, prosecutors and agents have begun to confront new kinds of problems. These Guidelines illustrate some of the ways in which searching a computer is different from searching a desk, a file cabinet, or an automobile.
Federal Rules of Crimnal Proceedure #2
Federal Rules of Crimnal Proceedure #3
Federal Rules of Evidence #1
Federal Rules of Evidence #2
 The conclusion of the Federal Rules of Evidence.
Florida's Computer Crime
Focus on Forensics: Latent Shoeprint Analysis by Dwain A. Pierce
 Another type of print impression that could be just as valuable has been widely overlooked. Latent shoe prints exist in almost all interior crime scenes but are often ignored by investigators or destroyed by initial responders before the prints could be processed.
Focus on NCIC: Identifying the Unidentified
 Since 1983, NCIC has provided computerized assistance in matching unidentified persons and bodies with missing persons. The key to successful use of the system is the prompt entry of records into NCIC's Unidentified Person File and its Missing Person File.
Foreign Searches and the Fourth Amendment
Free as in Freedom by Sam Williams
 Richard M. Stallman, a staff software programmer at the Massachusetts Institute of Technology's Artificial Intelligence Laboratory (AI Lab), discovered the malfunction the hard way.
Freedom Or Copyright? by Richard Stallman
 Computers can be powerful tools of domination when a few people control what other people's computers do. The publishers realized that by forcing people to use specially designated software to read e-books, they can gain unprecedented power: they can compel readers to pay, and identify themselves, every time they read a book!
Geneva Convention Relative to the Treatment of Prisoners of War
 In addition to the provisions which shall be implemented in peace time, the present Convention shall apply to all cases of declared war or of any other armed conflict which may arise between two or more of the High Contracting Parties, even if the state of war is not recognized by one of them.
Georgia's Sex Laws by Biffnix
 Since there was a discussion in the NNCONSPIRACY sub about Georgia sex laws, I thought I'd post the real deal here, in case anyone was wondering. There was also a good article on a test case of the sodomy statute, in which the defendant lost the case (but was not imprisoned or fined). The decision went 5-4 to uphold the sodomy statute.
Gotta Be A Better Way
Harrassed by the Colorado State Patrol by Franklin Perez
 Shut up and cooperate!!", which is what Trooper Timothy McClinchy said, in an intimidating and loud manner, merely because a citizen questions them by stating "Officers, I have to respectfully state this is turning into harassment."
Hate Violence in the United States by Floyd I. Clarke
 On October 8, 1988, members of the Confederate Hammerskins (CHS) vandalized a Jewish community center, the Temple Shalom Synagogue, and an Islamic mosque in Dallas, Texas. These Skinheads broke windows, shot into walls, and spray painted racist graffiti on the buildings.
History of Control Unit Prisons
 Before this, lockdown was used to control and suppress disruptions within a prison by severely restricting prisoners' rights. Marion was the first prison to make lockdown a permanent condition. Marion combined permanent lockdown with sensory deprivation and administrative (rather than disciplinary) classification to create a streamlined machine for repressing those people the Department of Corrections (DOC) finds objectionable, whether for political, economic, racial, or religious reasons.
Honolulu's Stripes
How to Pass a Lie Detector Test
 When someone hooks you up to a lie detector, they are measuring your physical responses to psychological stimuli. It's something like watching you to see if you blush. There are four levels they can measure.
IRS Bankrupcy Policy
IRS and Terrorist-Related Information Sharing by GAO
 Poor information sharing hinders effectively identifying vulnerabilities and coordinating efforts to detect attacks. As agreed with your offices, as part of our response to your request to monitor the Internal Revenue Service's (IRS) efforts to enhance the security of the tax filing process, we studied how terrorist-related threat information is shared with IRS.
In Defense of Illegal File Sharing by Sigma
 A scathing backlash against the suddenly popular idea that there is something morally wrong with file sharing over the internet.
Information on the ACLU
 The American system of government is built on two basic, counter-balancing principles: 1) that the majority of the people, through democratically elected representatives, governs the country and 2) that the power of even a democratic majority must be limited to insure individual rights. In every era of American history, the government has tried to expand its authority at the expense of individual rights. The American Civil Liberties Union exists to make sure that doesn't happen, and to fight back when it does.
Inmate Transfers to Out of State Private Prisons by Lehn Fitzgerald
 Nickel observed that staff members did not react when inmates flashed gang signs in front of them. In addition, a staff member did not respond when an inmate displayed his ID card that had gang-colored beads hanging off of it. Nickel also reported that inmates were allowed to hold gang meetings in their cells.
Inside America?s Secret Court by Patrick S. Poole
 This is the Foreign Intelligence Surveillance Court (FISC), which considers surveillance and physical search orders from the Department of Justice and US intelligence agencies. During the 20-year tenure of the FISC the court has received over 10,000 applications for covert surveillance and physical searches. To date, not a single application has been denied.
Inventory Searches
Jam the Jails by Anonymous
 After 23 years of Congressional abuse, instead of laws and judgements becoming fairer, non-custodial parents find themselves under increasingly harsher attacks.
Joseph Amrine - Facing Execution on Tainted Testimony by Amnesty Int'l
 The Amrine case has many of the hallmarks of wrongful convictions: No physical evidence, self-interested witnesses, alleged misconduct by investigators, a poor defense lawyer and an appeals process stacked against the defendant.
Judge's Statement to the Shoe Bomber by Judge William Young
 U.S. District Court Judge William Young made the following statement in sentencing shoe bomber Richard Reid to prison.
Keys To Success in a Small Department
Lack of Fathers Rights...Continued. by djrob1
 a very good artical was recientally written by "Alykorn"...a woman...obviously a very smart and tired of the bs type of girl...read it...
Lateral Entry: A Move Toward the Future
Law Enforcement Exploring
Legal Brief
Legal Brief
Legal and Ethical Considerations for Dealing with Electronic Files by Harvey A. Silverglate and Thomas C. Viles
 This small sampling of cases demonstrates the unequivocal determination of the government to conduct investigative seizures of entire computer systems, even when only a few files may be relevant to an investigation or prosecution. Such seizures can have immediate and catastrophic effects on computer users who have no connection to the conduct being investigated.
Looney Laws in L.A. by Robert W. Pelton
 Funny old laws still on the books in Los Angeles.
Managing Police Basic Training Curriculum
Managing for Excellence
Meet and Beat the Lie Detector by William Poundstone
 The polygraph test was invented by William Moulton Marston, who was, strangely enough, also the creator of the "Wonder Woman" comic strip (under the name Charles Moulton). The standard polygraph records only three distinct vital signs. A blood-pressure cuff on the upper arm measures changes in blood pressure. Wires attached to the fingers measure changes in electrical resistance of the skin due to sweating. Rubber straps around the torso measure the breathing rate. This information is displayed as four squiggles on a moving strip of graph paper.
Microsoft DRMOS Palladium -- The Trojan Horse OS
 Although it has been difficult to clearly articulate to the general computer user, it should now be clear the DMCA represents not only risk to fair use and other such issues, but represents a tool by which new technologies such as the DRMOS can be enforced. It and other new laws (SSSCA/CBDTPA) are the legal infrustructure required to make the public use these new DRM technologies and enforce punishment/fines when they are circumvented.
Ministers Team With Police
More on Visitation Rights in Divorce Proceedings
 Under New York law, the State may terminate, over parental objection, the rights of parents in their natural child upon a finding that the child is "permanently neglected."
My Personal Experience With Law Enforcement - Profiling by Nyarlathotep
 Not long ago, my constitutional(and civil) rights were heinously violated. I was a target of illegal "PROFILING" and my protection against ILLEGAL SEARCH AND SEIZURE was ignored and raped.
Neat file about Cop's Modus Operandi
New Law Enforcement Powers Include Secret Searches, Internet Spying and Assassinations
 In an example of how the new laws will be used to punish suspected "terrorists," Long Island activist Connor Cash was officially charged with "providing material support to terrorists," in connection with property damage claimed by the Earth Liberation Front on Long Island late last year.
New laws to outlaw vitamins
Night of the Living Red Squad Files: How Police Share Information by Mitzi Waltz
 Why would someone care that files about his or her political activities are floating around somewhere just out of reach? There are plenty of good reasons. To start with, having a mention of yourself in any police file gives the impression that you might be involved with criminals or criminal activity, even if that's not the case.
No Excuse for Second-Class Justice by Joseph I. Lieberman
 President Bush's Nov. 13 order authorizing military tribunals to detain and try foreign nationals accused of committing terrorist acts against the United States unleashed a firestorm of criticism, most of it suggesting that military trials grossly violate America's commitment to civil rights and civil liberties.
Non-lethal Weapons to Watch For by Candace Etter
 New weapons that the government designs and the police departments love are aimed at you! All agencies claim that the devices are strictly for crowd control, but monitoring agencies, like Human Rights Watch, are rebutting their so-called non-lethal nature. As a matter of fact, many of these devices cause serious, long-term, irreversible damage to human beings.
Obscenity Section 251.4 of Model Penal Code
 The Model Penal Code (MPC) is arguably the most important work on criminal law in the past 30 years. This Model Code has been used as the basis of many state's criminal codes. New Jersey and Pennsylvania have adopted the MPC as their criminal code. However, sections of the MPC or slight re-writes are used by virtually every state. The MPC's prohibition on "obscenity" and distribution of obscenity follows.
Operation CLEAN: Reclaiming City Neighborhoods by Richard W. Hatler, Deputy Chief, Dallas, Texas, Police Department
 Dallas, Texas, faces the same problems as many other cities around the country. It has experienced the devastation of whole neighborhoods as drugs, particularly crack cocaine, destroy old ways of life and replace them with violence, thievery, and a feeling of hopelessness. One by one, communities in Dallas fell to drug dealers, only to become darkened marketplaces of the drug trade.
Operation Star
Other Citizenships: New Country Alternatives by Paul Collin
 Foreign Birth Registration (FBR) citizenship programs worldwide, as an option for citizens of other countries to obtain other country passports, national residencies, new workplaces, and plan for a new retirement worldwide.
Pagan's Guide to Dealing with Police Harrassment by AMER
 It is important to remember that religious belief is not a crime. If you are ever harassed for your religious beliefs, whether by corrupt police following their own agendas or by honest police misled by dishonest citizens, you must bear in mind that the legal system is designed to protect you. This pamphlet will show you how to **use** the system to your own advantage: what to do, and especially what **not** to do.
Paper on IRS and INDEMNIFICATION
Personal Liability: The Qualified Immunity Defense by Daniel L. Schofield, S.J.D.
 The threat of personal liability is one of many risks associated with the law enforcement profession. Citizens rightly expect officers to understand the constitutional principles that govern their conduct. At the same time, law enforcement effectiveness often depends on officers' confidence and willingness to act swiftly and decisively to combat crime and protect the public.
Plateauing in Law Enforcement
Police Management by James D. Sewell
 In small police departments, it is usually decisions regarding personnel that are the most difficult and emotionally distressing. Years of law enforcement training prepare administrators for tactical and strategic problems and operational decisions. As a result, many police chiefs find that making life-or-death decisions is easier than initiating procedures that could cost officers their rank, salary, or job.
Police NOT OBLIGATED to Protect
Police Practices: Bomb Dog Teams by James L. Setzer
 Most Air Force security police squadrons have bomb dog teams, which consist of an experienced handler, a highly trained explosives detection dog, and a spotter who assists the handler and acts as backup. Each team is proficient in detecting several common types of explosives and can provide detection capability for bomb threats, suspicious packages, airport security breaches, and terrorist incidents.
Police Practices: Operation Alert by Captain Mark Willingham and Chief Jerry Cameron
 In Fernandina Beach, FL, the police department and the Division of Alcoholic Beverages and Tobacco have combined education, public relations, and law enforcement into a cohesive effort to stop underage drinking. OPERATION ALERT (Alcohol--Law Enforcement/Retail Training) is a multi-faceted program that combines retail vendor training, student and parent awareness, and law enforcement action to reduce alcohol consumption by persons under 21 years of age.
Police Practices: Operation Hotel-Motel by Sgt. Mark T. Langan
 The transient nature of drug dealers compounds law enforcement's efforts to curb drug trafficking. Those involved in this illegal activity travel to cities and towns throughout the United States to sell drugs. In many instances, dealers use hotels and motels as their base of operations until they move on to other areas.
Police Practices: Pennsylvania's Interdepartmental Communications System by Robert C. Hickes
 Yet, with all the emphasis being placed on electronic systems and the technological advancements that have occurred, the extent of communication among law enforcement agencies to share information lags behind capabilities. Unfortunately, jurisdictional boundaries control interagency communication and cooperation. However, this is no longer the case in the State of Pennsylvania, which supports a statewide police emergency radio frequency.
Police Retirement: The Impact of Change
Police Sniper Training by John Plaster
 One of the most pressured situations in law enforcement occurs when a police sniper is called upon to neutralize a suspect. In no other police encounter is so critical a responsibility reduced to the perfect execution of one shot. There is no room for error.
Police Use of Descretion
Police and Citizens Working Together
Political Prisoners in the U.S.A. by Freedom Now!
 The government denies it. Yet, today there are more than 100 people locked up in U.S. prisons because of their political actions or beliefs. The United States tries to hide the existence of political prisoners because they challenge the image that the U.S. is a truly democratic and humane society. These prisoners expose the fact that there are political resistance movements of such political impact that the government is compelled to use repression against them.
Preparing for School Crisis
Presumed Guilty by Andrew Schneider and Mary Pat Flaherty
 It's a strange twist of justice in the land of freedom. A law designed to give cops the right to confiscate and keep the luxurious possessions of major drug dealers mostly ensnares the modest homes, cars and cash of ordinary, law-abiding people. They step off a plane or answer their front door and suddenly lose everything they've worked for. They are not arrested or tried for any crime.
Prison Labor: Workin' For The Man by Reese Erlich
 Navarrete was surprised to learn that California has been exporting prison-made clothing to Asia. He and the other prisoners had no idea that California, along with Oregon, was doing exactly what the U.S. has been lambasting China for - exporting prison-made goods.
Prisoners of Resistance by Mumia Abu-Jamal
 The very mention of the date, "August 8th", evokes smoke, blood, fire and rage in loyal breasts, and as if in answer, "MOVE 1" comes to mind, the first MOVE confrontation.
Private Prisons Succeed
 Clear and convincing evidence from the United States and elsewhere shows that privatizing criminal correctional facilities results in better public service at a lower cost than government operation.
Private Sector Involvement in Australian Corrections by David Belton
 The history of private sector involvement in corrections is unbelievably bleak, a well-documented tale of inmate abuse and political corruption. In many instances, private contractors worked inmates to death, beat or killed them for minor rule infractions, and/or failed to provide inmates with the quality and quantity of life's necessities (food, clothing, shelter) specified in their often meticulously drafted contracts.
Private-Sector Law Enforcement by NCPA
 Private security guards offer daily evidence of private-sector involvement in law enforcement, but they are only one element of a larger picture. Efforts to establish exclusive reliance on private policing in municipalities has faced obstacles, but many police functions that do not involve crimes or emergencies are being contracted out.
Protective Intelligence and Threat Assessment Investigations by DOJ
 Assassination of political leaders and other public figures has been a significant problem in the United States. Since 1835, 11 attacks on U.S. presidents (4 of them resulting in the death of the President) have occurred. Since 1949, two attacks on Presidential candidates have been attempted, in addition to two attacks on Members of Congress, several assassinations of national political leaders, a number of attacks on State and local elected officials, several murders of Federal and State judges, and several well-publicized attacks on celebrities and business leaders.
Public Order, Private Armies: The Use of Hunt Security in the UK and Ireland
 Stewards were first used in the autumn of 1992, appearing at various North Yorkshire grouse shoots in August 1992 and then in a high-profile operation at the Northumberland Beagling Festival in September 1992. Even in these early operations, such abuses included blocking public rights of way, verbal and physical attacks and sexual assault.
Public Services Consolidation
ROP_ing in Fences
Records Management in the 1990s
Renters' Rights and Wrongs
Review of Bay Correctional Facility and Moore Haven Correctional by OPPAGA
 In the summer of 1995, two private prisons opened under contract with the state through the Correctional Privatization Commission: Bay Correctional Facility, operated by Corrections Corporation of America and Moore Haven Correctional Facility, operated by Wackenhut Corrections Corporation. As required, this review evaluates the costs and benefits of those contracts and the performance of the private contractors and recommends whether the contracts should be continued.
Safety Action Team
School Crime Stoppers by Bob Chance
 Of all the crime prevention programs developed by citizen action organizations and law enforcement agencies across the country, few address the crimes that take place within schools. Yet, nationwide statistics indicate that 24 percent of all violent crimes involving teens, ages 12-19, occur in the schools.
Sentencing Guidelines too Harsh by Shari Steele
 Sentencing Guidelines applicable to violations of the Computer Fraud and Abuse Act of 1988.
Serological Evidence
Shedding Light on the FISA Process by Senate Judiciary Committee
 Prosecutors may seek to use FISA to end-run the traditional law enforcement warrant procedures. They gain flexibility that way, but they also become less accountable, and any of us could be subject to surveillance and then arrested and detained without the protections afforded by the criminal justice system.
Shoplifting Laws In Australia by Sir Cecil
 This is about how shoplifting laws in Australia really do benefit the five-finger discounter.
Social Protests in the 1990s: Planning a Response by Gary A. Allgeyer
 Pro-life organizations have their own intelligence groups in operation, gathering similar data on clinic employees, doctors, and patients. The police department uses this intelligence information to plan its response to demonstrations and other protest activities.
Spousal Violence - the suprising and not- politically- correct sc
State by state listing of tricks used to prevent tampering on Dri
Store Diversion Burglaries
Strange U.S. sex laws
Super DMCA State Laws and How They Take Your Privacy by Edward Felton
 Several states are currently considering bills that purport to update existing laws against theft of cable and telephone service. As written, these bills would apparently ban legitimate computer security measures that are used routinely by enterprises large and small.
Supreme Court Rules of Procedure
 The rules of the U.S. Supreme Court, with annotations.
Taking The Job Home
Teamwork: An Innovative Approach by Alan Youngs and Eric K. Malmborg
 As humans, we strive for individuality. We pride ourselves on the unique talents and problem-solving capabilities each of us possesses. Our individual capabilities, when combined with those of others in a professional setting, work to build a successful team. However, effective teamwork does not come easily; it requires coordination, cooperation, and communication on the part of all involved.
Telemarketing Crime Prevention
Telephoney bill passes. From 2600
The 1993 Canadian Law on Child Pornography
 The 1993 Canadian Law on Child Pornography. No actual, physical, real children need be harmed...
The Black People's Prison Survival Guide by Abdullah
 Entering prison for the first time can be a frightening experience. The noise level is what strikes you and it is unlike any noise that you have ever heard before. It's human noise and clamor. That, coupled with the sight of those dreary bars, made me think, "Man, what have I gotten myself into here?!"
The Canadian Charter of Rights and Freedoms
 What follows is a partial copy of the contents of a publication by the Government of Canada entitled "The Charter of Rights and Freedoms A Guide for Canadians". Only that text which is in heavy type is included, and the commentary supporting and associated with it have been omitted.
The Changing Face of America
The Cold War of the '90's by Jalil Bottom
 Americans' fear of crime is creating a new version of the old military-industrial complex, an infrastructure born amid political rhetoric and a shower of federal, state and local dollars. As they did in the Eisenhower era, politicians are trying to outdo each other in standing up to the common enemy;
The Criminal Behavior of the Serial Rapist by Robert R. Hazelwood and Janet Warren
 This article, however, describes the behavior of these serial rapists during and following the commission of their sexual assaults. The information presented is applicable only to the men interviewed; it is not intended to be generalized to all men who rape.
The Cutting Edge of Law Enforcement Technology by David G. Boyd
 DOJ made a commitment to develop new technologies for law enforcement long before its April 1994 Memorandum of Understanding with DOD. Under the auspices of the NIJ, the Technology Assessment Program Information Center (TAPIC) had been setting performance standards for equipment, testing new products, and disseminating test results to criminal justice agencies since 1968.
The Electronic Communications Privacy Act of 1986 by The Man
 Whoever, without the authority of the satellite operator, intentionally or maliciously interferes with the authorized operation of a communications or weather satellite or obstructs or hinders any satellite transmission shall be fined in accordance with this title or imprisoned not more than ten years of both...
The Environmental Protection Forum
The FBI's Critical Incident Negotiation Team
The Forensic Anthropologist by Robert W. Mann, M.A. and Douglas H. Ubelaker, Ph.D.
 In recent years, just as the investigation of a crime scene has become more complex and sophisticated, so has the task of the forensic anthropologist. Forensic anthropologists assist medical and legal specialists to identify known or suspected human remains.
The Forgotten Right of Association by David Hood
 The Century Club of New York City, an all-male social club, was told by city officials a few years back that it no longer could refuse to admit women members. The Club, thinking that private clubs aren't subject to such public regulation, took their case to the Supreme Court, arguing that the rights of privacy and association gave them the power to set their own membership rules. After all, this was the way the courts had always viewed private clubs.
The Future of Law Enforcement by Alvin and Heidi Toffler
 Before we begin, a question. Does anyone reading this think the years ahead are likely to be tranquil?
The Future of Policing by William L. Tafoya, Ph.D.
 In August 1982, law enforcement executives gathered in the FBI Academy auditorium to hear Alvin Toffler speak. In his speech, Toffler suggested that because change was taking place so rapidly, tremendous social pressures were occurring and will continue to ferment and explode unless opportunities were created to relieve those pressures.
The GNU General Public Licence
 The licenses for most software are designed to take away your freedom to share and change it. By contrast, the GNU General Public License is intended to guarantee your freedom to share and change free software--to make sure the software is free for all its users. This General Public License applies to most of the Free Software Foundation's software and to any other program whose authors commit to using it. (Some other Free Software Foundation software is covered by the GNU Library General Public License instead.) You can apply it to your programs, too.
The Insanity of the Defense by Sam Vaknin
 If mental illness is culture-dependent and mostly serves as an organizing social principle - what should we make of the insanity defense (NGRI- Not Guilty by Reason of Insanity)?
The International Legal Implications of Information Warfare by Richard W. Aldrich
 One initial hurdle posed by the breadth and uniqueness of certain aspects of information warfare is the question of what constitutes an armed attack in the information age? The answer is less than clear, but appears to revolve around the threat the action poses to a government's authority over its people.
The Interweaving Of Public And Private Police Undercover Work by Gary T. Marx
 Historically it was easier to talk of public as against private police. In popular conceptions there was little doubt about who the Pinkertons and the G-men were. Yet today in many cases such distinctions are more difficult to make. Attention must be given to a number of dimensions that interweave the basic public-private distinction.
The Judicial Sealing Requirement in Electronic Surveillance by Robert A. Fiatal, J.D.
 Compliance with this judicial sealing requirement is sometimes delayed or overlooked because investigative personnel are preoccupied with seeking indictments, making arrests, and conducting searches. Unfortunately, failure to comply with the sealing requirement can lead to the suppression of intercepted conversations and the loss of extremely valuable evidence.
The Law as a Gender Weapon of Violence Against Men and Children by Richard Hewitt
 Tens of thousands of men are living in a state of prpetual fear of being falsely labelled. All a woman has to do is point a finger, and make an accusation, then truth and principles of fundamental justice are not even recognized.
The Neighborhood Watch by Social Junker
 A relatively law-abiding citizen runs afoul of the Neighborhood Watch Program.
The Overhauling of Straight America by Marshall Kirk and Erastes Pill
 1987 article that appeared in "Guide" a homosexual magazine. It outlines the homosexuals' plan to be accepted in society.
The Patrol Function by Patrick V. Murphy
 American policing has improved substantially since a Presidential crime commission in 1967 identified a number of fundamental weaknesses. Officers today are better educated, departments are more representative of the populations they serve, and there is more restraint in the use of force. Yet, serious flaws remain.
The Prime-Time Police State by R.W. Bradford
 By marvelous coincidence, just as the new fall television season began, a Senate subcommittee began hearings on the events surrounding federal marshals' attempt to arrest Randy Weaver for failing to appear in court on a gun law violation.
The Prison Industrial Complex and the Global Economy by Eve Goldberg and Linda Evans
 Like the military/industrial complex, the prison industrial complex is an interweaving of private business and government interests. Its twofold purpose is profit and social control. Its public rationale is the fight against crime.
The Prison Industrial Complex: Crisis and Control by Christian Parenti
 Today, Pelican Bay provides 1,500 jobs, an annual payroll of $50 million. Indirectly, the prison has created work in everything from construction to domestic violence counseling. Also cashing in on the action is a huge Ace Hardware, a private hospital and a 90,000 square foot K-mart, selling everything from toothpaste to Spice Girl paraphernalia.
The Rat Patrol Rides
The Struggle for Pro-Choice by Ashes
 I am working in a university clinic that deals with sex related issues. Contraception, STD information, the practice of 'safe sex', premartial sex and abortion are just a few of the issues that I cover in my day to day life. This article may not be filled with anything but personal opinion but it is important for me to put my opinion out there so that the young girls that are subjected to the hate filled actions of religious and anti-abortion groups have something to think about from the other side.
The Stun Belt and Other Electroshock Weapons in Law Enforcement by Amnesty Intl
 A stun belt is a weapon that is worn by its victim. Unlike when faced with other electro-shock devices, the prisoner or defendant is physically in contact with the stun belt the whole time it is used against them, which may be for hours at a time. Its electro-shock can be set off by a law enforcement official operating a remote control transmitter up to 300 feet away, including as has happened in several cases, by accident.
The Tactical Incident: A Total Police Response by Nicholas F. Kaiser
 Today, tactical units remain vital to any department's response to a critical situation. However, they cannot operate within a vacuum and depend on the support of other units. The critical situation requires all police units to work as one, not as individual entities. Attaining this teamwork is essential to successfully contain a crisis situation.
The When, Where, and How of Model Releases
 Getting a model release is a simple thing AND it will keep your ass from getting sued for being a retard. (Includes sample model release form.)
The Word is the Law by Norman A. Rubin
 The absurdity of lawmakers in the enforment of laws pertaining to sexual habits.
The World Trade Organization and the Prison Industrial Complex
 There is a vital relationship between the WTO and the PIC, between the corporate plundering of the global commons and the vise of civilian social control. Without the Prison Industrial Complex's violent repression of poor and working classes, the WTO's capitalist elite would not be able to rob the world with such impunity.
The age of consent in all 50 states
Transcript of Craig Neidorf Trial
 The following transcript of Craig Neidorf's trial was provided by his legal counsel, to whom we are indebted. The page numbers correspond to transcript pagination. The document was retyped by CuD, and cross-checked against the original. A spell checker removed spelling errors, and if any of these errors appeared in the original, they too were removed.
Transcript of a Presentation by Alan Gold, Canadia
Trauma into Trojan Horse: College Date Rape and Political Agendas by Schraff
 A short research piece on how the term "date rape" came into out cultural vocabulary. Has the labelling of date rape done more harm than good? Is there a better solution? (Featuring a cameo citation appearence by the folks at S&A)
U.S. Senate Bill 516
 U.S. Senate Bill 516 - to prevent abuses of electronic monitoring in the workplace.
U.S. Telecommunications Act (H.R. 3515)
 If this bill does not pass, the Regional Bell Operating Companies (RBOCs) will be able to force all other information services out of business.
U.S. Travel Guide
 Because of the continuing "War on Drugs", it is more important than ever that citizens know their rights during unexpected police encounters while traveling. Innocent people in airports, train stations and bus terminals are being subjected to sometimes abusive tactics and coercive questioning by various police agencies looking for money, drugs and drug couriers.
USA PATRIOT Act
 The complete text of H.R. 3162, Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism, aka the USA PATRIOT Act, as passed by the United States Congress. The final legislation includes a few changes: most notably, a sunset on the electronic surveillance provisions, and an amendment providing judicial oversight of law enforcement's use of the FBI's Carnivore system. However, it retains provisions vastly expanding government investigative authority, especially with respect to the Internet.
Update on the recent supreme court decision about
Victim Witness Assistance
Violation of Privacy 250.12 Model Penal Code
Virtual Reality: The Future of Law Enforcement Training
Visit to a Federal Prison by Laura Green
 I have just returned from visiting a close friend who was sentenced to a Women's Federal Prison Camp for growing marijuana. Anyone who believes that our current drug laws are working, I invite to join me on a visit to a Federal Prison.
Visitation Rights in Divorce Cases
 Legal information on parental visitation rights in divorce cases.
WIN: AFIS Technology for Rural States
Walking Through a Grand Jury by Larry Weiss
 When they start asking you about your friends, their beliefs in direct action, your significant other, who you associate with, and other personal questions, are you going answer them?
Warning Signs of Covert Eavesdropping or Bugging
 When your competitors know things that are obviously private, or the media finds out about things they should not know, then it is reasonable to suspect technical eavesdropping or bugging.
What Are You Hiding?
 While listening to a police scanner, I heard a dispatch by the police regarding a subject who was eating at McDonalds. The caller had reported this subject as "suspicious" because he had met with somebody and given them a bag containing unknown items. So what if somebody gave another person a bag? Who fucking cares?
What You Should Know If You're Accused of a Crime by Joyce B. David, Esq.
 Anyone confronting the bewildering and, to many, the intimidating and nerve shattering complexities of the New York State criminal justice system for the first time in his or her life, will find Joyce David's handbook outlining the ABC's of the system an invaluable tool in dealing with them.
Why Cops Hate You
 If you've picked up on this attitude from your local sworn protectors, it's not just paranoia. They actually don't like you. In fact, the cops don't just dislike you, they hate your fucking guts!
Why Fonts Cannot be Copyrighted
 Why fonts cannot be copyrighted, according to the US Copyright Office (nyah nyah).
Why the ACLU opposes censorship of pornography
Yellow Rat Bastards by kojac
 After an accident with an illegal cab, I discovered Yellow Cab 'cloned' the VIN number on the cab. This is one of the biggest scams going but if anyone was ever in an accident with a cab you wouldn't think the cab was STOLEN!
You Can Beat a DUI by Phillip Sandy
 As a former cop I have first hand info on how to beat a DUI.
Your Rights as A Juror by FIJA
 Jurors not only have the duty to decide guilt or innocence, but also the "equity", or "inequity", of the law for which the defendant is accused. This means you have the RIGHT to acquit a defendant based upon YOUR ideas of right and wrong, fairness, and your own conscience.
 
This page Copyright © 1997-2006 totse.com.
 

totse.com certificate signatures
 
 
About | Advertise | Bad Ideas | Community | Contact Us | Copyright Policy | Drugs | Ego | Erotica
FAQ | Fringe | Link to totse.com | Search | Society | Submissions | Technology
Hot Topics
Hinchey Amendment
why UK accepts US subjugation and infiltration?
Why Marxism IS Economically Exploitive...
Situation in Turkey
Putin not playing nicely
So, I hear they have Mcdonalds in China...
china? russia? usa?
I have created..
 
Sponsored Links
 
Ads presented by the
AdBrite Ad Network

 

TSHIRT HELL T-SHIRTS