From the first time a rumor went by that the FCC was going to institute a "modem tax" (this one shows up about every two years without fault), BBS users took an interest in the funny little laws that govern the country and how the jackasses in the funny white building were going to mess up the fun. To this end, transcripts and discussions about laws have been around for a long time.
Because of the somewhat odd subject matter of some of the files, some of the files you would expect to be located in this section are also located in the politics section. Some of these files would probably be better put in the Politics section as well.
Oh, and this would normally go without saying, but it's probably not a good idea to depend on these files for actual, your-property-and-well-being law advice. Sometimes the law has radically changed since the file was written, or the file falls under that special "The US never submitted a full approval to all 50 states so actually you can punch a cop" type of conspiratorial section. See also conspiracy.
Filename |
Size |
Description of the Textfile |
1changin01.law | 12257 | Counterintelligence Challenges in a Changing World, by William S. Sessions, Director, FBI |
1stamend.txt | 7883 | A Showdown Over Computer Crime, by Brooks Boliek (August 5, 1990) |
1urbanp01.law | 10189 | Urban Transportation Security, by Robert W. Dart, Chicago Police |
250law.law | 3164 | Section 250.12 of the Model Penal Code: Violation of Privacy |
251law.law | 4324 | Section 251.4 of the Model Penal Code: Obscenity |
2corrupt05.law | 16903 | Corruption: A Continuing Challenge for Law Enforcement, by Otis E. Cooksey, Military Advisor |
2developp04.law | 17004 | Developing Police Leadership, by Paul Mansen, Sergeant, Rochester Police |
3fbipri10.law | 15488 | Foreign Counterintelligence: An FBI Priority, by James E. Tomlinson, FBI |
3polpracp09.law | 4273 | Police Practices: Telemarketing Crime Prevention, by David I. Rechenmacher, Illinois Police Department |
4polprac14.law | 9088 | Police Practices: Ministers Team With Police to Keep the Peace |
4pusherp10.law | 17880 | The Respectable Pusher, by Jeffrey D. Lane, Office of the Secretary of State, Atlanta |
5badchecp15.law | 15290 | Taking the Bounce Out of Bad Checks, by Vinse J. Gilliam, DA's Office, Ventura Country CA |
5espion17.law | 10534 | Espionage Awareness Programs, by Freddie L. Capps, Jr. Special Agent, FBI |
6poview20.law | 7395 | Point of View: Managing for Excellent, by David A. King, Chief of Police, Perkasie Police |
6resforup20.law | 6022 | Research Forum: McGruff Robot Teaches Kids |
7crowdcop22.law | 11710 | Effective Crowd Control, by Steven J. Schmidt, Kentucky Police |
7drugtes22.law | 12058 | The Kentucky State Police Drug Testing Policy, by W. Michael Troop, State Police of Kentucky |
8civilfop26.law | 24042 | Civil Forfeiture: Real Property Used in Drug Trafficking |
8interro28.law | 21091 | Custodial Interrogation: Impact of Minnick V. Mississippi by Kimberly A. Crawford |
93dec001.txt | 11014 | Leadership in the Nineties, by Ronnie Garner, M.P.A. |
93dec002.txt | 10340 | Employee Empowerment by Shelia Berglund |
93dec003.txt | 5183 | Police Practices: Citizen Advisory Committees by Major Dan Flynn, M.P.A. |
93dec004.txt | 12706 | Positive Organizational Culture: A Preactical Approach by Randall Aragon, M.A. |
93dec005.txt | 20150 | The Family and Medical Leave Act by Jeffrey Higginbotham, J.D. |
93jun001.txt | 20680 | Eyesight Standards: Correcting Myths, by Richard N. Holden, Ph.D. |
93jun002.txt | 8259 | The Computer: High-Tech Instrument of Crime by Michael G. Noblett |
93jun003.txt | 11852 | Elevator Vandalism Squad by Ronald Welsh |
93jun004.txt | 7200 | Police Pracices: Drug Educaiton Saving America's Youth, by Damon Davis |
93jun005.txt | 14677 | Police Violence: Addressing the Issue, by Daniel B. Boyle |
93jun006.txt | 5655 | Focus on Training: The Americans with Disabilities Act, by John A. Leonard |
93jun007.txt | 34650 | Computer Searches and Seizures: Challenges for Investigators, by John Gales Sauls |
9brief.txt | 2274 | A Legal Brief by Special Agent Jeffrey Higginbotham (Probable Cause Determination) |
9briefp32.law | 2278 | Legal Brief by S.A. Jeffrey Migginbotham, Legal Instructor, FBI |
abouteff.law | 9090 | General Information about the Electronic Frontier Foundation |
academy10.law | 12379 | Citizen Police Academies by Martin Alan Greenberg, Dept. of Criminal Justice, Ulster Community College |
afis.law | 6899 | Police Practices: AFIS Technology for Rural States |
aicnews.1 | 33391 | Arizona Identification Council NEwsletter, July, 1990 |
al_lawsta.law | 7521 | The Alabama Computer Crime Act, 1985 |
alcor-1 | 2506 | ALCOR Files Suit Over Electronic Mail Seizure, by David Bloom, Feb 24, 1990 |
alcor-2 | 10036 | Transcript of Suit by ALCOR |
alcor-3 | 21192 | Additional Filings in ALCOR BBS Case |
alcor-4 | 13439 | Response of ALCOR Lawyer to Motion Filed |
alcor-5 | 7727 | File Round of Motion Filed in Alcor Court Case |
alcor-6 | 4381 | The Resolution of the Alcor E-mail privacy Case |
alcor-7 | 14366 | Response of William F. Murphy to ALCOR Suit |
alcor-8 | 37303 | Bill Submitted in ALCOR BBS Case |
alcor-9 | 10212 | Appeal of dismissal in ALCOR BBS Case |
anarchy.ripco | 273415 | The Modern Speeders Guide to Radar and State Troopers, by Exilic Xyth (January 11, 1988) |
anti-hac.txt | 8315 | A Bill Against Hacking, from Emma Nicholson |
ar_lawsta.law | 5628 | Arkansas Regulations on Computer Crime, 1987 |
arrest.txt | 10256 | Your Rights and What to Do Upon Arrest, by Michael J. Elliott, Criminal Defense Attorney |
articles.law | 146119 | Bibliography of Computer Security Articles 1983 through 1988 |
asmp-gui | 17486 | American Society of Magazine Photographers 1991 Copyright Guide |
az_lawsta.law | 3086 | Arizona Computer Crimes Law, 1978 |
babbs001.txt | 8498 | Anti Federal Agent BBS Protection, by Babbs Boy |
banking.off | 16949 | Privacy and Offshore Banking... What the IRS Doesn't Want You to Know! By David Johnson (July 5, 1994) |
bbs-suit.txt | 12289 | Civial Action No. IP-88 93C: Linda Thompson vs. Bob Predaina |
bbs_and_ | 58600 | The Electronic Pamphlet: Computer Bulletin Boards and the Law by Michael H. Riddle (1990) |
bbs_law.law | 58671 | Computer Bulletin Boards and the Law, by Michael M. Riddle (Law Study) |
bbsdefa.law | 106099 | Defamation Liability of Computerized Bulletin Board Operators and Problems of Proof, by John R. Kahn |
bbslaw.man | 40181 | Version 1.1 - BBS LEGAL GUIDE by Clary and Kraft, 1993 |
bbslaws.txt | 54725 | THe Legal Aspects of Telecommunications and Electronic Bulletin Board SYstems, by James J. Spinelli |
bellraid.txt | 12560 | The Future of Telecommunications....... |
bendix.txt | 20856 | Crosley Bendix (Negativland) Discusses The Copyright Act (November 9, 1992) |
blue.law | 27975 | Death of the Blue Box, by Full Disclosure, 1991 |
brave.yes | 4352 | Smart Brave Lady indicates that we are not Drivers, and therefore do not need a license. |
caddraft.law | 7144 | Police Practices: Computer Aided Drafting for Law Enforcement |
candp.law | 64505 | Crime and Puzzlement by John Perry Barlow |
candp2.law | 8090 | Update on Crime and Puzzlement by John Perry Barlow, 1990 |
cardozo.txt | 21349 | Some "Property" Problems in a Computer Crime Prosecution by Mike Godwin of the EFF |
cellmate.law | 29382 | Cellmate Informants: A Constitutional Guide to Their Use, by Kimberly Kingston Crawford, FBI Academy |
cellmate.txt | 29316 | Cellmate Informants: A Constitutional Guide to Their Use, by Kimberly Kingston Crawford |
chomloot.txt | 43325 | Noam Chomsky writes a letter to Lies Of Our Times, May 1991 |
ciabwash.law | 48132 | CIA Memorandums on Brainwashing |
citizen1.txt | 94984 | Studies in Constitutional Law: A Treatist on American Citizenship by John S. Wise |
citizen2.txt | 31969 | Chapter 2: How American Citizenship May be Acquired in the Nation |
citizen3.txt | 43595 | Chapter 3: Of the Obligation and Duties of the Citizen to the Nation and the States |
citizen4.txt | 202375 | Chapter 4: Of the Rights, Privileges, and Immunities of the Citizen |
citizen5.txt | 122539 | Chapter 5: Privileges and Immunities Under the War Amendments |
citizens.gui | 94355 | A Citizen's Guide on using the Freedom of Information Act and the Privacy Act of 1974 to Request Government Records (July 10, 1991) |
civil.dis | 63050 | Civil Disobedience, by Henry David Thoreau |
civlib.law | 24676 | Civil Liberties in Cyberspace: When does Hacking Turn from an Exercise of Civil Liberties into Crime? By Mitch Kapor, Scientific American, 1991 |
civlrght.txt | 15090 | Civil Rights Cases and Police Misconduct, by John Epke |
civlrght14.law | 15156 | Civil Rights and Police Misconduct, by John Epke and Linda Davis |
clipper1.asc | 13335 | Remarks by Bruce Sterling at the Fourth Annual Conference on Computers, Freedom, and Privacy |
closenet.law | 31990 | Closing the Net, by Greg Costikyan (On Operation Sun-Devil) |
co_lawsta.law | 3697 | Colorado Crimes Law, |
cog_inte.law | 18187 | Cognitive Interviewing, by Margo Bennett, FBI |
compacs.txt | 62976 | The Limits of the Law in Restricting Computer Misuse, by Peter Sommer (March 19, 1991) |
compcrim.txt | 13559 | Computer Crimes: An Escalating Crime Trend by William S. Sessions |
compriv.law | 46706 | Computer Privacy vs. First and Fourth Amendment Rights, by Michael S. Borella |
compsent | 13603 | Revised Computer Crime Sentencing Guidelines, from Jack King (1992) |
compuser | 9768 | What is a Compilation Copyright? The Gospel According to Compuserve (December 3, 1987) |
compuser.law | 9839 | Compuserve's Position: What is a Compilation Copyright? |
computer.cri | 101985 | Computer Crime: Current Practices, Problems and Proposed Solutions, Second Draft, Brian J. Peretti |
confess.law | 15893 | Why Suspects Confess, by David D. Tousignant, Inspector, Lowell Massachusetts |
confess.txt | 15834 | Why Suspects Confess, by David D. Tousignant |
consoli.law | 17512 | Public Services Consolidation: The Answer to your Community's Needs, by Robert L. Sobba, Chief of Police, Idaho Police |
const_in.cyb | 47714 | Laurence H. Tribe, "The Constitution in Cyberspace" |
copr.txt | 35200 | How to Copyright Software, by Locus, Inc. (1990) |
cops | 19373 | If YOu Have to Ask, Get Out of the Way, by Chuck Milland |
cops.txt | 22258 | Why Cops Hate You: If You Have to Ask, Get Out of the Way |
copstamp.txt | 5209 | Police Tampering: How Often and Where, by Alan Deshowitz |
coptalk.txt | 3509 | Don't Talk to Cops, by Robert W. Zeuner, Member of the New York State Bar |
copy.txt | 10702 | Software and Copyrights: Registration, Notice and Why by Charles B. Kramer (January 8, 1992) |
copyr | 29718 | Copyright Information, by Inez Harrison |
copyrigh.txt | 3949 | Legal Brief: Software Copyright Law (December 1985) |
copyrit1.law | 6569 | Copyrights and Computer Software: An Introduction, by Sam Kitterman, Jr. |
copyrit2.law | 7671 | Copyrights and Computer Software: Part II, by Sam Kitterman, Jr. |
copyrit3.law | 10500 | Copyrights and Computer Software: Part III, by Sam Kitterman, Jr. |
copyrit4.law | 7459 | Copyrights and Computer Software: Part IV, by Sam Kitterman, Jr. |
copyrit5.law | 8454 | Copyrights and Computer Software: Part V, by Sam Kitterman, Jr. |
copyrite.c64 | 11596 | Commodore's Extremely Silly Liscence for Workbench 1.3.2 |
copyrite.doc | 4352 | Copyright Information for Computer Software Hacks from June B. Moore |
copyrite.inf | 5888 | Answering Some Questions about the Ditribution of Public Domain Software by Ron Fowler (April 12, 1984) |
copyrite.law | 47252 | Large Overview of American Copyright Law |
copyrite.txt | 23296 | Copyright Law from Jordan J. Breslow (February 13, 1986) |
copyrt.txt | 35833 | Copyright law and Liscence Law as Applies to Computer Software |
copyso.txt | 7534 | Software and Copyrights: Registeration, Notice and Why by Charles B. Kramer, Esq. (September 25, 1991) |
correct.txt | 11036 | The Principle of Correct Absue |
couriers.txt | 25253 | Detaining Suspected Drug Couriers: Recent Court Decisions |
couriersp27.law | 25319 | Detaining Suspected Drug Couriers: Recent Court Decisions, by William U. McCormack, Special Agent, FBI Academy |
court.law | 43260 | The Transcript of Craig Neidorf's Trial |
court.txt | 7683 | Disorder in the Court! (Funny Court Transcripts) |
cright3.txt | 12068 | Copyrighting Public Domain Programs by June B. Moore, JD |
crime.txt | 26658 | The Grolier Electronic Encyclopedia Definition of Crime |
crimecatalog.cmp | 463516 | The Crimefighters' Catalog of Special Purpose Books and Videos |
crimefighter.cmp | 714942 | The Crimefighters Compilation |
crimeftr.000 | 7079 | Table of Contents and Quick Tutorial |
crimeftr.002 | 17723 | Why Police Can't Cope, and The Need for CrimeFighters |
crimeftr.003 | 15130 | Crime Stoppers and We-Tip's Formula for Rewards |
crimeftr.004 | 8493 | Catch-all Reward Law: $25,000 - All Felonies, All States |
crimeftr.005 | 20017 | Fines & Forfeiture Laws: 50% Paid to CrimeFighters! |
crimeftr.006 | 40146 | Misdemeanors and Do-It-Yourself Lawsuits |
crimeftr.007 | 22381 | Qui Tam Law: Be the Prosecutor - Control Plea Bargaining |
crimeftr.008 | 24285 | Civil & Criminal RICO Laws |
crimeftr.009 | 30886 | Drunk Driver Terminators (D.D.T.) Patrols - to Get Started |
crimeftr.010 | 29385 | Drug Laws & Drug Wars - Unlimited Business Opportunities |
crimeftr.011 | 46642 | Polluter Tooters: Anti-Pollution laws, MEGABUCK Rewards |
crimeftr.012 | 17812 | Terrorists, Assassins, and Police Corruption |
crimeftr.013 | 23155 | Bounty Hunters, Bail Bond Agents and Skip Tracers |
crimeftr.014 | 29522 | U.S. Customs/Coast Guard Laws, Mechanics' Laws |
crimeftr.015 | 23075 | Post Office Rewards, Scams, Cons, Frauds |
crimeftr.016 | 34324 | Wildlife Protection/Poaching, Conservationists Laws |
crimeftr.017 | 28625 | National Forests (Vandalism, Pot Growing, other laws) |
crimeftr.018 | 33379 | Wiretap and Blackmail Laws & Rewards for CrimeFighters |
crimeftr.019 | 22056 | Misc Rewards for This and That (Dozens of them) |
crimeftr.020 | 9940 | State Reward Laws |
crimeftr.021 | 15252 | Crime Information, Your Right to Withhold for Rewards |
crimeftr.022 | 45203 | Citizen Arrests - What you Need to Know |
crimeftr.023 | 19144 | High Speed Pursuits - Unlike Smokey and the Bandit! |
crimeftr.024 | 19490 | Rules of Evidence - Entrapment Explained |
crimeftr.025 | 17904 | Where to Get CrimeFighter Training |
crimeftr.026 | 23422 | High Tech Tools of the Trade - Where to Get Them |
crimeftr.027 | 25320 | Problems with Prosecutors and Plea Bargaining |
crimeftr.028 | 18991 | How to Calculate Rewards, Proposed CrimeFighters Reward Law |
crimeftr.029 | 16496 | CrimeFighters International, Inc. Membership info. |
crimeftr.030 | 4828 | Membership Application |
criminal.law | 17091 | Criminal Informants: An Administrator's Dream or Nightmare? By Harry A. Mount, Jr. |
criminal.txt | 17025 | Criminal Informants: An Administrator's Dream or Nightmare? By Harry A. Mount, Jr. |
cripple.txt | 2387 | The Experience of a Shareware Author by Frank Bell of NEWKEY |
cryptlaw | 12456 | Crypto-Law Survey by Bert-Jaap Koops (July, 1995) |
csa87.law | 27719 | National Act on Computer Crime, Act 100-235 |
csbylaws.law | 27217 | By-Laws of the Communications Security Association, Inc. |
cslaw.law | 14407 | Computer Security And the Law, by Gary S. Morris |
ct_lawsta.law | 10096 | Computer-Related Offenses from the Connecticut General Statutes |
cyberlaw.law | 21266 | Cyberspace and the Legal Matrix: Laws or Confusion? |
cyblaw.txt | 22150 | Cyberspace and the Legal Matrix: Laws or Confusion? |
cybspace.txt | 21027 | Cyberspace and the Legal Matrix: Laws or Confusion? |
cycrime0.txt | 28434 | Emmanuel Goldstein on the E911 Affair |
dblaw.txt | 33393 | Legal Protection of Computer Databases, by Ralph C. Losey |
define.stb | 8490 | Definitions of Legal Terms |
deflib.bbs | 103794 | Defamation Liability of Computerized BBS Operators and Problems of Proof by John R. Kahn |
delibera.leb | 23079 | Deliverate Indifference: The Standard for Municipal and Supervisory Liability by Michael Callahan |
denning | 58773 | Concerning Hackers Who Break into Computer Systems, by Dorothy Denning, October 1st, 1990 |
dennis_h | 76080 | The Price of Copyright Violation from Dennis Jayes |
dial911.die | 26086 | Dial 911 and Die by Aaron Zelman and Jay Simkin (December 15, 1992) |
dir_mesgp01.law | 3432 | Director's Message, May 1991, by William S. Sessions, FBI |
disabil25.law | 34116 | The Americans With Disabilities Act, by Jeffrey Higginbotham, FBI |
disaster.law | 17512 | Disaster Operations: Not Business as Usual, by Michael Guerin, Governor's Office, Ontario, California |
disclaim.txt | 4911 | An Example Set of Disclaimers, Rules and Regulations |
disk-fee.txt | 9087 | The Great "Disk Fee" Fallacy for Public Software Distribution |
dispatch.law | 5902 | Point of View: Dispatching Units: Improvements for the First List, by Bob Blankenship, Chief, Redding, California Police |
dmessage.law | 3883 | Director's Message, April 1991, by William S. Sessions, FBI |
dmessage.leb | 3505 | Director's Message: Police and Citizens Working Together by William Sessions |
doggie.txt | 25984 | The Great American Dog Trial Vendetta by P. Remington Adams (1991) |
domestiv.law | 24459 | Domestic Violence: When do Police Have a Constitutional Duty to Protect? by Daniel L. Schofield, FBI |
downtime.bul | 806 | Example of a Policy Regarding BBS Downtime |
drivers.law | 3462 | Research Forum Survey Results: Driver License Suspension programs |
driving.bar | 49544 | The (Almost) Definitive Answer to Driving Barefoot in America (1994) |
drugdiv.txt | 13651 | Pharmaceutical Diversion and Abuse: Our Nation's Other Drug Problem, by Thomas C. Babicke |
drugdivp01.law | 13717 | Pharmaceutical Diversion and Abuse: Our Nation's Other Drug Problem, by Thomas C. Babicke, DEA, Virginia |
drugtest.txt | 13065 | Drug Abuse and Testing in Law Enforcement: No Easy Answers, by Andrew J. Harvey |
drugtestp12.law | 13131 | Drug Abuse and Testing in Law Enforcement: No Easy Answers by Andrew J. Harvey, Sergeant, California Police |
dunnel.txt | 3708 | The Dunne Act Introduced in NY for Computer BBSes (May 15, 1989) |
e-law.txt | 203190 | E-Law: legal Issues Affecting Computer Information Systems and System operator Liability, by David J. Loundy |
ecpa.lay | 10286 | The Electronics Communications Privacy Act of 1986, a Layman's View by Michael H. Riddle |
ecpa1law.law | 40796 | Electronic Communication Privacy Act: Chapter 119 |
ecpa2law.law | 34493 | Electronic Communication Privacy Act: Part II |
ecpa3law.law | 33464 | Electronic Communication Privacy Act: Part III |
ecpalay.law | 10524 | The Electronic Communications Privacy Act of 1986: A Layman's View, by Michael M. Riddle |
edwards.law | 25695 | Edwards vs. State Farm Insurance |
edwards_ | 11517 | The Processes by which the Secret Service Investigates Computer Crimes |
eff-righ.txt | 31722 | Legal Overview: The Electronic Frontier and the Bill of Rights (July 10, 1990) |
eff.law | 69535 | The Founder of the Electronic Frontier Foundation get back to you about Their Plans |
eff.txt | 42240 | The Foundation of the Electronic Frontier Foundation (July 10, 1990) |
effbor.law | 13014 | Legal Overview: The Electronic Frontier and the Bill of Rights |
effss.law | 35098 | Civil Liberties Implications of Computer Search and Seizures: Some Proposed Guidelines for Magistrates Who Issue Search Warrants |
elbarasn.107 | 14592 | Electronic Bar Association Announced by Paul Bernstein |
elec_bbs.law | 12761 | Electronic Bulletin Boards: A New Resource for Law Enforcement by Seth Jacobs, SEARCH Group |
electrif.law | 56463 | Electrifying Speech: New Communications Technologies and Traditional Civil Liberties |
email | 21657 | Some Policies on Electronic Mail: A Summary by Todd Hooper |
email_pr | 19636 | Computer Electronic Mail and Privacy: The Law, by Ruel T. Hernandez, January 11, 1987 |
emailpri.law | 14786 | Overview of the Employee Privacy Laws as Currently Apply |
emailprv.law | 5801 | Bibliography on Law and Computers |
embezzle.law | 12290 | Bank Employee Embezzlement by Denise M. Dube, LA DA |
employleb.law | 20142 | Employee Development Programs, by John L. Pape, Chief of Police |
entrapmtdoc.law | 10624 | The Defense of Entrapment as it Applies to Bulletin Board System Operators, by Randy B. Singer, Esq. |
envhook.txt | 59071 | The Environmental Movement and the Value of "Moderation" by Brian K. Yoder (1992) |
ep_forum.law | 10665 | The Environmental Protection Forum, by Michael A. O'Brien, Start Attorney Office, Florida. |
ethics.law | 13373 | Point of View: Rededicating Ourselves to Leadership and Ethics in Law Enforcement, by Vane. R. King, Flint Michigan Police Department |
ethics.txt | 8140 | Ethics for BBS Users |
fbi | 27677 | Excerpts from the FBI & Your BBS (From Ripco) |
fbi-miss.txt | 2678 | The FBI Mission Statement |
fbi_mail.txt | 3652 | Appeal Filed in Todd Patterson v FBI Case (July 26, 1989) |
fbiaug01.law | 19065 | Accreditation: A Small Department's Experience by Raymond E. Arthurs, Chief, Willowbrook Police |
fbiaug02.law | 16027 | Odometer Rollback Schemes, by James E. Scripture, Special Agent, FBI, Boston Massachusetts |
fbiaug03.law | 4768 | Police Practices: Custom's BET Program |
fbiaug04.law | 14228 | The Tactical Incident: A Total Police Response by Nicholas F. Kaiser, MA, Troy Police |
fbiaug05.law | 9910 | A New Approach to FTO Training by Blair Rankin, North Carolina Police |
fbiaug06.law | 8248 | Focus on NCIC: Identifying the Unidentified |
fbiaug07.law | 26013 | The Federal Grand Jry: Exceptions to the Rule of Secrecy (Part I) |
fbijul01.law | 14832 | Lateral Entry: A Move Toward the Future, by J. Eddie Nix, Leut. Cobb County, Georgia Police |
fbijul02.law | 23307 | Confronting the Terrorist Hostage Taker, by G. Dwayne Fuselier, FBI |
fbijul03.law | 5432 | Police Practices: Bomb Dog Teams |
fbijul04.law | 12651 | Campus Security: The Mule Patrol, by James A Huff, Central Missouri State University Campus Police |
fbijul05.law | 15216 | The Forensic Anthropologist, by Robert W. Mann, MA, Smithsonian Institution |
fbijul06.law | 3305 | Focus on Crime Prevention: Business and Government Working Together |
fbijul07.law | 23458 | Anticipatory Search Warrants, by A. Louis DiPietro, FBI |
fbijun01.law | 13907 | The Yardies: England's Emerging Crime Problem, by Roy A. C. Ramm, Detective Chief Superintendent, London England |
fbijun02.law | 3243 | Focus on Forensics: Latent Shoeprint Analysis |
fbijun03.law | 9597 | Towing Companies: Friends or Foes? By Michael C. Gillo, Attorney's Office, Ft. Lauderdale, Florida |
fbijun04.law | 4594 | Police Practices: The Nelson-Denny Experiment |
fbijun05.law | 15473 | Facility Planning In Colorado: Form Vs. Function by James D. Munger, Colorado Springs |
fbijun06.law | 7208 | Records Management in the 1990s by Daniel L. Arkenau |
fbijun07.law | 9548 | Research Forum: FBINA Graduate Survey |
fbijun08.law | 7980 | B.L.O.C.: Business Leaders Against Organized Crime, by Mike King, Administrative Assistant, Weber County, UT Attorney's Office |
fbijun09.law | 24198 | DNA Testing and the Frye Standard, by Robert A. Fiatal, FBI |
fbitop10.hum | 3926 | FBI Top Ten Countdown, January, 1986 |
feb01.law | 15673 | Privitization of Prisons: Fad or Future, by Lt. David K. Burright, Linn County Sheriff's Office, Albany, OR |
feb02.law | 9169 | The Administrative Warning Ticket Program by Lt. Andrew J. Barto, Romeoville, IL |
feb03.law | 3524 | Arson Investigations by William A. Tobin, FBI Laboratory |
feb04.law | 21880 | The Criminal Behavior of the Serial Rapist, by Robert R. Hazelwood, MS, Behavioral Science Instruction/Research Unit |
feb05.law | 5964 | Large Vehicle Stops |
feb06.law | 10325 | Critical Incident Stress Debriefing |
feb07.law | 31199 | Foriegn Searches and the Fourth Amendment, by Austin A Andersen, LL.B>, FBI |
feb08.law | 5297 | Florida's Computer Crime |
fed_lawsta.law | 8535 | Federal Computer Crimes Law, 1984/1986 |
fedbbs3.lst | 6478 | Federal Public Access Bulletin Boards, March 1989 |
fedcompseize.txt | 315003 | The Federal Computer Seizure Guidelines (1994) |
federal.leb | 24029 | The Federal Grand Jury: Exceptions to the Rule of Secrecy (Part II) by Austin A. Anderson |
fencesp06.law | 15145 | ROP-ing In Fences, by James Rainum, Officer, Repeat Offender Project, Washington DC |
fija.txt | 9501 | A New Hope for Freedom: Fully Inform Jurors by Don Diog |
fija02.txt | 6668 | If You're Called for Jury Duty, by Don Doig |
files.tut | 2360 | File Transfer Liability |
finalmo.txt | 24624 | An Attempt to Modify Phone Rules for BBS Lines by Missouri, 1992 |
fl_lawsta.law | 8475 | Florida Computer Crimes Act, 1978 |
foia-pa.txt | 162806 | A Citizen's Guide on Using the Freedom of Information Act and the Privacy Act of 1974 to Request Government Records (September 20, 1991) |
foia.txt | 30272 | Using the Freedom of Information Act |
foiacit.txt | 92726 | A Citizen's Guide to using the Using the Freedom of Information Act and the Privacy Act of 1974 to Request Government Records (July 10, 1991) |
forbes.txt | 5241 | A Little Perspective, Please, by Mitchell Kapor of the EFF (June 21, 1993) |
forenp11.law | 12226 | The FBI's Forensic DNA Analysis Program, by Jay V. Miller, FBI |
funny.txt | 17655 | Very Large Rant and Sales Pitch about Paper Money Being Evil |
ga_lawsta.law | 7868 | The Georgia Computer Crimes Law |
grandjur.txt | 25954 | The Federal Grand Jury: Exceptions to the Rule of Secrecy by Austin A Andersen |
gunshot.txt | 11888 | Gunshot Primer Residue: The Invisible Clue by Roger W. Aaron |
gunshotp19.law | 11954 | Gunshot Primer Residue: The Invisible Clue, by Roger W. Aaron, FBI Laboratory |
gvtscrcy.txt | 3328 | The Government's Mania for Secrecy, 1987 |
hackers0.law | 464 | Introduction to the San Luis Obispo Incident |
hackers1.law | 5653 | Amateur Hackers Tripped Up, by Danna Dykstra Coy |
hackers2.law | 6889 | Computer Case Takes a Twist, by Danna Dykstra Coy |
hackers3.law | 2883 | Hackers Off Hook, Property Returned, by Danna Dykstra Coy |
hackers4.law | 8012 | A Case for Mistaken Identity... Who's Privacy Was Really Invaded? |
hakharas.txt | 4186 | Hackers and the Authorities: A Question of Harassment, as Seen in an Article from a Recent Newspaper on November 15, 1992 |
handbook.txt | 74752 | What You Should Know if You're Accused of a Crime by Joyce B. David Esq. |
hategrou.law | 13409 | hate Violence In the United States, by Floyd I. Clarke, FBI |
hategrou.txt | 13345 | Hate Violence in the United States, by Floyd I. Clarke |
hi_lawsta.law | 7266 | Hawaii Computer Crimes Law, 1984 |
hightech.law | 14116 | A Low Cost Approach to High Technology, by Mark Clark, Lt. South Portland, ME Police |
hightech.txt | 14103 | A Low Cost Approach to High Technology by Lt. Mark Clark |
homeless.law | 16425 | Police and the Homeless, by Barney Melekian, Lt. Santa Monica, California Police |
homeless.txt | 16418 | Police and the Homeless by Barney Melekian |
hostage.law | 25433 | Hostage/Barricade Incidents: High Risk Factors and the Action Criteria by G. Dwayne Fuselier |
hostage.txt | 25367 | Hostage/Barricade Incidents: High Risk Factors and the Action Criteria by G. Drawyne Fuselier |
hostaker.txt | 23235 | Confronting the Terrorist Hostage Taker by G. Dwayne Fuselier |
hotel.law | 6493 | Police Practices: Operation Hotel-Motel |
howtobeattheirs.txt | 10834 | Tax Resistance Primer: How to Beat the IRS |
howtosel.txt | 4224 | Making Shareware Pay, by Gary Raymond |
ia_lawsta.law | 7233 | Iowa Computer Crimes Law, 1984 |
id_lawsta.law | 3358 | The Idaho Computer Crimes Law, 1982 |
ident.txt | 20441 | Identification: A Move Towards the Future by Bruce J. Brotman |
identp01.law | 20508 | Identification: A Move Towards the Future, by Brice J. Brotman |
il_lawsta.law | 10564 | The Illinois Computer Crimes Law, 1981/1987 |
in_lawsta.law | 2091 | The Indiana Computer Tampering Law, 1986 |
intrundg.txt | 18096 | An Introduction to the Computer Underground, by The Butler (February 26, 1991) |
invbasic.law | 12444 | Environmental Crimes: Investigative Basics, by Martin Wright, Dept. Assistant Director, EPA |
invbasic.txt | 12378 | Environmental Crimes: Investigative Basics by Martin Wright |
irs-20q.txt | 14464 | IRS and Business Taxpayers Disagree Over Who Should be Considered Employees: Why, Results, Solutions |
jan01.law | 2790 | Director's Message: Facing the Future, by William S. Sessions, Director, FBI |
jan02.law | 16437 | The Future of Law Enforcement: Dangerous and Different, by Alvin and Heidi Toffler |
jan03.law | 28766 | The Changing Face of America, by Robert C. Trojanowicz, Ph.D. |
jan04.law | 24159 | The Future of Policing, by William l. Tafoyna, Ph.D. |
jan05.law | 20355 | Public Law Enforcement/Private Security: A New Partnership? By Terrence J. Mangan |
jan06.law | 17733 | A Look Ahead: Views of Tomorrow's FBI, by Richard Sonnichsen |
jan07.law | 19135 | Tomorrow's America: Law Enforcement's Coming Challenge, by Rob McCord |
jobhome.law | 19064 | Taking the Job Home, by Richard N. Southworth, Attorney General's Office, Virginia |
joint-cu.art | 12288 | Joint Custody: A Simplistic Solution by Robert D. Felner and Lisa Terre |
joyce | 61696 | Beyond the Orality/Literacy Dichotomy: James Joyce and the pre-History of Cyberspace by Donald F. Theall (May 1992) |
judna.txt | 27647 | Judicial Acceptance of DNA Profiling by John T. Sylvester and John H. Stafford |
judnap26.law | 27713 | Judicial Acceptance of DNA Profiling, by John T. Sylvester, J.D. |
judseal.txt | 22490 | The Judicial Sealing Requirement in Electronic Surveillance: A Matter of Immediacy by Robert A. Fiatal |
juryban.txt | 2227 | Local Jury Banned by Judge After Ruling Man Innocent |
jurynul.txt | 7467 | Information on Jury Nullification |
juryrig.txt | 2013 | How they Stack the Jury in Georgia |
juryrite.inf | 3553 | Fully Informed Juries |
juryrite.txt | 6849 | Toward a Bill of Jury Rights |
ks_lawsta.law | 4861 | Kansas Computer Crimes Law, 1985 |
ky_lawsta.law | 6331 | Kentucky Computer Crime Law, 1984 |
la_lawsta.law | 5581 | The Louisiana Computer Related Crime Bill, passed in 1984 |
lawbbs.txt | 13440 | Directory of Law-Oriented Bulletin Boards, 1986 |
laws.txt | 3394 | Interesting US Laws, taken from the Seattle P-I |
lebmay01.law | 4214 | Director's Message, Law Day 1990, by William S. Sessions, FBI |
lebmay02.law | 10020 | G.R.A.M.P.A. COPS, by Jere L. Spurlin, Chief of Police, Ft. Meyers, Florida |
lebmay03.law | 12413 | High School Suicide Case Intervention, by David Fisher, Pinnellas County, Florida, Sheriff's Office |
lebmay04.law | 7456 | Police Practices: Elderwatch |
lebmay05.law | 6272 | Police Practices: Selecting the Right Officers: DARE |
lebmay06.law | 18893 | Analytical Intelligence Training, by Marilyn B. Peterson |
lebmay07.law | 12961 | Law Enforcement Exploring, by Steve Farish, Texas Law Enforcement Explorer Advisor's Association |
lebmay08.law | 28146 | Curtilage: The Fourth Amendment in the Garden, by John Gales Sauls, FBI |
lebmay09.law | 2569 | Legal Brief: Maryland v. Buie, Supreme Court Decision |
legal.tec | 10585 | Some Examples of Legal Loopholes by Keith K (February 13, 1994) |
legalfnt.txt | 9872 | US Copyright Office Rules Font Software is Not Copyrightable (November 30, 1989) |
leglbyt1.txt | 18370 | Legal Bytes Volume 1 Number 1 by George, Donaldson and Ford (1993) |
leglbyt2.txt | 26724 | Legal Bytes Volume 1 Number 1, by George Donaldson and Ford (1993) |
len.ros | 190622 | Complete information on the Len Rose (Legion of Doom Source Code) Case |
listcoun.txt | 37317 | Large List of United States Counties |
lith_law.txt | 6728 | Legally, Lithuania's Case is Open and Shut, by Vytautas Landsbergis, President of Lithuania |
lotus.txt | 13425 | Discussion of Lotus' Plan to Sell personal Information |
lvstops.txt | 5898 | Large Vehicle Stops from William D. Dean |
mail_exp | 24161 | Obtaining Host and Address Information by Ron Ray |
mailordr | 4321 | How to Successfully Buy Through Mail Order and Protect Your Rights |
manage05.law | 12078 | What They Didn't Teach in Management School, by James D. Sewell, Ph.D., Florida Criminal Justice Executive Institute |
maps_cop.in | 5959 | Cecil Adams on Copyright Traps in Maps (well, sort of) |
mar90_1.law | 17540 | The Preliminary Investigative Process, by Chief Gordon F. Urlacher, Rochester, New York, Police Department |
mar90_2.law | 12111 | Store Diversion Burglaries, by Detective Robert P. Meiners, Lincolnwood, Illinois, Police Department |
mar90_3.law | 5618 | Police Practices: Operation Alert, by Captain Mark Willingham, Division of Alcoholic Beverages and Tobacco |
mar90_4.law | 13090 | Police Retirement: The Impact of Change, by John M. Violenti, Ph.D, Department of Social and Preventive Medicine, SUNY New York |
mar90_5.law | 16601 | Managing Police Basic Training Cirriculum, by Rene A. Browett, Northern Virginia Criminal Justice Academy |
mar90_6.law | 26939 | Personal Liability: The Qualified Immunity Defense, by Daniel L. Schofield, S.J.D., FBI |
massmodmtax.law | 12184 | New Massachusetts Modem Tax Proposed (For Real) |
md_lawsta.law | 4666 | The Maryland Computer Crimes Law |
medialaw.law | 20297 | Media Performance and International Law, by Howard H. Frederick, Ph.D. |
medicp21.law | 9547 | Medicaid Fraud, by Larry L. Bailey, Colorado Attorney General's Office, Medicaid Fraud Control Unit, Denver Colorado |
mi_lawsta.law | 3615 | The Michigan Computer Crimes Law |
military.txt | 8855 | Military Support to Civilian Law Enforcement Agencies by R. Barry Cronin |
militaryp24.law | 8925 | Military Support to Civilian Law Enforcement Agencies, by R. Barry Cronin, U.S. Marine Corps Headquarters |
minnesot | 2115 | Minnesota Invokes Computer Law by Rachel Parker |
mn_lawsta.law | 12662 | The Minnesota Computer Crimes Law |
mo_lawsta.law | 7198 | The Missouri Computer Crimes Law, 1982 |
mobile.law | 6210 | Police Policies: Mobile Command Posts |
morris.app | 31927 | The Court Case against Robert Tappan Morris, 1990-1991 |
ms_lawsta.law | 7894 | Mississippi Computer Crimes Law, 1985 |
mt_lawsta.law | 3082 | Montana Computer Law Statute |
mulepat.txt | 12585 | Campus Security: The Mule Patrol, by James A. Huff |
murphy.txt | 6620 | Murhpy's Law, and Similar Ilk |
mvt.txt | 13602 | Motor Vehicle Theft Investigations: Emerging International Trends by Mary Ellen Beekman |
mvtleb.law | 13668 | Motor Vehicle Theft Investigations: Emerging International Trends |
nafta.txt | 2639231 | Complete Text of the North American Free Trade Agreement (NAFTA) Act (1993) |
natural.law | 72219 | Natural Laws and Natural Rights by James A. Donald (February 28, 1993) |
nc_lawsta.law | 4713 | North Carolina Computer Crime Law |
ncic.law | 8537 | NCIC Training: Hit or Miss, by Don M. Johnson, FBI |
ncic.txt | 8180 | Focus on NCIC: Identifying the Unidentified |
ncic2.txt | 8613 | NCIC Training: Hit or Miss by Don M. Johnson of the FBI |
nd_lawsta.law | 1422 | The North Dakota Computer Fraud and Crime Statute, 1987 |
ne_lawsta.law | 4539 | The Nebraska Computer Crimes Law, 1985 |
newlaw.txt | 8949 | Dangerous Copyright Law by Stephen Haynes (October 2, 1990) |
nh_lawsta.law | 8661 | New Hampshire Computer Crimes, 1986 |
nj_lawsta.law | 8133 | New Jersey Computer-Related Crimes Law, 1984 |
nov_1.law | 16726 | The FBI's 10mm Pistol, by John C. All, FBI |
nov_2.law | 17796 | Ammunition Selection: Research and Measurement Issues, by N. J. Scheers, Ph.D. |
nov_3.law | 15201 | Utilizing Job Task Analysis, by Thomas J. Jurkanin |
nov_4.law | 22164 | The Judicial Sealing Requirement In Electronic Surveillance: A Matter of Immediacy, by Robert J. Fiatal |
nsa.txt | 15721 | Harry S. Truman's Declaration of the Creation of the National Security Agency (NSA) |
nv_lawsta.law | 5744 | Nevada Computer Unfair Trade Practice Law, 1983 |
ny_lawsta.law | 8412 | New York Penal Law, Computer Crime, 1986 |
nyappl.law | 12970 | New York's APPL Program: A New Partnetship, by Anthony M. Voelker |
odomroll.txt | 15958 | Odometer Rollback Schemes by James E. Scripture of FBI |
ofc_lostp02.law | 11067 | Law Officers Killed: 1980-1989, Victoria L. Major, FBI |
oh_lawsta.law | 1100 | Ohio's Computer Crime Law |
olw1.txt | 2432 | Our Lawyer Writes #1: Rodent Milk |
olw3.txt | 2432 | Our Lawyer Writes #3: Getting a Divorce, Quick and Easy |
olw5.txt | 2688 | Our Lawyer Writes #5: I'm a Mistress, can I Get Anything? |
op-clean.leb | 12668 | Operation Clean: Reclaiming City Neighborhoods by Richard W. Hatler |
p_view.law | 12141 | Point of View: A Manager's Guide to Computer Projects, by Charles Brennan, Philadelphia, Pennsylvania, Police Department |
p_view.txt | 4991 | Point of View: Campus Police by Gigi Ray of the Arlington Campus Police Department |
p_viewp14.law | 5057 | Point of View: Campus Police |
pa_lawsta.law | 4695 | Pennsylvania's computer crimes law, 1983/1986 |
passport.txt | 1766 | How to Get a State Passport |
patrol.law | 8785 | Perspective: The Patrol Function, by Patrick V. Murphy, Former Police Commissioner of New York City |
penreg.txt | 30184 | PENREG: A Database Management System Designed to Maintain and Manipulate Data Obtained through a Pen Register or DNR (1989) |
plateaup16.law | 9155 | Plateauing in Law Enforcement, by James M. Childers, Lubbock, Texas, Police Department |
pntview.txt | 12266 | Point of View: A Manager's Guide to Computer Products by Charles Brennan |
pol-com.leb | 18679 | Community Policing is Not Police Community Relations by Robert C. Trojanowicz |
pol-prac.leb | 4546 | Police Practices: Seat Belt Awareness Program |
pol_com.txt | 18613 | Community Policing is not Police Community Relations by Robert C. Trojanowicz |
pol_prac.txt | 5620 | Police Practices: Baited Vehicle Detail |
pol_pracp10.law | 6019 | Police Practices: Alternate Fuel Program |
pol_pracp24.law | 5686 | Police Practices: Baited Vehicle Program |
police.evasion | 20608 | Exilic Xyth's Guide to 1st Level Police Evation (November 10, 1990) |
policeevasion.txt | 21345 | Exilic Xyth's Guide to 1st level Police Evasion (November 10, 1990) |
policemen.pig | 3328 | Calling a Policeman a Pig: A New Concept From The Anarchist Cookbook, by The Norwegian Monk |
polprac08.law | 4973 | Police Practices: Miami's Ethnic Sharing Program |
polpracp16.law | 5678 | Police Practices: Operation Star |
pope.txt | 11449 | U.S. Computer Investigation Targets Austinites by Kyle Pope (March 17, 1990) |
poster.txt | 2432 | Wanted Poster for John Richard, the Scofflaw Sysop |
posting- | 5290 | The Risks of Posting to the Internet |
posting_ | 5289 | The Dangers of Posting to the Net (A Visit from the FBI) |
practice.law | 6079 | Police Practices: CHP Hazardous Waste Investigation Unit |
practice.txt | 3680 | Police Practices: The Community Outreach Program |
practiceleb.law | 7257 | Police Practices: Pennsylvania's Interdepartmental Communications System |
preface.txt | 20480 | The Federal Zone: Cracking the Code of Internal Revenue by Mitch Modeleski (January, 1994) |
prelimin.txt | 17474 | The Preliminary Investigation Process by Cheif Gordon F. Urlacher |
presumed | 157447 | Presumed Guilty: The Law's Victims in the War on Drugs, 1991 by Andrew Schneider |
primes.txt | 22238 | Primes, Codes and the National Security Agency by Susan Landau |
privacy | 45299 | Computer Privacy vs. First and Fourth Amendment Rights, by Michael S. Borella, 1991 |
privatiz.nre | 15151 | The Privatized NREN, by Mitchell Kapor, Electronic Frontier Foundation, February 14, 1991 |
privpris.txt | 15691 | Privitization of Prisons: Fad or Future by Lr. David K. Burright |
privsoc.law | 10232 | The Private and Open Society, by John Gilmore |
prodigy.law | 5118 | Prodigy Stumbles as a Forum.. Again |
promoteleb.law | 15620 | Promotion to Chief: Keys to Success in a Small Department |
prosecut.law | 21204 | Evironmental Crimes Prosecution: A Law Enforcement Partnership, by Vincent A. Matulewich, Environmental Protections Bureau, New Jersey |
pub_7277.asc | 48987 | Freedom From War: The United States Program for General and Complete Disarmament in a Peaceful World |
pubprivs.txt | 20291 | Public Law Enforcement/Private Security: A New Partnership? by Terrence J. Mangan and Michael G. Shanahan |
pview.txt | 10861 | Point of View: European Law Enforcement after 1992 by Jan Blaauw |
pviewp18.law | 10927 | Point of View: Eurpoean Law Enforcement after 1945 |
quotes.txt | 20330 | Quotes from Many Historical Figures about Juries |
ratpatro.law | 11360 | The Rat Patrol Rides! By Paul C. Ricks, Deputy Chief of Police, Colorado Springs |
ratpatro.txt | 11294 | The Rat Patrol Rides! By Paul C. Ricks of Colorado Springs P.D. |
rebuttal.txt | 300445 | Inslaw's Analysis and Rebuttal of the BUA Report |
res-rev.leb | 3696 | Research Review: Police Use of Discretion: A Comparison of Community, System, And Officer Expectations |
resmeas.txt | 18051 | Ammunition Selection: Research and Measurement Issues by N.J. Scheers and Stephen R. Band |
response.txt | 7842 | A Case for Mistaken Identity... Who's Privacy was Really Invaded? by Jim Bigeloww |
reviewl.law | 8806 | Book Review, "Liability" by Peter Huber |
ri_lawsta.law | 1950 | Rhode Island Computer Crimes Law, 1979 |
riggs_co | 55329 | United States Vs. Riggs: Jacking into the Net with the Illinois District Court |
rights.txt | 30658 | Why Your Rights are Guaranteed and should Not Be Taken Away |
ripco-wa.rra | 75314 | Seizure Warrant for the Ripco BBS |
ripco.law | 13511 | The RipCO BBS Seizure |
ripcobbs | 73736 | Seizure Warrant Documents for the RIPCO BBS |
safetyleb.law | 10578 | Safety Action Team, by Rod Englert, Oregon Sheriff |
saucs1.txt | 95531 | The Shareware Author and User Case Study by Daniel Corbier (1994) |
sc_lawsta.law | 7604 | South Carolina Computer Crime Act |
school.law | 13599 | Preparing for School Crisis, by David Nichols, Ph. D. |
school.txt | 13534 | Preparing for School Crisis, by David Nichols of Jacksonville State University (1991) |
schoolcr.law | 10368 | School Crime Stoppers, by Bob Chance, Tulsa Oklahoma Police |
schoolcr.txt | 10303 | School Crime Stoppers by Bob Chance of the Tulsa Police Department |
sd_lawsta.law | 3184 | South Dakota Computer Crimes Law, 1982 |
search.txt | 21769 | Searches of Premises Incident to Arrest, by A. Louis DiPietro |
searches.txt | 30108 | Emergency Searchs of Effects, by John Gales Sauls of the FBI Academy |
searchp26.law | 26342 | Inventory Searches: The Role of Discretion, by Austin A Anderson |
sentguid.law | 9050 | Proposed Amendment #59 to the Sentencing Guidelines for United States Courts |
serologyleb.law | 24819 | Serolgical Evidence in Sexual Assault Investigations, by Robert R.J. Grispino, MA, Serolgy Unit, FBI |
simson.sec | 62214 | An Introduction to Computer Security for Lawyers by Simson Garfinkel (1987) |
sniper.txt | 20441 | Police Sniper Training by John Plaster of the Minnesota National Guard |
sniperleb.law | 20505 | Police Sniper Training, by John Plaster, Instructor, MN Guard Counter Sniper School |
softmark.asc | 4237 | Information and Documents Needed for Software Copyright Application |
softmarkdoc.law | 4295 | Information and Documents Needed for Software Copyright Application |
softpat.txt | 86156 | A Partial List of Software Patents, compiled by Michael Ernst (April 12, 1992) |
srrapist.txt | 21884 | The Criminal Behavior of the Serial Rapist, by Robert R. Hazelwood |
stcomplw | 3165 | A Cross-Reference of US States and Laws Written for Them |
steroids.txt | 16332 | The Abuse of Anabolic Steroids by Charles Swanson, University of Georgia |
steroids19.law | 16398 | Abuse of Anabolic Steroids, by Charles Swanson, Ph. D., U of Georgia |
stripesp16.law | 13643 | Honolulu's Stripes: Training for Sergeants, by Robert D. Prasser, Captain, Honolulu Hawaii Police Department |
suc-inte.txt | 6281 | Successful Interviewing by James R. Ryals, March 1991 |
sucinte.txt | 6620 | Successful Interviewing by James R. Ryals |
sueirs.txt | 6016 | Wage Earners Should Consider Possibility of Suing IRS for Tax Refunds Rather Than Filing Exempt W-4 Forms by Bill Conklin |
suicide.txt | 12347 | The High Scool Suicide Crisis Intervention by David Fisher of the Pinnellas Sheriff's Office |
summary.txt | 42517 | The INSLAW affair: September 10, 1992 |
supreme.law | 25869 | Selected Supreme Court Cases: 1989-1990 Term: William U. McCormack, FBI |
suprule1.txt | 42376 | The Rules of the U.S. Supreme Court |
suprule2.txt | 36427 | The Rules of the U.S. Supreme Court (Part II) |
suprule3.txt | 36204 | The Rules of the U.S. Supreme Court (Part III) |
survive01.law | 11830 | The Will to Survive, by Stephen R. Band |
swiss.txt | 54666 | Getting a Discretionary Swiss Banking Account |
swt.txt | 2009 | Seizing Wire Transfers, by The Wall Street Journal (September 20, 1993) |
sysops | 21329 | What Files are Legal for Distribution on a BBS? |
targetd.law | 14371 | Washington D.C.'s Operation "On Target" by Eric W. Witzig, Ret., Washington DC Police |
taxother.tut | 9940 | Tax Deductibility of BBS Operations |
teamworkp06.law | 12002 | Teamwork: An Innovative Approach, by Alan Youngs, Captain, Lakewood Colorado Police |
tempest.law | 53840 | Eavesdropping on the Electromagnetic Eminations of Digital Equipment: The Laws of Canada, England, and the United States |
thefacts.law | 105795 | Push Button Felonies: KPFA-FM Radio Broadcast July 26, 1990 |
theft_of.sof | 12513 | Theft of Computer Software: A National Security Threat by William J. Cook |
tm.tut | 5077 | Trademarks in Brief (Overview) |
tn_lawsta.law | 7152 | Tennesse Computer Crimes Act |
tomorfbi.txt | 17669 | A Look Ahead: Views of Tomorrow's FBI by Richard Sonnichsen, Gail O. Burton and Thomas Lyons |
towingco.txt | 9557 | Towing Companies: Friends or Foes? By Michael C. Gillo |
trash.law | 21269 | Trash Inspections and the Fourth Amendment, by Thomas W. Kukura, JD |
trash.txt | 21203 | Trash Inspections and the Fourth Amendment, by Thomas V. Kukura of the FBI |
travel.rgt | 18188 | A How-To Information Sheet for Sovereigns: A Challenge to the 6th Amendment's Jurisdiction by Howard J. Freeman (March 23, 1993) |
tx_lawsta.law | 5722 | Texas Computer Crime Law |
uic.law | 19541 | The League for Programming Freedom Statement |
uncharte | 62233 | The Charter of the United Nations (July 7, 1994) |
us&scon1.txt | 126412 | The United States and the States under the Constitution, by C. Stuart Patterson |
us&scon2.txt | 74338 | The United States and the States under the Constitution, by C. Stuart Patterson (Part 2) |
us&scon3.txt | 162306 | The United States and the States under the Constitution, by C. Stuart Patterson (Part 3) |
us&scon4.txt | 112100 | The United States and the States under the Constitution, by C. Stuart Patterson (Part 4) |
us&scon5.txt | 200455 | The United States and the States under the Constitution, by C. Stuart Patterson (Part 5) |
us&scon6.txt | 101176 | The United States and the States under the Constitution, by C. Stuart Patterson (Part 6) |
uscon.law | 57050 | The Constitution of the United States |
userintf.cp | 11618 | Protecting Rights in User Interface Designs by Ben Shneiderman (November 27, 1992) |
ut_lawsta.law | 6859 | The Utah Computer Crimes Act |
va_lawsta.law | 11468 | The Virgina Computer Crimes Act |
vic-wit.txt | 16276 | Victim-Witness Assistance by Joseph R. Luteran, March 1991 |
visiop08.law | 8300 | Visiophones: French High Tech Security, by Pierre Marie Bourniquel, Biarritz, France |
wa_lawsta.law | 2035 | Computer Crimes Law in Washington State |
waco.txt | 38784 | The Text of the Search Warrant from Waco, Texas |
waiver.txt | 10310 | A Waiver of Claims pertaining to Adult Sections of Ryan's Bar BBS |
way.law | 9031 | There's Gotta Be a Better Way, by Glen Roberts and Bill Wajk |
weaponsp10.law | 13094 | Vehicular Long Barrel Weapons Mount, by David W. Pisenti, FBI |
wi_lawsta.law | 5655 | Wisconson Computer Crimes Law |
wv_law.law | 8732 | West Virginia Computer Crimes Law |
wy_lawsta.law | 7182 | Wyoming Computer Crimes Law |
yardies.txt | 13795 | The Yardies: England's Emerging Crime Problem, by Roy A.C. Ramm (January, 1988) |
There are 533 files for a total of 16,062,590 bytes. |
If you wish to have the entire directory conveniently archived and compressed into one file, please download either law.tar.gz (4797986 bytes) or law.zip (5315618 bytes) instead of all the files separately.