Computer & Internet Crimes
E-mail Discussion Lists
Home
DNA - Forensics
Homicide
Green River Killer
Historic Crime
Organized Crime
Hate Crimes
Sex Crimes
Juvenile Crime
Child Abuse
Domestic Violence
Unsolved Cases
Missing Persons
Victims
Mental Illness
Elder Abuse
Punishment
Law Enforcement
Drug Wars
White Collar Crime
Media & Crime
Computer Crimes
 

Crime: Computer Viruses to Twin Towers by H. Thomas Milhorn, M.D., Ph.D.

Internet Piracy (At Issue Series)

Cyberspace Crime (International Library of Criminology, Criminal Justice & Penology)
by David Wall

Crime and Law in Media Culture
by Sheila Brown
The whole of society, including crime and criminal justice, is embraced by media culture.The book sets out to assess how crime, law, and our understanding of them, are reproduced, challenged and changed through media culture.

Handbook of Applied Cryptography
by Alfred J. Menezes, Paul C. Van Oorschot, Scott A. Vanstone
Cryptography, public-key cryptography, emerged in the last 20 years as the subject of an enormous amount of research for information security. Standards are emerging to meet the demands for cryptographic protection. Public-key cryptographic techniques are in widespread use, in financial services industry, public sector, and individuals for personal privacy, such as in electronic mail. Reference for the novice or expert.

Cyber Crime: Crime and Detection by Charlie Fuller (Editor)

Youth PC Crime
Cyber stalking
Fraud
Virus
Help
Report PC/ Crimes
Law Enforcement
Security & Privacy

Find out more about Online Masters Degree in Counseling for a career as a school psychologist or marriage counselor. Most of the online counseling programs integrate Dell.com technology in education so the learning process is streamlined and students graduating from the program have working knowledge of the most innovative technology platforms.  

Report suspicious activity relating to child pornography to the Tip line 1-800-843-5678 (1-800-BE-ALERT).

Learn how to protect your information and feel secure online by visiting Identity Theft by Next Advisor's web portal.

To have your residential or business phone and address information removed from the Google PhoneBook, click here.

The Digital Scarlet Letter: The Effect of Online Criminal Records on Crime --How does public access to criminal records affect crime? -- Boston University, Department of Economics

Computer Crime & Intellectual Property United States Department of Justice

High Tech Legal Issues United States Department of Justice

Reporting Computer or Internet-Related Crime United States Department of Justice- Internet-related crime should be reported to appropriate law enforcement investigative authorities at the local, state, federal, or international levels, depending on the scope of the crime.

Ryan Fisher, 24, skilled in commercial wireless Internet networks was sentenced for bringing down wireless Internet services intentionally in Vernal, Utah. He was sentenced to 24 months in prison followed by 36 months of supervised release for damaging a protected computer intentionally and pay $65,000 in restitution. He worked for SBT Internet, residential and business Internet service using wireless radio signals.

Jay Vern Heim was sentenced in federal court in San Diego. He plead guilty to recklessly damaging a protected computer, in violation of Title 18, United States Code, Section 1030(a)(5)(A)(ii). He was a founding partner and employee of Facility Automation Systems FAS, a San Diego company that installs and maintains building automation systems. After he left FAS, he used the Internet domain, facilityautomationsystems.com username and password, to redirect FAS' Internet traffic, including email, to his new employer, the Moreno Valley Unified School District to make FAS’ web site and email services inaccessible.

What you need to know to safely shop online. The safest way to shop as long as simple basic precautions are taken.

Virus Protection

with up-to-date information on Internet research and technology-related issues, applications, resources, and tools.

FRONTLINE's "Hackers"

Chilling Effects Clearinghouse -- Understand the protections intellectual property laws and the First Amendment give to your online activities.

Cybercrime Headlines.

Better Business Bureau (BBB) believes the majority of marketplace problems can be solved fairly through voluntary self-regulation and consumer education.

Federal Trade Commission Consumer Information

The Fraud Center gives consumers the information to avoid becoming victims of telemarketing and Internet fraud and to help them get their complaints to law enforcement agencies quickly and easily.

Interpol combats Information Technology Crime

US Postal Inspection Service Mail Fraud Complaint Center at 1-800-372-8347

02/28/99 -- Lenoir, NC --On Oct. 13, 1998, Sharon Lopatka, 35, left her Hampstead, Maryland home for North Carolina, to willingly be sexually tortured to death by a man she met on the Internet. She was killed 3 days later. Robert Glass, 45, was convicted and died a couple weeks prior to his scheduled release date.

Captain Crunch sets up security firm -- Legendary hacking figure Captain Crunch is returning from years of relative obscurity to set himself up as a security consultant. Perhaps the most well known figure in the digital underground besides Kevin Mitnick, John Draper made his name in 1971 when he discovered that the toy whistle in the Cap'n Crunch cereal box could trick the telephone network into giving him free calls.

Legal Information Institute (LII) Carries out applied research on how to put law on the Net in an effective way that works for a wide range of citizens Cornell Law School

Center for Democracy and Technology - Promote democratic values and constitutional liberties in the digital age. With expertise in law, technology, and policy, CDT seeks practical solutions to enhance free expression and privacy in global communications technologies. .

The SEC's Office of Investor Education and Assistance address how to invest wisely and avoid fraud. SEC Complaint Center
SEC Complaint Center 450 Fifth Street, NW Washington, D.C. 20549-0213
Fax: 202-942-9634
Forward spam (junk email) or copies of message board postings to [email protected]. Please do not use this email box for general complaints or questions.

SEC enforcement, suspensions and notices.

America's Top Cybercop -- Jodie Bernstein patrols the Web for the Federal Trade Commission, looking for swindlers and snake-oil salesmen.

Kari & Associates
PO Box 6166
Olympia, WA 98507

© Copyright Kari Sable 2011

The Encyclopedia of High-Tech Crime and Crime-Fighting -- By Michael Newton. 2003. 377p. bibliography. glossary. illus. index.

Cyber Crime (Face the Facts)
by Neil McIntosh, Adrian Cooper

Practical Cryptography by Niels Ferguson, Bruce Schneier -- Two experts in cryptography teach you how to secure your digital future. Without a secure computer system, you don't survive. Cryptography holds great promise as the technology to provide security in cyberspace. This follow-up guide to Applied Cryptography explains the how-to of cryptography. Implement cryptographic algorithms and systems in a secure way on today's computers. Why security affects every part of the system and has to be a primary goal of the project. Simple interfaces for cryptographic primitives reduce system complexity and increase system security.

Handbook of Computer Crime Investigation: Forensic Tools & Technology
by Eoghan Casey
The Tools section provides the details on leading hardware and software programs-such as EnCase, Dragon, and ForensiX-with each chapter written by that product's creator. The section ends with an objective comparison of the strengths and limitations of each tool. The main Technology section provides the technical "how to" information for collecting and analyzing digital evidence in common situations, starting with computers, moving on to networks, and culminating with embedded systems. The Case Examples section gives readers a sense of the technical, legal, and practical challenges that arise in real computer investigations.

 

PLEASE CONTRIBUTE TODAY!
 
| privacy