Find out more about Online Masters Degree in Counseling for a career as a school psychologist or marriage counselor. Most of the online counseling programs integrate Dell.com technology in education so the learning process is streamlined and students graduating from the program have working knowledge of the most innovative technology platforms.
Report suspicious activity relating to child pornography to the Tip line 1-800-843-5678 (1-800-BE-ALERT).
Learn how to protect your information and feel secure online by visiting Identity Theft by Next Advisor's web portal.
To have your residential or business phone and address information removed from the Google PhoneBook, click here.
The Digital Scarlet Letter: The Effect of Online Criminal Records on Crime --How does public access to criminal records affect crime? -- Boston University, Department of Economics
Computer Crime & Intellectual Property United States Department of Justice
High Tech Legal Issues United States Department of Justice
Reporting Computer or Internet-Related Crime United States Department of Justice- Internet-related crime should be reported to appropriate law enforcement investigative authorities at the local, state, federal, or international levels, depending on the scope of the crime.
Ryan Fisher, 24, skilled in commercial wireless Internet networks was sentenced for bringing down wireless Internet services intentionally in Vernal, Utah. He was sentenced to 24 months in prison followed by 36 months of supervised release for damaging a protected computer intentionally and pay $65,000 in restitution. He worked for SBT Internet, residential and business Internet service using wireless radio signals.
Jay Vern Heim was sentenced in federal court in San Diego. He plead guilty to recklessly damaging a protected computer, in violation of Title 18, United States Code, Section 1030(a)(5)(A)(ii). He was a founding partner and employee of Facility Automation Systems FAS, a San Diego company that installs and maintains building automation systems. After he left FAS, he used the Internet domain, facilityautomationsystems.com username and password, to redirect FAS' Internet traffic, including email, to his new employer, the Moreno Valley Unified School District to make FAS’ web site and email services inaccessible.
What you need to know to safely shop online. The safest way to shop as long as simple basic precautions are taken.
Chilling Effects Clearinghouse -- Understand the protections intellectual property laws and the First Amendment give to your online activities.
Better Business Bureau (BBB) believes the majority of marketplace problems can be solved fairly through voluntary self-regulation and consumer education.
The Fraud Center gives consumers the information to avoid becoming victims of telemarketing and Internet fraud and to help them get their complaints to law enforcement agencies quickly and easily.
US Postal Inspection Service Mail Fraud Complaint Center at 1-800-372-8347
02/28/99 -- Lenoir, NC --On Oct. 13, 1998, Sharon Lopatka, 35, left her Hampstead, Maryland home for North Carolina, to willingly be sexually tortured to death by a man she met on the Internet. She was killed 3 days later. Robert Glass, 45, was convicted and died a couple weeks prior to his scheduled release date.
Captain Crunch sets up security firm -- Legendary hacking figure Captain Crunch is returning from years of relative obscurity to set himself up as a security consultant. Perhaps the most well known figure in the digital underground besides Kevin Mitnick, John Draper made his name in 1971 when he discovered that the toy whistle in the Cap'n Crunch cereal box could trick the telephone network into giving him free calls.
Legal Information Institute (LII) Carries out applied research on how to put law on the Net in an effective way that works for a wide range of citizens Cornell Law School
Center for Democracy and Technology - Promote democratic values and constitutional liberties in the digital age. With expertise in law, technology, and policy, CDT seeks practical solutions to enhance free expression and privacy in global communications technologies. .
SEC's Office of Investor Education and Assistance address how to invest wisely
and avoid fraud. SEC
SEC enforcement, suspensions and notices.
America's Top Cybercop -- Jodie Bernstein patrols the Web for the Federal Trade Commission, looking for swindlers and snake-oil salesmen.
Kari & Associates
© Copyright Kari Sable 2011
The Encyclopedia of High-Tech Crime and Crime-Fighting -- By Michael Newton. 2003. 377p. bibliography. glossary. illus. index.
Practical Cryptography by Niels Ferguson, Bruce Schneier -- Two experts in cryptography teach you how to secure your digital future. Without a secure computer system, you don't survive. Cryptography holds great promise as the technology to provide security in cyberspace. This follow-up guide to Applied Cryptography explains the how-to of cryptography. Implement cryptographic algorithms and systems in a secure way on today's computers. Why security affects every part of the system and has to be a primary goal of the project. Simple interfaces for cryptographic primitives reduce system complexity and increase system security.
of Computer Crime Investigation: Forensic Tools & Technology