Extractions: Outraged by last months grand jury report detailing corruption in the district attorneys office, six senior criminal detectives have retired and another dozen officers are expected to follow them in coming weeks, the Weekly has learned. The Orange County grand jurys 100-page "Office of the District Attorney: An In-Depth Investigation" report accused DA Tony Rackauckas and Don Blankenship, the head of his criminal-investigation division, of cronyism, mismanagement and misuse of public resources. Several prosecutors say they fear the summer fallout will cost the government agency responsible for prosecuting criminals 500 years worth of gumshoe experience. Scheduled to leave office are: Assistant Chief of Investigations Michael Carre; commanders Doug Miller, Lon Erickson and Ron Johnson; and supervisors John Walsh and Mary Ann Hall.
Harvard Business Online term 1 = Legal aspects of business and term 2 = crime. Product Type Harvard BusinessReview Article. In 1992, a corruption investigation and two assassinations http://harvardbusinessonline.hbsp.harvard.edu/b01/en/includes/browse/topic_brows
Computer Crime Investigator's Toolkit: Part II Computer crime Investigator s Toolkit Part II. cracking is usually child s play forinvestigators armed with bib/toc/cryptologia.html ) has articles from time http://www.developer.com/tech/article.php/600471
Extractions: Developer.com Update Codeguru.com Update Jars.com Update Gamelan.com Update 15Seconds HTML 15Seconds Text 4 Guys from Rolla ASP Wire ASP 101 Database Journal DBASupport Java Boutique JNews IT Career Source Tech Events List VB Wire WebDeveloper.com WebReference HTML WebReference Text Virtual Dr. Text Computer Crime Investigator's Toolkit: Part II In Windows 3.1, remember that you can use Undelete and Unformat to recover information. And yes, as indicated before, these dinosaurs are out there. Expect old versions of word processors too, so maintaining a library of "obsolete" manuals and software has great investigative value. Using Undelete in Windows 95 requires copying Undelete.exe from DOS to the Command subfolder. Then you have to restart the computer in DOS. And, you will have to lock and unlock to the folder that contained the deleted file and do the Undelete procedure. Doing this sort of manipulation is not child's play, so in critical cases make sure full bitstream backups take place first and use the services of a computer forensics specialist.
About Crime And Punishment articles and opinion pieces about current crime, statistics, and investigations from About.com. http://www.crime.about.com/newsissues/crime/
Extractions: zJs=10 zJs=11 zJs=12 zJs=13 zc(5,'jsc',zJs,9999999,'') About Crime / Punishment Home Essentials ... MICHAEL JACKSON zau(256,152,180,'gob','http://z.about.com/5/ad/go.htm?gs='+gs,''); Current Cases Past Crimes and Criminals Issues and Controversies Courtroom and Forensics ... Help zau(256,138,125,'el','http://z.about.com/0/ip/417/0.htm','');w(xb+xb); Subscribe to the About Crime / Punishment newsletter. Search Crime / Punishment From Bill Bickel
Computer Crime Investigator's Toolkit: Part II Computer crime Investigator s Toolkit Part II By February 15 is usually child s playfor investigators armed with toc/cryptologia.html ) has articles from time http://www.developer.com/tech/print.php/600471
Extractions: February 15, 2001 In Windows 3.1, remember that you can use Undelete and Unformat to recover information. And yes, as indicated before, these dinosaurs are out there. Expect old versions of word processors too, so maintaining a library of "obsolete" manuals and software has great investigative value. Using Undelete in Windows 95 requires copying Undelete.exe from DOS to the Command subfolder. Then you have to restart the computer in DOS. And, you will have to lock and unlock to the folder that contained the deleted file and do the Undelete procedure. Doing this sort of manipulation is not child's play, so in critical cases make sure full bitstream backups take place first and use the services of a computer forensics specialist. Unerase and Unformat are available through Norton Utilities. You can use them from the Norton Utilities Emergency/Data Recovery Disk. Both options are available from the disk's command menu. Unformat, however, will not work with DOS 5.0 or earlier. When unformatting, pay attention to the list of files and directories Norton identifies that may be lost when executing the process.
The Feds And The Net Closing The Culture Gap By Mike Godwin Games was not the target of the investigation, so there I didn t tell you in thatarticle, though, is that line of defense effective in computercrime cases is http://www.eff.org/Legal/feds_on_the_net_godwin.article
DevASP Crime Scene & Evidence Photographer's Guide Book - 0966197003 DevASP crime Scene Evidence Photographer's Guide 0966197003 - A Directory of ASP and XML resources, articles, samples, tutorials, scripts, applications and sample chapters arranged by category http://www.devasp.com/store/shop/pd0966197003
Extractions: Having just started as a Scenes of Crime Officer with Leicestershire Constabulary, in January this year, and successfully completed my 9 week initial training course at NTC, Durham, I find this book a very helpful guide for photographing evidence at crime scenes. This book deals with many different kinds of things I have yet to encounter/experience as I am only now just starting to go out on my own, having been tutored for the past month or so. I recommend it to anyone who wants to learn how to do this type of photography and to those who use photography in the job. This book is a great introduction to the subject of crime scene and evidence photography as the pictures contained therein are excellent and the beginner is not overwhelmed by technical jargon. Although slightly high in price, I feel the book is still worth owning and it is a precious part of my SOCO kit and use the useful information provided when out in the field.
ATF Online ATF I 3310.3 Misdemeanor Crimes of Domestic Violence on Fire Research for FireInvestigation November 1997. CFR Part 26, Liquors and articles from Puerto http://www.atf.gov/pub/
Extractions: Treasury Publications Firearms Publications Arson and Explosives Publications ... Procedures Back to top ATF National Laboratory Center Brochure ATF Performance and Accountability Report - 2003 ATF Performance and Accountability Report - 2002 ... 1997 Strategic Plan Back to top Gun Shows: Brady Checks and Crime Gun Traces (1/99) Department of the Treasury Study on the Sporting Suitability of Modified Semiautomatic Assault Rifles (4/98) Progress Report - Study of Marking, Rendering Inert, and Licensing of Explosive Materials - 1998 ... Progress Report - Study of Marking, Rendering Inert, and Licensing of Explosive Materials (Taggant Study) (97) Back to top YCGII Reports Youth Crime Gun Interdiction Initiative - Crime Gun Trace Reports (2000) - National Report Youth Crime Gun Interdiction Initiative - Crime Gun Trace Reports (1999) - National Report Youth Crime Gun Interdiction Initiative for 27 Communities 1998 Youth Crime Gun Interdiction Initiative for 17 Communities 1997 Publications ATF I 5300.25 - Helpful Hints For Completing ATF F 4473
Computer Crime Investigator's Toolkit: Part II Computer crime Investigator s Toolkit Part II February 15 is usually child s playfor investigators armed with toc/cryptologia.html ) has articles from time to http://networking.earthweb.com/netsecur/article.php/600471
Extractions: FREE Tech Newsletters Instant Messaging Planet HTML CIO Update CodeGuru Update CrossNodes Networking Practically Networked HTML Enterprise Storage Forum Text Enterprise Storage Forum HTML Optically Networked HTML Intranet Journal Update Datamation IT Management Careers Datamation IT Management Update Developer.com Update Gamelan Java Update Goodies to Go Javascript Weekly HTML JARS Java Update OpenSource Update SysOpt Tech Notes Grid Computing Planet HTML E-Security Planet Text E-Security Planet HTML Virtual Dr. Text February 15, 2001 In Windows 3.1, remember that you can use Undelete and Unformat to recover information. And yes, as indicated before, these dinosaurs are out there. Expect old versions of word processors too, so maintaining a library of "obsolete" manuals and software has great investigative value. Using Undelete in Windows 95 requires copying Undelete.exe from DOS to the Command subfolder. Then you have to restart the computer in DOS. And, you will have to lock and unlock to the folder that contained the deleted file and do the Undelete procedure. Doing this sort of manipulation is not child's play, so in critical cases make sure full bitstream backups take place first and use the services of a computer forensics specialist.
Criminal Justice Resources Resources: Hate Crime www.splcenter.org/intel/intelreport/article.jsp?aid offer effective support to hatecrime victims and the community throughout the investigation and prosecution http://www.lib.msu.edu/harris23/crimjust/hate.htm
Extractions: Contains biographical information on the cult leader, an overview of the 1969 California "Helter Skelter" murders and profiles of the victims, information on the subsequent investigation and trial, updates on members of "the family" (including Lynette "Squeaky" Fromme, "convicted of attempting to assassinate President Gerald L. Ford in 1975"), and bibliography. From The Crime Library.
ThisisLondon The investigation follows the highprofile case of Colonel Tim Collins whoseinvestigation over alleged war crimes caused international outrage. http://www.thisislondon.com/news/articles/5072281?source=Evening Standard
Justice Canada Vol 3 No 1 In another highprofile case, after an investigation by the RCMP s high-techcrime unit in Ottawa, Gupta negotiated a guilty plea under the federal http://canada.justice.gc.ca/en/dept/pub/jc/vol3/no1/page4.html
Extractions: e Prosecutions Secretariat shows up to lead the way. This energetic group of four lawyers monitors the impact of technology on the work of prosecutors and participates in a variety of projects, both within the Department of Justice and outside, that relate to technology and the practice of criminal law. The Secretariat, formed in June 2001, also joins the provinces and territories on a working group on cyber crime. And it helps guide police and prosecutors through the mysteries of microchips, cyberspace and electronic games and gadgets. Kimber Johnston FPS e Prosecutions Secretariat that we hope to achieve this, not just for the FPS The e Prosecutions Secretariat allows the FPS to play a critical role in the development of policy, legislation and practices driven by the requirements of the new electronic age says D. A. Bellemare, Assistant Deputy Attorney General (Criminal Law) and head of the FPS Technology is widely used in the commission of crimes, from fraud and money laundering to child pornography and drug trafficking. The technology used in computers and the Internet also generates a thicket of logs, backup files and other trace evidence in digital form.
Extractions: Winter 2000 F_menu(new Array('NavigationBar21', '../html/cj_editors.html','../assets/images/autogen/CJ_editors_Ns1_1.gif','../assets/images/autogen/CJ_editors_NRs1_1.gif')); F_menu(new Array('NavigationBar22', '../html/cj_archives.html','../assets/images/autogen/CJ_print_Ns1.gif','../assets/images/autogen/CJ_print_NRs1.gif','../html/new_and_newsworthy_archive.html','../assets/images/autogen/CJ_online_Ns1.gif','../assets/images/autogen/CJ_online_NRs1.gif')); DNA Testing: The Next Big Crime-Busting Breakthrough Howard Safir, Peter Reinharz email article respond to article print article T he whole world knows about the extraordinary reduction in crime that New York City has won in recent years by applying a host of innovative new crime-fighting techniques, from computerized crime tracking to quality-of-life policing. But there's a cutting-edge way to slash Gotham's crime rate by another 15 percent: using DNA evidence left behind by criminals to situate them at the scene of the crime. In England, police have pushed DNA profiling to the forefront of crime fighting, helping to solve tens of thousands of crimes. But here in the United States, efforts to expand DNA testing are lagging, in part because of the relentless, if ill-founded, opposition of the American Civil Liberties Union. It's a shame, because not only does the use of DNA testing in law enforcement promise to put more of the guilty behind bars; it has also worked to free innocent people imprisoned for crimes they didn't commit.
Past Articles: Fiction Features past articles. Investigative journalist retraces life of an actor. crime thrillerby a retired police officer set during a big freeze in the Midwest. http://www.ivenus.com/culture/articles/CU-FP-Archive-Features-Fiction.asp
Extractions: Allende, Isabel: Daughter of Fortune (pub 14/8/00). Epic story about Chilean girl's search for love and freedom. Atwood, Margaret: The Blind Assassin (pub 9/10/00). Booker-winning story within a story within a story. Banks, Iain: Look to Windward (pub 18/9/00). Part of a cycle of sci-fi novels set on Culture. Banks, Russell: The Angel on the Roof (pub 13/11/00). Stories about American outsiders. Banville, John: Eclipse (pub 18/9/00). 'Plotless' novel about a man falling apart. Barnett, Ann: The Largest Baby in Ireland After the Famine (pub 31/7/00). Debut novel with a love story set in mid-Ulster during the First World War. Basu, Kunal: The Opium Clerk (pub 29/5/01). Captivating story about the opium trade between India and China. Bellow, Saul:
Catalog Of Pub 2002 Frame 4 on line only) Describes investigation, sentencing, and The article documents andanalyzes the impact Sentencing Federal Offenders for Crimes Committed Before http://www.fjc.gov/newweb/jnetweb.nsf/pages/534
Extractions: This brief report was prepared at the request of the Subcommittee on Courts, the Internet, and Intellectual Property of the House Judiciary Committee. Researchers found that in reviewing complaints of judicial misconduct or disability filed pursuant to statute, chief judges of all but one of the circuits have usually applied Judicial Conference standards that call for a restatement of allegations in the complaint and a reasoned response to such allegations. Researchers also found that 80% of the chief judge dismissal orders cited as a reason for dismissal the close relationship between a complainant's allegations and the merits of a decision by the judge who was the subject of the complaint. The report is available only in electronic form.
Gary W. Potter Murder Investigations. The articles have been wisely selected to be readable, interesting Organizedcrime, Third Edition Organized crime, Third Edition Written http://law-books.org/search_Gary_W._Potter/searchBy_Author.html
Extractions: This book is a collection of contemporary social constructionist articles on crime. The role of the media in "constructing crime" figures prominently in many of the articles. There isn't another book like this on the market. The articles have been wisely selected to be readable, interesting, and to cover a variety of topics. I list this book as a recommended supplement for the crime and criminal justice classes that I teach. The book provides an excellent introduction to constructionist appro...
Extractions: I. I NTRODUCTION Crime victims used to be ignored by criminologists. Then, beginning slowly in the 1940s and more rapidly in the 1970s, interest in the victim's role in crime grew. Yet a tendency to treat the victim as either a passive target of another person's wrongdoing or as a virtual accomplice of the criminal limited this interest. The concept of the victim-precipitated homicide[1] highlighted the possibility that victims were not always blameless and passive targets, but that they sometimes initiated or contributed to the escalation of a violent interaction through their own actions, which they often claimed were defensive. Perhaps due to an unduly narrow focus on lower-class male-on-male violence, scholars. have shown little openness to the possibility that a good deal of "defensive" violence by persons claiming the moral status of a victim may be just that. Thus, many scholars routinely assumed that a large share of violent inter-actions are "mutual combat" involving two blameworthy parties who each may be regarded as both offender and victim. The notion that much violence is one-sided and that many victims of violence are largely blameless is dismissed as naive. A few criminologists have rejected the simplistic mutual combat model of violence, though they sometimes limit its rejection to a few special subtypes of violence, especially family violence, rape, and, more generally, violence of men against women and of adults against children.[2] However, the more one looks, the more exceptions become evident, such as felony killings linked with robberies, burglaries, or sexual assaults, contract killings, mass killings, serial murders, and homicides where the violence is one-sided. Indeed, it may be more accurate to see the mutual combat common among lower-class males to be the exception rather than the rule. If this is so, then forceful actions taken by victims are easier to see as genuinely and largely defensive.
The Michigan Daily Online This week, the tribunal launches its investigation into the crimes and terror thathave accompanied the expulsion of nearly half a million ethnic Albanians to http://www.pub.umich.edu/daily/1999/apr/04-07-99/news/news15.html
Extractions: Los Angeles Times MORINE, Albania - Some crimes alleged to be taking place in Serbia's Kosovo province are horrific: mutilations, parents killed before their children's eyes, a 2-year-old girl burned alive. Then there are the more common, if numbing, acts - nearly half a million people forced from their homes and driven for days in an atmosphere of terror, whole towns and villages set ablaze, possessions looted and cars stolen at gunpoint, wedding rings stripped from women's fingers. Investigating such acts is the meat-and-potato work of the International Criminal Tribunal for the Former Yugoslavia, which has declared the current Kosovo crisis within its jurisdiction. This week, the tribunal launches its investigation into the crimes and terror that have accompanied the expulsion of nearly half a million ethnic Albanians to neighboring countries during the past two weeks. Two international war-crimes investigators began meeting with local prosecutors and refugee officials in northern Albania yesterday, working on procedures to locate and interview witnesses who can help the prosecution in any future war-crimes trials. The investigatory team, one a professional police officer from Australia and the other a veteran of South Africa's post-apartheid Truth and Reconciliation Commission, did not have to look far in their inquiries - from where they stood in this border post, they could easily see a Kosovo village going up in smoke.
Environmental Crimes: Profiting At The Earth's Expense Transit Nations and Illegal crime. The company is now under investigation by Singapore sNational Environment Agency, which would not comment for this article. http://ehp.niehs.nih.gov/members/2004/112-2/focus.html
Extractions: Abstract Environmental crime is a growing problem around the globe. Criminal groups are making billions by trading in environmental contraband, including banned chemicals, certain types of waste, and endangered species of plants and animals. Others profit by dumping hazardous waste in the ocean or in developing countries, sometimes on behalf of companies eschewing high disposal costs at home. Multilateral environmental agreements are currently the sole system for fighting environmental crime, but these treaties lack effective enforcement capacity. Agencies around the world are working to establish protocols, training, and enforcement measures to help curb environmental crime. Imagine for a moment that it's a hot summer day and you're driving; you roll up the windows in your car and turn on the air conditioning. As chilly air flows from the dashboard, you begin to feel comfortably insulated from the sweltering world outside. If your car was built in or before 1995, this soothing relief may be generated by a coolant called CFC-12, one of several chlorofluorocarbons (CFCs) implicated in the destruction of the ozone layer, a protective layer miles above the Earth that filters out carcinogenic ultraviolet rays.
Newspaper Articles CIVPOL Home Newspaper articles The Bleeding Sore of a special unit for investigatingsuch crimes. Trafficking and Prostitution investigation Unit (TPIU http://www.unmikonline.org/civpol/articles/bleeding.htm
Extractions: Neeraj K Singh To a casual passer-by, the Dollar Bar along the Main Highway in Zubin Potok would appear to be the sort of placid countryside pub one would frequent for a quiet release after a hard days work. Then what was the UNMIK Police doing there in such strength on the night of 11th June? They were there to reveal what lay beneath the cloak of apparent serenity a vicious exploitation of young girls illegally smuggled into Kosovo from other East European countries and then forced into prostitution. Three victims of trafficking two Ukrainian and one Moldavian were rescued and repatriated. The Kosovo-Serbian owner of the restaurant is the prime suspect. He may end up in prison or he may evade justice for want of evidence. The point is that no legal system can be the cure for a disease that runs deep in the veins of society. Persons in the Dollar Bar described the suspect as the girls owner, who charged people money for having sex with them. The term owner speaks powerfully of the murky world of flesh trade, where humans are bought by back street peddlers, who then sell them piecemeal every day.