CriminologyJustice

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Wednesday, September 5, 2012

Computers and Crime

Posted on 9:00 PM by Unknown

   By Elizabeth Hall
English: A graph showing where electronic aggr...
English: A graph showing where electronic aggression occurs. (Photo credit: Wikipedia)
Introduction
These days, computers are everywhere, and most of us carry them with us in the form of Smartphones, tablets, and notebooks everywhere we go (Evans, Martin & Poatsey, 2011).  While at first glance this seems wonderful, and makes it possible for us to be connected and share our lives with family and friends or even work on the go, when looking closely it also provides criminals with easier access to us.  This means that our personal information, along with an anonymous platform where it is easier to say what we think without repercussion is available to everyone whether he or she has scruples or not.  This leaves us more open to several different types of crimes that were harder to accomplish before the introduction to computers in mainstream society (Evans, Martin & Poatsey, 2011).  In this essay, we will define what these crimes are the differences in them, and ways to protect yourself from them.
Difference in Harassment, Threats, and Cyberstalking
English: http://noalciberacoso.blogspot.com/ E...
English: http://noalciberacoso.blogspot.com/ Español: http://noalciberacoso.blogspot.com/ (Photo credit: Wikipedia)
Three of the crimes that we will discuss are harassment, threats, and Cyberstalking.  Harassment, according to Knetzger, & Muraski (2008), is when someone continues to try to communicate and interact with someone else specifically with the goal of intimidation, emotional upset, or annoyance to the victim.  Threats are communications that imply some negative connotation of physical or mental harm that the person making the threat intends to carry out.  A person who threatens harm or ha
rasses someone by means of the Internet, or any other electronic forms of media defines Cyberstalking, and is a Class B misdemeanor if caught.  As we know, harassment and threatening are crimes, so why should it be different electronically?
English: An example of cyber-bullying on gmail...
English: An example of cyber-bullying on gmail chat (Photo credit: Wikipedia)

Difference in Cyberstalking and Cyber Bullying
There is another term we may hear often, cyber bullying.  This is not to be mistaken with Cyberstalking because it is somewhat different as noted by Knetzger, & Muraski (2008).  Cyber bullying is also somewhat the same as cyber stalking; the difference is that the criminals and victims are all minors.  Both of these crimes are prosecuted under similar legislation and laws, however one is prosecuted in juvenile court, and the other is prosecuted in adult court systems.  These crimes can be committed by email, SMS, or Instant Messaging (IM) and can often be more intense than cases of physical stalking or harassment or threats because of the ease and anonymity assumed by people using electronic devices (Knetzger, & Muraski, 2008).
Defining Identity Theft
D'Press 07 Jan 2009
D'Press 07 Jan 2009 (Photo credit: kishorebudha)
Strain (n.d.) holds that identity theft means a criminal acquires someone else’s personal information, with the intent to use it to commit a crime such as fraud, theft, to avoid detection.  Usually the person whose identity has been stolen does not find out about it until later when they themselves are applying for a loan, mortgage, or credit card.  Some thieves, as in the case of Albert Gonzalez, who led a transnational ring of identity thieves and managed to steal forty million different credit and debit cardholder’s information, manage to get large amounts of information from unsuspecting people while working as a police informant (Feeley, & Van Voris, 2010).  The three types of identity theft are true name fraud, account take over and criminal identity theft (Knetzger, & Muraski, 2008).  There are several ways that these thieves can obtain your information so be vigilant when we discuss five of t
he more common ways that you may be getting deceived and you might avoid becoming a victim. 

muraski waiting
muraski waiting (Photo credit: rocketjim54)
Five Common Ways Thieves Obtain Your Information
There are numerous ways that thieves can obtain your personal information discussed by Knetzger, & Muraski (2008).  We will discuss five of them here and tell you if there are any ways to protect yourself from them.  The first way as in the case of Mr. Gonzalez, is for them to hack into computers that hold the information and steal it in large quantities.  They usually hack into a business that has the information electronically and copy it.  Another way that they obtain the information is by dumpster diving, and it is what it sounds like, thieves stealing your trash and sorting through it.  You can protect yourself by shredding your junk mail, receipts, and documents before disposing of them (Knetzger, & Muraski, 2008).
WASHINGTON - JULY 25:  U.S. Attorney General E...
WASHINGTON - JULY 25: U.S. Attorney General Eric Holder (L) passes Secretary of Homeland Security Janet Napolitano (R) during the unveiling of a new strategy to combat Transnational Organized Crime (TOC) at the South Court Auditorium at the Eisenhower Executive Office Building July 25, 2011 in Washington, DC. The initiative gives the government a widened framework when dealing with transnational organized crime and also an provides an invitation for enhanced international cooperation. (Image credit: Getty Images via @daylife)
The third method we will talk about is outright stealing it from your mailboxes, cars, or homes (Knetzger, & Muraski, 2008).  You can protect yourself from this crime somewhat by not leaving personal information in your car, and by getting a mailbox with a key or a post office box.  Yet another method that is avoidable is the shoulder surfing method when a thief watches over your shoulder when entering personal information, and gets the information in plain sight.  The last common method here is through email and web site scams, in which you might be offered free products (pay shipping only), or employment so you type your information in, and they have it.  This is known as phishing and is very common on the internet and in emails.
What is a 4-1-9 Scam?
Knetzger, & Muraski (2008) notes that a 4-1-9 scam is also known as an advanced fee scam, and is known by the 4-1-9 for the area that it dominates from which is Nigeria and the Penal Codes associated with the fraud.  They also hold that 90% of these crimes happen under the fund transfer scheme.  How this works is someone from Nigeria or claiming to be Nigerian sends out mass emails claiming to be some sort of dignitary or customs official.  These emails usually involve wills, trust funds, etc., and claim that the person needs someone in the United States to help with the transfer of the funds associated with the will, or trust fund.  In return for helping, the email recipient will receive a portion of the money, which is usually listed in the millions.  All they have to do is send some money to ascertain the release of the sum.  The victim sends the money to receive nothing, or a communication stating that more money is needed to complete the transfer.  Most of these will have many grammatical errors, and will ask for personal information as well as the fees.
Conclusion
Five ways to fight sexual harassment(public se...
Five ways to fight sexual harassment(public service poster on a Seoul Subway Line 2 train) (Photo credit: Wikipedia)
In today’s modern world, computers are important to almost everything we as consumers do, whether that means work or recreation.  We pull out our smart phones and look up our locations as related to our favorite places, shopping, family friends, and almost everyone has one.  On the surface, this makes our data, family, work, and friends accessible, and possibly our lives easier however we must be vigilant because the criminal elements have them as well.  This has also brought us to an era of crimes that spans the entire world, and is available at our fingertips wherever we go, Cyberstalking, cyber bullying, identity theft, and other ways to use computers for crime open up a new avenue for law enforcement to patrol.


References:


Banerjee, A., Barman D., & Bhuyan, L.N., (n.d.).  Cyber-Fraud is One Typo Away.  Department of Computer Science and Engineering.  University of California, Riverside.  Retrieved From:  http://www.citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.163.3828...
 Evans, A. Martin, K. & Poatsey, M.A., (2011).  Technology in Action (7thEd.)  Upper Saddle River, NJ: Pearson/Prentice Hall.  ISBN 10: 0-13-509669-3
Feeley, J. & Van Voris, B., (2010).  Hacker Gets 20 years in Largest Identity Theft Case (Update 2).  Retrieved From: http://www.bloomberg.com/apps/news?pid=newsarchive&sid=aCDo3co5A0Zk
Knetzger, M. and Muraski, J. (2008) Investigating high-tech crime (1st Ed.).  Upper Saddle River, NJ: Pearson/Prentice Hall.  ISBN eBook:  0536085773 
Strain, P., (n.d.).  Phishing Don’t Phall for it.  Part 1.  Retrieved From: http://www.uakron.edu/dotAsset/2195277.pdf


Related articles

  • Cyberbullying, Cyberstalking and Online Predator Construct Published Online by iPredator Inc.
  • Exploring Computer Operating Systems to Investigate Cyber Crime: File Systems
  • NY governor signs cyber-bullying measure
  • Can You Educate Children on Cyber Bullying Tactics Used in 2012?
  • Computer Crime | eLocal
  • Groundbreaking Cyber Crime Bills Become Law
  • Transnational Crime and its Impact on the United States
  • The Tools of Law Enforcement - Technology and its benefits
  • Are Closed Circuit Cameras Effective in Battling Crime?
  • Today's Investigative Special Report August 18, 2012 "Dealing With Today's Law Enforcement Specialized Investigations" "What Role Has Technology Has Had On Law Enforcement"
Enhanced by Zemanta
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in Computer crime, crime, Criminology Amp Justice, Cyber-bullying, Cyberstalking, Harassment, Kaplan University, Muraski, Smartphone | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • Case Summary of Cases Involving Photographic Evidence: Relevant, Material, and More Probative than Inflammatory Photographic Evidence Cases
    Death penalty map (Photo credit: Wikipedia ) by Elizabeth Hall Introduction Ever since the photograph has been used as evidence rules have ...
  • Serial Murder: Difficulties within an Investigation
    by Tabetha Cooper Serial murder is a phenomenon that poses many problems for investigators.  With the multitude of factors that go into a se...
  • Today’s Investigative Special Report – December 11, 2012 “Dealing With Today’s Law Enforcement Specialized Investigations” “When the Facts and Evidence Are ‘Obvious’ Why Is It Then That Law Enforcement Can’t Find the Truth”
    By Lawrence W. Daly, MSc Forensic Expert – Senior Author You Be The Officer The smoking gun is sitting in the front room on top of the coff...
  • Tamil Shorthand (Development And Growth)
    TAMIL SHORTHAND (Development & Growth ) Author: G.S.Ananthanarayanan This article is a compilation of information available in the fie...
  • The Emergence of the Latin Kings in KY
    by Elizabeth Hall   Introduction English: An example of common Latin Kings' vandalism - showing a crude depiction of a five-pointed crow...
  • Mental Disorders – Paranoia, Symptoms and Potential Treatments
    Article by: Scott Hall       English: Robert Plutchik's Wheel of Emotions (Photo credit: Wikipedia )        Many citizens have experienc...
  • Investigation Into Serial Murder- Proactive and Reactive Approaches
    By Elizabeth Hall WANTAGH, NY - APRIL 15: An aerial view of police cars near where a body was discovered in the area near Gilgo Beach and O...
  • Violence
    by Tabetha Cooper A History of Violence (Photo credit: Wikipedia ) Violence is a continuing problem in the world.  This is evident every nig...
  • Police Technology: A History, Past, Present, and Future
    by Elizabeth Hall We have come a long way, since the Old West when law enforcement meant a local sheriff, with just a gun and a sheriff bad...
  • Analysis of Criminological Theory Relating to Organized Crime, John Gotti and Gang Organizations
    English: The Seal of the United States Federal Bureau of Investigation. For more information, see here. Español: El escudo del Buró Federal ...

Categories

  • $1 million (1)
  • 1964 Civil Rights Act (1)
  • Aaron Sorkin (1)
  • ABC News (2)
  • Abigail Adams (1)
  • Accessories (1)
  • ACLU (1)
  • Actus Reus (1)
  • Adam Lanza (1)
  • Addiction (1)
  • Afghanistan (1)
  • African American (2)
  • Air National Guard (1)
  • Al Qaeda (1)
  • Alabama (1)
  • Alan Rickman (1)
  • albert bandura (2)
  • Alexander Graham Bell (2)
  • Alexandra Goddard (1)
  • Alphonse Bertillon (1)
  • Altair 8800 (1)
  • Amazon (1)
  • American Awareness (2)
  • American Civil Liberties Union (1)
  • American Postal Workers Union (1)
  • American Psychological Association (1)
  • anonymous (3)
  • Anonymous (group) (1)
  • Anxiety (1)
  • Anytown (1)
  • Applied (1)
  • Arrest (1)
  • Art (1)
  • Arthur Conan Doyle (1)
  • Arts (2)
  • Assault (3)
  • Astigmatism (1)
  • Attempted murder (1)
  • August Vollmer (1)
  • Aurora (1)
  • Aurora Colorado (1)
  • Aurora Colorado (1)
  • Australia (1)
  • Baldwin (1)
  • Bandura (1)
  • Barack Obama (5)
  • Barry Scheck (2)
  • Barter (1)
  • Behavior (1)
  • Behavioral Analysis Unit (2)
  • Behavioral Science Unit (1)
  • Benghazi (3)
  • Bernie Fine (1)
  • Bert (2)
  • Bill Bass (1)
  • Black-and-white (1)
  • Black's Law Dictionary (1)
  • Blog Talk Radio (1)
  • Board of Education (1)
  • Bob (1)
  • Bob Menendez (1)
  • Bobo (1)
  • Bobo doll experiment (1)
  • Body Farm (1)
  • Bolingbrook (1)
  • Bolingbrook Illinois (1)
  • Broadcasting (1)
  • Bruce Willis (1)
  • BSU (1)
  • bullying (1)
  • Bureau of Justice Statistics (1)
  • Business (6)
  • California (5)
  • capital punishment (1)
  • Causality (1)
  • Cemeteries (1)
  • Cesare Beccaria (3)
  • Chabad (1)
  • Charles Wheatstone (1)
  • Chicago (1)
  • Chicago Police Department (1)
  • Chief of Police (1)
  • Child (2)
  • child abuse (6)
  • Child custody (1)
  • Child pornography (1)
  • Child Protective Services (3)
  • Child sex tourism (1)
  • Child Sexual Abuse (3)
  • child sexual assault (1)
  • Child support (1)
  • Children Youth and Family (3)
  • China (1)
  • ChristianMingle.com (1)
  • Christmas (1)
  • Chuck Jordan (1)
  • civil law (1)
  • Civil Rights Act of 1964 (1)
  • Clarence Darrow (1)
  • CNN (2)
  • Code of Conduct (1)
  • Collective bargaining (1)
  • College athletics (1)
  • Colorado. criminology amp justice (1)
  • Combined DNA Index System (1)
  • Comments (1)
  • Communication (1)
  • community based corrections (1)
  • Computer Aided Dispatch (1)
  • Computer crime (2)
  • Confidence trick (1)
  • Connecticut (3)
  • Constitution (1)
  • Contract (1)
  • correctional systems (1)
  • corrections (1)
  • Counties (1)
  • Court (1)
  • cover up (1)
  • CPS (1)
  • crime (49)
  • crime analysis (2)
  • Crime scene (7)
  • criminal investigation (1)
  • criminal justice (17)
  • Criminal law (3)
  • Criminal Minds (2)
  • Criminology (6)
  • Criminology Amp Justice (247)
  • Criminology and Justice Law Articles (1)
  • Criminology Apm Justice (1)
  • Criminology Videos (1)
  • Criminology: The Core (1)
  • Crimiology Amp Justice (50)
  • cyber bullying (1)
  • Cyber-bullying (1)
  • Cyberstalking (1)
  • Damages (1)
  • Dan Pabon (1)
  • Daniele Barbaro (1)
  • Dark Knight Rises (1)
  • Dave Reichert (1)
  • Davenport (1)
  • David Canter (2)
  • David Petraeus (4)
  • David Wiggins (1)
  • Deadbeat parent (1)
  • Death (1)
  • Death Care (1)
  • December 11 2012 (1)
  • Delaware State Police (1)
  • Delusion (1)
  • Democratic Party (1)
  • Dennis Rader (1)
  • Denver (2)
  • Department of Homeland Security (51)
  • Depression (1)
  • Depression and Unwanted Children (1)
  • Detective (5)
  • Deviance (sociology) (1)
  • DHS (1)
  • Digital audio (1)
  • Digital media (2)
  • District attorney (1)
  • Divorce (1)
  • Divorce demography (1)
  • DLSE (1)
  • DNA (3)
  • DNA profiling (3)
  • DNA sequencing (1)
  • Doctor Watson (1)
  • Domestic Violence (4)
  • Dominican Republic (1)
  • Donation (1)
  • Donna Reed (1)
  • DPPA (1)
  • Dr. Dre (1)
  • Dream (1)
  • Dream interpretation (1)
  • Drew Peterson (1)
  • Drink (1)
  • Driver's license (1)
  • East Coast of the United States (1)
  • Elizabeth Hall (24)
  • Ellen McCarthy (1)
  • Eller (1)
  • Emanuel (1)
  • Émile Durkheim (1)
  • Eminem (1)
  • Emotion (1)
  • Emotions and Crimes (1)
  • Enrico Ferri (1)
  • Ethical code (1)
  • Ethical dilemma (1)
  • Ethics (4)
  • Ethnic Succession Theory (1)
  • Evidence (1)
  • Experiment (1)
  • FAA (1)
  • Face (1)
  • facebook (1)
  • Fair Labor Standard Act (1)
  • Fairhope Alabama (1)
  • Family (2)
  • farmers (1)
  • Fawkes (1)
  • FBI (8)
  • Fear (1)
  • Federal Aviation Administration (1)
  • Federal Bureau of Investigation (26)
  • Federal Rules of Evidence (1)
  • FEMA (1)
  • Field Training Officer (1)
  • Fields (1)
  • Fifth Amendment (1)
  • Fifth Amendment to the United States Constitution (1)
  • Filename extension (1)
  • Film speed (1)
  • FindLaw (3)
  • Fine print (1)
  • Fingerprint (2)
  • Fire and Security (1)
  • Firefox (1)
  • Five Points Gang (1)
  • Flip Wilson (1)
  • Florida (1)
  • Florida Department of Law Enforcement (1)
  • football team (1)
  • Forensic anthropology (1)
  • forensic child abuse unvestigations (1)
  • Forensic photography (2)
  • Forensic science (6)
  • Form Data Polls and Surveys (1)
  • Formats (1)
  • Foster care (2)
  • Foster Parents (1)
  • Francis Galton (1)
  • Franciscan University of Steubenville (1)
  • Frank Serpico (1)
  • Franz Joseph Gall (1)
  • Fred Abdalla (1)
  • Friday (1)
  • Frisk (1)
  • Gambino crime family (1)
  • Gang (2)
  • Geographic information system (1)
  • George Bizos (1)
  • GIS (1)
  • GMO (1)
  • God (1)
  • Goddard (1)
  • Goodwill Games (1)
  • Google (2)
  • Google Video (1)
  • Google+ (1)
  • Gorrill (1)
  • government (1)
  • Graham Spanier (1)
  • Grand jury (1)
  • Greene (1)
  • Gus Hall (1)
  • Guy Fawkes (1)
  • Hackers (1)
  • Hans Gruber (1)
  • Harassment (1)
  • Hatch Act of 1939 (1)
  • Health (5)
  • Health savings account (1)
  • Hearsay (1)
  • Heroin (1)
  • Hickey (1)
  • Holmes (2)
  • Home (1)
  • Homeland Security (2)
  • homicide (3)
  • Hostage crisis (1)
  • Hosted Components and Services (1)
  • human trafficking (1)
  • Humphries (1)
  • Hurricane Sandy (1)
  • Illegal drug trade (2)
  • Indecent assault (1)
  • India (1)
  • Injury (1)
  • Innocence Project (1)
  • Insane Clown Posse (1)
  • Insurance (1)
  • International Association of Crime Analysts (1)
  • International Organization for Standardization (1)
  • Interpersonal relationship (2)
  • interview (1)
  • IRS tax forms (1)
  • Is forever Impossible (1)
  • Jack (1)
  • Jake Gyllenhaal (1)
  • James I of England (1)
  • Jane Hanlin (1)
  • Jansen (1)
  • Japan (1)
  • Jay Carney (1)
  • Jeff Smith (1)
  • Jefferson County (2)
  • Jeremy Bentham (2)
  • Jeremy Hammond (1)
  • Jerry Sandusky (2)
  • Joe Biden (3)
  • Joe Paterno (2)
  • Joey Ortega (3)
  • Johann Heinrich Schulze (1)
  • John (1)
  • John Davenport (1)
  • John Gotti (1)
  • John Herschel (1)
  • John Liebert (1)
  • John McClane (1)
  • Johnny Torrio (1)
  • Joseph Muscat (1)
  • Jovan Belcher (1)
  • JPEG (1)
  • Jury (2)
  • Jury selection (1)
  • Kansas City (1)
  • Kansas City Missouri (1)
  • Kaplan University (2)
  • Karl Marx (2)
  • Keene State College (1)
  • Kent (1)
  • Kentucky (1)
  • Kentucky Revised Statutes (1)
  • King James (1)
  • Knetzger (1)
  • La Mesa California (1)
  • labeling theory (1)
  • Labor Commissioner (1)
  • Lanza (1)
  • Latin Kings (1)
  • Law (32)
  • law enforcement (17)
  • Law enforcement agency (31)
  • Law enforcement officer (32)
  • Law Reform (1)
  • Lawrence Daly (1)
  • Lawrence W. Daly (43)
  • Lawrence W. Daly Forensic (3)
  • Lawrence W.Daly (1)
  • Lawsuit (4)
  • Lawyer (1)
  • Learning (1)
  • Legal burden of proof (1)
  • Legal Information (3)
  • Light (1)
  • LinkedIn (1)
  • Linux (1)
  • Lippman (1)
  • Lloyd Ohlin (2)
  • Long-term depression (1)
  • Louisiana (1)
  • Louisville Kentucky (1)
  • Lower Manhattan (1)
  • LulzSec (1)
  • Lupe Fiasco (1)
  • Mafia (1)
  • Make Me Rich (1)
  • Manhattan (1)
  • Mark Zuckerberg (1)
  • Market research (1)
  • Marlboro (1)
  • Marriage (1)
  • Martin Luther King (1)
  • Mass murder (1)
  • Massage (1)
  • Master of Science (13)
  • Math (1)
  • Medical Needs (1)
  • Medicare (1)
  • Medicare Part D coverage gap (1)
  • Menendez (1)
  • Mens Rea (1)
  • Mental disorder (4)
  • Mental health (6)
  • Mental Status Examination (1)
  • Merriam-Webster Dictionary (1)
  • Methodology (1)
  • Miami (1)
  • Michael Jackson (1)
  • Michael Jansen (1)
  • Michael Jordan (1)
  • Michael Pena (1)
  • Michael Peña (1)
  • Microsoft Excel (1)
  • Middle East (3)
  • Mike McQueary (1)
  • Mind Research Network (1)
  • Miranda (1)
  • Miranda warning (1)
  • mirandawarning (1)
  • Mirror neuron (2)
  • Mitt Romney (4)
  • Mobile phone (1)
  • Model Penal Code (1)
  • Modus operandi (2)
  • Monday (1)
  • Monsanto (1)
  • Montefiore Medical Center (1)
  • Morality (1)
  • Muhammad (1)
  • Muraski (2)
  • murder (6)
  • Muslim world (1)
  • MySpace (1)
  • National Collegiate Athletic Association (1)
  • National Conference of State Legislatures (1)
  • National Crime Information Center (5)
  • National Drug Intelligence Center (1)
  • National Flood Insurance Program (1)
  • National Football League (1)
  • National Gang Intelligence Center (1)
  • National Guard (1)
  • National Institute of Justice (4)
  • National Institute of Mental Health (1)
  • National Law Enforcement Officers Memorial (1)
  • National Museum of American History (1)
  • National Rifle Association (1)
  • NCAA (1)
  • New Jersey (2)
  • New York City (1)
  • New York City Police Department (1)
  • New York Law Journal (1)
  • New York Times (1)
  • Newtown (2)
  • Newtown Connecticut (1)
  • Newtown Connecticut (1)
  • NFAIS (1)
  • NFL (2)
  • Nidal Malik Hasan (2)
  • Nietzel (1)
  • Noncustodial parent (1)
  • Nonprofit organization (1)
  • Northern Virginia (1)
  • Obama (3)
  • Observational learning (2)
  • Ohio (3)
  • Ohio River (2)
  • Online Issues Polls (1)
  • Operating system (2)
  • Opioid dependence (1)
  • Organizations (2)
  • Organized crime (5)
  • Paranoia (1)
  • Paranormal (1)
  • Parent (2)
  • Pareto Principle (1)
  • Patient Protection and Affordable Care Act (1)
  • Paul Uhlenhuth (1)
  • Pedophilia (1)
  • Penn State (1)
  • Pennsylvania State University (1)
  • People (2)
  • Perkins (1)
  • pesticides (1)
  • Peter Mark Roget (1)
  • Peter Neufeld (1)
  • Peterson (1)
  • Petraeus (1)
  • Philosophy (2)
  • Photograph (2)
  • Photographer (1)
  • Photography (3)
  • Plaintiff (1)
  • police (19)
  • Police brutality (1)
  • Police car (1)
  • Police misconduct (2)
  • Police officer (7)
  • Political Rights (1)
  • Polls and Surveys (1)
  • Port of Seattle (1)
  • Posttraumatic stress disorder (2)
  • Pratt (1)
  • Pregnancy (1)
  • Preliminary hearing (1)
  • Prentice Hall (1)
  • prevention (2)
  • prison (3)
  • Prison officer (1)
  • Private investigator (1)
  • Pro se legal representation in the United States (1)
  • Products (1)
  • Professional sports (1)
  • Prosecutor (1)
  • psychology (2)
  • Punitive damages (1)
  • Puyallup Washington (7)
  • Racial Profiling (1)
  • Radford University (1)
  • Radio (2)
  • RadioShack (1)
  • Rahm Emanuel (1)
  • Rape (7)
  • Real estate investment trust (1)
  • Real evidence (2)
  • Reinforcement (2)
  • Relationships (1)
  • Relevance (law) (1)
  • Remington College (1)
  • Requesting Help (1)
  • research (7)
  • Research Ethics (1)
  • Richard Ramirez (1)
  • Robbery (3)
  • Robert Mueller (1)
  • Robinson (1)
  • Roger Goodell (1)
  • Romney (2)
  • Ronell Wilson (1)
  • Rookie Blue (1)
  • roundup (1)
  • Royal Commission (1)
  • Russ Stover (1)
  • Sabu (1)
  • Same-sex marriage (1)
  • San Antonio (1)
  • Sandusky (1)
  • Santa Fe New Mexico (1)
  • Saturday morning cartoon (1)
  • Savio (1)
  • schizophrenia (1)
  • Science in Society (2)
  • Scientific method (1)
  • Scott Hall (21)
  • Sculpture (1)
  • Sean Patrick Banks (1)
  • Seattle (2)
  • Second Amendment (2)
  • Second Amendment to the United States Constitution (1)
  • Secret Service (1)
  • security (1)
  • September 11 2001 (3)
  • September 11 attacks (1)
  • serial killer (4)
  • serial murder (1)
  • Sex and the law (1)
  • Sex offender (1)
  • Sex Offenses (1)
  • Sexual abuse (7)
  • Sexual Abuse and Assault (4)
  • Sexual assault (17)
  • Sexual slavery (1)
  • Sheriffs in the United States (1)
  • Sherlock Holmes (1)
  • Sherrill (1)
  • Shopping (1)
  • Shutter speed (1)
  • Siegel (5)
  • Sigmund Freud (1)
  • Skype (1)
  • Sleep (1)
  • Smartphone (1)
  • Smith (1)
  • Social Control Theory (2)
  • Social Learning Theory (1)
  • social media (1)
  • Social Media Network (1)
  • Social network (2)
  • Social networking service (1)
  • Social science (4)
  • Social Sciences (3)
  • Social work (2)
  • Soldier (1)
  • Sopranos (1)
  • Sound recording and reproduction (1)
  • South Bronx (1)
  • Soviet Union (1)
  • Spanish Army (1)
  • Spark Networks (1)
  • SPRUZ (1)
  • St. Louis (1)
  • Stacy (1)
  • Stanford University (1)
  • Statistical inference (1)
  • Statistics (1)
  • Steubenville (3)
  • Steubenville Ohio (1)
  • Steubenville High School (1)
  • Steubenville Ohio (5)
  • Steubenville Rape Case (1)
  • Strain Theory (1)
  • Stratfor (1)
  • Stress (2)
  • Strict liability (1)
  • Substance abuse (1)
  • Substance dependence (1)
  • suicide (1)
  • Support Groups (2)
  • Supreme Court (1)
  • Survey research (1)
  • Suspect (2)
  • SWAT (1)
  • Syria (1)
  • Tabetha Cooper (3)
  • Tammany Hall (1)
  • Tarrant County Courthouse (1)
  • Task force (1)
  • Techniques and Styles (1)
  • Techniques of neutralization (1)
  • technology (1)
  • Television (1)
  • Temporary Assistance for Needy Families (1)
  • Tennessee (1)
  • terrorism (1)
  • Terry stop (1)
  • Texas (1)
  • The Psychology of Marriage (1)
  • Therapy (1)
  • Thomson Correctional Center (1)
  • Thorsten Sellin (2)
  • Tip (gratuity) (1)
  • Tom Corbett (1)
  • Tort (2)
  • Trace evidence (2)
  • Training (1)
  • Triad (1)
  • Trigger point (1)
  • Truth Glasses (1)
  • Tulsa (1)
  • Tulsa Oklahoma (1)
  • Twitter (2)
  • Types of rape (2)
  • Tyrone Woods (2)
  • U.S. Department of Justice (1)
  • Uncle Bob (1)
  • Uncle Bob's Self Storage (1)
  • unhealthy foods (1)
  • Uniform Crime Report (3)
  • Unintended pregnancy (1)
  • United State (2)
  • United States (68)
  • United States Constitution (2)
  • United States Department of Homeland Security (1)
  • United States Department of Justice (3)
  • United States Department of State (1)
  • United States Senate Committee on Foreign Relations (1)
  • University of Oklahoma (1)
  • unsafe practices (1)
  • Upper Saddle River New Jersey (1)
  • US Department of Justice (1)
  • Vandalism (1)
  • Victimology (1)
  • victims (2)
  • Victor (1)
  • video (1)
  • Vincent Thomas Bridge (1)
  • Violence (2)
  • Violence and Abuse (6)
  • Violent Criminal Apprehension Program (1)
  • Virginia (2)
  • Voir dire (1)
  • Wage (1)
  • Washington (5)
  • Washington State Patrol (1)
  • Web Design and Development (1)
  • Webster (1)
  • well being (1)
  • West Virginia (1)
  • Western World (1)
  • White Hats (1)
  • White House (1)
  • William F. Miller (1)
  • William Herschel (1)
  • William J. Birnes (1)
  • William J. Bratton (2)
  • William Roy Wilson (1)
  • Wilson (1)
  • Windows (1)
  • Wisconsin Supreme Court (1)
  • Withdrawal (1)
  • Witness (1)
  • Women (1)
  • Woo Woo (1)
  • World Justice Project (1)
  • World Wide Web (1)
  • X-ray computed tomography (1)
  • Yakuza (1)
  • Yes (band) (1)
  • You Tube (1)

Blog Archive

  • ►  2013 (279)
    • ►  September (16)
    • ►  August (28)
    • ►  July (27)
    • ►  June (30)
    • ►  May (31)
    • ►  April (44)
    • ►  March (19)
    • ►  February (36)
    • ►  January (48)
  • ▼  2012 (221)
    • ►  December (47)
    • ►  November (46)
    • ►  October (50)
    • ▼  September (52)
      • Today’s Investigative Special Report – October 1, ...
      • Ten Best Juvenile Delinquency Movies
      • Police and How Far the Long Arm of Really Is- My V...
      • The Dynamics of a Liquidity Trap
      • Police Technology: A History, Past, Present, and F...
      • Getting Cheaper Car Insurance Rates
      • Today’s Investigative Special Report - September 2...
      • Finding an Auto Insurance Company - Insurance - Auto
      • A Look at Types of Analysis in Law Enforcement
      • Auto Owners Insurance Claims Michigan - Michigan A...
      • Theoretical Perspectives to Understand and Explain...
      • How TO Get Cheap Auto Insurance Quotes
      • Crime Analysis Essays: A Look at Crime Series- Arm...
      • Come and Socialize with Us!
      • Cheap Auto Insurance Quotes ? Finding The World-Cl...
      • Today’s Investigative Special Report - September 2...
      • Your Money - Finance Column - How to Find The Best...
      • Today’s Investigative Special Report - September 2...
      • How To Get Your Best Auto Insurance Plan? - Insura...
      • Ya know what, that makes me mad!—World Uproar and ...
      • Disputed Labor and Legal Rights
      • Today’s Investigative Special Report - September 2...
      • Tamil Shorthand (Development And Growth)
      • Mental Illness, The Insanity Plea, and Civil Commi...
      • Special Economic Zone: A Boon For Indian Economy
      • Today’s Investigative Special Report September 18,...
      • Money Saving Home Insurance Tips
      • Observational Learning: Defined Through Bandura’s ...
      • A Guide to Insurance for Classic Cars
      • Replacing the corporate like polity by revolutiona...
      • Today’s Investigative Special Report September 15,...
      • Modified car car family desire to change the stand...
      • Understanding Attempted Murder: The Story of Jack,...
      • Leading 3 Suggestions For Getting Multi Car Car In...
      • Today’s Investigative Special Report September 13,...
      • Compare Insurance Quotes For A Peaceful Tomorrow
      • Today’s Investigative Special Report September 12,...
      • Crime Scene Investigation: Television vs. Real Life
      • Life Insurance Advice - Is It Necessary
      • The Contribution of the Euro-dollar Market to the ...
      • Today’s Investigative Special Report September 10,...
      • Today’s Investigative Special Report September 9, ...
      • Today’s Investigative Special Report September 8, ...
      • News corporation compensaten $4.7 million for Brit...
      • Computers and Crime
      • A Colorado Security Guard Can Be An Asset Or Ruin ...
      • Special Economic Zone: A Boon For Indian Economy
      • Tort Law – Overview and Definition
      • Today’s Investigative Special Report September 3, ...
      • You Can’t Do That – Contracts, it pays to read the...
      • Criminology & Justice Digital Media Radio Broadcas...
      • Law and Society
    • ►  August (26)
Powered by Blogger.