CriminologyJustice

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Monday, October 8, 2012

Investigating Internet Crime: How Cases of Pedophilia and Related Criminal Activities are Intertwined and Investigated for Internet Crimes.

Posted on 9:00 PM by Unknown


by Elizabeth Hall
Image representing Windows as depicted in Crun...
Image via CrunchBase
Operating Systems DataUsed in Criminal Investigation of Pedophilia
In this case, the pedophile in question is a 48-year-old man, who used computers to find victims, usually those boys who had troubles at home or had problems (Deirmenjian, 2002).  The model of victim enticement used is the trust-based seductive model.  This is also the worst type of pedophile, as they are not satisfied with collecting child pornography or just chatting, they actually intend to go through with the meeting in person and being a supplier of child pornography.  When arrested, officers found and seized a total of five computers and videocassette recorders, along with many computer disks and almost three hundred video cassettes all with evidence of the crimes.  The operating systems of the computers is Microsoft Windows, and the data that is important to collect from this evidence is those files which contain pictures, chat, emails, and other evidence of crimes against children or pedophiliac behavior.  Even though this suspect believed that he deleted the file, the log file is still present in the system, and there are tools to detect this activity.  
Some of these tools are places that the investigator may know to look such as the recycle bin.  This is because some perpetrators do not know that files stay until you actually empty the trash.  Other times this data is hidden in the root systems of the computer where data is also collected pertaining to the operating system’s tasks.  Other tools can be purchased for use from a manufacturer or retailer such as MacLockPick 3.0 from Mac Forensics Lab (2010), which can manage a triage of operating systems that are both live and off.  Investigators have tools in their Forensics Lab Models, Social Agent, and Web Agent, which afford their investigator speedy recovery of files by a host of tools.  These tools, range from picking up skin tones present in files to explicit wording in text to expedite the dissemination of files in the operating system that pertain to the investigation (Mac Forensics Lab 2010).  

Credit Card Data: Source
Published by the American Psychiatric Associat...
Published by the American Psychiatric Association, the DSM-IV-TR provides a common language and standard criteria for the classification of mental disorders. (Photo credit: Wikipedia)
Another thing found with the suspect’s things were, credit card numbers with names and expiration dates in a journal on the suspect’s desk.  It is discovered that these are the methods, that he uses to pay for his internet services, private chat rooms, and pornography sites used to lure these victims.  Possibly, to keep him suspended when there are no live victims available, as well, since pedophilia is an actual mental disease listed in the Diagnostic and Statistical Manual of Mental Disorders IV.  These credit card numbers can be found on the internet for sale in some of the places on the internet such as Internet Relay Chat rooms or Yahoo Groups, and in Google platforms that cater to these types of people that sell credit card information and utilize or sell child pornography (Knetzger and Muraski, 2008).  
Email Tracking
E-mail tracking is also useful for investigating online crimes based on pedophilia. Usually when a pedophile has a victim that they are working on, as in the case of our suspect it is usually a certain type or age of victim.  They will gain the trust of the intended victim by exchanging emails and chats often, but not all criminals know that emails can be tracked.  Each email is equipped with a header and sub headers that trace the entire path of the email, disclosing the networks and source of the email even if it is bounced through programs designed to hide that from the immediate eyes (Knetzger and Muraski, 2008).  The full header contains the IP addresses and they can be traced to specific locations. Protocol for this is to conduct a lookup of the IP address and then obtain the individual user data associated with the account by subpoena (Knetzger and Muraski, 2008).  
Chat Investigation Protocol
When investigating online sexual predators, particularly those looking for victims that are minors, there are protocols that investigating officers should follow for best practices (Knetzger and Muraski, 2008).  This helps keep clear timelines of data that shows violations, instigation, protect the investigation from entrapment allegations, and they will show the personality of the offender when in these situations.  The steps to follow are pretty clear; first the officer will create an online persona that would appeal to these types of offenders, complete with emails, chat room id’s, and photos that would normally be found on a child’s account.  Next, they should make sure that all social media, emails, blogs tied to that persona are set up to auto log all correspondence in and out (Knetzger and Muraski, 2008). 
Once they have things set up the investigator should go to rooms in chat platforms, which they can find the preferred age of their victims and participate reactively to the chats going on in the room (Knetzger and Muraski, 2008).  The investigator should document any attempts to transmit any type of pornographic material, or invitations to meet in person.  Following these steps will ensure the integrity of the investigation should it become challenged in court.  These steps should be followed with all digital forms of media including emails, chats, and phone conversations, relating to our investigation (Knetzger and Muraski, 2008).
Online Intelligence Gathering
English: Screenshot of Chat Rooms in Paltalk Scene
English: Screenshot of Chat Rooms in Paltalk Scene (Photo credit: Wikipedia)
When gathering intelligence online there are elements that may make the search easier considering the amount if information on the internet (Knetzger and Muraski, 2008).  Investigators know that there are websites that cater to almost any fetish or need, and there are ways to search to make your results more specific to the search. Along with looking in IRC, Groups, or on Google blindly, one can narrow the search easily.  This is done by placing quotation marks around your specific search terms and separating them with “and”, “or”, or a like word accepted in Boolean terms. There is also open source data that may not be protected from searching such as Facebook and other social media, along with closed source data such as private groups that require passwords (Knetzger and Muraski, 2008).
Search Warrant Requirements/Exceptions/Procedures
Search Warrants usually require two parts the affidavit that supports the reasoning for the search warrant and lists the requesting officer’s qualifications and reasons for requesting the warrant (Knetzger and Muraski, 2008).  The affidavit also describes exactly what place and items that may be searched.  The other part is the warrant itself.  This must not just be an address alone, but must be descriptive to color, make, model etc.  Items to be seized must also be listed explaining the relation of the digital items to the criminal activity. Execution of warrant must be well considered, but can be served in person, by knock and announce, or no knock exceptions.  Another thing that is important is that a copy of the warrant must be left at the scene with the place to be searched or persons there that live there (Knetzger and Muraski, 2008).
Personal Computer Data Extraction and Preservation/ File Recovery Research
A little diagram of an IP address (IPv4)
A little diagram of an IP address (IPv4) (Photo credit: Wikipedia)
When coming across a personal computer or smart phone before unplugging the device or touching a part of the computer including the mouse or screen an investigator should clone the drive then work from the clone.  The original evidence must be preserved at all costs, so it should be cloned then packed up into safe evidence handling boxes and materials.  An investigator should never just unplug a computer from anywhere, but should disconnect the main power switch at the back of the tower alone. Files can be recovered from the root systems and pathways in the original operating systems along with any applications along the way.  

References:
Deirmenjian, J.M. MD, (2002).  Pedophilia on the Internet.  Journal of Forensic Scie
nce, Sept 2002.  Vol 47, № 5.  Retrieved From: http://www.hawaii.edu/hivandaids/Pedophilia_on_the_Internet.pdf
Knetzger, M. & Muraski, (2008).  Investigating High-Tech Crime.  New Jersey Prentice Hall, Pearson Education.  ISBN:  0-536-08577-3
Mac Forensics Lab, (2010).  Software.  Retrieved From: http://www.macforensicslab.com/ProductsAndServices/index.php?main_page=index&cPath=1


Related articles

  • Exploring Computer Operating Systems to Investigate Cyber Crime: File Systems
  • Computers and Crime
  • Cyber Stalking & Your Security
  • Email Phraud: An Illustrated Guide
  • Caucasian sex preditors
  • Today's Investigative Special Report - September 21, 2012 "Dealing With Today's Law Enforcement Specialized Investigations" "Have You Ever Evaluated Your Law Enforcement Agencies And Officers?
  • Crime Scene Investigation: Television vs. Real Life
  • Today's Investigative Special Report August 16, 2012 "Dealing With Today's Law Enforcement Specialized Investigations" "Does Law Enforcement Have A Plan For Investigating Sex Crimes?"
  • Homicide Investigation in the Twenty-First Century
  • Life, Death and Police Work - Part III
Enhanced by Zemanta
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in Child pornography, Computer crime, crime, Criminology Amp Justice, Elizabeth Hall, Knetzger, Muraski, Operating system, Pedophilia, Sex Offenses | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • Case Summary of Cases Involving Photographic Evidence: Relevant, Material, and More Probative than Inflammatory Photographic Evidence Cases
    Death penalty map (Photo credit: Wikipedia ) by Elizabeth Hall Introduction Ever since the photograph has been used as evidence rules have ...
  • Serial Murder: Difficulties within an Investigation
    by Tabetha Cooper Serial murder is a phenomenon that poses many problems for investigators.  With the multitude of factors that go into a se...
  • Today’s Investigative Special Report – December 11, 2012 “Dealing With Today’s Law Enforcement Specialized Investigations” “When the Facts and Evidence Are ‘Obvious’ Why Is It Then That Law Enforcement Can’t Find the Truth”
    By Lawrence W. Daly, MSc Forensic Expert – Senior Author You Be The Officer The smoking gun is sitting in the front room on top of the coff...
  • Tamil Shorthand (Development And Growth)
    TAMIL SHORTHAND (Development & Growth ) Author: G.S.Ananthanarayanan This article is a compilation of information available in the fie...
  • The Emergence of the Latin Kings in KY
    by Elizabeth Hall   Introduction English: An example of common Latin Kings' vandalism - showing a crude depiction of a five-pointed crow...
  • Mental Disorders – Paranoia, Symptoms and Potential Treatments
    Article by: Scott Hall       English: Robert Plutchik's Wheel of Emotions (Photo credit: Wikipedia )        Many citizens have experienc...
  • Investigation Into Serial Murder- Proactive and Reactive Approaches
    By Elizabeth Hall WANTAGH, NY - APRIL 15: An aerial view of police cars near where a body was discovered in the area near Gilgo Beach and O...
  • Violence
    by Tabetha Cooper A History of Violence (Photo credit: Wikipedia ) Violence is a continuing problem in the world.  This is evident every nig...
  • Police Technology: A History, Past, Present, and Future
    by Elizabeth Hall We have come a long way, since the Old West when law enforcement meant a local sheriff, with just a gun and a sheriff bad...
  • Analysis of Criminological Theory Relating to Organized Crime, John Gotti and Gang Organizations
    English: The Seal of the United States Federal Bureau of Investigation. For more information, see here. Español: El escudo del Buró Federal ...

Categories

  • $1 million (1)
  • 1964 Civil Rights Act (1)
  • Aaron Sorkin (1)
  • ABC News (2)
  • Abigail Adams (1)
  • Accessories (1)
  • ACLU (1)
  • Actus Reus (1)
  • Adam Lanza (1)
  • Addiction (1)
  • Afghanistan (1)
  • African American (2)
  • Air National Guard (1)
  • Al Qaeda (1)
  • Alabama (1)
  • Alan Rickman (1)
  • albert bandura (2)
  • Alexander Graham Bell (2)
  • Alexandra Goddard (1)
  • Alphonse Bertillon (1)
  • Altair 8800 (1)
  • Amazon (1)
  • American Awareness (2)
  • American Civil Liberties Union (1)
  • American Postal Workers Union (1)
  • American Psychological Association (1)
  • anonymous (3)
  • Anonymous (group) (1)
  • Anxiety (1)
  • Anytown (1)
  • Applied (1)
  • Arrest (1)
  • Art (1)
  • Arthur Conan Doyle (1)
  • Arts (2)
  • Assault (3)
  • Astigmatism (1)
  • Attempted murder (1)
  • August Vollmer (1)
  • Aurora (1)
  • Aurora Colorado (1)
  • Aurora Colorado (1)
  • Australia (1)
  • Baldwin (1)
  • Bandura (1)
  • Barack Obama (5)
  • Barry Scheck (2)
  • Barter (1)
  • Behavior (1)
  • Behavioral Analysis Unit (2)
  • Behavioral Science Unit (1)
  • Benghazi (3)
  • Bernie Fine (1)
  • Bert (2)
  • Bill Bass (1)
  • Black-and-white (1)
  • Black's Law Dictionary (1)
  • Blog Talk Radio (1)
  • Board of Education (1)
  • Bob (1)
  • Bob Menendez (1)
  • Bobo (1)
  • Bobo doll experiment (1)
  • Body Farm (1)
  • Bolingbrook (1)
  • Bolingbrook Illinois (1)
  • Broadcasting (1)
  • Bruce Willis (1)
  • BSU (1)
  • bullying (1)
  • Bureau of Justice Statistics (1)
  • Business (6)
  • California (5)
  • capital punishment (1)
  • Causality (1)
  • Cemeteries (1)
  • Cesare Beccaria (3)
  • Chabad (1)
  • Charles Wheatstone (1)
  • Chicago (1)
  • Chicago Police Department (1)
  • Chief of Police (1)
  • Child (2)
  • child abuse (6)
  • Child custody (1)
  • Child pornography (1)
  • Child Protective Services (3)
  • Child sex tourism (1)
  • Child Sexual Abuse (3)
  • child sexual assault (1)
  • Child support (1)
  • Children Youth and Family (3)
  • China (1)
  • ChristianMingle.com (1)
  • Christmas (1)
  • Chuck Jordan (1)
  • civil law (1)
  • Civil Rights Act of 1964 (1)
  • Clarence Darrow (1)
  • CNN (2)
  • Code of Conduct (1)
  • Collective bargaining (1)
  • College athletics (1)
  • Colorado. criminology amp justice (1)
  • Combined DNA Index System (1)
  • Comments (1)
  • Communication (1)
  • community based corrections (1)
  • Computer Aided Dispatch (1)
  • Computer crime (2)
  • Confidence trick (1)
  • Connecticut (3)
  • Constitution (1)
  • Contract (1)
  • correctional systems (1)
  • corrections (1)
  • Counties (1)
  • Court (1)
  • cover up (1)
  • CPS (1)
  • crime (49)
  • crime analysis (2)
  • Crime scene (7)
  • criminal investigation (1)
  • criminal justice (17)
  • Criminal law (3)
  • Criminal Minds (2)
  • Criminology (6)
  • Criminology Amp Justice (247)
  • Criminology and Justice Law Articles (1)
  • Criminology Apm Justice (1)
  • Criminology Videos (1)
  • Criminology: The Core (1)
  • Crimiology Amp Justice (50)
  • cyber bullying (1)
  • Cyber-bullying (1)
  • Cyberstalking (1)
  • Damages (1)
  • Dan Pabon (1)
  • Daniele Barbaro (1)
  • Dark Knight Rises (1)
  • Dave Reichert (1)
  • Davenport (1)
  • David Canter (2)
  • David Petraeus (4)
  • David Wiggins (1)
  • Deadbeat parent (1)
  • Death (1)
  • Death Care (1)
  • December 11 2012 (1)
  • Delaware State Police (1)
  • Delusion (1)
  • Democratic Party (1)
  • Dennis Rader (1)
  • Denver (2)
  • Department of Homeland Security (51)
  • Depression (1)
  • Depression and Unwanted Children (1)
  • Detective (5)
  • Deviance (sociology) (1)
  • DHS (1)
  • Digital audio (1)
  • Digital media (2)
  • District attorney (1)
  • Divorce (1)
  • Divorce demography (1)
  • DLSE (1)
  • DNA (3)
  • DNA profiling (3)
  • DNA sequencing (1)
  • Doctor Watson (1)
  • Domestic Violence (4)
  • Dominican Republic (1)
  • Donation (1)
  • Donna Reed (1)
  • DPPA (1)
  • Dr. Dre (1)
  • Dream (1)
  • Dream interpretation (1)
  • Drew Peterson (1)
  • Drink (1)
  • Driver's license (1)
  • East Coast of the United States (1)
  • Elizabeth Hall (24)
  • Ellen McCarthy (1)
  • Eller (1)
  • Emanuel (1)
  • Émile Durkheim (1)
  • Eminem (1)
  • Emotion (1)
  • Emotions and Crimes (1)
  • Enrico Ferri (1)
  • Ethical code (1)
  • Ethical dilemma (1)
  • Ethics (4)
  • Ethnic Succession Theory (1)
  • Evidence (1)
  • Experiment (1)
  • FAA (1)
  • Face (1)
  • facebook (1)
  • Fair Labor Standard Act (1)
  • Fairhope Alabama (1)
  • Family (2)
  • farmers (1)
  • Fawkes (1)
  • FBI (8)
  • Fear (1)
  • Federal Aviation Administration (1)
  • Federal Bureau of Investigation (26)
  • Federal Rules of Evidence (1)
  • FEMA (1)
  • Field Training Officer (1)
  • Fields (1)
  • Fifth Amendment (1)
  • Fifth Amendment to the United States Constitution (1)
  • Filename extension (1)
  • Film speed (1)
  • FindLaw (3)
  • Fine print (1)
  • Fingerprint (2)
  • Fire and Security (1)
  • Firefox (1)
  • Five Points Gang (1)
  • Flip Wilson (1)
  • Florida (1)
  • Florida Department of Law Enforcement (1)
  • football team (1)
  • Forensic anthropology (1)
  • forensic child abuse unvestigations (1)
  • Forensic photography (2)
  • Forensic science (6)
  • Form Data Polls and Surveys (1)
  • Formats (1)
  • Foster care (2)
  • Foster Parents (1)
  • Francis Galton (1)
  • Franciscan University of Steubenville (1)
  • Frank Serpico (1)
  • Franz Joseph Gall (1)
  • Fred Abdalla (1)
  • Friday (1)
  • Frisk (1)
  • Gambino crime family (1)
  • Gang (2)
  • Geographic information system (1)
  • George Bizos (1)
  • GIS (1)
  • GMO (1)
  • God (1)
  • Goddard (1)
  • Goodwill Games (1)
  • Google (2)
  • Google Video (1)
  • Google+ (1)
  • Gorrill (1)
  • government (1)
  • Graham Spanier (1)
  • Grand jury (1)
  • Greene (1)
  • Gus Hall (1)
  • Guy Fawkes (1)
  • Hackers (1)
  • Hans Gruber (1)
  • Harassment (1)
  • Hatch Act of 1939 (1)
  • Health (5)
  • Health savings account (1)
  • Hearsay (1)
  • Heroin (1)
  • Hickey (1)
  • Holmes (2)
  • Home (1)
  • Homeland Security (2)
  • homicide (3)
  • Hostage crisis (1)
  • Hosted Components and Services (1)
  • human trafficking (1)
  • Humphries (1)
  • Hurricane Sandy (1)
  • Illegal drug trade (2)
  • Indecent assault (1)
  • India (1)
  • Injury (1)
  • Innocence Project (1)
  • Insane Clown Posse (1)
  • Insurance (1)
  • International Association of Crime Analysts (1)
  • International Organization for Standardization (1)
  • Interpersonal relationship (2)
  • interview (1)
  • IRS tax forms (1)
  • Is forever Impossible (1)
  • Jack (1)
  • Jake Gyllenhaal (1)
  • James I of England (1)
  • Jane Hanlin (1)
  • Jansen (1)
  • Japan (1)
  • Jay Carney (1)
  • Jeff Smith (1)
  • Jefferson County (2)
  • Jeremy Bentham (2)
  • Jeremy Hammond (1)
  • Jerry Sandusky (2)
  • Joe Biden (3)
  • Joe Paterno (2)
  • Joey Ortega (3)
  • Johann Heinrich Schulze (1)
  • John (1)
  • John Davenport (1)
  • John Gotti (1)
  • John Herschel (1)
  • John Liebert (1)
  • John McClane (1)
  • Johnny Torrio (1)
  • Joseph Muscat (1)
  • Jovan Belcher (1)
  • JPEG (1)
  • Jury (2)
  • Jury selection (1)
  • Kansas City (1)
  • Kansas City Missouri (1)
  • Kaplan University (2)
  • Karl Marx (2)
  • Keene State College (1)
  • Kent (1)
  • Kentucky (1)
  • Kentucky Revised Statutes (1)
  • King James (1)
  • Knetzger (1)
  • La Mesa California (1)
  • labeling theory (1)
  • Labor Commissioner (1)
  • Lanza (1)
  • Latin Kings (1)
  • Law (32)
  • law enforcement (17)
  • Law enforcement agency (31)
  • Law enforcement officer (32)
  • Law Reform (1)
  • Lawrence Daly (1)
  • Lawrence W. Daly (43)
  • Lawrence W. Daly Forensic (3)
  • Lawrence W.Daly (1)
  • Lawsuit (4)
  • Lawyer (1)
  • Learning (1)
  • Legal burden of proof (1)
  • Legal Information (3)
  • Light (1)
  • LinkedIn (1)
  • Linux (1)
  • Lippman (1)
  • Lloyd Ohlin (2)
  • Long-term depression (1)
  • Louisiana (1)
  • Louisville Kentucky (1)
  • Lower Manhattan (1)
  • LulzSec (1)
  • Lupe Fiasco (1)
  • Mafia (1)
  • Make Me Rich (1)
  • Manhattan (1)
  • Mark Zuckerberg (1)
  • Market research (1)
  • Marlboro (1)
  • Marriage (1)
  • Martin Luther King (1)
  • Mass murder (1)
  • Massage (1)
  • Master of Science (13)
  • Math (1)
  • Medical Needs (1)
  • Medicare (1)
  • Medicare Part D coverage gap (1)
  • Menendez (1)
  • Mens Rea (1)
  • Mental disorder (4)
  • Mental health (6)
  • Mental Status Examination (1)
  • Merriam-Webster Dictionary (1)
  • Methodology (1)
  • Miami (1)
  • Michael Jackson (1)
  • Michael Jansen (1)
  • Michael Jordan (1)
  • Michael Pena (1)
  • Michael Peña (1)
  • Microsoft Excel (1)
  • Middle East (3)
  • Mike McQueary (1)
  • Mind Research Network (1)
  • Miranda (1)
  • Miranda warning (1)
  • mirandawarning (1)
  • Mirror neuron (2)
  • Mitt Romney (4)
  • Mobile phone (1)
  • Model Penal Code (1)
  • Modus operandi (2)
  • Monday (1)
  • Monsanto (1)
  • Montefiore Medical Center (1)
  • Morality (1)
  • Muhammad (1)
  • Muraski (2)
  • murder (6)
  • Muslim world (1)
  • MySpace (1)
  • National Collegiate Athletic Association (1)
  • National Conference of State Legislatures (1)
  • National Crime Information Center (5)
  • National Drug Intelligence Center (1)
  • National Flood Insurance Program (1)
  • National Football League (1)
  • National Gang Intelligence Center (1)
  • National Guard (1)
  • National Institute of Justice (4)
  • National Institute of Mental Health (1)
  • National Law Enforcement Officers Memorial (1)
  • National Museum of American History (1)
  • National Rifle Association (1)
  • NCAA (1)
  • New Jersey (2)
  • New York City (1)
  • New York City Police Department (1)
  • New York Law Journal (1)
  • New York Times (1)
  • Newtown (2)
  • Newtown Connecticut (1)
  • Newtown Connecticut (1)
  • NFAIS (1)
  • NFL (2)
  • Nidal Malik Hasan (2)
  • Nietzel (1)
  • Noncustodial parent (1)
  • Nonprofit organization (1)
  • Northern Virginia (1)
  • Obama (3)
  • Observational learning (2)
  • Ohio (3)
  • Ohio River (2)
  • Online Issues Polls (1)
  • Operating system (2)
  • Opioid dependence (1)
  • Organizations (2)
  • Organized crime (5)
  • Paranoia (1)
  • Paranormal (1)
  • Parent (2)
  • Pareto Principle (1)
  • Patient Protection and Affordable Care Act (1)
  • Paul Uhlenhuth (1)
  • Pedophilia (1)
  • Penn State (1)
  • Pennsylvania State University (1)
  • People (2)
  • Perkins (1)
  • pesticides (1)
  • Peter Mark Roget (1)
  • Peter Neufeld (1)
  • Peterson (1)
  • Petraeus (1)
  • Philosophy (2)
  • Photograph (2)
  • Photographer (1)
  • Photography (3)
  • Plaintiff (1)
  • police (19)
  • Police brutality (1)
  • Police car (1)
  • Police misconduct (2)
  • Police officer (7)
  • Political Rights (1)
  • Polls and Surveys (1)
  • Port of Seattle (1)
  • Posttraumatic stress disorder (2)
  • Pratt (1)
  • Pregnancy (1)
  • Preliminary hearing (1)
  • Prentice Hall (1)
  • prevention (2)
  • prison (3)
  • Prison officer (1)
  • Private investigator (1)
  • Pro se legal representation in the United States (1)
  • Products (1)
  • Professional sports (1)
  • Prosecutor (1)
  • psychology (2)
  • Punitive damages (1)
  • Puyallup Washington (7)
  • Racial Profiling (1)
  • Radford University (1)
  • Radio (2)
  • RadioShack (1)
  • Rahm Emanuel (1)
  • Rape (7)
  • Real estate investment trust (1)
  • Real evidence (2)
  • Reinforcement (2)
  • Relationships (1)
  • Relevance (law) (1)
  • Remington College (1)
  • Requesting Help (1)
  • research (7)
  • Research Ethics (1)
  • Richard Ramirez (1)
  • Robbery (3)
  • Robert Mueller (1)
  • Robinson (1)
  • Roger Goodell (1)
  • Romney (2)
  • Ronell Wilson (1)
  • Rookie Blue (1)
  • roundup (1)
  • Royal Commission (1)
  • Russ Stover (1)
  • Sabu (1)
  • Same-sex marriage (1)
  • San Antonio (1)
  • Sandusky (1)
  • Santa Fe New Mexico (1)
  • Saturday morning cartoon (1)
  • Savio (1)
  • schizophrenia (1)
  • Science in Society (2)
  • Scientific method (1)
  • Scott Hall (21)
  • Sculpture (1)
  • Sean Patrick Banks (1)
  • Seattle (2)
  • Second Amendment (2)
  • Second Amendment to the United States Constitution (1)
  • Secret Service (1)
  • security (1)
  • September 11 2001 (3)
  • September 11 attacks (1)
  • serial killer (4)
  • serial murder (1)
  • Sex and the law (1)
  • Sex offender (1)
  • Sex Offenses (1)
  • Sexual abuse (7)
  • Sexual Abuse and Assault (4)
  • Sexual assault (17)
  • Sexual slavery (1)
  • Sheriffs in the United States (1)
  • Sherlock Holmes (1)
  • Sherrill (1)
  • Shopping (1)
  • Shutter speed (1)
  • Siegel (5)
  • Sigmund Freud (1)
  • Skype (1)
  • Sleep (1)
  • Smartphone (1)
  • Smith (1)
  • Social Control Theory (2)
  • Social Learning Theory (1)
  • social media (1)
  • Social Media Network (1)
  • Social network (2)
  • Social networking service (1)
  • Social science (4)
  • Social Sciences (3)
  • Social work (2)
  • Soldier (1)
  • Sopranos (1)
  • Sound recording and reproduction (1)
  • South Bronx (1)
  • Soviet Union (1)
  • Spanish Army (1)
  • Spark Networks (1)
  • SPRUZ (1)
  • St. Louis (1)
  • Stacy (1)
  • Stanford University (1)
  • Statistical inference (1)
  • Statistics (1)
  • Steubenville (3)
  • Steubenville Ohio (1)
  • Steubenville High School (1)
  • Steubenville Ohio (5)
  • Steubenville Rape Case (1)
  • Strain Theory (1)
  • Stratfor (1)
  • Stress (2)
  • Strict liability (1)
  • Substance abuse (1)
  • Substance dependence (1)
  • suicide (1)
  • Support Groups (2)
  • Supreme Court (1)
  • Survey research (1)
  • Suspect (2)
  • SWAT (1)
  • Syria (1)
  • Tabetha Cooper (3)
  • Tammany Hall (1)
  • Tarrant County Courthouse (1)
  • Task force (1)
  • Techniques and Styles (1)
  • Techniques of neutralization (1)
  • technology (1)
  • Television (1)
  • Temporary Assistance for Needy Families (1)
  • Tennessee (1)
  • terrorism (1)
  • Terry stop (1)
  • Texas (1)
  • The Psychology of Marriage (1)
  • Therapy (1)
  • Thomson Correctional Center (1)
  • Thorsten Sellin (2)
  • Tip (gratuity) (1)
  • Tom Corbett (1)
  • Tort (2)
  • Trace evidence (2)
  • Training (1)
  • Triad (1)
  • Trigger point (1)
  • Truth Glasses (1)
  • Tulsa (1)
  • Tulsa Oklahoma (1)
  • Twitter (2)
  • Types of rape (2)
  • Tyrone Woods (2)
  • U.S. Department of Justice (1)
  • Uncle Bob (1)
  • Uncle Bob's Self Storage (1)
  • unhealthy foods (1)
  • Uniform Crime Report (3)
  • Unintended pregnancy (1)
  • United State (2)
  • United States (68)
  • United States Constitution (2)
  • United States Department of Homeland Security (1)
  • United States Department of Justice (3)
  • United States Department of State (1)
  • United States Senate Committee on Foreign Relations (1)
  • University of Oklahoma (1)
  • unsafe practices (1)
  • Upper Saddle River New Jersey (1)
  • US Department of Justice (1)
  • Vandalism (1)
  • Victimology (1)
  • victims (2)
  • Victor (1)
  • video (1)
  • Vincent Thomas Bridge (1)
  • Violence (2)
  • Violence and Abuse (6)
  • Violent Criminal Apprehension Program (1)
  • Virginia (2)
  • Voir dire (1)
  • Wage (1)
  • Washington (5)
  • Washington State Patrol (1)
  • Web Design and Development (1)
  • Webster (1)
  • well being (1)
  • West Virginia (1)
  • Western World (1)
  • White Hats (1)
  • White House (1)
  • William F. Miller (1)
  • William Herschel (1)
  • William J. Birnes (1)
  • William J. Bratton (2)
  • William Roy Wilson (1)
  • Wilson (1)
  • Windows (1)
  • Wisconsin Supreme Court (1)
  • Withdrawal (1)
  • Witness (1)
  • Women (1)
  • Woo Woo (1)
  • World Justice Project (1)
  • World Wide Web (1)
  • X-ray computed tomography (1)
  • Yakuza (1)
  • Yes (band) (1)
  • You Tube (1)

Blog Archive

  • ►  2013 (279)
    • ►  September (16)
    • ►  August (28)
    • ►  July (27)
    • ►  June (30)
    • ►  May (31)
    • ►  April (44)
    • ►  March (19)
    • ►  February (36)
    • ►  January (48)
  • ▼  2012 (221)
    • ►  December (47)
    • ►  November (46)
    • ▼  October (50)
      • How To Get Your Best Auto Insurance Plan? - Insura...
      • Today’s Investigative Special Report – October 30,...
      • Hurricane Sandy Relief Fund
      • USA Auto Insurance Free Interrelated Resource - Autos
      • Getting Cheaper Car Insurance Rates
      • Today’s Investigative Special Report – October 29,...
      • Auto Insurance Ratings - Insurance - Auto
      • A Review Of Auto Insurance America - Insurance - Auto
      • The Rights of the Accused: A Case Study of John Doe
      • God's Country (Part 1)
      • Today’s Investigative Special Report – October 26,...
      • Today’s Investigative Special Report – October 25,...
      • Today’s Investigative Special Report – October 24,...
      • How To Get Your Best Auto Insurance Plan? - Insura...
      • Depression and Unwanted Children
      • Agent Vs. Broker ? Who do You Buy Health Insurance...
      • Today’s Investigative Special Report – October 22,...
      • Agent Vs. Broker ? Who do You Buy Health Insurance...
      • Dummy?s Guide to Health Insurance
      • Emotions and Crimes
      • Health Insurance Made Simple
      • Today’s Investigative Special Report – October 19,...
      • Health Insurance by Life And General Insurance Cos
      • Roles Psychologists Play in the Justice System
      • Basics of a Health Insurance Policy
      • Criminological Theory and Implications on Public P...
      • Should you Shop for Health Insurance if You are Se...
      • Today’s Investigative Special Report – October 15,...
      • Health Insurance:
      • Ethical Issues in Police Departments
      • Which to Select Whenever You Buy Life Insurance Co...
      • Common Mistakes to Avoid When Shopping For Term Li...
      • Benefits of Cheap Life Insurance For Young Couples
      • Today’s Investigative Special Report – October 12,...
      • What Type? Permanent or Term Life Insurance?
      • The Civil Rights Act of 1964: Modern Society, the ...
      • Choosing A Cheap Life Cover Made Simple
      • Straight From the FBI- Most Wanted Terrorist List-...
      • Not Willing To Go For Higher Premiums? Go For The ...
      • Investigating Internet Crime: How Cases of Pedophi...
      • The Role and Creation of the Department of Homelan...
      • The Meaning Of Term Life Insurance Simplified For ...
      • Group Life Insurance - Is It Worth It
      • Cheap Insurance Secrets
      • Today’s Investigative Special Report – October 5, ...
      • Cheap Auto Insurance Quotes ? Finding The World-Cl...
      • Cheap Car Insurance - 7 Tips To Reduce Your Car In...
      • Today’s Investigative Special Report – October 3, ...
      • Finding Cheap Car Insurance Made Easy - Insurance
      • Kate of Green Gables: Duchess of Cambridge's Joy a...
    • ►  September (52)
    • ►  August (26)
Powered by Blogger.