CriminologyJustice

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Friday, November 30, 2012

Combating Crime to Cyber Space and Beyond

Posted on 9:00 PM by Unknown

Article by: Scott Hall docplocky@gmail.com
  
English: A 3-D solid model of a jack inside a ...
English: A 3-D solid model of a jack inside a cube. Modeled and ray traced using Cobalt. Animation is 120 frames at 25 fps. (Photo credit: Wikipedia)
          Technology advances over the past few decades have exploded into a world where wireless communications and interactions are becoming more and more dominant in everyday life, sans a few regions that have not yet accepted or even adapted to simple “pulse” dialing.  Unless you are an avid fan or a historian, few will remember the Altair computer, the Commodore or even what 386 means, however it does not stop us from interacting with more modern evolutions of these items and it also opens a whole new door to criminals who are savvy of the tools available “online” to corrupt even the smallest of regions.  This presents an opportunity as well as disadvantages to both the criminologist and the criminal, specifically in that even the criminal’s best security or hopes online can be “hacked”, same as lawful citizens, just ask President Barak Obama about his own invasions in cell phone land.  Tools in the proper hands can do wonders and in the world of forensics, digital tools and new abilities give a new approach to solving crime.


            One item that is not reported through the major media outlets in solving crime is facial reconstruction and until a few years ago, that meant tedious hours of precision and pegs as well as clay molds and various other mediums to reconstruct an unknown victim’s facial feature in order to verify or attempt to identify the person in question.  In death, we know that our body goes through a decomposition and decay process that over time will eventually erode away muscle, skin and organs leaving only a skeleton.  Forensic anthropologists along with sculptors, creative artistry and time work in cohesion to recreate the human that once roamed the planet, as a starter the sculptor will usually start with 25 to 30 layers of tissue that will eventually become situated around the eyes and select facial areas. 

    
3D polygonal modeling of a human face.
3D polygonal modeling of a human face. (Photo credit: Wikipedia)
        Next, the team has to determine approximate age, race, weight and various other factors to determine which set of depth pegs to use, covering the rest of the face and skull regions.  Layering clay to those depths around the set pegs and filling in the remaining gaps with the other clay strips helps to place texture and depth to the once devoid skeleton, keeping in mind that this process is not done in a few mins rather over a period of hours, just to get to the point of 3D viewing of the victim no one can identify otherwise.  Once those items are done, the sculptor / artists must then go to work on the eyes, jaw, mouth, nose, ears, chin and cheek areas as these are generally considered the parts that give “character” to each of us, fun fact:  The eye ballsgenerally do not change in size from birth to death so keep those peepers healthy.  While this process is tedious, there is some math and known’s involved when it comes to certain items of the face, for example the ears length is considered the same as the nose length and width is determined by a measurement of distances between iris, corner of the eye and mouth regions along with a few adjustments in math, these items can easily be “fitted” based on the available 3D model that was layered initially.

            Using our imaginations and a bit of critical thinking skills we can see a rough image of a person, with approximate features, lacking two final items:  Muscle and skin, again the sculptor and forensic anthropologist must combine their skills and approximate how much, how fat or thin and apply layers of skin, as well as making a silicon rubber mold of the initial sculpture.  The elements that no one can really pinpoint are hair style, color and expressional characteristics of the face and in essence only hope to be able to awaken a memory or hope to shake someone’s memory into locating or narrowing down the list of potential victims.  This overview does not account for the detail, time, materials, persons or man hours involved in recreating someone from death to 3D modeling clay nor does it speak for the dedication of those involved in helping to solve these unknown’s.  What has been needed for many years is a new approach:  Enter the computer, a machine often thought of as something to get on the internet with, but rarely remembered for its computational ability and power of deduction based on parameters entered.  

          
Eye death
Eye death (Photo credit: @Doug88888)
  While using facial reconstruction does require some skills, in the world of computers lots of things change including limiting how much stress is placed upon the skull itself, starting with an 3D X-ray of the skull using a complex series of lasers and mirrors, while the skull rotates on a platform.  The image is then transferred to a computer where special software allows the user to move and interact with the image.  Applying the actual muscle and skin now becomes part of a database based on CT (Computerized Tomography) scans of other persons and known parameters, including shadows that may occur from muscle layering and skin as well as eliminating the Depth Peg and clay layering that once took hours to do.   The Forensic Anthropologistsskills is essential in this area; for example items such as clothing or other items found on the scene as well as any other forensic evidence will help in determining shape, size, weight and race and the Forensic Anthropologist is an expert in determining these values.

     
3D Model Woman
3D Model Woman (Photo credit: ProLithic 3D)
       By merging the scans of the unknown and the known, along with the same parameters that are predetermined (same as above) the computer reconstructs as closely as possible the same image obtained by the once artist / sculptor and Forensic Team in a matter of a few hours rather than days of work and with the use of lasers and complicated machinery can reconstruct the new image from medium safely, minus color and the same parameters of expression and certain characteristics.  As we can see, the differences in approach between traditional and modern application do not differ in their basis: to solve the unknown victim’s identity the difference is the computational power and application of modern technology and computers being used for something other than internet surfing or role playing games not to mention the total anonyminity that the internet offers its patrons, both paying subscribers and free users. 

            Exploration into Digital Forensic Anthropology is only one of the many facets of our digital evolution and persons who commit crimes against person, property and public are also included in the total use of digital tools.  Person’s who would otherwise have used paper, phone calls and leg work to scam someone now has the ability to email in masses and the percentage of susceptible persons also exponentially increases, thus building an incredible base of victims that unless the perpetrator can be traced or tracked properly, likely will never be found.  The subject of internet “honesty” has long been a topic of debate, including a set of rules or “netiquette” that most are supposed to obey voluntarily, with no real consequence of default, unless the correct set of authorities are applied and even at that point, a simple name change and you are in a new email account.  Pictures, information and a lucrative imagination can produce the fake person with a few clicks who can be your friend, your lover, your confidant and you really never have to physically interact with them, relying on the trust of the platform you are using, known as the internet to guide you, including statements such as “it has to be true, it was on the internet”, never mind the countless applications, programs and widgets that can change the most simplest of items into something other than its original intent.
English: A Tableu internal forensic write-prot...
English: A Tableu internal forensic write-protection module (Photo credit: Wikipedia)

            Enter the criminal mind, the scenario:  I need a phone that can become a mobile hot spot, so I can surf and phish and deceive the public or otherwise conduct fraudulent business.  The process: Go to carrier store such as one for Sprint, AT&T, Verizon and T-Mobile (along with a few miscellaneous others), and sign up for a new activation 2 year contract.  Once that company conducts a credit check, you will either be assessed a deposit amount or an initial fee to cover in order to obtain the agreement.  Writing a cold check as a secure payment, the transaction is processed; you select your phone and are told the first invoice will appear in 30 days.  You activate your phone, walk out of the store, with no intentions of paying your bill, you have a brand new phone in your hand, the ability to mobile hack almost anyone who uses Bluetooth or a mobile Wi-Fi spot, steal their information or set up a few phishing scams, when the service is cut off, you go to pawn shop (usually remote) and sell the phone for some quick cash or sell it overseas for an exorbitant amount.  The Crime: Fraud, Theft by Unlawful Taking, Theft by Deception, Attempting to Defraud a Business or Government Entity and a host of other charges that are never followed upon due to the excessive mobility gained in just 30 short days, the reason: Exceptionally difficult to locate a moving object or person, without help.  Keep in mind, the geeks teach us all we know, true and they also teach those with sinister intentions, involuntarily. 
English: Backdrop image used in 3D modeling It...
English: Backdrop image used in 3D modeling Italiano: Immagine di sfondo utilizzata in modellazione 3D (Photo credit: Wikipedia)

            Platforms such as You Tube, Face Book, Twitter and Linked In, give the public a chance to view almost anything, including videos of violence, compassion, crime, music and “educational” resources, educational in quotations as whether or not the legitimacy of what you are watching is indeed the truth and not edited (video toasted) or altered in some way to make what you see seem real, criminals use this lack of awareness to obtain your trust, then violate your privacy or personal freedoms including sniffing out when you use credit cards or other financial transactions that help to steal your worth and your identity.  Nothing on the internet is truly ever deleted, this is no secret as the FBI stores thousands of items that contain transmitted key words or phrases, pictures or video for review at anytime, as well as intercepting suspects with items such as “StingRay” technology and video camera systems that can “see” through walls, nothing in technology is impossible.  Law enforcement is well aware of every plausible scenario available and discovers new approaches to combating and learning of the evolution of technology in fighting crime, including the UCR which has become more and more accurate as new data comes in from officials who once did not have a simple computer to help. 

            Cell phone technology has evolved into a platform where phones get smaller, then bigger screens, then thinner, then more powerful, then smaller over a repeated process of time; Digital Forensics in this field includes data mining which could reveal a time line history or pattern of established crime that assists law enforcement in apprehending perpetrators of those types of crimes.  To date, there are as many as 40 cellular providers and millions of customers in their combined data bases, law enforcement without the use of computers and other electronic media would no doubt be overwhelmed by the information superhighway.  With the aid of the evolving technology and the right experts focusing on the key task, law enforcement can access any portion of your computer or digital life, including passwords, images, disk encryptions, secured or privately marked file folders, hidden files as well as access these items remotely without your knowledge and without your permission, but with the permission of the judicial system, citing again our example of the President’s own woes, who was angered by having his own “secure” cell phone, opened by a trained person in that field.  Was it criminal to spy, probably, considering the Patriot Act gives Officials eminent power, it becomes almost nerve wracking when the sinister do the same thing, without a whim or much effort. 
3D Model Man
3D Model Man (Photo credit: ProLithic 3D)

            In conclusion, our Digital Worlds can only be as safe and effective as we the people allow them to be, including adding some honesty to our own profiles and keeping our eyes open for active sites about the do-do bird, (yes one does exist and if you have to ponder it, might want to leave that site alone, the bird is extinct).  Law enforcement and Criminals battle continually for supremacy in dominating the digital highway, citizens in general are also susceptible to the woes of internet secrecy; including being exposed for pictures, emails, accounts, information that otherwise would have been private.   We the people have more power to secure our personal lives when we use critical thinking skills in positive ways, including finding the lost, the criminal who went into hiding and that perfect table or bed ensemble.  Be wise, be weary and be safe, most of all thank the technology makers for allowing law enforcement to have tools available to keep our lives safe and free from some crimes, the rest is up to us.

http://library.thinkquest.org/04oct/00206/pti_facial_reconstruction.htm
http://www.fbi.gov/about-us/cjis/ucr/ucr
http://nij.gov/topics/forensics/evidence/digital/welcome.htm
http://www.fbi.gov/news/stories/story-index/cyber-crimes
http://www.ic3.gov/media/annualreport/2011_IC3Report.pdf
http://www.scmagazine.com/limitations-of-law-enforcement-in-fighting-cyber-crime/article/250805/
http://www.dhs.gov/defending-against-cybercriminals

            

Related articles

  • KBI Crime Scene Investigators Practice Unearthing Graves
  • Artist 3D prints replica of his own skull
  • Redefining the art of self-portraits with a CT scanner and 3D printer
  • Forensics Put a Face to a Stone Age Boy's Remains
  • Crime Bake Medical Examiner and Forensic discussion by Marian Lanouette
  • Faces of Drowned Civil War Sailors From USS Monitor Reconstructed
  • Forensics Put a Face to a Stone Age Boy's Remains
  • Getting Scorched With NYT Best Selling Author Laura Griffin!
  • Dutch artist 3D prints CT scan of his own skeleton
  • Augusta 'mummy' case awaits Tennessee lab inquiry
Enhanced by Zemanta
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in crime, Criminology Amp Justice, Department of Homeland Security, Face, Forensic anthropology, Forensic science, Science in Society, Scott Hall, Sculpture, X-ray computed tomography | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • Case Summary of Cases Involving Photographic Evidence: Relevant, Material, and More Probative than Inflammatory Photographic Evidence Cases
    Death penalty map (Photo credit: Wikipedia ) by Elizabeth Hall Introduction Ever since the photograph has been used as evidence rules have ...
  • Serial Murder: Difficulties within an Investigation
    by Tabetha Cooper Serial murder is a phenomenon that poses many problems for investigators.  With the multitude of factors that go into a se...
  • Today’s Investigative Special Report – December 11, 2012 “Dealing With Today’s Law Enforcement Specialized Investigations” “When the Facts and Evidence Are ‘Obvious’ Why Is It Then That Law Enforcement Can’t Find the Truth”
    By Lawrence W. Daly, MSc Forensic Expert – Senior Author You Be The Officer The smoking gun is sitting in the front room on top of the coff...
  • Tamil Shorthand (Development And Growth)
    TAMIL SHORTHAND (Development & Growth ) Author: G.S.Ananthanarayanan This article is a compilation of information available in the fie...
  • The Emergence of the Latin Kings in KY
    by Elizabeth Hall   Introduction English: An example of common Latin Kings' vandalism - showing a crude depiction of a five-pointed crow...
  • Mental Disorders – Paranoia, Symptoms and Potential Treatments
    Article by: Scott Hall       English: Robert Plutchik's Wheel of Emotions (Photo credit: Wikipedia )        Many citizens have experienc...
  • Investigation Into Serial Murder- Proactive and Reactive Approaches
    By Elizabeth Hall WANTAGH, NY - APRIL 15: An aerial view of police cars near where a body was discovered in the area near Gilgo Beach and O...
  • Violence
    by Tabetha Cooper A History of Violence (Photo credit: Wikipedia ) Violence is a continuing problem in the world.  This is evident every nig...
  • Police Technology: A History, Past, Present, and Future
    by Elizabeth Hall We have come a long way, since the Old West when law enforcement meant a local sheriff, with just a gun and a sheriff bad...
  • Analysis of Criminological Theory Relating to Organized Crime, John Gotti and Gang Organizations
    English: The Seal of the United States Federal Bureau of Investigation. For more information, see here. Español: El escudo del Buró Federal ...

Categories

  • $1 million (1)
  • 1964 Civil Rights Act (1)
  • Aaron Sorkin (1)
  • ABC News (2)
  • Abigail Adams (1)
  • Accessories (1)
  • ACLU (1)
  • Actus Reus (1)
  • Adam Lanza (1)
  • Addiction (1)
  • Afghanistan (1)
  • African American (2)
  • Air National Guard (1)
  • Al Qaeda (1)
  • Alabama (1)
  • Alan Rickman (1)
  • albert bandura (2)
  • Alexander Graham Bell (2)
  • Alexandra Goddard (1)
  • Alphonse Bertillon (1)
  • Altair 8800 (1)
  • Amazon (1)
  • American Awareness (2)
  • American Civil Liberties Union (1)
  • American Postal Workers Union (1)
  • American Psychological Association (1)
  • anonymous (3)
  • Anonymous (group) (1)
  • Anxiety (1)
  • Anytown (1)
  • Applied (1)
  • Arrest (1)
  • Art (1)
  • Arthur Conan Doyle (1)
  • Arts (2)
  • Assault (3)
  • Astigmatism (1)
  • Attempted murder (1)
  • August Vollmer (1)
  • Aurora (1)
  • Aurora Colorado (1)
  • Aurora Colorado (1)
  • Australia (1)
  • Baldwin (1)
  • Bandura (1)
  • Barack Obama (5)
  • Barry Scheck (2)
  • Barter (1)
  • Behavior (1)
  • Behavioral Analysis Unit (2)
  • Behavioral Science Unit (1)
  • Benghazi (3)
  • Bernie Fine (1)
  • Bert (2)
  • Bill Bass (1)
  • Black-and-white (1)
  • Black's Law Dictionary (1)
  • Blog Talk Radio (1)
  • Board of Education (1)
  • Bob (1)
  • Bob Menendez (1)
  • Bobo (1)
  • Bobo doll experiment (1)
  • Body Farm (1)
  • Bolingbrook (1)
  • Bolingbrook Illinois (1)
  • Broadcasting (1)
  • Bruce Willis (1)
  • BSU (1)
  • bullying (1)
  • Bureau of Justice Statistics (1)
  • Business (6)
  • California (5)
  • capital punishment (1)
  • Causality (1)
  • Cemeteries (1)
  • Cesare Beccaria (3)
  • Chabad (1)
  • Charles Wheatstone (1)
  • Chicago (1)
  • Chicago Police Department (1)
  • Chief of Police (1)
  • Child (2)
  • child abuse (6)
  • Child custody (1)
  • Child pornography (1)
  • Child Protective Services (3)
  • Child sex tourism (1)
  • Child Sexual Abuse (3)
  • child sexual assault (1)
  • Child support (1)
  • Children Youth and Family (3)
  • China (1)
  • ChristianMingle.com (1)
  • Christmas (1)
  • Chuck Jordan (1)
  • civil law (1)
  • Civil Rights Act of 1964 (1)
  • Clarence Darrow (1)
  • CNN (2)
  • Code of Conduct (1)
  • Collective bargaining (1)
  • College athletics (1)
  • Colorado. criminology amp justice (1)
  • Combined DNA Index System (1)
  • Comments (1)
  • Communication (1)
  • community based corrections (1)
  • Computer Aided Dispatch (1)
  • Computer crime (2)
  • Confidence trick (1)
  • Connecticut (3)
  • Constitution (1)
  • Contract (1)
  • correctional systems (1)
  • corrections (1)
  • Counties (1)
  • Court (1)
  • cover up (1)
  • CPS (1)
  • crime (49)
  • crime analysis (2)
  • Crime scene (7)
  • criminal investigation (1)
  • criminal justice (17)
  • Criminal law (3)
  • Criminal Minds (2)
  • Criminology (6)
  • Criminology Amp Justice (247)
  • Criminology and Justice Law Articles (1)
  • Criminology Apm Justice (1)
  • Criminology Videos (1)
  • Criminology: The Core (1)
  • Crimiology Amp Justice (50)
  • cyber bullying (1)
  • Cyber-bullying (1)
  • Cyberstalking (1)
  • Damages (1)
  • Dan Pabon (1)
  • Daniele Barbaro (1)
  • Dark Knight Rises (1)
  • Dave Reichert (1)
  • Davenport (1)
  • David Canter (2)
  • David Petraeus (4)
  • David Wiggins (1)
  • Deadbeat parent (1)
  • Death (1)
  • Death Care (1)
  • December 11 2012 (1)
  • Delaware State Police (1)
  • Delusion (1)
  • Democratic Party (1)
  • Dennis Rader (1)
  • Denver (2)
  • Department of Homeland Security (51)
  • Depression (1)
  • Depression and Unwanted Children (1)
  • Detective (5)
  • Deviance (sociology) (1)
  • DHS (1)
  • Digital audio (1)
  • Digital media (2)
  • District attorney (1)
  • Divorce (1)
  • Divorce demography (1)
  • DLSE (1)
  • DNA (3)
  • DNA profiling (3)
  • DNA sequencing (1)
  • Doctor Watson (1)
  • Domestic Violence (4)
  • Dominican Republic (1)
  • Donation (1)
  • Donna Reed (1)
  • DPPA (1)
  • Dr. Dre (1)
  • Dream (1)
  • Dream interpretation (1)
  • Drew Peterson (1)
  • Drink (1)
  • Driver's license (1)
  • East Coast of the United States (1)
  • Elizabeth Hall (24)
  • Ellen McCarthy (1)
  • Eller (1)
  • Emanuel (1)
  • Émile Durkheim (1)
  • Eminem (1)
  • Emotion (1)
  • Emotions and Crimes (1)
  • Enrico Ferri (1)
  • Ethical code (1)
  • Ethical dilemma (1)
  • Ethics (4)
  • Ethnic Succession Theory (1)
  • Evidence (1)
  • Experiment (1)
  • FAA (1)
  • Face (1)
  • facebook (1)
  • Fair Labor Standard Act (1)
  • Fairhope Alabama (1)
  • Family (2)
  • farmers (1)
  • Fawkes (1)
  • FBI (8)
  • Fear (1)
  • Federal Aviation Administration (1)
  • Federal Bureau of Investigation (26)
  • Federal Rules of Evidence (1)
  • FEMA (1)
  • Field Training Officer (1)
  • Fields (1)
  • Fifth Amendment (1)
  • Fifth Amendment to the United States Constitution (1)
  • Filename extension (1)
  • Film speed (1)
  • FindLaw (3)
  • Fine print (1)
  • Fingerprint (2)
  • Fire and Security (1)
  • Firefox (1)
  • Five Points Gang (1)
  • Flip Wilson (1)
  • Florida (1)
  • Florida Department of Law Enforcement (1)
  • football team (1)
  • Forensic anthropology (1)
  • forensic child abuse unvestigations (1)
  • Forensic photography (2)
  • Forensic science (6)
  • Form Data Polls and Surveys (1)
  • Formats (1)
  • Foster care (2)
  • Foster Parents (1)
  • Francis Galton (1)
  • Franciscan University of Steubenville (1)
  • Frank Serpico (1)
  • Franz Joseph Gall (1)
  • Fred Abdalla (1)
  • Friday (1)
  • Frisk (1)
  • Gambino crime family (1)
  • Gang (2)
  • Geographic information system (1)
  • George Bizos (1)
  • GIS (1)
  • GMO (1)
  • God (1)
  • Goddard (1)
  • Goodwill Games (1)
  • Google (2)
  • Google Video (1)
  • Google+ (1)
  • Gorrill (1)
  • government (1)
  • Graham Spanier (1)
  • Grand jury (1)
  • Greene (1)
  • Gus Hall (1)
  • Guy Fawkes (1)
  • Hackers (1)
  • Hans Gruber (1)
  • Harassment (1)
  • Hatch Act of 1939 (1)
  • Health (5)
  • Health savings account (1)
  • Hearsay (1)
  • Heroin (1)
  • Hickey (1)
  • Holmes (2)
  • Home (1)
  • Homeland Security (2)
  • homicide (3)
  • Hostage crisis (1)
  • Hosted Components and Services (1)
  • human trafficking (1)
  • Humphries (1)
  • Hurricane Sandy (1)
  • Illegal drug trade (2)
  • Indecent assault (1)
  • India (1)
  • Injury (1)
  • Innocence Project (1)
  • Insane Clown Posse (1)
  • Insurance (1)
  • International Association of Crime Analysts (1)
  • International Organization for Standardization (1)
  • Interpersonal relationship (2)
  • interview (1)
  • IRS tax forms (1)
  • Is forever Impossible (1)
  • Jack (1)
  • Jake Gyllenhaal (1)
  • James I of England (1)
  • Jane Hanlin (1)
  • Jansen (1)
  • Japan (1)
  • Jay Carney (1)
  • Jeff Smith (1)
  • Jefferson County (2)
  • Jeremy Bentham (2)
  • Jeremy Hammond (1)
  • Jerry Sandusky (2)
  • Joe Biden (3)
  • Joe Paterno (2)
  • Joey Ortega (3)
  • Johann Heinrich Schulze (1)
  • John (1)
  • John Davenport (1)
  • John Gotti (1)
  • John Herschel (1)
  • John Liebert (1)
  • John McClane (1)
  • Johnny Torrio (1)
  • Joseph Muscat (1)
  • Jovan Belcher (1)
  • JPEG (1)
  • Jury (2)
  • Jury selection (1)
  • Kansas City (1)
  • Kansas City Missouri (1)
  • Kaplan University (2)
  • Karl Marx (2)
  • Keene State College (1)
  • Kent (1)
  • Kentucky (1)
  • Kentucky Revised Statutes (1)
  • King James (1)
  • Knetzger (1)
  • La Mesa California (1)
  • labeling theory (1)
  • Labor Commissioner (1)
  • Lanza (1)
  • Latin Kings (1)
  • Law (32)
  • law enforcement (17)
  • Law enforcement agency (31)
  • Law enforcement officer (32)
  • Law Reform (1)
  • Lawrence Daly (1)
  • Lawrence W. Daly (43)
  • Lawrence W. Daly Forensic (3)
  • Lawrence W.Daly (1)
  • Lawsuit (4)
  • Lawyer (1)
  • Learning (1)
  • Legal burden of proof (1)
  • Legal Information (3)
  • Light (1)
  • LinkedIn (1)
  • Linux (1)
  • Lippman (1)
  • Lloyd Ohlin (2)
  • Long-term depression (1)
  • Louisiana (1)
  • Louisville Kentucky (1)
  • Lower Manhattan (1)
  • LulzSec (1)
  • Lupe Fiasco (1)
  • Mafia (1)
  • Make Me Rich (1)
  • Manhattan (1)
  • Mark Zuckerberg (1)
  • Market research (1)
  • Marlboro (1)
  • Marriage (1)
  • Martin Luther King (1)
  • Mass murder (1)
  • Massage (1)
  • Master of Science (13)
  • Math (1)
  • Medical Needs (1)
  • Medicare (1)
  • Medicare Part D coverage gap (1)
  • Menendez (1)
  • Mens Rea (1)
  • Mental disorder (4)
  • Mental health (6)
  • Mental Status Examination (1)
  • Merriam-Webster Dictionary (1)
  • Methodology (1)
  • Miami (1)
  • Michael Jackson (1)
  • Michael Jansen (1)
  • Michael Jordan (1)
  • Michael Pena (1)
  • Michael Peña (1)
  • Microsoft Excel (1)
  • Middle East (3)
  • Mike McQueary (1)
  • Mind Research Network (1)
  • Miranda (1)
  • Miranda warning (1)
  • mirandawarning (1)
  • Mirror neuron (2)
  • Mitt Romney (4)
  • Mobile phone (1)
  • Model Penal Code (1)
  • Modus operandi (2)
  • Monday (1)
  • Monsanto (1)
  • Montefiore Medical Center (1)
  • Morality (1)
  • Muhammad (1)
  • Muraski (2)
  • murder (6)
  • Muslim world (1)
  • MySpace (1)
  • National Collegiate Athletic Association (1)
  • National Conference of State Legislatures (1)
  • National Crime Information Center (5)
  • National Drug Intelligence Center (1)
  • National Flood Insurance Program (1)
  • National Football League (1)
  • National Gang Intelligence Center (1)
  • National Guard (1)
  • National Institute of Justice (4)
  • National Institute of Mental Health (1)
  • National Law Enforcement Officers Memorial (1)
  • National Museum of American History (1)
  • National Rifle Association (1)
  • NCAA (1)
  • New Jersey (2)
  • New York City (1)
  • New York City Police Department (1)
  • New York Law Journal (1)
  • New York Times (1)
  • Newtown (2)
  • Newtown Connecticut (1)
  • Newtown Connecticut (1)
  • NFAIS (1)
  • NFL (2)
  • Nidal Malik Hasan (2)
  • Nietzel (1)
  • Noncustodial parent (1)
  • Nonprofit organization (1)
  • Northern Virginia (1)
  • Obama (3)
  • Observational learning (2)
  • Ohio (3)
  • Ohio River (2)
  • Online Issues Polls (1)
  • Operating system (2)
  • Opioid dependence (1)
  • Organizations (2)
  • Organized crime (5)
  • Paranoia (1)
  • Paranormal (1)
  • Parent (2)
  • Pareto Principle (1)
  • Patient Protection and Affordable Care Act (1)
  • Paul Uhlenhuth (1)
  • Pedophilia (1)
  • Penn State (1)
  • Pennsylvania State University (1)
  • People (2)
  • Perkins (1)
  • pesticides (1)
  • Peter Mark Roget (1)
  • Peter Neufeld (1)
  • Peterson (1)
  • Petraeus (1)
  • Philosophy (2)
  • Photograph (2)
  • Photographer (1)
  • Photography (3)
  • Plaintiff (1)
  • police (19)
  • Police brutality (1)
  • Police car (1)
  • Police misconduct (2)
  • Police officer (7)
  • Political Rights (1)
  • Polls and Surveys (1)
  • Port of Seattle (1)
  • Posttraumatic stress disorder (2)
  • Pratt (1)
  • Pregnancy (1)
  • Preliminary hearing (1)
  • Prentice Hall (1)
  • prevention (2)
  • prison (3)
  • Prison officer (1)
  • Private investigator (1)
  • Pro se legal representation in the United States (1)
  • Products (1)
  • Professional sports (1)
  • Prosecutor (1)
  • psychology (2)
  • Punitive damages (1)
  • Puyallup Washington (7)
  • Racial Profiling (1)
  • Radford University (1)
  • Radio (2)
  • RadioShack (1)
  • Rahm Emanuel (1)
  • Rape (7)
  • Real estate investment trust (1)
  • Real evidence (2)
  • Reinforcement (2)
  • Relationships (1)
  • Relevance (law) (1)
  • Remington College (1)
  • Requesting Help (1)
  • research (7)
  • Research Ethics (1)
  • Richard Ramirez (1)
  • Robbery (3)
  • Robert Mueller (1)
  • Robinson (1)
  • Roger Goodell (1)
  • Romney (2)
  • Ronell Wilson (1)
  • Rookie Blue (1)
  • roundup (1)
  • Royal Commission (1)
  • Russ Stover (1)
  • Sabu (1)
  • Same-sex marriage (1)
  • San Antonio (1)
  • Sandusky (1)
  • Santa Fe New Mexico (1)
  • Saturday morning cartoon (1)
  • Savio (1)
  • schizophrenia (1)
  • Science in Society (2)
  • Scientific method (1)
  • Scott Hall (21)
  • Sculpture (1)
  • Sean Patrick Banks (1)
  • Seattle (2)
  • Second Amendment (2)
  • Second Amendment to the United States Constitution (1)
  • Secret Service (1)
  • security (1)
  • September 11 2001 (3)
  • September 11 attacks (1)
  • serial killer (4)
  • serial murder (1)
  • Sex and the law (1)
  • Sex offender (1)
  • Sex Offenses (1)
  • Sexual abuse (7)
  • Sexual Abuse and Assault (4)
  • Sexual assault (17)
  • Sexual slavery (1)
  • Sheriffs in the United States (1)
  • Sherlock Holmes (1)
  • Sherrill (1)
  • Shopping (1)
  • Shutter speed (1)
  • Siegel (5)
  • Sigmund Freud (1)
  • Skype (1)
  • Sleep (1)
  • Smartphone (1)
  • Smith (1)
  • Social Control Theory (2)
  • Social Learning Theory (1)
  • social media (1)
  • Social Media Network (1)
  • Social network (2)
  • Social networking service (1)
  • Social science (4)
  • Social Sciences (3)
  • Social work (2)
  • Soldier (1)
  • Sopranos (1)
  • Sound recording and reproduction (1)
  • South Bronx (1)
  • Soviet Union (1)
  • Spanish Army (1)
  • Spark Networks (1)
  • SPRUZ (1)
  • St. Louis (1)
  • Stacy (1)
  • Stanford University (1)
  • Statistical inference (1)
  • Statistics (1)
  • Steubenville (3)
  • Steubenville Ohio (1)
  • Steubenville High School (1)
  • Steubenville Ohio (5)
  • Steubenville Rape Case (1)
  • Strain Theory (1)
  • Stratfor (1)
  • Stress (2)
  • Strict liability (1)
  • Substance abuse (1)
  • Substance dependence (1)
  • suicide (1)
  • Support Groups (2)
  • Supreme Court (1)
  • Survey research (1)
  • Suspect (2)
  • SWAT (1)
  • Syria (1)
  • Tabetha Cooper (3)
  • Tammany Hall (1)
  • Tarrant County Courthouse (1)
  • Task force (1)
  • Techniques and Styles (1)
  • Techniques of neutralization (1)
  • technology (1)
  • Television (1)
  • Temporary Assistance for Needy Families (1)
  • Tennessee (1)
  • terrorism (1)
  • Terry stop (1)
  • Texas (1)
  • The Psychology of Marriage (1)
  • Therapy (1)
  • Thomson Correctional Center (1)
  • Thorsten Sellin (2)
  • Tip (gratuity) (1)
  • Tom Corbett (1)
  • Tort (2)
  • Trace evidence (2)
  • Training (1)
  • Triad (1)
  • Trigger point (1)
  • Truth Glasses (1)
  • Tulsa (1)
  • Tulsa Oklahoma (1)
  • Twitter (2)
  • Types of rape (2)
  • Tyrone Woods (2)
  • U.S. Department of Justice (1)
  • Uncle Bob (1)
  • Uncle Bob's Self Storage (1)
  • unhealthy foods (1)
  • Uniform Crime Report (3)
  • Unintended pregnancy (1)
  • United State (2)
  • United States (68)
  • United States Constitution (2)
  • United States Department of Homeland Security (1)
  • United States Department of Justice (3)
  • United States Department of State (1)
  • United States Senate Committee on Foreign Relations (1)
  • University of Oklahoma (1)
  • unsafe practices (1)
  • Upper Saddle River New Jersey (1)
  • US Department of Justice (1)
  • Vandalism (1)
  • Victimology (1)
  • victims (2)
  • Victor (1)
  • video (1)
  • Vincent Thomas Bridge (1)
  • Violence (2)
  • Violence and Abuse (6)
  • Violent Criminal Apprehension Program (1)
  • Virginia (2)
  • Voir dire (1)
  • Wage (1)
  • Washington (5)
  • Washington State Patrol (1)
  • Web Design and Development (1)
  • Webster (1)
  • well being (1)
  • West Virginia (1)
  • Western World (1)
  • White Hats (1)
  • White House (1)
  • William F. Miller (1)
  • William Herschel (1)
  • William J. Birnes (1)
  • William J. Bratton (2)
  • William Roy Wilson (1)
  • Wilson (1)
  • Windows (1)
  • Wisconsin Supreme Court (1)
  • Withdrawal (1)
  • Witness (1)
  • Women (1)
  • Woo Woo (1)
  • World Justice Project (1)
  • World Wide Web (1)
  • X-ray computed tomography (1)
  • Yakuza (1)
  • Yes (band) (1)
  • You Tube (1)

Blog Archive

  • ►  2013 (279)
    • ►  September (16)
    • ►  August (28)
    • ►  July (27)
    • ►  June (30)
    • ►  May (31)
    • ►  April (44)
    • ►  March (19)
    • ►  February (36)
    • ►  January (48)
  • ▼  2012 (221)
    • ►  December (47)
    • ▼  November (46)
      • Combating Crime to Cyber Space and Beyond
      • Cheap Auto Insurance Quotes ? Finding The World-Cl...
      • Law Its Types And Differences
      • Martial Law
      • Law and Society
      • Today’s Investigative Special Report – November 27...
      • Today’s Investigative Special Report – November 26...
      • Secondary Health Insurance - Health
      • Term Life Insurance ? A Better Option to Mortgage ...
      • Special Economic Zone: A Boon For Indian Economy
      • Big Cats of America
      • Social Criminological Theories: A Comparison of T...
      • Choosing the ideal Car Insurance In Your Situation...
      • Analysis of the Origins and History of Organized C...
      • Important Factors When Purchasing Car Insurance - ...
      • Theoretical Perspectives to Understand and Explain...
      • How You Can Conserve Cash On Calgary Vehicle Insur...
      • Today’s Investigative Special Report – November 19...
      • Find The Cheapest Car Insurance Quote From Motor V...
      • Top Ten Car Insurance Myths That will turn into ex...
      • Today’s Investigative Special Report – November 17...
      • Special Economic Zone: A Boon For Indian Economy
      • Auto Insurance Tips
      • The Psychology of Marriage – is forever impossible?
      • Find The Cheapest Car Insurance Quote From Motor V...
      • Today’s Investigative Special Report – November 13...
      • How To Get Your Best Auto Insurance Plan? - Insura...
      • Today’s Investigative Special Report – November 12...
      • Caring For The Health of Immigrant Children
      • Today’s Investigative Special Report – November 10...
      • Agent Vs. Broker ? Who do You Buy Health Insurance...
      • Should you Shop for Health Insurance if You are Se...
      • American Awareness – What on Earth is going on in ...
      • New Competition Regime in India
      • Exploring the History of Crime Scene Still and Vid...
      • Auto Insurance Tips
      • Today’s Investigative Special Report – November 7,...
      • Find The Cheapest Car Insurance Quote From Motor V...
      • Today’s Investigative Special Report – November 6,...
      • Today’s Investigative Special Report – November 5,...
      • Behind the Yellow Tape Latest Show on Steubenville...
      • Taking a Bite Out of Crime With Radio Frequency Id...
      • Today’s Investigative Special Report – November 2,...
      • Behind the Yellow Tape Investigation into High Sch...
      • Special Economic Zone: A Boon For Indian Economy
      • Liberty Auto Insurance- A Short Overview - Insura...
    • ►  October (50)
    • ►  September (52)
    • ►  August (26)
Powered by Blogger.