CriminologyJustice

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Tuesday, February 26, 2013

A Closer Look at Police Technology

Posted on 9:00 PM by Unknown

by Elizabeth Hall
Introduction
When we think of law enforcement officers of decades ago what readily comes to mind are the sheriffs of the Old West armed with a badge, a gun, and a deputy if he was lucky notes Foster (2000).  In modern policing there are sophisticated pieces of equipment developed by modern science and 
English: Mounted law enforcement
English: Mounted law enforcement (Photo credit: Wikipedia)
technology such as computers, software designed for specific functions to aid in investigation, radar, breathalyzers, thermal imaging systems, digital cameras, crime mapping tools and even our own cell phones and devices to investigate, obtain warrants, and convict criminals. With these advances in technology there are distinct advantages to an investigation, however there are also distinct disadvantages, as criminals have access to some of these tools as well (Knetzger, M. & Muraski, 2008).  In this paper we will discuss the advantages and disadvantages of computers and software has on law enforcement, along with some examples of how technology has been utilized both for and against law enforcement investigations. 
Advantages of Computers and Software in Investigation
Foster (2000) holds that during the Community Policing Era law enforcement technology turned to computers to aid in the new style of policing America.  These technologies added tools such as 
Seal of the National Crime Information Center ...
Seal of the National Crime Information Center (NCIC), USA. — “Servicing Our Citizens” (Photo credit: Wikipedia)
Computer Aided Dispatch (CAD), the National Crime Information Center (NCIC), Enhanced 911 systems, and even the Automated Fingerprint Identity System are some of the real tools that law enforcement have at their disposal.  Schultz (2008) also lists technological tools that have enabled law enforcement to have information and databases at their disposal even when in their cars, and those that replace officers altogether such as cameras that record graffiti and vandalism, and photo enforcement systems which allow for crimes to be reported automatically in cases of vandalism or traffic violations, which the agency can then send out a traffic ticket complete with photo of car as proof or feed the data about the vandalism complete with photos in the their computers to aid in the investigation and apprehension of the vandals.  Thermal imaging cameras allow officers to monitor for suspects, number of people in the building, detect possible narcotics growing operations, and gather other data from afar gaining them the advantage of surprise when it is time to apprehend the criminals (Schultz, 2008). All of these tools allow for faster, safer law enforcement intervention into criminal investigation by shaving time off of individual evidence identification, suspect identification, dispatch of personnel, and validity of evidence in the courtroom by providing allowable visual evidence, or by allowing law enforcement to gain knowledge without detection by the criminals.    
Disadvantages of Computers and Software on Law Enforcement
While there are advantages to law enforcement with the advancement of technological tools, there are also disadvantages, as criminals have access to computers and software as well (Knetzger, M. & Muraski, 2008). What makes it particularly disadvantageous to law enforcement is that by the nature of the internet and global accessibility these crimes are not impossible, but very difficult to trace.  Often crimes are committed from another country and prosecution requires multiple country cooperation to investigate and prosecute criminals.  Another difficulty is funding, as technology is always updating, and law enforcement budgeting may not allow for the rapid replacement of equipment, particularly in smaller agencies. What makes it particularly disadvantageous to law enforcement is that by the nature of the internet and global accessibility these crimes are not impossible, but very difficult to trace. With the technological advances of the computer and the ease of use of the internet, transnational and national criminals take advantage of these tools every day (Knetzger, M. & Muraski, 2008). 
Ways to Utilize Technology to Commit a Crime
Criminalscan use computers and cell phones to commit fraud, identity theft, scams, hacking, stalking, bullying, harassment, child pornography violations, child enticement, narcotics distribution and manufacture, cell phone fraud, terrorism and even last but certainly not least, organized crime (Knetzger, M. & Muraski, 2008).   Deirmenjian (2002) speaks of the ease which pedophiles can trade, sell or buy photos, belong to private forums, groups and chat rooms, and generally indulge in their fantasies.  A simple thing as email can be used in the commission of cyberstalking, harassment, or even to used to threaten someone, along with scams designed to gain personal information or funds from a person by proclaiming they won the lottery, are due an inheritance, have governmental oversight funds to disburse, or a sick relative, which are known as advance fee scams.  Identity fraud is also connected with this as some of them ask you for personal information which can then be sold or utilized later.  Organized crime groups can sell stolen merchandise, narcotics, monitor their gambling and loan sharking operations, and even recruit members over the internet (Knetzger, M. & Muraski, 2008).  
Case Example of Criminal Enterprise with Computers
The Federal Trade Commission (FTC) (2012) reports that a large ring of Tech Support Scams was discovered originating out of India which they are launching a major offensive and have succeeded in locking the assets of at least six enterprises.  The criminals use phones and computers to commit the crimes by posing as legitimate telemarketers from major companies, talking unsuspecting victims into believing that their computer needs to be rid of spy and malware.  The victims would then
English: Washington, D.C. headquarters of the ...
English: Washington, D.C. headquarters of the Federal Trade Commission. (Photo credit: Wikipedia)
 pay fees to the fake company representatives to allow them to then remotely access their computers and “fix” the problem.  With fees ranging from $49 to $450 per fix, they would direct the consumer to a software download allowing them to remotely download useless or free programs to the consumer machine (FTC, 2012).   
Case Example of Computers Aiding in Solving Crimes
Deirmenjian (2002) cites several cases where pedophiles were arrested and their own computers were not only utilized in the criminal activity, but also aided in the investigation of the crimes.  For example, a thirty eight year old male pedophile was caught trying to set up a meeting with a 13 year old girl, which turned out to be an officer posing as that minor.  He was caught when he turned up for the meeting.  Another case was that of a murderer out on parole who thought he was communicating with a mother who would allow him to sexually assault her teenage daughters.  Imagine his surprise when he landed back in jail for that one due to the anonymity of the internet, and his inability to control his impulses.
Conclusion
Technological advances in society have had both positive and negative effects on law enforcement in this country, although there have been huge strides in the positive effects (Foster, 2002).  Even though the commissions of some crimes are aided by the use of software, computers, and the internet, often these same tools can aid in the investigation, arrest, and prosecution of crime.  The benefits of information sharing between our law enforcement agencies through databases like AFIS and CODIS, the fingerprint and DNA databases, crime and criminal information such as that found on NCIC, and advances in technology such as vandalism systems and photo enforcement systems save our officers time and keep them engaged and in action at the same time by making information available to them in their cars at their fingertips instead of in a records room sorting through fingerprint cards.  This far outweighs the disadvantages the criminals pose.
References:
Deirmenjian, J.M. MD, (2002).  Pedophilia on the Internet.  Journal of Forensic Science, Sept 2002.  Vol 47, № 5.  Retrieved From: http://www.hawaii.edu/hivandaids/Pedophilia_on_the_Internet.pdf
Federal Trade Commission, (FTC), (2012).  FTC Halts Massive Tech Support Scams.  Retrieved From: http://ftc.gov/opa/2012/10/pecon.shtm
Foster, R.E. (2000). Police Technology. Upper Saddle River: Pearson Prentice Hall
Knetzger, M. & Muraski, (2008).  Investigating High-Tech Crime.  New Jersey Prentice Hall, Pearson Education.  ISBN:  0-536-08577-3
Schultz, P.D., (2008).  The Future is Here: Technology in Police Departments.  The Police Chief, vol. LXXV, no. 6, June 2008.  Retrieved From: http://www.policechiefmagazine.org/magazine/index.cfm?article_id=1527&fuseaction=display&issue_id=62008

Related articles

  • New unbelievably brazen fraud: Internet Copyright Law Enforcement Agency
  • New police unit's warning for Scots criminals on the run from justice: There's nowhere to hide
  • Shortage of hard data on firearms rooted in gun-control debate
  • Crime's scarce, but Bal Harbour cops rack up the overtime anyway
  • Head of crime unit declares war on criminals
  • Florida Residents Learn about Staged Car Accidents
  • AC: How Technology is Brining Down American Crime Rates
  • Do police have the right to your DNA?
  • Catch the Criminals 2.0: How does modern technology impact officer and suspect safety? [Infographic]
  • Is the Identity of Someone Reporting Child Abuse in South Carolina Confidential?
Enhanced by Zemanta
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in Business, Computer Aided Dispatch, Confidence trick, crime, Criminology Amp Justice, Elizabeth Hall, Law, law enforcement, National Crime Information Center, police | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • Case Summary of Cases Involving Photographic Evidence: Relevant, Material, and More Probative than Inflammatory Photographic Evidence Cases
    Death penalty map (Photo credit: Wikipedia ) by Elizabeth Hall Introduction Ever since the photograph has been used as evidence rules have ...
  • Serial Murder: Difficulties within an Investigation
    by Tabetha Cooper Serial murder is a phenomenon that poses many problems for investigators.  With the multitude of factors that go into a se...
  • Today’s Investigative Special Report – December 11, 2012 “Dealing With Today’s Law Enforcement Specialized Investigations” “When the Facts and Evidence Are ‘Obvious’ Why Is It Then That Law Enforcement Can’t Find the Truth”
    By Lawrence W. Daly, MSc Forensic Expert – Senior Author You Be The Officer The smoking gun is sitting in the front room on top of the coff...
  • Tamil Shorthand (Development And Growth)
    TAMIL SHORTHAND (Development & Growth ) Author: G.S.Ananthanarayanan This article is a compilation of information available in the fie...
  • The Emergence of the Latin Kings in KY
    by Elizabeth Hall   Introduction English: An example of common Latin Kings' vandalism - showing a crude depiction of a five-pointed crow...
  • Mental Disorders – Paranoia, Symptoms and Potential Treatments
    Article by: Scott Hall       English: Robert Plutchik's Wheel of Emotions (Photo credit: Wikipedia )        Many citizens have experienc...
  • Investigation Into Serial Murder- Proactive and Reactive Approaches
    By Elizabeth Hall WANTAGH, NY - APRIL 15: An aerial view of police cars near where a body was discovered in the area near Gilgo Beach and O...
  • Violence
    by Tabetha Cooper A History of Violence (Photo credit: Wikipedia ) Violence is a continuing problem in the world.  This is evident every nig...
  • Police Technology: A History, Past, Present, and Future
    by Elizabeth Hall We have come a long way, since the Old West when law enforcement meant a local sheriff, with just a gun and a sheriff bad...
  • Analysis of Criminological Theory Relating to Organized Crime, John Gotti and Gang Organizations
    English: The Seal of the United States Federal Bureau of Investigation. For more information, see here. Español: El escudo del Buró Federal ...

Categories

  • $1 million (1)
  • 1964 Civil Rights Act (1)
  • Aaron Sorkin (1)
  • ABC News (2)
  • Abigail Adams (1)
  • Accessories (1)
  • ACLU (1)
  • Actus Reus (1)
  • Adam Lanza (1)
  • Addiction (1)
  • Afghanistan (1)
  • African American (2)
  • Air National Guard (1)
  • Al Qaeda (1)
  • Alabama (1)
  • Alan Rickman (1)
  • albert bandura (2)
  • Alexander Graham Bell (2)
  • Alexandra Goddard (1)
  • Alphonse Bertillon (1)
  • Altair 8800 (1)
  • Amazon (1)
  • American Awareness (2)
  • American Civil Liberties Union (1)
  • American Postal Workers Union (1)
  • American Psychological Association (1)
  • anonymous (3)
  • Anonymous (group) (1)
  • Anxiety (1)
  • Anytown (1)
  • Applied (1)
  • Arrest (1)
  • Art (1)
  • Arthur Conan Doyle (1)
  • Arts (2)
  • Assault (3)
  • Astigmatism (1)
  • Attempted murder (1)
  • August Vollmer (1)
  • Aurora (1)
  • Aurora Colorado (1)
  • Aurora Colorado (1)
  • Australia (1)
  • Baldwin (1)
  • Bandura (1)
  • Barack Obama (5)
  • Barry Scheck (2)
  • Barter (1)
  • Behavior (1)
  • Behavioral Analysis Unit (2)
  • Behavioral Science Unit (1)
  • Benghazi (3)
  • Bernie Fine (1)
  • Bert (2)
  • Bill Bass (1)
  • Black-and-white (1)
  • Black's Law Dictionary (1)
  • Blog Talk Radio (1)
  • Board of Education (1)
  • Bob (1)
  • Bob Menendez (1)
  • Bobo (1)
  • Bobo doll experiment (1)
  • Body Farm (1)
  • Bolingbrook (1)
  • Bolingbrook Illinois (1)
  • Broadcasting (1)
  • Bruce Willis (1)
  • BSU (1)
  • bullying (1)
  • Bureau of Justice Statistics (1)
  • Business (6)
  • California (5)
  • capital punishment (1)
  • Causality (1)
  • Cemeteries (1)
  • Cesare Beccaria (3)
  • Chabad (1)
  • Charles Wheatstone (1)
  • Chicago (1)
  • Chicago Police Department (1)
  • Chief of Police (1)
  • Child (2)
  • child abuse (6)
  • Child custody (1)
  • Child pornography (1)
  • Child Protective Services (3)
  • Child sex tourism (1)
  • Child Sexual Abuse (3)
  • child sexual assault (1)
  • Child support (1)
  • Children Youth and Family (3)
  • China (1)
  • ChristianMingle.com (1)
  • Christmas (1)
  • Chuck Jordan (1)
  • civil law (1)
  • Civil Rights Act of 1964 (1)
  • Clarence Darrow (1)
  • CNN (2)
  • Code of Conduct (1)
  • Collective bargaining (1)
  • College athletics (1)
  • Colorado. criminology amp justice (1)
  • Combined DNA Index System (1)
  • Comments (1)
  • Communication (1)
  • community based corrections (1)
  • Computer Aided Dispatch (1)
  • Computer crime (2)
  • Confidence trick (1)
  • Connecticut (3)
  • Constitution (1)
  • Contract (1)
  • correctional systems (1)
  • corrections (1)
  • Counties (1)
  • Court (1)
  • cover up (1)
  • CPS (1)
  • crime (49)
  • crime analysis (2)
  • Crime scene (7)
  • criminal investigation (1)
  • criminal justice (17)
  • Criminal law (3)
  • Criminal Minds (2)
  • Criminology (6)
  • Criminology Amp Justice (247)
  • Criminology and Justice Law Articles (1)
  • Criminology Apm Justice (1)
  • Criminology Videos (1)
  • Criminology: The Core (1)
  • Crimiology Amp Justice (50)
  • cyber bullying (1)
  • Cyber-bullying (1)
  • Cyberstalking (1)
  • Damages (1)
  • Dan Pabon (1)
  • Daniele Barbaro (1)
  • Dark Knight Rises (1)
  • Dave Reichert (1)
  • Davenport (1)
  • David Canter (2)
  • David Petraeus (4)
  • David Wiggins (1)
  • Deadbeat parent (1)
  • Death (1)
  • Death Care (1)
  • December 11 2012 (1)
  • Delaware State Police (1)
  • Delusion (1)
  • Democratic Party (1)
  • Dennis Rader (1)
  • Denver (2)
  • Department of Homeland Security (51)
  • Depression (1)
  • Depression and Unwanted Children (1)
  • Detective (5)
  • Deviance (sociology) (1)
  • DHS (1)
  • Digital audio (1)
  • Digital media (2)
  • District attorney (1)
  • Divorce (1)
  • Divorce demography (1)
  • DLSE (1)
  • DNA (3)
  • DNA profiling (3)
  • DNA sequencing (1)
  • Doctor Watson (1)
  • Domestic Violence (4)
  • Dominican Republic (1)
  • Donation (1)
  • Donna Reed (1)
  • DPPA (1)
  • Dr. Dre (1)
  • Dream (1)
  • Dream interpretation (1)
  • Drew Peterson (1)
  • Drink (1)
  • Driver's license (1)
  • East Coast of the United States (1)
  • Elizabeth Hall (24)
  • Ellen McCarthy (1)
  • Eller (1)
  • Emanuel (1)
  • Émile Durkheim (1)
  • Eminem (1)
  • Emotion (1)
  • Emotions and Crimes (1)
  • Enrico Ferri (1)
  • Ethical code (1)
  • Ethical dilemma (1)
  • Ethics (4)
  • Ethnic Succession Theory (1)
  • Evidence (1)
  • Experiment (1)
  • FAA (1)
  • Face (1)
  • facebook (1)
  • Fair Labor Standard Act (1)
  • Fairhope Alabama (1)
  • Family (2)
  • farmers (1)
  • Fawkes (1)
  • FBI (8)
  • Fear (1)
  • Federal Aviation Administration (1)
  • Federal Bureau of Investigation (26)
  • Federal Rules of Evidence (1)
  • FEMA (1)
  • Field Training Officer (1)
  • Fields (1)
  • Fifth Amendment (1)
  • Fifth Amendment to the United States Constitution (1)
  • Filename extension (1)
  • Film speed (1)
  • FindLaw (3)
  • Fine print (1)
  • Fingerprint (2)
  • Fire and Security (1)
  • Firefox (1)
  • Five Points Gang (1)
  • Flip Wilson (1)
  • Florida (1)
  • Florida Department of Law Enforcement (1)
  • football team (1)
  • Forensic anthropology (1)
  • forensic child abuse unvestigations (1)
  • Forensic photography (2)
  • Forensic science (6)
  • Form Data Polls and Surveys (1)
  • Formats (1)
  • Foster care (2)
  • Foster Parents (1)
  • Francis Galton (1)
  • Franciscan University of Steubenville (1)
  • Frank Serpico (1)
  • Franz Joseph Gall (1)
  • Fred Abdalla (1)
  • Friday (1)
  • Frisk (1)
  • Gambino crime family (1)
  • Gang (2)
  • Geographic information system (1)
  • George Bizos (1)
  • GIS (1)
  • GMO (1)
  • God (1)
  • Goddard (1)
  • Goodwill Games (1)
  • Google (2)
  • Google Video (1)
  • Google+ (1)
  • Gorrill (1)
  • government (1)
  • Graham Spanier (1)
  • Grand jury (1)
  • Greene (1)
  • Gus Hall (1)
  • Guy Fawkes (1)
  • Hackers (1)
  • Hans Gruber (1)
  • Harassment (1)
  • Hatch Act of 1939 (1)
  • Health (5)
  • Health savings account (1)
  • Hearsay (1)
  • Heroin (1)
  • Hickey (1)
  • Holmes (2)
  • Home (1)
  • Homeland Security (2)
  • homicide (3)
  • Hostage crisis (1)
  • Hosted Components and Services (1)
  • human trafficking (1)
  • Humphries (1)
  • Hurricane Sandy (1)
  • Illegal drug trade (2)
  • Indecent assault (1)
  • India (1)
  • Injury (1)
  • Innocence Project (1)
  • Insane Clown Posse (1)
  • Insurance (1)
  • International Association of Crime Analysts (1)
  • International Organization for Standardization (1)
  • Interpersonal relationship (2)
  • interview (1)
  • IRS tax forms (1)
  • Is forever Impossible (1)
  • Jack (1)
  • Jake Gyllenhaal (1)
  • James I of England (1)
  • Jane Hanlin (1)
  • Jansen (1)
  • Japan (1)
  • Jay Carney (1)
  • Jeff Smith (1)
  • Jefferson County (2)
  • Jeremy Bentham (2)
  • Jeremy Hammond (1)
  • Jerry Sandusky (2)
  • Joe Biden (3)
  • Joe Paterno (2)
  • Joey Ortega (3)
  • Johann Heinrich Schulze (1)
  • John (1)
  • John Davenport (1)
  • John Gotti (1)
  • John Herschel (1)
  • John Liebert (1)
  • John McClane (1)
  • Johnny Torrio (1)
  • Joseph Muscat (1)
  • Jovan Belcher (1)
  • JPEG (1)
  • Jury (2)
  • Jury selection (1)
  • Kansas City (1)
  • Kansas City Missouri (1)
  • Kaplan University (2)
  • Karl Marx (2)
  • Keene State College (1)
  • Kent (1)
  • Kentucky (1)
  • Kentucky Revised Statutes (1)
  • King James (1)
  • Knetzger (1)
  • La Mesa California (1)
  • labeling theory (1)
  • Labor Commissioner (1)
  • Lanza (1)
  • Latin Kings (1)
  • Law (32)
  • law enforcement (17)
  • Law enforcement agency (31)
  • Law enforcement officer (32)
  • Law Reform (1)
  • Lawrence Daly (1)
  • Lawrence W. Daly (43)
  • Lawrence W. Daly Forensic (3)
  • Lawrence W.Daly (1)
  • Lawsuit (4)
  • Lawyer (1)
  • Learning (1)
  • Legal burden of proof (1)
  • Legal Information (3)
  • Light (1)
  • LinkedIn (1)
  • Linux (1)
  • Lippman (1)
  • Lloyd Ohlin (2)
  • Long-term depression (1)
  • Louisiana (1)
  • Louisville Kentucky (1)
  • Lower Manhattan (1)
  • LulzSec (1)
  • Lupe Fiasco (1)
  • Mafia (1)
  • Make Me Rich (1)
  • Manhattan (1)
  • Mark Zuckerberg (1)
  • Market research (1)
  • Marlboro (1)
  • Marriage (1)
  • Martin Luther King (1)
  • Mass murder (1)
  • Massage (1)
  • Master of Science (13)
  • Math (1)
  • Medical Needs (1)
  • Medicare (1)
  • Medicare Part D coverage gap (1)
  • Menendez (1)
  • Mens Rea (1)
  • Mental disorder (4)
  • Mental health (6)
  • Mental Status Examination (1)
  • Merriam-Webster Dictionary (1)
  • Methodology (1)
  • Miami (1)
  • Michael Jackson (1)
  • Michael Jansen (1)
  • Michael Jordan (1)
  • Michael Pena (1)
  • Michael Peña (1)
  • Microsoft Excel (1)
  • Middle East (3)
  • Mike McQueary (1)
  • Mind Research Network (1)
  • Miranda (1)
  • Miranda warning (1)
  • mirandawarning (1)
  • Mirror neuron (2)
  • Mitt Romney (4)
  • Mobile phone (1)
  • Model Penal Code (1)
  • Modus operandi (2)
  • Monday (1)
  • Monsanto (1)
  • Montefiore Medical Center (1)
  • Morality (1)
  • Muhammad (1)
  • Muraski (2)
  • murder (6)
  • Muslim world (1)
  • MySpace (1)
  • National Collegiate Athletic Association (1)
  • National Conference of State Legislatures (1)
  • National Crime Information Center (5)
  • National Drug Intelligence Center (1)
  • National Flood Insurance Program (1)
  • National Football League (1)
  • National Gang Intelligence Center (1)
  • National Guard (1)
  • National Institute of Justice (4)
  • National Institute of Mental Health (1)
  • National Law Enforcement Officers Memorial (1)
  • National Museum of American History (1)
  • National Rifle Association (1)
  • NCAA (1)
  • New Jersey (2)
  • New York City (1)
  • New York City Police Department (1)
  • New York Law Journal (1)
  • New York Times (1)
  • Newtown (2)
  • Newtown Connecticut (1)
  • Newtown Connecticut (1)
  • NFAIS (1)
  • NFL (2)
  • Nidal Malik Hasan (2)
  • Nietzel (1)
  • Noncustodial parent (1)
  • Nonprofit organization (1)
  • Northern Virginia (1)
  • Obama (3)
  • Observational learning (2)
  • Ohio (3)
  • Ohio River (2)
  • Online Issues Polls (1)
  • Operating system (2)
  • Opioid dependence (1)
  • Organizations (2)
  • Organized crime (5)
  • Paranoia (1)
  • Paranormal (1)
  • Parent (2)
  • Pareto Principle (1)
  • Patient Protection and Affordable Care Act (1)
  • Paul Uhlenhuth (1)
  • Pedophilia (1)
  • Penn State (1)
  • Pennsylvania State University (1)
  • People (2)
  • Perkins (1)
  • pesticides (1)
  • Peter Mark Roget (1)
  • Peter Neufeld (1)
  • Peterson (1)
  • Petraeus (1)
  • Philosophy (2)
  • Photograph (2)
  • Photographer (1)
  • Photography (3)
  • Plaintiff (1)
  • police (19)
  • Police brutality (1)
  • Police car (1)
  • Police misconduct (2)
  • Police officer (7)
  • Political Rights (1)
  • Polls and Surveys (1)
  • Port of Seattle (1)
  • Posttraumatic stress disorder (2)
  • Pratt (1)
  • Pregnancy (1)
  • Preliminary hearing (1)
  • Prentice Hall (1)
  • prevention (2)
  • prison (3)
  • Prison officer (1)
  • Private investigator (1)
  • Pro se legal representation in the United States (1)
  • Products (1)
  • Professional sports (1)
  • Prosecutor (1)
  • psychology (2)
  • Punitive damages (1)
  • Puyallup Washington (7)
  • Racial Profiling (1)
  • Radford University (1)
  • Radio (2)
  • RadioShack (1)
  • Rahm Emanuel (1)
  • Rape (7)
  • Real estate investment trust (1)
  • Real evidence (2)
  • Reinforcement (2)
  • Relationships (1)
  • Relevance (law) (1)
  • Remington College (1)
  • Requesting Help (1)
  • research (7)
  • Research Ethics (1)
  • Richard Ramirez (1)
  • Robbery (3)
  • Robert Mueller (1)
  • Robinson (1)
  • Roger Goodell (1)
  • Romney (2)
  • Ronell Wilson (1)
  • Rookie Blue (1)
  • roundup (1)
  • Royal Commission (1)
  • Russ Stover (1)
  • Sabu (1)
  • Same-sex marriage (1)
  • San Antonio (1)
  • Sandusky (1)
  • Santa Fe New Mexico (1)
  • Saturday morning cartoon (1)
  • Savio (1)
  • schizophrenia (1)
  • Science in Society (2)
  • Scientific method (1)
  • Scott Hall (21)
  • Sculpture (1)
  • Sean Patrick Banks (1)
  • Seattle (2)
  • Second Amendment (2)
  • Second Amendment to the United States Constitution (1)
  • Secret Service (1)
  • security (1)
  • September 11 2001 (3)
  • September 11 attacks (1)
  • serial killer (4)
  • serial murder (1)
  • Sex and the law (1)
  • Sex offender (1)
  • Sex Offenses (1)
  • Sexual abuse (7)
  • Sexual Abuse and Assault (4)
  • Sexual assault (17)
  • Sexual slavery (1)
  • Sheriffs in the United States (1)
  • Sherlock Holmes (1)
  • Sherrill (1)
  • Shopping (1)
  • Shutter speed (1)
  • Siegel (5)
  • Sigmund Freud (1)
  • Skype (1)
  • Sleep (1)
  • Smartphone (1)
  • Smith (1)
  • Social Control Theory (2)
  • Social Learning Theory (1)
  • social media (1)
  • Social Media Network (1)
  • Social network (2)
  • Social networking service (1)
  • Social science (4)
  • Social Sciences (3)
  • Social work (2)
  • Soldier (1)
  • Sopranos (1)
  • Sound recording and reproduction (1)
  • South Bronx (1)
  • Soviet Union (1)
  • Spanish Army (1)
  • Spark Networks (1)
  • SPRUZ (1)
  • St. Louis (1)
  • Stacy (1)
  • Stanford University (1)
  • Statistical inference (1)
  • Statistics (1)
  • Steubenville (3)
  • Steubenville Ohio (1)
  • Steubenville High School (1)
  • Steubenville Ohio (5)
  • Steubenville Rape Case (1)
  • Strain Theory (1)
  • Stratfor (1)
  • Stress (2)
  • Strict liability (1)
  • Substance abuse (1)
  • Substance dependence (1)
  • suicide (1)
  • Support Groups (2)
  • Supreme Court (1)
  • Survey research (1)
  • Suspect (2)
  • SWAT (1)
  • Syria (1)
  • Tabetha Cooper (3)
  • Tammany Hall (1)
  • Tarrant County Courthouse (1)
  • Task force (1)
  • Techniques and Styles (1)
  • Techniques of neutralization (1)
  • technology (1)
  • Television (1)
  • Temporary Assistance for Needy Families (1)
  • Tennessee (1)
  • terrorism (1)
  • Terry stop (1)
  • Texas (1)
  • The Psychology of Marriage (1)
  • Therapy (1)
  • Thomson Correctional Center (1)
  • Thorsten Sellin (2)
  • Tip (gratuity) (1)
  • Tom Corbett (1)
  • Tort (2)
  • Trace evidence (2)
  • Training (1)
  • Triad (1)
  • Trigger point (1)
  • Truth Glasses (1)
  • Tulsa (1)
  • Tulsa Oklahoma (1)
  • Twitter (2)
  • Types of rape (2)
  • Tyrone Woods (2)
  • U.S. Department of Justice (1)
  • Uncle Bob (1)
  • Uncle Bob's Self Storage (1)
  • unhealthy foods (1)
  • Uniform Crime Report (3)
  • Unintended pregnancy (1)
  • United State (2)
  • United States (68)
  • United States Constitution (2)
  • United States Department of Homeland Security (1)
  • United States Department of Justice (3)
  • United States Department of State (1)
  • United States Senate Committee on Foreign Relations (1)
  • University of Oklahoma (1)
  • unsafe practices (1)
  • Upper Saddle River New Jersey (1)
  • US Department of Justice (1)
  • Vandalism (1)
  • Victimology (1)
  • victims (2)
  • Victor (1)
  • video (1)
  • Vincent Thomas Bridge (1)
  • Violence (2)
  • Violence and Abuse (6)
  • Violent Criminal Apprehension Program (1)
  • Virginia (2)
  • Voir dire (1)
  • Wage (1)
  • Washington (5)
  • Washington State Patrol (1)
  • Web Design and Development (1)
  • Webster (1)
  • well being (1)
  • West Virginia (1)
  • Western World (1)
  • White Hats (1)
  • White House (1)
  • William F. Miller (1)
  • William Herschel (1)
  • William J. Birnes (1)
  • William J. Bratton (2)
  • William Roy Wilson (1)
  • Wilson (1)
  • Windows (1)
  • Wisconsin Supreme Court (1)
  • Withdrawal (1)
  • Witness (1)
  • Women (1)
  • Woo Woo (1)
  • World Justice Project (1)
  • World Wide Web (1)
  • X-ray computed tomography (1)
  • Yakuza (1)
  • Yes (band) (1)
  • You Tube (1)

Blog Archive

  • ▼  2013 (279)
    • ►  September (16)
    • ►  August (28)
    • ►  July (27)
    • ►  June (30)
    • ►  May (31)
    • ►  April (44)
    • ►  March (19)
    • ▼  February (36)
      • Identifying and Avoiding Mortgage Fraud
      • A Closer Look at Police Technology
      • Best ways to make money - Business - Business Ideas
      • Taking a Bite Out of Crime With Radio Frequency Id...
      • Effective Tactical Analysis for Robbery Investigat...
      • Whistle-Blowers And The Law
      • Is "post-American World" Author Fareed Zakaria a R...
      • Rick Santorum
      • Ethical Challenges Faced By Law Enforcement Regularly
      • Whistle-Blowers And The Law
      • Forensics in Law Enforcement Investigative Issues ...
      • Terrorist Attack on Pns Mehran Was Planed by Raw A...
      • Identifying and Avoiding Mortgage Fraud
      • Getting Cheaper Car Insurance Rates
      • Parents Say Son Bullied to Death
      • Protect Macbook Pro with genuine Macbook leather b...
      • Current Local Events In Riverside County, Ca
      • 2010/2011 Tax Return Refund - Law
      • Exploring Research Methodology in the Criminal Jus...
      • Current Local Events In Riverside County, Ca
      • Applying the Principles of Criminal Law
      • Maryland DUI Law: Field Sobriety Tests
      • Today’s Investigative Special Report – February 11...
      • Special Economic Zone: A Boon For Indian Economy
      • New York State No Fault Car Insurance Rules
      • Life Insurance 101
      • Today’s Investigative Special Report – February 8,...
      • Loading in Health Insurance: Know About It!
      • How to Get a Good Deal on Auto Insurance
      • Special Economic Zone: A Boon For Indian Economy
      • Today’s Investigative Special Report – February 5,...
      • Own A Vacation Home, Here Are Some Insurance Cover...
      • A Biological, Psychological, and Sociological Exam...
      • Home Repair Projects For Winter ? Make Sure You Ar...
      • Do Electronic Locks And Security Systems Protect Y...
      • How Imperative Is Buying Property Owners Insurance...
    • ►  January (48)
  • ►  2012 (221)
    • ►  December (47)
    • ►  November (46)
    • ►  October (50)
    • ►  September (52)
    • ►  August (26)
Powered by Blogger.