CriminologyJustice

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Thursday, August 23, 2012

Exploring Computer Operating Systems to Investigate Cyber Crime: File Systems

Posted on 9:00 PM by Unknown



 by Elizabeth Hall     
Introduction
Every computer that we own from our smart phones to our laptops and video games has an operating system contained in it, which the user can easily interface with the computer without having to type in complex or tedious commands.  This is a far cry from the early days of personal computing which began with the Altair 8800.  It was a small box with a keyboard built in, and only had 256 bytes for memory capabilities (Evans, Martin & Poatsey, 2011).  Today we have phones that can fit in our pockets that are more powerful than this first model and everyone has access to these devices along with tablets, laptops, notebooks, and desktop computing.  The internet is carried in our pockets now and people are more in touch with each other over these devices than ever, doing our banking, shopping and e-mailing wherever we happen to be whether that is at home, in our cars, or even sitting at a restaurant eating lunch. 
Graph of Videos Operating System placement on ...
Graph of Videos Operating System placement on computer usage (Photo credit: Wikipedia)

With these advances in technology that give us more freedom comes more vulnerability to cybercrime, as criminals have as much access to these devices as the rest of us, and true to their nature, have found ways to use the internet and these devices to commit crimes or even find victims for themselves (Knetzger, & Muraski, 2008).  Each of these devices utilizes operating systems that allow the user to control the keyboards, mice, and software that we cannot seem to live without.  These operating systems such as Windows, Firefox, and Linux organize the files for easy access through the graphical user interface.  The addition of modems and graphical applications allows the user to do more than word processing and mathematical functions such as video games and with the addition of the internet, users can share data globally. 

Defining File Path
One of the most important features that allow the graphical user interface to be user friendly is the organization of the files on a computer into directories that contain folders and subfolders (Knetzger, & Muraski, 2008).  This allows for sharing, defining, or discovery of the exact location of a piece of information on the hard drive of a computer.  This is what is commonly known as the file path.  For example, if a user needs to retrieve a specific picture they can go to 
C:\Users\Owner\Pictures\ChoSh.jpg for a picture of the Virginia Tech Shooter should they have that specific picture. In this path, each backslash mark means a file name that a user must travel to find the picture of Cho.  The whole path is spelled out in this universal language, meaning that the Cho picture is located on the C drive, in the Users directory in a subfolder labeled Owner, which holds another subfolder named Pictures, which ultimately contains the Cho picture. 

Difference between File Header and Filename Extension
In the organization of the computer’s files, the main way that the Operating System groups files is by grouping files that are all alike such as video files, text files, image files, and those that utilize word processing or spreadsheet style files like Microsoft Excel and Word programs.  A file header and a filename extension are two different paths that an Operating System can use to find a file when the user uses the search interface to locate their data.  The file header is built into the coded structure of the file and in our Cho picture example would “contain the characters JFIF”, which means that the file is in the JPEG format and must use the “JPEG file interchange format” according to Knetzger, & Muraski (2008).  The filename extension in our Cho example is the three letters after the last period, “.jpg” to be exact.  A filename extension is an identifier of the type of file, which helps the computer group the data into subdirectories of the same type of files such as .jpg, .xls, or even .doc. 

The NeuronStudio graphical user interface (Win...
The NeuronStudio graphical user interface (Windows version). (Photo credit: Wikipedia)
Use in Cyber Crime Investigation
This computer organization has the advantage that the types of files and the software that utilizes the file systems are universal to all users of the software and hardware that utilize the particular operating system (Knetzger, & Muraski, 2008).  In today’s modern world of global sharing, this usually means the devices that utilize operating systems such as our desktop, laptop, tablet, notebook, and smart phone computers that we cannot live without these days.  Designers also make them as user friendly as possible often making the devices capable of sharing our information between devices so that we are more connected than ever before.  At the same time that these devices and all of the sharing is making our lives easier, our reliance on these devices is making law enforcement’s job easier. 

A forensic investigator that knows what type of filename extensions allows for the search function in the user interface to bring up all files of that file extension or file header type quickly (Knetzger, & Muraski, 2008).  This is no matter which file path they are located even if the owner thinks they have deleted them if the owner did not empty the recycle bin.  Computer Operating Systems store data for many different reasons, with and without user knowledge within the applications that they run.  This data is useful in cyber crime investigations, because the investigator can review the history of the operations such as the last twenty or so files that have been used, history of websites visited, data in the recycle bin, or even favorite websites (Knetzger, & Muraski, 2008). 

Missing operating system_  {error message}
Missing operating system_ {error message} (Photo credit: quapan)
Five Common Image and Video File Name Extensions
The grouping of file types by properties may include more than one type of file extension. For example, our Cho picture is an image file.  Another graphical file is a file containing video.  There are five common file name extensions that Operating Systems utilize with image and video files according to Knetzger, & Muraski (2008).  These are .avi, .mov, and .mpg for movie files and, .jpg or .bmp for images.  These file extensions are useful to investigators in conducting cyber crime investigations because of the implications of having a particular image or video have in tying a suspect to a particular crime. For example, a suspect accused of being a pedophile may have images of child pornography on their computers, or an art thief may have a picture of the art or plans to the museum or gallery that the art is displayed or a history including websites visited while researching their suspected target.  A trained investigator can retrieve these files from a device easily by using the file header or file name extension (Knetzger, & Muraski, 2008).  

Different File Properties for Data Files
Filename extensions are also important because the extension not only identifies what type of file, but also which program will open the file and allow modification of the data in the file (Utilize Windows, n.d.).  This is part of the file properties and attributes assigned to the specific file, such as whether the file is an executable file a batch file, or a command file.  There are also files that are there as other specific parts of programs like .dll, .ppt, .pdf, all of which denote which programs will open specific file extension types, or have attributes that make them hidden, read only, or archived.  This properties tab will also show the file’s creation date, last accessed date, and the last time that the file was modified (Utilize Windows, n.d.). 

Importance of Date Modified versus Date Accessed Information
The Operating System keeps track of dates and times on your computer, and for the investigator, this can be a very important tool notes Knetzger, & Muraski (2008).   The date accessed tells the investigator the last time a file was opened, and the date modified tells the investigator the last time any changes were made to the file.  This type of information contained in the operating system often goes unnoticed by criminals so many times is not adjusted or modified at all.  An investigator can access these files, but should never modify and files found on a suspect’s computer or device because it can affect the credibility of the evidence in a court case or change an important element of the evidence. 
Conclusion
In our modern, increasingly globally connected world, computers, laptops, smart phones, tablets and other devices make it incredibly easy for us to share information and do business over the internet.  While this has definite advantages to our educations, commerce systems, and businesses, the criminal element of society has access to all of these tools as well, and they have found many ways to utilize computers and devices to further their criminal enterprises. A trained investigator however, can also use
Altair 8800 Computer with 8 circuit boards ins...
Altair 8800 Computer with 8 circuit boards installed. The Altair floppy disk system below has a Pertec 8-inch drive. (Photo credit: Wikipedia)
 the tools that can be found by utilizing the Operating System to discern information on where a suspect has visited on the internet, the most recent files that were opened and or modified.  They could even view files that may prove intent or involvement by a person using computers to commit or aid in committing a crime such as finding child pornography on a suspected pedophile’s hard drive or smart phone, or bomb making instructions on a suspected terrorist’s device.

They track our shopping, listening, and viewing habits, we type in our daily events, and the devices can prove location through the device’s GPS tracking abilities.  In the modern day of information sharing, this is fast becoming one of the most important tools that law enforcement has at their disposal these days, particularly if the criminal is not computer savvy, because the evidence gained from one file can ensure that the investigator and the prosecutors’ office wins the case.  One of the issues arising from these advances in technology and investigation is our right to privacy as our devices now track our every move and the ease of use that the device applications afford law enforcement to use surveillance is astonishing.  It will be interesting to see how this ever-advancing technology works out for us in the end. 



  


References:
Evans, A. Martin, K. & Poatsey, M.A., (2011).  Technology in Action (7thEd.)  Upper Saddle River, NJ: Pearson/Prentice Hall.  ISBN 10: 0-13-509669-3
Knetzger, M. and Muraski, J. (2008) Investigating high-tech crime (1st Ed.).  Upper Saddle River, NJ: Pearson/Prentice Hall.  ISBN eBook:  0536085773  
Utilize Windows, (n.d.).  File Names, Extensions, Properties, and Security.  Retrieved From: http://www.utilizewindows.com/pc-fundamentals/storage/331-file-names-extensions-properties-and-security

Related articles

  • How to Install An Operating System
  • What You Need to Know About Getting Started with Raspberry Pi
  • Multi Choice Questions On Operating System Part - 4
  • Multi Choice Questions On Operating System Part - 1
  • Commercial insurance news: Cyber safety 'is very simple'
  • Computer Experts Are Necessary For Any Business
  • Retrieve filename extension for multiple uploaded files (Class Upload, PHP)
  • Securing your PC from malware
  • Let's See How Windows 8 Performs Against Windows 7 [Techspot]
  • Sox 11
Enhanced by Zemanta
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in Altair 8800, Criminology Amp Justice, Filename extension, Firefox, JPEG, Linux, Microsoft Excel, Operating system, Windows | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • Case Summary of Cases Involving Photographic Evidence: Relevant, Material, and More Probative than Inflammatory Photographic Evidence Cases
    Death penalty map (Photo credit: Wikipedia ) by Elizabeth Hall Introduction Ever since the photograph has been used as evidence rules have ...
  • Serial Murder: Difficulties within an Investigation
    by Tabetha Cooper Serial murder is a phenomenon that poses many problems for investigators.  With the multitude of factors that go into a se...
  • The Emergence of the Latin Kings in KY
    by Elizabeth Hall   Introduction English: An example of common Latin Kings' vandalism - showing a crude depiction of a five-pointed crow...
  • Investigation Into Serial Murder- Proactive and Reactive Approaches
    By Elizabeth Hall WANTAGH, NY - APRIL 15: An aerial view of police cars near where a body was discovered in the area near Gilgo Beach and O...
  • Verbatim: Diverse Voices Address Small-Biz Need for Health Care Reform - Business - Small Business
    As often as possible, GoodBiz113 presents diverse perspectives on small business and entrepreneurship from those who help shape policies and...
  • Operant Conditioning and Criminal Behavior
    by Tina Handrick Introduction Operant conditioning is a method of learning that occurs through rewards and punishments for certain types of ...
  • Analysis of Criminological Theory Relating to Organized Crime, John Gotti and Gang Organizations
    English: The Seal of the United States Federal Bureau of Investigation. For more information, see here. Español: El escudo del Buró Federal ...
  • Police Technology: A History, Past, Present, and Future
    by Elizabeth Hall We have come a long way, since the Old West when law enforcement meant a local sheriff, with just a gun and a sheriff bad...
  • What Is Forensic Psychology
    In recent years forensic psychology and related topics such as criminal profiling have been the subject of a whole host of books, films and ...
  • What Can make Dental Insurance policy Distinct from a Dental Price reduction Approach? - Business
    Dental rewards cover schedule treatment and restoration of a patient's teeth and gums. Wellbeing treatment ideas omit dental benefits li...

Categories

  • $1 million (1)
  • 1964 Civil Rights Act (1)
  • Aaron Sorkin (1)
  • ABC News (2)
  • Abigail Adams (1)
  • Accessories (1)
  • ACLU (1)
  • Actus Reus (1)
  • Adam Lanza (1)
  • Addiction (1)
  • Afghanistan (1)
  • African American (2)
  • Air National Guard (1)
  • Al Qaeda (1)
  • Alabama (1)
  • Alan Rickman (1)
  • albert bandura (2)
  • Alexander Graham Bell (2)
  • Alexandra Goddard (1)
  • Alphonse Bertillon (1)
  • Altair 8800 (1)
  • Amazon (1)
  • American Awareness (2)
  • American Civil Liberties Union (1)
  • American Postal Workers Union (1)
  • American Psychological Association (1)
  • anonymous (3)
  • Anonymous (group) (1)
  • Anxiety (1)
  • Anytown (1)
  • Applied (1)
  • Arrest (1)
  • Art (1)
  • Arthur Conan Doyle (1)
  • Arts (2)
  • Assault (3)
  • Astigmatism (1)
  • Attempted murder (1)
  • August Vollmer (1)
  • Aurora (1)
  • Aurora Colorado (1)
  • Aurora Colorado (1)
  • Australia (1)
  • Baldwin (1)
  • Bandura (1)
  • Barack Obama (5)
  • Barry Scheck (2)
  • Barter (1)
  • Behavior (1)
  • Behavioral Analysis Unit (2)
  • Behavioral Science Unit (1)
  • Benghazi (3)
  • Bernie Fine (1)
  • Bert (2)
  • Bill Bass (1)
  • Black-and-white (1)
  • Black's Law Dictionary (1)
  • Blog Talk Radio (1)
  • Board of Education (1)
  • Bob (1)
  • Bob Menendez (1)
  • Bobo (1)
  • Bobo doll experiment (1)
  • Body Farm (1)
  • Bolingbrook (1)
  • Bolingbrook Illinois (1)
  • Broadcasting (1)
  • Bruce Willis (1)
  • BSU (1)
  • bullying (1)
  • Bureau of Justice Statistics (1)
  • Business (6)
  • California (5)
  • capital punishment (1)
  • Causality (1)
  • Cemeteries (1)
  • Cesare Beccaria (3)
  • Chabad (1)
  • Charles Wheatstone (1)
  • Chicago (1)
  • Chicago Police Department (1)
  • Chief of Police (1)
  • Child (2)
  • child abuse (6)
  • Child custody (1)
  • Child pornography (1)
  • Child Protective Services (3)
  • Child sex tourism (1)
  • Child Sexual Abuse (3)
  • child sexual assault (1)
  • Child support (1)
  • Children Youth and Family (3)
  • China (1)
  • ChristianMingle.com (1)
  • Christmas (1)
  • Chuck Jordan (1)
  • civil law (1)
  • Civil Rights Act of 1964 (1)
  • Clarence Darrow (1)
  • CNN (2)
  • Code of Conduct (1)
  • Collective bargaining (1)
  • College athletics (1)
  • Colorado. criminology amp justice (1)
  • Combined DNA Index System (1)
  • Comments (1)
  • Communication (1)
  • community based corrections (1)
  • Computer Aided Dispatch (1)
  • Computer crime (2)
  • Confidence trick (1)
  • Connecticut (3)
  • Constitution (1)
  • Contract (1)
  • correctional systems (1)
  • corrections (1)
  • Counties (1)
  • Court (1)
  • cover up (1)
  • CPS (1)
  • crime (49)
  • crime analysis (2)
  • Crime scene (7)
  • criminal investigation (1)
  • criminal justice (17)
  • Criminal law (3)
  • Criminal Minds (2)
  • Criminology (6)
  • Criminology Amp Justice (247)
  • Criminology and Justice Law Articles (1)
  • Criminology Apm Justice (1)
  • Criminology Videos (1)
  • Criminology: The Core (1)
  • Crimiology Amp Justice (50)
  • cyber bullying (1)
  • Cyber-bullying (1)
  • Cyberstalking (1)
  • Damages (1)
  • Dan Pabon (1)
  • Daniele Barbaro (1)
  • Dark Knight Rises (1)
  • Dave Reichert (1)
  • Davenport (1)
  • David Canter (2)
  • David Petraeus (4)
  • David Wiggins (1)
  • Deadbeat parent (1)
  • Death (1)
  • Death Care (1)
  • December 11 2012 (1)
  • Delaware State Police (1)
  • Delusion (1)
  • Democratic Party (1)
  • Dennis Rader (1)
  • Denver (2)
  • Department of Homeland Security (51)
  • Depression (1)
  • Depression and Unwanted Children (1)
  • Detective (5)
  • Deviance (sociology) (1)
  • DHS (1)
  • Digital audio (1)
  • Digital media (2)
  • District attorney (1)
  • Divorce (1)
  • Divorce demography (1)
  • DLSE (1)
  • DNA (3)
  • DNA profiling (3)
  • DNA sequencing (1)
  • Doctor Watson (1)
  • Domestic Violence (4)
  • Dominican Republic (1)
  • Donation (1)
  • Donna Reed (1)
  • DPPA (1)
  • Dr. Dre (1)
  • Dream (1)
  • Dream interpretation (1)
  • Drew Peterson (1)
  • Drink (1)
  • Driver's license (1)
  • East Coast of the United States (1)
  • Elizabeth Hall (24)
  • Ellen McCarthy (1)
  • Eller (1)
  • Emanuel (1)
  • Émile Durkheim (1)
  • Eminem (1)
  • Emotion (1)
  • Emotions and Crimes (1)
  • Enrico Ferri (1)
  • Ethical code (1)
  • Ethical dilemma (1)
  • Ethics (4)
  • Ethnic Succession Theory (1)
  • Evidence (1)
  • Experiment (1)
  • FAA (1)
  • Face (1)
  • facebook (1)
  • Fair Labor Standard Act (1)
  • Fairhope Alabama (1)
  • Family (2)
  • farmers (1)
  • Fawkes (1)
  • FBI (8)
  • Fear (1)
  • Federal Aviation Administration (1)
  • Federal Bureau of Investigation (26)
  • Federal Rules of Evidence (1)
  • FEMA (1)
  • Field Training Officer (1)
  • Fields (1)
  • Fifth Amendment (1)
  • Fifth Amendment to the United States Constitution (1)
  • Filename extension (1)
  • Film speed (1)
  • FindLaw (3)
  • Fine print (1)
  • Fingerprint (2)
  • Fire and Security (1)
  • Firefox (1)
  • Five Points Gang (1)
  • Flip Wilson (1)
  • Florida (1)
  • Florida Department of Law Enforcement (1)
  • football team (1)
  • Forensic anthropology (1)
  • forensic child abuse unvestigations (1)
  • Forensic photography (2)
  • Forensic science (6)
  • Form Data Polls and Surveys (1)
  • Formats (1)
  • Foster care (2)
  • Foster Parents (1)
  • Francis Galton (1)
  • Franciscan University of Steubenville (1)
  • Frank Serpico (1)
  • Franz Joseph Gall (1)
  • Fred Abdalla (1)
  • Friday (1)
  • Frisk (1)
  • Gambino crime family (1)
  • Gang (2)
  • Geographic information system (1)
  • George Bizos (1)
  • GIS (1)
  • GMO (1)
  • God (1)
  • Goddard (1)
  • Goodwill Games (1)
  • Google (2)
  • Google Video (1)
  • Google+ (1)
  • Gorrill (1)
  • government (1)
  • Graham Spanier (1)
  • Grand jury (1)
  • Greene (1)
  • Gus Hall (1)
  • Guy Fawkes (1)
  • Hackers (1)
  • Hans Gruber (1)
  • Harassment (1)
  • Hatch Act of 1939 (1)
  • Health (5)
  • Health savings account (1)
  • Hearsay (1)
  • Heroin (1)
  • Hickey (1)
  • Holmes (2)
  • Home (1)
  • Homeland Security (2)
  • homicide (3)
  • Hostage crisis (1)
  • Hosted Components and Services (1)
  • human trafficking (1)
  • Humphries (1)
  • Hurricane Sandy (1)
  • Illegal drug trade (2)
  • Indecent assault (1)
  • India (1)
  • Injury (1)
  • Innocence Project (1)
  • Insane Clown Posse (1)
  • Insurance (1)
  • International Association of Crime Analysts (1)
  • International Organization for Standardization (1)
  • Interpersonal relationship (2)
  • interview (1)
  • IRS tax forms (1)
  • Is forever Impossible (1)
  • Jack (1)
  • Jake Gyllenhaal (1)
  • James I of England (1)
  • Jane Hanlin (1)
  • Jansen (1)
  • Japan (1)
  • Jay Carney (1)
  • Jeff Smith (1)
  • Jefferson County (2)
  • Jeremy Bentham (2)
  • Jeremy Hammond (1)
  • Jerry Sandusky (2)
  • Joe Biden (3)
  • Joe Paterno (2)
  • Joey Ortega (3)
  • Johann Heinrich Schulze (1)
  • John (1)
  • John Davenport (1)
  • John Gotti (1)
  • John Herschel (1)
  • John Liebert (1)
  • John McClane (1)
  • Johnny Torrio (1)
  • Joseph Muscat (1)
  • Jovan Belcher (1)
  • JPEG (1)
  • Jury (2)
  • Jury selection (1)
  • Kansas City (1)
  • Kansas City Missouri (1)
  • Kaplan University (2)
  • Karl Marx (2)
  • Keene State College (1)
  • Kent (1)
  • Kentucky (1)
  • Kentucky Revised Statutes (1)
  • King James (1)
  • Knetzger (1)
  • La Mesa California (1)
  • labeling theory (1)
  • Labor Commissioner (1)
  • Lanza (1)
  • Latin Kings (1)
  • Law (32)
  • law enforcement (17)
  • Law enforcement agency (31)
  • Law enforcement officer (32)
  • Law Reform (1)
  • Lawrence Daly (1)
  • Lawrence W. Daly (43)
  • Lawrence W. Daly Forensic (3)
  • Lawrence W.Daly (1)
  • Lawsuit (4)
  • Lawyer (1)
  • Learning (1)
  • Legal burden of proof (1)
  • Legal Information (3)
  • Light (1)
  • LinkedIn (1)
  • Linux (1)
  • Lippman (1)
  • Lloyd Ohlin (2)
  • Long-term depression (1)
  • Louisiana (1)
  • Louisville Kentucky (1)
  • Lower Manhattan (1)
  • LulzSec (1)
  • Lupe Fiasco (1)
  • Mafia (1)
  • Make Me Rich (1)
  • Manhattan (1)
  • Mark Zuckerberg (1)
  • Market research (1)
  • Marlboro (1)
  • Marriage (1)
  • Martin Luther King (1)
  • Mass murder (1)
  • Massage (1)
  • Master of Science (13)
  • Math (1)
  • Medical Needs (1)
  • Medicare (1)
  • Medicare Part D coverage gap (1)
  • Menendez (1)
  • Mens Rea (1)
  • Mental disorder (4)
  • Mental health (6)
  • Mental Status Examination (1)
  • Merriam-Webster Dictionary (1)
  • Methodology (1)
  • Miami (1)
  • Michael Jackson (1)
  • Michael Jansen (1)
  • Michael Jordan (1)
  • Michael Pena (1)
  • Michael Peña (1)
  • Microsoft Excel (1)
  • Middle East (3)
  • Mike McQueary (1)
  • Mind Research Network (1)
  • Miranda (1)
  • Miranda warning (1)
  • mirandawarning (1)
  • Mirror neuron (2)
  • Mitt Romney (4)
  • Mobile phone (1)
  • Model Penal Code (1)
  • Modus operandi (2)
  • Monday (1)
  • Monsanto (1)
  • Montefiore Medical Center (1)
  • Morality (1)
  • Muhammad (1)
  • Muraski (2)
  • murder (6)
  • Muslim world (1)
  • MySpace (1)
  • National Collegiate Athletic Association (1)
  • National Conference of State Legislatures (1)
  • National Crime Information Center (5)
  • National Drug Intelligence Center (1)
  • National Flood Insurance Program (1)
  • National Football League (1)
  • National Gang Intelligence Center (1)
  • National Guard (1)
  • National Institute of Justice (4)
  • National Institute of Mental Health (1)
  • National Law Enforcement Officers Memorial (1)
  • National Museum of American History (1)
  • National Rifle Association (1)
  • NCAA (1)
  • New Jersey (2)
  • New York City (1)
  • New York City Police Department (1)
  • New York Law Journal (1)
  • New York Times (1)
  • Newtown (2)
  • Newtown Connecticut (1)
  • Newtown Connecticut (1)
  • NFAIS (1)
  • NFL (2)
  • Nidal Malik Hasan (2)
  • Nietzel (1)
  • Noncustodial parent (1)
  • Nonprofit organization (1)
  • Northern Virginia (1)
  • Obama (3)
  • Observational learning (2)
  • Ohio (3)
  • Ohio River (2)
  • Online Issues Polls (1)
  • Operating system (2)
  • Opioid dependence (1)
  • Organizations (2)
  • Organized crime (5)
  • Paranoia (1)
  • Paranormal (1)
  • Parent (2)
  • Pareto Principle (1)
  • Patient Protection and Affordable Care Act (1)
  • Paul Uhlenhuth (1)
  • Pedophilia (1)
  • Penn State (1)
  • Pennsylvania State University (1)
  • People (2)
  • Perkins (1)
  • pesticides (1)
  • Peter Mark Roget (1)
  • Peter Neufeld (1)
  • Peterson (1)
  • Petraeus (1)
  • Philosophy (2)
  • Photograph (2)
  • Photographer (1)
  • Photography (3)
  • Plaintiff (1)
  • police (19)
  • Police brutality (1)
  • Police car (1)
  • Police misconduct (2)
  • Police officer (7)
  • Political Rights (1)
  • Polls and Surveys (1)
  • Port of Seattle (1)
  • Posttraumatic stress disorder (2)
  • Pratt (1)
  • Pregnancy (1)
  • Preliminary hearing (1)
  • Prentice Hall (1)
  • prevention (2)
  • prison (3)
  • Prison officer (1)
  • Private investigator (1)
  • Pro se legal representation in the United States (1)
  • Products (1)
  • Professional sports (1)
  • Prosecutor (1)
  • psychology (2)
  • Punitive damages (1)
  • Puyallup Washington (7)
  • Racial Profiling (1)
  • Radford University (1)
  • Radio (2)
  • RadioShack (1)
  • Rahm Emanuel (1)
  • Rape (7)
  • Real estate investment trust (1)
  • Real evidence (2)
  • Reinforcement (2)
  • Relationships (1)
  • Relevance (law) (1)
  • Remington College (1)
  • Requesting Help (1)
  • research (7)
  • Research Ethics (1)
  • Richard Ramirez (1)
  • Robbery (3)
  • Robert Mueller (1)
  • Robinson (1)
  • Roger Goodell (1)
  • Romney (2)
  • Ronell Wilson (1)
  • Rookie Blue (1)
  • roundup (1)
  • Royal Commission (1)
  • Russ Stover (1)
  • Sabu (1)
  • Same-sex marriage (1)
  • San Antonio (1)
  • Sandusky (1)
  • Santa Fe New Mexico (1)
  • Saturday morning cartoon (1)
  • Savio (1)
  • schizophrenia (1)
  • Science in Society (2)
  • Scientific method (1)
  • Scott Hall (21)
  • Sculpture (1)
  • Sean Patrick Banks (1)
  • Seattle (2)
  • Second Amendment (2)
  • Second Amendment to the United States Constitution (1)
  • Secret Service (1)
  • security (1)
  • September 11 2001 (3)
  • September 11 attacks (1)
  • serial killer (4)
  • serial murder (1)
  • Sex and the law (1)
  • Sex offender (1)
  • Sex Offenses (1)
  • Sexual abuse (7)
  • Sexual Abuse and Assault (4)
  • Sexual assault (17)
  • Sexual slavery (1)
  • Sheriffs in the United States (1)
  • Sherlock Holmes (1)
  • Sherrill (1)
  • Shopping (1)
  • Shutter speed (1)
  • Siegel (5)
  • Sigmund Freud (1)
  • Skype (1)
  • Sleep (1)
  • Smartphone (1)
  • Smith (1)
  • Social Control Theory (2)
  • Social Learning Theory (1)
  • social media (1)
  • Social Media Network (1)
  • Social network (2)
  • Social networking service (1)
  • Social science (4)
  • Social Sciences (3)
  • Social work (2)
  • Soldier (1)
  • Sopranos (1)
  • Sound recording and reproduction (1)
  • South Bronx (1)
  • Soviet Union (1)
  • Spanish Army (1)
  • Spark Networks (1)
  • SPRUZ (1)
  • St. Louis (1)
  • Stacy (1)
  • Stanford University (1)
  • Statistical inference (1)
  • Statistics (1)
  • Steubenville (3)
  • Steubenville Ohio (1)
  • Steubenville High School (1)
  • Steubenville Ohio (5)
  • Steubenville Rape Case (1)
  • Strain Theory (1)
  • Stratfor (1)
  • Stress (2)
  • Strict liability (1)
  • Substance abuse (1)
  • Substance dependence (1)
  • suicide (1)
  • Support Groups (2)
  • Supreme Court (1)
  • Survey research (1)
  • Suspect (2)
  • SWAT (1)
  • Syria (1)
  • Tabetha Cooper (3)
  • Tammany Hall (1)
  • Tarrant County Courthouse (1)
  • Task force (1)
  • Techniques and Styles (1)
  • Techniques of neutralization (1)
  • technology (1)
  • Television (1)
  • Temporary Assistance for Needy Families (1)
  • Tennessee (1)
  • terrorism (1)
  • Terry stop (1)
  • Texas (1)
  • The Psychology of Marriage (1)
  • Therapy (1)
  • Thomson Correctional Center (1)
  • Thorsten Sellin (2)
  • Tip (gratuity) (1)
  • Tom Corbett (1)
  • Tort (2)
  • Trace evidence (2)
  • Training (1)
  • Triad (1)
  • Trigger point (1)
  • Truth Glasses (1)
  • Tulsa (1)
  • Tulsa Oklahoma (1)
  • Twitter (2)
  • Types of rape (2)
  • Tyrone Woods (2)
  • U.S. Department of Justice (1)
  • Uncle Bob (1)
  • Uncle Bob's Self Storage (1)
  • unhealthy foods (1)
  • Uniform Crime Report (3)
  • Unintended pregnancy (1)
  • United State (2)
  • United States (68)
  • United States Constitution (2)
  • United States Department of Homeland Security (1)
  • United States Department of Justice (3)
  • United States Department of State (1)
  • United States Senate Committee on Foreign Relations (1)
  • University of Oklahoma (1)
  • unsafe practices (1)
  • Upper Saddle River New Jersey (1)
  • US Department of Justice (1)
  • Vandalism (1)
  • Victimology (1)
  • victims (2)
  • Victor (1)
  • video (1)
  • Vincent Thomas Bridge (1)
  • Violence (2)
  • Violence and Abuse (6)
  • Violent Criminal Apprehension Program (1)
  • Virginia (2)
  • Voir dire (1)
  • Wage (1)
  • Washington (5)
  • Washington State Patrol (1)
  • Web Design and Development (1)
  • Webster (1)
  • well being (1)
  • West Virginia (1)
  • Western World (1)
  • White Hats (1)
  • White House (1)
  • William F. Miller (1)
  • William Herschel (1)
  • William J. Birnes (1)
  • William J. Bratton (2)
  • William Roy Wilson (1)
  • Wilson (1)
  • Windows (1)
  • Wisconsin Supreme Court (1)
  • Withdrawal (1)
  • Witness (1)
  • Women (1)
  • Woo Woo (1)
  • World Justice Project (1)
  • World Wide Web (1)
  • X-ray computed tomography (1)
  • Yakuza (1)
  • Yes (band) (1)
  • You Tube (1)

Blog Archive

  • ►  2013 (279)
    • ►  September (16)
    • ►  August (28)
    • ►  July (27)
    • ►  June (30)
    • ►  May (31)
    • ►  April (44)
    • ►  March (19)
    • ►  February (36)
    • ►  January (48)
  • ▼  2012 (221)
    • ►  December (47)
    • ►  November (46)
    • ►  October (50)
    • ►  September (52)
    • ▼  August (26)
      • Investigation Into Serial Murder- Proactive and Re...
      • Social Construction: A Study of Theories
      • Law Its Types And Differences
      • The Psychology of Jury Selection
      • The Importance of Ethics and Character in Law Enfo...
      • Terrorism Montage in C# Anyone ?
      • The Rule of Law is not Dead, or Even in Danger, Un...
      • Law Its Types And Differences
      • Martial Law
      • Today’s Investigative Special Report August 25, 20...
      • Today’s Investigative Special Report August 26, 20...
      • Law and Society
      • Exploring Computer Operating Systems to Investigat...
      • The Rule of Law is not Dead, or Even in Danger, Un...
      • Today’s Investigative Special Report August 23, 20...
      • Law Its Types And Differences
      • Mental Disorders – Paranoia, Symptoms and Potentia...
      • Today’s Investigative Special Report August 21, 20...
      • Martial Law
      • Law and Society
      • The Rule of Law is not Dead, or Even in Danger, Un...
      • Law Its Types And Differences
      • Today’s Investigative Special Report August 18, 20...
      • Martial Law
      • Today’s Investigative Special Report August 17, 20...
      • Law and Society
Powered by Blogger.