Laws and Law Discussion

From the first time a rumor went by that the FCC was going to institute a "modem tax" (this one shows up about every two years without fault), BBS users took an interest in the funny little laws that govern the country and how the jackasses in the funny white building were going to mess up the fun. To this end, transcripts and discussions about laws have been around for a long time.

Because of the somewhat odd subject matter of some of the files, some of the files you would expect to be located in this section are also located in the politics section. Some of these files would probably be better put in the Politics section as well.

Oh, and this would normally go without saying, but it's probably not a good idea to depend on these files for actual, your-property-and-well-being law advice. Sometimes the law has radically changed since the file was written, or the file falls under that special "The US never submitted a full approval to all 50 states so actually you can punch a cop" type of conspiratorial section. See also conspiracy.


Filename
Size
Description of the Textfile
1changin01.law 12257
Counterintelligence Challenges in a Changing World, by William S. Sessions, Director, FBI
1stamend.txt 7883
A Showdown Over Computer Crime, by Brooks Boliek (August 5, 1990)
1urbanp01.law 10189
Urban Transportation Security, by Robert W. Dart, Chicago Police
250law.law 3164
Section 250.12 of the Model Penal Code: Violation of Privacy
251law.law 4324
Section 251.4 of the Model Penal Code: Obscenity
2corrupt05.law 16903
Corruption: A Continuing Challenge for Law Enforcement, by Otis E. Cooksey, Military Advisor
2developp04.law 17004
Developing Police Leadership, by Paul Mansen, Sergeant, Rochester Police
3fbipri10.law 15488
Foreign Counterintelligence: An FBI Priority, by James E. Tomlinson, FBI
3polpracp09.law 4273
Police Practices: Telemarketing Crime Prevention, by David I. Rechenmacher, Illinois Police Department
4polprac14.law 9088
Police Practices: Ministers Team With Police to Keep the Peace
4pusherp10.law 17880
The Respectable Pusher, by Jeffrey D. Lane, Office of the Secretary of State, Atlanta
5badchecp15.law 15290
Taking the Bounce Out of Bad Checks, by Vinse J. Gilliam, DA's Office, Ventura Country CA
5espion17.law 10534
Espionage Awareness Programs, by Freddie L. Capps, Jr. Special Agent, FBI
6poview20.law 7395
Point of View: Managing for Excellent, by David A. King, Chief of Police, Perkasie Police
6resforup20.law 6022
Research Forum: McGruff Robot Teaches Kids
7crowdcop22.law 11710
Effective Crowd Control, by Steven J. Schmidt, Kentucky Police
7drugtes22.law 12058
The Kentucky State Police Drug Testing Policy, by W. Michael Troop, State Police of Kentucky
8civilfop26.law 24042
Civil Forfeiture: Real Property Used in Drug Trafficking
8interro28.law 21091
Custodial Interrogation: Impact of Minnick V. Mississippi by Kimberly A. Crawford
93dec001.txt 11014
Leadership in the Nineties, by Ronnie Garner, M.P.A.
93dec002.txt 10340
Employee Empowerment by Shelia Berglund
93dec003.txt 5183
Police Practices: Citizen Advisory Committees by Major Dan Flynn, M.P.A.
93dec004.txt 12706
Positive Organizational Culture: A Preactical Approach by Randall Aragon, M.A.
93dec005.txt 20150
The Family and Medical Leave Act by Jeffrey Higginbotham, J.D.
93jun001.txt 20680
Eyesight Standards: Correcting Myths, by Richard N. Holden, Ph.D.
93jun002.txt 8259
The Computer: High-Tech Instrument of Crime by Michael G. Noblett
93jun003.txt 11852
Elevator Vandalism Squad by Ronald Welsh
93jun004.txt 7200
Police Pracices: Drug Educaiton Saving America's Youth, by Damon Davis
93jun005.txt 14677
Police Violence: Addressing the Issue, by Daniel B. Boyle
93jun006.txt 5655
Focus on Training: The Americans with Disabilities Act, by John A. Leonard
93jun007.txt 34650
Computer Searches and Seizures: Challenges for Investigators, by John Gales Sauls
9brief.txt 2274
A Legal Brief by Special Agent Jeffrey Higginbotham (Probable Cause Determination)
9briefp32.law 2278
Legal Brief by S.A. Jeffrey Migginbotham, Legal Instructor, FBI
abouteff.law 9090
General Information about the Electronic Frontier Foundation
academy10.law 12379
Citizen Police Academies by Martin Alan Greenberg, Dept. of Criminal Justice, Ulster Community College
afis.law 6899
Police Practices: AFIS Technology for Rural States
aicnews.1 33391
Arizona Identification Council NEwsletter, July, 1990
al_lawsta.law 7521
The Alabama Computer Crime Act, 1985
alcor-1 2506
ALCOR Files Suit Over Electronic Mail Seizure, by David Bloom, Feb 24, 1990
alcor-2 10036
Transcript of Suit by ALCOR
alcor-3 21192
Additional Filings in ALCOR BBS Case
alcor-4 13439
Response of ALCOR Lawyer to Motion Filed
alcor-5 7727
File Round of Motion Filed in Alcor Court Case
alcor-6 4381
The Resolution of the Alcor E-mail privacy Case
alcor-7 14366
Response of William F. Murphy to ALCOR Suit
alcor-8 37303
Bill Submitted in ALCOR BBS Case
alcor-9 10212
Appeal of dismissal in ALCOR BBS Case
anarchy.ripco 273415
The Modern Speeders Guide to Radar and State Troopers, by Exilic Xyth (January 11, 1988)
anti-hac.txt 8315
A Bill Against Hacking, from Emma Nicholson
ar_lawsta.law 5628
Arkansas Regulations on Computer Crime, 1987
arrest.txt 10256
Your Rights and What to Do Upon Arrest, by Michael J. Elliott, Criminal Defense Attorney
articles.law 146119
Bibliography of Computer Security Articles 1983 through 1988
asmp-gui 17486
American Society of Magazine Photographers 1991 Copyright Guide
az_lawsta.law 3086
Arizona Computer Crimes Law, 1978
babbs001.txt 8498
Anti Federal Agent BBS Protection, by Babbs Boy
banking.off 16949
Privacy and Offshore Banking... What the IRS Doesn't Want You to Know! By David Johnson (July 5, 1994)
bbs-suit.txt 12289
Civial Action No. IP-88 93C: Linda Thompson vs. Bob Predaina
bbs_and_ 58600
The Electronic Pamphlet: Computer Bulletin Boards and the Law by Michael H. Riddle (1990)
bbs_law.law 58671
Computer Bulletin Boards and the Law, by Michael M. Riddle (Law Study)
bbsdefa.law 106099
Defamation Liability of Computerized Bulletin Board Operators and Problems of Proof, by John R. Kahn
bbslaw.man 40181
Version 1.1 - BBS LEGAL GUIDE by Clary and Kraft, 1993
bbslaws.txt 54725
THe Legal Aspects of Telecommunications and Electronic Bulletin Board SYstems, by James J. Spinelli
bellraid.txt 12560
The Future of Telecommunications.......
bendix.txt 20856
Crosley Bendix (Negativland) Discusses The Copyright Act (November 9, 1992)
blue.law 27975
Death of the Blue Box, by Full Disclosure, 1991
brave.yes 4352
Smart Brave Lady indicates that we are not Drivers, and therefore do not need a license.
caddraft.law 7144
Police Practices: Computer Aided Drafting for Law Enforcement
candp.law 64505
Crime and Puzzlement by John Perry Barlow
candp2.law 8090
Update on Crime and Puzzlement by John Perry Barlow, 1990
cardozo.txt 21349
Some "Property" Problems in a Computer Crime Prosecution by Mike Godwin of the EFF
cellmate.law 29382
Cellmate Informants: A Constitutional Guide to Their Use, by Kimberly Kingston Crawford, FBI Academy
cellmate.txt 29316
Cellmate Informants: A Constitutional Guide to Their Use, by Kimberly Kingston Crawford
chomloot.txt 43325
Noam Chomsky writes a letter to Lies Of Our Times, May 1991
ciabwash.law 48132
CIA Memorandums on Brainwashing
citizen1.txt 94984
Studies in Constitutional Law: A Treatist on American Citizenship by John S. Wise
citizen2.txt 31969
Chapter 2: How American Citizenship May be Acquired in the Nation
citizen3.txt 43595
Chapter 3: Of the Obligation and Duties of the Citizen to the Nation and the States
citizen4.txt 202375
Chapter 4: Of the Rights, Privileges, and Immunities of the Citizen
citizen5.txt 122539
Chapter 5: Privileges and Immunities Under the War Amendments
citizens.gui 94355
A Citizen's Guide on using the Freedom of Information Act and the Privacy Act of 1974 to Request Government Records (July 10, 1991)
civil.dis 63050
Civil Disobedience, by Henry David Thoreau
civlib.law 24676
Civil Liberties in Cyberspace: When does Hacking Turn from an Exercise of Civil Liberties into Crime? By Mitch Kapor, Scientific American, 1991
civlrght.txt 15090
Civil Rights Cases and Police Misconduct, by John Epke
civlrght14.law 15156
Civil Rights and Police Misconduct, by John Epke and Linda Davis
clipper1.asc 13335
Remarks by Bruce Sterling at the Fourth Annual Conference on Computers, Freedom, and Privacy
closenet.law 31990
Closing the Net, by Greg Costikyan (On Operation Sun-Devil)
co_lawsta.law 3697
Colorado Crimes Law,
cog_inte.law 18187
Cognitive Interviewing, by Margo Bennett, FBI
compacs.txt 62976
The Limits of the Law in Restricting Computer Misuse, by Peter Sommer (March 19, 1991)
compcrim.txt 13559
Computer Crimes: An Escalating Crime Trend by William S. Sessions
compriv.law 46706
Computer Privacy vs. First and Fourth Amendment Rights, by Michael S. Borella
compsent 13603
Revised Computer Crime Sentencing Guidelines, from Jack King (1992)
compuser 9768
What is a Compilation Copyright? The Gospel According to Compuserve (December 3, 1987)
compuser.law 9839
Compuserve's Position: What is a Compilation Copyright?
computer.cri 101985
Computer Crime: Current Practices, Problems and Proposed Solutions, Second Draft, Brian J. Peretti
confess.law 15893
Why Suspects Confess, by David D. Tousignant, Inspector, Lowell Massachusetts
confess.txt 15834
Why Suspects Confess, by David D. Tousignant
consoli.law 17512
Public Services Consolidation: The Answer to your Community's Needs, by Robert L. Sobba, Chief of Police, Idaho Police
const_in.cyb 47714
Laurence H. Tribe, "The Constitution in Cyberspace"
copr.txt 35200
How to Copyright Software, by Locus, Inc. (1990)
cops 19373
If YOu Have to Ask, Get Out of the Way, by Chuck Milland
cops.txt 22258
Why Cops Hate You: If You Have to Ask, Get Out of the Way
copstamp.txt 5209
Police Tampering: How Often and Where, by Alan Deshowitz
coptalk.txt 3509
Don't Talk to Cops, by Robert W. Zeuner, Member of the New York State Bar
copy.txt 10702
Software and Copyrights: Registration, Notice and Why by Charles B. Kramer (January 8, 1992)
copyr 29718
Copyright Information, by Inez Harrison
copyrigh.txt 3949
Legal Brief: Software Copyright Law (December 1985)
copyrit1.law 6569
Copyrights and Computer Software: An Introduction, by Sam Kitterman, Jr.
copyrit2.law 7671
Copyrights and Computer Software: Part II, by Sam Kitterman, Jr.
copyrit3.law 10500
Copyrights and Computer Software: Part III, by Sam Kitterman, Jr.
copyrit4.law 7459
Copyrights and Computer Software: Part IV, by Sam Kitterman, Jr.
copyrit5.law 8454
Copyrights and Computer Software: Part V, by Sam Kitterman, Jr.
copyrite.c64 11596
Commodore's Extremely Silly Liscence for Workbench 1.3.2
copyrite.doc 4352
Copyright Information for Computer Software Hacks from June B. Moore
copyrite.inf 5888
Answering Some Questions about the Ditribution of Public Domain Software by Ron Fowler (April 12, 1984)
copyrite.law 47252
Large Overview of American Copyright Law
copyrite.txt 23296
Copyright Law from Jordan J. Breslow (February 13, 1986)
copyrt.txt 35833
Copyright law and Liscence Law as Applies to Computer Software
copyso.txt 7534
Software and Copyrights: Registeration, Notice and Why by Charles B. Kramer, Esq. (September 25, 1991)
correct.txt 11036
The Principle of Correct Absue
couriers.txt 25253
Detaining Suspected Drug Couriers: Recent Court Decisions
couriersp27.law 25319
Detaining Suspected Drug Couriers: Recent Court Decisions, by William U. McCormack, Special Agent, FBI Academy
court.law 43260
The Transcript of Craig Neidorf's Trial
court.txt 7683
Disorder in the Court! (Funny Court Transcripts)
cright3.txt 12068
Copyrighting Public Domain Programs by June B. Moore, JD
crime.txt 26658
The Grolier Electronic Encyclopedia Definition of Crime
crimecatalog.cmp 463516
The Crimefighters' Catalog of Special Purpose Books and Videos
crimefighter.cmp 714942
The Crimefighters Compilation
crimeftr.000 7079
Table of Contents and Quick Tutorial
crimeftr.002 17723
Why Police Can't Cope, and The Need for CrimeFighters
crimeftr.003 15130
Crime Stoppers and We-Tip's Formula for Rewards
crimeftr.004 8493
Catch-all Reward Law: $25,000 - All Felonies, All States
crimeftr.005 20017
Fines & Forfeiture Laws: 50% Paid to CrimeFighters!
crimeftr.006 40146
Misdemeanors and Do-It-Yourself Lawsuits
crimeftr.007 22381
Qui Tam Law: Be the Prosecutor - Control Plea Bargaining
crimeftr.008 24285
Civil & Criminal RICO Laws
crimeftr.009 30886
Drunk Driver Terminators (D.D.T.) Patrols - to Get Started
crimeftr.010 29385
Drug Laws & Drug Wars - Unlimited Business Opportunities
crimeftr.011 46642
Polluter Tooters: Anti-Pollution laws, MEGABUCK Rewards
crimeftr.012 17812
Terrorists, Assassins, and Police Corruption
crimeftr.013 23155
Bounty Hunters, Bail Bond Agents and Skip Tracers
crimeftr.014 29522
U.S. Customs/Coast Guard Laws, Mechanics' Laws
crimeftr.015 23075
Post Office Rewards, Scams, Cons, Frauds
crimeftr.016 34324
Wildlife Protection/Poaching, Conservationists Laws
crimeftr.017 28625
National Forests (Vandalism, Pot Growing, other laws)
crimeftr.018 33379
Wiretap and Blackmail Laws & Rewards for CrimeFighters
crimeftr.019 22056
Misc Rewards for This and That (Dozens of them)
crimeftr.020 9940
State Reward Laws
crimeftr.021 15252
Crime Information, Your Right to Withhold for Rewards
crimeftr.022 45203
Citizen Arrests - What you Need to Know
crimeftr.023 19144
High Speed Pursuits - Unlike Smokey and the Bandit!
crimeftr.024 19490
Rules of Evidence - Entrapment Explained
crimeftr.025 17904
Where to Get CrimeFighter Training
crimeftr.026 23422
High Tech Tools of the Trade - Where to Get Them
crimeftr.027 25320
Problems with Prosecutors and Plea Bargaining
crimeftr.028 18991
How to Calculate Rewards, Proposed CrimeFighters Reward Law
crimeftr.029 16496
CrimeFighters International, Inc. Membership info.
crimeftr.030 4828
Membership Application
criminal.law 17091
Criminal Informants: An Administrator's Dream or Nightmare? By Harry A. Mount, Jr.
criminal.txt 17025
Criminal Informants: An Administrator's Dream or Nightmare? By Harry A. Mount, Jr.
cripple.txt 2387
The Experience of a Shareware Author by Frank Bell of NEWKEY
cryptlaw 12456
Crypto-Law Survey by Bert-Jaap Koops (July, 1995)
csa87.law 27719
National Act on Computer Crime, Act 100-235
csbylaws.law 27217
By-Laws of the Communications Security Association, Inc.
cslaw.law 14407
Computer Security And the Law, by Gary S. Morris
ct_lawsta.law 10096
Computer-Related Offenses from the Connecticut General Statutes
cyberlaw.law 21266
Cyberspace and the Legal Matrix: Laws or Confusion?
cyblaw.txt 22150
Cyberspace and the Legal Matrix: Laws or Confusion?
cybspace.txt 21027
Cyberspace and the Legal Matrix: Laws or Confusion?
cycrime0.txt 28434
Emmanuel Goldstein on the E911 Affair
dblaw.txt 33393
Legal Protection of Computer Databases, by Ralph C. Losey
define.stb 8490
Definitions of Legal Terms
deflib.bbs 103794
Defamation Liability of Computerized BBS Operators and Problems of Proof by John R. Kahn
delibera.leb 23079
Deliverate Indifference: The Standard for Municipal and Supervisory Liability by Michael Callahan
denning 58773
Concerning Hackers Who Break into Computer Systems, by Dorothy Denning, October 1st, 1990
dennis_h 76080
The Price of Copyright Violation from Dennis Jayes
dial911.die 26086
Dial 911 and Die by Aaron Zelman and Jay Simkin (December 15, 1992)
dir_mesgp01.law 3432
Director's Message, May 1991, by William S. Sessions, FBI
disabil25.law 34116
The Americans With Disabilities Act, by Jeffrey Higginbotham, FBI
disaster.law 17512
Disaster Operations: Not Business as Usual, by Michael Guerin, Governor's Office, Ontario, California
disclaim.txt 4911
An Example Set of Disclaimers, Rules and Regulations
disk-fee.txt 9087
The Great "Disk Fee" Fallacy for Public Software Distribution
dispatch.law 5902
Point of View: Dispatching Units: Improvements for the First List, by Bob Blankenship, Chief, Redding, California Police
dmessage.law 3883
Director's Message, April 1991, by William S. Sessions, FBI
dmessage.leb 3505
Director's Message: Police and Citizens Working Together by William Sessions
doggie.txt 25984
The Great American Dog Trial Vendetta by P. Remington Adams (1991)
domestiv.law 24459
Domestic Violence: When do Police Have a Constitutional Duty to Protect? by Daniel L. Schofield, FBI
downtime.bul 806
Example of a Policy Regarding BBS Downtime
drivers.law 3462
Research Forum Survey Results: Driver License Suspension programs
driving.bar 49544
The (Almost) Definitive Answer to Driving Barefoot in America (1994)
drugdiv.txt 13651
Pharmaceutical Diversion and Abuse: Our Nation's Other Drug Problem, by Thomas C. Babicke
drugdivp01.law 13717
Pharmaceutical Diversion and Abuse: Our Nation's Other Drug Problem, by Thomas C. Babicke, DEA, Virginia
drugtest.txt 13065
Drug Abuse and Testing in Law Enforcement: No Easy Answers, by Andrew J. Harvey
drugtestp12.law 13131
Drug Abuse and Testing in Law Enforcement: No Easy Answers by Andrew J. Harvey, Sergeant, California Police
dunnel.txt 3708
The Dunne Act Introduced in NY for Computer BBSes (May 15, 1989)
e-law.txt 203190
E-Law: legal Issues Affecting Computer Information Systems and System operator Liability, by David J. Loundy
ecpa.lay 10286
The Electronics Communications Privacy Act of 1986, a Layman's View by Michael H. Riddle
ecpa1law.law 40796
Electronic Communication Privacy Act: Chapter 119
ecpa2law.law 34493
Electronic Communication Privacy Act: Part II
ecpa3law.law 33464
Electronic Communication Privacy Act: Part III
ecpalay.law 10524
The Electronic Communications Privacy Act of 1986: A Layman's View, by Michael M. Riddle
edwards.law 25695
Edwards vs. State Farm Insurance
edwards_ 11517
The Processes by which the Secret Service Investigates Computer Crimes
eff-righ.txt 31722
Legal Overview: The Electronic Frontier and the Bill of Rights (July 10, 1990)
eff.law 69535
The Founder of the Electronic Frontier Foundation get back to you about Their Plans
eff.txt 42240
The Foundation of the Electronic Frontier Foundation (July 10, 1990)
effbor.law 13014
Legal Overview: The Electronic Frontier and the Bill of Rights
effss.law 35098
Civil Liberties Implications of Computer Search and Seizures: Some Proposed Guidelines for Magistrates Who Issue Search Warrants
elbarasn.107 14592
Electronic Bar Association Announced by Paul Bernstein
elec_bbs.law 12761
Electronic Bulletin Boards: A New Resource for Law Enforcement by Seth Jacobs, SEARCH Group
electrif.law 56463
Electrifying Speech: New Communications Technologies and Traditional Civil Liberties
email 21657
Some Policies on Electronic Mail: A Summary by Todd Hooper
email_pr 19636
Computer Electronic Mail and Privacy: The Law, by Ruel T. Hernandez, January 11, 1987
emailpri.law 14786
Overview of the Employee Privacy Laws as Currently Apply
emailprv.law 5801
Bibliography on Law and Computers
embezzle.law 12290
Bank Employee Embezzlement by Denise M. Dube, LA DA
employleb.law 20142
Employee Development Programs, by John L. Pape, Chief of Police
entrapmtdoc.law 10624
The Defense of Entrapment as it Applies to Bulletin Board System Operators, by Randy B. Singer, Esq.
envhook.txt 59071
The Environmental Movement and the Value of "Moderation" by Brian K. Yoder (1992)
ep_forum.law 10665
The Environmental Protection Forum, by Michael A. O'Brien, Start Attorney Office, Florida.
ethics.law 13373
Point of View: Rededicating Ourselves to Leadership and Ethics in Law Enforcement, by Vane. R. King, Flint Michigan Police Department
ethics.txt 8140
Ethics for BBS Users
fbi 27677
Excerpts from the FBI & Your BBS (From Ripco)
fbi-miss.txt 2678
The FBI Mission Statement
fbi_mail.txt 3652
Appeal Filed in Todd Patterson v FBI Case (July 26, 1989)
fbiaug01.law 19065
Accreditation: A Small Department's Experience by Raymond E. Arthurs, Chief, Willowbrook Police
fbiaug02.law 16027
Odometer Rollback Schemes, by James E. Scripture, Special Agent, FBI, Boston Massachusetts
fbiaug03.law 4768
Police Practices: Custom's BET Program
fbiaug04.law 14228
The Tactical Incident: A Total Police Response by Nicholas F. Kaiser, MA, Troy Police
fbiaug05.law 9910
A New Approach to FTO Training by Blair Rankin, North Carolina Police
fbiaug06.law 8248
Focus on NCIC: Identifying the Unidentified
fbiaug07.law 26013
The Federal Grand Jry: Exceptions to the Rule of Secrecy (Part I)
fbijul01.law 14832
Lateral Entry: A Move Toward the Future, by J. Eddie Nix, Leut. Cobb County, Georgia Police
fbijul02.law 23307
Confronting the Terrorist Hostage Taker, by G. Dwayne Fuselier, FBI
fbijul03.law 5432
Police Practices: Bomb Dog Teams
fbijul04.law 12651
Campus Security: The Mule Patrol, by James A Huff, Central Missouri State University Campus Police
fbijul05.law 15216
The Forensic Anthropologist, by Robert W. Mann, MA, Smithsonian Institution
fbijul06.law 3305
Focus on Crime Prevention: Business and Government Working Together
fbijul07.law 23458
Anticipatory Search Warrants, by A. Louis DiPietro, FBI
fbijun01.law 13907
The Yardies: England's Emerging Crime Problem, by Roy A. C. Ramm, Detective Chief Superintendent, London England
fbijun02.law 3243
Focus on Forensics: Latent Shoeprint Analysis
fbijun03.law 9597
Towing Companies: Friends or Foes? By Michael C. Gillo, Attorney's Office, Ft. Lauderdale, Florida
fbijun04.law 4594
Police Practices: The Nelson-Denny Experiment
fbijun05.law 15473
Facility Planning In Colorado: Form Vs. Function by James D. Munger, Colorado Springs
fbijun06.law 7208
Records Management in the 1990s by Daniel L. Arkenau
fbijun07.law 9548
Research Forum: FBINA Graduate Survey
fbijun08.law 7980
B.L.O.C.: Business Leaders Against Organized Crime, by Mike King, Administrative Assistant, Weber County, UT Attorney's Office
fbijun09.law 24198
DNA Testing and the Frye Standard, by Robert A. Fiatal, FBI
fbitop10.hum 3926
FBI Top Ten Countdown, January, 1986
feb01.law 15673
Privitization of Prisons: Fad or Future, by Lt. David K. Burright, Linn County Sheriff's Office, Albany, OR
feb02.law 9169
The Administrative Warning Ticket Program by Lt. Andrew J. Barto, Romeoville, IL
feb03.law 3524
Arson Investigations by William A. Tobin, FBI Laboratory
feb04.law 21880
The Criminal Behavior of the Serial Rapist, by Robert R. Hazelwood, MS, Behavioral Science Instruction/Research Unit
feb05.law 5964
Large Vehicle Stops
feb06.law 10325
Critical Incident Stress Debriefing
feb07.law 31199
Foriegn Searches and the Fourth Amendment, by Austin A Andersen, LL.B>, FBI
feb08.law 5297
Florida's Computer Crime
fed_lawsta.law 8535
Federal Computer Crimes Law, 1984/1986
fedbbs3.lst 6478
Federal Public Access Bulletin Boards, March 1989
fedcompseize.txt 315003
The Federal Computer Seizure Guidelines (1994)
federal.leb 24029
The Federal Grand Jury: Exceptions to the Rule of Secrecy (Part II) by Austin A. Anderson
fencesp06.law 15145
ROP-ing In Fences, by James Rainum, Officer, Repeat Offender Project, Washington DC
fija.txt 9501
A New Hope for Freedom: Fully Inform Jurors by Don Diog
fija02.txt 6668
If You're Called for Jury Duty, by Don Doig
files.tut 2360
File Transfer Liability
finalmo.txt 24624
An Attempt to Modify Phone Rules for BBS Lines by Missouri, 1992
fl_lawsta.law 8475
Florida Computer Crimes Act, 1978
foia-pa.txt 162806
A Citizen's Guide on Using the Freedom of Information Act and the Privacy Act of 1974 to Request Government Records (September 20, 1991)
foia.txt 30272
Using the Freedom of Information Act
foiacit.txt 92726
A Citizen's Guide to using the Using the Freedom of Information Act and the Privacy Act of 1974 to Request Government Records (July 10, 1991)
forbes.txt 5241
A Little Perspective, Please, by Mitchell Kapor of the EFF (June 21, 1993)
forenp11.law 12226
The FBI's Forensic DNA Analysis Program, by Jay V. Miller, FBI
funny.txt 17655
Very Large Rant and Sales Pitch about Paper Money Being Evil
ga_lawsta.law 7868
The Georgia Computer Crimes Law
grandjur.txt 25954
The Federal Grand Jury: Exceptions to the Rule of Secrecy by Austin A Andersen
gunshot.txt 11888
Gunshot Primer Residue: The Invisible Clue by Roger W. Aaron
gunshotp19.law 11954
Gunshot Primer Residue: The Invisible Clue, by Roger W. Aaron, FBI Laboratory
gvtscrcy.txt 3328
The Government's Mania for Secrecy, 1987
hackers0.law 464
Introduction to the San Luis Obispo Incident
hackers1.law 5653
Amateur Hackers Tripped Up, by Danna Dykstra Coy
hackers2.law 6889
Computer Case Takes a Twist, by Danna Dykstra Coy
hackers3.law 2883
Hackers Off Hook, Property Returned, by Danna Dykstra Coy
hackers4.law 8012
A Case for Mistaken Identity... Who's Privacy Was Really Invaded?
hakharas.txt 4186
Hackers and the Authorities: A Question of Harassment, as Seen in an Article from a Recent Newspaper on November 15, 1992
handbook.txt 74752
What You Should Know if You're Accused of a Crime by Joyce B. David Esq.
hategrou.law 13409
hate Violence In the United States, by Floyd I. Clarke, FBI
hategrou.txt 13345
Hate Violence in the United States, by Floyd I. Clarke
hi_lawsta.law 7266
Hawaii Computer Crimes Law, 1984
hightech.law 14116
A Low Cost Approach to High Technology, by Mark Clark, Lt. South Portland, ME Police
hightech.txt 14103
A Low Cost Approach to High Technology by Lt. Mark Clark
homeless.law 16425
Police and the Homeless, by Barney Melekian, Lt. Santa Monica, California Police
homeless.txt 16418
Police and the Homeless by Barney Melekian
hostage.law 25433
Hostage/Barricade Incidents: High Risk Factors and the Action Criteria by G. Dwayne Fuselier
hostage.txt 25367
Hostage/Barricade Incidents: High Risk Factors and the Action Criteria by G. Drawyne Fuselier
hostaker.txt 23235
Confronting the Terrorist Hostage Taker by G. Dwayne Fuselier
hotel.law 6493
Police Practices: Operation Hotel-Motel
howtobeattheirs.txt 10834
Tax Resistance Primer: How to Beat the IRS
howtosel.txt 4224
Making Shareware Pay, by Gary Raymond
ia_lawsta.law 7233
Iowa Computer Crimes Law, 1984
id_lawsta.law 3358
The Idaho Computer Crimes Law, 1982
ident.txt 20441
Identification: A Move Towards the Future by Bruce J. Brotman
identp01.law 20508
Identification: A Move Towards the Future, by Brice J. Brotman
il_lawsta.law 10564
The Illinois Computer Crimes Law, 1981/1987
in_lawsta.law 2091
The Indiana Computer Tampering Law, 1986
intrundg.txt 18096
An Introduction to the Computer Underground, by The Butler (February 26, 1991)
invbasic.law 12444
Environmental Crimes: Investigative Basics, by Martin Wright, Dept. Assistant Director, EPA
invbasic.txt 12378
Environmental Crimes: Investigative Basics by Martin Wright
irs-20q.txt 14464
IRS and Business Taxpayers Disagree Over Who Should be Considered Employees: Why, Results, Solutions
jan01.law 2790
Director's Message: Facing the Future, by William S. Sessions, Director, FBI
jan02.law 16437
The Future of Law Enforcement: Dangerous and Different, by Alvin and Heidi Toffler
jan03.law 28766
The Changing Face of America, by Robert C. Trojanowicz, Ph.D.
jan04.law 24159
The Future of Policing, by William l. Tafoyna, Ph.D.
jan05.law 20355
Public Law Enforcement/Private Security: A New Partnership? By Terrence J. Mangan
jan06.law 17733
A Look Ahead: Views of Tomorrow's FBI, by Richard Sonnichsen
jan07.law 19135
Tomorrow's America: Law Enforcement's Coming Challenge, by Rob McCord
jobhome.law 19064
Taking the Job Home, by Richard N. Southworth, Attorney General's Office, Virginia
joint-cu.art 12288
Joint Custody: A Simplistic Solution by Robert D. Felner and Lisa Terre
joyce 61696
Beyond the Orality/Literacy Dichotomy: James Joyce and the pre-History of Cyberspace by Donald F. Theall (May 1992)
judna.txt 27647
Judicial Acceptance of DNA Profiling by John T. Sylvester and John H. Stafford
judnap26.law 27713
Judicial Acceptance of DNA Profiling, by John T. Sylvester, J.D.
judseal.txt 22490
The Judicial Sealing Requirement in Electronic Surveillance: A Matter of Immediacy by Robert A. Fiatal
juryban.txt 2227
Local Jury Banned by Judge After Ruling Man Innocent
jurynul.txt 7467
Information on Jury Nullification
juryrig.txt 2013
How they Stack the Jury in Georgia
juryrite.inf 3553
Fully Informed Juries
juryrite.txt 6849
Toward a Bill of Jury Rights
ks_lawsta.law 4861
Kansas Computer Crimes Law, 1985
ky_lawsta.law 6331
Kentucky Computer Crime Law, 1984
la_lawsta.law 5581
The Louisiana Computer Related Crime Bill, passed in 1984
lawbbs.txt 13440
Directory of Law-Oriented Bulletin Boards, 1986
laws.txt 3394
Interesting US Laws, taken from the Seattle P-I
lebmay01.law 4214
Director's Message, Law Day 1990, by William S. Sessions, FBI
lebmay02.law 10020
G.R.A.M.P.A. COPS, by Jere L. Spurlin, Chief of Police, Ft. Meyers, Florida
lebmay03.law 12413
High School Suicide Case Intervention, by David Fisher, Pinnellas County, Florida, Sheriff's Office
lebmay04.law 7456
Police Practices: Elderwatch
lebmay05.law 6272
Police Practices: Selecting the Right Officers: DARE
lebmay06.law 18893
Analytical Intelligence Training, by Marilyn B. Peterson
lebmay07.law 12961
Law Enforcement Exploring, by Steve Farish, Texas Law Enforcement Explorer Advisor's Association
lebmay08.law 28146
Curtilage: The Fourth Amendment in the Garden, by John Gales Sauls, FBI
lebmay09.law 2569
Legal Brief: Maryland v. Buie, Supreme Court Decision
legal.tec 10585
Some Examples of Legal Loopholes by Keith K (February 13, 1994)
legalfnt.txt 9872
US Copyright Office Rules Font Software is Not Copyrightable (November 30, 1989)
leglbyt1.txt 18370
Legal Bytes Volume 1 Number 1 by George, Donaldson and Ford (1993)
leglbyt2.txt 26724
Legal Bytes Volume 1 Number 1, by George Donaldson and Ford (1993)
len.ros 190622
Complete information on the Len Rose (Legion of Doom Source Code) Case
listcoun.txt 37317
Large List of United States Counties
lith_law.txt 6728
Legally, Lithuania's Case is Open and Shut, by Vytautas Landsbergis, President of Lithuania
lotus.txt 13425
Discussion of Lotus' Plan to Sell personal Information
lvstops.txt 5898
Large Vehicle Stops from William D. Dean
mail_exp 24161
Obtaining Host and Address Information by Ron Ray
mailordr 4321
How to Successfully Buy Through Mail Order and Protect Your Rights
manage05.law 12078
What They Didn't Teach in Management School, by James D. Sewell, Ph.D., Florida Criminal Justice Executive Institute
maps_cop.in 5959
Cecil Adams on Copyright Traps in Maps (well, sort of)
mar90_1.law 17540
The Preliminary Investigative Process, by Chief Gordon F. Urlacher, Rochester, New York, Police Department
mar90_2.law 12111
Store Diversion Burglaries, by Detective Robert P. Meiners, Lincolnwood, Illinois, Police Department
mar90_3.law 5618
Police Practices: Operation Alert, by Captain Mark Willingham, Division of Alcoholic Beverages and Tobacco
mar90_4.law 13090
Police Retirement: The Impact of Change, by John M. Violenti, Ph.D, Department of Social and Preventive Medicine, SUNY New York
mar90_5.law 16601
Managing Police Basic Training Cirriculum, by Rene A. Browett, Northern Virginia Criminal Justice Academy
mar90_6.law 26939
Personal Liability: The Qualified Immunity Defense, by Daniel L. Schofield, S.J.D., FBI
massmodmtax.law 12184
New Massachusetts Modem Tax Proposed (For Real)
md_lawsta.law 4666
The Maryland Computer Crimes Law
medialaw.law 20297
Media Performance and International Law, by Howard H. Frederick, Ph.D.
medicp21.law 9547
Medicaid Fraud, by Larry L. Bailey, Colorado Attorney General's Office, Medicaid Fraud Control Unit, Denver Colorado
mi_lawsta.law 3615
The Michigan Computer Crimes Law
military.txt 8855
Military Support to Civilian Law Enforcement Agencies by R. Barry Cronin
militaryp24.law 8925
Military Support to Civilian Law Enforcement Agencies, by R. Barry Cronin, U.S. Marine Corps Headquarters
minnesot 2115
Minnesota Invokes Computer Law by Rachel Parker
mn_lawsta.law 12662
The Minnesota Computer Crimes Law
mo_lawsta.law 7198
The Missouri Computer Crimes Law, 1982
mobile.law 6210
Police Policies: Mobile Command Posts
morris.app 31927
The Court Case against Robert Tappan Morris, 1990-1991
ms_lawsta.law 7894
Mississippi Computer Crimes Law, 1985
mt_lawsta.law 3082
Montana Computer Law Statute
mulepat.txt 12585
Campus Security: The Mule Patrol, by James A. Huff
murphy.txt 6620
Murhpy's Law, and Similar Ilk
mvt.txt 13602
Motor Vehicle Theft Investigations: Emerging International Trends by Mary Ellen Beekman
mvtleb.law 13668
Motor Vehicle Theft Investigations: Emerging International Trends
nafta.txt 2639231
Complete Text of the North American Free Trade Agreement (NAFTA) Act (1993)
natural.law 72219
Natural Laws and Natural Rights by James A. Donald (February 28, 1993)
nc_lawsta.law 4713
North Carolina Computer Crime Law
ncic.law 8537
NCIC Training: Hit or Miss, by Don M. Johnson, FBI
ncic.txt 8180
Focus on NCIC: Identifying the Unidentified
ncic2.txt 8613
NCIC Training: Hit or Miss by Don M. Johnson of the FBI
nd_lawsta.law 1422
The North Dakota Computer Fraud and Crime Statute, 1987
ne_lawsta.law 4539
The Nebraska Computer Crimes Law, 1985
newlaw.txt 8949
Dangerous Copyright Law by Stephen Haynes (October 2, 1990)
nh_lawsta.law 8661
New Hampshire Computer Crimes, 1986
nj_lawsta.law 8133
New Jersey Computer-Related Crimes Law, 1984
nov_1.law 16726
The FBI's 10mm Pistol, by John C. All, FBI
nov_2.law 17796
Ammunition Selection: Research and Measurement Issues, by N. J. Scheers, Ph.D.
nov_3.law 15201
Utilizing Job Task Analysis, by Thomas J. Jurkanin
nov_4.law 22164
The Judicial Sealing Requirement In Electronic Surveillance: A Matter of Immediacy, by Robert J. Fiatal
nsa.txt 15721
Harry S. Truman's Declaration of the Creation of the National Security Agency (NSA)
nv_lawsta.law 5744
Nevada Computer Unfair Trade Practice Law, 1983
ny_lawsta.law 8412
New York Penal Law, Computer Crime, 1986
nyappl.law 12970
New York's APPL Program: A New Partnetship, by Anthony M. Voelker
odomroll.txt 15958
Odometer Rollback Schemes by James E. Scripture of FBI
ofc_lostp02.law 11067
Law Officers Killed: 1980-1989, Victoria L. Major, FBI
oh_lawsta.law 1100
Ohio's Computer Crime Law
olw1.txt 2432
Our Lawyer Writes #1: Rodent Milk
olw3.txt 2432
Our Lawyer Writes #3: Getting a Divorce, Quick and Easy
olw5.txt 2688
Our Lawyer Writes #5: I'm a Mistress, can I Get Anything?
op-clean.leb 12668
Operation Clean: Reclaiming City Neighborhoods by Richard W. Hatler
p_view.law 12141
Point of View: A Manager's Guide to Computer Projects, by Charles Brennan, Philadelphia, Pennsylvania, Police Department
p_view.txt 4991
Point of View: Campus Police by Gigi Ray of the Arlington Campus Police Department
p_viewp14.law 5057
Point of View: Campus Police
pa_lawsta.law 4695
Pennsylvania's computer crimes law, 1983/1986
passport.txt 1766
How to Get a State Passport
patrol.law 8785
Perspective: The Patrol Function, by Patrick V. Murphy, Former Police Commissioner of New York City
penreg.txt 30184
PENREG: A Database Management System Designed to Maintain and Manipulate Data Obtained through a Pen Register or DNR (1989)
plateaup16.law 9155
Plateauing in Law Enforcement, by James M. Childers, Lubbock, Texas, Police Department
pntview.txt 12266
Point of View: A Manager's Guide to Computer Products by Charles Brennan
pol-com.leb 18679
Community Policing is Not Police Community Relations by Robert C. Trojanowicz
pol-prac.leb 4546
Police Practices: Seat Belt Awareness Program
pol_com.txt 18613
Community Policing is not Police Community Relations by Robert C. Trojanowicz
pol_prac.txt 5620
Police Practices: Baited Vehicle Detail
pol_pracp10.law 6019
Police Practices: Alternate Fuel Program
pol_pracp24.law 5686
Police Practices: Baited Vehicle Program
police.evasion 20608
Exilic Xyth's Guide to 1st Level Police Evation (November 10, 1990)
policeevasion.txt 21345
Exilic Xyth's Guide to 1st level Police Evasion (November 10, 1990)
policemen.pig 3328
Calling a Policeman a Pig: A New Concept From The Anarchist Cookbook, by The Norwegian Monk
polprac08.law 4973
Police Practices: Miami's Ethnic Sharing Program
polpracp16.law 5678
Police Practices: Operation Star
pope.txt 11449
U.S. Computer Investigation Targets Austinites by Kyle Pope (March 17, 1990)
poster.txt 2432
Wanted Poster for John Richard, the Scofflaw Sysop
posting- 5290
The Risks of Posting to the Internet
posting_ 5289
The Dangers of Posting to the Net (A Visit from the FBI)
practice.law 6079
Police Practices: CHP Hazardous Waste Investigation Unit
practice.txt 3680
Police Practices: The Community Outreach Program
practiceleb.law 7257
Police Practices: Pennsylvania's Interdepartmental Communications System
preface.txt 20480
The Federal Zone: Cracking the Code of Internal Revenue by Mitch Modeleski (January, 1994)
prelimin.txt 17474
The Preliminary Investigation Process by Cheif Gordon F. Urlacher
presumed 157447
Presumed Guilty: The Law's Victims in the War on Drugs, 1991 by Andrew Schneider
primes.txt 22238
Primes, Codes and the National Security Agency by Susan Landau
privacy 45299
Computer Privacy vs. First and Fourth Amendment Rights, by Michael S. Borella, 1991
privatiz.nre 15151
The Privatized NREN, by Mitchell Kapor, Electronic Frontier Foundation, February 14, 1991
privpris.txt 15691
Privitization of Prisons: Fad or Future by Lr. David K. Burright
privsoc.law 10232
The Private and Open Society, by John Gilmore
prodigy.law 5118
Prodigy Stumbles as a Forum.. Again
promoteleb.law 15620
Promotion to Chief: Keys to Success in a Small Department
prosecut.law 21204
Evironmental Crimes Prosecution: A Law Enforcement Partnership, by Vincent A. Matulewich, Environmental Protections Bureau, New Jersey
pub_7277.asc 48987
Freedom From War: The United States Program for General and Complete Disarmament in a Peaceful World
pubprivs.txt 20291
Public Law Enforcement/Private Security: A New Partnership? by Terrence J. Mangan and Michael G. Shanahan
pview.txt 10861
Point of View: European Law Enforcement after 1992 by Jan Blaauw
pviewp18.law 10927
Point of View: Eurpoean Law Enforcement after 1945
quotes.txt 20330
Quotes from Many Historical Figures about Juries
ratpatro.law 11360
The Rat Patrol Rides! By Paul C. Ricks, Deputy Chief of Police, Colorado Springs
ratpatro.txt 11294
The Rat Patrol Rides! By Paul C. Ricks of Colorado Springs P.D.
rebuttal.txt 300445
Inslaw's Analysis and Rebuttal of the BUA Report
res-rev.leb 3696
Research Review: Police Use of Discretion: A Comparison of Community, System, And Officer Expectations
resmeas.txt 18051
Ammunition Selection: Research and Measurement Issues by N.J. Scheers and Stephen R. Band
response.txt 7842
A Case for Mistaken Identity... Who's Privacy was Really Invaded? by Jim Bigeloww
reviewl.law 8806
Book Review, "Liability" by Peter Huber
ri_lawsta.law 1950
Rhode Island Computer Crimes Law, 1979
riggs_co 55329
United States Vs. Riggs: Jacking into the Net with the Illinois District Court
rights.txt 30658
Why Your Rights are Guaranteed and should Not Be Taken Away
ripco-wa.rra 75314
Seizure Warrant for the Ripco BBS
ripco.law 13511
The RipCO BBS Seizure
ripcobbs 73736
Seizure Warrant Documents for the RIPCO BBS
safetyleb.law 10578
Safety Action Team, by Rod Englert, Oregon Sheriff
saucs1.txt 95531
The Shareware Author and User Case Study by Daniel Corbier (1994)
sc_lawsta.law 7604
South Carolina Computer Crime Act
school.law 13599
Preparing for School Crisis, by David Nichols, Ph. D.
school.txt 13534
Preparing for School Crisis, by David Nichols of Jacksonville State University (1991)
schoolcr.law 10368
School Crime Stoppers, by Bob Chance, Tulsa Oklahoma Police
schoolcr.txt 10303
School Crime Stoppers by Bob Chance of the Tulsa Police Department
sd_lawsta.law 3184
South Dakota Computer Crimes Law, 1982
search.txt 21769
Searches of Premises Incident to Arrest, by A. Louis DiPietro
searches.txt 30108
Emergency Searchs of Effects, by John Gales Sauls of the FBI Academy
searchp26.law 26342
Inventory Searches: The Role of Discretion, by Austin A Anderson
sentguid.law 9050
Proposed Amendment #59 to the Sentencing Guidelines for United States Courts
serologyleb.law 24819
Serolgical Evidence in Sexual Assault Investigations, by Robert R.J. Grispino, MA, Serolgy Unit, FBI
simson.sec 62214
An Introduction to Computer Security for Lawyers by Simson Garfinkel (1987)
sniper.txt 20441
Police Sniper Training by John Plaster of the Minnesota National Guard
sniperleb.law 20505
Police Sniper Training, by John Plaster, Instructor, MN Guard Counter Sniper School
softmark.asc 4237
Information and Documents Needed for Software Copyright Application
softmarkdoc.law 4295
Information and Documents Needed for Software Copyright Application
softpat.txt 86156
A Partial List of Software Patents, compiled by Michael Ernst (April 12, 1992)
srrapist.txt 21884
The Criminal Behavior of the Serial Rapist, by Robert R. Hazelwood
stcomplw 3165
A Cross-Reference of US States and Laws Written for Them
steroids.txt 16332
The Abuse of Anabolic Steroids by Charles Swanson, University of Georgia
steroids19.law 16398
Abuse of Anabolic Steroids, by Charles Swanson, Ph. D., U of Georgia
stripesp16.law 13643
Honolulu's Stripes: Training for Sergeants, by Robert D. Prasser, Captain, Honolulu Hawaii Police Department
suc-inte.txt 6281
Successful Interviewing by James R. Ryals, March 1991
sucinte.txt 6620
Successful Interviewing by James R. Ryals
sueirs.txt 6016
Wage Earners Should Consider Possibility of Suing IRS for Tax Refunds Rather Than Filing Exempt W-4 Forms by Bill Conklin
suicide.txt 12347
The High Scool Suicide Crisis Intervention by David Fisher of the Pinnellas Sheriff's Office
summary.txt 42517
The INSLAW affair: September 10, 1992
supreme.law 25869
Selected Supreme Court Cases: 1989-1990 Term: William U. McCormack, FBI
suprule1.txt 42376
The Rules of the U.S. Supreme Court
suprule2.txt 36427
The Rules of the U.S. Supreme Court (Part II)
suprule3.txt 36204
The Rules of the U.S. Supreme Court (Part III)
survive01.law 11830
The Will to Survive, by Stephen R. Band
swiss.txt 54666
Getting a Discretionary Swiss Banking Account
swt.txt 2009
Seizing Wire Transfers, by The Wall Street Journal (September 20, 1993)
sysops 21329
What Files are Legal for Distribution on a BBS?
targetd.law 14371
Washington D.C.'s Operation "On Target" by Eric W. Witzig, Ret., Washington DC Police
taxother.tut 9940
Tax Deductibility of BBS Operations
teamworkp06.law 12002
Teamwork: An Innovative Approach, by Alan Youngs, Captain, Lakewood Colorado Police
tempest.law 53840
Eavesdropping on the Electromagnetic Eminations of Digital Equipment: The Laws of Canada, England, and the United States
thefacts.law 105795
Push Button Felonies: KPFA-FM Radio Broadcast July 26, 1990
theft_of.sof 12513
Theft of Computer Software: A National Security Threat by William J. Cook
tm.tut 5077
Trademarks in Brief (Overview)
tn_lawsta.law 7152
Tennesse Computer Crimes Act
tomorfbi.txt 17669
A Look Ahead: Views of Tomorrow's FBI by Richard Sonnichsen, Gail O. Burton and Thomas Lyons
towingco.txt 9557
Towing Companies: Friends or Foes? By Michael C. Gillo
trash.law 21269
Trash Inspections and the Fourth Amendment, by Thomas W. Kukura, JD
trash.txt 21203
Trash Inspections and the Fourth Amendment, by Thomas V. Kukura of the FBI
travel.rgt 18188
A How-To Information Sheet for Sovereigns: A Challenge to the 6th Amendment's Jurisdiction by Howard J. Freeman (March 23, 1993)
tx_lawsta.law 5722
Texas Computer Crime Law
uic.law 19541
The League for Programming Freedom Statement
uncharte 62233
The Charter of the United Nations (July 7, 1994)
us&scon1.txt 126412
The United States and the States under the Constitution, by C. Stuart Patterson
us&scon2.txt 74338
The United States and the States under the Constitution, by C. Stuart Patterson (Part 2)
us&scon3.txt 162306
The United States and the States under the Constitution, by C. Stuart Patterson (Part 3)
us&scon4.txt 112100
The United States and the States under the Constitution, by C. Stuart Patterson (Part 4)
us&scon5.txt 200455
The United States and the States under the Constitution, by C. Stuart Patterson (Part 5)
us&scon6.txt 101176
The United States and the States under the Constitution, by C. Stuart Patterson (Part 6)
uscon.law 57050
The Constitution of the United States
userintf.cp 11618
Protecting Rights in User Interface Designs by Ben Shneiderman (November 27, 1992)
ut_lawsta.law 6859
The Utah Computer Crimes Act
va_lawsta.law 11468
The Virgina Computer Crimes Act
vic-wit.txt 16276
Victim-Witness Assistance by Joseph R. Luteran, March 1991
visiop08.law 8300
Visiophones: French High Tech Security, by Pierre Marie Bourniquel, Biarritz, France
wa_lawsta.law 2035
Computer Crimes Law in Washington State
waco.txt 38784
The Text of the Search Warrant from Waco, Texas
waiver.txt 10310
A Waiver of Claims pertaining to Adult Sections of Ryan's Bar BBS
way.law 9031
There's Gotta Be a Better Way, by Glen Roberts and Bill Wajk
weaponsp10.law 13094
Vehicular Long Barrel Weapons Mount, by David W. Pisenti, FBI
wi_lawsta.law 5655
Wisconson Computer Crimes Law
wv_law.law 8732
West Virginia Computer Crimes Law
wy_lawsta.law 7182
Wyoming Computer Crimes Law
yardies.txt 13795
The Yardies: England's Emerging Crime Problem, by Roy A.C. Ramm (January, 1988)

There are 533 files for a total of 16,062,590 bytes.