Property | Value |
rdfs:label | |
is dcterms:subject of | - National Identity Crimes Law Enforcement Network
- Web-cramming
- Public Order Act 1986
- CJIS Division
- Defense Central Index of Investigations
- Operation Buccaneer
- Economic Espionage: The Threat to U.S. Industry
- Situational Information Report
- U.S. National Central Bureau of INTERPOL
- Guidelines Regarding Disclosure to the Director of Central Intelligence and Homeland Security Officials of Foreign Intelligence Acquired in the Course of a Criminal Investigation
- Intrusion
- Exculpatory evidence
- National Strategy for Child Exploitation Prevention and Interdiction
- Entrapment
- Case history
- Northern California Computer Crime Task Force
- Putting an End to Account-Hijacking Identity Theft
- National Forensic Laboratory Information System
- National DNA Index System
- Intelligence Note
- United Nations Convention Against Transnational Organized Crime
- Tactical intelligence
- Criminal Justice Information Services Division
- Progress Report of the Department of Justice’s Task Force on Intellectual Property
- Informant
- Guidelines on General Crimes, Racketeering Enterprise, and Terrorism Enterprise Investigations
- The Attorney General's Guidelines for Domestic FBI Operations
- Bomb Arson Tracking System
- Global Infrastructure/Standards Working Group
- International Centre for Missing & Exploited Children
- U.S. v. Ahrndt
- Online Child Exploitation Across New Zealand
- Citizen and Law Enforcement Analysis and Reporting
- Covert agent
- Protection of Children Act 1978
- Task Force on Child Protection on the Internet
- Operation Digital Piratez
- Intelligence-led policing
- Criminal Information Sharing Alliance Network
- Critical Incident Response Group
- Property data
- System for Electronic Analysis and Retrieval of Criminal Histories
- Inference development
- Computer Analysis and Response Team
- High-technology crime
- Automated Case Tracking System
- Cyber enticement
- Repository for Individuals of Special Concern
- U.S. v. Weatherspoon
- Agent Provocateur
- High tech crime tools
- National Centre for Countering On Line Child Pornography
- Attempt
- Business record theft
- Counterfeit
- Criminal investigative analysis
- Trojan attack
- National Security Branch Analysis Center
- Embezzlement
- Problem profile
- Clandestine activity
- Criminal Intelligence System
- State laws related to electronic solicitation or luring of children
- State v. Corwin
- Geoslavery
- Encryption: Selected Legal Issues
- Automation of Reports and Consolidated Orders System
- High-tech crime
- Condux International v. Haugum
- Criminal justice information system
- RISS Automated Trusted Information Exchange
- Protecting Classified Information and the Rights of Criminal Defendants: The Classified Information Procedures Act
- Deconfliction
- Plain view doctrine
- Global Justice Information Sharing Initiative Global Advisory Committee
- Communications via social media targeting specific individuals
- Cyberhooliganism
- Law enforcement officer
- U.S. v. Romm
- Omnibus Crime Control and Safe Streets Act of 1968
- Saboteur
- People v. Alexander
- National Criminal History Improvement Program
- Mobile Telephone Crime
- Data Integration and Visualization System
- Federal Protective Service
- Transnational organized crime
- False authentication feature
- Skimmer
- Centre for Intelligence against Organised Crime
- Trademark Counterfeiting Act of 1984
- Crimes Against Children Research Center
- Director of National Intelligence
- Red Flag
- Search warrant
- National Forensic Science Technology Center
- FBI Laboratory
- Counterintelligence Division
- Intelligence files
- Office of Justice Programs
- Means of identification
- Terrorism Watch List
- Global Justice XML Data Model
- Capture
- Upstate New York Regional Intelligence Center
- Computer Crimes Task Force
- Outsourcing Standard
- Cashing
- Duping
- Racketeering activity
- Law Enforcement Online
- Document-making implement
- Benefit fraud
- Petit jury
- Global Justice Information Sharing Initiative (Global) Intelligence Working Group
- Fake check scheme
- Forensic Investigative Response and Support Team
- Malice
- Public safety
- Automated Criminal Intelligence Information System
- CyberTipline
- National Incident Based Reporting System
- United Nations Interregional Crime and Justice Research Institute
- Virtual Currencies: Key Definitions and Potential AML/CFT Risks
- The FBI Fingerprint Identification Automation Program: Issues and Options
- Self-incrimination
- Information Quality: The Foundation for Justice Decision Making
- Habeas corpus
- Combating the Sexual Exploitation of Children and Child Pornography
- Carderplanet
- National Crime Information Center Operating Manual
- Project Safe Childhood Initiative
- National Tracing Center
- Acquiring high tech crime tools
- Telecommunications fraud
- Criminal Prohibitions on the Publication of Classified Defense Information
- Account fraud
- Arrest
- Human trafficking
- Internet False Identification Prevention Act of 2000
- Target
- Flow analysis
- Money mule
- Canada-United States Cross-Border Crime Forum
- Strategic intelligence
- Harassment
- Child Exploitation and Obscenity Section
- White-collar crime
- National Criminal Justice Association
- Validation of Information
- Obscene Publications Act 1959
- Investigative Data Warehouse
- Megan’s Law website
- 1-24/7
- Economic espionage
- Factual Analysis Criminal Threat Solution
- Identity-Related Crime: A Threat Assessment
- FBI Regional Data Exchange
- Battery
- Mens rea
- Criminal Justice Information Systems
- National Virtual Pointer System
- Domestic terrorism
- Field Intelligence Group
- National Law Enforcement and Corrections Technology Center
- Aid and abet
- Prosecution
- Authentication feature
- U.S. v. Digilio
- An Assessment of Alternatives for a National Computerized Criminal History System
- Criminal intrusion
- Australian Federal Police
- Philosophies of Intelligence
- FBI Director
- Predicate offense
- Sexual harassment
- Identity Crisis ... What to Do If Your Identity is Stolen
- Identity-related crime
- Trademark counterfeiting
- Economic crime
- Biometric Center of Excellence
- European Criminal Records Information System
- Child predator
- Conspirator
- National Information Infrastructure Protection Act of 1996
- Identity crime
- OneDOJ
- Crime pattern analysis
- CODIS
- National Name Check Program
- IT crime
- Descriptive analysis
- California’s Anti-Phishing Law of 2005
- Foreign Police Assistance: Defined Roles and Improved Information Sharing Could Enhance Interagency Collaboration
- Traffic
- Intelligence Information Reports
- ENFORCE Apprehension Booking Module
- Counterespionage Section
- GPS, Wi-Fi, and Cell Phone Jammers Frequently Asked Questions (FAQs)
- Sexual contact
- False pretenses
- Investment fraud
- FBI National Data Exchange
- Identification document
- Computer criminal
- Camcording
- Justice and Law Enforcement: Observations on the FBI's Interstate Identification Index
- Overt act
- REMJA
- Office of Juvenile Justice and Delinquency Prevention
- Criminal Intelligence Systems Operating Policies
- A Bank Customer’s Guide to Cybersecurity
- ECrime Unit
- International Association of Crime Analysts
- Mail fraud
- Carding
- Pattern of racketeering
- Fighting Identity Theft with the Red Flags Rule: A How-To Guide for Business
- Next Generation Identification
- CrimTrac
- Safetynet
- Theft of Trade Secrets Clarification Act of 2012
- Misprision of felony
- National Identification Index
- Privacy Technology Focus Group: Executive Summary
- Computerized Criminal History
- United States v. Slater
- DOJ Criminal Division
- Account take over attack
- Identity Theft Enforcement Interagency Working Group
- Criminal Justice Agency
- Threat focus cell
- Reasonable person
- Issuing authority
- Geographical Event Mapping System
- Economic Crime Act of 1992
- Criminal Intelligence
- Criminal Justice Network
- Foreign Intelligence Surveillance Act of 1978
- Tearline
- Guidelines for Disclosure of Grand Jury and Electronic, Wire, and Oral Interception Information Identifying United States Persons
- False personation
- Criminal Justice Information Services Security Policy
- Report of Technological Advisory Council (TAC) Subcommittee on Mobile Device Theft Prevention
- People v. Gopal
- United States Participation in INTERPOL, the International Criminal Police Organization
- Global Standards Council
- Cyber squad
- National Stolen Property Act
- Report of the National Task Force on Privacy, Technology, and Criminal Justice Information
- National Information Sharing Strategy
- Intelligence process
- Electronic theft
- Local Agency Security Officer
- Forgery
- CyberSmuggling Center
- INTERPOL Case-Tracking System
- Criminal history records
- People v. Farell
- Identity Theft Enforcement and Restitution Act of 2008
- National Center for Forensic Science
- Special Event Threat Assessment
- Title III intercept
- High Tech Crime Operations Centre
- U.S. Marshals Service
- IP Crime Group
- Operation CardKeeper
- Privacy Technology Focus Group Final Report
- Child exploitation
- U.S. v. Coviello
- Facial Analysis, Comparison, and Evaluation Services
- Computer-Related Crimes in Federal Programs
- O’Connor v. Commonwealth of Virginia
- Missing Children: Missing Children Data Collected by the National Crime Information Center
- Plea bargaining
- Information Sharing Team
- Proactive
- Grand jury subpoena
- FBI Uniform Crime Reporting Program
- Event flow analysis
- Preventive intelligence
- Interpol Handbook on DNA Data Exchange and Practice
- Perpetrator
- Virtual child pornography
- O'Connor v. Commonwealth
- Write-blocker
- Threat inventory
- Mobile Industry Crime Action Forum
- Reasonable Doubt
- Brain
- Information diving
- Willful conduct
- Hijack attack
- Proprietary technology data
- Regional intelligence center
- Privacy, Civil Rights, and Civil Liberties Policy Templates for Justice Information Systems
- Credit Card Fraud Act of 1984
- Flores-Figueroa v. U.S.
- NCIC 2000
- Crimeware-as-a-Service
- Law Enforcement Enterprise Portal
- National Association for Justice Information Systems
- Credible threats via social media
- Enforcement Automated Biometric Identification System
- Law Enforcement Information Network
- Electronic Crimes Special Agent Program
- Law enforcement information
- Economic Espionage Act of 1996
- National Gang Intelligence Center
- Prosecuting Intellectual Property Crimes
- Sentry
- Indictment
- Field Intelligence Model
- CCpowerForums
- Forensic Examination of Digital Evidence: A Guide for Law Enforcement
- DOJ Criminal Division Fraud Section
- Law enforcement intelligence
- Malicious Intent
- National Child Protection Act of 1993
- Digital forensic analysis
- Art Loss Register
- Cardersmarket
- Bid rigging
- U.S. v. LaMacchia
- Money launderer
- Misdemeanor
- Directive on Fighting Cybercrime Within ECOWAS
- Domain Section
- Red Team
- United States Postal Inspection Service
- National Drug Intelligence Center
- Organized Crime Council
- Global Justice Information Sharing Initiative
- Integrated Justice Information Systems (IJIS) Industry Working Group (IWG)
- Privacy Policy Development Guide and Implementation Templates
- False identification document
- Bureau of Justice Assistance
- CJIS Systems Agency Information Security Officer
- Law Enforcement Assistance Administration
- Smith v. Doe
- European DNA profiling group
- False Identification Crime Control Act of 1982
- Blackmail
- Criminal Intelligence Coordinating Council
- Law Enforcement Information Sharing Plan
- Anti-terrorism, Crime and Security Act
- CNP fraud
- Child Online Protection Act
- Workplace and Gender Relations Survey of Active Duty Members
- Child Exploitation and Online Protection Centre
- Interstate Identification Index System
- In the Matter of the Application of the United States of America for a Search Warrant
- Bolo
- Burglary
- Access Policy Group
- Sharing Cyberthreat Information Under 18 USC § 2702(a)(3)
- Risk management-based intelligence
- National Child Victim Identification System
- Sexual act
- Computer Crime Initiative
- Exigent circumstances
- Financial analysis
- Industrial espionage
- Intake and Charging Policy for Computer Crime Matters
- Privacy, Civil Liberties, and Information Quality Policy Development for the Justice Decision Maker
- New Zealand Police
- Organized Crime
- Criminal justice information
- PRO IP Act Reports
- Automated Case System
- 28 CFR, Part 23
- Criminal intelligence information
- Federal Agency for State Protection and Counter-Terrorism
- Executive Order 12291
- License plate reader
- Development and Use of Computerized Criminal History Information
- Eavesdropper
- Treasury Enforcement Communications System
- Child enticement
- Operational analysis
- U.S. Sentencing Commission
- Forfeiture
- Maryland Attorney General Identity Theft Unit
- Sensitive but unclassified information
- Automated Case Support System
- Under circumstances in which that individual has a reasonable expectation of privacy
- Drop account
- Culpability
- Consent decree
- Actionable
- Anti-forensic techniques
- Double Jeopardy
- Incriminating Evidence
- Law enforcement agency
- Crime analysis
- Treason
- Counterfeiting
- Child luring
- National Crime Information Center
- Financial crime
- National Archive of Criminal Justice Data
- Bundeskriminalamt
- Public Source Information Program
- Female breast
- Attorney General Guidelines for Domestic Operations
- Fingerprint Identification Records System
- FDIC’s Supervisory Policy on Identity Theft
- GAO: Regional Information Sharing Systems
- Scientific Working Group on Imaging Technology
- Defense Criminal Investigative Service
- Identity Theft Passport
- Joint Regional Information Exchange System
- Justice Information Sharing Professionals
- National Law Enforcement Telecommunications System
- Internet Crime Complaint Center
- Operation Firewall
- Law Enforcement
- National Incident-Based Reporting System
- FBI Policy for Protecting Privacy in the Information Sharing Environment
- Postal Inspection Service
- Carding forum
- Child molester
- Carder
- Strict liability
- High Tech Crime Operations
- European Financial Coalition against Sexual Exploitation of Children Online
- Enforcement Integrated Database
- Foreign Terrorist Tracking Task Force
- Skimming
- Electronic Law Enforcement: Introduction to Investigations in an Electronic Environment
- Wire communication facility
- Prosecutor
- National Crime Prevention and Privacy Compact Act of 1998
- Terrorist threat
- Virtual Global Taskforce
- Article 287 of the Criminal Law
- Arson
- Personal identification card
- 2001 Annual Report to Congress on Foreign Economic and Industrial Espionage
- Identity Theft and Assumption Deterrence Act of 1998
- State v. Perry
- A private area of the individual
- A Preliminary Assessment of the National Crime Information Center and the Computerized Criminal History System
- Institute for Intergovernmental Research
- Business identity theft
- Identity Theft
- IOCTA: Threat Assessment on Internet Facilitated Organised Crime
- Digital Forensic Agent
- Interim Guidelines on Prosecuting Cases Involving Communications Sent Via Social Media
- INTERPOL DNA Monitoring Expert Group
- Espionage Act of 1917
- Organised Crime Threat Assessment
- South Pacific Islands Criminal Intelligence Network
- Priority Criminal Justice Needs Initiative
- Criminal analysis
- Toll fraud
- Advisory Policy Board
- U.S. Army Criminal Investigation Command
- Intelligence Identities Protection Act of 1982
- Counterintelligence access to telephone toll and transactional records
- Interjurisdictional intelligence system
- Eurojust
- Social Security Administration Office of the Inspector General
- Personally identifiable justice information
- National Instant Criminal Background Check System
- Theft
- International Criminal Police Organization
- Child sexual exploitation
- Domestic Security Alliance Council
- Europol
- Information Technologies for the Control of Money Laundering
- CJIS Audit Unit
- National Central Bureau
- Field Intelligence Report
- Comprehensive Forfeiture Act of 1984
- Criminal negligence
- National Criminal Intelligence Service
- AR 190-27
- Extortion
- Criminal information
- Organized Crime Drug Enforcement Task Forces
- Criminal Intelligence System Operating Principles
- CriMNet
- Pennsylvania’s Justice Network
- Covert intelligence
- San Francisco Electronic Crimes Task Force
- Court order
- Warrant canary
- Pedophilia
- Interstate Identification Index
- Attorney General’s Department
- Racketeering
- Office of Community Oriented Policing Services
- IOC-2
- Law Enforcement Information Exchange
- Cybercrime Central Unit of the Guardia Civil
- Video Voyeurism Prevention Act of 2004
- Integrated Justice Information System
- Traitor
- Bureau of Investigation and Intelligence
- Federal Laws Related to Identity Theft
- Enterprise
- Intellectual Property Right Theft Enforcement Team
- Larceny
- Criminal justice integration
- Office of Special Investigations
- Document and Media Exploitation
- Fourth Amendment and advanced technology
- Reporting Intellectual Property Crime: A Guide for Victims of Copyright Infringement, Trademark Counterfeiting, and Trade Secret Theft
- Royal Canadian Mounted Police
- Acquittal
- Child Abuse
- Targeted system
- Duress
- Medical identity theft
- National Security Branch
- HighTech Crime Consortium
- Defense Sexual Assault Incident Database
- Criminal Justice, New Technologies, and the Constitution
- Financial institution fraud
- Organized Crime Control Act of 1970
- Threat Assessment
- Finance Guard
- Automated Regional Justice Information System
- Intellectual Property Case Search System
- Computer Forensics Research & Development Center
- Obtaining and Admitting Electronic Evidence
- Intelligence Sharing Procedures for Foreign Intelligence and Foreign Counterintelligence Investigations Conducted by the FBI
- Clear v. Superior Court
- U.S. v. Magassouba
- Aiding and Abetting
- Graymail
- Law enforcement's uses of GPS technology
- Electronic surveillance
- Mutual Legal Assistance Treaty
- Civil Asset Forfeiture Reform Act of 2000
- Comprehensive Data Systems Program
- National Criminal Intelligence Resource Center
- Scientific Working Group on Digital Evidence
- Undercover investigation
- National Computer Forensics Institute
- Operation Pangea
- Attorney General’s Organized Crime Council
- Money mules
- DNA Identification Act of 1994
- Internet Crime Initiative
- American Society of Digital Forensics & eDiscovery
- Electronic Surveillance
- Global Justice Information Sharing Initiative Security Working Group
- Criminal Justice Agency User Agreement
- Reporting of Child Pornography by Electronic Communication Service Providers Act
- U.S. v. Scholle
- Information classification
- International Association for Identification
- Causation
- Transnational crime
- Motion to suppress evidence
- False imprisonment
- Domain hijacking
- International Association for the Advancement of Criminal Activity
- United States Secret Service
- Racketeer
- Document and Benefit Fraud Task Force
- National Mass Marketing Fraud Strategy Working Group
- Visual depiction
- Conspiracy
- Arrest warrant
- Alien and Sedition Acts of 1798
- Blackhat hacker
- Physical failure
- Intelligence Database
- Sexual Violence Data: Actions Needed to Improve Clarity and Address Differences Across Federal Data Collection Efforts
- CJIS Systems Officer
- Law Enforcement Information Sharing Program
- Commercial Crime Bureau
- Chief Information Sharing Officer
- Compact Officers
- State Terrorism Threat Assessment Center
- Pretexting
- Law Enforcement Intelligence Unit
- A Typology of Online Child Pornography Offending
- Time bomb
- Control terminal agency
- Suspicious Activity Report
- Money Laundering Control Act of 1986
- Grand jury
- Criminal intelligence file
- Identity Theft and Pretext Calling
- Criminal Intelligence File Guidelines
- National Center for Missing and Exploited Children
- Financial Crimes Enforcement Network
- SEARCH, the Online Resource for Justice and Public Safety Decision Makers
- Computer and Technology Crime High-Tech Response Team
- International Computer Hacking and Intellectual Property
- Trade in Counterfeit ICT Goods
- Arraignment
- Criminal History Record Information
- Attorney General Guidelines for FBI Foreign Intelligence Collection and Foreign Counterintelligence Investigations
- Italian Postal and Communication Police Service
- Collection of information
- Counterdrug Intelligence Coordination Group
- Integrated justice information system
- Actus reus
- Dumpster diving
- Assault
- UNODC
- Felony
- Remedies Available to Victims of Identity Theft
- Felon
- Recommended Guidelines for the Use of Unmanned Aircraft
- Information Sharing System
- Robbery
- Reporting Economic Crime Online
- Probation
- Future-Proofing Justice: Building a Research Agenda to Address the Effects of Technological Change on the Protection of Constitutional Rights
- OCDETF Fusion Center
- Electronic money laundering
- Australian Transaction Reports and Analysis Centre
- Jammer
- Evidence preservation
- Doe v. Webster
- National Internet Crimes Against Children Data System
- New Account Creation
- National Strategy for the Protection of Children from Sexual Exploitation on the Internet
- Privacy Technology Focus Group
- Identity Theft Data Clearinghouse
- Air Force Office of Special Investigations
- National Hi-tech Crime Unit
- Mobile Device Theft Prevention
- Intelligence record
- FTC's Internet Lab
- Theft of services
- Virtual Digital Evidence Lab
- Forgery and Counterfeiting Act 1981
- Communications Act 2003
- Law Enforcement Information Technology Standards Council
- Operation Bandwidth
- Financial intelligence unit
- Criminal Intelligence Service
- Reasonable Suspicion
- Army Criminal Investigation Command
- Technical Working Group for the Examination of Digital Evidence
- High Tech Crime Centre
- Originating agency identifier
- Criminal history record information system
- State vs. Hamma
- Digital Evidence in the Courtroom: A Guide for Law Enforcement and Prosecutors
- Extradition
- Innocent Images National Initiative
- Report on Sensitive Compartmented Information Leaks in the Department of Defense
- ID Theft Registry
- Criminal history file
- Swatting
- Investigators' Guide to Sources of Information
- Crime reports data
- Agreement on Preventing and Combating Serious Crime
- Report of the Department of Justice's Task Force on Intellectual Property
|