Education & Training


The Investigation, Prosecution, and Defense of Cybercrime Cases (1)
The Investigation of Abuse: Use of Science, Technology and Law in Detection and Resolution (5)
Ensuring Accuracy and Reliability in Science and Technology (9)
Balancing Information Sharing and Privacy Concerns (13)
Emerging Legal Issues With Science and Police Investigation Tools (17)
Impact of New Technologies on the Criminal Justice System (21)
THE INVESTIGATION, PROSECUTION, AND DEFENSE OF CYBERCRIME CASES

Ryan M.F. Baron, A Critique of the International Cybercrime Treaty, 10 COMMLAW CONSPECTUS 263 (Summer 2002) (http://commlaw.cua.edu).

Susan W. Brenner & Joseph J. Schwerha, IV, Transnational Evidence Gathering and Local Prosecution of International Cybercrime, 20 J. MARSHALL J. COMPUTER & INFO. L. 347 (Spring 2002) (http://www.jcil.org/journal/articles/152.html).

Aaron Burnstein, A Survey of Cybercrime in the United States, 18 BERKELEY TECH. L.J. 314 (Winter 2003) (http://www.law.berkeley.edu/journals/btlj/articles/vol18/index.htm).

Danielle Cangemi, Procedural Law Provisions of the Council of Europe Convention on Cybercrime (Collecting and Producing Electronic Evidence in Cybercrime Cases), 18 INT'L REV. L. COMPUTERS & TECH. 165 (July 2004) (http://taylorandfrancis.metapress.com/link.asp?id=v7uca5frkgyjt8cq).

Computer Fraud and Abuse Act of 1986, Pub. L. No. 99-474, 100 Stat. 1213 (codified at 18 U.S.C. § 1030 (2000)) (http://caselaw.lp.findlaw.com/casecode/uscodes/18/parts/i/chapters/47/sections/section_1001.html).

Council of Europe, Convention on Cybercrime (and related documents) (http://www.coe.int/T/E/Legal_affairs/Legal_co-operation/Combating_economic_crime/Cybercrime).

CYBER FORENSICS: A FIELD MANUAL FOR COLLECTING, EXAMINING, AND PRESERVING EVIDENCE OF COMPUTER CRIMES, (Albert J. Marcella Jr. & Robert S. Greenfield eds., Auerbach Publications, CRC Press, 2002) (http://www.crcpress.com/shopping_cart/products/product_detail.asp?sku=AU0955&parent_id=&pc=).

Cybercrime Effort Should Be on Criminals, Not Terrorists, British Lawmaker Contends, 73 U.S.L.W. 2473 (Feb. 15, 2005) (http://www.bna.com/index.html).

CYBERCRIME: SECURITY AND SURVEILLANCE IN THE INFORMATION AGE, (Brian Loader & Douglas Thomas eds., Routledge--Taylor & Francis Group 2000) (http://www.routledge-ny.com/shopping_cart/products/product_detail.asp?sku=&isbn=0415213258&parent_id=&pc=).

Ed Dadisho, Identity Theft and the Police Response, 72 Police Chief 46 (Mar. 2005) (http://policechiefmagazine.org/magazine/index.cfm?fuseaction=display_arch&article_id=538&issue_id=32005).

Jean-Marc Dinant, The Long Way From Electronic Traces to Electronic Evidence (Collecting and Producing Electronic Evidence in Cybercrime Cases), 18 INT'L REV. L. COMPUTERS & TECH. 173 (July 2004) (http://taylorandfrancis.metapress.com/link.asp?id=61rm7ujjanmytm9q).

Richard W. Downing, Shoring Up the Weakest Link: What Lawmakers Around the World Need to Consider in Developing Comprehensive Laws to Combat Cybercrime, 43 COLUM. J. TRANSNAT'L L. 705 (Spring 2005) (http://www.columbia.edu/cu/jtl).

Gary R. Gordon, Norman A. Willox, Jr. & Thomas Regan, IDENTITY FRAUD: A CRITICAL NATIONAL AND GLOBAL THREAT (Lexis-Nexis & Economic Crime Institute Oct. 28, 2003) (http://www.ecii.edu/identity_fraud.pdf).

Jessica Habib, Cyber Crime and Punishment: Filtering Out Internet Felons, 15 FORDHAM INTELL. PROP. MEDIA & ENT. L.J. 1051 (Spring 2004) (http://law.fordham.edu/publications/index.ihtml?pubid=200).

Gerald L. Kovacich & William C. Boni, HIGH TECHNOLOGY CRIME INVESTIGATOR'S HANDBOOK: WORKING IN THE GLOBAL INFORMATION ENVIRONMENT (Reed Elsevier: Butterworth-Heinemann 2000) (http://books.elsevier.com/us//computerscience/us/subindex.asp?maintarget=&isbn=075067086X&country=United+States&srccode=&ref=&subcode=&head=&pdf=&basiccode=&txtSearch=&SearchField=&operator=&order=&community=computerscience).

Kyllo v. United States, 533 U.S. 27 (2001) (http://laws.findlaw.com/us/533/27.html).

Michele C.S. Lange & Kristin M. Nimsger, ELECTRONIC EVIDENCE AND DISCOVERY: WHAT EVERY LAWYER SHOULD KNOW (ABA 2004) (http://www.abanet.org/abastore/index.cfm?section=main&fm=Product.AddToCart&pid=5450035).

Michael L. Levy, ETHICS SHOW WITH MIKE LEVY (Videorecording, DOJ 2002) (http://www.usdoj.gov/usao/eousa/ole/video.html).

Jonathan Littman, THE FUGITIVE GAME: ONLINE WITH KEVIN MITNICK (Little, Brown & Co. 1996) (http://www.twbookmark.com/books/94/0316528692/index.html).

Ronald L. Mendell, INVESTIGATING COMPUTER CRIME IN THE 21ST CENTURY (2d ed., Charles C. Thomas Publisher 2004) (http://www.ccthomas.com/details.cfm?P_ISBN=0398075255).

Bruce Middleton, CYBER CRIME INVESTIGATOR'S FIELD GUIDE (Auerbach Publications, CRC Press 2002) (http://www.crcpress.com/shopping_cart/products/product_detail.asp?sku=AU2768&parent_id=&pc=).

Mirriam F. Miquelon-Weismann, The Convention on Cybercrime: A Harmonized Implementation of International Penal Law; What Prospects for Procedural Due Process?, 23 J. MARSHALL J. COMPUTER & INFO. L. 329 (Winter 2005) (http://www.jcil.org).

Kevin D. Mitnick & William L. Simon, THE ART OF INTRUSION: THE REAL STORIES BEHIND THE EXPLOITS OF HACKERS, INTRUDERS & DECEIVERS (Wiley Publishing, Inc. 2005) (http://www.wiley.com/WileyCDA/WileyTitle/productCd-0764569597.html).

Sean Morgan & James Johnson, 21ST CENTURY PHRAUD: THREE JURISDICTIONS’ EFFORTS TO COMBAT TELECOMMUNICATIONS FRAUD (Bureau of Justice Assistance & American Prosecutors Research Institute 2005) (http://www.ndaa-apri.org/pdf/21st_century_phraud.pdf).

Nick Nykodym & Robert Taylor, The World's Current Legislative Efforts Against Cyber Crime, 20 COMPUTER L. & SEC. REP. 390 (Sept.-Oct. 2004) (http://www.compseconline.com/premium_article/premcl.htm#2005_3).

Chris Prosise & Kevin Mandia, INCIDENT RESPONSE AND COMPUTER FORENSICS (2d ed., McGraw-Hill/Osborne 2003) (DOI: 10.1036/007222696X) (http://books.mcgraw-hill.com/getbook.php?isbn=007222696X&template=).

Mark Rasch, Columns, SECURITYFOCUS (http://www.securityfocus.com) (ongoing).

Mark D. Rasch, Criminal Law and the Internet, in THE INTERNET AND BUSINESS: A LAWYER'S GUIDE TO THE EMERGING LEGAL ISSUES (Joseph F. Ruh Jr. ed., Computer Law Ass’n 1996) (http://www.cla.org/RuhBook).

Mark D. Rasch, Video Game Makers Fight against Those Who Tinker with Software, BROWARD DAILY BUS. REV., Aug. 3, 2005, at 10, (http://www.dailybusinessreview.com).

James R. Richards, TRANSNATIONAL CRIMINAL ORGANIZATIONS, CYBERCRIME, AND MONEY LAUNDERING: A HANDBOOK FOR LAW ENFORCEMENT OFFICERS, AUDITORS AND FINANCIAL INVESTIGATORS (CRC Press 1999) (http://www.crcpress.com/shopping_cart/search/search.asp).

Douglas Schweitzer, INCIDENT RESPONSE: COMPUTER FORENSICS TOOLKIT (Wiley Publishing, Inc. 2003) (http://www.wiley.com/WileyCDA/WileyTitle/productCd-0764526367.html).

Debra Littlejohn Shinder, SCENE OF THE CYBERCRIME: COMPUTER FORENSICS HANDBOOK (Syngress Publishing 2002) (http://www.syngress.com/catalog/?pid=2250).

Eric J. Sinrod & William P. Reilly, Cyber-Crimes: A Practical Approach to the Application of Federal Computer Crime Laws, 16 SANTA CLARA COMPUTER & HIGH TECH. L.J. 177 (May 2000) (http://www.scu.edu/techlaw).

Reid Skibell, Cybercrimes and Misdemeanors: A Reevaluation of the Computer Fraud and Abuse Act, 18 BERKELEY TECH. L.J. 3 (Summer 2003) (http://www.law.berkeley.edu/journals/btlj/articles/vol18/Skibell.web.pdf).

Special Report: Experts Say Identity Theft Ranks High Among Privacy, Security Topics for 2005, 73 U.S.L.W. 2430 (Jan. 25, 2005) (http://www.bna.com/index.html)

Nora Lockwood Tooher, Identity Theft Cases Create Growing Practice Niche: Lawyers Thrive in High-Volume, Cutting-Edge Practice Area, LAW. WKLY. USA, Sept. 13, 2004, at 17 (http://www.lawyersweeklyusa.com).

United States v. Knotts, 460 U.S. 276 (1983) (http://laws.findlaw.com/us/460/276.html).

United States v. Mitnick, No. 97-50365.D.C. & No. CR-95-00603-MRP-1, 145 F.3d 1342 (Table), 1998 WL 255343 (9th Cir. May 20, 1998), cert. denied, 525 U.S. 917 (1998) (http://www.freekevin.com/051498affirm.html). See more court documents at http://www.freekevin.com/docs.html.

John R. Vacca, COMPUTER FORENSICS: COMPUTER CRIME SCENE INVESTIGATION (With CD-ROM) (Networking Series, Charles River Media, Inc. 2002).

Ian Walden, Forensic Investigations in Cyberspace for Civil Proceedings (Collecting and Producing Electronic Evidence in Cybercrime Cases), 18 INT'L REV. L. COMPUTERS & TECH. 275 (July 2004) (http://taylorandfrancis.metapress.com/link.asp?id=auuv9cwxq9xg2l0e).

Natalie White, Identity Theft Victim Wins Verdict Against Credit Reporting Company, LAW. WKLY. USA, Feb. 28, 2005, at 21 (http://www.lawyersweeklyusa.com).

THE INVESTIGATION OF ABUSE: USE OF SCIENCE, TECHNOLOGY AND LAW IN DETECTION AND RESOLUTION

American Academy of Pediatrics, Committee on Child Abuse and Neglect & Committee on Children with Disabilities, Assessment of Maltreatment of Children with Disabilities, 108 PEDIATR. 508 (2001) (http://pediatrics.aappublications.org/cgi/content/abstract/108/2/508).

American Academy of Pediatrics, Committee on Child Abuse and Neglect, Distinguishing Sudden Infant Death Syndrome Treatment from Child Abuse Fatalities, 107 PEDIATR. 437 (Feb. 2001) (http://pediatrics.aappublications.org/cgi/content/abstract/107/2/437).

American Academy of Pediatrics, Committee on Child Abuse and Neglect & Committee on Community Health Services, Investigation and Review of Unexpected Infant and Child Deaths, 104 PEDIATR. 1158 (Nov. 1999) (http://pediatrics.aappublications.org/cgi/content/abstract/104/5/1158).

American Academy of Pediatrics, Committee on Child Abuse and Neglect, Shaken Baby Syndrome: Rotational Cranial Injuries – Technical Report, 108 PEDIATR. 206 (2001) (http://pediatrics.aappublications.org/cgi/content/abstract/108/1/206).

American Prosecutors Research Institute, INVESTIGATION AND PROSECUTION OF CHILD ABUSE (3d ed., SAGE Publications 2003) (http://www.sagepub.com/book.aspx?pid=9954).

Jody M. Ball, CONDUCTING CHILD ABUSE INVESTIGATIONS (Thomas Investigative Publications 1996) (http://www.pimall.com/nais/bk.childab.html).

Holly Beard & Brian K. Payne, Portrayal of Elder Abuse in the National Media, 29 Am. J. Crim. Just. 269 (2005) (http://www.scja.net/journal.htm).

Robert W. Block, What Doctors Who Perform Child Abuse Medical Evaluations Want the Rest of the Team to Know, 91 J. OKLA. STATE MED. ASS’N 457 (1998) (http://www.osmaonline.org/dynamic_pages/dynamic_pageview.asp?ident=1499718016).

Robert W. Block, Child Abuse – Controversies and Imposters, 29 CURR. PROB. PEDIATR. 253 (1999) (http://dx.doi.org/10.1016/S0045-9380(99)80058-9).

Douglas O. Crewse, INVESTIGATOR'S HANDBOOK FOR NURSING HOME ABUSE AND NEGLECT INVESTIGATIONS (Thomas Investigative Publications 2004) (http://www.pimall.com/nais/nursinghomeabuse.html).

Michael J. Davidson, Governmental Responses to Elder Abuse and Neglect in Nursing Homes: The Criminal Justice System and the Civil False Claims Act, 12 ELDER L.J. 327 (Fall 2004) (http://home.law.uiuc.edu/elderlaw).

Gregory G. Davis, John L. Carroll, David Barber, Richard E. Powers, Investigation of Long-Term Care Deaths Within a Medical Examiner System, 11 ANNALS LONG-TERM CARE 29 (November 2003) (http://www.mmhc.com/altc/index.cfm).

False Claims Act, 31 U.S.C. §§ 3729-3733 (2000) (http://caselaw.lp.findlaw.com/scripts/ts_search.pl?title=31&sec=3729).

Lisa M. Gibbs & Laura Mosqueda, Confronting Elder Mistreatment in Long-Term Care, 12 ANNALS LONG-TERM CARE 30 (Apr. 2004) (http://www.mmhc.com/altc/displayArticle.cfm?articleID=altcac1973).

Amy C. Gruszecki, Julieanna Edwards, Richard E. Powers and Gregory G. Davis, Investigation of Elderly Deaths in Nursing Homes by the Medical Examiner Over a Year, 25 AM. J. FORENSIC MED. & PATHOLOGY 209, (2004) (http://www.amjforensicmedicine.com/pt/re/ajfmp/abstract.00000433-200409000-00006.htm;jsessionid=DJ16p2zPJr2txYdcH1Rmpw5rez4FBp8TMEdrAwGTZX8TJSTDpJ12!1556005714!-949856145!9001!-1).

John M. Heath, Carmel B. Dyer, Lawrence J. Kerzner, Laura Mosqueda, and Carole Murphy, Four Models of Medical Education in Elder Mistreatment, 77 ACAD. MED. 1101 (2002) (http://www.academicmedicine.org/cgi/content/abstract/77/11/1101).

Candace J. Heisler & Lori A. Stiegel, Enhancing the Justice System's Response to Elder Abuse: Discussions and Recommendations of the "Improving Prosecution" Working Group of the National Policy Summit on Elder Abuse, 14 J. ELDER ABUSE & NEGLECT 31 (2002) (DOI: 10.1300/J084v14n04_05) (https://www.haworthpress.com/store/ArticleAbstract.asp?sid=0EXG7HX7A64T9HSG6HX7TSS1ARGS1F0A&ID=35333).

Charles Hollis & Lon McDougal, Fifty-One Experiments in Combating Elder Abuse: A Survey of State Criminal Laws Relating to Elder Abuse and Mandatory Reporting, (2003) (http://www.ndaa-apri.org/publications/apri/wwc_publications.html).

Kent P. Hymel, Carole Jenny & Robert W. Block, Intracranial Hemorrhage and Rebleeding in Suspected Victims of Abusive Head Trauma: Addressing the Forensic Controversies, 7 CHILD MALTREATMENT 329 (Nov. 2002) (DOI: 10.1177/107755902237263) (http://cmx.sagepub.com/cgi/content/abstract/7/4/329).

Lisa M. Jones, Theodore P. Cross, Wendy A. Walsh & Monique Simone, Criminal Investigation of Child Abuse: The Research Behind "Best Practices," 6 TRAUMA, VIOLENCE, & ABUSE: A REVIEW JOURNAL 254 (July 2005) (http://www.sagepub.com/journal.aspx?pid=39).

Bryan J. Kemp and Laura A. Mosqueda, Elder Financial Abuse: An Evaluation Framework and Supporting Evidence, 53 J. AM. GERIATRICS SOC’Y 1123 (2005) (http://www.blackwell-synergy.com/doi/abs/10.1111/j.1532-5415.2005.53353.x).

Erik Lindbloom, Julie Brandt, Catherine Hawes, Charles Phillips, David Zimmerman, James Robinson, Barbara Bowers & Patricia McFeeley, ROLE OF FORENSIC SCIENCE IN IDENTIFICATION OF MISTREATMENT DEATHS IN LONG-TERM CARE FACILITIES: FINAL REPORT (Report to DOJ from Univ. Missouri-Columbia 01/2005) (http://www.ncjrs.org/pdffiles1/nij/grants/209334.pdf).

Mark L. Miller & James L. Johnson, PROTECTING AMERICA’S SENIOR CITIZENS: WHAT LOCAL PROSECUTORS ARE DOING TO FIGHT ELDER ABUSE (Bureau of Justice Assistance & American Prosecutors Research Institute 2003) (http://www.ndaa-apri.org/pdf/protecting_americas_senior_citizens_2003.pdf).

Minority Staff, U.S. House of Representatives Comm. on Government Reform, ABUSE OF RESIDENTS IS A MAJOR PROBLEM IN U.S. NURSING HOMES (Comm. Print 2001), available at http://www.elderabusecenter.org.

Sean P. Morgan & Jason M. Scott, PROSECUTION OF ELDER ABUSE, NEGLECT & EXPLOITATION: CRIMINAL LIABILITY, DUE PROCESS AND HEARSAY (Bureau of Justice Assistance & American Prosecutors Research Institute 2003) (http://www.ndaa-apri.org/pdf/elder_abuse_web.pdf).

Laura Mosqueda, Kerry Burnight, Solomon Liao, and Bryan Kemp, Advancing the Field of Elder Abuse: A New Model for Integration of Social and Medical Services, 44 GERONTOLOGIST 703 (2004) (http://gerontologist.gerontologyjournals.org/cgi/content/abstract/44/5/703).

Laura Mosqueda, Kerry Burnight, Solomon Liao, The Lifecycle of Bruises in Older Adults, 53 J. AM. GERIATRICS SOC’Y 1339 (Aug. 2005) (http://www.blackwell-synergy.com/doi/abs/10.1111/j.1532-5415.2005.53406.x).

Laura Mosqueda, John Heath and Kerry Burnight, Recognizing Physical Abuse and Neglect in the Skilled Nursing Facility: The Physician’s Responsibilities, 2 J. AM. MED. DIRECTORS ASS’N 183 (July 2001) (http://www.jamda.com/issues/contents).

Brian K. Payne & Laura Burke Fletcher, Elder Abuse in Nursing Homes: Prevention and Resolution Strategies and Barriers, 33 J. CRIM. JUST. 119 (Mar. 2005) (doi:10.1016/j.jcrimjus.2004.12.003) (http://dx.doi.org/10.1016/j.jcrimjus.2004.12.003).

Protecting Older Americans: A History of Federal Action on Elder Abuse, Neglect, and Exploitation, 14 J. ELDER ABUSE & NEGLECT 9 (Feb. 2004) (DOI: 10.1300/J084v14n02_03) (https://www.haworthpress.com/store/ArticleAbstract.asp?sid=0EXG7HX7A64T9HSG6HX7TSS1ARGS1F0A&ID=42629).

Kelly Riddle, NURSING HOME ABUSE INVESTIGATIONS (Book & Video formats) (2d ed. Thomas Investigative Publications 2002) (http://www.pimall.com/nais/bk.nur.html).

Debra A. Santo-Novak, Jeri W. Duncan, Kathy R. Grisson and Richard E. Powers, A Tool for Measuring Staff Knowledge Related to Geriatric Mental Health, 27 J. GERONTOLOGICAL NURSING 29 (2001) (http://www.slackinc.com/allied/JGN).

Rebecca R.S. Socolar, Doren D. Fredrickson, Robert Block, Joyce K. Moore, Susanne Tropez-Sims & J. M. Whitworth, State Programs For Medical Diagnosis Of Child Abuse And Neglect: Case Studies Of Five Established Or Fledgling Programs, 25 CHILD ABUSE & NEGL. 441 (Apr. 2001) (http://dx.doi.org/10.1016/S0145-2134(01)00219-8).

ENSURING ACCURACY AND RELIABILITY IN SCIENCE AND TECHNOLOGY

American Bar Association, Ad Hoc Committee to Ensure the Integrity of the Criminal Process, RESOLUTIONS ADDRESSING CRIME LABORATORIES, EYEWITNESS IDENTIFICATION, INVESTIGATIVE PROCEDURES, AND STANDARDS FOR PROSECUTORS, approved by the House of Delegates at the 2004 Annual Meeting. See http://www.abanet.org/crimjust/news/home.html.

American Bar Association, Ad Hoc Committee to Ensure the Integrity of the Criminal Process, RESOLUTION ADDRESSING FALSE CONFESSIONS, approved by the House of Delegates at the 2004 Midyear Meeting. See http://www.abanet.org/crimjust/news/home.html.

Ake v. Oklahoma, 470 U.S. 68 (1985) (http://laws.findlaw.com/us/470/68.html).

Berry v. City of Detroit, 25 F.3d 1342 (6th Cir. 1994), cert. denied, 513 U.S. 1111 (1995).

R. Bramley, Quality in the Laboratory, 43 SCI. & JUST. 104 (April-June 2003) (http://www.forensic-science-society.org.uk/publications/saj.html).

John C. Burnham, The Evolution of Editorial Review, 263 JAMA 1323 (March 9, 1990) (http://jama.ama-assn.org/cgi/content/abstract/263/10/1323).

David S. Caudill & Lewis H. LaRue, Why Judges Applying the Daubert Trilogy Need to Know About the Social, Institutional, and Rhetorical - and Not Just the Methodological - Aspects of Science, 45 B.C. L. REV. 1 (December 2003) (http://www.bc.edu/schools/law/lawreviews/meta-elements/journals/bclawr/45_1/01_FMS.htm).

An-Wen Chan, Asbjørn Hróbjartsson, Mette T. Haahr, Peter C. Gøtzsche & Douglas G. Altman, Empirical Evidence for Selective Reporting of Outcomes in Randomized Trials: Comparison of Protocols to Published Articles, 291 JAMA 2547 (May 26, 2004) (http://jama.ama-assn.org/cgi/content/abstract/291/20/2457).

Effie J. Chan, Note, The 'Brave New World' of Daubert: True Peer Review, Editorial Peer Review, and Scientific Validity, 70 N.Y.U. L. REV. 100 (April 1995) (http://www.law.nyu.edu/journals/lawreview).

Daubert v. Merrell Dow Pharmaceuticals, Inc., 509 U.S. 579 (1993) (http://laws.findlaw.com/us/509/579.html).

Gary Edmond, Judicial Representations of Scientific Evidence, 63 MOD. L. REV. 216 (2000) (http://www.blackwellpublishing.com/journal.asp?ref=0026-7961).

Margaret Farrell, Daubert v. Merrell Dow Pharmaceuticals, Inc.: Epistemiology and Legal Process, 15 CARDOZO L. REV. 2183 (1994) (http://www.cardozolawreview.com).

Henry F. Fradella, Lauren O'Neill & Adam Fogarty, The Impact of Daubert in Forensic Science, 31 PEPP. L. REV. 323 (January 2004) (http://law.pepperdine.edu/organizations/law_review).

Frye v. United States, 54 App. D.C. 46, 293 F. 1013 (D.C. Cir. 1923) (http://www.law.ufl.edu/faculty/little/topic8.pdf).

General Electric Co. v. Joiner, 522 U.S. 136 (1997) (http://laws.findlaw.com/us/522/136.html).

Paul C. Giannelli, Ake v. Oklahoma: The Right to Expert Assistance in a Post-Daubert, Post-DNA World, 89 CORNELL L. REV. 1305 (September 2004) (http://organizations.lawschool.cornell.edu/clr/september2004.htm).

Paul C. Giannelli, Daubert Revisited, 41 CRIM. L. BULL. 302 (May-June 2005) (http://west.thomson.com/store/product.asp?product_id=14938017).

Paul C. Giannelli, The 'Science' of Wrongful Convictions, 18 CRIM. JUST. 55 (Spring 2003) (http://www.abanet.org/crimjust/spring2003/scientific_evidence.html).

Susan Haack, DEFENDING SCIENCE-WITHIN REASON: BETWEEN SCIENTISM AND CYNICISM (Prometheus Books 2003) (http://www.prometheusbooks.com).

Susan Haack, Epistemology Legalized: Or, Truth, Justice, And The American Way, 49 AM. J. JURIS. 43 (2004) (http://www.nd.edu/~ndlaw/ajj).

Susan Haack, Truth and Justice, Inquiry and Advocacy, Law and Science, 7 J. LEGAL & SOC. THEORY 103 (2003).

Susan Haack, Truth, Truths, "Truth" and "Truths" in the Law, 26 HARV. J.L. & PUB. POL'Y 17 (Winter 2003) (http://www.law.harvard.edu/students/orgs/jlpp/index.html).

Mark Hansen, The Uncertain Science of Evidence, 91 A.B.A. J. 49 (July 2005) (http://www.abanet.org/journal).

Clark Hedger, Daubert and the States: A Critical Analysis of Emerging Trends, 49 ST. LOUIS U. L.J. 177 (Fall 2004) (http://law.slu.edu/journals/slulj.html).

Tom Jefferson, Philip Alderson, Elizabeth Wager & Frank Davidoff, Effects of Editorial Peer Review: A Systematic Review, 287 JAMA 2784 (June 5, 2002) (http://jama.ama-assn.org/cgi/content/full/287/21/2784).

Tom Jefferson, Elizabeth Wager & Frank Davidoff, Measuring the Quality of Editorial Peer Review, 287 JAMA 2786 (June 5, 2002) (http://jama.ama-assn.org/cgi/content/full/287/21/2786).

Horace Freeland Judson, Structural Transformations of the Sciences and the End of Peer Review, 272 JAMA 92 (July 13, 1994) (http://jama.ama-assn.org/content/vol272/issue2/index.dtl).

Justice for All Act of 2004, Pub. L. No. 108-405, 118 Stat. 2260 (http://thomas.loc.gov/cgi-bin/query/D?c108:5:./temp/~c1083gfL4i::).

Kumho Tire Co. v. Carmichael, 526 U.S. 137 (1999) (http://laws.findlaw.com/us/526/137.html).

Brian C. Martinson, Melissa S. Anderson & Raymond de Vries, Scientists Behaving Badly, 435 NATURE 737 (June 9, 2005) (doi: 10.1038/435737a) (http://www.nature.com/nature/journal/v435/n7043/full/435737a.html).

National Institute of Justice, FORENSIC SCIENCES: REVIEW OF STATUS AND NEEDS (Issues and Practices Series 1999) (http://www.ojp.usdoj.gov/nij/pubs-sum/173412.htm).

Office of Law Enforcement Standards, National Institute of Justice, FORENSIC LABORATORIES: HANDBOOK FOR FACILITY PLANNING, DESIGN, CONSTRUCTION, AND MOVING (Research Report Series 1998) (http://www.ojp.usdoj.gov/nij/pubs-sum/168106.htm).

PEER REVIEW IN HEALTH SCIENCES (Tom Jefferson & Fiona Godlee, eds., 2d ed., Blackwell BMJ Books 2003) (http://www.blackwellpublishing.com/book.asp?ref=0727916858&site=21).

Lawrence S. Pinsky, The Use of Scientific Peer Review and Colloquia to Assist Judges in the Admissibility Gatekeeping Mandated by Daubert, 34 HOUS. L. REV. 527 (Summer 1997) (http://www.houstonlawreview.org).

Drummond Rennie, Guarding the Guardians: A Conference on Editorial Peer Review, 256 JAMA 2391 (Nov. 7, 1986) (http://jama.ama-assn.org/content/vol256/issue17/index.dtl).

Michael J. Saks, The Aftermath of Daubert: An Evolving Jurisprudence of Expert Evidence, 40 JURIMETRICS J. 229 (2000) (http://www.law.asu.edu/?id=8212).

Michael J. Saks, D. Michael Risinger, R. Rosenthal & W.C. Thompson, Context Effects in Forensic Science: A Review and Application of the Science of Science to Crime Laboratory Practice in the United States, 43 SCI. & JUST. 77 (April-June 2003) (http://www.forensic-science-society.org.uk/publications/saj.html).

D.R. Schudel, J.E. McLaughlin & C.M. Selavka, Health and Safety in Forensic Applications, in ENCYCLOPEDIA OF FORENSIC SCIENCEs (Jay Siegel, Geoffrey Knupfer & Pekka Saukko eds., Harcourt Brace 2000) (http://www.elsevier.com/wps/find/bookdescription.cws_home/673576/description#description).

Carl M. Selavka, Quality in Toxicology, in WAS IT A POISONING? FORENSIC TOXICOLOGISTS SEARCHING FOR ANSWERS (Irving Sunshine ed., Society of Forensic Toxicologists 1998).

C.M. Selavka & I.S. Krull, The Systematic Application of Analytical Tools in Forensic Analyses, in 2 ADVANCES IN FORENSIC SCIENCE: INSTRUMENTAL ANALYSIS 239 (H.C. Lee & R.E. Gaensslen eds., Mosby Year Book Medical Publishers, Inc., Chicago 1989) (http://www.powells.com/biblio/4-081515349x-0).

C.M. Selavka, A.P. Mason, C.D. Riker & S. Crookham, Determination of Fentanyl in Hair: The Case of the Crooked Criminalist, 40 J. FORENSIC SCIENCES 681 (1995) (http://journalsip.astm.org/JOURNALS/FORENSIC/PAGES/2351.htm).

C.M. Selavka & R.A. Middleberg, What Constitutes an Appropriate Chain of Custody Document, and Why Does it Matter?, 20 TOX TALK 6 (1996) (http://www.soft-tox.org/?pn=publications&sp=ToxTalk).

Alan W. Tamarelli, Jr., Note, Pushing the Limits of Scientific Reliability - The Questionable Wisdom of Abandoning the Peer Review Standard for Admitting Expert Testimony, 47 VAND. L. REV. 1175 (May 1994) (http://law.vanderbilt.edu/lawreview/home.html).

Technical Working Group for Education and Training in Forensic Science, National Institute of Justice, EDUCATION AND TRAINING IN FORENSIC SCIENCES: A GUIDE FOR FORENSIC SCIENCE LABORATORIES, EDUCATIONAL INSTITUTIONS, AND STUDENTS (2004) (http://www.ojp.usdoj.gov/nij/pubs-sum/203099.htm).

Jacob I. Trombka, Jeffrey Schweitzer, Carl Selavka, Mark Dale, Norman Gahn, Samuel Floyd, James Marie, Maritza Hobson, Jerry Zeosky, Ken Martin, Timothy McClanahan, Pamela Solomon & Elyse Gottschang, Crime Scene Investigations Using Portable, Non-Destructive Space Exploration Technology, 129 FORENSIC SCI. INT’L 1 (2002) (doi:10.1016/S0379-0738(02)00079-8) (http://dx.doi.org/10.1016/S0379-0738(02)00079-8).

United States v. Havvard, 117 F. Supp. 2d 848 (S.D. Ind. 2000) (http://www.insd.uscourts.gov/search_opinions.htm).

Martha K. Wivell, Deliver a Daubert-Proof Expert Report, 39 TRIAL 38 (December 2003) (http://www.atla.org/publications/trial/0312/contents.aspx).

BALANCING INFORMATION SHARING AND PRIVACY CONCERNS

Robert D. Bickel, Susan Brinkley & Wendy White, Seeing Past Privacy: Will the Development and Application of CCTV and Other Video Security Technology Compromise an Essential Constitutional Right in a Democracy, or Will the Courts Strike a Proper Balance?, 33 STETSON L. REV. 299 (Fall 2003) (http://www.law.stetson.edu/lawrev/abstracts/PDF/33-1Bickel.pdf).

Electronic Communications Privacy Act of 1986, Pub. L. No. 99-508, 100 Stat. 1848 (codified in scattered sections of 18 U.S.C.) (Successor to Title III of the Omnibus Crime Control and Safe Streets Act of 1968, Pub. L. No. 90-351, 82 Stat 212, 8 U.S.C. §§2510-2521) (http://caselaw.lp.findlaw.com/scripts/ts_search.pl?title=18&sec=2510).

ETHICAL ISSUES OF INFORMATION SYSTEMS (Ali Salehnia ed., IRM Press 2002) (http://www.idea-group.com/books/details.asp?id=311).

Linda E. Fisher, Guilt by Expressive Association: Political Profiling, Surveillance and the Privacy of Groups, 46 ARIZ. L. REV. 621 (Winter 2004) (http://www.law.arizona.edu/Journals/ALR/ALR2004/contents.htm).

Michael J. Freedman, Joan Feigenbaum, Tomas Sander & Adam Shostack, Privacy Engineering for Digital Rights Management Systems: ACM Workshop on Security and Privacy in Digital Rights Management 2001, 2320/2002 LECTURE NOTES IN COMPUTER SCI. 76 (http://www.springerlink.com).

Ian Goldberg, Austin Hill & Adam Shostack, Trust, Ethics and Privacy, 81 B.U. L. REV. 407 (Apr. 2001) (http://www.bu.edu/law/lawreview).

H. Tomás Gómez-Arostegui, Defining Private Life under the European Convention on Human Rights by Referring to Reasonable Expectations, 35 CAL. W. INT'L L.J. 153 (Spring 2005) (http://www.cwsl.edu/main/default.asp?nav=journals.asp&body=journals/home.asp).

Emanuel Gross, The Struggle of a Democracy Against Terrorism--Protection of Human Rights: The Right to Privacy Versus the National Interest--the Proper Balance, 37 CORNELL INT'L L.J. 27 (2004) (http://organizations.lawschool.cornell.edu/ilj/37-1.htm).

Stephen E. Henderson, Learning from Hoosiers and Razorbacks -- How to Apply the Fourth Amendment and Its State Analogs to Third Party Information (forthcoming 2006).

Stephen E. Henderson, Nothing New Under the Sun? A Technologically Rational Doctrine of Fourth Amendment Search, 56 MERCER L. REV. 507 (2005) (http://www.law.mercer.edu/academics/lawreview/lrarticle.cfm?lrarticleid=255).

Homeland Security Presidential Directive/HSPD-6, 39 WEEKLY COMP. PRES. DOC. 1234 (Sept. 22, 2003) (http://www.whitehouse.gov/news/releases/2003/09/20030916-5.html) (Established the Terrorist Screening Center).

INFORMATION ETHICS: PRIVACY AND INTELLECTUAL PROPERTY (Lee Freeman & A. Graham Peace eds., InfoSci 2005) (http://www.idea-group.com/books/details.asp?id=4491).

Jerry Kang & Dana Cuff, Pervasive Computing: Embedding the Public Sphere, 62 WASH. & LEE L. REV. 93 (Winter 2005) (http://law.wlu.edu/journals/lawreview/TOC/TOCvol62iss1.htm).

Erin E. Kenneally, The Bytes Stop Here: Liability For Negligent Internet Security, COMPUTER SECURITY INSTITUTE JOURNAL (Fall 2000) (http://www.gocsi.com/membersonly/category.jhtml?catID=14137).

Erin E. Kenneally, Confluence of Digital Evidence and the Law: On the Forensic Soundness of Live-Remote Digital Evidence Collection, 9 UCLA J.L. & TECH. __ (Fall 2005) (http://www.lawtechjournal.com).

Erin E. Kenneally, U.S. v. Mitnick: A Case That Defined the Internet Threat, in Fred Smith and Rebecca Bace, A GUIDE TO FORENSIC TESTIMONY (Addison-Wesley 2003) (http://safari.awprofessional.com/?XmlId=0201752794).

Erin E. Kenneally, Who’s Liable for Insecure Networks?, 35 IEEE COMPUTER (June 2002) (http://doi.ieeecomputersociety.org/10.1109/MC.2002.1009176).

Kyllo v. United States, 533 U.S. 27 (2001) (http://laws.findlaw.com/us/533/27.html).

Albert J. Marcella, Jr. & Carol Stucki, PRIVACY HANDBOOK: GUIDELINES, EXPOSURES, POLICY IMPLEMENTATION, AND INTERNATIONAL ISSUES (Wiley 2003) (http://www.wiley.com/WileyCDA/WileyTitle/productCd-0471232092.html).

Pennsylvania State Police, State Police, PCCD Announce Changes to Improve Collection, Sharing of Information by Law Enforcement Agencies (Press Release August 27, 2003, announced the creation of the Pennsylvania Criminal Intelligence Center (PaCIC)) (http://www.psp.state.pa.us/psp/cwp/view.asp?A=11&Q=170383).

THE PRIVACY PAPERS: MANAGING TECHNOLOGY, CONSUMER, EMPLOYEE, AND LEGISLATIVE ACTION (Rebecca Herold ed., Auerbach Pubs, Best Practices Series Vol. 23, 2001) (http://www.crcpress.com/shopping_cart/products/product_detail.asp?id=&parent_id=&sku=AU1248&pc=).

Christopher Slobogin, Peeping Techno-Toms and the Fourth Amendment: Seeing Through Kyllo's Rules Governing Technological Surveillance, 86 MINN. L.REV. 1393 (June 2002) (http://www.law.umn.edu/lawreview/v86n6.htm).

Christopher Slobogin, Public Privacy: Camera Surveillance of Public Places and the Right to Anonymity, 72 MISS. L.J. 213 (2002) (http://www.olemiss.edu/orgs/mslj).

Christopher Slobogin, Subpoenas and Privacy, 54 DEPAUL L. REV. 805 (Spring 2005) (http://www.law.depaul.edu/students/organizations_journals/student_orgs/lawdlr).

Christopher Slobogin, Technologically-Assisted Physical Surveillance: The American Bar Association's Tentative Draft Standards, 10 HARV. J. L. & TECH. 383 (Summer 1997) (http://jolt.law.harvard.edu/p.cgi/articles/v10.html).

Christopher Slobogin, Transaction Surveillance by the Government (forthcoming, MISS. L. J., Fall 2005) (http://www.olemiss.edu/orgs/mslj).

Daniel J. Solove, Digital Dossiers and the Dissipation of Fourth Amendment Privacy, 75 S. CAL. L. REV. 1083 (July 2002) (http://www-rcf.usc.edu/cgi-local/usclrev/Pageprint1.cgi).

Daniel J. Steinbock, National Identity Cards: Fourth and Fifth Amendment Issues, 56 FLA. L. REV. 697 (Sept. 2004) (http://www.floridalawreview.org).

Brett Stohs, Privacy, Free Speech & The Garden Grove Cyber Café Experiment, 2004 DUKE L. & TECH. REV. 12 (Oct. 15, 2004) (http://www.law.duke.edu/journals/dltr/articles/2004dltr0012.html).

Symposium, Crime and Technology, 10 HARV. J.L. & TECH. 383 (Summer 1997) (http://jolt.law.harvard.edu/p.cgi/articles/v10.html).

Symposium, The Effect of Technology on Fourth Amendment Analysis and Individual Rights, 72 MISS. L.J. 1 (Fall 2002) (http://www.olemiss.edu/orgs/mslj).

Symposium, The Future of Internet Surveillance Law: A Symposium to Discuss Internet Surveillance, Privacy & the USA Patriot Act, 72 GEO. WASH. L. REV. 1139 (August 2004) (http://docs.law.gwu.edu/stdg/gwlr/issues/72-6.htm).

Symposium, Modern Studies in Privacy Law, 86 MINN. L. REV. 1097 (June 2002) (http://www.law.umn.edu/lawreview/v86n6.htm).

Symposium, Privacy and Identity: Constructing, Maintaining, and Protecting Personhood, 54 DEPAUL L. REV. 657 (Spring 2005) (http://www.law.depaul.edu/students/organizations_journals/student_orgs/lawdlr).

Lee Tien, Privacy, Technology and Data Mining, 30 OHIO N.U. L. REV. 389 (2004) (http://www.onu.edu/org/law_review/default.htm).

United States General Accounting Office, BORDER SECURITY: NEW POLICIES AND PROCEDURES ARE NEEDED TO FILL GAPS IN THE VISA REVOCATION PROCESS (GAO-03-798 June 18, 2003) (Testimony Before the Subcommittee on National Security, Emerging Threats, and International Relations, Committee on Government Reform, House of Representatives, Statement of Jess T. Ford, Director International Affairs and Trade) (http://www.globalsecurity.org/security/library/report/gao/d03908t.pdf).

United States General Accounting Office, INFORMATION TECHNOLOGY TERRORIST WATCH LISTS SHOULD BE CONSOLIDATED TO PROMOTE BETTER INTEGRATION AND SHARING (GAO-03-322 Apr. 15, 2003) (http://www.gao.gov/new.items/d03322.pdf).

United States v. Mitnick, No. 97-50365.D.C. & No. CR-95-00603-MRP-1, 145 F.3d 1342 (Table), 1998 WL 255343 (9th Cir. May 20, 1998), cert. denied, 525 U.S. 917 (1998) (http://www.freekevin.com/051498affirm.html). See more court documents at http://www.freekevin.com/docs.html.

EMERGING LEGAL ISSUES with SCIENCE AND POLICE INVESTIGATION TOOLS

Marc Jonathan Blitz, Video Surveillance and the Constitution of Public Space: Fitting the Fourth Amendment to a World That Tracks Image and Identity, 82 TEX. L. REV. 1349 (May 2004) (http://www.utexas.edu/law/journals/tlr/abstracts/82/82blitz.pdf).

John C. Brigham & Heather S. Hyme, Dealing with Fallible Eyewitness Evidence: How Scientific Research and Expert Testimony Can Help, Part 1, 24 TRIAL LAW. 301 (2001) (http://abstractsdb.ncjrs.org/content/AbstractsDB_Details.asp?index=0&perpage=25&ncjnum=208941&docIndex=11&chkBoxBitFlags=00000000000).

Jeffrey W. Childers, Kyllo V. United States: A Temporary Reprieve from Technology-Enhanced Surveillance of the Home, 81 N.C. L. REV. 728 (January 2003) (http://nclrev.unc.edu/cocoon/nclrev/any-issue.xsp?id=481).

Steven E. Clark & Elizabeth Loftus, Eyewitness Evidence, in ENCYCLOPEDIA OF POLICE SCIENCE (3d ed. Routledge, in press) (http://www.routledge.com).

Steven E. Clark and Jennifer L. Tunnicliff, Selecting Lineup Foils in Eyewitness Identification Experiments: Experimental Control and Real-World Simulation, 25 LAW & HUM. BEHAV. 199 (2001) (DOI: 10.1023/A:1010753809988) (http://www.springerlink.com/link.asp?id=tl1249j3n7h17286).

Jules Epstein, Capital Case Litigation, in David Rudovsky & Leonard Sosnov, CRIMINAL PROCEDURE FORMS & COMMENTARY (Pennsylvania Practice Series Vol. 2, Thomson*West 2002 & Supp. 2005) (http://west.thomson.com/product/22032285/product.asp).

Jules Epstein, Constitutional Aspects of Criminal Investigation, in POLICE INVESTIGATION HANDBOOK (Matthew Bender 1995) (now Thomas P. Mauriello, CRIMINAL INVESTIGATION HANDBOOK) (http://bookstore.lexis.com/bookstore).

Jules Epstein, Defense of Homicide Cases, in CRIMINAL DEFENSE TECHNIQUES (Matthew Bender 2001) (http://bookstore.lexis.com/bookstore/catalog?action=product&prod_id=10546&cat_id=BSA).

Jules Epstein, Examination of Eyewitnesses, in CRIMINAL DEFENSE TECHNIQUES (Matthew Bender 1997) (http://bookstore.lexis.com/bookstore/catalog?action=product&prod_id=10546&cat_id=BSA).

Jules Epstein, Identification Evidence - Constitutional and Evidentiary Principles, in CRIMINAL DEFENSE TECHNIQUES (Matthew Bender 2003) (http://bookstore.lexis.com/bookstore/catalog?action=product&prod_id=10546&cat_id=BSA).

Jules Epstein, Motions to Suppress Statements and Identifications, in CRIMINAL DEFENSE TECHNIQUES (Matthew Bender 1997) (http://bookstore.lexis.com/bookstore/catalog?action=product&prod_id=10546&cat_id=BSA).

Jules Epstein, Pre-Trial Representation in Narcotics Cases, in DEFENSE OF NARCOTICS CASES (2001 Matthew Bender) (http://bookstore.lexis.com/bookstore).

Jules Epstein, The Prosecution and Defense of Child Sexual Assault, in B. Anthony Morosco, THE PROSECUTION AND DEFENSE OF SEX CRIMES (Matthew Bender 2002) (http://bookstore.lexis.com/bookstore).

Jules Epstein, The Prosecution and Defense of Forcible Sex Crimes, in B. Anthony Morosco, THE PROSECUTION AND DEFENSE OF SEX CRIMES (Matthew Bender 2002) (http://bookstore.lexis.com/bookstore).

Robin Feldman, Considerations on the Emerging Implementation of Biometric Technology, 25 HASTINGS COMM. & ENT. L.J. 653 (Spring-Summer 2003) (http://w3.uchastings.edu/comment/index.html).

Max Guirguis, Electronic Visual Surveillance and the Reasonable Expectation of Privacy, 9 J. TECH. L. & POL'Y 143 (Dec. 2004) (http://grove.ufl.edu/~techlaw/vol9/issue2/guirguis.html).

Hearing On Bill 15-1073, Electronic Recording Procedures Act Of 2004, and Bill 15-1071, Eyewitness Identification Procedure Act Of 2004, Before the D.C. City Council (D.C. November 15, 2004) (Statement Of Andrew Vail, Jenner & Block LLP, Chicago, Ill.) (http://www.dccouncil.washington.dc.us).

Kyllo v. United States, 533 U.S. 27 (2001) (http://laws.findlaw.com/us/533/27.html).

G. Daniel Lassiter, Patrick J. Munhall, Andrew L. Geers, Ian M. Handley & Paul E. Weiland, Criminal Confessions on Videotape: Does Camera Perspective Bias Their Perceived Veracity?, 7 CURRENT RES. SOC. PSYCHOL. (2001) (www.uiowa.edu/~grpproc/crisp/crisp.7.1.htm).

Mass Metal Detector Screening of Protestors Away From Protest Site Held Unconstitutional, 73 U.S.L.W. 1235 (Oct. 26, 2004) (http://www.bna.com/index.html).

Ian K. McKenzie, Eyewitness Evidence: Will the United States Guide for Law Enforcement Make A Difference?, 7 INT’L J. OF EVIDENCE & PROOF 237 (2003) (http://www.extenza-eps.com/VAT/doi/pdf/10.1350/ijep.7.4.237.21942?cookieSet=1).

Alexander T. Nguyen, Here's Looking At You, Kid: Has Face-Recognition Technology Completely Outflanked The Fourth Amendment?, 7 VA. J.L. & TECH. 2 (Spring 2002) (http://www.vjolt.net/vol7/issue1/v7i1_a02-Nguyen.PDF).

Christopher Slobogin, Toward Taping, 1 OHIO ST. J. CRIM. L. 309 (Fall 2003) (http://moritzlaw.osu.edu/osjcl/slobogin.pdf).

Thomas P. Sullivan, The Police Experience: Recording Custodial Interrogations, Dec. 2004 CHAMPION 24 (Dec. 2004) (http://www.nacdl.org/public.nsf/freeform/championmag?OpenDocument).

Thomas P. Sullivan, Police Experience with Recording Custodial Interrogations, 88 JUDICATURE 132 (Nov.-Dec. 2004) (http://www.ajs.org/ajs/publications/ajs_judicature.asp).

Thomas P. Sullivan, POLICE EXPERIENCES WITH RECORDING CUSTODIAL INTERROGATIONS (Nw. U. Sch. L. Center on Wrongful Convictions Special Report 2004) (http://www.jenner.com/policestudy).

Thomas P. Sullivan, Recording Custodial Interrogations, Mar. 2005 L. & ORD. 46 (Mar. 2005).

Thomas P. Sullivan, Recording Custodial Interrogations: The Police Experience, Jan. 2005 Fed. Law. 20 (Jan. 2005) (http://www.fedbar.org/magazine.html).

Thomas P. Sullivan and Andrew W. Vail, A Wise Police Station Reform, __ ABA LITIG. MAG. __ (forthcoming Fall 2005) (http://www.abanet.org/litigation/periodicals/magazine/home.html).

Symposium, The Effect of Technology on Fourth Amendment Analysis and Individual Rights, 72 MISS. L.J. 1 (Fall 2002) (http://www.olemiss.edu/orgs/mslj).

Symposium, Privacy & Surveillance: Emerging Legal Issues, 30 Ohio N.U. L. Rev. 295 (2004) (http://www.onu.edu/org/law_review/symposium.htm).

Technical Working Group for Eyewitness Evidence, EYEWITNESS EVIDENCE: A GUIDE FOR LAW ENFORCEMENT (NIJ October 1999) (http://www.ncjrs.org/pdffiles1/nij/178240.pdf).

Technical Working Group for Eyewitness Evidence, EYEWITNESS EVIDENCE: A TRAINER'S MANUAL FOR LAW ENFORCEMENT (NIJ 2003) (http://www.ncjrs.org/nij/eyewitness/188678.pdf).

Jennifer L. Tunnicliff & Steven E. Clark, Selecting Foils for Identification Lineups: Matching Suspects or Descriptions?, 24 LAW & HUM. BEHAV. 231 (2000) (DOI: 10.1023/A:1005463020252) (http://www.springerlink.com/link.asp?id=lhx4ln6575973614).

Jon S. Vernick, Matthew W. Pierce, Daniel W. Webster, Sara B. Johnson, Shannon Frattaroli, Technologies to Detect Concealed Weapons: Fourth Amendment Limits on a New Public Health and Law Enforcement Tool, 31 J.L. MED. & ETHICS 567 (Winter 2003) (https://www.aslme.org/aslmesecure/shop/show_product.php?prod_id=179).

IMPACT OF NEW TECHNOLOGIES ON THE CRIMINAL JUSTICE SYSTEM

W. S. Becker, W. M. Dale, A. Lambert & D. Magnus, Forensic Lab Directors’ Perceptions of Staffing Issues, 50 J. FORENSIC SCI. __ (Sept. 2005) (http://journalsip.astm.org/JOURNALS/FORENSIC/PAGES/4953.htm) (DOI: 10.1520/JFS2005201).

Wendy S. Becker & W. Mark Dale, Strategic Human Resource Management in the Forensic Science Laboratory, 5 FORENSIC SCI. COMM. (Oct. 2003) (http://www.fbi.gov/hq/lab/fsc/backissu/oct2003/2003_10_research01.htm).

Marc Jonathan Blitz, Video Surveillance and the Constitution of Public Space: Fitting the Fourth Amendment to a World That Tracks Image and Identity, 82 TEX. L. REV. 1349 (May 2004) (http://www.utexas.edu/law/journals/tlr/abstracts/volume82.html).

Wayne F. Cascio, COSTING HUMAN RESOURCES: THE FINANCIAL IMPACT OF BEHAVIOR IN ORGANIZATIONS (4th ed., Thomson*South-Western 2000) (http://websites.swlearning.com/cgi-wadsworth/course_products_wp.pl?fid=M2b&product_isbn_issn=0324007094&discipline_number=416).

Jeffrey W. Childers, Kyllo v. United States: A Temporary Reprieve from Technology-Enhanced Surveillance of the Home, 81 N.C. L. REV. 728 (January 2003) (http://nclrev.unc.edu/cocoon/nclrev/any-issue.xsp?id=481).

W. Mark Dale & Wendy S. Becker, A Case Study of Forensic Scientist Turnover, 6 FORENSIC SCI. COMM. (July 2004) (http://www.fbi.gov/hq/lab/fsc/backissu/july2004/research/2004_03_research04.htm).

W. Mark Dale & Wendy S. Becker, Managing Intellectual Capital, FORENSIC SCIENCE COMMUNICATIONS (In Press) (http://www.fbi.gov/hq/lab/fsc/current/index.htm).

W. Mark Dale & Wendy S. Becker, Strategy for Staffing Forensic Scientists, 48 J. FORENSIC SCI. 465 (Mar. 2003) (http://journalsip.astm.org/JOURNALS/FORENSIC/PAGES/4166.htm).

David L. Faigman, LABORATORY OF JUSTICE: THE SUPREME COURT'S 200-YEAR STRUGGLE TO INTEGRATE SCIENCE AND THE LAW (Times Books 2004) (http://www.henryholt.com/timesbooks.htm).

David L. Faigman, LEGAL ALCHEMY: THE USE AND MISUSE OF SCIENCE IN THE LAW (Henry Holt & Co. 2000) (http://www.henryholt.com/henryholt.htm).

Orin S. Kerr, The Fourth Amendment and New Technologies: Constitutional Myths and the Case for Caution, 102 MICH. L. REV. 801 (March 2004) (http://students.law.umich.edu/mlr/index.html).

D.J. Kippenberger & C.M. Selavka, Training in Specimen Handling, in MANUAL FOR ANALYTICAL TOXICOLOGY TRAINING (2d ed., Irving Sunshine & Susan J. Knight eds., Cal. Ass’n of Toxicologists 2001) (http://www.cal-tox.org/default.aspx?Page=Publications).

Kyllo v. United States, 533 U.S. 27 (2001) (http://laws.findlaw.com/us/533/27.html).

Amy Miller, Note, Kyllo v. United States: New Law Enforcement Technologies and the Fourth Amendment, 51 U. KAN. L. REV. 181 (Nov. 2002) (http://www.ku.edu/~kulaw/lawrev).

National Institute of Justice, FORENSIC SCIENCES: REVIEW OF STATUS AND NEEDS (NIJ Issues & Practices Series, 1999) (http://www.ojp.usdoj.gov/nij/pubs-sum/173412.htm).

April A. Otterberg, Note, GPS Tracking Technology: The Case For Revisiting Knotts and Shifting the Supreme Court's Theory of the Public Space Under the Fourth Amendment, 46 B.C. L. REV. 661 (May 2005) (http://www.bc.edu/schools/law/lawreviews/meta-elements/journals/bclawr/46_3/volume_46_3_web.pdf).

April Pattavina, INFORMATION TECHNOLOGY AND THE CRIMINAL JUSTICE SYSTEM (SAGE Publications 2004) (http://www.sagepub.com/book.aspx?pid=10363).

Joseph L. Peterson & Jan S. Bashinski, Forensic Sciences, in LOCAL GOVERNMENT-POLICE MANAGEMENT. (4th ed., William Geller & Darrel Stephens eds., Int’l City Mgmt. Ass’n 2003) (http://bookstore.icma.org/obs/showdetl.cfm?&DID=7&Product_ID=1063&CATID=4).

Joseph L. Peterson & Matthew J. Hickman, CENSUS OF PUBLICLY FUNDED FORENSIC CRIME LABORATORIES (Bureau of Justice Statistics Bulletin, Feb. 2005) (http://www.ojp.usdoj.gov/bjs/abstract/cpffcl02.htm).

Joseph L. Peterson, Impact of Biological Evidence on the Adjudication of Criminal Cases, in DNA TECHNOLOGY AND FORENSIC SCIENCE (Jack Ballantyne, George Sensabaugh & Jan Witkowski eds., Banbury Report 32, Cold Spring Harbor Press 1989) (http://www.cshlpress.com/default.tpl?action=full&cart=1125075445268880&--eqskudatarq=198&newtitle=DNA%20Technology%20and%20Forensic%20Science).

Joseph L. Peterson, Steven Mihajlovic & Joanne Bedrosian, The Capabilities, Uses, and Effects of the Nation's Criminalistics Laboratories, 30 J. FORENSIC SCI. 10 (Jan. 1985) (http://journalsip.astm.org/JOURNALS/FORENSIC/PAGES/602.htm).

Joseph L. Peterson & Julie Moore, The Status of AFIS Systems Worldwide: Issues of Organization, Performance and Impact, in PROCEEDINGS OF THE INTERNATIONAL SYMPOSIUM ON FINGERPRINT DETECTION AND IDENTIFICATION (Joseph Almog & Eliot Springer eds., Israel National Police 1996).

Joseph L. Peterson, John Ryan, Pauline Houlden & Steven Mihajlovic, The Uses and Effects of Forensic Science in the Adjudication of Felony Cases, 32 J. FORENSIC SCI. 1730 (November 1987) (http://journalsip.astm.org/JOURNALS/FORENSIC/PAGES/1064.htm).

Joseph L. Peterson & John Thornton, The General Assumptions and Rational for Forensic Identification, in MODERN SCIENTIFIC EVIDENCE: THE LAW AND SCIENCE OF EXPERT TESTIMONY (David L. Faigman, David H. Kaye, Michael J. Saks & Joseph Sanders eds., West Group 2002) (http://west.thomson.com/store/product.asp?product_id=11599763).

Victoria Phillips, Michael Saks & Joseph L. Peterson, The Application of Signal Detection Theory to Decision-Making in Forensic Science, 46 J. FORENSIC SCI. 294 (Mar. 2001) (http://journalsip.astm.org/JOURNALS/FORENSIC/PAGES/3536.htm).

Proposed Amendments to Federal Rules of Civil Procedure Address Concerns Raised by Increased Use of Electronic Discovery, 73 U.S.L.W. 2138 (Sept. 14, 2004) (http://www.bna.com/index.html).

Proposed Rule to Authorize E-Filings in Civil Matters Comes Before Judicial Panel for Consideration, 73 U.S.L.W. 2229 (Oct. 26, 2004) (http://www.bna.com/index.html).

D.R. Schudel, J.E. McLaughlin and C.M. Selavka, Health and Safety in Forensic Applications, in ENCYCLOPEDIA OF FORENSIC SCIENCES (Jay Siegel, Geoffrey Knupfer & Pekka Saukko eds., Harcourt Brace 2000) (http://www.elsevier.com/wps/find/bookdescription.cws_home/673576/description#description).

Carl M. Selavka, Investigator: Why Should You Care About Hair Drug Testing?, 28 TEX. PROSECUTOR 30 (1998) (http://www.tdcaa.com/newsletters/index.asp?code=4&chapter=5#chapter5).

C.M. Selavka & D.J. Kippenberger, Philosophy for Continuing Professional Development in the Toxicology Laboratory, in MANUAL FOR ANALYTICAL TOXICOLOGY TRAINING (2d ed., Irving Sunshine & Susan J. Knight eds., Cal. Ass’n of Toxicologists 2001) (http://www.cal-tox.org/default.aspx?Page=Publications).

C.M. Selavka & I.S. Krull, The Systematic Application of Analytical Tools in Forensic Analyses, in 2 ADVANCES IN FORENSIC SCIENCE: INSTRUMENTAL ANALYSIS 239 (H.C. Lee & R.E. Gaensslen eds., Mosby Year Book Medical Publishers, Inc., Chicago 1989) (http://www.powells.com/biblio/4-081515349x-0).

C.M. Selavka & R.A. Middleberg, What Constitutes an Appropriate Chain of Custody Document, and Why Does it Matter?, 20 TOX TALK 6 (1996) (http://www.soft-tox.org/?pn=publications&sp=ToxTalk).

Daniel J. Steinbock, National Identity Cards: Fourth and Fifth Amendment Issues, 56 FLA. L. REV. 697 (Sept. 2004) (http://www.floridalawreview.org).

Symposium, Crime and Technology, 10 HARV. J.L. & TECH. 383 (Summer 1997) (http://jolt.law.harvard.edu/p.cgi/articles/v10.html).

Technical Working Group for Education and Training in Forensic Science, National Institute of Justice, EDUCATION AND TRAINING IN FORENSIC SCIENCES: A GUIDE FOR FORENSIC SCIENCE LABORATORIES, EDUCATIONAL INSTITUTIONS, AND STUDENTS (2004) (http://www.ojp.usdoj.gov/nij/pubs-sum/203099.htm).

George C. Thomas III, Time Travel, Hovercrafts, and the Framers: James Madison Sees the Future and Rewrites the Fourth Amendment, 80 NOTRE DAME L. REV. 1451 (April 2005) (http://law.nd.edu/ndlrev).

Sean D. Thueson, Note, Fourth Amendment Search--Fuzzy Shades of Gray: The New "Bright-Line" Rule in Determining When the Use of Technology Constitutes a Search: Kyllo v. United States, 121 S. Ct. 2038 (2001), 2 WYO. L. REV. 169 (2002) (http://uwadmnweb.uwyo.edu/law/Student_life/lawreview.asp).

Jacob I. Trombka, Jeffrey Schweitzer, Carl Selavka, Mark Dale, Norman Gahn, Samuel Floyd, James Marie, Maritza Hobson, Jerry Zeosky, Ken Martin, Timothy McClannahan, Pamela Solomon & Elyse Gottschang, Crime Scene Investigations Using Portable, Non-Destructive Space Exploration Technology, 129 FORENSIC SCI. INT’L 1 (Sept. 2002) (http://dx.doi.org/10.1016/S0379-0738(02)00079-8).