Legal Resources |
U.S. Code Search |
Search the United States Code - This
database is a consolidation and codification by subject
matter of the general and permanent laws of the United
States. The Office of the Law Revision Counsel of the U.S.
House of Representatives prepares and publishes the
United States Code. |
CCCIPS |
Computer Crime and Intellectual Property
Section (CCIPS) of the Criminal Division of DOJ. This
site contains many articles and papers relating to the
legal and policy issues surrounding computer crime. Among
the many resources at this site is the Federal Guidlines
for Searching and Seizing Computers. |
Cornell Law School
Legal Information Institute |
A comprehensive source of state and
federal laws. Not only are current federal and state laws
available here but also recent court opinions and current
legal studies. |
Online
Services List |
A great resource!! This list is
maintained by James Nerlinger, Jr and contains a variety
of ISPs and similar information services, specifically,
contacts at the legal departments for service of
subpoenae, court orders, and search warrants. |
Training Resources |
FLETC/Financial
Fraud Institute |
FLETC and the Financial Fraud Institue
offer several extensive courses in both computer
forensics and computer crime investigations. |
HTCIA
International |
HTCIA is one of the primary sponsers of
this symposium. HTCIA was created to encourage, promote,
aid, and effect the voluntary interchange of data,
information, experience, and knowledge about methods,
processes regarding high tech crime. HTCIA offers many
training seminars and symposiums to find out about them
check out this web site. |
IACIS |
IACIS is an international volunteer non-profit
corporation composed of law enforcement professionals
dedicated to education in the field of forensic computer
science. IACIS is dedicated to the education and
certification of law enforcement professionals in the
filed of computer forensic science. |
NCTP: Training |
The National Cybercrime Training
Partnership (NCTP) currently offers training in Basic
Data Recovery and Analysis. NCTP is also the sole
authorized distributor of the "Cyber Crime Fighting
Tape." You may obtain additional information on the
tape and who may order the tape by accessing the
hyperlink at the top of this page. |
SEARCH
Training |
The SEARCH National Technical Assistance
and Training Program provides comprehensive, hands-on
training to local, state and federal agencies on computer
technology issues with criminal justice applications,
including several courses specific to computer crime and
computer forensics. |
The
Institute of Police Technology & Management |
The Institute of Police Technology and
Management offers "The Computer Crime Investigations
Course" a (CCIC-Level 1) this course is designed to
train municipal, county, state and federal law
enforcement investigators in the basics of computer crime
investigation. |
|
|
Network Intrusions, Security, and
Information Warfare |
AntiCode |
A very comprehensive library of network
exploits. |
AntiOnline
- Computer Security - Hacking & Hackers |
This site is all about network security
and hacking. |
CERT® Coordination Center |
CERT Coordination Center, studies
Internet security vulnerabilities, provide incident
response services to sites that have been the victims of
attack, publishes a variety of security alerts, research
security and survivability in wide-area-networked
computing, and develop information to help you improve
security at your site. |
CIAC Security Website |
Department of Energy's CIAC provides incident
response services. This site contains many tools and much
information regarding network security and intrusions. |
CSI/FBI
Computer Crime and Security Survey |
The "Computer Crime and Security
Survey" is conducted by CSI with the participation
of the San Francisco Federal Bureau of Investigation (FBI)
Computer Intrusion Squad. The aim of this effort is to
help raise the level of security awareness as well as
determine the scope of computer crime in the United
States. |
The Cyberlaw
Encylopedia |
A helpful catalog of cybercrimes with
related information, case citations, and other resources. |
ICSA 2000 -
Library |
A library or papers and information
about network security. |
Infowar |
This is Winn Schwartau's site and is very
comprehensive. |
Information
Warfare, I-War, IW, C4I, Cyberwar |
This page will help you increase your
understanding of information warfare - You will find a
huge number of links to sites about all aspects of
Information Warfare. |
L0pht
Heavy Industries |
Creators of Back Orifice and L0phtCrack
this site has several tools and lots security and hacker
related information. |
NIPC |
The National Information Protection
Center. The mission of the NIPC is both a national
security and law enforcement effort to detect, deter,
assess, warn of, respond to, and investigate computer
intrusions and unlawful acts, both physical and "cyber,"
that threaten or target our critical infrastructure. You
will find network security advisories, alerts, and
warnings here as well as timely information on cyber
vulnerabilities, hacker exploit scripts, hacker trends,
virus information. |
Rootshell |
This site is filled with news,
documentation, and code about network exploits. |
SANS |
SANS is a research and education
organization where many system administrators, computer
security professionals, and network administrators share
information. SANS offers training, courses and
newsletters on a variety of topics related to computer
security. |
SARC |
An excellent site concerning computer
viruses. At Symantec's Anti-Virus Research Center not
only will you find a complete list and description of
computer viruses and hoaxes here. You can conduct and on-line
virus and security check as well. You will also find many
excellent white papers on the subject of computer viruses. |
Security
Paradigm Default Passwords List.htm |
The Default Accounts Database is a
collection of accounts and passwords that are, by
default, the initial passwords for specific accounts on a
given computer system. Sometimes these passwords
are installed out-of-box, sometimes they are
automatically installed by software, and sometimes they
are installed by consultants that are brought in to
perform services. |
2600: The
Hacker Quarterly |
The URL name says it all. |
Search Engines and Whois Search Sites |
Allwhois.com
- Search any domain name in the world! |
If a "whois" database does not
exist for a particular domain name, a Root Name Server
query will check the domain's availability |
APNIC
Whois Search |
Search the Asia Pacific Whois Database |
ARIN: Whois |
SearcheARINs database to locate
information on networks, autonomous system numbers (ASNs),
network-related handles, and other related Points of
Contact (POCs). |
Deja.com |
Search Usenet Newsgroups |
Dogpile |
The Dogpile metasearch interface takes a single query
and processes it so that you will get the maximum benefit
from your search. They currently support many of the webs
most popular search tools. |
Freeality
Internet Search Engines |
This site provides an interface to
hundreds of Internet Search Engines. |
The
Internet Sleuth |
This site is a collection of over 900
searchable databases on the Internet on a wide variety of
subjects |
NIPRNET |
Search the DOD Whois Database |
Ripe Whois |
Search the European Whois Database |
SamSpade.org |
This site takes a hostname or an IP
address, guesses at the domain name, and then runs some
whois queries to find out who owns the domain and the
block of IP addresses it lives in, and traces the route
packets take to the host. |
The
Ultimates |
Here you can search resources from all
over the net like phone books, email directories, and
trip planners. But this isn't just another list of links.
The form for each resource is integrated into the site,
and Javascript copies the information from one blank to
another so you can use everything out there with a
minimum of time and effort. |
|
|