Hello Everyone,

After having worked in China for five and a half years my wife and I arrived in her native Singapore on July 3rd of 2011 and we will be rejoining life outside of NGO work there. I recently completed the comprehensive final exam for my Masters of Arts in Criminal Justice with APUS and am excited to announce that I am set to graduate with honors on August 15th 0f 2011. Since my last post, China had blocked my website and I was having a great deal of difficulty posting updates, I hope to be able to post on more criminal justice topics soon. Thank you all for your patience!



This paper explores advances in forensic investigation of explosives and how application of forensics is able to aid in the development of serial bomber profiles or in linking serial bombers to scenes or scenes with other scenes. Since the topic of forensic examination of explosives could easily comprise an entire volume, the basic concepts of organized versus disorganized characteristics should hold relatively true with other serial bombing subjects. (more…)

I was recently asked to write about the RIAA John Doe and Jane Doe lawsuits. While I may be against anonymity on the internet, I’m thoroughly opposed to John and Jane Doe lawsuits for a variety of reasons. (more…)

I was recently asked:

How has American life been affected by the US Patriot Act? Provide one example each of the Patriot Act’s impact on the online community, the technical industry and the law enforcement community. Explain whether the examples you used have had a positive or negative impact in your opinion.” (more…)

Skills, knowledge, resources, authority, and motives (SKRAM) is one of the methods security professionals assess potential threats. The following are some controversial arguments I make concerning SKRAMS efficacy. (more…)

While in no way comprehensive, this is a list of four types of computer crimes complete with real life examples of individuals involved: (more…)

I was recently asked this question:

“Do you think it’s necessary to create new terms for “ordinary” crimes committed with more advanced tools? Is cyberstalking simply stalking using the internet?” (more…)

Maksym Vysochanskyy, courtesy of maksymblog.com

This essay was written for a Fall 2010 cybercrime course and outlines some of the problems faced as a result of software counterfeiting. (more…)

This was an extra credit assignment I completed for a cybercrime course in the fall of 2010, the question was:

Write a new amendment to the Constitution which covers criminal cases involving computers that are forefathers would have written had they been alive today. This amendment should include provisions for jurisdictional issues such as computer crimes that happen across state lines and in different countries.” (more…)