Volume 5: Future Challenges of Cybercrime

Total Page:16

File Type:pdf, Size:1020Kb

Volume 5: Future Challenges of Cybercrime Future Challenges of Cybercrime Volume 5: Proceedings of the Futures Working Group Toby Finnie Tom Petee John Jarvis Editors 1 Acknowledgments The Futures Working Group and the authors that contributed to this volume wish to thank both Police Futurists International and the Federal Bureau of Investigation for supporting the efforts reflected herein. Additionally, the following individuals are recognized for their significant contributions to this volume: FBI Behavioral Science Unit Intern Angela Basso, BSU Visiting Scholar Hayley Daglis Cleary, and other staff of the FBI Training Division who provided significant assistance with the production of this volume including, but not limited to, the editing, organization, and formatting of this volume. Without their generous efforts and sincere commitment to assisting with this project, this work would not have been possible. Suggested Citation: The Future Challenges of Cybercrime: Volume 5 Proceedings of the Futures Working Group. Toby Finnie, Tom Petee, and John Jarvis, editors. Federal Bureau of Investigation: Quantico, Virginia 2010. Initial Release Date: September 22, 2010 Revised: November 4, 2010 Author information: Biographical information pertaining to individual contributors and authors can be found at http://futuresworkinggroup.cos.ucf.edu. The opinions and statements expressed throughout this volume are those of the individual authors and contributors and should not be considered an endorsement or a reflection of the official position of the Federal Bureau of Investigation, the Society of Police Futures International, or any other institution or organization for any policy, program, or service. 2 Table of Contents Acknowledgments............................................................................................................................2 Word from the Chairman………………………………………………………………………….5 Defining “Cyber-Crime”: Issues in Determining the Nature and Scope of Computer-Related Offenses……………………………………………………………………….6 Thomas A. Petee, Lin Huff-Corzine, Joseph Schafer, Janice Clifford, & Greg Weaver Policing the Digital Environment ..................................................................................................12 Toby M. Finnie Cybercrime in the Year 2025 .........................................................................................................44 Gene Stephens Street Crime in a Cashless Economy .............................................................................................51 Michael Buerger Sociology of the Internet: Effects of Social Technology on Policing ...........................................62 John Jackson, & Bud Levin Insights into the Hacking Underground .........................................................................................65 Michael Bachmann & Jay Corzine Cybervictimization .........................................................................................................................76 Jeri N. Roberts, Tina Jaeckle, & Thomas A Petee, John Jarvis What Role and Responsibility Does the Government Have in Protecting Consumer’s Rights to Privacy/Security on the Internet .................................................................80 Andy Bringuel & Wayne Rich The Not-So-Distant Average School Day......................................................................................84 Mary O’Dea & Wayne Rich College-Level Education for Cyber Security .................................................................................89 Jay Corzine 3 Seniors and Cyber Space ...............................................................................................................92 Wayne Rich Protecting and Strengthening Societies .........................................................................................94 Jeff Frazier Partnering With Others to Address Cybercrime ..........................................................................100 Gerald Konkler The Future of Cybercrime ............................................................................................................107 Earl Moulton 4 A Word from the Chairman growing pace. As the discussions progressed at this conference, it became The Futures Working Group, an clear that many possible futures exist ongoing collaboration between the with regard to this very important area. Society of Police Futurists International This volume is an attempt to reflect some (PFI) and the Federal Bureau of of these deliberations and to articulate Investigation, continues to research and strategies to bring about what futurists assemble numerous bodies of work refer to as “preferred futures.” relating to the future of policing. Many of these can be found at As you read the entries contained www.futuresworkinggroup.cos.ucf.edu. herein, remember the goal of futurists-- The entries in the present volume were to make others think. As such, some initiated at a FWG meeting hosted by entries are quite lengthy exploring the Federal Bureau of Investigation in various details of the complexities of the Fall of 2006. I and the FWG wishes cybercriminal behavior. In contrast, to thank all those at the Training other entries are brief observations that Division of the FBI for their support we believe contribute to the discussion of during this endeavor. policing and cybercrimes. All of these entries serve to introduce new, During this time, a group of police challenging, and at times disconcerting managers and futurists as well as ideas. You may agree with some authors academics and military personnel and disagree with others. You may even gathered to consider the ongoing feel somewhat unnerved by what has challenges of cybercrime. Their goal been written. Often considerations of the was to examine various dimensions in future breed these emotions. As is which the future of our dependence on constantly expressed in FWG volumes, computing and other electronic ultimately, it is our fervent desire to transactions could spell both challenges devise ways to motivate individuals to and opportunities for law enforcement. create their own preferred future…--“for yourself, for your agency, and for the At that time, we knew that computer communities you serve.” crime was not only a timely topic but that it would continue to be an important That goal continues. We hope this issue in policing and public safety for latest volume and the efforts that went the foreseeable future To be sure, much into it are helpful toward that end. has recently been written about this subject; however, little has concerned John P. Jarvis, Ph.D. itself with the future of policing and Senior Scientist cybercrime. Clearly, there is a need for Behavioral Science Unit, FBI Academy law enforcement and public safety Chairman, Futures Working Group officials to continually enhance their knowledge, skills, and abilities to keep up with the adversaries that seem to be adopting these technologies at an ever- 5 DEFINING “CYBER-CRIME”: Internet, an offender does not have ISSUES IN DETERMINING THE to come face-to-face with a potential NATURE AND SCOPE OF target, which may make it easier for COMPUTER-RELATED OFFENSES the offender to complete the victimization of the target. Thomas A. Petee, Auburn University But what exactly is ―cyber-crime‖, Jay Corzine, University of Central and is it distinct from other, more Florida traditional forms of crime? To begin Lin Huff-Corzine, University of answering these questions, it would Central Florida be helpful to briefly look at the Janice Clifford, Auburn University components of crime in general. Greg Weaver, Auburn University Traditionally, crime has been defined as an intentional violation of the legal In recent years, there has been code that is punishable by the state. considerable focus within the Central to this definition is the criminal justice system on computer- premise that crime occurs within the related crime. This so-called ―cyber- boundaries of some physical crime‖ has garnered increased reference point, that is, a location attention because computers have that constitutes a specific jurisdiction. become so central to several areas For example, when a conventional of social activity connected to case of fraud occurs, one of the everyday life, including, but not important considerations is where limited to, personal and institutional the actual offense took place so that finances, various record-keeping questions of the appropriate functions, interpersonal jurisdiction for prosecution can be communications, and so on. addressed. Officials need to know Because of its widespread where the victim and offender came accessibility, the advent of the into contact with one another in the Internet has further served to perpetration of the offense so that facilitate predatory personal crimes investigative and prosecutorial and property offenses committed authority can be determined. with a computer. The U.S. Bureau of However, this component is Census reports that in 2000, there confounded when cyber-crime is were 94 million people in the United committed because the location is no States who made use of the Internet longer a static concept. With the (Newburger, 2001). This greatly advent of cyberspace, jurisdiction expands both the potential victim has become much more problematic, and offender pools for both personal transcending local, state, and even and property crimes. Moreover, the national boundaries. One need only nature of this forum has allowed look at the various e-mail scams that some potential offenders to move
Recommended publications
  • 80 Years of Print December 2012 Volume 81 Number 12
    December 2012 %#-7)9;4-5;6.<:;1+-+- 767D3>GD73GA8 @H7EF;93F;A@93F;A@ December 2011 Employee Wellness May 2011 September 2001 Addressing School Violence 80 Years of Print December 2012 Volume 81 Number 12 United States Department of Justice Federal Bureau of Investigation Washington, DC 20535-0001 Robert S. Mueller III Director Contributors’ opinions and statements Features should not be considered an endorsement by the FBI for any policy, program, or service. The attorney general has determined Vigilance Fatigue in Policing Personnel tasked with processing large that the publication of this periodical By Meredith Krause amounts of data, identifying risks, and is necessary in the transaction of the 3 responding to perceived threats can lose public business required by law. Use of funds for printing this periodical has focus as a result of information overload been approved by the director of the and performance-related pressure. Office of Management and Budget. The FBI Law Enforcement Bulletin Armored Car Industry Agencies have an important role in (ISSN-0014-5688) is published monthly by the Federal Bureau of Reciprocity Act and Local ensuring that armored car crew members Investigation, 935 Pennsylvania 19 carry weapons legally and as needed. Avenue, N.W., Washington, D.C. Law Enforcement 20535-0001. Periodicals postage paid By Jeffrey T. Wennar at Washington, D.C., and additional mailing offices. Postmaster: Send address changes to Editor, FBI Law Enforcement Bulletin, FBI Academy, Quantico, VA 22135. Departments Editor John E. Ott Associate Editors 1 Bulletin History 18 Leadership Spotlight Eric A. D’Orazio Linda L. Fresh Doing the “Right Thing” David W.
    [Show full text]
  • Jeffrey Heim, Marcel Hernandez, Maria Nunez,& Matthias Katerna Morris Worm on November 2, 1988, Robert Tappan Morris Releas
    Jeffrey Heim, Marcel Hernandez, Maria Nunez,& Matthias Katerna Morris Worm On November 2, 1988, Robert Tappan Morris released a worm into the internet. The experimental worm was the first of its kind. It replicated itself and programmed itself, so it ended up spreading much faster than Morris expected. It self-programmed and self-replicated at an exponential rate in a manner that had never been seen before. Morris knew this worm was not necessarily ethical, for he released it out of MIT instead of his own Cornell University. In due course, many computers across the United States had crashed because of Morris. Once he discovered how much damage the worm had been causing, he reached out to a friend at Harvard looking for a solution to stop it. They attempted in sending an anonymous message to the network with directions that could kill the worm, but the message came through too late since they system was clogged. Many significant computers at colleges, businesses and the military became infected. The cost to fix each computer ranged from $200 to over $53,000. The worm exploited vulnerabilities in computer systems and in the UNIX email software. Within 24 hours of releasing the worm, thousands of people were aware something was unusual. Eventually, it would infect ten percent of all computers using the internet. The Morris Worm was the largest malware case ever to reach this percentage. However, the percentage was so high due to the fact that the number of computers was much less than today. The computers it impacted included significant systems, such as Stanford’s, Berkley’s and NASA’s.
    [Show full text]
  • Behavioral Science Unit
    Behavioral Science Unit Behavioral Science Unit (BSU) was one of the original instructional components of the FBI's Training Division at Quantico, Virginia. Its mission was to develop and provide programs of training, research, and consultation in the behavioral andsocial sciences for the Federal Bureau of Investigation and law enforcement community that would improve or enhance their administration, operational effectiveness, and understanding of violent crime. The BSU was established in 1972 at the FBI Academy, and was disbanded in 2014. Through its legacy of training, research, and consultation activities, the BSU developed techniques, tactics, and procedures that have become a staple of behavioral-based programs that support the law enforcement, intelligence, and military communities. It is here where the term "serial killer" was coined and where criminal investigative analysis and "profiling" were developed. Many of these programs eventually developed into stand-alone programs, units, and centers such as the National Center for the Analysis of Violent Crime (NCAVC), Behavioral Analysis Unit (BAU), Undercover Safeguard Unit, Crisis Negotiation Unit, Hostage Rescue Team, and Employee Assistance Unit. The mission of the BSU was to be the premier unit for developing and facilitating relevant programs of training, research, and consultation in the behavioral sciences for the FBI workforce, including the law enforcement, intelligence, and military communities that will improve their effectiveness in furtherance of the strategic priorities of the FBI. This is accomplished through the creation of innovative bodies of knowledge in specialty areas and applied research on significant behavioral science issues for use in training and consultation in support of academic, program, and operational matters.
    [Show full text]
  • Hacker Perspectives
    Hacker Perspectives Advanced Computer Networks SS 2007 Franz Sommerauer ACN SS 07 - Hacker Perspectives Overview Definition of a Hacker History of Hacking How to get into Scene Information Gathering Ethical Hacking Most famous Hackers ACN SS 07 - Hacker Perspectives Definition (see Hacker Jargon file) 1. A person who enjoys learning the details of programming systems and how to stretch their capabilities, as opposed to most users who prefer to learn only the minimum necessary. 2. One who programs enthusiastically, or who enjoys programming rather than just theorizing about programming. ACN SS 07 - Hacker Perspectives Types of hackers White hat – A person who is ethically opposed to the abuse of computer systems (ethical hacker) – Generally focuses on securing IT systems Grey hat – A skilled hacker who sometimes acts legally, sometimes in good will, and sometimes not – Hybrid between white and black hat hackers Black hat – Someone who compromises the security of a system without permission from an authorized party – Cracker ACN SS 07 - Hacker Perspectives History of hacking 1972 – John Draper discovers that a 2.6 kHz tone allows to access the internal trunking mechanism of Ma Bell 2.6 kHz tone created by a whistle With a Blue box it was possible to take internal control of Ma Bell's long distance switching equipment 1973 – College students Steve Wozniak and Steve Jobs begin making and selling blue boxes ACN SS 07 - Hacker Perspectives History of hacking 1981 – Chaos computer Club forms in Germany 1982 – Hacker group of six teenage hackers (414’s) broke into 60 computer systems and instiutitions (including Los Alamos Labs) 1988 – Kevin Mitnick secretly monitors the e-Mail of security officials (sentenced for one year to jail) ACN SS 07 - Hacker Perspectives History of hacking 1988 – Robert T.
    [Show full text]
  • The Morris Worm (1988)
    UNIVERSITY OF ZAGREB FACULTY OF ELECTRICAL ENGINEERING AND COMPUTING SEMINAR FOR THE “COMPUTER FORENSICS” COURSE [2017/2018] The Morris Worm (1988) Ana Brassard Zagreb, January 2018 Table of Contents 1. Introduction .......................................................................................................... 3 2. The Internet Worm of November 2, 1988 ............................................................. 4 2.1 The Spreading Mechanism ........................................................................... 5 2.1.1 The Error ........................................................................................................ 5 2.1.2 The Infect Routine ........................................................................................... 6 2.1.3 The Cracksome Routine .................................................................................. 6 2.2 The Effects of Getting Infected ...................................................................... 7 2.3 Solution and Prevention ................................................................................ 8 2.4 Historic Significance ...................................................................................... 8 3. Conclusion ........................................................................................................... 9 4. Bibliography ....................................................................................................... 10 1. Introduction Longer than we would like to admit ago, “The Internet” had yet to be invented,
    [Show full text]
  • Risk Assessment and Knowledge Management of Ethical Hacking In
    Technoethics and Sensemaking: Risk Assessment and Knowledge Management of Ethical Hacking in a Sociotechnical Society by Baha Abu-Shaqra A thesis submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy in Electronic Business Faculty of Engineering University of Ottawa © Baha Abu-Shaqra, Ottawa, Canada, 2020 ii Abstract Cyber attacks by domestic and foreign threat actors are increasing in frequency and sophistication. Cyber adversaries exploit a cybersecurity skill/knowledge gap and an open society, undermining the information security/privacy of citizens and businesses and eroding trust in governments, thus threatening social and political stability. The use of open digital hacking technologies in ethical hacking in higher education and within broader society raises ethical, technical, social, and political challenges for liberal democracies. Programs teaching ethical hacking in higher education are steadily growing but there is a concern that teaching students hacking skills increases crime risk to society by drawing students toward criminal acts. A cybersecurity skill gap undermines the security/viability of business and government institutions. The thesis presents an examination of opportunities and risks involved in using AI powered intelligence gathering/surveillance technologies in ethical hacking teaching practices in Canada. Taking a qualitative exploratory case study approach, technoethical inquiry theory (Bunge-Luppicini) and Weick’s sensemaking model were applied as a sociotechnical theory
    [Show full text]
  • Deepfakes & Disinformation
    DEEPFAKES & DISINFORMATION DEEPFAKES & DISINFORMATION Agnieszka M. Walorska ANALYSISANALYSE 2 DEEPFAKES & DISINFORMATION IMPRINT Publisher Friedrich Naumann Foundation for Freedom Karl-Marx-Straße 2 14482 Potsdam Germany /freiheit.org /FriedrichNaumannStiftungFreiheit /FNFreiheit Author Agnieszka M. Walorska Editors International Department Global Themes Unit Friedrich Naumann Foundation for Freedom Concept and layout TroNa GmbH Contact Phone: +49 (0)30 2201 2634 Fax: +49 (0)30 6908 8102 Email: [email protected] As of May 2020 Photo Credits Photomontages © Unsplash.de, © freepik.de, P. 30 © AdobeStock Screenshots P. 16 © https://youtu.be/mSaIrz8lM1U P. 18 © deepnude.to / Agnieszka M. Walorska P. 19 © thispersondoesnotexist.com P. 19 © linkedin.com P. 19 © talktotransformer.com P. 25 © gltr.io P. 26 © twitter.com All other photos © Friedrich Naumann Foundation for Freedom (Germany) P. 31 © Agnieszka M. Walorska Notes on using this publication This publication is an information service of the Friedrich Naumann Foundation for Freedom. The publication is available free of charge and not for sale. It may not be used by parties or election workers during the purpose of election campaigning (Bundestags-, regional and local elections and elections to the European Parliament). Licence Creative Commons (CC BY-NC-ND 4.0) https://creativecommons.org/licenses/by-nc-nd/4.0 DEEPFAKES & DISINFORMATION DEEPFAKES & DISINFORMATION 3 4 DEEPFAKES & DISINFORMATION CONTENTS Table of contents EXECUTIVE SUMMARY 6 GLOSSARY 8 1.0 STATE OF DEVELOPMENT ARTIFICIAL
    [Show full text]
  • Basics of Ethical Hacking – Manthan M. Desai
    Hacking For Beginners – Manthan Desai 2010 Legal Disclaimer Any proceedings and or activities related to the material contained within this book are exclusively your liability. The misuse and mistreat of the information in this book can consequence in unlawful charges brought against the persons in question. The authors and review analyzers will not be held responsible in the event any unlawful charges brought against any individuals by misusing the information in this book to break the law. This book contains material and resources that can be potentially destructive or dangerous. If you do not fully comprehend something on this book, don‘t study this book. Please refer to the laws and acts of your state/region/ province/zone/territory or country before accessing, using, or in any other way utilizing these resources. These materials and resources are for educational and research purposes only. Do not attempt to violate the law with anything enclosed here within. If this is your intention, then leave now. While using this book and reading various hacking tutorials, you agree to follow the below mentioned terms and conditions: 1. All the information provided in this book is for educational purposes only. The book author is no way responsible for any misuse of the information. 2. "Hacking for Beginners” is just a term that represents the name of the book and is not a book that provides any illegal information. “Hacking for Beginners” is a book related to Computer Security and not a book that promotes hacking/cracking/software piracy. 3. This book is totally meant for providing information on "Computer Security”, "Computer Programming” and other related topics and is no way related towards the terms "CRACKING” or "HACKING” (Unethical).
    [Show full text]
  • Industry Observations on the Emerging Cyber Security Market
    Industry Observations on the Emerging Cyber Security Market Prepared for: Virginia Cyber Security Commission Town Hall By: George Hughes, SimVentions President 2/25/2016 Do not distribute without permission 1 Overview of Briefing • Cyber Security milestones & observations • SimVentions overview and involvement in Cyber Security market • Stafford Technology & Research Center • What can Virginia do to help Cyber Security businesses develop solutions for our rapidly growing national threat(s)? 2/25/2016 Do not distribute without permission 2 Cyber Warfare Milestones December ARPA (Advanced Research Projects Agency) goes online and connects four major U.S. universities. 1969 Designed for research, education, and government organizations, it provides a communications network linking the country in the event that a military attack destroys conventional communications systems. June After learning that the Soviet Union planned to steal software from a Canadian company to control its 1982 Trans-Siberian Pipeline, the CIA alters the software to cause the pipeline to explode. It is considered the first cyberattack. Over the course of 10 months beginning in August, Clifford Stoll, a physics researcher at the University of California at Berkeley, tracks down a hacker who had broken into computers at the Lawrence Berkeley 1986 National Laboratory, a U.S. Department of Energy facility, and other military computers in the U.S. He traced the hacker to Germany. It is the first such investigation. November An Internet worm temporarily shuts down about 10% of the world's Internet servers. It is the first 1988 occurrence of an Internet worm. Robert Tappan Morris, a student at Cornell University, released the worm.
    [Show full text]
  • Cybercrime: Protecting Your Law Firm from the Inevitable by Ben Glass and John Pirkopf
    Glass & Pirkopf | LAW OFFICE MANAGEMENT Cybercrime: Protecting Your Law Firm from the Inevitable By Ben Glass and John Pirkopf ata breach cases have made headlines in recent years, their breach protocol in the event the worst happens. But what Dfrom Yahoo to Marriot to Target to Equifax. While the really should that entail? This article addresses the most com- larger companies tend to attract more public attention, cyber- mon vulnerabilities in a law firm and best practices with crime does not discriminate, and more and more law firms respect to protecting both firm and client information. are impacted by the threat of or actual attacks. According to The Center for Strategic and International Studies (CSIS), the Law Firms and Cyber Security total global cost of cybercrime is closing in on $600 billion, There is more to securing a firm’s network and sensitive and this number is up from the 2014 estimate of $445 billion.1 data than a good password. Security needs to be built into Other estimates make that look conservative. According to Dr. the culture of your workplace. Increasingly, cyber criminals Michael McGuire, Senior Lecturer in Criminology at Surrey are employing clever and sophisticated methods to steal, University in England, the revenues of cybercrime have hit sabotage, or ransom firm data. Law firms are now being $1.5 Trillion annually.2 While this number is staggering in recognized by attackers as a sweet spot for attacks. This is and of itself, it is hard to comprehend exactly what that means due, in part, to the amount of highly sensitive data to which to a law firm.
    [Show full text]
  • Homosexuals (1 of 5) Box: 10
    Ronald Reagan Presidential Library Digital Library Collections This is a PDF of a folder from our textual collections. Collection: Blackwell, Morton: Files Folder Title: Homosexuals (1 of 5) Box: 10 To see more digitized collections visit: https://reaganlibrary.gov/archives/digital-library To see all Ronald Reagan Presidential Library inventories visit: https://reaganlibrary.gov/document-collection Contact a reference archivist at: [email protected] Citation Guidelines: https://reaganlibrary.gov/citing National Archives Catalogue: https://catalog.archives.gov/ Co NF\ DENTlAL Gay Coo.li tion meetlo g, 'Thursd~y, A.u.a;u.st 14 8 J1\1 - 11:30 P1t1 lCh1.trch of the Beloved DiGci.ple, 368 W. 14th Jt.) Over 100 persons in attendru1ce froo a v~riety of the groups co~posin5 the coalition. In thi.s tneetin8, convefled to set a ctrn."tccy of how to p-.ish for passa:·e of 554 betTieen now and the ti::1e it co::1es up for vote, · ther'. coali tion reco l \""ed the fo llo,rinG: 1) Ta.reetina tbe Jewish commani ty 1. esp_ec.inlly -.meens - . 2) Fu.oh 554 opposition onto defensive with 0..'"1 aggressive cara.paisn, to characterize them as bieo·ts aud sup.porters a.s enli6htened o~ponen~s of biBotr1 in all forns. 3) ConcentrB,te on "the movable rgiddle" cov.nci.lirttanic 0 votos as opposed to tl:e u..--iattainable- hard core opvon:ents and the safe proponents. {A) · Actions no,·, S!iecifically beir.e v:orked out iI'!c-lude/an as yet un1 o.ted press cor:fere11ce which will conceN.trate on having gro~ps repre~ei:tatives.
    [Show full text]
  • 1988 Annual Meeting Program
    ACADEMY OF CRIMINAL JUSTICE SCIENCES 1987-1988 PRESIDENT Thomas Barker, Jacksonville State University 1st VICE PRESIDENT AND PRESIDENT ELECT Larry Gaines, Eastern Kentucky University 2nd VICE PRESIDENT Edward Latessa, University of Cincinnati SECRETARY/TREASURER David Carter, Michigan State University IMMEDIATE PAST PRESIDENT Robert Regoli, University of Colorado TRUSTEES Ben Menke, Washington State University Robert Bohm, Jacksonville State University Gennaro Vito, University of Louisville REGIONAL TRUSTEES REGION I-NORTHEAST Raymond Helgemoe, University of New Hampshire REGION 2-SOUTH Ronald Vogel, University of North Carolina at Charlotte REGION 3-MIDWEST Allen Sapp, Central Missouri State University REGION 4-SOUTHWEST Richard Lawrence, University of Texas at San Antonio REGION 5-WESTERNAND PACIFIC Judith Kaci, California State University, Long Beach PAST PRESIDENTS 1963-1964 Donald F McCall 1975-1976 George T Felkenes 1964-1%5 Felix M Fabian 1976-1977 Gordon E Misner 1965-1966 Arthur F Brandstatter 1977-1978 Richard Ward 1966-1%7 Richard 0 Hankey 1978-1979 Richter M Moore J r 1967-1968 Robert Sheehan 1979-1980 Larry Bassi 1968-1969 Robert F Borkenstein 1980-1981 Harry More J r 1%9-1970 B Earl Lewis 1981-1982 Robert G Culbertson 1970-1971 Donald H Riddle 1982-1983 Larry Hoover 1971-1972 Gordon E Misner 1983-1984 Gilbert Bruns 1972-1973 Richard A Myren 1984-1985 Dorothy Bracey 1973-1974 William J Mathias 1985-1986 R Paul McCauley 1974-1975 Felix M Fabian 1986-1987 Robert Regoli ACADEMY OF CRIMINAL JUSTICE SCIENICES 25TH ANNUAL MEETII�G APRIL 4- 8, 1988 SAN FRANCISCO HILTON & TOW'ERS SAN FRANCISCO, CALIFORNI.A PROGRAM THEME: CRIMINAL JUSTICE: VALUES IN TRA.NSITION ACADEMY OF CRIMINAL JUSTICE SCIENCES Dear Colleagues: Welcome to San Francisco and the 19 88 Annual Meeting of the Academy of Criminal Justice Sciences.
    [Show full text]