Please click here to visit our sponsor

crimes criminals copscrime spidermurders, investigations, detectives, links
Cybercrime: Prevention


This is the old Crime Spider Directory. Please click here to search through the new directory with the most current links and information.


   Internet Crime (40)
   Other (12)
   Prevention (18)
   Urban Legends (3)
   Viruses (4)
Search for:
  • AAA Web surfers beware
    I have been attacked and left for dead by someone I had met on the net. Could it happen to you? Absolutely.

  • Blue Ridge Thunder
    America's Internet Crimes Against Children Task Force.Operation Blue Ridge Thunder is proactive and is diligently working to apprehend perpetrators, protect potential victims, and educate parents, teachers and children about Internet safety.

    Center for Education and Research in Information Assurance and Security.

  • Coast Hotlist Computer Security, Law
    Information on computer security, law, research, and more.

  • Computer Crime and Abuse, IBM Midrange
    Computer Crime and Abuse, a review of the IBM AS/400.
    In partial fulfillment of the requirement for the degree - Master of Arts in Management Saint Marys University of Minnesota.

  • Computer Security Institute
    World's leading membership organization specifically dedicated to serving and training the information, computer and network security professional.

  • Cyber Safe
    CyberSafe secures the applications that run businesses. Software products and services allow you to run diverse business-critical applications across mixed network environments and over the Web, with complete assurance of authenticity, privacy and integrity.

  • Evidence Eliminator
    False advertising has duped many consumers into buying cheap worthless imitation software - "disk-washer-erasers" that do not work - you might as well throw your money away. If you have recently been the victim of a scam by one of these fly-by-night outfits you are strongly urged to get your money back as quickly as possible, and not to use the software under any circumstances because it could even damage your hard disk! You don't have to take risks, make sure you accept only the authentic, original Evidence Eliminator™ and be sure you are both 100% safe and secure.

  • FACCI Computer Crime Investigators
    The Florida Association of Computer Crime Investigators is a not-for-profit association which was formed for the purpose of providing training, resource sharing, legal updates, and networking opportunities to aid Florida law enforcement agencies and corporations in conducting computer crime investigations.

  • Fidex americas'
    Technology Escrow's including software, source-code, web site, and trademark. Great cyber-law links page.

  • ISN - InfoSec News
    InfoSec News is a privately run, medium traffic list that caters to distribution of information security news articles. These articles will come from newspapers, magazines, online resources, and more

  • Identity Theft Resources
    Identity Theft Prevention, Identity Theft,online opportunity,credit expert, theft, protection, family protection, insurance, ftc,identity theft, identity, evaluation,

  • Information Systems Security Association
    The ISSA is a not-for-profit international organization of information security professionals and practitioners. It provides education forums, publications and peer interaction opportunities that enhance the knowledge, skill and professional growth of its members.

  • Internet Privacy and Security
    Internet security and privacy products, information for anonymous surfing, secure email communication, virus protection, internet cookie management and more.

  • SOC-UM
    A non-profit organization dedicated to prevention, awareness, and education of child abuse.

  • Spyware Eliminator
    Did you know companies and individuals can be spying on your computer activity? Have you ever been tricked into downloading Gator? Do you seen a ridiculous number of popups when you do ordinary surfing of the web? Aluria's spyware eliminator will find the spyware and kill it, then protect you from future invasions. If you use Kazaa or other file-sharing programs. If you ever clicked okay on a box that looked like a download and then thought, oh wait, what was that? You could be a victim of spyware.

  • Stealth Message - ensure email privacy.
    Stealth Message is a free online messaging system for communicating in private. It ensures your privacy, allowing you to communicate in confidence with friends and colleagues. It offers self-destruct features and prevents copying or forwarding of messages.

    A Positive ID interactive database designed to create a safe environment for adults and children who utilize the Internet and it's resources. Stop the predators and the stalkers in their tracks!

Suggested Reading for this Topic


Crime Spider