Terri and Legal Murder

For Terri I feel a deep sadness that civilized society has
developed a thirst to kill those who can not defend their self
or speak for their self.

From the unborn child to the mentally and physically disabled
American courts have given others the right to legally murder those that inconvenient them.

I feel a heart ache that the court would allow Terri’s husband
a man that has found a life with another woman,fathered two children and received a large settlement
to make life or death decisions while taking every right away from the mother who gave her life.

A poem for Terri

It’s hard I know,

To let a an angel go,

She was a flame in the dark,

That touched every heart,

The world will miss her so,

It’a hard to let an angel go.

Some were blind in their sight,

In the angel’s fight,

She left with a light,

That will forever glow,

It’s hard to let an angel go.

Terri was her name,

The world knows an angel came,

They saw an angel’s flame,

From those who loved her so,

It’s hard to let an angel go.

She has taken wings for flight,

Past earthly dreams,past the night,

She is in heaven with God I know,

But it’s hard to let an angel go

Too late for Terri, but I hope someday the American courts and government will change the laws to prevent the legal murder of innocent Americans.


Whatever a person is a victim of ,crime or accident, When he takes his case to court.he becomes a victim for the second time.
Going through a legal battle in court can be a very emotional and traumatic experience where often the victim becomes the defendant.
A good lawyer will often find a lack of evidence ,
where some people such as Michael Jackson and O.J.Simpson are found innocent.

When a victim takes his case to court he becomes the defendant.
He has become the victim of the lawyers and the court.
This happens even in cases that are not high profile.
Victims that know what they will be subjected to sometime choose to remain silent leaving others in danger.
Victims that choose to go to court seeking justice do not always find it ,but it will be at a cost of emotional trauma to try to find justice

Tina’s Angels

I still think about them from time to time,How beautiful and sweet they were.
Such a tragdy that even though years have past the horror stays with me.
How a man that I knew could take his sweet angel daughters

Hailey and Brooke, and hold them across his lap, as the oldest one about seven cried daddy don’t, and pulled the trigger killing his daughters with a bullet to the back of the head.

Tina once told me that most people won’t mention their names to her, and she loved me for letting her know I never forgot her daughters ,or pretended they never existed, because they did.
Others thought it hurt her more to hear their name, but in reality it hurts her more when no one mentions them.
Angels came down and walked this earth and touched hearts.
Tina wasn’t killed that day,but death would have shown more mercy,than to live with the heartache of losing her two little girls,Brooke almost two,Hailey 7.

After that moment and others of those I don’t know has came and will come again ,It leaves questions of the right of others to own firearms.
I’m sure there are more deaths from accidents and those with cruel intent than there are lives saved because someone owned a firearm.
There were signs of this man’s troubled life,but no one could save two little girls from their father and his firearm.
Tina had sought a court restrain order,but it was to no advail,
when she first asked for help.

The policeman with his high powered rifle broke the door down,
where her husband held her two daughters,
But he arrived too late.The little girls father had killed his little girls and than took his own life.
This is a sad story of domestic violence, and the silent cry for help.But no one was listening.

Once two angels walked this earth,
To show this world what love is worth,
Now walking across heaven’s floor,
Their light shines through heaven’s door.
Hailey and Brooke are God’s angels forever more.

Tools and Programs Used by Criminal Justice Majors

There are many tools and programs used by criminal justice majors, but most of them are not much different than what your average college student would need to get through their course of studies. Depending on what school you attend and what the requirements are, you may need a variety of tools and programs. This could include anything from just a computer, Internet access and text books to a collection of software programs that are commonly used in the industry.

As a criminal justice major you will need to write a lot of papers on various subjects of law, order, crime and punishment, which will require access to a computer with a word processor and Internet for research. You will also spend a lot of time in the library. This could include the campus library, local municipal library and legal libraries. This requires a good working knowledge of the systems used in both traditional and legal libraries.

Many degree programs require trips to prisons, courts, police departments and other institutions of the legal and criminal system to see working professionals in action. Visiting these institutions may require a thick skin, which you will need to make it in this career in the first place.

Other tools and programs include a wide variety of textbooks for courses in child abuse and neglect, criminal law, dispute resolution, gang culture, investigative procedures, the judicial system and more. You will also need to take supplementary courses that help prepare you for your specific career goals within the criminal justice field. These may include anthropology, business, chemistry, journalism, psychology, sociology and other classes. These may require specialized software programs and other tools.

Criminal justice majors use a variety of tools and programs as they make their way from their first semester to their final months of study before graduation. It really depends on the school, the type of program and your specialization. It would be a good idea to inquire with specific schools about the requirements of their programs and the tools that criminal justice majors are required to use.

Seeking Justice and a No Win No Fee Compensation

Even if you don’t have the financial capability to seek justice for the personal injuries that you have suffered due to the negligence of the other party, you can pursue a case against them by choosing to avail the No Win No Fee compensation. This agreement actually became popular since it was introduced in 2000 because this gives hope to those who can’t afford to file for claims to pursue their case.

The term is self-explanatory. You seek the services of someone who deals with No Win No Fee compensation. You don’t have to give them anything at the start of the process. If they will not win your case, you don’t have to pay them anything at all. If they win the case, they will be paid a standard fee and the uplift fee by the Courts or the other party’s insurers. Your only role is to give your lawyer exact details of what really happened and the evidences that you have gathered that you think will help you both win in the end. Most lawyers who handle such cases will do everything they can and work very hard because they won’t get anything if they will lose the legal battle.

If you are facing this kind of situation, it will be best to hire the services of the right people. You will know more about it if you will conduct a brief research about the process and about the people who are known with these procedures. You can accomplish this task by browsing through various online resources. You may also want to get referrals and recommendations from people who have tried such route and have been successful with this kind of venture.

The main point here is that you must fight your case, especially if you have strong evidences that will help you win in the end. You must not lose hope and you must think about the long term effects of the accident before you ignore and decide to forget about what happened.

Our Christian and Patriotic Truths, Justice and Our Real Freedom

On July 4th of each year the citizens of the U.S. “we the people” commemorate our nation’s birth with a patriotic holiday. We call it Independence Day. We celebrate that our country chose to shake off the shackles of oppression and to establish a government that believed in the importance of liberty and a different kind of freedom.

Independence Day like many summer holidays, gets overshadowed by things like parties, family gatherings, picnics, and day off from work. Yet, at the heart of these pursuits is the desire to freely enjoy our lives, and our individual way of thinking.

Throughout our U.S. history millions have flocked to our shores seeking a life with this promise “The American Dream” as most call it. Our country has grown tremendously in wealth and influence precisely because we accepted these people. They are not always welcomed with open arms because racism and bigotry have always been around. But the diversity of our population is one of our greatest assets. Too often we think it is the source of our problems. Our mindset is that it was alright for our ancestors to find America’s shores, but we’re reluctant about today’s new arrivals, usually out of fear that will take our piece of American pie.

Today it is easy to criticize what we find wrong with our country, our political, and our legal system. The lack of equality when it comes to the freedom to pursue “life, liberty and our pursuit of happiness”. It is our right and a duty of each citizen to protest injustice. That was exactly what was happening back in 1776 when the colonists were fed up with the imposition of unfair taxation, representation, and repression they felt from “Mother England”.

Before we can prophetically speak on the issues of societal freedom I think we must first look at our individual freedom. We cannot separate the two and be fair, and we can’t demand changes in the system unless we first look closely at our own situations and face up to the freedoms we have that come with our patriotic responsibility as a citizen, and Christian beliefs.

If you are currently living with an income that meets your basic needs of food and shelter, and you have the freedom to worship as you please. If you have done some “inside work” to discover how much you live from your false self (the one that always wants to get your own way – even with good intentions) and the opportunity to live from your true self (the one that is in union with God and our fellow man), then you must face up to the responsibility of being a freedom fighter for God’s kingdom and this great country.

Before you pick up your picket sign and go marching off to war for social justice, just take a moment to look at what Jesus did in his situation in Palestine. He didn’t go around demanding that Rome leave the occupied Holy land. He didn’t tell his disciples or the people that He spoke to that they are the only ones who get God’s grace. But He did remark about the many that were persecuted, prosecuted, and those who were not in favor with the current government and Jewish hierarchy. If you are intrigued by these comments you could go read this for yourself, the messages are there in the four Gospels of the New Testament.

Jesus gave us an invitation to follow Him in the way of real truth, real justice and real freedom. He told us that when we receive others we are receiving Him, and following the commandments that our Father in heaven asks us to do. He gathered the small children in His arms and instructed grownups to be innocent and trusting like children. He also told us the world would not understand this, and we would face persecution, and possibly prosecution when we choose to follow this path.

The struggle for each of us face is to be honest with where we are with these teachings in our daily lives. This takes a daily assessment and reckoning. We cannot be completely faithful unless we are spending more time looking at ourselves, our faults, our shortcomings, and the blessings that we receive, than we are at pointing out the faults of others, or envying the blessings that others receive.

The teachings of Jesus in the Four Gospels give us clear cut directions on how to do this. I know I can’t begin to honestly assess my faults and blessings without this help in the Four Gospels and also with the strength we receive from our Father in heaven.

It All Starts With You

It has to start with each of us; the freedom to choose the way of love, or hate. The individual freedoms we have cannot be separated from the societal freedom we should all share. Here is why community is necessary. Community must include everybody! If it only includes those we like or want to be with, then we just create little cliques and gather power, then we are in the role of oppressor (even when we don’t think so).

The followers of Christianity, who are true believers in the equal spreading of God’s Word and His blessings, are the real “Freedom Fighters” in this world. We can do this from a position of humility and service to our Father. We can be passionate and compassionate to one and all. If we can truly see Jesus in others and ourselves; we can rejoice that God hasn’t reserved His love only for the righteous, but for all.

True freedom is the freedom to let go of past hurts and resentments, to let go of future ambitions and trust that our Father in heaven will take care of us. It is the freedom to truly accept others. It is freedom to be a giver and not just a taker. It is this powerful freedom that oddly springs from our acceptance that we are, powerless without our Fathers grace, mercy, and blessings that He gives each of us through His love, and being blessed by in living in this great country.

Digital Evidence and Legal Proceedings

When it comes to submitting digital evidence for use in a trial, the same levels of care need to be applied as with non-digital evidence.

Crime is a part of human life and, for a crime to be resolved, investigators have to reconstruct the crime scene and analyse the actions of both the suspect and the victim so that any evidence can be identified and used to support and legal proceedings.

As technology has evolved, criminals are now able to use new methods to commit traditional crimes and develop new types of crimes. Crimes committed through the use of technology still require the same principles of investigation, though the scene can now be a virtual environment that must be secured and examined as digital evidence.

Digital evidence is information or data of an evidential value that is stored on or transmitted by a computer or digital device and can be defined as follows:

‘Any data stored or transmitted using a computer that support or refute a theory of how an offense occurred or that address critical elements of the offense such as intent or alibi’ (Casey, E., Dunne, R. (2004) Digital Evidence and Computer Crime Forensic Science, Computers and the Internet. St. Louis: Academic Press).

A wider array of devices are capable of holding larger amounts of data and digital evidence can be found on an increasing number of types of storage media, including, computer hard drives, mobile phones and removable media such as memory cards.

As an expert witness and Digital Forensic Consultant I am finding that digital evidence is becoming more prevalent within a wider range of both criminal and civil cases including murder, unlawful images, child care cases, commercial and employment disputes. These cases can require the examination of evidence to determine whether it had been used to commit or facilitate a crime as well as to identify supportive material for either side of a legal case.

In order for digital evidence to be admissible in court a number of criteria must be met, including, ensuring that the evidence has not been altered and that an auditable trail has been kept relating to the storage and investigation of the evidential device or media. The key points of the handling and investigation of digital evidence is provided as follows:

Actions taken to secure and collect digital evidence should not affect the integrity of that evidence;
Persons conducting an examination of digital evidence should be trained for that purpose;
Activity relating to the seizure, examination, storage, or transfer of digital evidence should be documented, preserved, and available for review.

(U.S. Department of Justice (2004) Forensic Examination of Digital Evidence: A Guide for Law Enforcement, Washington).

The nature of digital devices therefore makes them particularly susceptible to damage or corruption. Due to the constant requirement for devices to be physically smaller in size yet bigger in capacity, the components become ever smaller and more delicate, therefore, even storing the devices in an unsuitable environment can cause the corruption and loss of some or all of the data present.

Therefore, to ensure its integrity, a ‘chain of custody’ relating to the evidence should be established. This usually amounts to a paper trail detailing the whereabouts of all evidential sources during custody, along with the details of individuals having access to it, when and any actions taken with it. This, along with a comparison and review of the digital media itself should allow for the acceptance by an independent examiner that a given item of media has not been corrupted or compromised following seizure.

As the level of understanding of the operation of computers and mobile phones has developed within legal cases, those investigating cases involving digital evidence have a better awareness of the methods of seizure and handling. Previously it was not uncommon to find cases where the digital evidence had been switched on and operated by a ‘curious’ investigating officer to ‘see what was there’.

Thankfully, far greater emphasis is now placed on audit trails and storing the evidence correctly and, today, such activity by untrained individuals is now rare. The adherence to computer evidence guidelines is crucial to ensuring that the evidence considered is all that was available and basing an examination on flawed evidence that is only partially complete.

As a forensic investigator, I was recently involved in a case that highlights the importance of ensuring the completeness of digital evidence. The case involved an unemployed middle-aged man who lived on his own and kept himself to himself, though, used his computer to talk to other people within chat rooms.

He had been in contact with one of his online friends via a chat room for eight months before they asked for him to do them a favour and cash a cheque that their elderly mother was unable to do. His expenses were to be covered and he saw no problem with then transferring the money to the mother’s account. Unfortunately, he did not even think that the cheque could be fraudulent until he found himself in a police station and being interviewed on suspicion of attempting to cash a fraudulent cheque.

He provided police with his version of events; fortunately, they had also seized his home computer. They examined the computer and found evidence to indicate that the defendant had been in contact with the individual, yet found no evidence to support the origins of the cheque or the story behind it. He was subsequently charged with fraud and was due to appear for trial at Crown Court.

Given the partial evidence identified by the police, the defendant’s solicitors understood the situation sufficiently to know that a second opinion should be conducted of the computer hard drive to determine whether the evidence of any chat logs could be found on the computer.

It was only after a careful review of the deleted areas of the hard drive, along with the use of data recovery software that chat log activity was identified that supported the defendant’s version of events. The log proved that the defendant and his friend had conversed on a number of occasions and it also confirmed the origins of the cheque. After months of investigation, after the identification of this evidence, the case was dropped on the morning of the trial.

Had the computer evidence not been sufficiently protected and secured following seizure and the data present altered in any way, whether it be by use of the hard drive or improper handling of the drive, the relatively small piece of crucial evidence may have been lost and the defendant’s version of events could not have been supported.

During the examination process of digital evidence it is standard procedure for the evidence to be connected to a suitable system using write protecting hardware so that no alteration or access to the original device is possible.

Due to the volatility of digital evidence it is best practise to take a forensic ‘image’ of the hard drive or storage device that consists of an exact byte-by-byte copy of all data and space, both live files and deleted information, which is present on the device. This forensic image then forms the basis of the investigation and analysis and the original exhibit can then be securely stored.

At the start of the forensic copying process, the device is assigned an acquisition hash value (most commonly an MD5 hash value). Once the evidence has been forensically acquired (imaged, similar to copied) the evidence is assigned a verification hash value.

Currently, it is believed that the hash value mechanism indicates that the acquired evidence is a complete and accurate copy of the data contained on the original device and that if the acquisition and verification hash values match then no alteration of the evidence can have taken place.

Various types of hash value exist, including, HAVAL, MD5 and SHA. The forensic arena has adopted the MD5 hash as a method of proving that one file is identical to another or an item of digital evidence has not been altered since its original acquisition. The MD5 hash value was developed from 1991 by Professor Ronald L. Rivest.

As the MD5 algorithm is based on a 128-byte data block, it would appear that there is the possibility that the data on an item of digital media could be manipulated, yet the MD5 hash value not be altered. Given this, I am currently undertaking research to attempt to verify whether an item of digital evidence can be altered without changing its MD5 hash value.

This will enable the adoption of a technique to allow for the alteration of digital evidence without changes to the assigned hash value. The result of this research may be that it is possible to alter an item of digital evidence sufficiently to make the current hashing techniques unreliable in court.