


UPLOADED BY: LEX LUTHOR
DATE: FRI APR 20 02:45:44 PM


$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
$                                     $
$  ---------------------------------  $
$  !   INVESTIGATIVE PROCEDURES.   !  $
$  !--------------------------------  $
$                                     $
$                OF                   $
$                                     $
$  ---------------------------------  $
$  ! ELECTRONIC TOLL FRAUD DEVICES !  $
$  ---------------------------------  $
$                                     $
$                                     $
$        Typed and Uploaded by:       $
$                                     $
$$$$$$$$$$$$-=>Lex Luthor<=-$$$$$$$$$$$
$                                     $
$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
               Part 2
 
PRESENTATION OF EVIDENCE TO PROSECUTORS
------------ -- -------- -- -----------
 
 
   The evidence accumulated by the
Security Department is carefully review
ed by the Legal Department for the
purpose of determining whether suff-
icient evidence exists to warrent the
presentation of the evidence to law
enforcement officials. If the evidence
does warrent such action, it is pres-
ented under appropriate circumstances
to the proper law enforcement officials
. In all cases where prosecution is
recommended, a professionally invest-
igated and documented summary of the
case will be preparted and presented
by the Security Department to the
prosecutor's office. Each case
recommended for prosecution will be
prepared as completely as possible,
usually necessitating little or no
pre-trial investigation for the
prosecutor. The summary of the case
will include the following:
 
     (a) A background of the case with
detaZkof the defendant's activities
and a summary of all pertinent invest-
igative steps and interviews conducted
in the course of the investigation.
     (b) Identification of witnesses.
 
 
     (c) Synopsis of pertinent points
to which each witness can testify.
     (d) Description of all documents
and items of evidence and the suggest-
ed order of proof showing the chron-
ology of events. The physical evidence
presented will normally consist of one
or more of the following: magnetic
tapes from the auxilairy tape recorder,
paper tapes from the DNR, worksheets
and notes prepared in connection with
the analysis of each fraudulent call,
the suspect's toll billing records
covering the period during which the
fraudulent activity occured, computer
printouts which established probably
cause or a statement of the source of
the "probable cause", and the tele-
phone company records of equipment
being provided to the suspect.
 
     (e) Upon request, the law
applicable to the case.
 
 
  Other pertinent Company records will
be furnished under subpoena or demand
of lawful authority. If an arrest or
search warrent is sought, the Security
representitives will cooperate fully
and furnish affidavits required to
support the application for the warrent
s, nevertheless, upon request, such
representatives will accompany the
executing officers to assist in the
identification of any suspected ETF
equipment found. The Security repre-
sentitive will also be available to
suggest pertinent areas for interro-
gation of the persons suspected of
engaging in the fraudulent activity.
 
(I hope that this will help most of
you who Blue Box and who commit other
various Electronic Toll Fraud crimes
to avoid detection of using a DTF.
Also it would seem that they could
get almost *no* proof if you went to
pay phones instead of at your home.)
 
later,
 
$$$$$$$$$$$$-=>Lex Luthor<=-$$$$$$$$$$$
 
              Remote Sysop
 
                   of
 
               Plover-Net
 
              516-935-2481
 
 
 
 
Also: Sysop of The Legion Of Doom!
      305-COE-XXXX
      if your good enough, you'll
      find out the number.


Press Q to continue: 