Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- ECPA (2)
- Katz (2)
- Katz v. United States (2)
- 911 (1)
- 985 Reasons to Comply with Discovery Requests (1)
-
- A.H. v. State (1)
- AWS (1)
- Abend v. MCA (1)
- Achieving an Appropriate Balance: The Use of Counsel Sanctions in Connection with the Resolution of E- Discovery Misconduct (1)
- Amazon Web Services (1)
- Applied Spectroscopy (1)
- Arizona v. Gant (1)
- Ashcroft v. Free Speech Coalition (1)
- BAC (1)
- Beattie v. State (1)
- Bell v. Wolfish (1)
- Brady v. Maryland (1)
- CALEA (1)
- CAPPS (1)
- CCTV (1)
- Child Pornography Prevention Act (1)
- Closed circuit television (1)
- Coffin v. United States (1)
- Communications Assistance for Law Enforcement Act (1)
- Cybercrime (1)
- DMCA (1)
- DNA (1)
- DRAS (1)
- DRM (1)
- DUI (1)
Articles 1 - 13 of 13
Full-Text Articles in Entire DC Network
Ending Drunk Driving With A Flash Of Light, Andrew Sullivan
Ending Drunk Driving With A Flash Of Light, Andrew Sullivan
Richmond Journal of Law & Technology
Drunk driving exacts an enormous toll on our society. Every year, alcohol-driven crashes kill over ten thousand people, injure hundreds of thousands more, and cost the national economy tens of billions of dollars. States largely have been left to combat this problem through their own criminal regimes. Among the methods used to combat drunk driving is mandating a person convicted of driving under the influence/driving while intoxicated3 install an ignition interlock device (“IID”) in her vehicle as a condition of restoring her driving privileges.
Riley V. California: The New Katz Or Chimel?, Adam Lamparello, Charles Maclean
Riley V. California: The New Katz Or Chimel?, Adam Lamparello, Charles Maclean
Richmond Journal of Law & Technology
To declare that in the administration of the criminal law the end justifies the means—to declare that the Government may commit crimes in order to secure the conviction of a private criminal—would bring terrible retribution. Against that pernicious doctrine this Court should resolutely set its face.
Forensic Collection Of Electronic Evidence From Infrastructure-As-A-Service Cloud Computing, Josiah Dykstra, Damien Riehl
Forensic Collection Of Electronic Evidence From Infrastructure-As-A-Service Cloud Computing, Josiah Dykstra, Damien Riehl
Richmond Journal of Law & Technology
As cloud computing becomes ubiquitous, the criminal targeting and criminal use of cloud computing is inevitable and imminent. Similarly, the need for civil forensic analyses of cloud computing has become more prevalent. Forensic investigation of cloud computing matters first requires an understanding of the technology and issues associated with the collection of electronically stored information (“ESI”) in the cloud. The misuse of the broad term “cloud computing” has caused some confusion and misinformation among legal and technology scholars, leading to a muddied and incomplete analysis of cloud-based discovery issues. Cases and academic analyses have dealt primarily with popular online services …
Making The Punishment Fit The (Computer) Crime: Rebooting Notions Of Possession For The Federal Sentencing Of Child Pornography Offenses, Jelani Jefferson Exum
Making The Punishment Fit The (Computer) Crime: Rebooting Notions Of Possession For The Federal Sentencing Of Child Pornography Offenses, Jelani Jefferson Exum
Richmond Journal of Law & Technology
Sexual exploitation of children is a real and disturbing problem. However, when it comes to the sentencing of child pornography possessors, the U.S. federal system has a problem, as well. This Article adds to the current, heated discussion on what is happening in the sentencing of federal child pornography possession offenses, why nobody is satisfied, and how much the Federal Sentencing Guidelines are to blame. At the heart of this Article are the forgotten players in the discussion—computers and the Internet—and their role in changing the realities of child pornography possession. This Article argues that computers and the Internet are …
Sexting And Teenagers: Omg R U Going 2 Jail???, Catherine Arcabascio
Sexting And Teenagers: Omg R U Going 2 Jail???, Catherine Arcabascio
Richmond Journal of Law & Technology
Sexting is a relatively recent practice engaged in by the young, and sometimes not-so-young, and foolish. “Sexting” is “the practice of sending or posting sexually suggestive text messages and images, including nude or semi-nude photographs, via cellular telephones or over the Internet.”
Databases, E-Discovery And Criminal Law, Ken Strutin
Databases, E-Discovery And Criminal Law, Ken Strutin
Richmond Journal of Law & Technology
The enduring value of the Constitution is the fundamental approach to human rights transcending time and technology. The modern complexity and variety of electronically stored information was unknown in the eighteenth century, but the elemental due process concepts forged then can be applied now. At some point, the accumulation of information surpassed the boundaries of living witnesses and paper records. The advent of computers and databases ushered in an entirely new order, giving rise to massive libraries of factual details and powerful investigative tools. But electronically collected information sources are a double-edged sword. Their accuracy and reliability are critical issues …
Introduction: Contains Cover, Table Of Contents, Letter From The Editor, And Masthead, Jessica M. Yoke
Introduction: Contains Cover, Table Of Contents, Letter From The Editor, And Masthead, Jessica M. Yoke
Richmond Journal of Law & Technology
The Richmond Journal of Law and Technology is proud to present the third issue of the 2008–2009 academic school year, which also is our Annual Survey on E-Discovery.
Perfect Enforcement Of Law: When To Limit And When To Use Technology, Christina M. Mulligan
Perfect Enforcement Of Law: When To Limit And When To Use Technology, Christina M. Mulligan
Richmond Journal of Law & Technology
Road safety cameras can photograph your car running red lights. Some bars record information on driver’s licenses to establish that their patrons are old enough to drink. The Recording Industry Association of America (RIAA) uses automated web crawlers to try to find illegal copies of mp3s, and iTunes embeds personal identifying information in the tracks of every song you buy.
Preventing A Modern Panopticon: Law Enforcement Acquisition Of Real-Time Cellular Tracking Data, Steven B. Toeniskoetter
Preventing A Modern Panopticon: Law Enforcement Acquisition Of Real-Time Cellular Tracking Data, Steven B. Toeniskoetter
Richmond Journal of Law & Technology
Nineteenth Century philosopher Jeremy Bentham designed a prison system known as the Panopticon which was arranged in such a way that a single guard could, at any given time, view the activities and whereabouts of any particular prisoner. Bentham designed the prison in such a way that the prisoners could never tell whether they were being watched. Twentieth Century French philosopher Michel Foucault further considered use of the Panopticon as a means of societal control through fear in his seminal book Discipline and Punish: The Birth of the Prison.
Virtually Free From Punishment Until Proven Guilty: The Internet, Web-Cameras And The Compelling Necessity Standard, Michael Clements
Virtually Free From Punishment Until Proven Guilty: The Internet, Web-Cameras And The Compelling Necessity Standard, Michael Clements
Richmond Journal of Law & Technology
Few legal maxims have had greater resonance than the tenet that one is innocent until proven guilty. It is a principle that has been traced back to Roman times, and it entered the American legal lexicon through the United States Supreme Court decision Coffin v. United States. It has even been incorporated in the United Nations’1948 Declaration of Human Rights under article eleven, section one.4
Globe Newspaper Co. V. Commonwealth: An Examination Of The Media’S “Right” To Retest Postconviction Dna Evidence, Emily S. Munro
Globe Newspaper Co. V. Commonwealth: An Examination Of The Media’S “Right” To Retest Postconviction Dna Evidence, Emily S. Munro
Richmond Journal of Law & Technology
In January of 2000, Governor George Ryan of Illinois issued a statewide moratorium on capital punishment, citing among his reasons the fact that more convicted killers had been exonerated than executed since Illinois reinstated the death penalty in 1977. In 2001 Maryland’s governor issued a temporary moratorium on capital punishment, pending the results of a University of Maryland death penalty study. The North Carolina Senate recently approved a bill that would suspend all state executions for two years, after twenty-one North Carolina municipalities passed resolutions favoring a moratorium and two death-row inmates were awarded new trials.
State Cybercrime Legislation In The United States Of America: A Survey, Susan W. Brenner
State Cybercrime Legislation In The United States Of America: A Survey, Susan W. Brenner
Richmond Journal of Law & Technology
In the United States, cybercrimes are the focus of legislation adopted at both the state and federal levels. The U.S. Constitution allocates lawmaking authority between the two levels according to certain principles, one of which is that even when federal jurisdiction to legislate exists, federal legislation is appropriate only when federal intervention is required. And while federal legislative authority can pre-empt the states' ability to legislate in a given area, it rarely does, so it is not unusual for federal criminal laws to overlap with state prohibitions that address essentially the same issues.
State Criminal Laws In Cyberspace: Reconciling Freedom For Users With Effective Law Enforcement, Sean M. Thornton
State Criminal Laws In Cyberspace: Reconciling Freedom For Users With Effective Law Enforcement, Sean M. Thornton
Richmond Journal of Law & Technology
With the proliferation of online activities in recent years, legal thinkers and the criminal justice system have faced new questions concerning the conflict of state criminal laws. These new questions have old answers; the doctrine of constructive presence has established a state's authority to prescribe an out-of-state activity that has in-state effects. Beyond the mechanical application of jurisdictional rules, however, there lie deeper policy questions concerning the fairness of subjecting computer users to multiple, inconsistent bodies of law. Cyberspace exists in all jurisdictions, and in no particular jurisdiction, at once. There is an apparent tension between the free flow of …