Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 2 of 2

Full-Text Articles in Entire DC Network

Gun Control: Political Fears Trump Crime Control, Clayton E. Cramer, Joseph Edward Olson Oct 2017

Gun Control: Political Fears Trump Crime Control, Clayton E. Cramer, Joseph Edward Olson

Maine Law Review

No matter how draconian, gun control laws are weakly enforced (at least in the United States) and seldom of any significant effect in reducing crime. The kind of citizen who will comply with a gun law is the opposite of the person who will use a gun to facilitate his or her crimes. The problem of weak enforcement is highlighted by a candid interview with the author of the District of Columbia’s 1968 gun registration scheme while the District’s 1975-76 gun ban was under consideration: The problem, [Hechinger] said, is the failure of the mayor and police department to enforce …


Local Law Enforcement Jumps On The Big Data Bandwagon: Automated License Plate Recognition Systems, Infomation Privacy, And Access To Government Information, Bryce Clayton Newell Feb 2017

Local Law Enforcement Jumps On The Big Data Bandwagon: Automated License Plate Recognition Systems, Infomation Privacy, And Access To Government Information, Bryce Clayton Newell

Maine Law Review

As government agencies and law enforcement departments increasingly adopt big-data surveillance technologies as part of their routine investigatory practice, personal information privacy concerns are becoming progressively more palpable. On the other hand, advancing technologies and data-mining potentially offer law enforcement greater ability to detect, investigate, and prosecute criminal activity. These concerns (for personal information privacy and the efficacy of law enforcement) are both very important in contemporary society. On one view, American privacy law has not kept up with advancing technological capabilities, and government agencies have arguably begun to overstep the acceptable boundaries of information access, violating the privacy of …