Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Article 71 (1)
- Blockchain (1)
- Chavez v. Martinez (1)
- Chocolate Tax fraud (1)
- Cigarette fraud (1)
-
- Compulsion (1)
- Constitutional rights (1)
- Criminal procedure (1)
- Cyber attack (1)
- Cyber crime (1)
- Cyberlaw (1)
- DR TV (1)
- Dark web (1)
- Denmark (1)
- ECR (1)
- ESS (1)
- Electronic Sales Suppression (1)
- Encryption (1)
- Espionage (1)
- Fifth Amendment (1)
- Foreign relations (1)
- GCC (1)
- Going dark (1)
- Hacking (1)
- International law (1)
- Jurisdiction (1)
- Law enforcement (1)
- MTEC (1)
- MTIC (1)
- Miranda v. Arizona (1)
Articles 1 - 4 of 4
Full-Text Articles in Law
The Technology Requirements Of The First Electronic Monitoring Agreement In Us For Zappers, Phantomware, And Other Sales Suppression Devices, Richard Thompson Ainsworth, Robert Chicoine
The Technology Requirements Of The First Electronic Monitoring Agreement In Us For Zappers, Phantomware, And Other Sales Suppression Devices, Richard Thompson Ainsworth, Robert Chicoine
Faculty Scholarship
On August 30, 2017, a plea was entered in the case of case of State of Washington v. Wong, Wash. Super. Ct., No. 16-1-00179-0, and as a result the first electronic monitoring agreement of sales transactions in the US (the “Monitoring Agreement”) was legislatively imposed on a retail business.
The Monitoring Agreement was negotiated between the State of Washington Department of Revenue (the “WA DOR”) and the taxpayer over a period of several months and is comprised of two parts: the basic agreement, which covered the obligations and rights of the parties, and an appendix, which defines the scope of …
The First Real-Time Blockchain Vat - Gcc Solves Mtic Fraud, Richard Thompson Ainsworth, Musaad Alwohaibi
The First Real-Time Blockchain Vat - Gcc Solves Mtic Fraud, Richard Thompson Ainsworth, Musaad Alwohaibi
Faculty Scholarship
Following years of study the Gulf Cooperation Council (GCC) appears ready to adopt the recommendations of the International Monetary Fund (IMF) and put in place a tax system that will stabilize revenue. A value added tax (VAT) and corporate income tax (CIT) are considered. A VAT Framework Agreement, that functions like the VAT Directive in the EU, has been agreed.
Although new, the GCC VAT is very worthy of attention. From a tax policy perspective, it is making notable improvements to EU VAT design. The GCC VAT is (potentially) the world’s first real-time, blockchain-secured, multi-jurisdictional VAT. This is a remarkable …
The Prophylactic Fifth Amendment, Tracey Maclin
The Prophylactic Fifth Amendment, Tracey Maclin
Faculty Scholarship
Before Miranda was decided, the Court had not squarely confronted the issue of when a violation of the Fifth Amendment occurs. Over fifty years ago, the Court acknowledged that the right against self-incrimination has two interrelated facets: The Government may not use compulsion to elicit self-incriminating statements; and the Government may not permit the use in a criminal trial of self-incriminating statements elicited by compulsion. Back then, the “conceptual difficulty of pinpointing” when a constitutional violation occurs — when the Government employs compulsion, or when the compelled statement is actually admitted at trial — was unimportant. Chavez v. Martinez forced …
Searching Places Unknown: Law Enforcement Jurisdiction On The Dark Web, Ahmed Ghappour
Searching Places Unknown: Law Enforcement Jurisdiction On The Dark Web, Ahmed Ghappour
Faculty Scholarship
The use of hacking tools by law enforcement to pursue criminal suspects who have anonymized their communications on the dark web presents a looming flashpoint between criminal procedure and international law. Criminal actors who use the dark web (for instance, to commit crimes or to evade authorities) obscure digital footprints left behind with third parties, rendering existing surveillance methods obsolete. In response, law enforcement has implemented hacking techniques that deploy surveillance software over the Internet to directly access and control criminals’ devices. The practical reality of the underlying technologies makes it inevitable that foreign-located computers will be subject to remote …