Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 9 of 9

Full-Text Articles in Law

Revenge Porn, Thomas Lonardo, Tricia P. Martland, Rhode Island Bar Journal Nov 2018

Revenge Porn, Thomas Lonardo, Tricia P. Martland, Rhode Island Bar Journal

Life of the Law School (1993- )

No abstract provided.


Smart Devices In Criminal Investigations: How Section 8 Of The Canadian Charter Of Rights And Freedoms Can Better Protect Privacy In The Search Of Technology And Seizure Of Information, Lee-Ann Conrod Oct 2018

Smart Devices In Criminal Investigations: How Section 8 Of The Canadian Charter Of Rights And Freedoms Can Better Protect Privacy In The Search Of Technology And Seizure Of Information, Lee-Ann Conrod

LLM Theses

This thesis examines the jurisprudence from the Supreme Court of Canada (SCC) on informational privacy under section 8 of the Canadian Charter of Rights and Freedoms as it relates to searches of technology in the context of criminal investigations. The development and use of technology in criminal investigations will be detailed along with an overview of the current state of the law in this area. Challenges with the interpretation of section 8 demonstrate a prevalent uncertainty. This thesis proposes a new approach for the SCC to apply to cases where technology intersects with section 8 of the Charter. The proposal …


A "Reasonable" Expectation Of Sexual Privacy Inthe Digital Age, Moira Aikenhead Oct 2018

A "Reasonable" Expectation Of Sexual Privacy Inthe Digital Age, Moira Aikenhead

Dalhousie Law Journal

Two Criminal Code offences, voyeurism, and the publication of intimate images without consent, were enacted toprotect Canadians' right to sexual privacy in light of invasive digital technologies. Women and girls are overwhelmingly targeted as victims for both of these offences, given the higher value placed on their non-consensual, sexualised images in an unequal society.Both offences require an analysis ofwhether the complainant was in circumstances giving rise to a reasonable expectation of privacy, and the use of this standard is potentially problematic both from a feminist standpoint and in light of the rapidly evolving technological realities of the digital age. This …


Visibly (Un)Just: The Optics Of Grand Jury Secrecy And Police Violence, Nicole Smith Futrell Oct 2018

Visibly (Un)Just: The Optics Of Grand Jury Secrecy And Police Violence, Nicole Smith Futrell

Dickinson Law Review (2017-Present)

Police violence has become more visible to the public through racial justice activism and social justice advocates’ use of technology. Yet, the heightened visibility of policing has had limited impact on transparency and accountability in the legal process, particularly when a grand jury is empaneled to determine whether to issue an indictment in a case of police violence. When a grand jury decides not to indict, the requirement of grand jury secrecy prevents public disclosure of the testimony, witnesses, and evidence presented to the grand jury. Grand jury secrecy leaves those who have seen and experienced the act of police …


The Robot-Transporter: Sex Trafficking, Autonomous Vehicles, And Criminal Liability For Manufacturers, Olivia Phillips Oct 2018

The Robot-Transporter: Sex Trafficking, Autonomous Vehicles, And Criminal Liability For Manufacturers, Olivia Phillips

Dickinson Law Review (2017-Present)

Despite global condemnation, sex trafficking continues to plague our world. Even in developed countries, the problem persists. Technological advancements, like the Internet, have spurred the development of organized sex trafficking networks and have made “transactions” easier. Although law enforcement agencies have tried to adapt their investigative techniques to combat the problem, developments in technology move at a much quicker rate.

Autonomous vehicles (AVs) will present a new set of challenges for law enforcement agencies in the fight against sex trafficking. In the not-too-distant future, AVs, or “self-driving cars,” will dominate the roadways. An AV will be completely aware of the …


Trafficking Technology: A Look At Different Approaches To Ending Technology-Facilitated Human Trafficking, David Barney Sep 2018

Trafficking Technology: A Look At Different Approaches To Ending Technology-Facilitated Human Trafficking, David Barney

Pepperdine Law Review

In 2018, many believe that slavery is an antiquated concept. But as with anything else, if it has not become extinct, it has evolved with time. Human trafficking is no different. Each year, millions of men, women and children are trafficked in the United States, and internationally, and forced to work against their will. Through the rise of technology and an increasingly globalized world, traffickers have learned to use technology as a tool to help facilitate the trafficking of persons and to sell those victims to others they never could have reached before. But what are we doing about it? …


Technological Incarceration And The End Of The Prison Crisis, Mirko Bagaric, Dan Hunter, Gabrielle Wolf Jan 2018

Technological Incarceration And The End Of The Prison Crisis, Mirko Bagaric, Dan Hunter, Gabrielle Wolf

Journal of Criminal Law and Criminology

The United States imprisons more of its people than any nation on Earth, and by a considerable margin. Criminals attract little empathy and have no political capital. Consequently, it is not surprising that, over the past forty years, there have been no concerted or unified efforts to stem the rapid increase in incarceration levels in the United States. Nevertheless, there has recently been a growing realization that even the world’s biggest economy cannot readily sustain the $80 billion annual cost of imprisoning more than two million of its citizens. No principled, wide-ranging solution has yet been advanced, however. To resolve …


Cybersurveillance Intrusions And An Evolving Katz Privacy Test, Margaret Hu Jan 2018

Cybersurveillance Intrusions And An Evolving Katz Privacy Test, Margaret Hu

Scholarly Articles

To contextualize why a new approach to the Fourth Amendment is essential, this Article describes two emerging cybersurveillance tools. The first Cybersurveillance tool, Geofeedia, has been deployed by state and local law enforcement. Geofeedia uses a process known as "geofencing" to draw a virtual barrier around a particular geographic region, and then identifies and tracks public social media posts within that region for predictive policing purposes. The second tool, Future Attribute Screening Technology (FAST), is under development by the United States Department of Homeland Security (DHS). FAST is another predictive policing tool that analyzes physiological and behavioral signals with the …


User-Generated Evidence, Rebecca Hamilton Jan 2018

User-Generated Evidence, Rebecca Hamilton

Articles in Law Reviews & Other Academic Journals

Around the world, people are using their smartphones to document atrocities. This Article is the first to address the implications of this important development for international criminal law. While acknowledging the potential benefits such user-generated evidence could have for international criminal investigations, the Article identifies three categories of concern related to its use: (i) user security; (ii) evidentiary bias; and (iii) fair trial rights. In the absence of safeguards, user-generated evidence may address current problems in international criminal justice at the cost of creating new ones and shifting existing problems from traditional actors, who have institutional backing, to individual users …