Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 3 of 3

Full-Text Articles in Law

Cybersecurity-Cybercrime-The Legal Environment, Amy J. Ramson Jul 2020

Cybersecurity-Cybercrime-The Legal Environment, Amy J. Ramson

Open Educational Resources

This presentation covers the legal environment of cybercrime to date. It addresses: the challenges of law enforcement; federal government vs. sate jurisdiction of cybercrime; law enforcement department and agencies which handle cybercrime; criminal statutes and privacy statutes.


User-Generated Evidence, Rebecca Hamilton Jan 2018

User-Generated Evidence, Rebecca Hamilton

Articles in Law Reviews & Other Academic Journals

Around the world, people are using their smartphones to document atrocities. This Article is the first to address the implications of this important development for international criminal law. While acknowledging the potential benefits such user-generated evidence could have for international criminal investigations, the Article identifies three categories of concern related to its use: (i) user security; (ii) evidentiary bias; and (iii) fair trial rights. In the absence of safeguards, user-generated evidence may address current problems in international criminal justice at the cost of creating new ones and shifting existing problems from traditional actors, who have institutional backing, to individual users …


Cyberlaundering: The Risks, The Responses, Sarah N. Welling, Andy G. Rickman Apr 1998

Cyberlaundering: The Risks, The Responses, Sarah N. Welling, Andy G. Rickman

Law Faculty Scholarly Articles

This Article discusses the potential use of electronic cash for money laundering and possible government responses to the problem. Parts I and II provide an overview of electronic cash. Part III explores the effects that electronic cash can have on money laundering. Part IV explains through a series of hypotheticals how "cyberlaundering" can occur. Part V analyzes the federal government's response to the threat of money laundering with electronic cash. Part VI concludes the Article with suggestions.