Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 47

Full-Text Articles in Law

Prevention And Imminence, Pre-Punishment And Actuality, Gideon Yaffe Dec 2011

Prevention And Imminence, Pre-Punishment And Actuality, Gideon Yaffe

San Diego Law Review

In a variety of circumstances, it is justified to harm persons, or deprive them of liberty, in order to prevent them from doing something objectionable. We see this in interactions between individuals--think of self-defense or defense of others--and we see it in large-scale interactions among groups--think of preemptive measures taken by countries against conspiring terrorists, plotting dictators, or ambitious nations. We can argue, of course, about the details. Under exactly what conditions is it justified to inflict harm or deprive someone of liberty for reasons of prevention? But in having such arguments we agree on the fundamental idea: there are …


Inchoate Crimes At The Prevention/Punishment Divide, Kimberly Kessler Ferzan Dec 2011

Inchoate Crimes At The Prevention/Punishment Divide, Kimberly Kessler Ferzan

San Diego Law Review

In this Article, I argue that inchoate crimes are best dealt with under a preventive regime. Part II argues that inchoate crimes and preparatory offenses are primarily aimed at preventing a harm and not at punishing those who deserve it. It also revisits concerns with punishing incomplete attempts that Larry Alexander and I have voiced previously. Part III considers Alec Walen's recent proposal to combat terrorism through the criminalization of threats as an inchoate offense. It also addresses general concerns with Walen's proposal and claims that Walen does not resolve the problems with inchoate criminality set forth in Part II. …


Prevention As The Primary Goal Of Sentencing: The Modern Case For Indeterminate Dispositions In Criminal Cases, Christopher Slobogin Dec 2011

Prevention As The Primary Goal Of Sentencing: The Modern Case For Indeterminate Dispositions In Criminal Cases, Christopher Slobogin

San Diego Law Review

This Article contends that properly constituted, indeterminate sentencing is both a morally defensible method of preventing crime and the optimal regime for doing so, at least for crimes against person and most other street crimes.

More specifically, the position defended in this Article is that, once a person is convicted of an offense, the duration and nature of sentence should be based on a back-end decision made by experts in recidivism reduction, within broad ranges set by the legislature. Compared to determinate sentencing, the sentencing regime advanced in this Article relies on wider sentence ranges and explicit assessments of risk, …


Lifting The Cloak: Preventive Detention As Punishment, Douglas Husak Dec 2011

Lifting The Cloak: Preventive Detention As Punishment, Douglas Husak

San Diego Law Review

Most of the scholarly reaction to systems of preventive detention has been hostile. Negative judgments are especially prevalent among penal theorists who hold nonconsequentialist, retributivist rationales for criminal law and punishment. Surely their criticisms are warranted as long as we confine our focus to the existing systems of preventive detention that flagrantly disregard fundamental principles of legality and desert. Nonetheless, I believe that many of their more sweeping objections tend to rest too uncritically on doctrines of criminal theory that are not always supported by sound arguments even though they are widely accepted. I will contend that we cannot fully …


A Punitive Precondition For Preventive Detention: Lost Status As A Foundation For A Lost Immunity, Alec Walen Dec 2011

A Punitive Precondition For Preventive Detention: Lost Status As A Foundation For A Lost Immunity, Alec Walen

San Diego Law Review

This Article argues that the presumption that an actor will be law-abiding, like the right to liberty itself, can be forfeited by criminal actions. In other words, the point is to argue that a just punishment could involve loss of the status of being a beneficiary of this presumption just as much as it could involve the loss of liberty.

In Part II, I introduce a basic framework for detention consistent with respect for autonomy and locate the lost status view within that framework. In Part III, I spell out the lost status view in more detail and contrast it …


Dangerous Psychopaths: Criminally Responsible But Not Morally Responsible, Subject To Criminal Punishment And To Preventive Detention, Ken Levy Dec 2011

Dangerous Psychopaths: Criminally Responsible But Not Morally Responsible, Subject To Criminal Punishment And To Preventive Detention, Ken Levy

San Diego Law Review

How should we judge psychopaths, both morally and in the criminal justice system? This Article will argue that psychopaths are often not morally responsible for their bad acts simply because they cannot understand, and therefore be guided by, moral reasons.

Scholars and lawyers who endorse the same conclusion automatically tend to infer from this premise that psychopaths should not be held criminally punishable for their criminal acts. These scholars and lawyers are making this assumption (that just criminal punishment requires moral responsibility) on the basis of one of two deeper assumptions: that either criminal punishment directly requires moral responsibility or …


Independent Counsel In Insurance, Douglas R. Richmond Aug 2011

Independent Counsel In Insurance, Douglas R. Richmond

San Diego Law Review

Mention the term "independent counsel" to many lawyers and they think immediately of the process whereby the Attorney General of the United States requests a panel of federal judges to appoint an Independent Counsel to investigate and prosecute crimes by government officials. Business lawyers may think of "independent counsel" in the context of counsel for independent directors on a corporate board in connection with select matters. For most litigators, however, the term "independent counsel" describes a lawyer engaged to defend an insured at a liability insurer's expense in a case in which the liability insurer has lost the right to …


Socioeconomic Rights And Theories Of Justice, Jeremy Waldron Aug 2011

Socioeconomic Rights And Theories Of Justice, Jeremy Waldron

San Diego Law Review

This Article considers the relation between theories of justice - such as John Rawls's theory - and theories of socioeconomic rights. In different ways, these two kinds of theories address much of the same subject matter. But they are quite strikingly different in format and texture. Theories of socioeconomic rights defend particular line-item requirements: a right to this or that good or opportunity, such as housing, health care, education, and social security. Theories of justice tend to involve a more integrated normative account of a society's basic structure, though they differ considerably among themselves in their structure. So how exactly …


The Regrettable Clause: United States V. Comstock And The Powers Of Congress, H. Jefferson Powell Aug 2011

The Regrettable Clause: United States V. Comstock And The Powers Of Congress, H. Jefferson Powell

San Diego Law Review

In this Article, I argue that in Comstock, the Court encountered one of the oldest and most basic constitutional issues about the scope of congressional power--whether there are justiciable limits to the range of legitimate ends Congress may pursue. The Justices, without fully recognizing the fact, were taking sides in an ancient debate, and in doing so, they inadvertently reopened an issue that ought to be deemed long settled.


Construing The Outer Limits Of Sentencing Authority: A Proposed Bright-Line Rule For Noncapital Proportionality Review, Kevin White May 2011

Construing The Outer Limits Of Sentencing Authority: A Proposed Bright-Line Rule For Noncapital Proportionality Review, Kevin White

BYU Law Review

No abstract provided.


Proper Crime Recording As An Effective Feedback Tool In Articulating A Crime Policy, Kevin A. Unter Mar 2011

Proper Crime Recording As An Effective Feedback Tool In Articulating A Crime Policy, Kevin A. Unter

Georgia Journal of Public Policy

Crime policy is subject to the policy process just like other governmental policies. An effective crime policy is one that reduces the amount of crime in a police department’s jurisdiction, e.g., the city. Accordingly, crime policy consists of the same policy components – agenda setting, formulation, implementation, and feedback. The implementation of any crime policy depends on the information collected by police departments, often through crimes reported to the department via 9-1-1 calls or brought to a police officer’s attention through proactive police work. The success of that police work relative to the reported crime first depends on whether the …


Federal Earmarks In The State Of Georgia, Jeffrey Lazarus Mar 2011

Federal Earmarks In The State Of Georgia, Jeffrey Lazarus

Georgia Journal of Public Policy

Earmarks have been controversial ever since becoming a prominent part of the congressional spending process. Critics charge that earmarks fund projects with little or no economic value (for instance Ted Stevens’ “Bridge to Nowhere,”) but instead allow Congress members to direct government spending to campaign contributors (the charge leading to a federal investigation of the now-defunct lobbying firm PMA Group). On the other side of the controversy, congressional earmarks do fund a number of community improvements which are very valuable, at least locally. In Georgia, the fiscal 2010 appropriations bills included earmarks which allocated $450,000 to update College Park’s emergency …


Modifying The Restrictions On Sentence Modification: United States V. Cobb, Jackie Bosshardt Mar 2011

Modifying The Restrictions On Sentence Modification: United States V. Cobb, Jackie Bosshardt

BYU Law Review

No abstract provided.


Sidestepping Deference: How United States V. Ressam Encourages Overly Stringent Review Of Sentencing Decisions, Joseph Leavitt Mar 2011

Sidestepping Deference: How United States V. Ressam Encourages Overly Stringent Review Of Sentencing Decisions, Joseph Leavitt

BYU Law Review

No abstract provided.


Facing The Unfaceable: Dealing With Prosecutorial Denial In Postconviction Cases Of Actual Innocence, Aviva Orenstein Feb 2011

Facing The Unfaceable: Dealing With Prosecutorial Denial In Postconviction Cases Of Actual Innocence, Aviva Orenstein

San Diego Law Review

This Article develops a question that intrigued Fred: prosecutors’ duties postconviction to prisoners who might be innocent. Although Fred wrote about a panoply of questions that arise regarding the prosecutor’s duty to “do justice” after conviction, this Article will address one specific area of concern: how and why prosecutors resist allowing DNA testing and, more startlingly, deny the obvious implications of DNA evidence when that evidence exonerates the convicted.

Part II of this Article briefly summarizes two of Fred’s major articles on the subject of prosecutorial ethics. Part III documents the problem of postconviction DNA exonerations and prosecutors’ varied reactions. …


Confidentiality And Common Sense: Insights From Philosophy, Thomas Morawetz Feb 2011

Confidentiality And Common Sense: Insights From Philosophy, Thomas Morawetz

San Diego Law Review

In this Article, I will consider two aspects of the controversy that help explain why it is static. I will consider the significance of empirical evidence that lawyers and clients find the rules morally troubling. Zacharias plausibly assumes that such evidence carries compelling weight. I will also look at the nature of morality itself and the extent to which professional rules should be expected to conform to morality.


Globalization And Eligibility To Deliver Legal Advice: Inbound Legal Services Provided By Corporate Counsel Licensed Only In A Country Outside The United States, Carol A. Needham Feb 2011

Globalization And Eligibility To Deliver Legal Advice: Inbound Legal Services Provided By Corporate Counsel Licensed Only In A Country Outside The United States, Carol A. Needham

San Diego Law Review

The regulation of cross-border delivery of legal services remains in flux. Clients in the United States, particularly sophisticated corporate clients, should be allowed to utilize the special expertise possessed by lawyers licensed outside the United States. Key reforms that at this point are gaining traction include the following: allowing lawyers licensed outside the United States to qualify for limited licenses as in-house counsel; broadening the scope of practice so that all foreign legal consultants are allowed to give legal advice related to third-country and international law; and allowing fly in, fly out practice while temporarily present in the host state. …


Federalizing Legal Ethics, Nationalizing Law Practice, And The Future Of The American Legal Profession In A Global Age, Eli Wald Feb 2011

Federalizing Legal Ethics, Nationalizing Law Practice, And The Future Of The American Legal Profession In A Global Age, Eli Wald

San Diego Law Review

This Article is organized as a response to Zaharias’s influential paper, revisiting each of his four analytical steps. Following Zacharias, Part II documents the growing nationalization and globalization of law practice, and argues that the transformation of law practice renders the state-based regulation of lawyers ineffective. Part III parts ways with Zacharias’s thesis. It asserts that nationalizing, by federalizing, legal ethics is not warranted by changing practice realities and that, worse, federalizing legal ethics without more will leave some of the most troubling aspects of the transformation of law practice, including client needs, unaddressed. Instead, Part III argues that the …


Three Concepts Of Roles, W. Bradley Wendel Feb 2011

Three Concepts Of Roles, W. Bradley Wendel

San Diego Law Review

There is something distinctive about the law, legal reasoning, and the role of lawyers. That distinctiveness is captured by the idea that normative reasoning by citizens in communities is necessarily aimed at discovering what rights and obligations everyone ought to have, consistent with the interests of other citizens. It is implausible to believe that ordinary moral reasoning is well-suited to working out a scheme of public entitlements that is suited to regulating the interactions among citizens who disagree about what their entitlements ought to be. The law has authority to the extent it enables people to do better than they …


Extraction Of Electronic Evidence From Voip: Forensic Analysis Of A Virtual Hard Disk Vs Ram, David Irwin, Jill Slay, Arek Dadej, Malcolm Shore Jan 2011

Extraction Of Electronic Evidence From Voip: Forensic Analysis Of A Virtual Hard Disk Vs Ram, David Irwin, Jill Slay, Arek Dadej, Malcolm Shore

Journal of Digital Forensics, Security and Law

The popularity of Voice over the Internet Protocol (VoIP) is increasing as the cost savings and ease of use is realised by a wide range of home and corporate users. However, the technology is also attractive to criminals. This is because VoIP is a global telephony service, in which it is difficult to verify the user’s identification. The security of placing such calls may also be appealing to criminals, as many implementations use strong encryption to secure both the voice payload as well as to control messages making monitoring such VoIP calls difficult since conventional methods such as wire-tapping is …


Book Review: Ios Forensic Analysis: For Iphone, Ipad And Ipod Touch, Christopher Schulte Jan 2011

Book Review: Ios Forensic Analysis: For Iphone, Ipad And Ipod Touch, Christopher Schulte

Journal of Digital Forensics, Security and Law

As Digital Forensics practitioners, we know that our discipline is constantly evolving. Keeping abreast means we need to continually refine and broaden our knowledge pools through experience, education, research, peer exchange, and more. Mobile device forensics can be especially dynamic and challenging. With multiple standards in place at the hardware, operating system, and user interface levels, it can be daunting to preserve, analyze, search and report on these tiny yet ubiquitous hand-held computers. Apple Computer’s line of mobile products (iOS devices - iPhone, iPad, iPod Touch) is no exception to this rule.


Sampling: Making Electronic Discovery More Cost Effective, Milton Luoma, Vicki Luoma Jan 2011

Sampling: Making Electronic Discovery More Cost Effective, Milton Luoma, Vicki Luoma

Journal of Digital Forensics, Security and Law

With the huge volumes of electronic data subject to discovery in virtually every instance of litigation, time and costs of conducting discovery have become exceedingly important when litigants plan their discovery strategies. Rather than incurring the costs of having lawyers review every document produced in response to a discovery request in search of relevant evidence, a cost effective strategy for document review planning is to use statistical sampling of the database of documents to determine the likelihood of finding relevant evidence by reviewing additional documents. This paper reviews and discusses how sampling can be used to make document review more …


Column: Every Last Byte, Simson Garfinkel Jan 2011

Column: Every Last Byte, Simson Garfinkel

Journal of Digital Forensics, Security and Law

Inheritance powder is the name that was given to poisons, especially arsenic, that were commonly used in the 17th and early 18th centuries to hasten the death of the elderly. For most of the 17th century, arsenic was deadly but undetectable, making it nearly impossible to prove that someone had been poisoned. The first arsenic test produced a gas—hardly something that a scientist could show to a judge. Faced with a growing epidemic of poisonings, doctors and chemists spent decades searching for something better


A Case Study In Forensic Analysis Of Control, Fred Cohen Jan 2011

A Case Study In Forensic Analysis Of Control, Fred Cohen

Journal of Digital Forensics, Security and Law

This paper describes a case study in which a method for forensic analysis of control was applied to resolve probative technical issues in a legal action. It describes one instance in which the analysis was successfully applied without challenge, addresses the details of most of the different facets of the analysis method, and demonstrates how such analysis provides a systematic approach to using technical methods to address legal issues as a case study.


Judges’ Awareness, Understanding, And Application Of Digital Evidence, Gary C. Kessler Jan 2011

Judges’ Awareness, Understanding, And Application Of Digital Evidence, Gary C. Kessler

Journal of Digital Forensics, Security and Law

As digital evidence grows in both volume and importance in criminal and civil courts, judges need to fairly and justly evaluate the merits of the offered evidence. To do so, judges need a general understanding of the underlying technologies and applications from which digital evidence is derived. Due to the relative newness of the computer forensics field, there have been few studies on the use of digital forensic evidence and none about judges’ relationship with digital evidence. This paper describes a recent study, using grounded theory methods, into judges’ awareness, knowledge, and perceptions of digital evidence. This study is the …


Technology Corner: Analysing E-Mail Headers For Forensic Investigation, M. T. Banday Jan 2011

Technology Corner: Analysing E-Mail Headers For Forensic Investigation, M. T. Banday

Journal of Digital Forensics, Security and Law

Electronic Mail (E-Mail), which is one of the most widely used applications of Internet, has become a global communication infrastructure service. However, security loopholes in it enable cybercriminals to misuse it by forging its headers or by sending it anonymously for illegitimate purposes, leading to e-mail forgeries. E-mail messages include transit handling envelope and trace information in the form of structured fields which are not stripped after messages are delivered, leaving a detailed record of e-mail transactions. A detailed header analysis can be used to map the networks traversed by messages, including information on the messaging software and patching policies …


Kindle Forensics: Acquisition & Analysis, Peter Hannay Jan 2011

Kindle Forensics: Acquisition & Analysis, Peter Hannay

Journal of Digital Forensics, Security and Law

The Amazon Kindle eBook reader supports a wide range of capabilities beyond reading books. This functionality includes an inbuilt cellular data connection known as Whispernet. The Kindle provides web browsing, an application framework, eBook delivery and other services over this connection. The historic data left by user interaction with this device may be of forensic interest. Analysis of the Amazon Kindle device has resulted in a method to reliably extract and interpret data from these devices in a forensically complete manner.


Column: The Consortium Of Digital Forensics Specialists (Cdfs), Christopher Kelly Jan 2011

Column: The Consortium Of Digital Forensics Specialists (Cdfs), Christopher Kelly

Journal of Digital Forensics, Security and Law

Digital forensic practitioners are faced with an extraordinary opportunity. In fact, we may never again be faced with such an opportunity, and this opportunity will challenge us in ways we may never again be challenged. At this point in the history of the Digital Forensics profession, digital forensic specialists have the unique opportunity to help this profession emerge from its infancy. But for this profession to mature -- and to flourish -- individuals and organizations integral to the practice must assemble and shape its future. This is our opportunity. In fact, this is our mandate.


Developing A Forensic Continuous Audit Model, Grover S. Kearns, Katherine J. Barker, Stephen P. Danese Jan 2011

Developing A Forensic Continuous Audit Model, Grover S. Kearns, Katherine J. Barker, Stephen P. Danese

Journal of Digital Forensics, Security and Law

Despite increased attention to internal controls and risk assessment, traditional audit approaches do not seem to be highly effective in uncovering the majority of frauds. Less than 20 percent of all occupational frauds are uncovered by auditors. Forensic accounting has recognized the need for automated approaches to fraud analysis yet research has not examined the benefits of forensic continuous auditing as a method to detect and deter corporate fraud. The purpose of this paper is to show how such an approach is possible. A model is presented that supports the acceptance of forensic continuous auditing by auditors and management as …


Column: The Physics Of Digital Information, Fred Cohen Jan 2011

Column: The Physics Of Digital Information, Fred Cohen

Journal of Digital Forensics, Security and Law

No abstract provided.