Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 63

Full-Text Articles in Law

I'Ll Make You A Deal: How Repeat Informants Are Corrupting The Criminal Justice System And What To Do About It, Emily Jane Dodds Dec 2008

I'Ll Make You A Deal: How Repeat Informants Are Corrupting The Criminal Justice System And What To Do About It, Emily Jane Dodds

William & Mary Law Review

No abstract provided.


Situating Emotion: A Critical Realist View Of Emotion And Nonconscious Cognitive Processes For Law And Legal Theory, David J. Arkush Dec 2008

Situating Emotion: A Critical Realist View Of Emotion And Nonconscious Cognitive Processes For Law And Legal Theory, David J. Arkush

BYU Law Review

No abstract provided.


Table Of Contents, Volume 6, Number 3, 2008, The Death Penalty, Editorial Board Mar 2008

Table Of Contents, Volume 6, Number 3, 2008, The Death Penalty, Editorial Board

The University of New Hampshire Law Review

Table of contents for a special issue on the topic of capital punishment.


The Emerging Death Penalty Jurisprudence Of The Roberts Court, Kenneth C. Haas Mar 2008

The Emerging Death Penalty Jurisprudence Of The Roberts Court, Kenneth C. Haas

The University of New Hampshire Law Review

[Excerpt] “In 1976, four years after finding the nation’s death penalty laws to be constitutionally flawed, the U.S. Supreme Court established the parameters of modern American death penalty jurisprudence. Since then the Court has gone through several phases. The Court proceeded cautiously from 1977 to 1982, limiting the death penalty to those who committed murder in a manner deemed especially heinous and despicable by judges and juries, requiring even-handedness and consistency in capital sentencing, and insisting that sentencing authorities examine the individual characteristics of each offender and the particular circumstances of his crime. From 1983 to 2001, however, the Court …


The Abolitionist’S Dilemma: Establishing The Standards For The Evolving Standards Of Decency, Dwight Aarons Mar 2008

The Abolitionist’S Dilemma: Establishing The Standards For The Evolving Standards Of Decency, Dwight Aarons

The University of New Hampshire Law Review

[Excerpt] “For those who believe that the death penalty should be declared unconstitutional and that the U.S. Supreme Court is the institution that should make that declaration, these are interesting times. On one hand, the Rehnquist Court, which had previously not been a reliable friend of criminal defendants, in 2002, ruled that it was unconstitutional to execute mentally retarded defendants, and in 2005 it came to the same conclusion as to defendants who committed a capital crime before his or her eighteenth birthday. On the other hand, close scrutiny of these opinions evidences that the Court all but casts aside …


The Death Penalty And Reversible Error In Massachusetts, Alan Rogers Mar 2008

The Death Penalty And Reversible Error In Massachusetts, Alan Rogers

The University of New Hampshire Law Review

[Excerpt] “This article will survey Massachusetts homicide cases from 1805 to 1996 in which the SJC found reversible error. For comparative purposes, the data will be grouped into three periods: from 1805, the year the SJC began to publish its decisions, to 1891, the year original jurisdiction for homicide cases was transferred from the SJC to the Superior Court; 1892 to 1939, the year Massachusetts law allowed the SJC to review the facts as well as the law of capital cases; and from 1940 to 1996, the year Chief Justice Paul Liacos resigned from the court and the importance of …


Completely Unguided Discretion: Admitting Non-Statutory Aggravating And Non-Statutory Mitigating Evidence In Capital Sentencing Trials, Sharon Turlington Mar 2008

Completely Unguided Discretion: Admitting Non-Statutory Aggravating And Non-Statutory Mitigating Evidence In Capital Sentencing Trials, Sharon Turlington

The University of New Hampshire Law Review

[Excerpt] “As an attorney practicing exclusively in the area of death penalty defense at the trial level for the last ten years, my perspective on the problems inherent in the system seems vastly different from that presented in academic research and even in case law. While most of the recent changes in death penalty law have focused on the right of the defendant to have sentencing enhancing elements of an offense proven to a jury beyond a reasonable doubt, much of the evidence presented in an actual death penalty jury trial is non-statutory aggravation and non-statutory mitigation. Generally, non-statutory aggravating …


Death Is Unconstitutional: How Capital Punishment Became Illegal In America—A Future History, Jur. Eric Engle Ph.D. Mar 2008

Death Is Unconstitutional: How Capital Punishment Became Illegal In America—A Future History, Jur. Eric Engle Ph.D.

The University of New Hampshire Law Review

[Excerpt] “A constitution is an organic fact of every state: it is a part of the being of the state. People, like the state, also have a constitution—a character. Just as people change over time, so do states. But just as there are natural limits on what people can or cannot become, so there are natural limits on what the state can and cannot fairly do. No man, nor any group of men, ex ante may justly take the life of another person, though perhaps their killing may be excused (or forgiven) ex post.”

"The death of Death would surely …


Cunningham V. California: The U.S. Supreme Court Painted Into A Corner, Jacob Strain Mar 2008

Cunningham V. California: The U.S. Supreme Court Painted Into A Corner, Jacob Strain

Brigham Young University Journal of Public Law

No abstract provided.


The 2007 Analysis Of Information Remaining On Disks Offered For Sale On The Second Hand Market, Andy Jones, Craig Valli, Glenn S. Dardick, Iain Sutherland Jan 2008

The 2007 Analysis Of Information Remaining On Disks Offered For Sale On The Second Hand Market, Andy Jones, Craig Valli, Glenn S. Dardick, Iain Sutherland

Journal of Digital Forensics, Security and Law

All organisations, whether in the public or private sector, increasingly use computers and other devices that contain computer hard disks for the storage and processing of information relating to their business, their employees or their customers. Individual home users also increasingly use computers and other devices containing computer hard disks for the storage and processing of information relating to their private, personal affairs. It continues to be clear that the majority of organisations and individual home users still remain ignorant or misinformed of the volume and type of information that is stored on the hard disks that these devices contain …


Steganography: Forensic, Security, And Legal Issues, Merrill Warkentin, Ernst Bekkering, Mark B. Schmidt Jan 2008

Steganography: Forensic, Security, And Legal Issues, Merrill Warkentin, Ernst Bekkering, Mark B. Schmidt

Journal of Digital Forensics, Security and Law

Steganography has long been regarded as a tool used for illicit and destructive purposes such as crime and warfare. Currently, digital tools are widely available to ordinary computer users also. Steganography software allows both illicit and legitimate users to hide messages so that they will not be detected in transit. This article provides a brief history of steganography, discusses the current status in the computer age, and relates this to forensic, security, and legal issues. The paper concludes with recommendations for digital forensics investigators, IT staff, individual users, and other stakeholders.


Book Review: Challenges To Digital Forensic Evidence, Gary C. Kessler Jan 2008

Book Review: Challenges To Digital Forensic Evidence, Gary C. Kessler

Journal of Digital Forensics, Security and Law

This issue presents the fifth Book Review column for the JDFSL. It is an experiment to broaden the services that the journal provides to readers, so we are anxious to get your reaction. Is the column useful and interesting? Should we include more than one review per issue? Should we also review products? Do you have suggested books/products for review and/or do you want to write a review? All of this type of feedback -- and more -- is appreciated. Please feel free to send comments to Gary Kessler (gary.kessler@champlain.edu) or Glenn S. Dardick (gdardick@dardick.net).


Developing A Process Model For The Forensic Extraction Of Information From Desktop Search, Timothy Pavlic, Jill Slay, Benjamin Turnbull Jan 2008

Developing A Process Model For The Forensic Extraction Of Information From Desktop Search, Timothy Pavlic, Jill Slay, Benjamin Turnbull

Journal of Digital Forensics, Security and Law

Desktop search applications can contain cached copies of files that were deleted from the file system. Forensic investigators see this as a potential source of evidence, as documents deleted by suspects may still exist in the cache. Whilst there have been attempts at recovering data collected by desktop search applications, there is no methodology governing the process, nor discussion on the most appropriate means to do so. This article seeks to address this issue by developing a process model that can be applied when developing an information extraction application for desktop search applications, discussing preferred methods and the limitations of …


The Forensics Aspects Of Event Data Recorders, Jeremy S. Daily, Nathan Singleton, Elizabeth Downing, Gavin W. Manes Jan 2008

The Forensics Aspects Of Event Data Recorders, Jeremy S. Daily, Nathan Singleton, Elizabeth Downing, Gavin W. Manes

Journal of Digital Forensics, Security and Law

The proper generation and preservation of digital data from Event Data Recorders (EDRs) can provide invaluable evidence to automobile crash reconstruction investigations. However, data collected from the EDR can be difficult to use and authenticate, complicating the presentation of such information as evidence in legal proceedings. Indeed, current techniques for removing and preserving such data do not meet the court’s standards for electronic evidence. Experimentation with an EDR unit from a 2001 GMC Sierra pickup truck highlighted particular issues with repeatability of results. Fortunately, advances in the digital forensics field and memory technology can be applied to EDR analysis in …


Data Mining Techniques In Fraud Detection, Rekha Bhowmik Jan 2008

Data Mining Techniques In Fraud Detection, Rekha Bhowmik

Journal of Digital Forensics, Security and Law

The paper presents application of data mining techniques to fraud analysis. We present some classification and prediction data mining techniques which we consider important to handle fraud detection. There exist a number of data mining algorithms and we present statistics-based algorithm, decision treebased algorithm and rule-based algorithm. We present Bayesian classification model to detect fraud in automobile insurance. Naïve Bayesian visualization is selected to analyze and interpret the classifier predictions. We illustrate how ROC curves can be deployed for model assessment in order to provide a more intuitive analysis of the models.


To License Or Not To License: An Examination Of State Statutes Regarding Private Investigators And Digital Examiners, Thomas Lonardo, Doug White, Alan Rea Jan 2008

To License Or Not To License: An Examination Of State Statutes Regarding Private Investigators And Digital Examiners, Thomas Lonardo, Doug White, Alan Rea

Journal of Digital Forensics, Security and Law

In this paper the authors examine statutes that regulate, license, and enforce investigative functions in each US state. After identification and review of Private Investigator licensing requirements, the authors find that very few state statutes explicitly differentiate between Private Investigators and Digital Examiners. After contacting all state agencies the authors present a distinct grouping organizing state approaches to professional Digital Examiner licensing. The authors conclude that states must differentiate between Private Investigator and Digital Examiner licensing requirements and oversight.


An Evaluation Of Windows-Based Computer Forensics Application Software Running On A Macintosh, Gregory H. Carlton Jan 2008

An Evaluation Of Windows-Based Computer Forensics Application Software Running On A Macintosh, Gregory H. Carlton

Journal of Digital Forensics, Security and Law

The two most common computer forensics applications perform exclusively on Microsoft Windows Operating Systems, yet contemporary computer forensics examinations frequently encounter one or more of the three most common operating system environments, namely Windows, OS-X, or some form of UNIX or Linux. Additionally, government and private computer forensics laboratories frequently encounter budget constraints that limit their access to computer hardware. Currently, Macintosh computer systems are marketed with the ability to accommodate these three common operating system environments, including Windows XP in native and virtual environments. We performed a series of experiments to measure the functionality and performance of the two …


Book Review: Guide To Computer Forensics And Investigations (3rd Ed.), Keyu Jiang, Ruifeng Xuan Jan 2008

Book Review: Guide To Computer Forensics And Investigations (3rd Ed.), Keyu Jiang, Ruifeng Xuan

Journal of Digital Forensics, Security and Law

No abstract provided.


Remote Forensics May Bring The Next Sea Change In E-Discovery: Are All Networked Computers Now Readily Accessible Under The Revised Federal Rules Of Civil Procedure?, Joseph J. Schwerha, Scott Inch Jan 2008

Remote Forensics May Bring The Next Sea Change In E-Discovery: Are All Networked Computers Now Readily Accessible Under The Revised Federal Rules Of Civil Procedure?, Joseph J. Schwerha, Scott Inch

Journal of Digital Forensics, Security and Law

The recent amendments to Rule 26 of the Federal Rules of Civil Procedure created a two-tiered approach to discovery of electronically stored information (“ESI”). Responding parties must produce ESI that is relevant, not subject to privilege, and reasonably accessible. However, because some methods of storing ESI, such as on magnetic backup tapes and within enormous databases, require substantial cost to access and search their contents, the rules permit parties to designate those repositories as “not reasonably accessible” because of undue burden or cost. But even despite the difficulty in searching for ESI, the party’s duty to preserve potentially responsive evidence …


Trends In Virtualized User Environments, Diane Barrett Jan 2008

Trends In Virtualized User Environments, Diane Barrett

Journal of Digital Forensics, Security and Law

Virtualized environments can make forensics investigation more difficult. Technological advances in virtualization tools essentially make removable media a PC that can be carried around in a pocket or around a neck. Running operating systems and applications this way leaves very little trace on the host system. This paper will explore all the newest methods for virtualized environments and the implications they have on the world of forensics. It will begin by describing and differentiating between software and hardware virtualization. It will then move on to explain the various methods used for server and desktop virtualization. Next, it will explain how …


Extraction And Categorisation Of User Activity From Windows Restore Points, Damir Kahvedžić, Tahar Kechadi Jan 2008

Extraction And Categorisation Of User Activity From Windows Restore Points, Damir Kahvedžić, Tahar Kechadi

Journal of Digital Forensics, Security and Law

The extraction of the user activity is one of the main goals in the analysis of digital evidence. In this paper we present a methodology for extracting this activity by comparing multiple Restore Points found in the Windows XP operating system. The registry copies represent a snapshot of the state of the system at a certain point in time. Differences between them can reveal user activity from one instant to another. The algorithms for comparing the hives and interpreting the results are of high complexity. We develop an approach that takes into account the nature of the investigation and the …


Data Recovery From Palmmsgv001, Satheesaan Pasupatheeswaran Jan 2008

Data Recovery From Palmmsgv001, Satheesaan Pasupatheeswaran

Journal of Digital Forensics, Security and Law

Both SMS and MMS data analysis is an important factor in mobile forensic analysis. Author did not find any mobile forensic tool that is capable of extracting short messages (SMS) and multimedia messages (MMS) from Palm Treo 750. SMS file of Palm Treo 750 is called PalmMgeV001 and it is a proprietary file system. A research work done to find a method to recover SMS data from PalmMsgV001 file. This paper is going to describe the research work and its findings. This paper also discusses a methodology that will help recover SMS data from PalmMsgV001. The PalmMsgV001 file is analysed …


Data Security Measures In The It Service Industry: A Balance Between Knowledge & Action, N. Mlitwa, Y. Kachala Jan 2008

Data Security Measures In The It Service Industry: A Balance Between Knowledge & Action, N. Mlitwa, Y. Kachala

Journal of Digital Forensics, Security and Law

That “knowledge is power” is fast becoming a cliché within the intelligentsia. Such power however, depends largely on how knowledge itself is exchanged and used, which says a lot about the tools of its transmission, exchange, and storage. Information and communication technology (ICT) plays a significant role in this respect. As a networked tool, it enables efficient exchanges of video, audio and text data beyond geographical and time constraints. Since this data is exchanged over the worldwide web (www), it can be accessible by anyone in the world using the internet. The risk of unauthorised access, interception, modification, or even …


Table Of Contents Jan 2008

Table Of Contents

Journal of Digital Forensics, Security and Law

No abstract provided.


Table Of Contents Jan 2008

Table Of Contents

Journal of Digital Forensics, Security and Law

No abstract provided.


Table Of Contents Jan 2008

Table Of Contents

Journal of Digital Forensics, Security and Law

No abstract provided.


Rethinking Robinson V. California In The Wake Of Jones V. Los Angeles: Avoiding The Demise Of The Criminal Law By Attending To Punishment, Martin R. Gardner Jan 2008

Rethinking Robinson V. California In The Wake Of Jones V. Los Angeles: Avoiding The Demise Of The Criminal Law By Attending To Punishment, Martin R. Gardner

Journal of Criminal Law and Criminology

No abstract provided.


Book Reviews Jan 2008

Book Reviews

Journal of Criminal Law and Criminology

No abstract provided.


Of Vice And Men: A New Approach To Eradicating Sex Trafficking By Reducing Male Demand Through Educational Programs And Abolitionist Legislation, Iris Yen Jan 2008

Of Vice And Men: A New Approach To Eradicating Sex Trafficking By Reducing Male Demand Through Educational Programs And Abolitionist Legislation, Iris Yen

Journal of Criminal Law and Criminology

No abstract provided.


The Empirics Of Prison Growth: A Critical Review And Path Forward, John F. Pfaff Jan 2008

The Empirics Of Prison Growth: A Critical Review And Path Forward, John F. Pfaff

Journal of Criminal Law and Criminology

No abstract provided.