Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 10 of 10

Full-Text Articles in Law

Global Partnership Should Be The Way Forward To Combat Money Laundering, Maame Nyakoa Boateng Apr 2022

Global Partnership Should Be The Way Forward To Combat Money Laundering, Maame Nyakoa Boateng

Dickinson Law Review (2017-Present)

This Comment compares the major anti-money laundering (“AML”) laws in the United States and Iran. This Comment argues that even though the United States is advanced in its compliance approach, without a partnership with countries that are more vulnerable to money laundering attacks, its AML efforts could prove counter-productive because of the inter-connectedness of our world today. Accordingly, this Comment proposes a global partnership between countries with effective AML legislation and countries with less effective AML legislation to combat this complex crime.


Book Review: This Is How They Tell Me The World Ends: The Cyberweapons Arms Race (2020) By Nicole Perlroth, Amy C. Gaudion Jan 2022

Book Review: This Is How They Tell Me The World Ends: The Cyberweapons Arms Race (2020) By Nicole Perlroth, Amy C. Gaudion

Dickinson Law Review (2017-Present)

No abstract provided.


Book Review: This Is How They Tell Me The World Ends: The Cyberweapons Arms Race (2020) By Nicole Perlroth, Amy Gaudion Jan 2022

Book Review: This Is How They Tell Me The World Ends: The Cyberweapons Arms Race (2020) By Nicole Perlroth, Amy Gaudion

Faculty Scholarly Works

In the book, Perlroth traces the development and use of cyber capabilities, focusing on the U.S. government’s unintended role in creating a market for these cyber goods. Her purpose is a straightforward one: to illuminate. Perlroth explains that her goal is to “help shine even a glimmer of light on the highly secretive and largely invisible cyberweapons industry so that we, a society on the cusp of this digital tsunami called the Internet of Things, may have some of the necessary conversations now, before it is too late.”7 She seeks to accomplish this purpose by offering a treatise-like treatment of …


Cyberterrorism And The Public Safety Exception To Miranda, Mitch Snyder Oct 2021

Cyberterrorism And The Public Safety Exception To Miranda, Mitch Snyder

Dickinson Law Review (2017-Present)

Cyberattacks against U.S. targets are becoming increasingly common. To effectively combat these attacks, law enforcement officers need the tools to respond to and prevent cyberattacks before they can occur.

In recent years, hackers have launched cyberattacks against infrastructural targets such as power grids, oil and gas distribution computer systems, and telecommunications networks. Cyberattacks have also targeted U.S. government websites, including the U.S. Department of Transportation and the U.S. Department of Treasury. Recently, a cyberattack against SolarWinds, a Texas-based I.T. company, compromised the computer and network systems of federal, state, and local governments; critical infrastructure entities; and other private sector organizations. …


It's Time To Reform The U.S. Vulnerabilities Equities Process, Amy Gaudion Sep 2021

It's Time To Reform The U.S. Vulnerabilities Equities Process, Amy Gaudion

Faculty Scholarly Works

No abstract provided.


Recognizing The Role Of Inspectors General In The U.S. Government's Cybersecurity Restructuring Task, Amy Gaudion Jan 2021

Recognizing The Role Of Inspectors General In The U.S. Government's Cybersecurity Restructuring Task, Amy Gaudion

Faculty Scholarly Works

Months prior to the 2015 public disclosure of a data breach at the U.S. government’s Office of Personnel and Management (OPM), the Office of the Inspector General for OPM issued a report that identified significant deficiencies and material weaknesses in a number of the agency’s information systems and IT security programs. In response to the 2020 SolarWinds supply chain hack, attributed to Russia, calls are underway for inspectors general to conduct audits and inspections and to review prior inspector general assessments of information systems and vulnerabilities at federal agencies. The use of inspectors general to assess information system vulnerabilities and …


O’Neill, Oh O’Neill, Wherefore Art Thou O’Neill: Defining And Cementing The Requirements For Asserting Deliberative Process Privilege, Andrew Scott Apr 2019

O’Neill, Oh O’Neill, Wherefore Art Thou O’Neill: Defining And Cementing The Requirements For Asserting Deliberative Process Privilege, Andrew Scott

Dickinson Law Review (2017-Present)

The government may invoke the deliberative process privilege to protect the communications of government officials involving policy-driven decision-making. The privilege protects communications made before policy makers act upon the policy decision to allow government officials to speak candidly when deciding a course of action without fear of their words being used against them.

This privilege is not absolute and courts recognize the legitimate countervailing interest the public has in transparency. The Supreme Court in United States v. Reynolds held that someone with control over the protected information should personally consider the privilege before asserting it but did not provide definitive …


Remarks On Prosecutorial Discretion And Immigration, Shoba S. Wadhia Apr 2019

Remarks On Prosecutorial Discretion And Immigration, Shoba S. Wadhia

Dickinson Law Review (2017-Present)

No abstract provided.


Fire, Aim, Ready! Militarizing Animus: “Unit Cohesion” And The Transgender Ban, Eric Merriam Oct 2018

Fire, Aim, Ready! Militarizing Animus: “Unit Cohesion” And The Transgender Ban, Eric Merriam

Dickinson Law Review (2017-Present)

President Trump’s currently litigated “transgender ban,” which excludes transgender persons from military service, is premised in part upon a claim that transgender persons’ presence in the military adversely affects “unit cohesion.” This use of identity- based “unit cohesion” as a justification for excluding a group from military service is the latest episode in a long history of the government asserting “unit cohesion” to justify excluding people from military service based on their identities. This Article contends that unit cohesion, when premised on identity, is always an impermissible justification for exclusion from military service because it is unconstitutional animus. Though …


Jurisdiction, The Internet, And The Good Faith Exception: Controversy Over The Government’S Use Of Network Investigative Techniques, Maureen Weidman Apr 2018

Jurisdiction, The Internet, And The Good Faith Exception: Controversy Over The Government’S Use Of Network Investigative Techniques, Maureen Weidman

Dickinson Law Review (2017-Present)

In February 2015, the FBI discovered a website dedicated to child pornography located on the Tor Network, a network designed to protect its users’ identities on the Internet. Due to the structure of the Tor Network, the FBI could not take down the website and identify users who previously accessed the website. Instead, the FBI kept the website operational for 30 days and applied for a search warrant in the Eastern District of Virginia to use a device called a Network Investigative Technique (“NIT”). This device operated similarly to malware and “attached” to computers accessing the website, allowing the government …