Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 14 of 14

Full-Text Articles in Law

Introduction: Contains Cover, Table Of Contents, Letter From The Editor, And Masthead, Francis C. Oroszlan Jan 2010

Introduction: Contains Cover, Table Of Contents, Letter From The Editor, And Masthead, Francis C. Oroszlan

Richmond Journal of Law & Technology

The Richmond Journal of Law and Technology is proud to present the first issue of the 2010–2011 academic year. This issue addresses topics ranging across the legal and technological spectrums, and tackles subject matter at the forefront and future of legal debate.


Blast Off? — Strict Liability’S Potential Role In The Development Of The Commercial Space Market, Mark Flores Jan 2010

Blast Off? — Strict Liability’S Potential Role In The Development Of The Commercial Space Market, Mark Flores

Richmond Journal of Law & Technology

The sun rises over the mountains in Southern New Mexico and the windows of Spaceport America blind those looking on at the terminal. A sudden boom shakes the ground and a plane unlike any other takes off toward the sky, leaving Spaceport America in the distance.


A Review Of The Law In Jurisdictions Requiring Electronic Recording Of Custodial Interrogations, Alan M. Gershel Jan 2010

A Review Of The Law In Jurisdictions Requiring Electronic Recording Of Custodial Interrogations, Alan M. Gershel

Richmond Journal of Law & Technology

Although not constitutionally required, it has become considerably more commonplace for law enforcement to electronically record a suspect’s custodial interrogation. This includes a complete recording, beginning with the advice of rights and continuing through the end of the interrogation. In fact, society now recognizes it as a useful, if not necessary, tool for law enforcement.


Introduction: Contains Cover, Table Of Contents, Letter From The Editor, And Masthead, Robert Michaux Jan 2010

Introduction: Contains Cover, Table Of Contents, Letter From The Editor, And Masthead, Robert Michaux

Richmond Journal of Law & Technology

The Richmond Journal of Law and Technology is proud to present the fourth issue of the 2009–2010 academic year. In this issue, we explore the ever expanding duties of counsel responsible for electronically stored information, the application of 3D imaging technology to improve arson investigation, and the need for expanding copyright protection over the lawless Darknet.


Making The Punishment Fit The (Computer) Crime: Rebooting Notions Of Possession For The Federal Sentencing Of Child Pornography Offenses, Jelani Jefferson Exum Jan 2010

Making The Punishment Fit The (Computer) Crime: Rebooting Notions Of Possession For The Federal Sentencing Of Child Pornography Offenses, Jelani Jefferson Exum

Richmond Journal of Law & Technology

Sexual exploitation of children is a real and disturbing problem. However, when it comes to the sentencing of child pornography possessors, the U.S. federal system has a problem, as well. This Article adds to the current, heated discussion on what is happening in the sentencing of federal child pornography possession offenses, why nobody is satisfied, and how much the Federal Sentencing Guidelines are to blame. At the heart of this Article are the forgotten players in the discussion—computers and the Internet—and their role in changing the realities of child pornography possession. This Article argues that computers and the Internet are …


Introduction: Contains Cover, Table Of Contents, Letter From The Editor, And Masthead, Nancy Porcari Jan 2010

Introduction: Contains Cover, Table Of Contents, Letter From The Editor, And Masthead, Nancy Porcari

Richmond Journal of Law & Technology

The Richmond Journal of Law and Technology is proud to present our Annual Survey issue, the third issue of the 2009–2010 academic year.


Near Impossible To Enforce At Best, Unconstitutional At Worst: The Consequences Of Maryland’S Text Messaging Ban On Drivers, Alan Lazerow Jan 2010

Near Impossible To Enforce At Best, Unconstitutional At Worst: The Consequences Of Maryland’S Text Messaging Ban On Drivers, Alan Lazerow

Richmond Journal of Law & Technology

A local newspaper reports that your state recently passed a law prohibiting citizens from “writ[ing] or send[ing] a text message while operating a motor vehicle.” Armed with the knowledge of the texting ban, you, being a reasonable citizen, are likely to proceed in one of at least three ways, each of which exposes the statute’s fundamental flaws.


Bending Broken Rules: The Fourth Amendment Implications Of Full-Body Scanners In Preflight Screening, M. Madison Taylor Jan 2010

Bending Broken Rules: The Fourth Amendment Implications Of Full-Body Scanners In Preflight Screening, M. Madison Taylor

Richmond Journal of Law & Technology

In the face of emerging technology, the Fourth Amendment’s guarantee of protection against unreasonable searches and seizures is especially susceptible to erosion. As Justice Scalia wrote in Kyllo v. United States, “[i]t would be foolish to contend that the degree of privacy secured to citizens by the Fourth Amendment has been entirely unaffected by the advance of technology.” In Katz v. United States, technology compelled a dramatic shift in the Supreme Court’s interpretation of the Fourth Amendment. Prior to Katz, the Court generally interpreted the Fourth Amendment to prevent only the search and seizure of tangible things, and looked to …


The Expanding Duties Of Esi And In-House Counsel: Providing Defensible Preservation And Production Efforts After Swofford V. Eslinger, David W. Degnan Jan 2010

The Expanding Duties Of Esi And In-House Counsel: Providing Defensible Preservation And Production Efforts After Swofford V. Eslinger, David W. Degnan

Richmond Journal of Law & Technology

As a general rule, companies and government agencies should plan for preservation and production before litigation is probable. This means having a document retention program. These programs ensure that documents are retained or deleted in an orderly fashion. If a company properly follows its policies and procedures, this retention program acts as a “shield” against the incomplete preservation of relevant (or “hot”) documents deleted before the proper initiation of a litigation hold. If parties do not follow, or inconsistently follow, such a program, they might have to explain what happened to a missing relevant document. Thus, a retention program might …


Protecting The Children: Challenges That Result In, And Consequences Resulting From, Inconsistent Prosecution Of Child Pornography Cases In A Technical World, Francis S. Monterosso Jan 2010

Protecting The Children: Challenges That Result In, And Consequences Resulting From, Inconsistent Prosecution Of Child Pornography Cases In A Technical World, Francis S. Monterosso

Richmond Journal of Law & Technology

Of all the sinister things that Internet viruses do, this might be the worst: They can make you an unsuspecting collector of child pornography. Heinous pictures and videos can be deposited on computers by viruses—the malicious programs better known for swiping your credit card numbers. In this twist, it’s your reputation that’s stolen. Pedophiles can exploit virus-infected PCs to remotely store and view their stash without fear they’ll get caught. Pranksters or someone trying to frame you can tap viruses to make it appear that you surf illegal Web sites. Whatever the motivation, you get child porn on your computer—and …


Sexting And Teenagers: Omg R U Going 2 Jail???, Catherine Arcabascio Jan 2010

Sexting And Teenagers: Omg R U Going 2 Jail???, Catherine Arcabascio

Richmond Journal of Law & Technology

Sexting is a relatively recent practice engaged in by the young, and sometimes not-so-young, and foolish. “Sexting” is “the practice of sending or posting sexually suggestive text messages and images, including nude or semi-nude photographs, via cellular telephones or over the Internet.”


The Darknet: A Digital Copyright Revolution, Jessica A. Wood Jan 2010

The Darknet: A Digital Copyright Revolution, Jessica A. Wood

Richmond Journal of Law & Technology

We are in the midst of a digital revolution. In this “Age of Peer Production,” armies of amateur participants demand the freedom to rip, remix, and share their own digital culture. Aided by the newest iteration of file sharing networks, digital media users now have the option to retreat underground, by using secure, private, and anonymous file sharing networks, to share freely and breathe new life into digital media. These underground networks, collectively termed “the Darknet[,] will grow in scope, resilience, and effectiveness in direct proportion to [increasing] digital restrictions the public finds untenable.” The Darknet has been called the …


Fire Pattern Analysis, Junk Science, Old Wives Tales, And Ipse Dixit: Emerging Forensic 3d Imaging Technologies To The Rescue?, Thomas R. May Jan 2010

Fire Pattern Analysis, Junk Science, Old Wives Tales, And Ipse Dixit: Emerging Forensic 3d Imaging Technologies To The Rescue?, Thomas R. May

Richmond Journal of Law & Technology

Forensic science is undergoing a period of transformation as legal and scientific forces converge and force older forensic sciences toward a new scientific paradigm. Fire investigative undertakings are not an exception to this trend. Skeptical defense attorneys who routinely formulate astute Daubert challenges to contest the scientific validity and reliability of every major forensic science discipline are one catalyst to this revolution. Furthermore, a steady influx of novel scientific advances makes possible the formulation of consistent and scientifically-based quantitative forensic evidence analyses to overcome the “undervalidated and oversold” problems affecting many areas of forensic science.


The Not-So-Risky Business Of High-End Escorts And The Internet In The 21st Century, Robert Rigg Jan 2010

The Not-So-Risky Business Of High-End Escorts And The Internet In The 21st Century, Robert Rigg

Richmond Journal of Law & Technology

Prostitution is often referred to as “the world’s oldest profession.” It is defined as “[t]he act or practice of engaging in sexual activity for money or its equivalent.” As a service industry, it fulfills specific human desires. Nevertheless, most states condemn and criminalize both the act of prostitution and those who solicit such services.