Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

PDF

Forgery

Discipline
Institution
Publication Year
Publication
Publication Type

Articles 1 - 30 of 46

Full-Text Articles in Law

Crypto-Counterfeiting, Joshua Fairfield Apr 2024

Crypto-Counterfeiting, Joshua Fairfield

William & Mary Business Law Review

The current crypto winter has given rise to a range of legal challenges. One of the most important sets of legal challenges goes to the heart of cryptocurrency. Cryptocurrency was intended to be non-duplicatable at will, that is, not to be counterfeitable. Blockchain technology is supposed to prevent token counterfeiting through a combination of game theory and cryptography that prevents normal users from simply ordering the system to generate more tokens for their benefit.

The difficulty is that blockchain software is still software. People in charge can order and program the software to generate many more tokens for those individuals’ …


Title Theft, Stewart E. Sterk Jan 2024

Title Theft, Stewart E. Sterk

Washington and Lee Law Review Online

Real property owners across the country have been targeted by scammers who prepare deeds purporting to convey title to property the scammers do not own. Sometimes, the true owners are entirely unaware of these bogus transfers. In other instances, the scammers use misrepresentation to induce unsophisticated owners to sign documents they do not understand.

Property doctrine protects owners against forgery and fraud—the primary vehicles scammers use in their efforts to transfer title. Owners enjoy protection not only against the scammers themselves, but generally against unsuspecting purchasers to whom the scammers transfer purported title.

Recovery of title, however, involves costs and …


Enhancement Of Media Splicing Detection: A General Framework, Songpon Teerakanok, Tetsutaro Uehara Oct 2018

Enhancement Of Media Splicing Detection: A General Framework, Songpon Teerakanok, Tetsutaro Uehara

Journal of Digital Forensics, Security and Law

Digital media (i.e., image, audio) has played an influential role in today information system. The increasing of popularity in digital media has brought forth many technological advancements. The advancements, however, also gives birth to a number of forgeries and attacks against this type of information. With the availability of easy-to-use media manipulating tools available online, the authenticity of today digital media cannot be guaranteed. In this paper, a new general framework for enhancing today media splicing detection has been proposed. By combining results from two traditional approaches, the enhanced detection results show improvement in term of clarity in which anomalies …


Contemporary Soviet Criminal Law: An Analysis Of The General Principles And Major Institutions Of Post-1958 Soviet Criminal Law, Chris Osakwe Dec 2016

Contemporary Soviet Criminal Law: An Analysis Of The General Principles And Major Institutions Of Post-1958 Soviet Criminal Law, Chris Osakwe

Georgia Journal of International & Comparative Law

No abstract provided.


Current Trends In Junk Debt Buyer Litigation.Pdf, Peter Holland Apr 2016

Current Trends In Junk Debt Buyer Litigation.Pdf, Peter Holland

Peter A. Holland

This article examines current trends in debt buyer litigation, including a review of recent regulatory actions and the impact of debt buyer lawsuits on individual consumers and on small claims courts. The article calls for a ban on the sale of consumer junk debt by banks, and for a requirement to make public the terms, conditions and disclaimers from sales contracts between banks and junk debt buyers.


Debt-Buyer Lawsuits And Inaccurate Data, Peter A. Holland Apr 2014

Debt-Buyer Lawsuits And Inaccurate Data, Peter A. Holland

Faculty Scholarship

Pursuant to secret purchase and sale agreements (also known as forward flow agreements), the accounts that banks sell to debt buyers are often sold “as is,” with explicit and emphatic disclaimers that the debts may not be owed, the amounts claimed may not be accurate, and documentation may be missing. Despite their full knowledge that the accuracy and completeness of the data has been specifically disclaimed by the bank, when they sue consumers, debt buyers tell courts that the information obtained from the bank is inherently reliable and accurate. In order to avoid a fraud on the courts, the contents …


Debt-Buyer Lawsuits And Inaccurate Data, Peter A. Holland Mar 2014

Debt-Buyer Lawsuits And Inaccurate Data, Peter A. Holland

Peter A. Holland

Pursuant to secret purchase and sale agreements (also known as forward flow agreements), the accounts that banks sell to debt buyers are often sold “as is,” with explicit and emphatic disclaimers that the debts may not be owed, the amounts claimed may not be accurate, and documentation may be missing. Despite their full knowledge that the accuracy and completeness of the data has been specifically disclaimed by the bank, when they sue consumers, debt buyers tell courts that the information obtained from the bank is inherently reliable and accurate. In order to avoid a fraud on the courts, the contents …


Protecting Freedom Of Testation: A Proposal For Law Reform, Eike G. Hosemann Jan 2014

Protecting Freedom Of Testation: A Proposal For Law Reform, Eike G. Hosemann

University of Michigan Journal of Law Reform

This Article addresses a problem ever more pressing in wealthy and aging societies like the United States: interference with freedom of testation by the use of wrongful means such as undue influence or will forgery to acquire benefits through inheritance. A detailed analysis of the remedies against interference with freedom of testation under inheritance law, tort law, and equity reveals that there is currently a significant under-deterrence of this undesirable behavior. Hence, this Article proposes a new remedy in order to protect freedom of testation more effectively: a disinheritance statute barring wrongdoers that have infringed upon someone’s freedom of testation …


The Military Trial At Rennes: Text And Subtext Of The Dreyfus Affair, Vivian G. Curran May 2013

The Military Trial At Rennes: Text And Subtext Of The Dreyfus Affair, Vivian G. Curran

Touro Law Review

Discusses the Dreyfus affair and how the outside world viewed France's conduct. This article provides insight into how the trial was conducted and the evidence that was offered.


Defending Junk-Debt-Buyer Lawsuits, Peter A. Holland Jun 2012

Defending Junk-Debt-Buyer Lawsuits, Peter A. Holland

Peter A. Holland

Junk debt buyer lawsuits have overwhelmed the courts all across the United States. These lawsuits wreak havoc on consumers and their families. Often overlooked is the fact that judgments against consumers which are based on junk debt are part of a zero sum game, where every bogus judgment deprives a legitimate creditor of the chance to get paid from scarce resources. Thus, the legitimate creditor to whom money is owed is materially harmed by the junk debt buyer who extracts money based on an illegitimate claim, or who causes someone to declare bankruptcy. Providing representation to this otherwise unrepresented population …


Defending Junk-Debt-Buyer Lawsuits, Peter A. Holland May 2012

Defending Junk-Debt-Buyer Lawsuits, Peter A. Holland

Faculty Scholarship

Junk debt buyer lawsuits have overwhelmed the courts all across the United States. These lawsuits wreak havoc on consumers and their families. Often overlooked is the fact that judgments against consumers which are based on junk debt are part of a zero sum game, where every bogus judgment deprives a legitimate creditor of the chance to get paid from scarce resources. Thus, the legitimate creditor to whom money is owed is materially harmed by the junk debt buyer who extracts money based on an illegitimate claim, or who causes someone to declare bankruptcy. Providing representation to this otherwise unrepresented population …


The Basic Principle Of Loss Allocation For Unauthorized Checks, James S. Rogers Oct 2011

The Basic Principle Of Loss Allocation For Unauthorized Checks, James S. Rogers

James S. Rogers

It is commonly thought that the Uniform Commercial Code adopts a negligence principle as the basis of loss allocation for the check system. This Article argues that this common assumption is wrong. Instead, the fundamental principle of the check system and all other payment systems is that the burden of unpreventable losses should rest with the providers of the payment system rather than with the users of the payment system. The Article shows that the old English case of Price v. Neal is not, as is commonly thought, an anomaly but is instead entirely consistent with the basic principle of …


The One Hundred Billion Dollar Problem In Small Claims Court: Robo-Signing And Lack Of Proof In Debt Buyer Cases, Peter A. Holland Jan 2011

The One Hundred Billion Dollar Problem In Small Claims Court: Robo-Signing And Lack Of Proof In Debt Buyer Cases, Peter A. Holland

Faculty Scholarship

Recent years have seen the rise of a new industry which has clogged the dockets of small claims courts throughout the country. It is known as the "debt buyer" industry. Members of this $100 billion per year industry exist for no reason other than to purchase consumer debt which others have already deemed uncollectable, and then try to succeed in collecting where others have failed. Debt buyers pay pennies on the dollar for this charged off debt, and then seek to collect, through hundreds of thousands of lawsuits, the full face value of the debt. The emergence and vitality of …


New Fraud And Identity-Related Crimes In New South Wales, Alex Steel Jan 2010

New Fraud And Identity-Related Crimes In New South Wales, Alex Steel

Alex Steel

The Crimes Amendment (Fraud, Identity and Forgery Offences) Act 2009 commenced on 22 February 2010. It represents a significant change to fraud offences in New South Wales. The Act codifies dishonesty in line with the Ghosh test, replaces over 30 fraud offences with one main offence based on deceptively obtaining financial advantage, rewords the forgery offences and introduces a suite of identity crime offences. The Act continues to move away from offences based on common law larceny and interference with property rights toward general offences based on a statutory defined concept of dishonesty. However, larceny and related offences have been …


People V. Lopez, Geoffrey Goell Jan 2006

People V. Lopez, Geoffrey Goell

NYLS Law Review

No abstract provided.


Unauthorized And Forged Indorsements: A Glitch In Revised Article 3 Of The Uniform Commercial Code, Ada Long-Croom Jan 1997

Unauthorized And Forged Indorsements: A Glitch In Revised Article 3 Of The Uniform Commercial Code, Ada Long-Croom

Santa Clara Law Review

No abstract provided.


Strings Attached--Violin Fraud And Other Deceptions, Carla J. Shapreau May 1994

Strings Attached--Violin Fraud And Other Deceptions, Carla J. Shapreau

Michigan Law Review

A Review of Violin Fraud: Deception, Forgery, Theft, and the Law by Brian W. Harvey


Arkansas's Revised Article 3: User Caution Advised!!, Sarah Howard Jenkins Jan 1994

Arkansas's Revised Article 3: User Caution Advised!!, Sarah Howard Jenkins

Faculty Scholarship

No abstract provided.


Article 5: Highlights Of The Proposed Revision, James J. White Jan 1994

Article 5: Highlights Of The Proposed Revision, James J. White

Other Publications

I. The Current Status of Article 5: Drafting, Approval and Promulgation--The Most Significant Changes or Clarifications -- II. The Most Contentious Issues in the Revision of Article 5 -- III. More Subtle Questions About Revised Article 5


Revised Article 3 And Amended Article 4 Of The Uniform Commercial Code: Comments On The Changes They Will Make, Arthur G. Murphey Jan 1993

Revised Article 3 And Amended Article 4 Of The Uniform Commercial Code: Comments On The Changes They Will Make, Arthur G. Murphey

Faculty Scholarship

No abstract provided.


Goldstein's Curse, James J. White Jan 1990

Goldstein's Curse, James J. White

Articles

ON April 16, 1980, a man using the name Marvin Goldstein opened a bank account at a Baltimore branch of Union Trust Company. He deposited $15,000 in cash. He told the branch manager that he planned to establish a Baltimore office of his father's New York business, "Goldstein's Precious Metals and Stones." Goldstein identified himself with a New Jersey driver's license and gave a bank reference from New York. On May 6, Goldstein deposited a check for $880,000 at another Union Trust branch near the branch where he had opened the account. Words on this check indicated that it was …


Art Forgery: The Art Market And Legal Considerations, Peter Barry Skolnik Jan 1983

Art Forgery: The Art Market And Legal Considerations, Peter Barry Skolnik

Nova Law Review

"The Fortune Teller" is a painting attributed to the French seventeenth

century artist Georges de La Tour and is believed to have been

painted between 1632 and 1635.


Uniform Commercial Code Warranty Solutions To Art Fraud And Forgery Dec 1972

Uniform Commercial Code Warranty Solutions To Art Fraud And Forgery

William & Mary Law Review

No abstract provided.


Bank Statements, Cancelled Checks, And Article Four In The Electronic Age, Norman Penney Jan 1967

Bank Statements, Cancelled Checks, And Article Four In The Electronic Age, Norman Penney

Michigan Law Review

My task was to prepare a short article dealing in some depth with specific problems which have arisen under Article Four of the Uniform Commercial Code (Code). Unfortunately for purposes of criticism, but happily for those affected by Article Four, a canvass of recent reported cases as well as bank operations people and bank counsel has revealed very few problems of any significance to either the general practitioner or even the so-called commercial law specialist. This prompts two comments: (1) Article Four seems to be working so smoothly that to develop a "problem" would be to make a mountain out …


Some Petty Complaints About Article Three, James J. White Jan 1967

Some Petty Complaints About Article Three, James J. White

Articles

IN many ways Article Three of the Uniform Commercial Code (Code) is like a huge machine assembled by a mad inventor and comprised of assorted sprockets, gears, levers, pulleys, and belts. Few thoroughly understand all of the jobs which this machine is to perform; and a search through the reported cases suggests that the machine is either performing so efficiently that it commits no mistakes worth litigating or it is not performing at all. In their study of the intricacies of Article Three, law students resemble persons climbing about on the machine-pulling its levers, testing its belts and pulleys, and …


Sarah & The Senator. Robert H. Kroninger. Mar 1966

Sarah & The Senator. Robert H. Kroninger.

Washington and Lee Law Review

No abstract provided.


Prescriptions Issued To Deceased And Fictitious Patients Are Forgeries Under New York Penal Law Although Signed With True Name Of Issuing Doctor--People V. Klein, Michigan Law Review Jan 1966

Prescriptions Issued To Deceased And Fictitious Patients Are Forgeries Under New York Penal Law Although Signed With True Name Of Issuing Doctor--People V. Klein, Michigan Law Review

Michigan Law Review

Defendant, a licensed New York physician, issued five prescriptions for narcotics, signing his own name and giving his correct address and narcotics registry number. On four of the prescriptions deceased patients were represented as the intended recipients of the drugs; on the fifth the name of a fictitious patient was used. The defendant used these forms to obtain the prescribed narcotics and administered them to an addict. He was convicted of ten counts of third-degree forgery under sections 889-b and 881 of the New York Penal Law. On appeal, held, affirmed. Prescriptions issued to deceased and fictitious patients are …


Criminal Law--Common Law Forgery--Oral Vs. Witten Representation Of Authority, Robert William Burk Jr. Jun 1963

Criminal Law--Common Law Forgery--Oral Vs. Witten Representation Of Authority, Robert William Burk Jr.

West Virginia Law Review

No abstract provided.


Criminal Law And Procedure -- 1961 Tennessee Survey (Ii), Robert E. Kendrick Jun 1962

Criminal Law And Procedure -- 1961 Tennessee Survey (Ii), Robert E. Kendrick

Vanderbilt Law Review

In reviewing Cowan v.State, the Tennessee Supreme Court noted the following facts: Defendant, seeing an automobile stop at an isolated spot on a so-called "lovers' lane," approached it by way of a woods, being unseen by the two teen-age couples in the automobile until he was quite nearby. The occupants' attempt to drive away was thwarted by the defendant's exhibiting and threatening to use a pistol, warning against further escape attempts, and demanding and receiving the ignition key. He then insisted that the girls have sexual intercourse with him; and when they refused, he stated that he would not "take …


Criminal Law--Forgery--Use Of Fictitious Or Assumed Name, F. L. D. Jr. Jun 1960

Criminal Law--Forgery--Use Of Fictitious Or Assumed Name, F. L. D. Jr.

West Virginia Law Review

No abstract provided.