Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 31 - 34 of 34

Full-Text Articles in Law

Separating Amicus Wheat From Chaff, Aaron-Andrew P. Bruhl, Adam Feldman Jan 2017

Separating Amicus Wheat From Chaff, Aaron-Andrew P. Bruhl, Adam Feldman

Faculty Publications

No abstract provided.


Curbing Excessive Force: A Primer On Barriers To Police Accountability, Kami N. Chavis, Conor Degnan Jan 2017

Curbing Excessive Force: A Primer On Barriers To Police Accountability, Kami N. Chavis, Conor Degnan

Faculty Publications

This Issue Brief summarizes some of the traditional mechanisms for holding police accountable for misconduct, offers a critique of each, and ends with suggestions for the future of police accountability. Part I focuses on some of the legal and structural impediments to police accountability including the inherent conflicts of interest that frequently prevent local prosecutors from prosecuting police officers accused of using excessive force. Part I also discusses how the doctrine of qualified immunity shields officers from civil liability when a suspect is harmed or dies in police custody. Part II explores how the Department of Justice (DOJ) has failed …


Split Definitive: How Party Polarization Turned The Supreme Court Into A Partisan Court, Neal Devins, Lawrence Baum Jan 2017

Split Definitive: How Party Polarization Turned The Supreme Court Into A Partisan Court, Neal Devins, Lawrence Baum

Faculty Publications

No abstract provided.


Biometric Cyberintelligence And The Posse Comitatus Act, Margaret Hu Jan 2017

Biometric Cyberintelligence And The Posse Comitatus Act, Margaret Hu

Faculty Publications

This Article addresses the rapid growth of what the military and the intelligence community refer to as “biometric-enabled intelligence.” This newly emerging intelligence tool is reliant upon biometric databases—for example, digitalized storage of scanned fingerprints and irises, digital photographs for facial recognition technology, and DNA. This Article introduces the term “biometric cyberintelligence” to more accurately describe the manner in which this new tool is dependent upon cybersurveillance and big data’s massintegrative systems.

This Article argues that the Posse Comitatus Act of 1878, designed to limit the deployment of federal military resources in the service of domestic policies, will be difficult …