Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Theft

Discipline
Institution
Publication Year
Publication
Publication Type
File Type

Articles 1 - 30 of 114

Full-Text Articles in Law

America’S “Kia Boys”: The Problem, Responses, And Recommendations, Drew Thornley Jan 2024

America’S “Kia Boys”: The Problem, Responses, And Recommendations, Drew Thornley

Seattle University Law Review SUpra

The landscape of automobile theft in the United States has undergone a dramatic transformation, marked by a notable surge in the theft of Kia and Hyundai vehicles. Once regarded as a routine occurrence, car thefts have taken on a novel dimension, propelled by a phenomenon driven by digital culture and social media virality. The thefts of these specific car brands have evolved into what is now widely recognized as the "Kia Challenge," a term echoing across popular platforms like TikTok. In this challenge, young teenage individuals, often referred to as the "Kia Boys" or variations thereof, orchestrate daring car heists, …


Note: Nft Art Heists: Analyzing Nfts Under U.S. Law And International Conventions On Art Theft, Kevin D. Brum Apr 2023

Note: Nft Art Heists: Analyzing Nfts Under U.S. Law And International Conventions On Art Theft, Kevin D. Brum

Notre Dame Journal on Emerging Technologies

The non-fungible token (“NFT”) is a type of digital asset that is usually associated with an image and has a unique identifier. An NFT cannot be copied or reproduced, and records of NFT transactions are stored on the blockchain. NFTs are a recent innovation and have swept the world by storm. NFT sales tripled from 2019 to 2020 and DappRadar—the premier platform for hosting decentralized NFT portfolio management applications—estimates that NFT sales hit twenty-five billion dollars in 2021. Many NFTs appear to be artistic works and, either individually or in a collection, can be given away for free, sold for …


United States Of America As The Global Steward, Grant Fuller Jan 2023

United States Of America As The Global Steward, Grant Fuller

Liberty University Journal of Statesmanship & Public Policy

The principle of subsidiarity states that local communities are best equipped to govern most of their affairs. In an increasingly connected world, this idea gets contested frequently. Since World War II, the world has experienced relative peace due to U.S. precedence. Today, we see U.S. leadership challenged by global players like China, which is doing so in a manner that prioritizes their people and goals. In order to maintain relevance, the United States must revisit trade policy, monetary policy, fiscal policy, and national security policy.


Hb 219 - Venue For Money Laundering And Theft Involving Digital Currency, Samuel P. Robertson, Lindsey N. Smith Jan 2023

Hb 219 - Venue For Money Laundering And Theft Involving Digital Currency, Samuel P. Robertson, Lindsey N. Smith

Georgia State University Law Review

The Act creates venue in cases of money laundering and theft that involve the transfer of digital currency by establishing that the crime may be considered to have happened wherever power was exercised over the property, wherever an act in furtherance of the crime occurred, or wherever the victim resides.


Defensive Industrial Policy: Cybersecurity Interventions To Reduce Intellectual Property Theft, Dr. Chad Dacus, Dr. Carl (Cj) Horn May 2022

Defensive Industrial Policy: Cybersecurity Interventions To Reduce Intellectual Property Theft, Dr. Chad Dacus, Dr. Carl (Cj) Horn

Military Cyber Affairs

Through cyber-enabled industrial espionage, China has appropriated what Keith Alexander, the former Director of the National Security Agency, dubbed “the largest transfer of wealth in history.” Although China disavows intellectual property (IP) theft by its citizens and has set self-sustained research and development as an important goal, it is unrealistic to believe IP theft will slow down meaningfully without changing China’s decision calculus. China and the United States have twice agreed, in principle, to respect one another’s IP rights. However, these agreements have lacked any real enforcement mechanism, so the United States must do more to ensure its IP is …


Theft, Extortion, And The Constitution: Land Use Practice Needs An Ethical Infusion, Michael M. Berger Jan 2022

Theft, Extortion, And The Constitution: Land Use Practice Needs An Ethical Infusion, Michael M. Berger

Touro Law Review

There are many ways in which property owners/developers interact with regulators. To the extent that texts and articles deal with the ethical duties of the regulators, they tend to focus on things like conflicts of interest. But there is more. This article will examine numerous other ways in which regulators may run afoul of ethical practice in dealing with those whom they regulate


Note: Improving The Defend Trade Secrets Act Of 2016: Against Preempting State Trade Secret Law, Victoria Hanson Apr 2021

Note: Improving The Defend Trade Secrets Act Of 2016: Against Preempting State Trade Secret Law, Victoria Hanson

Notre Dame Journal on Emerging Technologies

In order to better protect companies from losing their valuable trade secrets and prevent irreparable harm, Congress enacted the Defend Trade Secrets Act of 2016 (DTSA),8 the first federal civil protection given for trade secrets. In this paper, I argue that the DTSA has indeed not met its supposed goals, but the solution does not lie in preempting state law. Firstly, I explain the history, goals, and provisions of the DTSA and how it has failed to meet the original goals over the past three years. Secondly, I explain the argument for the DTSA to preempt state law and its …


Revenge Porn, Thomas Lonardo, Tricia P. Martland, Rhode Island Bar Journal Nov 2018

Revenge Porn, Thomas Lonardo, Tricia P. Martland, Rhode Island Bar Journal

Life of the Law School (1993- )

No abstract provided.


The Issues Of Responsibility For Theft Crimes In Some Foreign Countries, T. Xasanov Jun 2018

The Issues Of Responsibility For Theft Crimes In Some Foreign Countries, T. Xasanov

Review of law sciences

This article presents a comparative legal analysis of the issues of responsibility for one of the most common crimes in the world – theft in the criminal codes of some foreign countries, given appropriate recommendations for improving the norms of the Criminal Code of the Republic of Uzbekistan, providing for responsibility for this crime.


The Misconstruction Of The Deductions For Business And Personal Casualty Losses, Jeffrey H. Kahn Jan 2018

The Misconstruction Of The Deductions For Business And Personal Casualty Losses, Jeffrey H. Kahn

Scholarly Publications

Losses suffered on an individual's personally used property generally are not deductible. Even after the changes made by the 2017 Tax Cuts and Jobs Act, in two circumstances an exception to this rule applies when "such losses arise from.fire, storm, shipwreck, or other casualty, or from theft." The principal issue that arises is determining the meaning of the term "other casualty." Taking what they deemed to be the common elements in the three explicitly identified casualties, the courts and the Internal Revenue Service determined that an event will qualify as an "other casualty" only if it is "sudden," "unusual," and …


Spite: Legal And Social Implications, Jeffrey L. Harrison Jan 2018

Spite: Legal And Social Implications, Jeffrey L. Harrison

UF Law Faculty Publications

Spite is not a simple concept. The same actions may be motivated by a desire to harm others as a source of the actor’s satisfaction. They may also be a reaction to a personal sense of injustice. Finally, spite-like actions are consistent with simply righting a wrong. This Article makes the case that spite, in its worst from, is comparable to theft. It is a taking of someone’s sense of well-being without consent. It also claims that the purchase of positional goods is ultimately spite driven. It canvasses tort law, contracts, tax law, trademark, and criminal law in an effort …


Provider Liability And Medical Identity Theft: Can I Get Your (Insurance) Number?, Thomas Clifford Dec 2016

Provider Liability And Medical Identity Theft: Can I Get Your (Insurance) Number?, Thomas Clifford

Northwestern Journal of Law & Social Policy

No abstract provided.


Some Comparative Legal History: Robbery And Brigandage, Bernard S. Jackson Apr 2016

Some Comparative Legal History: Robbery And Brigandage, Bernard S. Jackson

Georgia Journal of International & Comparative Law

No abstract provided.


Carrots And Sticks In Cyberspace: Addressing Key Issues In The Cybersecurity Information Sharing Act Of 2015, Jamil N. Jaffar Apr 2016

Carrots And Sticks In Cyberspace: Addressing Key Issues In The Cybersecurity Information Sharing Act Of 2015, Jamil N. Jaffar

South Carolina Law Review

No abstract provided.


The Problem Of Appropriations Riders: The Bipartisan Budget Bill Of 2013 As A Case Study, Irene Scharf Jan 2016

The Problem Of Appropriations Riders: The Bipartisan Budget Bill Of 2013 As A Case Study, Irene Scharf

Faculty Publications

This article tells the story of the enactment of the bill containing Section 2013. It also provides context for Congress's widespread practice of inserting substantive provisions into appropriations bills, and argues that this practice is inappropriate and counterproductive. Enacted in haste, at the end of a lengthy and historically contentious legislative session plagued by threats of an unfunded government, Section 203 was slipped into a bill about a wholly different topic - "keeping the government open and functioning" - without input from key legislators or stakeholders. Hence, its difficulties were foreseeable.

Part II of this piece offers background about the …


Another Bite At The Apple For Trade Secret Protection: Why Stronger Federal Laws Are Needed To Protect A Corporation's Most Valuable Property, Alissa Cardillo Jan 2016

Another Bite At The Apple For Trade Secret Protection: Why Stronger Federal Laws Are Needed To Protect A Corporation's Most Valuable Property, Alissa Cardillo

Brooklyn Journal of Corporate, Financial & Commercial Law

Trade secrets are one of a corporation’s most valuable assets. However, they lack adequate protection under federal law, leaving them vulnerable to theft and misappropriation. As technology advances, it becomes easier and less time consuming for individuals and entities to access and steal trade secrets to a corporation’s detriment. Most often these thefts involve stealing trade secrets in an intangible form. Current legislation fails to adequately protect intangible trade secrets, leaving them vulnerable to theft. An amendment to the National Stolen Property Act that encompasses intangible trade secrets would close a loophole that currently exists relating to intangible assets, allowing …


United States - Mexican Relations - 1981 Convention For Recovery And Return Of Stolen Vehicles And Aircraft - Agreement Replaces 1936 Convention And Clarifies Process For Recovery Of Stolen Vehicles, J. Kennard Neal Mar 2015

United States - Mexican Relations - 1981 Convention For Recovery And Return Of Stolen Vehicles And Aircraft - Agreement Replaces 1936 Convention And Clarifies Process For Recovery Of Stolen Vehicles, J. Kennard Neal

Georgia Journal of International & Comparative Law

No abstract provided.


Keepings, Donald J. Kochan Dec 2014

Keepings, Donald J. Kochan

Donald J. Kochan

Individuals usually prefer to keep what they own; property law develops around that assumption. Alternatively stated, we prefer to choose whether and how to part with what we own. Just as we hold affection and attachment for our memories, captured in the lyrics of the George Gershwin classic, so too do most individuals adopt a “they can’t take that away from me” approach to property ownership.

We often focus on the means of acquisition or transfer in property law. We look less often at the legal rules that support one’s ability to keep what one owns. Yet, it is precisely …


Property Outlaws, Eduardo Peñalver, Sonia Katyal Nov 2014

Property Outlaws, Eduardo Peñalver, Sonia Katyal

Eduardo M. Peñalver

Most people do not hold those who intentionally flout property laws in particularly high regard. The overridingly negative view of the property lawbreaker as a wrong-doer comports with the nearly sacrosanct status of property rights within our characteristically individualist, capitalist, political culture. This dim view of property lawbreakers is also shared to a large degree by property theorists, many of whom regard property rights as a fixed constellation of allocative entitlements that collectively produce stability and order through ownership. In this Article, we seek to rehabilitate, at least to a degree, the maligned character of the intentional property lawbreaker, and …


Exchange, Theft And The Social Formation Of Property, Bart Wilson, Erik Kimbrough, Vernon Smith Aug 2014

Exchange, Theft And The Social Formation Of Property, Bart Wilson, Erik Kimbrough, Vernon Smith

Bart J Wilson

No abstract provided.


Protecting Cultural Heritage By Strictly Scrutinizing Museum Acquisitions, Leila Alexandra Amineddoleh Jan 2014

Protecting Cultural Heritage By Strictly Scrutinizing Museum Acquisitions, Leila Alexandra Amineddoleh

Fordham Intellectual Property, Media and Entertainment Law Journal

There are many ways to protect cultural heritage as a valuable commodity. Although heightened security measures and extensive surveillance methods can deter theft, a more effective means for reducing theft is the elimination of the demand for black market art items. Trade in unprovenanced antiquities is a demand-driven crime; the market for illegal or undocumented items is driven by buyers’ wants. The most effective method of protection for cultural heritage is to eliminate the demand for black market for these precious objects, thereby reducing the market, a method known as the “market reduction approach.” There is a well-documented link between …


Irredeemably Inefficient Acts: A Threat To Markets, Firms, And The Fisc, Alex Raskolnikov Jan 2014

Irredeemably Inefficient Acts: A Threat To Markets, Firms, And The Fisc, Alex Raskolnikov

Faculty Scholarship

This Article defines and explores irredeemably inefficient acts – a conceptually distinct and empirically important category of socially undesirable conduct. Though inefficient behavior is, no doubt, pervasive, the standard view holds that inefficient conduct may be converted into efficient behavior by forcing actors to internalize the external harms of their decisions. For some acts, however such conversion is impossible. These acts are not just inefficient forms of otherwise socially beneficial activities – they are not just contingently inefficient. Rather, they are inefficient at their core; they reduce social welfare no matter what the regulator does. These irredeemably inefficient (or just …


Crimes Involving Intangible Property, Thomas G. Field Jun 2013

Crimes Involving Intangible Property, Thomas G. Field

The University of New Hampshire Law Review

[Excerpt] “A well-known cliché came to life when “[t]he pope’s butler was convicted . . . of stealing the pontiff’s private documents and leaking them to a journalist . . . .” His lawyer’s unsuccessful argument—that taking “only photocopies, not original documents” should not be criminal—prompted this paper.

When tangible property is taken, owners retain nothing. When documents or equivalents are duplicated, however, even if owners retain originals, they suffer loss of control and may lose substantial present and potential advantages, not necessarily economic. Civil redress for such losses has therefore long been available through copyright and trade secret laws. …


A Traditional And Textualist Analysis Of The Goals Of Antitrust: Efficiency, Preventing Theft From Consumers, And Consumer Choice, Robert H. Lande Apr 2013

A Traditional And Textualist Analysis Of The Goals Of Antitrust: Efficiency, Preventing Theft From Consumers, And Consumer Choice, Robert H. Lande

All Faculty Scholarship

This Article ascertains the overall purpose of the antitrust statutes in two very different ways. First, it performs a traditional analysis of the legislative history of the antitrust laws by analyzing relevant legislative debates and committee reports. Second, it undertakes a textualist or "plain meaning" analysis of the purpose of the antitrust statutes, using Justice Scalia's methodology. It does this by analyzing the meaning of key terms as they were used in contemporary dictionaries, legal treatises, common law cases, and the earliest U.s. antitrust cases, and it does this in light of the history of the relevant times.

Both approaches …


In Defense Of Specialized Theft Statutes, David Gray Dec 2012

In Defense Of Specialized Theft Statutes, David Gray

David C. Gray

This essay is an invited contribution to a symposium hosted by the New England Law Review in celebration of Stuart Green’s important book 13 Ways to Steal a Bicycle. As we note, Professor Green’s argument is so reasonable and executed in such elegant prose, there is little call for anything other than praise. Nevertheless, in the spirit of academic exchange, we challenge Professor Green’s skepticism of specialized theft statutes. Relying on retributivist theories of criminal punishment, we argue that specialized theft statutes have an important role to play in contemporary criminal law by educating the public about the necessary commitments …


The Protection Of Digital Information And Prevention Of Its Unauthorized Access And Use In Criminal Law, Carrie Leonetti, Moonho Song Sep 2011

The Protection Of Digital Information And Prevention Of Its Unauthorized Access And Use In Criminal Law, Carrie Leonetti, Moonho Song

Carrie Leonetti

There are a number of valuable intangible properties that do not have specific legislation devoted to their criminal regulation and protection, which poses a vexing problem for the world’s legal systems, which have had an unsatisfactory track record in protecting valuable information over the course of the previous century, giving rise to the need for laws that specifically address issues related to the protection of the integrity of digital information-storage systems. This Article focuses on the protection of these intangibles, when they are stored within a computer system, from their unauthorized use by, or interference from, third parties.

The Article …


The Protection Of Digital Information And Prevention Of Its Unauthorized Access And Use In Criminal Law, Carrie Leonetti, Moonho Song Sep 2011

The Protection Of Digital Information And Prevention Of Its Unauthorized Access And Use In Criminal Law, Carrie Leonetti, Moonho Song

Carrie Leonetti

There are a number of valuable intangible properties that do not have specific legislation devoted to their criminal regulation and protection, which poses a vexing problem for the world’s legal systems, which have had an unsatisfactory track record in protecting valuable information over the course of the previous century, giving rise to the need for laws that specifically address issues related to the protection of the integrity of digital information-storage systems. This Article focuses on the protection of these intangibles, when they are stored within a computer system, from their unauthorized use by, or interference from, third parties.

The Article …


The Protection Of Digital Information And Prevention Of Its Unauthorized Access And Use In Criminal Law, Carrie Leonetti, Moonho Song Sep 2011

The Protection Of Digital Information And Prevention Of Its Unauthorized Access And Use In Criminal Law, Carrie Leonetti, Moonho Song

Carrie Leonetti

There are a number of valuable intangible properties that do not have specific legislation devoted to their criminal regulation and protection, which poses a vexing problem for the world’s legal systems, which have had an unsatisfactory track record in protecting valuable information over the course of the previous century, giving rise to the need for laws that specifically address issues related to the protection of the integrity of digital information-storage systems. This Article focuses on the protection of these intangibles, when they are stored within a computer system, from their unauthorized use by, or interference from, third parties.

The Article …


The Protection Of Digital Information And Prevention Of Its Unauthorized Access And Use In Criminal Law, Carrie Leonetti, Moonho Song Sep 2011

The Protection Of Digital Information And Prevention Of Its Unauthorized Access And Use In Criminal Law, Carrie Leonetti, Moonho Song

Carrie Leonetti

There are a number of valuable intangible properties that do not have specific legislation devoted to their criminal regulation and protection, which poses a vexing problem for the world’s legal systems, which have had an unsatisfactory track record in protecting valuable information over the course of the previous century, giving rise to the need for laws that specifically address issues related to the protection of the integrity of digital information-storage systems. This Article focuses on the protection of these intangibles, when they are stored within a computer system, from their unauthorized use by, or interference from, third parties.

The Article …


The Protection Of Digital Information And Prevention Of Its Unauthorized Access And Use In Criminal Law, Carrie Leonetti, Moonho Song Sep 2011

The Protection Of Digital Information And Prevention Of Its Unauthorized Access And Use In Criminal Law, Carrie Leonetti, Moonho Song

Carrie Leonetti

There are a number of valuable intangible properties that do not have specific legislation devoted to their criminal regulation and protection, which poses a vexing problem for the world’s legal systems, which have had an unsatisfactory track record in protecting valuable information over the course of the previous century, giving rise to the need for laws that specifically address issues related to the protection of the integrity of digital information-storage systems. This Article focuses on the protection of these intangibles, when they are stored within a computer system, from their unauthorized use by, or interference from, third parties.

The Article …