Open Access. Powered by Scholars. Published by Universities.®

Criminal Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 9 of 9

Full-Text Articles in Criminal Law

High Time For Change: The Legalization Of Marijuana And Its Impact On Warrantless Roadside Motor Vehicle Searches, Molly E. O'Connell Oct 2022

High Time For Change: The Legalization Of Marijuana And Its Impact On Warrantless Roadside Motor Vehicle Searches, Molly E. O'Connell

Washington and Lee Law Review Online

The proliferation of marijuana legalization has changed the relationship between driving and marijuana use. While impaired driving remains illegal, marijuana use that does not result in impairment is not a bar to operating a motor vehicle. Scientists have yet to find a reliable way for law enforcement officers to make this distinction. In the marijuana impairment context, there is not a scientifically proven equivalent to the Blood Alcohol Content standard nor are there reliable roadside assessments. This scientific and technological void has problematic consequences for marijuana users that get behind the wheel and find themselves suspected of impaired driving. Without …


The Computer Got It Wrong: Facial Recognition Technology And Establishing Probable Cause To Arrest, T.J. Benedict Apr 2022

The Computer Got It Wrong: Facial Recognition Technology And Establishing Probable Cause To Arrest, T.J. Benedict

Washington and Lee Law Review

Facial recognition technology (FRT) is a popular tool among police, who use it to identify suspects using photographs or still-images from videos. The technology is far from perfect. Recent studies highlight that many FRT systems are less effective at identifying people of color, women, older people, and children. These race, gender, and age biases arise because FRT is often “trained” using non-diverse faces. As a result, police have wrongfully arrested Black men based on mistaken FRT identifications. This Note explores the intersection of facial recognition technology and probable cause to arrest.

Courts rarely, if ever, examine FRT’s role in establishing …


Technological Tethereds: Potential Impact Of Untrustworthy Artificial Intelligence In Criminal Justice Risk Assessment Instruments, Sonia M. Gipson Rankin Apr 2021

Technological Tethereds: Potential Impact Of Untrustworthy Artificial Intelligence In Criminal Justice Risk Assessment Instruments, Sonia M. Gipson Rankin

Washington and Lee Law Review

Issues of racial inequality and violence are front and center today, as are issues surrounding artificial intelligence (“AI”). This Article, written by a law professor who is also a computer scientist, takes a deep dive into understanding how and why hacked and rogue AI creates unlawful and unfair outcomes, particularly for persons of color.

Black Americans are disproportionally featured in criminal justice, and their stories are obfuscated. The seemingly endless back-to-back murders of George Floyd, Breonna Taylor, Ahmaud Arbery, and heartbreakingly countless others have finally shaken the United States from its slumbering journey towards intentional criminal justice reform. Myths about …


Technology’S Influence On Federal Sentencing: Past, Present, And Future, Matthew G. Rowland May 2020

Technology’S Influence On Federal Sentencing: Past, Present, And Future, Matthew G. Rowland

Washington and Lee Journal of Civil Rights and Social Justice

The comprehensive reforms that govern today’s federal sentencing processes were fashioned nearly forty years ago. Those reforms were designed to address concerns regarding the effectiveness, transparency, and fairness of the preexisting indeterminant sentencing system. Today, criticisms are mounting against the very reforms that were once held out to save the sentencing process. The more determinant system is being accused of being biased against minorities, overly harsh, and costly.

This Article explores how the criminal justice system might look to technology and build on the practical experience from the indeterminant and determinant systems. Tools such as Artificial Intelligence (AI) can help …


Limited Privacy In “Pings:” Why Law Enforcement’S Use Of Cell-Site Simulators Does Not Categorically Violate The Fourth Amendment, Lara M. Mcmahon Apr 2020

Limited Privacy In “Pings:” Why Law Enforcement’S Use Of Cell-Site Simulators Does Not Categorically Violate The Fourth Amendment, Lara M. Mcmahon

Washington and Lee Law Review

This Note proposes four factors courts should consider when asked to determine whether law enforcement’s use of a cell-site simulator constituted a Fourth Amendment search. The first asks courts to consider whether the cell-site simulator surveillance infringed on a constitutionally protected area, such as the home. The second asks courts to consider the duration of the cell-site simulator surveillance. The third asks courts to consider whether the cell-site simulator surveillance was conducted actively or passively. The fourth asks courts to focus on the nature and depth of the information obtained as a result of the cell-site simulator surveillance. If, after …


Secret Conviction Programs, Meghan J. Ryan Mar 2020

Secret Conviction Programs, Meghan J. Ryan

Washington and Lee Law Review

Judges and juries across the country are convicting criminal defendants based on secret evidence. Although defendants have sought access to the details of this evidence—the results of computer programs and their underlying algorithms and source codes—judges have generally denied their requests. Instead, judges have prioritized the business interests of the for-profit companies that developed these “conviction programs” and which could lose market share if the secret algorithms and source codes on which the programs are based were exposed. This decision has jeopardized criminal defendants’ constitutional rights.


Reinvesting In Rico With Cryptocurrencies: Using Cryptocurrency Networks To Prove Rico’S Enterprise Requirement, Andrew Robert Klimek Mar 2020

Reinvesting In Rico With Cryptocurrencies: Using Cryptocurrency Networks To Prove Rico’S Enterprise Requirement, Andrew Robert Klimek

Washington and Lee Law Review

This Note received the 2019 Roy L. Steinheimer Law Review Award.

This Note argues that the Racketeer Influenced and Corrupt Organizations Act (RICO) may be suited to cryptocurrency prosecutions. RICO subsection 1962(a) addresses the infiltration of an enterprise by investing proceeds from racketeering activities and this Note contends that a cryptocurrency network could serve as the “enterprise” required by the statute. Instead of having to investigate and prove the relationships in an underlying criminal enterprise, proponents of a RICO case against crypto-criminals could rely on well-documented and publicly available information about the cryptocurrency network to prove the enterprise and the …


Cybersurveillance Intrusions And An Evolving Katz Privacy Test, Margaret Hu Jan 2018

Cybersurveillance Intrusions And An Evolving Katz Privacy Test, Margaret Hu

Scholarly Articles

To contextualize why a new approach to the Fourth Amendment is essential, this Article describes two emerging cybersurveillance tools. The first Cybersurveillance tool, Geofeedia, has been deployed by state and local law enforcement. Geofeedia uses a process known as "geofencing" to draw a virtual barrier around a particular geographic region, and then identifies and tracks public social media posts within that region for predictive policing purposes. The second tool, Future Attribute Screening Technology (FAST), is under development by the United States Department of Homeland Security (DHS). FAST is another predictive policing tool that analyzes physiological and behavioral signals with the …


Crimmigration-Counterterrorism, Margaret Hu Jan 2017

Crimmigration-Counterterrorism, Margaret Hu

Scholarly Articles

The discriminatory effects that may stem from biometric ID cybersurveillance and other algorithmically driven screening technologies can be better understood through the analytical prism of “crimmigration-counterterrorism”: the conflation of crime, immigration, and counterterrorism policy. The historical genesis for this phenomenon can be traced back to multiple migration law developments, including the Chinese Exclusion Act of 1882. To implement stricter immigration controls at the border and interior, both the federal and state governments developed immigration enforcement schemes that depended upon both biometric identification documents and immigration screening protocols. This Article uses contemporary attempts to implement an expanded regime of “extreme vetting” …