Open Access. Powered by Scholars. Published by Universities.®
- Publication
- File Type
Articles 1 - 14 of 14
Full-Text Articles in Criminal Procedure
Implementing The Lessons From Wrongful Convictions: An Empirical Analysis Of Eyewitness Identification Reform Strategies, Keith A. Findley
Implementing The Lessons From Wrongful Convictions: An Empirical Analysis Of Eyewitness Identification Reform Strategies, Keith A. Findley
Keith A Findley
Learning about the flaws in the criminal justice system that have produced wrongful convictions has progressed at a dramatic pace since the first innocent individuals were exonerated by postconviction DNA testing in 1989. Application of that knowledge to improving the criminal justice system, however, has lagged far behind the growth in knowledge. Likewise, while considerable scholarship has been devoted to identifying the factors that produce wrongful convictions, very little scholarly attention has been devoted to the processes through which knowledge about causes is translated into reforms.
Using eyewitness misidentification—one of the leading contributors to wrongful convictions and the most thoroughly …
Visualizing Dna Proof, Nicholas L. Georgakopoulos
Visualizing Dna Proof, Nicholas L. Georgakopoulos
Nicholas L Georgakopoulos
DNA proof inherently involves the use of probability theory, which is often counterintuitive. Visual depictions of probability theory, however, can clarify the analysis and make it tractable. A DNA hit from a large database is a notoriously difficult probability theory issue, yet the visuals should enable courts and juries to handle it. The Puckett facts are an example of a general approach: A search in a large DNA database produces a hit for a cold crime from 1972 San Francisco. Probability theory allows us to process the probabilities that someone else in the database, someone not in the database, or …
Gay Panic And The Case For Gay Shield Laws, Kelly Strader, Molly Selvin, Lindsey Hay
Gay Panic And The Case For Gay Shield Laws, Kelly Strader, Molly Selvin, Lindsey Hay
Kelly Strader
In a highly publicized “gay panic” case, Brandon McInerney shot and killed Larry King in their middle school classroom. King was a self-identified gay student who sometimes wore jewelry and makeup to school and, according to those who knew him, was possibly transgender. Tried as an adult for first-degree murder, McInerney asserted a heat of passion defense based upon King’s alleged sexual advances. The jury deadlocked, with a majority accepting McInerney’s defense. Drawing largely upon qualitative empirical research, this article uses the Larry King murder case as a prism though which to view the doctrinal, theoretical, and policy bases of …
Discretion Abused: Reinterpreting The Appellate Standard Of Review For Hearsay, Matthew J. Peterson
Discretion Abused: Reinterpreting The Appellate Standard Of Review For Hearsay, Matthew J. Peterson
Matthew J. Peterson
Matthew J. Peterson, Discretion Abused: Reinterpreting the Appellate Standard of Review for Hearsay
Abstract:
The decision by a federal a court to exclude or admit hearsay can be crucial to the case of either party. Despite this prospective impact, the federal courts of appeal currently defer to district courts’ expertise by reviewing a district court’s decision to admit or exclude hearsay for an abuse of discretion. Such deference often insulates district courts’ incorrect interpretation of the rule against hearsay and the improper application of the exclusions and exceptions to the rule from appellate reversal.
Lowering the standard of review for …
Rationality, Insanity, And The Insanity Defense: Reflections On The Limits Of Reason, Theodore Y. Blumoff
Rationality, Insanity, And The Insanity Defense: Reflections On The Limits Of Reason, Theodore Y. Blumoff
Theodore Y. Blumoff
Individuals who suffer from chronic paranoid ideations live with deeply embedded conspiratorial delusions that are sometimes accompanied by unwanted visual and/or auditory stimuli, sometime neither: just psychotic delusions in which they feel as if they have lost control of their lives – and of course they have, albeit not from the performances of foreign forces. When those perceived forces persevere for even a fairly short period of time, they can dictate the performance of evil deeds that the individual ultimately feels helpless to oppose. What observations and findings from neuroscience make clear is that such individuals do not lack knowledge, …
Finding The Foregone Conclusions Of Encryption, Timothy A. Wiseman
Finding The Foregone Conclusions Of Encryption, Timothy A. Wiseman
Timothy A Wiseman
Encryption is commonly used to protect private information, for both legitimate and illegitimate reasons. Courts have been struggling to determine when, within the bounds of the Fourth and Fifth Amendments, the Courts may compel a defendant in a criminal case to decrypt their data.
This article argues that a broad use of the Forgone Conclusion doctrine would permit the Courts to order a defendant to decrypt their data when the prosecution can show with reasonable particularity the existence and location of the encrypted documents, that they are likely to be incriminating, and that the government can authenticate them without the …
Back To The Future: The Constitution Requires Reasonableness And Particularity—Introducing The “Seize But Don’T Search” Doctrine, Adam Lamparello, Charles E. Maclean
Back To The Future: The Constitution Requires Reasonableness And Particularity—Introducing The “Seize But Don’T Search” Doctrine, Adam Lamparello, Charles E. Maclean
Adam Lamparello
Issuing one-hundred or fewer opinions per year, the United States Supreme Court cannot keep pace with opinions that match technological advancement. As a result, in Riley v. California and United States v. Wurie, the Court needs to announce a broader principle that protects privacy in the digital age. That principle, what we call “seize but don’t search,” recognizes that the constitutional touchstone for all searches is reasonableness.
When do present-day circumstances—the evolution in the Government’s surveillance capabilities, citizens’ phone habits, and the relationship between the NSA and telecom companies—become so thoroughly unlike those considered by the Supreme Court thirty-four years …
The Piranha Is As Deadly As The Shark: A Case For The Limitation On Deceptive Practices In Dna Collection, Brett A. Bauman
The Piranha Is As Deadly As The Shark: A Case For The Limitation On Deceptive Practices In Dna Collection, Brett A. Bauman
Brett A Bauman
Police deception tactics are utilized throughout the United States as a way to catch unsuspecting criminals. Although criticized in many respects, most deceptive police techniques are not only legal, but are actually encouraged. DNA collection and analysis is no exception—techniques are frequently used by law enforcement officers in an attempt to collect a suspect’s genetic specimen in the interest of solving crimes. While law enforcement officers typically have the best interests of society in mind, the current practices employed by officers to collect suspects’ DNA violate the Fourth Amendment. The Fourth Amendment provides protection against unreasonable searches and seizures, and …
Cipa V. State Secrets: How A Few Mistakes Confused Two Important National Security Privileges, Elisa Poteat
Cipa V. State Secrets: How A Few Mistakes Confused Two Important National Security Privileges, Elisa Poteat
Elisa Poteat
No abstract provided.
Timeless Trial Strategies And Tactics: Lessons From The Classic Claus Von Bülow Case, Daniel M. Braun
Timeless Trial Strategies And Tactics: Lessons From The Classic Claus Von Bülow Case, Daniel M. Braun
Daniel M Braun
In this new Millennium -- an era of increasingly complex cases -- it is critical that lawyers keep a keen eye on trial strategy and tactics. Although scientific evidence today is more sophisticated than ever, the art of effectively engaging people and personalities remains prime. Scientific data must be contextualized and presented in absorbable ways, and attorneys need to ensure not only that they correctly understand jurors, judges, witnesses, and accused persons, but also that they find the means to make their arguments truly resonate if they are to formulate an effective case and ultimately realize justice. A decades-old case …
The System Of Modern Criminal Conspiracy, Steven R. Morrison
The System Of Modern Criminal Conspiracy, Steven R. Morrison
Steven R Morrison
Something has changed in the modern system of American criminal conspiracy law compared to its prior iterations. This article explores that change, arguing that the system of modern criminal conspiracy now gives to the government such great discretion to charge and prove a conspiracy that unpopular ideas and the speech that expresses them have become ready subjects of prosecution. At its center, this article defines the system of modern conspiracy law, which is one of uniformity rather than dynamism. Where dynamic systems of law contain distinct components that perform different tasks (proving actus reus and mens rea, for example), the …
Defense Counsel, Trial Judges, And Evidence Production Protocols, Darryl K. Brown
Defense Counsel, Trial Judges, And Evidence Production Protocols, Darryl K. Brown
Darryl K. Brown
This essay, a contribution to the 2012 Texas Tech Symposium on the Sixth Amendment, argues that constitutional criminal adjudication provisions are fruitfully viewed not primarily as defendant rights but as procedural components that, when employed, maximize the odds that adversarial adjudication will succeed in its various goals, notably accurate judgments. On this view, the state has an interest in how those procedural mechanisms, especially regarding fact investigation and evidence gathering, are invoked or implemented. Deficient attorney performance, on this view, can be understood as a problem of the state’s adversarial adjudication process, for which public officials—notably judges, whose judgments depend …
Just The Facts: Solving The Corporate Privilege Waiver Dilemma, Don R. Berthiaume
Just The Facts: Solving The Corporate Privilege Waiver Dilemma, Don R. Berthiaume
Don R Berthiaume
How can corporations provide “just the facts” — which are, in fact, not privileged — without waiving the attorney client privilege and work product protection? This article argues for an addition to the Federal Rules of Criminal Procedure based upon Rule 30(b)(6) of the Federal Rules of Civil Procedure, which allows civil litigants to issue a subpoena to an organization and cause them to “designate one or more officers, directors, or managing agents, or designate other persons who consent to testify on its behalf … about information known or reasonably available to the organization.”[6] Why should we look to Fed. …
Can Criminal Law Be Controlled?, Darryl K. Brown
Can Criminal Law Be Controlled?, Darryl K. Brown
Darryl K. Brown
This review of Douglas Husak's 2008 book, Overcriminalization: The Limits of the Criminal Law, summarizes and largely endorses Husak's normative argument about the indefensible expansiveness of much contemporary criminal liability. It then offers a skeptical (or pessimistic) argument about the possibilities for a normative theory such as Husak's to have much effect on criminal justice policy in light of the political barriers to reform.