Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Anonymous IP address (1)
- Dora W. Klein (1)
- Dorie Klein (1)
- Eduardo R. Mendoza (1)
- Exclusionary rule (1)
-
- Federal Rules of Evidence (1)
- Fourth Amendment (1)
- Government hacking (1)
- IP address concealing software (1)
- Network investigation techniques (1)
- New York v. Class (1)
- Oliver v. United States (1)
- Onion Router (1)
- Reasonable expectation of privacy (1)
- Rule 404(b)(1) (1)
- Rule 410 Rule 407 (1)
- Specialized relevance rules (1)
- St. Mary's University School of Law (1)
- St. Mary’s Law Journal (1)
- St. Mary’s University School of Law (1)
- Technology (1)
- The Onion Router (TOR) (1)
- Third-party doctrine (1)
- United States Constitution (1)
- United States v. Werdene (1)
- Publication
- Publication Type
Articles 1 - 2 of 2
Full-Text Articles in Evidence
Exemplary And Exceptional Confusion Under The Federal Rules Of Evidence, Dora W. Klein
Exemplary And Exceptional Confusion Under The Federal Rules Of Evidence, Dora W. Klein
Faculty Articles
This Article proposes that the final provisions of Rule 407 and 411, which provide a list of examples of permitted purposes for which a court may admit evidence, are asking for trouble--specifically, the trouble that courts will interpret the list not as examples, but as a specially enumerated, exhaustive list of exceptions.
Network Investigation Techniques: Government Hacking And The Need For Adjustment In The Third-Party Doctrine, Eduardo R. Mendoza
Network Investigation Techniques: Government Hacking And The Need For Adjustment In The Third-Party Doctrine, Eduardo R. Mendoza
St. Mary's Law Journal
Modern society is largely dependent on technology, and legal discovery is no longer limited to hard-copy, tangible documents. The clash of technology and the law is an exciting, yet dangerous phenomena; dangerous because our justice system desperately needs technological progress. The clash between scientific advancement and the search for truth has recently taken an interesting form—government hacking. The United States Government has increasingly used Network Investigation Techniques (NITs) to target suspects in criminal investigations. NITs operate by identifying suspects who have taken affirmative steps to conceal their identity while browsing the Internet. The hacking technique has become especially useful to …