Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Antitrust Law (1)
- Arrest; Aut Dedere Aut Judicare; Call Center; Caller ID; Con Artist; Concurrent Jurisdiction; Conviction; COVID-19; Cryptocurrency; Customary International Law; Cybercrime; Employment; Extradition; Extraterritoriality; Financial Crime; Fraud; Government Imposter; Immigration; International Covenant on Civil and Political Rights; Internet; INTERPOL; Investment Scam; Jurisdiction; Law Enforcement; Lottery Scam; Mutual Legal Assistance Treaty; Passive Personality Principle; Phone Call; Prosecution; Robocalls; Scam; Scarcity Principle; Sovereignty; Tax Fraud Scam; Technical Support; Technical Support; Scam; Telephone Calls; Territoriality Principle; Utilitarianism; Victim; Voice Over Internet Protocol (1)
- Authentication (1)
- Catfishing (1)
- Due process (1)
Articles 1 - 4 of 4
Full-Text Articles in Evidence
Prosecuting The Phone Scammer When Extradition Fails And Concurrent Jurisdiction Exists, Michelle Lepkofker
Prosecuting The Phone Scammer When Extradition Fails And Concurrent Jurisdiction Exists, Michelle Lepkofker
Brooklyn Journal of International Law
Advancements in technology allow people to place phone calls half a world away via the internet. This technology has made it easier and cheaper for consumers to communicate, but it has also made it easier for scammers to reach more unsuspecting victims. In 2020, TrueCaller, an app designed to block scam phone calls, successfully blocked, and identified 31.3 billion spam calls in 20 countries. In the same year, Americans alone lost a total of USD $ 29.8 billion to scam calls. This Note argues that phone scams continue to be lucrative, in part, because criminal prosecutions of transnational crimes are …
You Can't Trust Everything On The Internet: A Look Into Texas' And Maryland's Approach Of Social Media Authentication, Danielle Orr
You Can't Trust Everything On The Internet: A Look Into Texas' And Maryland's Approach Of Social Media Authentication, Danielle Orr
Catholic University Journal of Law and Technology
If unauthenticated evidence is admitted into the court's record, and makes a defendant’s charge more probable, that defendant’s Fifth and Fourteenth Amendment rights to life and liberty have been violated. Social media evidence, due to the ease of hacking and catfishing, can be unreliable, thus Maryland and Texas have led the way, with two respective approaches, on how to handle such evidence. Maryland, with its proscribed three authentication methods, has a less trusting view of social media, and realizes the dangers wrongfully entered evidence may have on a defendant’s due process. Alternatively, Texas has not heighten scrutiny on social media …
Table Of Contents, Seattle University Law Review
Table Of Contents, Seattle University Law Review
Seattle University Law Review
Table of Contents
A Monopoly Of Thought—How Growing Anticompetitive Practices On The Internet Affect Creative Work, Laurel Brown
A Monopoly Of Thought—How Growing Anticompetitive Practices On The Internet Affect Creative Work, Laurel Brown
Seattle University Law Review
This Note will address how dominant Internet companies detrimentally impact creative work and how legal solutions might be employed to combat the damage inflicted by online monopolies. Part I will focus on how certain Internet companies became dominant, showing an evolution from egalitarian ideals to the consolidated control of the World Wide Web (the web) by companies like Google, Facebook, and Amazon. In Part II, this Note will focus on how two particular companies—Google and Facebook—affect creative endeavors in their control of access to audiences and by determining the economics of content production on the Internet. Part III details what …