Open Access. Powered by Scholars. Published by Universities.®

Evidence Commons

Open Access. Powered by Scholars. Published by Universities.®

Science and Technology Law

2017

Institution
Keyword
Publication
Publication Type

Articles 1 - 9 of 9

Full-Text Articles in Evidence

Touch Dna And Chemical Analysis Of Skin Trace Evidence: Protecting Privacy While Advancing Investigations, Mary Graw Leary Dec 2017

Touch Dna And Chemical Analysis Of Skin Trace Evidence: Protecting Privacy While Advancing Investigations, Mary Graw Leary

William & Mary Bill of Rights Journal

This Article addresses touch DNA, chemical analysis of skin traces, and the implications for crime scene investigation, arguing that changes in how trace evidence is analyzed require alterations in the law’s approach to its use. Part I discusses the history of traditional DNA analysis. Part II examines the emergence of touch DNA and related technologies and how they differ from traditional DNA analysis. Part III outlines the specific risks created by the collection and storing of results under the current outdated jurisprudence. Part IV focuses on specific risks to suspects and victims of crime. Part V proposes a legal framework …


The Unintended Consequences Of California Proposition 47: Reducing Law Enforcement’S Ability To Solve Serious, Violent Crimes, Shelby Kail Aug 2017

The Unintended Consequences Of California Proposition 47: Reducing Law Enforcement’S Ability To Solve Serious, Violent Crimes, Shelby Kail

Pepperdine Law Review

For many years, DNA databases have helped solve countless serious, violent crimes by connecting low-level offenders to unsolved crimes. Because the passage of Proposition 47 reduced several low-level crimes to misdemeanors, which do not qualify for DNA sample collection, Proposition 47 has severely limited law enforcement’s ability to solve serious, violent crimes through California’s DNA database and reliable DNA evidence. This powerful law enforcement tool must be preserved to prevent additional crimes from being committed, to exonerate the innocent, and to provide victims with closure through conviction of their assailants or offenders. Proposition 47’s unintended consequences have led to devastating …


The Forensic Community Can Educate Lawyers, Judges, Robert M. Sanger Jun 2017

The Forensic Community Can Educate Lawyers, Judges, Robert M. Sanger

Robert M. Sanger

Forensic science has made significant strides in elevating the standards for forensic analysis, reporting and testimony over the last few years. Yet, lawyers and judges lag far behind in understanding the significance of these strides. There is an attempt to educate law students in the law schools and to educate lawyers and judges through continuing legal and judicial education but it is slow in finding its way into the actual courtroom. Therefore, while there is progress at the highest levels of forensic science, a lot of "junk" science competes for the attention of jurors.

Forensic scientists can help educate the …


Small Cells, Big Problems: The Increasing Precision Of Cell Site Location Information And The Need For Fourth Amendment Protections, Robert M. Bloom, William T. Clark May 2017

Small Cells, Big Problems: The Increasing Precision Of Cell Site Location Information And The Need For Fourth Amendment Protections, Robert M. Bloom, William T. Clark

Robert M. Bloom

The past fifty years has witnessed an evolution in technology advancement in police surveillance. Today, one of the essential tools of police surveillance is something most Americans carry with them in their pockets every day, the cell phone. Cell phones not only contain a huge repository of personal data, they also provide continuous surveillance of a person’s movement known as cell site location information (CSLI). In 1986, Congress sought to provide some privacy protections to CSLI in the Stored Communication Act. Although this solution may have struck the proper balance in an age when cell phones were a mere novelty …


Civil Liberty Or National Security: The Battle Over Iphone Encryption, Karen Lowell Mar 2017

Civil Liberty Or National Security: The Battle Over Iphone Encryption, Karen Lowell

Georgia State University Law Review

On June 5, 2013, Edward Snowden released what would be the first of many documents exposing the vast breadth of electronic surveillance the Federal Bureau of Investigation (FBI) and the National Security Agency (NSA) had been conducting on millions of United States citizens. Although the federal agencies had legal authority under the Foreign Intelligence Surveillance Act (FISA) to collect metadata from companies such as Verizon, many Americans considered this data collection to be a massive invasion of privacy.

Equipped with the knowledge of sweeping domestic surveillance programs, citizens and technology firms fighting for strong privacy and security protection, have started …


Neuroscience In Forensic Contexts: Ethical Concerns, Stephen J. Morse Feb 2017

Neuroscience In Forensic Contexts: Ethical Concerns, Stephen J. Morse

All Faculty Scholarship

This is a chapter in a volume, Ethics Challenges in Forensic Psychiatry and Psychology Practice, edited by Ezra E. H. Griffith, M.D. and to be published by Columbia University Press. The chapter addresses whether the use of new neuroscience techniques, especially non-invasive functional magnetic resonance imaging (fMRI) and the data from studies employing them raise new ethical issues for forensic psychiatrists and psychologists. The implicit thesis throughout is that if the legal questions, the limits of the new techniques and the relevance of neuroscience to law are properly understood, no new ethical issues are raised. A major ethical lapse …


Reevaluating Attorney-Client Privilege In The Age Of Hackers, Anne E. Conroy Jan 2017

Reevaluating Attorney-Client Privilege In The Age Of Hackers, Anne E. Conroy

Brooklyn Law Review

The news story is now familiar: hackers breach a security system and post internal, confidential information online for anyone with an Internet connection to comb through. This digital version of whistleblowing, called “hacktivism,” is attractive to the media, which has leaned on broad First Amendment protections to widely cover the confidential communications revealed by hackers. These hacks also provide attorneys with enticing opportunities to look through previously confidential files. But as ethics and evidentiary rules stand, it is not clear if an attorney may view the files, let alone use them as evidence in litigation. That companies are hacked is …


Authenticating Digital Evidence, Paul W. Grimm, Daniel J. Capra, Gregory P. Joseph Jan 2017

Authenticating Digital Evidence, Paul W. Grimm, Daniel J. Capra, Gregory P. Joseph

Faculty Scholarship

No abstract provided.


Problems With Using Statistics To Justify Institutional Policies, Justin Shin Jan 2017

Problems With Using Statistics To Justify Institutional Policies, Justin Shin

Senior Projects Spring 2017

It is becoming increasingly common for institutions to use statistics to inform policy decisions. We should be prepared to ask ourselves what regulatory principles should be imposed on institutions that seek to justify certain policies through deference to a statistical analysis. This paper will examine the difficulties that come with using statistics to justify actions, and argue that certain standards of transparency and verifiability should be expected from any institution that seeks to involve a statistical analysis in the formation of policies. I will first use Market Share Liability, an established use of statistics, to draw out what responsibilities an …