Open Access. Powered by Scholars. Published by Universities.®

Evidence Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 4 of 4

Full-Text Articles in Evidence

Network Investigation Techniques: Government Hacking And The Need For Adjustment In The Third-Party Doctrine, Eduardo R. Mendoza Jan 2017

Network Investigation Techniques: Government Hacking And The Need For Adjustment In The Third-Party Doctrine, Eduardo R. Mendoza

St. Mary's Law Journal

Modern society is largely dependent on technology, and legal discovery is no longer limited to hard-copy, tangible documents. The clash of technology and the law is an exciting, yet dangerous phenomena; dangerous because our justice system desperately needs technological progress. The clash between scientific advancement and the search for truth has recently taken an interesting form—government hacking. The United States Government has increasingly used Network Investigation Techniques (NITs) to target suspects in criminal investigations. NITs operate by identifying suspects who have taken affirmative steps to conceal their identity while browsing the Internet. The hacking technique has become especially useful to …


Policing In The Era Of Permissiveness: Mitigating Misconduct Through Third-Party Standing, Julian A. Cook Iii Jan 2016

Policing In The Era Of Permissiveness: Mitigating Misconduct Through Third-Party Standing, Julian A. Cook Iii

Brooklyn Law Review

On April 4, 2015, Walter L. Scott was driving his vehicle when he was stopped by Officer Michael T. Slager of the North Charleston, South Carolina, police department for a broken taillight. A dash cam video from the officer’s vehicle showed the two men engaged in what appeared to be a rather routine verbal exchange. Sometime after Slager returned to his vehicle, Scott exited his car and ran away from Slager, prompting the officer to pursue him on foot. After he caught up with Scott in a grassy field near a muffler establishment, a scuffle between the men ensued, purportedly …


The Optimum Remedy For Constitutional Breaches: Multiaccessed Civil Penalties In Equity, Robert C. Fellmeth Oct 2012

The Optimum Remedy For Constitutional Breaches: Multiaccessed Civil Penalties In Equity, Robert C. Fellmeth

Pepperdine Law Review

No abstract provided.


Replacing The Exclusionary Rule: Fourth Amendment Violations As Direct Criminal Contempt, Ronald J. Rychlak Dec 2009

Replacing The Exclusionary Rule: Fourth Amendment Violations As Direct Criminal Contempt, Ronald J. Rychlak

Chicago-Kent Law Review

The exclusionary rule, which bars from admission evidence obtained in violation of the Fourth Amendment's prohibition of unreasonable searches and seizures, is a bedrock of American law. It is highly controversial, but there seems to be no equally effective way to protect citizens' rights. This paper proposes that an admissibility standard be adopted that is in keeping with virtually every jurisdiction around the world other than the United States. Thus, before ruling evidence inadmissible, the court would consider the level of the constitutional violation, the seriousness of the crime, whether the violation casts substantial doubt on the reliability of the …