Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 4 of 4
Full-Text Articles in Evidence
Network Investigation Techniques: Government Hacking And The Need For Adjustment In The Third-Party Doctrine, Eduardo R. Mendoza
Network Investigation Techniques: Government Hacking And The Need For Adjustment In The Third-Party Doctrine, Eduardo R. Mendoza
St. Mary's Law Journal
Modern society is largely dependent on technology, and legal discovery is no longer limited to hard-copy, tangible documents. The clash of technology and the law is an exciting, yet dangerous phenomena; dangerous because our justice system desperately needs technological progress. The clash between scientific advancement and the search for truth has recently taken an interesting form—government hacking. The United States Government has increasingly used Network Investigation Techniques (NITs) to target suspects in criminal investigations. NITs operate by identifying suspects who have taken affirmative steps to conceal their identity while browsing the Internet. The hacking technique has become especially useful to …
Policing In The Era Of Permissiveness: Mitigating Misconduct Through Third-Party Standing, Julian A. Cook Iii
Policing In The Era Of Permissiveness: Mitigating Misconduct Through Third-Party Standing, Julian A. Cook Iii
Brooklyn Law Review
On April 4, 2015, Walter L. Scott was driving his vehicle when he was stopped by Officer Michael T. Slager of the North Charleston, South Carolina, police department for a broken taillight. A dash cam video from the officer’s vehicle showed the two men engaged in what appeared to be a rather routine verbal exchange. Sometime after Slager returned to his vehicle, Scott exited his car and ran away from Slager, prompting the officer to pursue him on foot. After he caught up with Scott in a grassy field near a muffler establishment, a scuffle between the men ensued, purportedly …
The Optimum Remedy For Constitutional Breaches: Multiaccessed Civil Penalties In Equity, Robert C. Fellmeth
The Optimum Remedy For Constitutional Breaches: Multiaccessed Civil Penalties In Equity, Robert C. Fellmeth
Pepperdine Law Review
No abstract provided.
Replacing The Exclusionary Rule: Fourth Amendment Violations As Direct Criminal Contempt, Ronald J. Rychlak
Replacing The Exclusionary Rule: Fourth Amendment Violations As Direct Criminal Contempt, Ronald J. Rychlak
Chicago-Kent Law Review
The exclusionary rule, which bars from admission evidence obtained in violation of the Fourth Amendment's prohibition of unreasonable searches and seizures, is a bedrock of American law. It is highly controversial, but there seems to be no equally effective way to protect citizens' rights. This paper proposes that an admissibility standard be adopted that is in keeping with virtually every jurisdiction around the world other than the United States. Thus, before ruling evidence inadmissible, the court would consider the level of the constitutional violation, the seriousness of the crime, whether the violation casts substantial doubt on the reliability of the …