Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- AI (1)
- Algorithms (1)
- Automated Fingerprint Identification (1)
- Bitcoin (1)
- Blockchain (1)
-
- Breathalyzers (1)
- Cellular telephone (1)
- Criminal Justice (1)
- Cryptocurrency (1)
- Digital surveillance (1)
- Dna identification (1)
- Drug dogs (1)
- Enterprise (1)
- Evidence (1)
- FRT (1)
- False (1)
- Fourth Amendment (1)
- Genotyping (1)
- Hacking (1)
- Indictments (1)
- Katz (1)
- Organized crime (1)
- Pre-crime (1)
- Probable cause (1)
- Prosecute (1)
- Scientific evidence (1)
- Search (1)
- Search and seizure (1)
- Search warrants (1)
- Secrecy (1)
Articles 1 - 6 of 6
Full-Text Articles in Science and Technology Law
The Computer Got It Wrong: Facial Recognition Technology And Establishing Probable Cause To Arrest, T.J. Benedict
The Computer Got It Wrong: Facial Recognition Technology And Establishing Probable Cause To Arrest, T.J. Benedict
Washington and Lee Law Review
Facial recognition technology (FRT) is a popular tool among police, who use it to identify suspects using photographs or still-images from videos. The technology is far from perfect. Recent studies highlight that many FRT systems are less effective at identifying people of color, women, older people, and children. These race, gender, and age biases arise because FRT is often “trained” using non-diverse faces. As a result, police have wrongfully arrested Black men based on mistaken FRT identifications. This Note explores the intersection of facial recognition technology and probable cause to arrest.
Courts rarely, if ever, examine FRT’s role in establishing …
Technological Tethereds: Potential Impact Of Untrustworthy Artificial Intelligence In Criminal Justice Risk Assessment Instruments, Sonia M. Gipson Rankin
Technological Tethereds: Potential Impact Of Untrustworthy Artificial Intelligence In Criminal Justice Risk Assessment Instruments, Sonia M. Gipson Rankin
Washington and Lee Law Review
Issues of racial inequality and violence are front and center today, as are issues surrounding artificial intelligence (“AI”). This Article, written by a law professor who is also a computer scientist, takes a deep dive into understanding how and why hacked and rogue AI creates unlawful and unfair outcomes, particularly for persons of color.
Black Americans are disproportionally featured in criminal justice, and their stories are obfuscated. The seemingly endless back-to-back murders of George Floyd, Breonna Taylor, Ahmaud Arbery, and heartbreakingly countless others have finally shaken the United States from its slumbering journey towards intentional criminal justice reform. Myths about …
Limited Privacy In “Pings:” Why Law Enforcement’S Use Of Cell-Site Simulators Does Not Categorically Violate The Fourth Amendment, Lara M. Mcmahon
Limited Privacy In “Pings:” Why Law Enforcement’S Use Of Cell-Site Simulators Does Not Categorically Violate The Fourth Amendment, Lara M. Mcmahon
Washington and Lee Law Review
This Note proposes four factors courts should consider when asked to determine whether law enforcement’s use of a cell-site simulator constituted a Fourth Amendment search. The first asks courts to consider whether the cell-site simulator surveillance infringed on a constitutionally protected area, such as the home. The second asks courts to consider the duration of the cell-site simulator surveillance. The third asks courts to consider whether the cell-site simulator surveillance was conducted actively or passively. The fourth asks courts to focus on the nature and depth of the information obtained as a result of the cell-site simulator surveillance. If, after …
Secret Conviction Programs, Meghan J. Ryan
Secret Conviction Programs, Meghan J. Ryan
Washington and Lee Law Review
Judges and juries across the country are convicting criminal defendants based on secret evidence. Although defendants have sought access to the details of this evidence—the results of computer programs and their underlying algorithms and source codes—judges have generally denied their requests. Instead, judges have prioritized the business interests of the for-profit companies that developed these “conviction programs” and which could lose market share if the secret algorithms and source codes on which the programs are based were exposed. This decision has jeopardized criminal defendants’ constitutional rights.
Reinvesting In Rico With Cryptocurrencies: Using Cryptocurrency Networks To Prove Rico’S Enterprise Requirement, Andrew Robert Klimek
Reinvesting In Rico With Cryptocurrencies: Using Cryptocurrency Networks To Prove Rico’S Enterprise Requirement, Andrew Robert Klimek
Washington and Lee Law Review
This Note received the 2019 Roy L. Steinheimer Law Review Award.
This Note argues that the Racketeer Influenced and Corrupt Organizations Act (RICO) may be suited to cryptocurrency prosecutions. RICO subsection 1962(a) addresses the infiltration of an enterprise by investing proceeds from racketeering activities and this Note contends that a cryptocurrency network could serve as the “enterprise” required by the statute. Instead of having to investigate and prove the relationships in an underlying criminal enterprise, proponents of a RICO case against crypto-criminals could rely on well-documented and publicly available information about the cryptocurrency network to prove the enterprise and the …
Using Dna Profiles To Obtain "John Doe" Arrest Warrants And Indictments, Frank B. Ulmer
Using Dna Profiles To Obtain "John Doe" Arrest Warrants And Indictments, Frank B. Ulmer
Washington and Lee Law Review
No abstract provided.