Open Access. Powered by Scholars. Published by Universities.®

Science and Technology Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 4 of 4

Full-Text Articles in Science and Technology Law

The Digital Samaritans, Eldar Haber Oct 2020

The Digital Samaritans, Eldar Haber

Washington and Lee Law Review

Bystanderism is becoming largely digital. If being subjected to perilous situations was once reserved almost solely for the physical world, individuals now might witness those in peril digitally from afar via online livestreams. New technological developments in the field of artificial intelligence (AI) might also expand bystanderism to new fields, whereby machines—not just humans—are gradually positioned to better compute their surroundings, thus potentially being capable of reaching a high statistical probability that a perilous situation is currently taking place in their vicinity. This current and future expansion of bystanderism into the digital world forms a rather new type of digital …


Limited Privacy In “Pings:” Why Law Enforcement’S Use Of Cell-Site Simulators Does Not Categorically Violate The Fourth Amendment, Lara M. Mcmahon Apr 2020

Limited Privacy In “Pings:” Why Law Enforcement’S Use Of Cell-Site Simulators Does Not Categorically Violate The Fourth Amendment, Lara M. Mcmahon

Washington and Lee Law Review

This Note proposes four factors courts should consider when asked to determine whether law enforcement’s use of a cell-site simulator constituted a Fourth Amendment search. The first asks courts to consider whether the cell-site simulator surveillance infringed on a constitutionally protected area, such as the home. The second asks courts to consider the duration of the cell-site simulator surveillance. The third asks courts to consider whether the cell-site simulator surveillance was conducted actively or passively. The fourth asks courts to focus on the nature and depth of the information obtained as a result of the cell-site simulator surveillance. If, after …


Secret Conviction Programs, Meghan J. Ryan Mar 2020

Secret Conviction Programs, Meghan J. Ryan

Washington and Lee Law Review

Judges and juries across the country are convicting criminal defendants based on secret evidence. Although defendants have sought access to the details of this evidence—the results of computer programs and their underlying algorithms and source codes—judges have generally denied their requests. Instead, judges have prioritized the business interests of the for-profit companies that developed these “conviction programs” and which could lose market share if the secret algorithms and source codes on which the programs are based were exposed. This decision has jeopardized criminal defendants’ constitutional rights.


Reinvesting In Rico With Cryptocurrencies: Using Cryptocurrency Networks To Prove Rico’S Enterprise Requirement, Andrew Robert Klimek Mar 2020

Reinvesting In Rico With Cryptocurrencies: Using Cryptocurrency Networks To Prove Rico’S Enterprise Requirement, Andrew Robert Klimek

Washington and Lee Law Review

This Note received the 2019 Roy L. Steinheimer Law Review Award.

This Note argues that the Racketeer Influenced and Corrupt Organizations Act (RICO) may be suited to cryptocurrency prosecutions. RICO subsection 1962(a) addresses the infiltration of an enterprise by investing proceeds from racketeering activities and this Note contends that a cryptocurrency network could serve as the “enterprise” required by the statute. Instead of having to investigate and prove the relationships in an underlying criminal enterprise, proponents of a RICO case against crypto-criminals could rely on well-documented and publicly available information about the cryptocurrency network to prove the enterprise and the …