Open Access. Powered by Scholars. Published by Universities.®
- Keyword
- Publication
- Publication Type
- File Type
Articles 1 - 4 of 4
Full-Text Articles in Science and Technology Law
Two Fallacies About Dna Data Banks For Law Enforcement, David H. Kaye
Two Fallacies About Dna Data Banks For Law Enforcement, David H. Kaye
Journal Articles
This commentary on the article Legal and Policy Issues in Expanding the Scope of Law Enforcement DNA Data Banks, 67 Brook. L. Rev. 127 (2001), by Mark Rothstein and Sandra Carnahan, argues that the case for confining law enforcement DNA databases to noncoding loci and to samples from individuals convicted of violent crimes is quite weak.
It describes alternative approaches, including the possibility of a population-wide database; the privacy implications of the loci now used in forensic identification; the law governing DNA dragnets; and the limits on DNA databases imposed by recent cases on searches and seizures. It notes the …
The Constitutionality Of Dna Sampling On Arrest, David H. Kaye
The Constitutionality Of Dna Sampling On Arrest, David H. Kaye
Journal Articles
Every state now collects DNA from people convicted of certain offenses. Law enforcement authorities promote offender DNA databanking on the theory that it will identify offenders who commit additional crimes while or probation or parole, or after they have finished serving their sentences. Even relatively small databases have yielded such dividends. As these database searches uncover the perpetrators of rapes, murders, and other offenses, the pressure builds to expand the coverage of the databases.
Recent proposals call for extending not merely the scope of crimes for which DNA databanking would be used, but also the point at which the samples …
Criminal Law In Cyberspace, Neal K. Katyal
Criminal Law In Cyberspace, Neal K. Katyal
Georgetown Law Faculty Publications and Other Works
Two of the most talked-about crimes of the year, the ILoveYou computer worm and the denial of service attacks on Yahoo, eBay, and ETrade, suggest that a new form of crime is emerging: cybercrime. Thousands of these crimes occur each year, and the results are often catastrophic; in terms of economic damage, the ILoveYou worm may have been the most devastating crime in history, causing more than $11 billion in losses.
This paper asks how cybercrime is best deterred. It identifies five constraints on crime - legal sanctions, monetary perpetration cost, social norms, architecture, and physical risks - and explains …
Comparative Institutional Analysis In Cyberspace: The Case Of Intermediary Liability For Defamation, Susan Freiwald
Comparative Institutional Analysis In Cyberspace: The Case Of Intermediary Liability For Defamation, Susan Freiwald
Susan Freiwald
Almost every day brings reports that Congress is considering new cyberspace-targeted laws and the courts are deciding novel cyberspace legal questions. These developments lend urgency to the question of whether a particular cyberspace legal change should come through operation of new statutes, judicial decisions, or the free market. If we can develop sophisticated analytical methods to evaluate institutional competence in cyberspace, we can vastly improve the development of cyberspace law and public policy.
Comparative Institutional Analysis in Cyberspace: The Case of Intermediary Liability for Defamation promotes just such an approach. By describing and extending a recently proposed model of comparative …