Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Law

Journal

2017

Institution
Keyword
Publication
File Type

Articles 121 - 123 of 123

Full-Text Articles in Law

Network Investigation Techniques: Government Hacking And The Need For Adjustment In The Third-Party Doctrine, Eduardo R. Mendoza Jan 2017

Network Investigation Techniques: Government Hacking And The Need For Adjustment In The Third-Party Doctrine, Eduardo R. Mendoza

St. Mary's Law Journal

Modern society is largely dependent on technology, and legal discovery is no longer limited to hard-copy, tangible documents. The clash of technology and the law is an exciting, yet dangerous phenomena; dangerous because our justice system desperately needs technological progress. The clash between scientific advancement and the search for truth has recently taken an interesting form—government hacking. The United States Government has increasingly used Network Investigation Techniques (NITs) to target suspects in criminal investigations. NITs operate by identifying suspects who have taken affirmative steps to conceal their identity while browsing the Internet. The hacking technique has become especially useful to …


The Dark Side Of Social Media Romance: Civil Recourse For Catfish Victims, Armida Derzakarian Jan 2017

The Dark Side Of Social Media Romance: Civil Recourse For Catfish Victims, Armida Derzakarian

Loyola of Los Angeles Law Review

No abstract provided.


The Chaos Of The Cfaa: Facebook's Successful Cfaa Claim Affects Website Owners, Competitors, And You, Breana Love Jan 2017

The Chaos Of The Cfaa: Facebook's Successful Cfaa Claim Affects Website Owners, Competitors, And You, Breana Love

Loyola of Los Angeles Law Review

No abstract provided.