Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 3 of 3

Full-Text Articles in Law

Fourth Amendment Stops, Arrests And Searches In The Context Of Qualified Immunity, Erwin Chemerinsky, Karen M. Blum Jun 2017

Fourth Amendment Stops, Arrests And Searches In The Context Of Qualified Immunity, Erwin Chemerinsky, Karen M. Blum

Erwin Chemerinsky

No abstract provided.


The Miranda Case Fifty Years Later, Yale Kamisar May 2017

The Miranda Case Fifty Years Later, Yale Kamisar

Articles

A decade after the Supreme Court decided Miranda v. Arizona, Geoffrey Stone took a close look at the eleven decisions the Court had handed down “concerning the scope and application of Miranda.” As Stone observed, “[i]n ten of these cases, the Court interpreted Miranda so as not to exclude the challenged evidence.” In the eleventh case, the Court excluded the evidence on other grounds. Thus, Stone noted, ten years after the Court decided the case, “the Court ha[d] not held a single item of evidence inadmissible on the authority of Miranda.” Not a single item. To use …


Network Investigation Techniques: Government Hacking And The Need For Adjustment In The Third-Party Doctrine, Eduardo R. Mendoza Jan 2017

Network Investigation Techniques: Government Hacking And The Need For Adjustment In The Third-Party Doctrine, Eduardo R. Mendoza

St. Mary's Law Journal

Modern society is largely dependent on technology, and legal discovery is no longer limited to hard-copy, tangible documents. The clash of technology and the law is an exciting, yet dangerous phenomena; dangerous because our justice system desperately needs technological progress. The clash between scientific advancement and the search for truth has recently taken an interesting form—government hacking. The United States Government has increasingly used Network Investigation Techniques (NITs) to target suspects in criminal investigations. NITs operate by identifying suspects who have taken affirmative steps to conceal their identity while browsing the Internet. The hacking technique has become especially useful to …