Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 13 of 13

Full-Text Articles in Law

Ending Drunk Driving With A Flash Of Light, Andrew Sullivan Jan 2015

Ending Drunk Driving With A Flash Of Light, Andrew Sullivan

Richmond Journal of Law & Technology

Drunk driving exacts an enormous toll on our society. Every year, alcohol-driven crashes kill over ten thousand people, injure hundreds of thousands more, and cost the national economy tens of billions of dollars. States largely have been left to combat this problem through their own criminal regimes. Among the methods used to combat drunk driving is mandating a person convicted of driving under the influence/driving while intoxicated3 install an ignition interlock device (“IID”) in her vehicle as a condition of restoring her driving privileges.


Riley V. California: The New Katz Or Chimel?, Adam Lamparello, Charles Maclean Jan 2014

Riley V. California: The New Katz Or Chimel?, Adam Lamparello, Charles Maclean

Richmond Journal of Law & Technology

To declare that in the administration of the criminal law the end justifies the means—to declare that the Government may commit crimes in order to secure the conviction of a private criminal—would bring terrible retribution. Against that pernicious doctrine this Court should resolutely set its face.


Forensic Collection Of Electronic Evidence From Infrastructure-As-A-Service Cloud Computing, Josiah Dykstra, Damien Riehl Jan 2012

Forensic Collection Of Electronic Evidence From Infrastructure-As-A-Service Cloud Computing, Josiah Dykstra, Damien Riehl

Richmond Journal of Law & Technology

As cloud computing becomes ubiquitous, the criminal targeting and criminal use of cloud computing is inevitable and imminent. Similarly, the need for civil forensic analyses of cloud computing has become more prevalent. Forensic investigation of cloud computing matters first requires an understanding of the technology and issues associated with the collection of electronically stored information (“ESI”) in the cloud. The misuse of the broad term “cloud computing” has caused some confusion and misinformation among legal and technology scholars, leading to a muddied and incomplete analysis of cloud-based discovery issues. Cases and academic analyses have dealt primarily with popular online services …


Making The Punishment Fit The (Computer) Crime: Rebooting Notions Of Possession For The Federal Sentencing Of Child Pornography Offenses, Jelani Jefferson Exum Jan 2010

Making The Punishment Fit The (Computer) Crime: Rebooting Notions Of Possession For The Federal Sentencing Of Child Pornography Offenses, Jelani Jefferson Exum

Richmond Journal of Law & Technology

Sexual exploitation of children is a real and disturbing problem. However, when it comes to the sentencing of child pornography possessors, the U.S. federal system has a problem, as well. This Article adds to the current, heated discussion on what is happening in the sentencing of federal child pornography possession offenses, why nobody is satisfied, and how much the Federal Sentencing Guidelines are to blame. At the heart of this Article are the forgotten players in the discussion—computers and the Internet—and their role in changing the realities of child pornography possession. This Article argues that computers and the Internet are …


Sexting And Teenagers: Omg R U Going 2 Jail???, Catherine Arcabascio Jan 2010

Sexting And Teenagers: Omg R U Going 2 Jail???, Catherine Arcabascio

Richmond Journal of Law & Technology

Sexting is a relatively recent practice engaged in by the young, and sometimes not-so-young, and foolish. “Sexting” is “the practice of sending or posting sexually suggestive text messages and images, including nude or semi-nude photographs, via cellular telephones or over the Internet.”


Databases, E-Discovery And Criminal Law, Ken Strutin Jan 2009

Databases, E-Discovery And Criminal Law, Ken Strutin

Richmond Journal of Law & Technology

The enduring value of the Constitution is the fundamental approach to human rights transcending time and technology. The modern complexity and variety of electronically stored information was unknown in the eighteenth century, but the elemental due process concepts forged then can be applied now. At some point, the accumulation of information surpassed the boundaries of living witnesses and paper records. The advent of computers and databases ushered in an entirely new order, giving rise to massive libraries of factual details and powerful investigative tools. But electronically collected information sources are a double-edged sword. Their accuracy and reliability are critical issues …


Introduction: Contains Cover, Table Of Contents, Letter From The Editor, And Masthead, Jessica M. Yoke Jan 2009

Introduction: Contains Cover, Table Of Contents, Letter From The Editor, And Masthead, Jessica M. Yoke

Richmond Journal of Law & Technology

The Richmond Journal of Law and Technology is proud to present the third issue of the 2008–2009 academic school year, which also is our Annual Survey on E-Discovery.


Perfect Enforcement Of Law: When To Limit And When To Use Technology, Christina M. Mulligan Jan 2008

Perfect Enforcement Of Law: When To Limit And When To Use Technology, Christina M. Mulligan

Richmond Journal of Law & Technology

Road safety cameras can photograph your car running red lights. Some bars record information on driver’s licenses to establish that their patrons are old enough to drink. The Recording Industry Association of America (RIAA) uses automated web crawlers to try to find illegal copies of mp3s, and iTunes embeds personal identifying information in the tracks of every song you buy.


Preventing A Modern Panopticon: Law Enforcement Acquisition Of Real-Time Cellular Tracking Data, Steven B. Toeniskoetter Jan 2007

Preventing A Modern Panopticon: Law Enforcement Acquisition Of Real-Time Cellular Tracking Data, Steven B. Toeniskoetter

Richmond Journal of Law & Technology

Nineteenth Century philosopher Jeremy Bentham designed a prison system known as the Panopticon which was arranged in such a way that a single guard could, at any given time, view the activities and whereabouts of any particular prisoner. Bentham designed the prison in such a way that the prisoners could never tell whether they were being watched. Twentieth Century French philosopher Michel Foucault further considered use of the Panopticon as a means of societal control through fear in his seminal book Discipline and Punish: The Birth of the Prison.


Virtually Free From Punishment Until Proven Guilty: The Internet, Web-Cameras And The Compelling Necessity Standard, Michael Clements Jan 2005

Virtually Free From Punishment Until Proven Guilty: The Internet, Web-Cameras And The Compelling Necessity Standard, Michael Clements

Richmond Journal of Law & Technology

Few legal maxims have had greater resonance than the tenet that one is innocent until proven guilty. It is a principle that has been traced back to Roman times, and it entered the American legal lexicon through the United States Supreme Court decision Coffin v. United States. It has even been incorporated in the United Nations’1948 Declaration of Human Rights under article eleven, section one.4


Globe Newspaper Co. V. Commonwealth: An Examination Of The Media’S “Right” To Retest Postconviction Dna Evidence, Emily S. Munro Jan 2003

Globe Newspaper Co. V. Commonwealth: An Examination Of The Media’S “Right” To Retest Postconviction Dna Evidence, Emily S. Munro

Richmond Journal of Law & Technology

In January of 2000, Governor George Ryan of Illinois issued a statewide moratorium on capital punishment, citing among his reasons the fact that more convicted killers had been exonerated than executed since Illinois reinstated the death penalty in 1977. In 2001 Maryland’s governor issued a temporary moratorium on capital punishment, pending the results of a University of Maryland death penalty study. The North Carolina Senate recently approved a bill that would suspend all state executions for two years, after twenty-one North Carolina municipalities passed resolutions favoring a moratorium and two death-row inmates were awarded new trials.


State Cybercrime Legislation In The United States Of America: A Survey, Susan W. Brenner Jan 2001

State Cybercrime Legislation In The United States Of America: A Survey, Susan W. Brenner

Richmond Journal of Law & Technology

In the United States, cybercrimes are the focus of legislation adopted at both the state and federal levels. The U.S. Constitution allocates lawmaking authority between the two levels according to certain principles, one of which is that even when federal jurisdiction to legislate exists, federal legislation is appropriate only when federal intervention is required. And while federal legislative authority can pre-empt the states' ability to legislate in a given area, it rarely does, so it is not unusual for federal criminal laws to overlap with state prohibitions that address essentially the same issues.


State Criminal Laws In Cyberspace: Reconciling Freedom For Users With Effective Law Enforcement, Sean M. Thornton Jan 1997

State Criminal Laws In Cyberspace: Reconciling Freedom For Users With Effective Law Enforcement, Sean M. Thornton

Richmond Journal of Law & Technology

With the proliferation of online activities in recent years, legal thinkers and the criminal justice system have faced new questions concerning the conflict of state criminal laws. These new questions have old answers; the doctrine of constructive presence has established a state's authority to prescribe an out-of-state activity that has in-state effects. Beyond the mechanical application of jurisdictional rules, however, there lie deeper policy questions concerning the fairness of subjecting computer users to multiple, inconsistent bodies of law. Cyberspace exists in all jurisdictions, and in no particular jurisdiction, at once. There is an apparent tension between the free flow of …