Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 3 of 3
Full-Text Articles in Law
Revenge Porn, Thomas Lonardo, Tricia P. Martland, Rhode Island Bar Journal
Revenge Porn, Thomas Lonardo, Tricia P. Martland, Rhode Island Bar Journal
Life of the Law School (1993- )
No abstract provided.
The Leaky Leviathan: Why The Government Condemns And Condones Unlawful Disclosures Of Information, David E. Pozen
The Leaky Leviathan: Why The Government Condemns And Condones Unlawful Disclosures Of Information, David E. Pozen
Faculty Scholarship
The United States government leaks like a sieve. Presidents denounce the constant flow of classified information to the media from unauthorized, anonymous sources. National security professionals decry the consequences. And yet the laws against leaking are almost never enforced. Throughout U.S. history, roughly a dozen criminal cases have been brought against suspected leakers. There is a dramatic disconnect between the way our laws and our leaders condemn leaking in the abstract and the way they condone it in practice.
This Article challenges the standard account of that disconnect, which emphasizes the difficulties of apprehending and prosecuting offenders, and advances an …
Cyberlaundering: The Risks, The Responses, Sarah N. Welling, Andy G. Rickman
Cyberlaundering: The Risks, The Responses, Sarah N. Welling, Andy G. Rickman
Law Faculty Scholarly Articles
This Article discusses the potential use of electronic cash for money laundering and possible government responses to the problem. Parts I and II provide an overview of electronic cash. Part III explores the effects that electronic cash can have on money laundering. Part IV explains through a series of hypotheticals how "cyberlaundering" can occur. Part V analyzes the federal government's response to the threat of money laundering with electronic cash. Part VI concludes the Article with suggestions.