Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 11 of 11

Full-Text Articles in Law

Guidelines To Limit Criminal Prosecutions Of Filesharing Services, Benton C. Martin, Jeremiah R. Newhall Oct 2013

Guidelines To Limit Criminal Prosecutions Of Filesharing Services, Benton C. Martin, Jeremiah R. Newhall

Benton C. Martin

This short essay acknowledges certain efficiencies in enforcing copyright law against "secondary" infringers like filesharing services through criminal proceedings, but it proposes guidelines for prosecutors to use in limiting prosecutions against this type of infringer.


The Constitutional Infirmity Of Warrantless Nsa Surveillance: The Abuse Of Presidential Power And The Injury To The Fourth Amendment, Robert M. Bloom, William J. Dunn Oct 2013

The Constitutional Infirmity Of Warrantless Nsa Surveillance: The Abuse Of Presidential Power And The Injury To The Fourth Amendment, Robert M. Bloom, William J. Dunn

Robert Bloom

In recent months, there have been many revelations about the tactics used by the Bush Administration to prosecute their war on terrorism. These stories involve the exploitation of technologies that allow the government, with the cooperation of phone companies and financial institutions, to access phone and financial records. This paper focuses on the revelation and widespread criticism of the Bush Administration’s operation of a warrantless electronic surveillance program to monitor international phone calls and emails that originate or terminate with a United States party. The powerful and secret National Security Agency heads the program and leverages its significant intelligence collection …


Cell Phone Searches In A Digital World: Blurred Lines, New Realities And Fourth Amendment Pluralism, Steven I. Friedland Oct 2013

Cell Phone Searches In A Digital World: Blurred Lines, New Realities And Fourth Amendment Pluralism, Steven I. Friedland

Steven I. Friedland

State and federal courts are split over whether cell phone searches incident to a lawful arrest are permissible under the Fourth Amendment. The Supreme Court has the opportunity to create uniformity by accepting a certiorari petition in a cell phone search incident to arrest case, either United States v. Wurie or Riley v. California. The Court should do so to create an analysis that incorporates sensory enhancing technology, not avoids it, as it has done to date.

The split in case law evidences a central contradiction. Fourth Amendment rules need to be predictable and based on clear guidelines for effective …


U.S. Government Counterterrorism Asset Freezes: Regulatory Seizures In A Digital Age Of Terrorism, Adam S. Wallwork Aug 2013

U.S. Government Counterterrorism Asset Freezes: Regulatory Seizures In A Digital Age Of Terrorism, Adam S. Wallwork

Adam S Wallwork

This Article addresses the question of when, if ever, the Department of the Treasury’s counterterrorism asset freezes against US persons (US citizens, resident aliens, and US-based organizations) violate the Fourth Amendment. It addresses two questions that currently divide the federal courts: (1) whether OFAC blocking orders are seizures subject to the Fourth Amendment and (2) whether the Fourth Amendment’s warrant and probable-cause requirements apply to OFAC counterterrorism blocking orders if these orders are in fact seizures.

My Originalist analysis of OFAC counterterrorism blocking orders draws on evidence of the Framers’ original understanding of “unreasonable . . . seizures,” including the …


Lights, Camera, Arrest: The Stage Is Set For A Federal Resolution Of A Citizen's Right To Record The Police In Public, Taylor R. Robertson Jul 2013

Lights, Camera, Arrest: The Stage Is Set For A Federal Resolution Of A Citizen's Right To Record The Police In Public, Taylor R. Robertson

Taylor R Robertson

Grab your cellphone, press the record button, and amaze your friends!

No advertisement like this exists in real life, of course, because the action is already universally automatic—it needs no encouragement or instruction. But aim the camera at the police and you could be arrested and face up to fifteen years in prison under some eavesdropping or wiretapping laws simply for recording the police in public speaking at volumes audible to any unassisted ear. While wiretapping laws were originally intended to protect citizens from the snooping detective, some states have effectively turned these laws into government protection from the watchful …


The Surveillance Society And The Third-Party Privacy Problem, Shaun Spencer Mar 2013

The Surveillance Society And The Third-Party Privacy Problem, Shaun Spencer

Shaun Spencer

This article examines a question that has become increasingly important in the emerging surveillance society: should the law treat information as private even though others know about it? This is the third-party privacy problem. Part I explores two competing conceptions of privacy: the binary and contextual conceptions. Part II describes two features of the emerging surveillance society that should change the way we address the third-party privacy problem. One feature, “surveillance on demand,” results from exponential increases in data collection and aggregation. The other feature, “uploaded lives,” reflects a revolution in the type and amount of information that we share …


Limits On The Perfect Preventive State, Michael L. Rich Mar 2013

Limits On The Perfect Preventive State, Michael L. Rich

Michael L Rich

Traditional methods of crime prevention—the punishment of the culpable and the preventive restraint of the dangerous—are slowly being supplemented and supplanted by technologies that seek to perfectly prevent crime by making criminal conduct practically impossible. For instance, the federal government is developing in-car technology that would prevent vehicle operation when a driver has a blood alcohol level in excess of the legal limit. Less directly, the anti-circumvention provisions of the Digital Millennium Copyright Act of 2000 try to prevent copyright infringement by eliminating technologies that enable such infringement. Such structural regulation of private conduct is not new, but few scholars …


Defying Dna: Rethinking The Role Of The Jury In An Age Of Scientific Proof Of Innocence, Andrea L. Roth Feb 2013

Defying Dna: Rethinking The Role Of The Jury In An Age Of Scientific Proof Of Innocence, Andrea L. Roth

Andrea L Roth

In 1946, public outrage erupted after a jury ordered Charlie Chaplin to support a child who, according to apparently definitive blood tests, was not his. Half a century later, juries have again defied apparently definitive evidence of innocence, finding criminal defendants guilty based on a confession or eyewitness notwithstanding exculpatory DNA test results. One might expect judges in such cases to direct an acquittal, on grounds that the evidence is legally insufficient because no rational juror could find guilt beyond a reasonable doubt. Yet few if any do. Instead, courts defer to juries when they form an actual belief in …


Contextual Expectations Of Privacy, Andrew Selbst Feb 2013

Contextual Expectations Of Privacy, Andrew Selbst

Andrew Selbst

Fourth Amendment search jurisprudence is nominally based on a “reasonable expectation of privacy,” but actual doctrine is detached from society’s conception of privacy. Courts rely on various binary distinctions: Is a piece of information secret or not? Was the observed conduct inside or outside? While often convenient, none of these binary distinctions can adequately capture the complicated range of ideas encompassed by “privacy.” Privacy theorists have begun to understand that a consideration of social context is essential to a full understanding of privacy. Helen Nissenbaum’s theory of contextual integrity, which characterizes a right to privacy as the preservation of expected …


Criminal Copyright Enforcement Against Filesharing Services, Benton C. Martin, Jeremiah R. Newhall Jan 2013

Criminal Copyright Enforcement Against Filesharing Services, Benton C. Martin, Jeremiah R. Newhall

Benton C. Martin

The high-profile prosecution of the popular online storage website Megaupload for criminal copyright infringement is the latest in a series of recent criminal prosecutions of online filesharing services. But what pushes a legitimate online file-storing business over the edge to criminal enterprise? How might criminal copyright enforcement differ materially from civil enforcement?

This article answers these questions and suggests guidelines for prosecutorial discretion. After a condensed history of criminal copyright law, we explain why "secondary" theories of infringement apply in the criminal, as well as civil, context and why the DMCA "safe harbor" defense is a red herring in criminal …


The Four Factor Test, Susan Freiwald Dec 2012

The Four Factor Test, Susan Freiwald

Susan Freiwald

No abstract provided.