Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 14 of 14

Full-Text Articles in Law

The World Moved On Without Me: Redefining Contraband In A Technology-Driven World For Youth Detained In Washington State, Stephanie A. Lowry Jan 2023

The World Moved On Without Me: Redefining Contraband In A Technology-Driven World For Youth Detained In Washington State, Stephanie A. Lowry

Seattle University Law Review

If you ask a teenager in the United States to show you one of their favorite memories, they will likely show you a picture or video on their cell phone. This is because Americans, especially teenagers, love cell phones. Ninety-seven percent of all Americans own a cell phone according to a continuously updated survey by the Pew Research Center. For teenagers aged thirteen to seventeen, the number is roughly 95%. For eighteen to twenty-nine-year-olds, the number grows to 100%. On average, eight to twelve-year-old’s use roughly five and a half hours of screen media per day, in comparison to thirteen …


Junk Evidence: A Call To Scrutinize Historical Cell Site Location Evidence, Victoria Saxe Nov 2020

Junk Evidence: A Call To Scrutinize Historical Cell Site Location Evidence, Victoria Saxe

The University of New Hampshire Law Review

Historical cell site location information (CSLI) has been offered as objective, scientific location evidence in criminal trials, but is far less precise than the claims it is used to support. Not only is there no way to pinpoint a cellphone’s precise geographic location from historical CSLI, but there are also no known validation or error rates for the methodologies used to collect and analyze this data. A 2019 telecommunications scandal in Denmark revealed gross inadequacies in the cellphone data and software used by law enforcement to analyze this type of evidence. The scandal sent shockwaves through the country’s legal community …


The Noisy "Silent Witness": The Misperception And Misuse Of Criminal Video Evidence, Aaron M. Williams Oct 2019

The Noisy "Silent Witness": The Misperception And Misuse Of Criminal Video Evidence, Aaron M. Williams

Indiana Law Journal

This Note examines recent developments in the research of situational video evidence biases. Part I examines the current and growing body of psychological research into the various situational biases that can affect the reliability of video evidence and the gaps in this research that require further attention from researchers and legal academics. Because these biases do not “operate in a vacuum,” Part I also examines some of the recent and exciting research into the interaction between situational and dispositional biases. Part II examines the development of camera and video processing technology and its limitations as a means of mitigating such …


Hearsay In The Smiley Face: Analyzing The Use Of Emojis As Evidence, Erin Janssen Jun 2018

Hearsay In The Smiley Face: Analyzing The Use Of Emojis As Evidence, Erin Janssen

St. Mary's Law Journal

Abstract forthcoming


Riley And Abandonment: Expanding Fourth Amendment Protection Of Cell Phones, Abigail Hoverman Feb 2017

Riley And Abandonment: Expanding Fourth Amendment Protection Of Cell Phones, Abigail Hoverman

Northwestern University Law Review

In light of the privacy concerns inherent to personal technological devices, the Supreme Court handed down a unanimous decision in 2014 recognizing the need for categorical heightened protection of cell phones during searches incident to arrest in Riley v. California. This Note argues for expansion of heightened protections for cell phones in the context of abandoned evidence because the same privacy concerns apply. This argument matters because state and federal courts have not provided the needed protection to abandoned cell phones pre- or post-Riley.


Network Investigation Techniques: Government Hacking And The Need For Adjustment In The Third-Party Doctrine, Eduardo R. Mendoza Jan 2017

Network Investigation Techniques: Government Hacking And The Need For Adjustment In The Third-Party Doctrine, Eduardo R. Mendoza

St. Mary's Law Journal

Modern society is largely dependent on technology, and legal discovery is no longer limited to hard-copy, tangible documents. The clash of technology and the law is an exciting, yet dangerous phenomena; dangerous because our justice system desperately needs technological progress. The clash between scientific advancement and the search for truth has recently taken an interesting form—government hacking. The United States Government has increasingly used Network Investigation Techniques (NITs) to target suspects in criminal investigations. NITs operate by identifying suspects who have taken affirmative steps to conceal their identity while browsing the Internet. The hacking technique has become especially useful to …


Introduction, Miriam F. Miquelon-Weismann Dec 2014

Introduction, Miriam F. Miquelon-Weismann

University of Massachusetts Law Review

Legal educators increasingly use the classroom to import expertise from scientists and social scientists to better prepare law students to engage in specialized and collaborative fields of practice. Indeed, this project grew out of a paper course on Scientific Evidence in Civil and Criminal Cases offered during the spring 2006 semester at the law school. Students heard from accident reconstruction experts, DNA scientists, forensic pathologist and medical malpractice experts. In February 2006, Dr. Aaron Lazare, Dean and Chancellor at the University of Massachusetts, addressed the law school on a cutting-edge legal theory from his recently published book, “On Apology.” Stimulated …


Search Method In E-Discovery: How Rule 26'S Silence Poses A Risk Of Sanctions To Attorneys And Increases The Cost Of Litigation, Khanh T. Huynh Mar 2014

Search Method In E-Discovery: How Rule 26'S Silence Poses A Risk Of Sanctions To Attorneys And Increases The Cost Of Litigation, Khanh T. Huynh

University of Massachusetts Law Review

The 2006 Amendments to the Federal Rules of Civil Procedure are the first codified references in the FRCP to electronic discovery. However, the lack of comprehensive rules in this area provides opportunities for attorneys to leverage search terms as a weapon, primarily to wear out opponents financially. Disagreement on search terms used to produce documents can prolong litigation. Complicated Boolearn search tems can be difficult to run. Other search methods, such as natural language search, cannot provide efficient and accurate results. The cost to run complicated searches is high, and the lack of rules addressing search terms in the FRCP …


The Discoverability Of E-Mails: The Smoking Gun Of The Modern Era, Michael J. Martin Mar 2014

The Discoverability Of E-Mails: The Smoking Gun Of The Modern Era, Michael J. Martin

University of Massachusetts Law Review

The discoverability of e-mails is an area of law that every modern day lawyer must be familiar with in order to avoid the risk of being sanctioned. Over the past years, courts have awarded sanctions to moving parties at a steadily increasing pace. These sanctions have included adverse jury instructions, default judgements, attorney's fees, large monetary fines, and in one instance, a jail sentence. Courts have sent the message that improper conduct will not be tolerated in this developing area of law by not hesitating to order sanctions. Thus, it is essential that modern day lawyers become acquainted with the …


Wilson V. Layne: Increasing The Scope Of The Fourth Amendment Right To Privacy, Ashlea Wright Jul 2012

Wilson V. Layne: Increasing The Scope Of The Fourth Amendment Right To Privacy, Ashlea Wright

Pepperdine Law Review

No abstract provided.


The Return Of “Voodoo Information”: A Call To Resist A Heightened Authentication Standard For Evidence Derived From Social Networking Websites, Richard Fox Jan 2012

The Return Of “Voodoo Information”: A Call To Resist A Heightened Authentication Standard For Evidence Derived From Social Networking Websites, Richard Fox

Catholic University Law Review

No abstract provided.


"False But Highly Persuasive": How Wrong Were The Probability Estimates In Mcdaniel V. Brown?, David H. Kaye Jan 2009

"False But Highly Persuasive": How Wrong Were The Probability Estimates In Mcdaniel V. Brown?, David H. Kaye

Michigan Law Review First Impressions

In McDaniel v. Brown, the Supreme Court will review the use of DNA evidence in a 1994 trial for sexual assault and attempted murder. The Court granted certiorari to consider two procedural issues—the standard of federal postconviction review of a state jury verdict for sufficiency of the evidence, and the district court's decision to allow the prisoner to supplement the record of trials, appeals, and state postconviction proceedings with a geneticist's letter twelve years after the trial. The letter from Laurence Mueller, a professor at the University of California at Irvine, identified two obvious mistakes in the state's expert testimony. …


Life Sciences, Technology, And The Law - Symosium Transcript - March 7, 2003, Philip R. Reilly, David H. Kaye, Jonathan J. Koehler, Richard O. Lempert Oct 2003

Life Sciences, Technology, And The Law - Symosium Transcript - March 7, 2003, Philip R. Reilly, David H. Kaye, Jonathan J. Koehler, Richard O. Lempert

Michigan Telecommunications & Technology Law Review

Life sciences, Technology, and the Law Symposium held at the University of Michigan Law School Friday, March 7, 2003


Computer Searches And Seizures: Some Unresolved Issues, Susan W. Brenner, Barbara A. Frederiksen Jun 2002

Computer Searches And Seizures: Some Unresolved Issues, Susan W. Brenner, Barbara A. Frederiksen

Michigan Telecommunications & Technology Law Review

The goal of this article is to illustrate the issues that arise in the context of computer search and seizures by examining several areas in which the application of Fourth Amendment concepts to computer searches and/or seizures can be problematic. In order to illustrate this point, the article will build on a hypothetical. The hypothetical situation assumes law enforcement officers have lawfully obtained a warrant to search for and seize evidence concerning the commission of one or more crimes. It will also be assumed that computer technology played some role in the commission of these crimes, so computer equipment and …