Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 4 of 4

Full-Text Articles in Law

Lacking Regulated Policy For Dna Evidence, Maia Lister May 2018

Lacking Regulated Policy For Dna Evidence, Maia Lister

Themis: Research Journal of Justice Studies and Forensic Science

Despite its strong presence in criminal justice, DNA analysis is still a minimally regulated area. This minimal regulation devalues DNA evidence through the inconsistencies in these areas. The analysis methods of low template DNA lack a uniform method resulting in varying levels of reliability. Utilizing familial searches to assist in criminal investigations can potentially violate citizen rights. Such violations can also be found in the collection of DNA samples before an arrestee is tried or convicted. There are, however, regulations that could be applied universally to combat the problems that were discussed.


Self Incrimination And Cryptographic Keys, Gregory S. Sergienko Mar 2018

Self Incrimination And Cryptographic Keys, Gregory S. Sergienko

Greg Sergienko

Modern cryptography can make it virtually impossible to decipher documents without the cryptographic key thus making the availability of the contents of those documents depend on the availability of the key. This article examines the Fourth and Fifth Amendments' protection against the compulsory production of the key and the scope of the Fifth Amendment immunity against compelled production. After analyzing these questions using prevailing Fourth and Fifth Amendment jurisprudence, I shall describe the advantages of a privacy-based approach in practical and constitutional terms. [excerpt]


Unlocking The Fifth Amendment: Passwords And Encrypted Devices, Laurent Sacharoff Jan 2018

Unlocking The Fifth Amendment: Passwords And Encrypted Devices, Laurent Sacharoff

Sturm College of Law: Faculty Scholarship

Each year, law enforcement seizes thousands of electronic devices — smartphones, laptops, and notebooks — that it cannot open without the suspect’s password. Without this password, the information on the device sits completely scrambled behind a wall of encryption. Sometimes agents will be able to obtain the information by hacking, discovering copies of data on the cloud, or obtaining the password voluntarily from the suspects themselves. But when they cannot, may the government compel suspects to disclose or enter their password?

This Article considers the Fifth Amendment protection against compelled disclosures of passwords — a question that has split and …


Terry Stops And Frisks: The Troubling Use Of Common Sense In A World Of Empirical Data, David A. Harris, David Rudovsky Jan 2018

Terry Stops And Frisks: The Troubling Use Of Common Sense In A World Of Empirical Data, David A. Harris, David Rudovsky

Articles

The investigative detention doctrine first announced in Terry v. Ohio and amplified over the past fifty years has been much analyzed, praised, and criticized from a number of perspectives. Significantly, however, over this time period commentators have only occasionally questioned the Supreme Court’s “common sense” judgments regarding the factors sufficient to establish reasonable suspicion for stops and frisks. For years, the Court has provided no empirical basis for its judgments, due in large part to the lack of reliable data. Now, with the emergence of comprehensive data on these police practices, much can be learned about the predictive power of …