Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Embry-Riddle Aeronautical University (473)
- University of Michigan Law School (11)
- San Jose State University (10)
- Duke Law (4)
- City University of New York (CUNY) (3)
-
- Montclair State University (3)
- Selected Works (3)
- University of Nebraska - Lincoln (3)
- Old Dominion University (2)
- Penn State Dickinson Law (2)
- Penn State Law (2)
- University of New Hampshire (2)
- University of Pennsylvania Carey Law School (2)
- University of South Florida (2)
- American University Washington College of Law (1)
- California State University, San Bernardino (1)
- Concordia University St. Paul (1)
- Dakota State University (1)
- Duquesne University (1)
- Georgia Southern University (1)
- Georgia State University College of Law (1)
- La Salle University (1)
- Liberty University (1)
- Nova Southeastern University (1)
- South Dakota State University (1)
- University at Albany, State University of New York (1)
- University of Louisville (1)
- University of Mississippi (1)
- West Virginia University (1)
- William & Mary Law School (1)
- Keyword
-
- Digital forensics (32)
- Computer forensics (17)
- Digital Forensics (15)
- Forensics (14)
- Digital evidence (13)
-
- Computer Forensics (9)
- Privacy (8)
- Data recovery (6)
- Evidence (6)
- Forensic science (6)
- Information security (6)
- Admissibility (5)
- Cyber crime (5)
- Cyber forensics (5)
- DNA profiling (5)
- Data disposal (5)
- Disk analysis (5)
- Forensic (5)
- Investigation (5)
- Visualization (5)
- Cyber security (4)
- Cybercrime (4)
- Daubert (4)
- Digital Examiner (4)
- Mobile device forensics (4)
- Private Investigator (4)
- State Statutes (4)
- VoIP (4)
- Approximate matching (3)
- Clustering (3)
- Publication Year
- Publication
-
- Journal of Digital Forensics, Security and Law (292)
- Annual ADFSL Conference on Digital Forensics, Security and Law (180)
- Themis: Research Journal of Justice Studies and Forensic Science (10)
- Articles (9)
- Faculty Scholarship (4)
-
- Department of Justice Studies Faculty Scholarship and Creative Works (3)
- Student Theses (3)
- All Faculty Scholarship (2)
- Department of Statistics: Faculty Publications (2)
- Dickinson Law Review (2017-Present) (2)
- Genocide Studies and Prevention: An International Journal (2)
- Journal Articles (2)
- Book Chapters (1)
- Cybersecurity Undergraduate Research Showcase (1)
- David Kaye (1)
- Economic Crime Forensics Capstones (1)
- Electronic Theses and Dissertations (1)
- Electronic Theses, Projects, and Dissertations (1)
- Engineering Management & Systems Engineering Faculty Publications (1)
- Faculty Publications By Year (1)
- Graduate Student Research Symposium (1)
- Helm's School of Government Conference - American Revival: Citizenship & Virtue (1)
- Honors Theses (1)
- International Bulletin of Political Psychology (1)
- Jessica Gabel Cino (1)
- Jessica S. Henry (1)
- Joint PIJIP/TLS Research Paper Series (1)
- Law Faculty Scholarship (1)
- Master of Arts in Criminal Justice Leadership (1)
- Masters Theses & Doctoral Dissertations (1)
- Publication Type
- File Type
Articles 1 - 30 of 538
Full-Text Articles in Law
Influences Of Social Media, Samuel Whatley Ii
Influences Of Social Media, Samuel Whatley Ii
Helm's School of Government Conference - American Revival: Citizenship & Virtue
The Internet is a double-edged sword because it provides easy access to information of both good and bad intentions. Censorship justifications under whoever deems something misinformation, provide little oversight on being a neutral public forum. For instance, the influence of elections by not covering a story and censoring opposing views does not promote the notion of being a neutral public forum. Artificial intelligence being applied to many technological applications have fueled the censorship machine. In some instances, artificial intelligence can generate stories to media sites (i.e., ChatGPT) with no verification of the details. From science fiction to science reality, taking …
Understandings Of Vulnerability And Social Determinants Of Health In Forensic And Expert Social Anthropology: A Scoping Review, James W. W. Rose, David M. Tran
Understandings Of Vulnerability And Social Determinants Of Health In Forensic And Expert Social Anthropology: A Scoping Review, James W. W. Rose, David M. Tran
The Qualitative Report
Forensic and expert social anthropology (FESA) is a branch of social anthropology that specialises in the provision of evidence to legal-administrative processes, which are overseen by courts and other legally empowered bodies, and which give regard to the social cultures of legally and administratively involved individuals and communities (LAIICs). Despite a preoccupation with political advocacy in the broader philosophy of social anthropology, FESA literature does not typically give regard to LAIIC vulnerability defined qualitatively in terms of social determinants of health, including physical, mental, and social well-being. This paper presents findings from a JBI/PRISMA-ScR scoping review of n=1,674 texts, identifying …
Who Owns Children’S Dna?, Nila Bala
Who Owns Children’S Dna?, Nila Bala
Michigan Law Review
In recent years, DNA has become increasingly easy to collect, test, and sequence, making it far more accessible to law enforcement. While legal scholars have examined this phenomenon generally, this Article examines the control and use of children’s DNA, asking who ultimately owns children’s DNA. I explore two common ways parents—currently considered “owners” of children’s DNA— might turn over children’s DNA to law enforcement: (1) “consensual” searches and (2) direct-to-consumer testing. My fundamental thesis is that parental consent is an insufficient safeguard to protect a child’s DNA from law enforcement. At present, the law leaves parents in complete control of …
Dna Analysis: The Answer For Unsolved Cases?, Sarah Hetchler
Dna Analysis: The Answer For Unsolved Cases?, Sarah Hetchler
Master of Arts in Criminal Justice Leadership
DNA analysis has become a crucial part of solving cases. It has developed significantly since its creation in the mid-1980s. The longing for answers within unsolved cases is historically lengthy, leaving traces of distrust and injustice. Criminologists offer a potential solution to the mess created by connecting DNA analysis to protect victims and communities. DNA evidence and analysis can assist in solving cases and provide answers for exonerees. Like public genealogy websites, law enforcement agencies must acknowledge new methods to solve issues. Not only could law enforcement agencies solve and arrest suspects through DNA analysis, but DNA could also provide …
Some Legal And Practical Challenges In The Investigation Of Cybercrime, Ritz Carr
Some Legal And Practical Challenges In The Investigation Of Cybercrime, Ritz Carr
Cybersecurity Undergraduate Research Showcase
According to the Internet Crime Complaint Center (IC3), in 2021, the United States lost around $6.9 billion to cybercrime. In 2022, that number grew to over $10.2 billion (IC3, 2022). In one of many efforts to combat cybercrimes, at least 40 states “introduced or considered more than 250 bills or resolutions that deal significantly with cybersecurity” with 24 states officially enacting a total of 41 bills (National Conference on State Legislatures, 2022).
The world of cybercrime evolves each day. Nevertheless, challenges arise when we investigate and prosecute cybercrime, which will be examined in the following collection of essays that highlight …
Reply To Response By Fbi Laboratory Filed In Illinois V. Winfield And Affidavit By Biederman Et Al. (2022) Filed In Us V. Kaevon Sutton (2018 Cf1 009709), Susan Vanderplas, Kori Khan, Heike Hofmann, Alicia Carriquiry
Reply To Response By Fbi Laboratory Filed In Illinois V. Winfield And Affidavit By Biederman Et Al. (2022) Filed In Us V. Kaevon Sutton (2018 Cf1 009709), Susan Vanderplas, Kori Khan, Heike Hofmann, Alicia Carriquiry
Department of Statistics: Faculty Publications
1 Preliminaries
1.1 Scope
The aim of this document is to respond to issues raised in Federal Bureau of Investigation1 and Alex Biedermann, Bruce Budowle & Christophe Champod.2
1.2 Conflict of Interest
We are statisticians employed at public institutions of higher education (Iowa State University and University of Nebraska, Lincoln) and have not been paid for our time or expertise when preparing either this response or the original affidavit.3 We provide this information as a public service and as scientists and researchers in this area.
1.3 Organization
The rest of the document precedes as follows: we begin …
Firearms And Toolmark Error Rates, Susan Vanderplas, Kori Khan, Heike Hofmann, Alicia L. Carriquiry
Firearms And Toolmark Error Rates, Susan Vanderplas, Kori Khan, Heike Hofmann, Alicia L. Carriquiry
Department of Statistics: Faculty Publications
We have outlined several problems with the state of error rate studies on firearm and toolmark examination. Fundamentally, we do not know what the error rate is for these types of comparisons. This is a failure of the scientific study of toolmarks, rather than the examiners themselves, but until this is corrected with multiple studies that meet the criteria described in Section 3, we cannot support the use of this evidence in criminal proceedings.
Anatomy Of An Internet Hijack And Interception Attack: A Global And Educational Perspective, Ben A. Scott, Michael N. Johnstone, Patryk Szewczyk
Anatomy Of An Internet Hijack And Interception Attack: A Global And Educational Perspective, Ben A. Scott, Michael N. Johnstone, Patryk Szewczyk
Annual ADFSL Conference on Digital Forensics, Security and Law
The Internet’s underlying vulnerable protocol infrastructure is a rich target for cyber crime, cyber espionage and cyber warfare operations. The stability and security of the Internet infrastructure are important to the function of global matters of state, critical infrastructure, global e-commerce and election systems. There are global approaches to tackle Internet security challenges that include governance, law, educational and technical perspectives. This paper reviews a number of approaches to these challenges, the increasingly surgical attacks that target the underlying vulnerable protocol infrastructure of the Internet, and the extant cyber security education curricula; we find the majority of predominant cyber security …
A Low-Cost Machine Learning Based Network Intrusion Detection System With Data Privacy Preservation, Jyoti Fakirah, Lauhim Mahfuz Zishan, Roshni Mooruth, Michael L. Johnstone, Wencheng Yang
A Low-Cost Machine Learning Based Network Intrusion Detection System With Data Privacy Preservation, Jyoti Fakirah, Lauhim Mahfuz Zishan, Roshni Mooruth, Michael L. Johnstone, Wencheng Yang
Annual ADFSL Conference on Digital Forensics, Security and Law
Network intrusion is a well-studied area of cyber security. Current machine learning-based network intrusion detection systems (NIDSs) monitor network data and the patterns within those data but at the cost of presenting significant issues in terms of privacy violations which may threaten end-user privacy. Therefore, to mitigate risk and preserve a balance between security and privacy, it is imperative to protect user privacy with respect to intrusion data. Moreover, cost is a driver of a machine learning-based NIDS because such systems are increasingly being deployed on resource-limited edge devices. To solve these issues, in this paper we propose a NIDS …
Detection Of Overlapping Passive Manipulation Techniques In Image Forensics, Gianna S. Lint, Umit Karabiyik
Detection Of Overlapping Passive Manipulation Techniques In Image Forensics, Gianna S. Lint, Umit Karabiyik
Annual ADFSL Conference on Digital Forensics, Security and Law
With a growing number of images uploaded daily to social media sites, it is essential to understand if an image can be used to trace its origin. Forensic investigations are focusing on analyzing images that are uploaded to social media sites resulting in an emphasis on building and validating tools. There has been a strong focus on understanding active manipulation or tampering techniques and building tools for analysis. However, research on manipulation is often studied in a vacuum, involving only one technique at a time. Additionally, less focus has been placed on passive manipulation, which can occur by simply uploading …
Human-Controlled Fuzzing With Afl, Maxim Grishin, Igor Korkin, Phd
Human-Controlled Fuzzing With Afl, Maxim Grishin, Igor Korkin, Phd
Annual ADFSL Conference on Digital Forensics, Security and Law
Fuzzing techniques are applied to reveal different types of bugs and vulnerabilities. American Fuzzy Lop (AFL) is a free most popular software fuzzer used by many other fuzzing frameworks. AFL supports autonomous mode of operation that uses the previous step output into the next step, as a result fuzzer spends a lot of time analyzing minor code sections. By making fuzzing process more focused and human controlled security expert can save time and find more bugs in less time. We designed a new module that can fuzz only the specified functions. As a result, the chosen ones will be inspected …
The Amorphous Nature Of Hackers: An Exploratory Study, Kento Yasuhara, Daniel Walnycky, Ibrahim Baggili, Ahmed Alhishwan
The Amorphous Nature Of Hackers: An Exploratory Study, Kento Yasuhara, Daniel Walnycky, Ibrahim Baggili, Ahmed Alhishwan
Annual ADFSL Conference on Digital Forensics, Security and Law
In this work, we aim to better understand outsider perspectives of the hacker community through a series of situation based survey questions. By doing this, we hope to gain insight into the overall reputation of hackers from participants in a wide range of technical and non-technical backgrounds. This is important to digital forensics since convicted hackers will be tried by people, each with their own perception of who hackers are. Do cyber crimes and national security issues negatively affect people’s perceptions of hackers? Does hacktivism and information warfare positively affect people’s perception of hackers? Do individual personality factors affect one’s …
Smart Home Forensics: Identifying Ddos Attack Patterns On Iot Devices, Samuel Ho, Hope Greeson, Umit Karabiyik
Smart Home Forensics: Identifying Ddos Attack Patterns On Iot Devices, Samuel Ho, Hope Greeson, Umit Karabiyik
Annual ADFSL Conference on Digital Forensics, Security and Law
Smart homes are becoming more common as more people integrate IoT devices into their home environment. As such, these devices have access to personal data on their homeowners’ networks. One of the advantages of IoT devices is that they are compact. However, this limits the incorporation of security measures in their hardware. Misconfigured IoT devices are commonly the target of malicious attacks. Additionally, distributed denial-of-service attacks are becoming more common due to applications and software that provides users with easy-to-use user interfaces. Since one vulnerable device is all an attacker needs to launch an attack on a network, in regards …
Digital Forensics For Mobility As A Service Platform: Analysis Of Uber Application On Iphone And Cloud, Nina Matulis, Umit Karabiyik
Digital Forensics For Mobility As A Service Platform: Analysis Of Uber Application On Iphone And Cloud, Nina Matulis, Umit Karabiyik
Annual ADFSL Conference on Digital Forensics, Security and Law
Uber is a ride-hailing smartphone application (app) that allows users to order a ride in a highly efficient manner. The Uber app provides Mobility as a Service and allows users to easily order a ride in a private car with just a few clicks. Uber stores large amounts of data on both the mobile device the app is being used on, and in the cloud. Examples of this data include geolocation data, date/time, origin/destination addresses, departure/arrival times, and distance. Uber geolocation data has been previously researched to investigate the privacy of the Uber app; however, there is minimal research relating …
Microsoft Defender Will Be Defended: Memoryranger Prevents Blinding Windows Av, Denis Pogonin, Igor Korkin, Phd
Microsoft Defender Will Be Defended: Memoryranger Prevents Blinding Windows Av, Denis Pogonin, Igor Korkin, Phd
Annual ADFSL Conference on Digital Forensics, Security and Law
Windows OS is facing a huge rise in kernel attacks. An overview of popular techniques that result in loading kernel drivers will be presented. One of the key targets of modern threats is disabling and blinding Microsoft Defender, a default Windows AV. The analysis of recent driver-based attacks will be given, the challenge is to block them. The survey of user- and kernel-level attacks on Microsoft Defender will be given. One of the recently published attackers’ techniques abuses Mandatory Integrity Control (MIC) and Security Reference Monitor (SRM) by modifying Integrity Level and Debug Privileges for the Microsoft Defender via syscalls. …
A Lightweight Reliably Quantified Deepfake Detection Approach, Tianyi Wang, Kam Pui Chow
A Lightweight Reliably Quantified Deepfake Detection Approach, Tianyi Wang, Kam Pui Chow
Annual ADFSL Conference on Digital Forensics, Security and Law
Deepfake has brought huge threats to society such that everyone can become a potential victim. Current Deepfake detection approaches have unsatisfactory performance in either accuracy or efficiency. Meanwhile, most models are only evaluated on different benchmark test datasets with different accuracies, which could not imitate the real-life Deepfake unknown population. As Deepfake cases have already been raised and brought challenges at the court, it is disappointed that no existing work has studied the model reliability and attempted to make the detection model act as the evidence at the court. We propose a lightweight Deepfake detection deep learning approach using the …
Timestamp Estimation From Outdoor Scenes, Tawfiq Salem, Jisoo Hwang, Rafael Padilha
Timestamp Estimation From Outdoor Scenes, Tawfiq Salem, Jisoo Hwang, Rafael Padilha
Annual ADFSL Conference on Digital Forensics, Security and Law
The increasing availability of smartphones allowed people to easily capture and share images on the internet. These images are often associated with metadata, including the image capture time (timestamp) and the location where the image was captured (geolocation). The metadata associated with images provides valuable information to better understand scenes and events presented in these images. The timestamp can be manipulated intentionally to provide false information to convey a twisted version of reality. Images with manipulated timestamps are often used as a cover-up for wrongdoing or broadcasting false claims and competing views on the internet. Estimating the time of capture …
Deepfakes, Shallowfakes, And The Need For A Private Right Of Action, Eric Kocsis
Deepfakes, Shallowfakes, And The Need For A Private Right Of Action, Eric Kocsis
Dickinson Law Review (2017-Present)
For nearly as long as there have been photographs and videos, people have been editing and manipulating them to make them appear to be something they are not. Usually edited or manipulated photographs are relatively easy to detect, but those days are numbered. Technology has no morality; as it advances, so do the ways it can be misused. The lack of morality is no clearer than with deepfake technology.
People create deepfakes by inputting data sets, most often pictures or videos into a computer. A series of neural networks attempt to mimic the original data set until they are nearly …
Forensic Science In Legal Education, Brandon L. Garrett, Glinda S. Cooper, Quinn Beckham
Forensic Science In Legal Education, Brandon L. Garrett, Glinda S. Cooper, Quinn Beckham
Faculty Scholarship
In criminal cases, forensic science reports and expert testimony play an increasingly important role in adjudication. More states now follow a federal reliability standard, following Daubert v. Merrell Dow Pharmaceuticals and Rule 702, which calls upon judges to assess the reliability and validity of such scientific evidence. Little is known about what education law schools provide regarding forensic and scientific evidence or what types of specialized training they receive on scientific methods or evidence. Whether law schools have added forensic science courses to their curricula in recent years was not known. To better understand the answers to those questions, in …
Evaluating A Test For Shedding Propensity Using Tape Lifts From Different Skin Locations, Xiao M. Chen
Evaluating A Test For Shedding Propensity Using Tape Lifts From Different Skin Locations, Xiao M. Chen
Student Theses
The shedding propensity of a person can assist data interpretation in casework when assessing the possibility of passive transfer for DNA analysis. Past studies on shedding propensity evaluated palmar skin (washed and unwashed) deposits. This study compared different skin locations with respect to shedding propensity, and explored the potential of tape-lifts as a skin surface collection method. Eight different skin types and samples were collected with adhesive tape disks from 28 participants over three non-consecutive days; the washed and unwashed fingers from both hands, toe, and arm, neck below ear, and nape. Samples were extracted, quantified, amplified, genotyped, and evaluated …
Increasing Accountability For Rape In Liberia: The Need For A Forensic System To Increase The Success Rates Of Prosecution, Pela Boker Wilson
Increasing Accountability For Rape In Liberia: The Need For A Forensic System To Increase The Success Rates Of Prosecution, Pela Boker Wilson
William & Mary Journal of Race, Gender, and Social Justice
The need for a fully functioning forensic system has been identified by the Liberian government and international partners, but it has not been addressed. This Article argues that despite a robust framework put in place to create accountability for rape, Liberia needs a system of collecting and processing forensic evidence to increase the success rate of prosecutions that currently fail due to the inadequacy of non-forensic evidence.
The Absence Or Misuse Of Statistics In Forensic Science As A Contributor To Wrongful Convictions: From Pattern Matching To Medical Opinions About Child Abuse, Keith A. Findley
The Absence Or Misuse Of Statistics In Forensic Science As A Contributor To Wrongful Convictions: From Pattern Matching To Medical Opinions About Child Abuse, Keith A. Findley
Dickinson Law Review (2017-Present)
The new scrutiny that has been applied to the forensic sciences since the emergence of DNA profiling as the gold standard three decades ago has identified numerous concerns about the absence of a solid scientific footing for most disciplines. This article examines one of the lesser-considered problems that afflicts virtually all of the pattern-matching (or “individualization”) disciplines (largely apart from DNA), and even undermines the validity of other forensic disciplines like forensic pathology and medical determinations about child abuse, particularly Shaken Baby Syndrome/Abusive Head Trauma (SBS/AHT). That problem is the absence or misuse of statistics. This article begins by applying …
Pornography: Social, Emotional And Mental Implications Among Adolescents, William Kelly Canady
Pornography: Social, Emotional And Mental Implications Among Adolescents, William Kelly Canady
National Youth Advocacy and Resilience Conference
This presentation will explain the historical development of pornography. It will highlight four segments: 1- Porn’s impact on brain development of reward pathways, ultimately increasing the appetite for more porn. 2- Porn can be a false substitute for real intimacy, resulting in decreased sexual satisfaction with a real person and increased verbal and physical aggression. 3- Porn promotes sex trafficking, promotes multiple sex partners and reduced STD prevention. 4- A review of interventions available to assist clients in navigating a lifestyle away from pornography.
I Am Not Your Felon: Decoding The Trauma, Resilience, And Recovering Mothering Of Formerly Incarcerated Black Women, Jason M. Williams, Zoe Spencer, Sean K. Wilson
I Am Not Your Felon: Decoding The Trauma, Resilience, And Recovering Mothering Of Formerly Incarcerated Black Women, Jason M. Williams, Zoe Spencer, Sean K. Wilson
Department of Justice Studies Faculty Scholarship and Creative Works
Black women are increasingly targets of mass incarceration and reentry. Black feminist writers call attention to scholars’ need to intersectionalize analyses around how Black women interface with state systems and social institutions. This study foregrounds narratives from Black women to understand their plight while navigating reentry through a phenomenological approach. Through semi-structured interviews, narratives are analyzed using critical frameworks that authentically unearths the lived realities of participants. Themes reveal that for Black mothers, reentry can be just as criminalizing as engaging crime itself. These women face dire consequences around their mothering that induce them into tremendous bouts of trauma. Existing …
Towards Increasing Trust In Expert Evidence Derived From Malware Forensic Tools, Ian M. Kennedy, Blaine Price, Arosha Bandara
Towards Increasing Trust In Expert Evidence Derived From Malware Forensic Tools, Ian M. Kennedy, Blaine Price, Arosha Bandara
Journal of Digital Forensics, Security and Law
Following a series of high profile miscarriages of justice in the UK linked to questionable expert evidence, the post of the Forensic Science Regulator was created in 2008. The main objective of this role is to improve the standard of practitioner competences and forensic procedures. One of the key strategies deployed to achieve this is the push to incorporate a greater level of scientific conduct in the various fields of forensic practice. Currently there is no statutory requirement for practitioners to become accredited to continue working with the Criminal Justice System of England and Wales. However, the Forensic Science Regulator …
The Law And Policy Of Client-Side Scanning (Originally Published By Lawfare), Paul Rosenzweig
The Law And Policy Of Client-Side Scanning (Originally Published By Lawfare), Paul Rosenzweig
Joint PIJIP/TLS Research Paper Series
No abstract provided.
Analyses Of Prosecutorial Power And Discretion In Mississippi: Evaluating Proposals To Address Misconduct And Abuse, Lucy Pruitt
Analyses Of Prosecutorial Power And Discretion In Mississippi: Evaluating Proposals To Address Misconduct And Abuse, Lucy Pruitt
Honors Theses
This thesis seeks to create a policy proposal in order to address incidences of prosecutorial misconduct and abuse of discretion in the Mississippi criminal justice system. To do so, the author has summarized and analyzed seven criminal cases in which defendants have become victims of prosecutorial misconduct in order to shed light on the lack of prosecutorial accountability in the state’s criminal justice system. In an attempt to solve the problem, the author has developed a novel grading rubric in order to objectively and systematically analyze and evaluate previously proposed policy recommendations by legal experts and justice organizations. The successes …
Digital Forensic Readiness: An Examination Of Law Enforcement Agencies In The State Of Maryland, James B. Mcnicholas Iii
Digital Forensic Readiness: An Examination Of Law Enforcement Agencies In The State Of Maryland, James B. Mcnicholas Iii
Masters Theses & Doctoral Dissertations
Digital forensic readiness within the law enforcement community, especially at the local level, has gone mostly unexplored. As a result, a current lack of data exists that examines the digital forensic readiness of individual agencies, the possibility of proximity relationships, and correlations between readiness and backlogs. This quantitative, crosssectional research study sought to explore these issues by focusing on the state of Maryland. The study resulted in the creation of a digital forensic readiness scoring model that was then used to assign digital forensic readiness scores to thirty (30) of the one-hundred-forty-one (141) law enforcement agencies throughout Maryland. It was …
From The Legal Literature: Automating Police, Francesca Laguardia
From The Legal Literature: Automating Police, Francesca Laguardia
Department of Justice Studies Faculty Scholarship and Creative Works
No abstract provided.
The Costs And Benefits Of Forensics, Brandon L. Garrett
The Costs And Benefits Of Forensics, Brandon L. Garrett
Faculty Scholarship
Supreme Court Justice Louis Brandeis famously wrote that states can be laboratories for experimentation in law and policy. Disappointingly, however, the actual laboratories that states and local governments run are not a home for experimentation. We do not have adequate information about either the costs or the benefits of forensic testing or allocation of resources. Increased spending and expansion of crime laboratories has perversely accompanied growing backlogs. Poor quality control has resulted in a series of audits and even closures of crime laboratories. In response to these problems, however, some laboratories and some entire states have developed new approaches toward …