Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 13 of 13

Full-Text Articles in Law

Protecting The Innocent: How To Prevent The Consequences Of Misidentification And Doxing By Volunteers Helping With Open Source Investigations, Leigh M. Dannhauser Jan 2024

Protecting The Innocent: How To Prevent The Consequences Of Misidentification And Doxing By Volunteers Helping With Open Source Investigations, Leigh M. Dannhauser

Catholic University Journal of Law and Technology

Individuals performing open source investigations can misidentify alleged perpetrators and dox innocent parties online, which can subsequently lead to threats and harassment against innocent parties and their loved ones. For example, threats were made against Sunil Tripathi’s family after he was wrongly identified as one of the Boston Marathon bombers and doxed on Reddit and Twitter. In 2020, the Berkeley Protocol on Digital Open Source Investigations was published as a guide, and it includes a set of principles to govern open source investigations. However, the Berkeley Protocol is limited to open source investigations performed by those working for organizations. It …


Forensic Microbiome Evidence: Fourth Amendment Applications And Court Acceptance, Trason Lasley Jan 2023

Forensic Microbiome Evidence: Fourth Amendment Applications And Court Acceptance, Trason Lasley

Catholic University Journal of Law and Technology

No abstract provided.


Protecting Online Privacy In The Digital Age: Carpenter V. United States And The Fourth Amendment’S Third-Party Doctrine, Cristina Del Rosso, Carol M. Bast Jan 2020

Protecting Online Privacy In The Digital Age: Carpenter V. United States And The Fourth Amendment’S Third-Party Doctrine, Cristina Del Rosso, Carol M. Bast

Catholic University Journal of Law and Technology

The goal of this paper is to examine the future of the third-party doctrine with the proliferation of technology and the online data we are surrounded with daily, specifically after the Supreme Court’s decision in Carpenter v. United States. It is imperative that individuals do not forfeit their Constitutional guarantees for the benefit of living in a technologically advanced society. This requires an understanding of the modern-day functional equivalents of “papers” and “effects.”

Looking to the future, this paper contemplates solutions on how to move forward in this technology era by scrutinizing the relevancy of the third-party doctrine due …


Privacy, Eavesdropping, And Wiretapping Across The United States: Reasonable Expectation Of Privacy And Judicial Discretion, Carol M. Bast Jan 2020

Privacy, Eavesdropping, And Wiretapping Across The United States: Reasonable Expectation Of Privacy And Judicial Discretion, Carol M. Bast

Catholic University Journal of Law and Technology

One-party consent and all-party consent eavesdropping and wiretapping statutes are two broad pathways for legislation to deal with the problem of secret taping and some states protect conversation under state constitutions. Whether a conversation is protected against being taped as a private conversation is often gauged by the reasonable expectation of privacy standard. Judges in both all-party consent and one-party consent jurisdictions have had to use their leeway under the reasonable expectation of privacy standard to arrive at what at the time seemed to be the most appropriate solution, perhaps in doing so creating a case law exception.


Warrantless Searches Of Electronic Devices At U.S. Borders: Securing The Nation Or Violating Digital Liberty?, Ahad Khilji Jan 2019

Warrantless Searches Of Electronic Devices At U.S. Borders: Securing The Nation Or Violating Digital Liberty?, Ahad Khilji

Catholic University Journal of Law and Technology

The steady increase of U.S. citizens traveling with smart phones and other electronic devices has been met with the rise of searches and seizures by CBP officers at U.S borders. Although only less than 0.1% of all travelers may actually be subjected to a search while entering the United States, when comparing the statistics between a six month period in 2016 with the same period in 2017, electronic device searches have almost doubled from 8,383 to 14,993. Approximately one million travelers to the U.S. are inspected by the CBP every day. Out of this population, nearly 2,500 electronic devices are …


Privacy Vs. Protection: Why Tracking Mobile-Device Location Data Without A Warrant Requires A Fourth Amendment Exception, Andrew Stover Jan 2018

Privacy Vs. Protection: Why Tracking Mobile-Device Location Data Without A Warrant Requires A Fourth Amendment Exception, Andrew Stover

Catholic University Journal of Law and Technology

No abstract provided.


International Comity And The Non-State Actor, Microsoft: Why Law Enforcement Access To Data Stored Abroad Act (Leads Act) Promotes International Comity, Sabah Siddiqui Jan 2018

International Comity And The Non-State Actor, Microsoft: Why Law Enforcement Access To Data Stored Abroad Act (Leads Act) Promotes International Comity, Sabah Siddiqui

Catholic University Journal of Law and Technology

Currently large email service providers, such as Google, Microsoft and Yahoo are refusing to comply with warrants issued under the Secured Communications Act (“SCA”) because in many instances, the requested information may be stored in servers located abroad. In the dismissed Supreme Court case, In re Warrant to Search a Certain E-Mail Account Controlled & Maintained by Microsoft Corporation, the Supreme Court should have addressed whether an internet service provider must comply with a warrant issued under the SCA when the requested information is stored in a foreign country and whether enforcement of these warrants would be an impermissible …


Autonomous Cars: Navigating The Patchwork Of Data Privacy Laws That Could Impact The Industry, Anthony Jones Jan 2017

Autonomous Cars: Navigating The Patchwork Of Data Privacy Laws That Could Impact The Industry, Anthony Jones

Catholic University Journal of Law and Technology

No abstract provided.


Is Wifi Worth It: The Hidden Dangers Of Public Wifi, Ellie Shahin Jan 2017

Is Wifi Worth It: The Hidden Dangers Of Public Wifi, Ellie Shahin

Catholic University Journal of Law and Technology

No abstract provided.


Decrypting Our Security: A Bipartisan Argument For A Rational Solution To The Encryption Challenge, Jamil N. Jaffer, Daniel J. Rosenthal May 2016

Decrypting Our Security: A Bipartisan Argument For A Rational Solution To The Encryption Challenge, Jamil N. Jaffer, Daniel J. Rosenthal

Catholic University Journal of Law and Technology

No abstract provided.


The Connected State Of Things: A Lawyer’S Survival Guide In An Internet Of Things World, Antigone Peyton May 2016

The Connected State Of Things: A Lawyer’S Survival Guide In An Internet Of Things World, Antigone Peyton

Catholic University Journal of Law and Technology

No abstract provided.


Time To Rethink Cybersecurity Reform: The Opm Data Breach And The Case For Centralized Cybersecurity Infrastructure, Zachary Figueroa May 2016

Time To Rethink Cybersecurity Reform: The Opm Data Breach And The Case For Centralized Cybersecurity Infrastructure, Zachary Figueroa

Catholic University Journal of Law and Technology

No abstract provided.


Submarine Cables, Cybersecurity And International Law: An Intersectional Analysis, Tara Davenport Dec 2015

Submarine Cables, Cybersecurity And International Law: An Intersectional Analysis, Tara Davenport

Catholic University Journal of Law and Technology

No abstract provided.