Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 8 of 8

Full-Text Articles in Law

Stingrays, Triggerfish, And Hailstroms, Oh My: The Fourth Amendment Implications Of The Increasing Government Use Of Cell-Site Simulators, Jenna Jonassen Jan 2017

Stingrays, Triggerfish, And Hailstroms, Oh My: The Fourth Amendment Implications Of The Increasing Government Use Of Cell-Site Simulators, Jenna Jonassen

Touro Law Review

No abstract provided.


The Sixth Pillar Of Anti-Money Laundering Compliance: Balancing Effective Enforcement With Financial Privacy, Maria A. De Dios Jan 2016

The Sixth Pillar Of Anti-Money Laundering Compliance: Balancing Effective Enforcement With Financial Privacy, Maria A. De Dios

Brooklyn Journal of Corporate, Financial & Commercial Law

The U.S. government has responded to the increase of financial crimes, including money laundering and terrorist financing, by requiring that financial institutions implement anti-money laundering compliance programs within their institutions. Most recently, the Financial Crimes Enforcement Network exercised its regulatory powers, as authorized by the Treasury Department, by proposing regulations that now explicitly add customer due diligence to the preexisting anti-money laundering regime. The policy behind the government’s legislative and regulatory measures is clear—financial institutions must ensure that they are protected from and not aiding in the illegal efforts of criminals. The complexity and insidiousness of these financial crimes makes …


A Cloudy Forecast: Divergence In The Cloud Computing Laws Of The United States, European Union, And China, Tina Cheng Jun 2014

A Cloudy Forecast: Divergence In The Cloud Computing Laws Of The United States, European Union, And China, Tina Cheng

Georgia Journal of International & Comparative Law

No abstract provided.


The Rapid Rise Of Delayed Notice Searches, And The Fourth Amendment “Rule Requiring Notice”, Jonathan Witmer-Rich Apr 2014

The Rapid Rise Of Delayed Notice Searches, And The Fourth Amendment “Rule Requiring Notice”, Jonathan Witmer-Rich

Pepperdine Law Review

This article documents the rapid rise of covert searching, through delayed notice search warrants, and argues that covert searching in its current form presumptively violates the Fourth Amendment’s “rule requiring notice.” Congress authorized these “sneak and peek” warrants in the USA Patriot Act, in 2001, and soon after added a reporting requirement to monitor this invasive search technique. Since 2001, the use of delayed notice search warrants has risen dramatically, from around 25 in 2002 to 5,601 in 2012, suggesting that “sneak and peek” searches are becoming alarmingly common. In fact, it is not at all clear whether true “sneak …


The Rapid Rise Of Delayed Notice Searches, And The Fourth Amendment "Rule Requiring Notice", Jonathan Witmer-Rich Jan 2014

The Rapid Rise Of Delayed Notice Searches, And The Fourth Amendment "Rule Requiring Notice", Jonathan Witmer-Rich

Law Faculty Articles and Essays

This article documents the rapid rise of covert searching, through delayed notice search warrants, and argues that covert searching in its current form presumptively violates the Fourth Amendment's "rule requiring notice."

Congress authorized these "sneak and peek" warrants in the USA Patriot Act of 2001, and soon after added a reporting requirement to monitor this invasive search technique. Since 2001, the use of delayed notice search warrants has risen dramatically, from around 25 in 2002 to 5601 in 2012, suggesting that "sneak and peek" searches are becoming alarmingly common. In fact, it is not at all clear whether true "sneak …


The Chains Of The Constitution And Legal Process In The Library: A Post-Usa Patriot Reauthorization Act Assessment, Susan Nevelow Mart Jan 2008

The Chains Of The Constitution And Legal Process In The Library: A Post-Usa Patriot Reauthorization Act Assessment, Susan Nevelow Mart

Publications

Since the Patriot Act was passed in 2001, controversy has raged over nearly every provision. The controversy has been particularly intense over provisions that affect the patrons of libraries. This article follows those Patriot Act provisions that affect libraries, and reviews how they have been interpreted, how the Patriot Reauthorization Acts have changed them, and what government audits and court affidavits reveal about the use and misuse of the Patriot Act. The efforts of librarians and others opposed to the Patriot Act have had an effect, both legislatively and judicially, in changing and challenging the Patriot Act. Because libraries are …


Navigating Communications Regulation In The Wake Of 9/11, Jamie S. Gorelick, John H. Harwood Ii, Heather Zachary May 2005

Navigating Communications Regulation In The Wake Of 9/11, Jamie S. Gorelick, John H. Harwood Ii, Heather Zachary

Federal Communications Law Journal

In no industry has the impact of the events of September 11, 2001 ("9/11") been felt more strongly than in the communications industry. After 9/11, as the American people demanded a greater sense of security, Congress and the executive branch agencies reacted with new laws, new regulations, and new practices designed to protect our nation's critical communications infrastructure and enhance the ability of law enforcement and intelligence agencies to investigate those who would do us harm. The U.S. communications providers could do so consistent with their responsibilities to customers and to shareholders. That partnership, based upon rules developed over decades, …


Protecting The Lady From Toledo: Post-Usa Patriot Act Electronic Surveillance At The Library, Susan Nevelow Mart Jan 2004

Protecting The Lady From Toledo: Post-Usa Patriot Act Electronic Surveillance At The Library, Susan Nevelow Mart

Publications

Library patrons are worried about the government looking over their shoulder while they read and surf the Internet. Because of the broad provisions of the USA PATRIOT Act, the lack of judicial and legislative oversight, the potential for content overcollection, and the ease with which applications for pen register, section 215 orders, or national security letters can be obtained, these fears cannot be dismissed.