Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 3 of 3
Full-Text Articles in Law
Searching Places Unknown: Law Enforcement Jurisdiction On The Dark Web, Ahmed Ghappour
Searching Places Unknown: Law Enforcement Jurisdiction On The Dark Web, Ahmed Ghappour
Faculty Scholarship
The use of hacking tools by law enforcement to pursue criminal suspects who have anonymized their communications on the dark web presents a looming flashpoint between criminal procedure and international law. Criminal actors who use the dark web (for instance, to commit crimes or to evade authorities) obscure digital footprints left behind with third parties, rendering existing surveillance methods obsolete. In response, law enforcement has implemented hacking techniques that deploy surveillance software over the Internet to directly access and control criminals’ devices. The practical reality of the underlying technologies makes it inevitable that foreign-located computers will be subject to remote …
Incomplete Law, Katharina Pistor, Chenggang Xu
Incomplete Law, Katharina Pistor, Chenggang Xu
Faculty Scholarship
This Article develops a framework for analyzing the relation between basic features of statutory and case law and the design and functioning of institutions that enforce this law. The basic premise is that law is inherently incomplete and that this has important implications for law enforcement. In particular, when law is incomplete, special emphasis needs to be placed on the allocation of lawmaking and law enforcement powers (LMLEP) to different institutions such as legislatures, courts, or regulators, in order to attain optimal levels of law enforcement. Using the development of the legal framework governing financial markets as an example to …
Sanctions Against Perpetrators Of Terrorism, Lori Fisler Damrosch
Sanctions Against Perpetrators Of Terrorism, Lori Fisler Damrosch
Faculty Scholarship
Since the title for this panel is "Presidential Uses of Force and Other Sanction Strategies," I will begin with "other sanction strategies" – that is, other than use of force. I would rather not be cast in the role of the dove on the panel to comment on illegitimacy of uses of force (presidential or otherwise), because I do not want to rule out or necessarily oppose presidential uses of force for counter-terrorism purposes in all circumstances. Indeed, I find myself in considerable agreement with Professor Reisman's lecture. Although I have disagreed with some of his writings and positions on …