Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 3 of 3
Full-Text Articles in Law
Feeding The Machine: Policing, Crime Data, & Algorithms, Elizabeth E. Joh
Feeding The Machine: Policing, Crime Data, & Algorithms, Elizabeth E. Joh
William & Mary Bill of Rights Journal
No abstract provided.
The Investigative Dynamics Of The Use Of Malware By Law Enforcement, Paul Ohm
The Investigative Dynamics Of The Use Of Malware By Law Enforcement, Paul Ohm
William & Mary Bill of Rights Journal
The police have started to use malware—and other forms of government hacking—to solve crimes. Some fear coming abuses—the widespread use of malware when traditional investigative techniques would work just as well or to investigate political opponents or dissident speakers. This Article argues that these abuses will be checked, at least in part, by the very nature of malware and the way it must be controlled. This analysis utilizes a previously unformalized research methodology called “investigative dynamics” to come to these conclusions. Because every use of malware risks spoiling the tool—by revealing a software vulnerability that can be patched—the police will …
Forging Ahead From Ferguson: Re-Evaluating The Right To Assemble In The Face Of Police Militarization, Ashley M. Eick
Forging Ahead From Ferguson: Re-Evaluating The Right To Assemble In The Face Of Police Militarization, Ashley M. Eick
William & Mary Bill of Rights Journal
No abstract provided.