Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 4 of 4
Full-Text Articles in Law
Feeding The Machine: Policing, Crime Data, & Algorithms, Elizabeth E. Joh
Feeding The Machine: Policing, Crime Data, & Algorithms, Elizabeth E. Joh
William & Mary Bill of Rights Journal
No abstract provided.
The Investigative Dynamics Of The Use Of Malware By Law Enforcement, Paul Ohm
The Investigative Dynamics Of The Use Of Malware By Law Enforcement, Paul Ohm
William & Mary Bill of Rights Journal
The police have started to use malware—and other forms of government hacking—to solve crimes. Some fear coming abuses—the widespread use of malware when traditional investigative techniques would work just as well or to investigate political opponents or dissident speakers. This Article argues that these abuses will be checked, at least in part, by the very nature of malware and the way it must be controlled. This analysis utilizes a previously unformalized research methodology called “investigative dynamics” to come to these conclusions. Because every use of malware risks spoiling the tool—by revealing a software vulnerability that can be patched—the police will …
Walking While Trans: Profiling Of Transgender Women By Law Enforcement, And The Problem Of Proof, Leonore F. Carpenter, R. Barrett Marshall
Walking While Trans: Profiling Of Transgender Women By Law Enforcement, And The Problem Of Proof, Leonore F. Carpenter, R. Barrett Marshall
William & Mary Journal of Race, Gender, and Social Justice
No abstract provided.
The Violent State: Black Women's Invisible Struggle Against Police Violence, Michelle S. Jacobs
The Violent State: Black Women's Invisible Struggle Against Police Violence, Michelle S. Jacobs
William & Mary Journal of Race, Gender, and Social Justice
No abstract provided.