Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 7 of 7

Full-Text Articles in Law

Global Partnership Should Be The Way Forward To Combat Money Laundering, Maame Nyakoa Boateng Apr 2022

Global Partnership Should Be The Way Forward To Combat Money Laundering, Maame Nyakoa Boateng

Dickinson Law Review (2017-Present)

This Comment compares the major anti-money laundering (“AML”) laws in the United States and Iran. This Comment argues that even though the United States is advanced in its compliance approach, without a partnership with countries that are more vulnerable to money laundering attacks, its AML efforts could prove counter-productive because of the inter-connectedness of our world today. Accordingly, this Comment proposes a global partnership between countries with effective AML legislation and countries with less effective AML legislation to combat this complex crime.


Book Review: This Is How They Tell Me The World Ends: The Cyberweapons Arms Race (2020) By Nicole Perlroth, Amy C. Gaudion Jan 2022

Book Review: This Is How They Tell Me The World Ends: The Cyberweapons Arms Race (2020) By Nicole Perlroth, Amy C. Gaudion

Dickinson Law Review (2017-Present)

No abstract provided.


Cyberterrorism And The Public Safety Exception To Miranda, Mitch Snyder Oct 2021

Cyberterrorism And The Public Safety Exception To Miranda, Mitch Snyder

Dickinson Law Review (2017-Present)

Cyberattacks against U.S. targets are becoming increasingly common. To effectively combat these attacks, law enforcement officers need the tools to respond to and prevent cyberattacks before they can occur.

In recent years, hackers have launched cyberattacks against infrastructural targets such as power grids, oil and gas distribution computer systems, and telecommunications networks. Cyberattacks have also targeted U.S. government websites, including the U.S. Department of Transportation and the U.S. Department of Treasury. Recently, a cyberattack against SolarWinds, a Texas-based I.T. company, compromised the computer and network systems of federal, state, and local governments; critical infrastructure entities; and other private sector organizations. …


O’Neill, Oh O’Neill, Wherefore Art Thou O’Neill: Defining And Cementing The Requirements For Asserting Deliberative Process Privilege, Andrew Scott Apr 2019

O’Neill, Oh O’Neill, Wherefore Art Thou O’Neill: Defining And Cementing The Requirements For Asserting Deliberative Process Privilege, Andrew Scott

Dickinson Law Review (2017-Present)

The government may invoke the deliberative process privilege to protect the communications of government officials involving policy-driven decision-making. The privilege protects communications made before policy makers act upon the policy decision to allow government officials to speak candidly when deciding a course of action without fear of their words being used against them.

This privilege is not absolute and courts recognize the legitimate countervailing interest the public has in transparency. The Supreme Court in United States v. Reynolds held that someone with control over the protected information should personally consider the privilege before asserting it but did not provide definitive …


Remarks On Prosecutorial Discretion And Immigration, Shoba S. Wadhia Apr 2019

Remarks On Prosecutorial Discretion And Immigration, Shoba S. Wadhia

Dickinson Law Review (2017-Present)

No abstract provided.


Fire, Aim, Ready! Militarizing Animus: “Unit Cohesion” And The Transgender Ban, Eric Merriam Oct 2018

Fire, Aim, Ready! Militarizing Animus: “Unit Cohesion” And The Transgender Ban, Eric Merriam

Dickinson Law Review (2017-Present)

President Trump’s currently litigated “transgender ban,” which excludes transgender persons from military service, is premised in part upon a claim that transgender persons’ presence in the military adversely affects “unit cohesion.” This use of identity- based “unit cohesion” as a justification for excluding a group from military service is the latest episode in a long history of the government asserting “unit cohesion” to justify excluding people from military service based on their identities. This Article contends that unit cohesion, when premised on identity, is always an impermissible justification for exclusion from military service because it is unconstitutional animus. Though …


Jurisdiction, The Internet, And The Good Faith Exception: Controversy Over The Government’S Use Of Network Investigative Techniques, Maureen Weidman Apr 2018

Jurisdiction, The Internet, And The Good Faith Exception: Controversy Over The Government’S Use Of Network Investigative Techniques, Maureen Weidman

Dickinson Law Review (2017-Present)

In February 2015, the FBI discovered a website dedicated to child pornography located on the Tor Network, a network designed to protect its users’ identities on the Internet. Due to the structure of the Tor Network, the FBI could not take down the website and identify users who previously accessed the website. Instead, the FBI kept the website operational for 30 days and applied for a search warrant in the Eastern District of Virginia to use a device called a Network Investigative Technique (“NIT”). This device operated similarly to malware and “attached” to computers accessing the website, allowing the government …