Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 60

Full-Text Articles in Law

Future-Proofing U.S. Laws For War Crimes Investigations In The Digital Era, Rebecca Hamilton Jul 2023

Future-Proofing U.S. Laws For War Crimes Investigations In The Digital Era, Rebecca Hamilton

Articles in Law Reviews & Other Academic Journals

Advances in information technology have irrevocably changed the nature of war crimes investigations. The pursuit of accountability for the most serious crimes of concern to the international community now invariably requires access to digital evidence. The global reach of platforms like Facebook, YouTube, and Twitter means that much of that digital evidence is held by U.S. social media companies, and access to it is subject to the U.S. Stored Communications Act.

This is the first Article to look at the legal landscape facing international investigators seeking access to digital evidence regarding genocide, war crimes, crimes against humanity, and aggression. It …


Defi: Shadow Banking 2.0?, Hilary J. Allen Jan 2023

Defi: Shadow Banking 2.0?, Hilary J. Allen

Articles in Law Reviews & Other Academic Journals

The growth of so-called “shadow banking” was a significant contributor to the financial crisis of 2008, which had huge social costs that we still grapple with today. Our financial regulatory system still hasn’t fully figured out how to address the risks of the derivatives, securitizations, and money market mutual funds that comprised Shadow Banking 1.0, but we’re already facing the prospect o fShadow Banking 2.0in the form of decentralized finance, or “DeFi.” DeFi’s proponents speak of a future where sending money is as easy as sending a photograph–but money is not the same as a photograph. The stakes are much …


Digital Habit Evidence, Andrew Guthrie Ferguson Jan 2023

Digital Habit Evidence, Andrew Guthrie Ferguson

Articles in Law Reviews & Other Academic Journals

This Article explores how “habit evidence” will become a catalyst for a new form of digital proof based on the explosive growth of smart homes, smart cars, smart devices, and the Internet of Things. Habit evidence is the rule that certain sorts of semiautomatic, regularized responses to particular stimuli are trustworthy and thus admissible under the Federal Rules of Evidence (“FRE”) 406 “Habit; Routine Practice” and state equivalents.

While well established since the common law, “habit” has made only an inconsistent appearance in reported cases and has been underutilized in trial practice. But intriguingly, once applied to the world of …


Regulatory Innovation And Permission To Fail: The Case Of Suptech, Hilary J. Allen Jan 2023

Regulatory Innovation And Permission To Fail: The Case Of Suptech, Hilary J. Allen

Articles in Law Reviews & Other Academic Journals

The recent U.S. Supreme Court decision West Virginia v. EPA has cast a pall over the discretion of administrative agencies at a very inopportune time. The private sector is currently adopting new technologies at a rapid pace, and as regulated industries become more technologically complex, administrative agencies must innovate technological tools of their own in order to keep up. Agencies will increasingly struggle to do their jobs without that innovation, but the private sector is afforded something that is both critical to the innovation process, and often denied to administrative agencies: “permission to fail.” Without some grace for the inevitable …


Why Digital Policing Is Different, Andrew Ferguson Jan 2022

Why Digital Policing Is Different, Andrew Ferguson

Articles in Law Reviews & Other Academic Journals

Many Fourth Amendment debates boil down to following argument: if police can already do something in an analog world, why does it matter that new digital technology allows them to do it better, more efficiently, or faster? This Article addresses why digital is, in fact, different when it comes to police surveillance technologies. The Article argues that courts should think of these digital technologies not as enhancements of traditional analog policing practices but as something completely different, warranting a different Fourth Amendment approach. Properly understood, certain digital searches should be legally distinguishable from analog search precedent such that the older …


Persistent Surveillance, Andrew Guthrie Ferguson Jan 2022

Persistent Surveillance, Andrew Guthrie Ferguson

Articles in Law Reviews & Other Academic Journals

Persistent surveillance technologies grant police vast new investigative capabilities. The technologies both monitor targeted areas and generate databases of searchable information about people, places, and patterns that can be connected and accessed for criminal prosecutions.

In the face of this growing police surveillance, courts have struggled to make sense of a fragmented Fourth Amendment doctrine. The Supreme Court has offered some clues that “digital may be different” when it comes to surveillance, but lower courts have been left struggling to apply old law to new technologies. Warrantless use of persistent surveillance technologies raises hard questions about when a “search” occurs …


Blockchain & Secured Transactions Proceedings Of The 2021 Spring Conference: The Impact Of Blockchain On The Practice Of Law: Presentation 4, Heather Hughes Jul 2021

Blockchain & Secured Transactions Proceedings Of The 2021 Spring Conference: The Impact Of Blockchain On The Practice Of Law: Presentation 4, Heather Hughes

Articles in Law Reviews & Other Academic Journals

Secured transactions are governed by Uniform Commercial Code Article 9. UCC Article 9 governs any extension of credit secured by personalty. If you think about it, this statute governs a massive swath of market activity: secured credit facilities, margin trading of securities, asset securitizations, and purchase money transactions for goods, I could name more. But it's a statute that's very wide ranging. Given this expansive scope, blockchain-based transaction platforms have numerous implications for lawyers who deal with secured transactions. In my brief time here, I'm going to identify just two of them.


Designing Effective Regulation For Blockchain-Based Markets, Heather Hughes Jul 2021

Designing Effective Regulation For Blockchain-Based Markets, Heather Hughes

Articles in Law Reviews & Other Academic Journals

Effective regulation of blockchain-based markets calls for coordination among lawyers, businesses, coders, and lawmakers. How might we achieve adequate coordination and why is it important? This Article takes up these questions, using one example of an increasingly popular type of blockchain-based financial transaction: the issuance of tokens backed by off-chain assets. The objective here is not to advocate for a particular regulatory treatment for asset tokenization, but rather to use this deal type as a springboard to discuss what "effective regulation" means in the context of blockchain-enabled markets.


A Tale Of Two Interoperabilities; Or, How Google V. Oracle Could Become Social Media Legislation, Charles Duan Jan 2021

A Tale Of Two Interoperabilities; Or, How Google V. Oracle Could Become Social Media Legislation, Charles Duan

Articles in Law Reviews & Other Academic Journals

The Supreme Court'srecent decision in Google LLC v. Oracle America, Inc. has provided the latest word on an issue that many have described as "interoperability," and it comes at a time when lawmakers around the world are debating a policy called "interoperability" with respect to majorInternetplatforms. At first glance, these two similarly named policy conversations copyright protection of software interfaces and interconnection among competing Internet platforms, respectively have little to do with each other. Yet they are vitally intertwined: the activities and issues featured in Google are so closely linked to the questions of digital competition that interoperability reforms directed …


Hacking Antitrust: Competition Policy And The Computer Fraud And Abuse Act, Charles Duan Jan 2021

Hacking Antitrust: Competition Policy And The Computer Fraud And Abuse Act, Charles Duan

Articles in Law Reviews & Other Academic Journals

The Computer Fraud and Abuse Act, a federal computer trespass statute that prohibits accessing a computer "without authorization or exceeding authorized access," has often been criticized for clashing with online norms, over-criminalizing common behavior, and infringing freedom-of-expression interests. These controversies over the CFAA have raised difficult questions about how the statute is to be interpreted, with courts of appeals split on the proper construction and the Supreme Courtset to consider the law in its current October Term 2020.

This article considers the CFAA in a new light, namely its effects on competition. Rather than merely preventing injurious trespass upon computers, …


Facial Recognition And The Fourth Amendment, Andrew Ferguson Jan 2021

Facial Recognition And The Fourth Amendment, Andrew Ferguson

Articles in Law Reviews & Other Academic Journals

Facial recognition offers a totalizing new surveillance power. Police now have the capability to monitor, track, and identify faces through networked surveillance cameras and datasets of billions of images. Whether identifying a particular suspect from a still photo, or identifying every person who walks past a digital camera, the privacy and security impacts of facial recognition are profound and troubling.

This Article explores the constitutional design problem at the heart of facial recognition surveillance systems. One might hope that the Fourth Amendment – designed to restrain police power and enacted to limit governmental overreach – would have something to say …


Innovative Approaches To Diversion Data, Sean Flynn, Robin Olsen, Maggie Wolk Jul 2020

Innovative Approaches To Diversion Data, Sean Flynn, Robin Olsen, Maggie Wolk

Articles in Law Reviews & Other Academic Journals

Prosecutors across the country are collecting and using data to make decisions in their offices. At the same time, prosecutors are interested in developing and sustaining prosecutorial diversion approaches. Prosecutors can use data to assist in decision-making regarding diversion case processing choices as well as to make office policy and resource allocation decisions that, in turn, support expanded diversion programs. Data collection can help prosecutors decide if a prosecutorial diversion program will work for them, and if so, what characteristics it should have. Finally, data can help prosecutors see whether they are obtaining their intended outcomes. Prosecutors possess varying levels …


Gene Patents, Drug Prices, And Scientific Research: Unexpected Effects Of Recently Proposed Patent Eligibility Legislation, Charles Duan Jul 2020

Gene Patents, Drug Prices, And Scientific Research: Unexpected Effects Of Recently Proposed Patent Eligibility Legislation, Charles Duan

Articles in Law Reviews & Other Academic Journals

Recently, Congress has considered legislation to amend§ 101, a section of the Patent Act that the Supreme Court has held to prohibit patenting of laws of nature, natural phenomena, and abstract ideas. This draft legislation would expand the realm of patent-eligible subject matter, overturning the Court's precedents along the way. The draft legislation, and movement to change this doctrine of patent law, made substantial headway with a subcommittee of the Senate holding numerous roundtables and hearings on the subject.

This article considers some less-discussed consequences of that draft legislative proposal. The legislation likely opens the door to patenting of subject …


Payments Failure, Hilary Allen Feb 2020

Payments Failure, Hilary Allen

Articles in Law Reviews & Other Academic Journals

The processing of retail payments has traditionally been the domain of regulated banks, but technologically sophisticated players like Venmo, AliPay, Bitcoin and Ripple (and potentially Facebook’s Libra) are making incursions into the market. Even within regulated banks, payments processing is becoming increasingly reliant on new technologies – JPMorgan Chase’s “JPMCoin” is just one example. However, limited attention has been paid to the new kinds of operational risks associated with these complex new methods of processing retail payments. This Article argues that technological failures at a payments provider (bank or non-bank) could be amplified in unexpected ways as they interact with …


Transnational Government Hacking, Jennifer Daskal Jan 2020

Transnational Government Hacking, Jennifer Daskal

Articles in Law Reviews & Other Academic Journals

No abstract provided.


Big Data Prosecution And Brady, Andrew Ferguson Jan 2020

Big Data Prosecution And Brady, Andrew Ferguson

Articles in Law Reviews & Other Academic Journals

Prosecutors are joining the big data revolution, adopting “intelligence-driven” strategies to target crime patterns. Centralized big data systems now track offenders, places, and groups allowing prosecutors to link crimes by time, place, associations, or other connections. Adding to these types of formalized, structured databases are growing sources of raw, unstructured big data from digital surveillance technologies like video cameras, police body cameras, and automated license plate readers. The prosecutors of the future will sit on a wealth of valuable investigative insights – all searchable and potentially relevant for a more aggressive and proactive investigation strategy.But as helpful as these new …


Implementing User Rights For Research In The Field Of Artificial Intelligence: A Call For International Action, Sean Flynn, Michael W. Carroll Jan 2020

Implementing User Rights For Research In The Field Of Artificial Intelligence: A Call For International Action, Sean Flynn, Michael W. Carroll

Articles in Law Reviews & Other Academic Journals

Last year, before the onset of a global pandemic highlighted the critical and urgent need for technology-enabled scientific research, the World Intellectual Property Organization (WIPO) launched an inquiry into issues at the intersection of intellectual property (IP) and artificial intelligence (AI). We contributed comments to that inquiry, with a focus on the application of copyright to the use of text and data mining (TDM) technology. This article describes some of the most salient points of our submission and concludes by stressing the need for international leadership on this important topic. WIPO could help fill the current gap on international leadership, …


Nonexcludable Surgical Method Patents, Jonas Anderson Jan 2020

Nonexcludable Surgical Method Patents, Jonas Anderson

Articles in Law Reviews & Other Academic Journals

A patent consists of only one right: the right to exclude others from practicing the patented invention. However, one class of patents statutorily lacks the right to exclude direct infringers: surgical method patents are not enforceable against medical practitioners or health care facilities, which are the only realistic potential direct infringers of such patents. Despite this, inventors regularly file for (and receive) surgical method patents. Why would anyone incur the expense (more than $20,000 on average) of acquiring a patent on a surgical method if that patent cannot be used to keep people from using the patent?

The traditional answer …


Tinkering With Circuit Conflicts Beyond The Schoolhouse Gate, Stephen Wermiel Jan 2020

Tinkering With Circuit Conflicts Beyond The Schoolhouse Gate, Stephen Wermiel

Articles in Law Reviews & Other Academic Journals

No abstract provided.


Internet Of Infringing Things: The Effect Of Computer Interface Copyrights On Technology Standards, Charles Duan Jan 2019

Internet Of Infringing Things: The Effect Of Computer Interface Copyrights On Technology Standards, Charles Duan

Articles in Law Reviews & Other Academic Journals

You connect to the Internet via your Wi-Fi access point. You surf the Web using a browser and send emails through your email server. You probably use some USB peripherals-say a mouse, keyboard, or printer. Maybe you even watch cable or broadcast television.

Under current case law, each of those computer systems and devices may very well be copyright-infringing contraband. This is through no fault of your own-you need not be pirating music or streaming illegal movies to infringe a copyright. The infringement simply exists, hard-wired within each of those devices and many more that you use, a result of …


The Exclusionary Rule In The Age Of Blue Data, Andrew Ferguson Jan 2019

The Exclusionary Rule In The Age Of Blue Data, Andrew Ferguson

Articles in Law Reviews & Other Academic Journals

In Herring v. United States, Chief Justice John Roberts reframed the Supreme Court’s understanding of the exclusionary rule: “As laid out in our cases, the exclusionary rule serves to deter deliberate, reckless, or grossly negligent conduct, or in some circumstances recurring or systemic negligence.” The open question remains: how can defendants demonstrate sufficient recurring or systemic negligence to warrant exclusion? The Supreme Court has never answered the question, although the absence of systemic or recurring problems has figured prominently in two recent exclusionary rule decisions. Without the ability to document recurring failures, or patterns of police misconduct, courts can dismiss …


Privacy And Security Across Borders, Jennifer Daskal Jan 2019

Privacy And Security Across Borders, Jennifer Daskal

Articles in Law Reviews & Other Academic Journals

Three recent initiatives -by the United States, European Union, and Australiaare opening salvos in what will likely be an ongoing and critically important debate about law enforcement access to data, the jurisdictional limits to such access, and the rules that apply. Each of these developments addresses a common set of challenges posed by the increased digitalization of information, the rising power of private companies delimiting access to that information, and the cross-border nature of investigations that involve digital evidence. And each has profound implications for privacy, security, and the possibility of meaningful democratic accountability and control. This Essay analyzes the …


Atrocity Prevention In The New Media Landscape, Rebecca Hamilton Jan 2019

Atrocity Prevention In The New Media Landscape, Rebecca Hamilton

Articles in Law Reviews & Other Academic Journals

Journalists have traditionally played a crucial role in building public pressure on government officials to uphold their legal obligations under the 1948 UN Convention on the Prevention and Punishment of Genocide. But over the past twenty years there has been radical change in the media landscape: foreign bureaus have been shuttered, young freelance journalists have taken over some of the work traditionally done by experienced foreign correspondents, and, more recently, the advent of social media has enabled people in conflict-affected areas to tell their own stories to the world. This essay assesses the impact of these changes on atrocity prevention …


Supreme Court Of Canada On The Appropriateness And Scope Of A Global Website Takedown Order, Jennifer C. Daskal Oct 2018

Supreme Court Of Canada On The Appropriateness And Scope Of A Global Website Takedown Order, Jennifer C. Daskal

Articles in Law Reviews & Other Academic Journals

In Google v. Equustek, the Supreme Court of Canada ordered Google to delist all websites used by Datalink, a company that stole trade secrets from Equustek, a Canada-based information technology company. Google had agreed to do so in part, but with respect to searches that originated from google.ca only, the default browser for those in Canada. Equustek however, argued the takedowns needed to be global in order to be effective. It thus sought an injunction ordering Google to delist the allegedly infringing websites from all of Google's search engines whether accessed from google.ca, google.com, or any other entry point. Google …


User-Generated Evidence, Rebecca Hamilton Jan 2018

User-Generated Evidence, Rebecca Hamilton

Articles in Law Reviews & Other Academic Journals

Around the world, people are using their smartphones to document atrocities. This Article is the first to address the implications of this important development for international criminal law. While acknowledging the potential benefits such user-generated evidence could have for international criminal investigations, the Article identifies three categories of concern related to its use: (i) user security; (ii) evidentiary bias; and (iii) fair trial rights. In the absence of safeguards, user-generated evidence may address current problems in international criminal justice at the cost of creating new ones and shifting existing problems from traditional actors, who have institutional backing, to individual users …


The Legal Risks Of Big Data Policing, Andrew Guthrie Ferguson Jan 2018

The Legal Risks Of Big Data Policing, Andrew Guthrie Ferguson

Articles in Law Reviews & Other Academic Journals

No abstract provided.


Sovereignty In The Age Of Cyber, Gary Corn Jan 2018

Sovereignty In The Age Of Cyber, Gary Corn

Articles in Law Reviews & Other Academic Journals

International law is a foundational pillar of the modern international order, and its applicability to both state and nonstate cyber activities is, by now, beyond question. However, owing to the unique and rapidly evolving nature of cyberspace, its ubiquitous interconnectivity, its lack of segregation between the private and public sectors, and its incompatibility with traditional concepts of geography, there are difficult and unresolved questions about exactly how international law applies to this domain. Chief among these is the question of the exact role that the principle of sovereignty plays in regulating states' cyber activities.


Concluding Observations On Sovereignty In Cyberspace, Gary Corn, Robert Taylor Jan 2018

Concluding Observations On Sovereignty In Cyberspace, Gary Corn, Robert Taylor

Articles in Law Reviews & Other Academic Journals

In Sorerejgntyin Cyberspace: Lex Lata Vel Non?, Michael Schmitt and Liis Vihul argue that territorial sovereignty is a primary rule of international law that limits cyber activities. They recognize, however, that not all cyber effects constitute violations of territorial sovereignty, and like Rule 4 in the Tallinn Manual 2.0 and its commentary, they acknowledge a distinct lack of consensus among the Tallinn participants on the critical question of applicable thresholds. Problematically, they do not identify the necessary state practice and opinio juris that would be required to establish either the primary rule that they proffer or the existence and contours …


Illuminating Black Data Policing, Andrew Ferguson Jan 2018

Illuminating Black Data Policing, Andrew Ferguson

Articles in Law Reviews & Other Academic Journals

The future of policing will be driven by data. Crime, criminals, and patterns of criminal activity will be reduced to data to be studied, crunched, and predicted. The benefits of big data policing involve smarter policing, faster investigation, predictive deterrence, and the ability to visualize crime problems in new ways. Not surprisingly then, police administrators have been seeking out new partnerships with sophisticated private data companies and experimenting with new surveillance technologies. This potential future, however, has a very present limitation. It is a limitation largely ignored by adopting jurisdictions and could, if left unaddressed, delegitimize the adoption and use …


Access To Data Across Borders: The Critical Role For Congress To Play Now, Jennifer Daskal Jan 2017

Access To Data Across Borders: The Critical Role For Congress To Play Now, Jennifer Daskal

Articles in Law Reviews & Other Academic Journals

No abstract provided.