Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 28 of 28

Full-Text Articles in Law

Visualizing Dna Proof, Nicholas L. Georgakopoulos Aug 2015

Visualizing Dna Proof, Nicholas L. Georgakopoulos

Nicholas L Georgakopoulos

DNA proof inherently involves the use of probability theory, which is often counterintuitive. Visual depictions of probability theory, however, can clarify the analysis and make it tractable. A DNA hit from a large database is a notoriously difficult probabi­li­ty theory issue, yet the visuals should enable courts and juries to handle it. The Puckett facts are an example of a general approach: A search in a large DNA database produces a hit for a cold crime from 1972 San Francisco. Probability theory allows us to process the probabilities that someone else in the database, someone not in the database, or …


Law Enforcement And Technology: Requiring Technological Shields To Serve And Protect Citizen Rights, Ryan C. Pulley Mar 2015

Law Enforcement And Technology: Requiring Technological Shields To Serve And Protect Citizen Rights, Ryan C. Pulley

Ryan C Pulley

An often revisited topic is the tension between law enforcement and the citizens they aim to protect. One side of this discussion seeks to mitigate the tension by explaining the hard decisions that law enforcement officers must make to protect citizens and themselves, while the other emphasizes the corruption that exists within police departments. Recently, this discussion has begun a critical examination of the role of technology within police department to determine whether police officers are properly monitored and trained.

Both citizens and police forces alike should require that law enforcement officers utilize publicly available technologies that protect citizens’ rights. …


City Of Los Angeles V. Patel: The Upcoming Supreme Court Case No One Is Talking About, Adam Lamparello Dec 2014

City Of Los Angeles V. Patel: The Upcoming Supreme Court Case No One Is Talking About, Adam Lamparello

Adam Lamparello

Focusing solely on whether a hotel owner has a reasonable expectation of privacy in a guest registry is akin to asking whether Verizon Wireless has a reasonable expectation of privacy in its customer lists. The answer to those questions should be yes, but the sixty-four thousand dollar question—and the proverbial elephant in the room—is whether hotel occupants and cell phone users forfeit their privacy rights simply because they check into the Beverly Hills Hotel or call their significant others from a Smart Phone on the Santa Monica Freeway. Put differently, a hotel owner’s expectation of privacy in a guest registry …


The Internet Is The New Public Forum: Why Riley V. California Supports Net Neutrality, Adam Lamparello Oct 2014

The Internet Is The New Public Forum: Why Riley V. California Supports Net Neutrality, Adam Lamparello

Adam Lamparello

Technology has ushered civil liberties into the virtual world, and the law must adapt by providing legal protections to individuals who speak, assemble, and associate in that world. The original purposes of the First Amendment, which from time immemorial have protected civil liberties and preserved the free, open, and robust exchange of information, support net neutrality. After all, laws or practices that violate cherished freedoms in the physical world also violate those freedoms in the virtual world. The battle over net neutrality is “is absolutely the First Amendment issue of our time,” just as warrantless searches of cell phones were …


Riley V. California: Privacy Still Matters, But How Much And In What Contexts?, Adam Lamparello, Charles E. Maclean Jul 2014

Riley V. California: Privacy Still Matters, But How Much And In What Contexts?, Adam Lamparello, Charles E. Maclean

Adam Lamparello

Private information is no longer stored only in homes or other areas traditionally protected from warrantless intrusion. The private lives of many citizens are contained in digital devices no larger than the palm of their hand—and carried in public places. But that does not make the data within a cell phone any less private, just as the dialing of a phone number does not voluntarily waive an individual’s right to keep their call log or location private. Remember that we are not talking exclusively about individuals suspected of committing violent crimes. The Government is recording the calls and locations of …


Sharing Public Safety Helicopters, Henry H. Perritt Jr. Apr 2014

Sharing Public Safety Helicopters, Henry H. Perritt Jr.

All Faculty Scholarship

No abstract provided.


Criminal Innovation And The Warrant Requirement: Reconsidering The Rights-Police Efficiency Trade-Off, Tonja Jacobi, Jonah Kind Feb 2014

Criminal Innovation And The Warrant Requirement: Reconsidering The Rights-Police Efficiency Trade-Off, Tonja Jacobi, Jonah Kind

Tonja Jacobi

It is routinely assumed that there is a trade-off between police efficiency and the warrant requirement. But existing analysis ignores the interaction between police investigative practices and criminal innovation. Narrowing the definition of a search or otherwise limiting the requirement for a warrant gives criminals greater incentive to innovate to avoid detection. With limited police resources to develop countermeasures, police will often be just as effective at capturing criminals when facing higher Fourth Amendment hurdles. We provide a game theoretic model that shows that when police investigation and criminal innovation are considered in a dynamic context, the police efficiency rationale …


Sharing Public Safety Helicopters, Henry H. Perritt Jr. Jan 2014

Sharing Public Safety Helicopters, Henry H. Perritt Jr.

Henry H. Perritt, Jr.

No abstract provided.


The Evolution Of The Digital Millennium Copyright Act; Changing Interpretations Of The Dmca And Future Implications For Copyright Holders, Hillary A. Henderson Jan 2014

The Evolution Of The Digital Millennium Copyright Act; Changing Interpretations Of The Dmca And Future Implications For Copyright Holders, Hillary A. Henderson

Hillary A Henderson

Copyright law rewards an artificial monopoly to individual authors for their creations. This reward is based on the belief that, by granting authors the exclusive right to reproduce their works, they receive an incentive and means to create, which in turn advances the welfare of the general public by “promoting the progress of science and useful arts.” Copyright protection subsists . . . in original works of authorship fixed in any tangible medium of expression, now known or later developed, from which they can be perceived, reproduced, or otherwise communicated, either directly or with the aid of a machine or …


The Constitutional Infirmity Of Warrantless Nsa Surveillance: The Abuse Of Presidential Power And The Injury To The Fourth Amendment, Robert M. Bloom, William J. Dunn Oct 2013

The Constitutional Infirmity Of Warrantless Nsa Surveillance: The Abuse Of Presidential Power And The Injury To The Fourth Amendment, Robert M. Bloom, William J. Dunn

Robert Bloom

In recent months, there have been many revelations about the tactics used by the Bush Administration to prosecute their war on terrorism. These stories involve the exploitation of technologies that allow the government, with the cooperation of phone companies and financial institutions, to access phone and financial records. This paper focuses on the revelation and widespread criticism of the Bush Administration’s operation of a warrantless electronic surveillance program to monitor international phone calls and emails that originate or terminate with a United States party. The powerful and secret National Security Agency heads the program and leverages its significant intelligence collection …


"Introduction" (Chapter 1) Of Stories About Science In Law: Literary And Historical Images Of Acquired Expertise (Ashgate 2011), David S. Caudill Jul 2013

"Introduction" (Chapter 1) Of Stories About Science In Law: Literary And Historical Images Of Acquired Expertise (Ashgate 2011), David S. Caudill

David S Caudill

This is the introductory chapter of Stories About Science in Law: Literary and Historical Images of Acquired Expertise (Ashgate, 2011), explaining that the book presents examples of how literary accounts can provide a supplement to our understanding of science in law. Challenging the view that law and science are completely different, I focus on stories that explore the relationship between law and science, and identify cultural images of science that prevail in legal contexts. In contrast to other studies on the transfer and construction of expertise in legal settings, the book considers the intersection of three interdisciplinary projects-- law and …


From Gridlock To Groundbreaking: Realizing Reliability In Forensic Science, Jessica D. Gabel Apr 2013

From Gridlock To Groundbreaking: Realizing Reliability In Forensic Science, Jessica D. Gabel

Jessica Gabel Cino

In 2009, The National Academy of Sciences published a scathing report announcing that forensic science is broken and needs to be overhauled. Weaknesses have plagued forensic evidence for decades, and the resulting legal challenges have been hard fought but met with few victories. What we do know is a harsh truth: that faulty forensic science has contributed to the conviction of innocent people—and will continue to do so if the status quo persists.

In recent years, the reality of wrongful convictions has become mainstream through the work of the Innocence Project and other organizations. Out of the 305 DNA-based exonerations …


The Surveillance Society And The Third-Party Privacy Problem, Shaun Spencer Mar 2013

The Surveillance Society And The Third-Party Privacy Problem, Shaun Spencer

Shaun Spencer

This article examines a question that has become increasingly important in the emerging surveillance society: should the law treat information as private even though others know about it? This is the third-party privacy problem. Part I explores two competing conceptions of privacy: the binary and contextual conceptions. Part II describes two features of the emerging surveillance society that should change the way we address the third-party privacy problem. One feature, “surveillance on demand,” results from exponential increases in data collection and aggregation. The other feature, “uploaded lives,” reflects a revolution in the type and amount of information that we share …


Defying Dna: Rethinking The Role Of The Jury In An Age Of Scientific Proof Of Innocence, Andrea L. Roth Feb 2013

Defying Dna: Rethinking The Role Of The Jury In An Age Of Scientific Proof Of Innocence, Andrea L. Roth

Andrea L Roth

In 1946, public outrage erupted after a jury ordered Charlie Chaplin to support a child who, according to apparently definitive blood tests, was not his. Half a century later, juries have again defied apparently definitive evidence of innocence, finding criminal defendants guilty based on a confession or eyewitness notwithstanding exculpatory DNA test results. One might expect judges in such cases to direct an acquittal, on grounds that the evidence is legally insufficient because no rational juror could find guilt beyond a reasonable doubt. Yet few if any do. Instead, courts defer to juries when they form an actual belief in …


The Four Factor Test, Susan Freiwald Dec 2012

The Four Factor Test, Susan Freiwald

Susan Freiwald

No abstract provided.


"Introduction" (Chapter 1) Of Stories About Science In Law: Literary And Historical Images Of Acquired Expertise (Ashgate 2011), David S. Caudill Aug 2011

"Introduction" (Chapter 1) Of Stories About Science In Law: Literary And Historical Images Of Acquired Expertise (Ashgate 2011), David S. Caudill

Working Paper Series

This is the introductory chapter of Stories About Science in Law: Literary and Historical Images of Acquired Expertise (Ashgate, 2011), explaining that the book presents examples of how literary accounts can provide a supplement to our understanding of science in law. Challenging the view that law and science are completely different, I focus on stories that explore the relationship between law and science, and identify cultural images of science that prevail in legal contexts. In contrast to other studies on the transfer and construction of expertise in legal settings, the book considers the intersection of three interdisciplinary projects-- law and …


Cyber-Extortion: Duties And Liabilities Related To The Elephant In The Server Room, Adam J. Sulkowski Jan 2007

Cyber-Extortion: Duties And Liabilities Related To The Elephant In The Server Room, Adam J. Sulkowski

ExpressO

This is a comprehensive analysis of the legal frameworks related to cyber-extortion – the practice of demanding money in exchange for not carrying out threats to commit harm that would involve a victim's information systems. The author hopes it will catalyze an urgently needed discussion of relevant public policy concerns.

Cyber-extortion has, by all accounts, become a common, professionalized and profit-driven criminal pursuit targeting businesses. 17% of businesses in a recent survey indicated having received a cyber-extortion demand. An additional 13% of respondents were not sure if their business had received such a demand.

Awareness of the risks of cybercrime …


A Complete Property Right Amendment, John H. Ryskamp Oct 2006

A Complete Property Right Amendment, John H. Ryskamp

ExpressO

The trend of the eminent domain reform and "Kelo plus" initiatives is toward a comprehensive Constitutional property right incorporating the elements of level of review, nature of government action, and extent of compensation. This article contains a draft amendment which reflects these concerns.


Technoconsen(T)Sus, Andrea M. Matwyshyn Aug 2006

Technoconsen(T)Sus, Andrea M. Matwyshyn

ExpressO

Law is contributing to an information security paradox. Consumers are regularly “consenting” to the installation of computer code that makes them more vulnerable to harms such as identity theft. In particular, digital rights management technology accompanying digital music has recently left a wake of compromised user machines. Using the case study of security-invasive digital rights management technology, this article argues that a fundamental tension exists among intellectual property law, computer intrusion law and contract law regarding meaningful consumer consent in digital contexts. This article proposes to ease the noise in consent doctrine through creating an objective “reasonable digital consumer” standard …


Bond Repudiation, Tax Codes, The Appropriations Process And Restitution Post-Eminent Domain Reform, John H. Ryskamp Jun 2006

Bond Repudiation, Tax Codes, The Appropriations Process And Restitution Post-Eminent Domain Reform, John H. Ryskamp

ExpressO

This brief comment suggests where the anti-eminent domain movement might be heading next.


The Z-Test For Percentages: A Statistical Tool To Detect Pretextually Neutral Juror Challenges, Marvin L. Longabaugh Apr 2006

The Z-Test For Percentages: A Statistical Tool To Detect Pretextually Neutral Juror Challenges, Marvin L. Longabaugh

ExpressO

In the article, I discuss the potential use of public opinion polls to measure the discriminatory effect of certain questions in jury selection. While the laws surrounding race and gender based jury selection are known to most lawyers, there has been little scrutiny on questions that might be posed to potential jurors that are facially neutral, yet have a discriminatory impact. This article examines a number of such questions and offers a statistical test to determine whether a proposed question has, in fact, a 98% certainty of having a discriminatory effect if relied upon in jury selection.


Password Theft: Rethinking An Old Crime In A New Era, Daniel S. Shamah Nov 2005

Password Theft: Rethinking An Old Crime In A New Era, Daniel S. Shamah

ExpressO

This is a discussion of the legal and economic ramifications of password theft.


On The Potential Of Neuroscience: A Comment On Greene And Cohen’S "For The Law, Neuroscience Changes Nothing And Everything", Theodore Y. Blumoff Oct 2005

On The Potential Of Neuroscience: A Comment On Greene And Cohen’S "For The Law, Neuroscience Changes Nothing And Everything", Theodore Y. Blumoff

ExpressO

In a recent article, Joshua Greene and Jonathan Cohen add their voices to an emerging discussion about the place of neuroscience in law and social policy. They argue convincingly that new data from the developing field of neuroscience will dramatically and positively change our legal system. I agree with their conclusions, but I believe that their commitment to a kind of neuroscientific determinism or essentialism is wrong, unnecessary, and even dangerous; it would move law in a direction that eliminates ongoing, normative decision-making. In the essay I have attached, I first set the stage by discussing the commitment of our …


Breaking The Bank: Revisiting Central Bank Of Denver After Enron And Sarbanes-Oxley, Celia Taylor Sep 2005

Breaking The Bank: Revisiting Central Bank Of Denver After Enron And Sarbanes-Oxley, Celia Taylor

ExpressO

No abstract provided.


National Identity Cards: Fourth And Fifth Amendment Issues, Daniel J. Steinbock Oct 2003

National Identity Cards: Fourth And Fifth Amendment Issues, Daniel J. Steinbock

ExpressO

In the past two years there have been serious calls for a national identity system whose centerpiece would be some form of national identity card. Such a system is seen mainly as a tool against terrorists, but also as a useful response to illegal immigration, identity theft, and electoral fraud. Both proponents and opponents have noted the potential constitutional problems of such an identity system, but as yet there has been no published legal analysis of these questions. This article aims to fill that gap by analyzing the Fourth and Fifth Amendment issues in two major features of any likely …


Double Helix, Double Bind: Factual Innocence And Postconviction Dna Testing, Seth F. Kreimer, David Rudovsky Jan 2002

Double Helix, Double Bind: Factual Innocence And Postconviction Dna Testing, Seth F. Kreimer, David Rudovsky

All Faculty Scholarship

No abstract provided.


The Bill Of Rights And The Constitution: Facing The Challenge Of The Future, Stephen Wermiel Jan 2000

The Bill Of Rights And The Constitution: Facing The Challenge Of The Future, Stephen Wermiel

Articles in Law Reviews & Other Academic Journals

No abstract provided.


Due Process Versus Data Processing: An Analysis Of Computerized Criminal History Information Systems, Donald L. Doernberg Jan 1980

Due Process Versus Data Processing: An Analysis Of Computerized Criminal History Information Systems, Donald L. Doernberg

Elisabeth Haub School of Law Faculty Publications

Based on their empirical study of New York's computerized criminal history information system and on their national surveys of similar systems, Professors Doernberg and Zeigler conclude that current regulations governing the dispersion of criminal history information are grossly inadequate. Although information drawn from computerized criminal history files is often inaccurate, incomplete, or inappropriate, that information is routinely used by criminal justice officials and judges to make decisions affecting defendants'liberty. The authors argue that this practice is unconstitutional and suggest ways to regulate criminal history information suystems that would protect a defendant's right not to be deprived of liberty without due …