Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 15 of 15

Full-Text Articles in Law

Playing God In The 21st Century: How The Push For Human Embryonic Germline Gene Editing Sidelines Individual And Generational Autonomy, Anna E. Melo Jan 2023

Playing God In The 21st Century: How The Push For Human Embryonic Germline Gene Editing Sidelines Individual And Generational Autonomy, Anna E. Melo

Catholic University Journal of Law and Technology

Every four and a half minutes a child with a genetic birth defect is born in the United States. For some, these conditions are treatable and manageable, but sadly for others, they are a death sentence. Congenital malformations and chromosomal abnormalities are the leading cause of infant mortality. CRISPR-Cas9 presents hope for the future, a liberation from the heritable genetic shackles that a child would otherwise be trapped in. With such optimism for future applications of germline gene editing, there are also great concerns with what national and global limitations and auditing must be in place to permit “genetic hedging.” …


Airdropping Justice: The Constitutionality Of Service Of Process Via Non-Fungible Token, Jenifer Jackson Jan 2023

Airdropping Justice: The Constitutionality Of Service Of Process Via Non-Fungible Token, Jenifer Jackson

Catholic University Journal of Law and Technology

No abstract provided.


The Negative Impact Of Service Member And Veteran Post Traumatic Stress Disorder (Ptsd) Rating Or Specter Of Ptsd On Child Custody Arrangements, Erhan Bedestani Jan 2022

The Negative Impact Of Service Member And Veteran Post Traumatic Stress Disorder (Ptsd) Rating Or Specter Of Ptsd On Child Custody Arrangements, Erhan Bedestani

Catholic University Journal of Law and Technology

No abstract provided.


Passcodes, Protection, And Legal Practicality: The Necessity Of A Digital Fifth Amendment, Ethan Swierczewski Jan 2022

Passcodes, Protection, And Legal Practicality: The Necessity Of A Digital Fifth Amendment, Ethan Swierczewski

Catholic University Journal of Law and Technology

No abstract provided.


Moving From Harm Mitigation To Affirmative Discrimination Mitigation: The Untapped Potential Of Artificial Intelligence To Fight School Segregation And Other Forms Of Racial Discrimination, Andrew Gall Jan 2022

Moving From Harm Mitigation To Affirmative Discrimination Mitigation: The Untapped Potential Of Artificial Intelligence To Fight School Segregation And Other Forms Of Racial Discrimination, Andrew Gall

Catholic University Journal of Law and Technology

No abstract provided.


Brain-Computer-Interfacing & Respondeat Superior: Algorithmic Decisions, Manipulation, And Accountability In Armed Conflict, Salahudin Ali Jan 2021

Brain-Computer-Interfacing & Respondeat Superior: Algorithmic Decisions, Manipulation, And Accountability In Armed Conflict, Salahudin Ali

Catholic University Journal of Law and Technology

This article examines the impact that brain-computer-interfacing platforms will have on the international law of armed conflict’s respondeat superior legal regime. Major Ali argues that the connection between the human brain and this nascent technology’s underlying technology of artificial intelligence and machine learning will serve as a disruptor to the traditional mental prerequisites required to impart culpability and liability on commanders for actions of their troops. Anticipating that BCI will become increasingly ubiquitous, Major Ali’s article offers frameworks for solution to BCI’s disruptive potential to the internal law of armed conflict.


Protecting Online Privacy In The Digital Age: Carpenter V. United States And The Fourth Amendment’S Third-Party Doctrine, Cristina Del Rosso, Carol M. Bast Jan 2020

Protecting Online Privacy In The Digital Age: Carpenter V. United States And The Fourth Amendment’S Third-Party Doctrine, Cristina Del Rosso, Carol M. Bast

Catholic University Journal of Law and Technology

The goal of this paper is to examine the future of the third-party doctrine with the proliferation of technology and the online data we are surrounded with daily, specifically after the Supreme Court’s decision in Carpenter v. United States. It is imperative that individuals do not forfeit their Constitutional guarantees for the benefit of living in a technologically advanced society. This requires an understanding of the modern-day functional equivalents of “papers” and “effects.”

Looking to the future, this paper contemplates solutions on how to move forward in this technology era by scrutinizing the relevancy of the third-party doctrine due …


The Department Of Justice Versus Apple Inc. -- The Great Encryption Debate Between Privacy And National Security, Julia P. Eckart Jan 2019

The Department Of Justice Versus Apple Inc. -- The Great Encryption Debate Between Privacy And National Security, Julia P. Eckart

Catholic University Journal of Law and Technology

This article is an attempt to objectively examine and assess legal arguments made by Apple Inc. (Apple) and the Department of Justice (DOJ) concerning the DOJ’s use of the All Writs Act[1] (AWA) to require Apple to provide technical assistance to the DOJ so that it could access the encrypted data from the locked iPhone of Syed Rizwan Farook, commonly referred to as the San Bernardino shooter. The DOJ’s initial ex parte application focused on meeting the requirements of United States v. New York Telephone Co.[2] concluding the court order was authorized and appropriate. Apple not only argued …


The Itunes Of Downloadable Guns: Firearms As A First Amendment Right, Sandra Sawan Lara Jan 2019

The Itunes Of Downloadable Guns: Firearms As A First Amendment Right, Sandra Sawan Lara

Catholic University Journal of Law and Technology

As society becomes more technology driven, legal issues continue to arise around the world. From privacy to national security, technology develops at a rate the law simply cannot keep up with. In the United States, one of the biggest legal issues is how the new risks technology brings will interfere with our individual liberties.

Technologies like three-dimensional (“3D”) printing have transformed everything from lifesaving surgeries to gun manufacturing. This technology has led to a whole new way of communicating via computer coding, with the online open source movement leading innovation by allowing for the sharing and editing of files freely. …


Life Becoming Hazy: The Withdrawal Of The United States From The Paris Agreement And How The Youth Of America Are Challenging It, Anne Ustynoski Jan 2019

Life Becoming Hazy: The Withdrawal Of The United States From The Paris Agreement And How The Youth Of America Are Challenging It, Anne Ustynoski

Catholic University Journal of Law and Technology

This Comment covers the ways in which each presidential administration has viewed the United States’ role and responsibilities in combating climate change. It discusses the ways in which the Clean Air Act has evolved and changed, as well as the ways in which the United States has been involved in environmental protection initiatives undertaken by the United Nations. The Comment also examines the ways in which individual states and groups have taken the initiative to combat climate change. Finally, this Comment discusses alternative approaches to combating climate change. For example, it focuses on how youths in America are arguing that …


Warrantless Searches Of Electronic Devices At U.S. Borders: Securing The Nation Or Violating Digital Liberty?, Ahad Khilji Jan 2019

Warrantless Searches Of Electronic Devices At U.S. Borders: Securing The Nation Or Violating Digital Liberty?, Ahad Khilji

Catholic University Journal of Law and Technology

The steady increase of U.S. citizens traveling with smart phones and other electronic devices has been met with the rise of searches and seizures by CBP officers at U.S borders. Although only less than 0.1% of all travelers may actually be subjected to a search while entering the United States, when comparing the statistics between a six month period in 2016 with the same period in 2017, electronic device searches have almost doubled from 8,383 to 14,993. Approximately one million travelers to the U.S. are inspected by the CBP every day. Out of this population, nearly 2,500 electronic devices are …


Privacy Vs. Protection: Why Tracking Mobile-Device Location Data Without A Warrant Requires A Fourth Amendment Exception, Andrew Stover Jan 2018

Privacy Vs. Protection: Why Tracking Mobile-Device Location Data Without A Warrant Requires A Fourth Amendment Exception, Andrew Stover

Catholic University Journal of Law and Technology

No abstract provided.


Enforcing Constitutional Rights Through Computer Code, Steve Young Jan 2018

Enforcing Constitutional Rights Through Computer Code, Steve Young

Catholic University Journal of Law and Technology

Lawmaking and enforcement has advanced since Hammurabi first wrote out his legal code thousands of years ago. Today, the American legal system relies on legislatively-enacted federal, state, county, and municipal legal codes, agency-created regulations, the judge-made common law, and various law enforcement entities. This can be a confusing and complex system of rules and their explanations with varying degrees of enforcement. Blockchain technology is an automatic and efficient alternative to written codes that must be humanly-enforced. There has been limited scholarly interest in the implications of a legal application of blockchain technology to a political system but there have been …


Deepfake Videos: When Seeing Isn't Believing, Holly Kathleen Hall Jan 2018

Deepfake Videos: When Seeing Isn't Believing, Holly Kathleen Hall

Catholic University Journal of Law and Technology

Videos, known as deepfakes, use readily available software to create a work that shows people saying and doing things they may never have uttered or engaged in. The technology making the videos appear very authentic is advancing at such a rate that people may not be able to detect if the videos are fact or fiction. Given the hasty acceptance of other forms of fake news in society, deepfake videos have the ability to affect the nature of information the public receives about candidates and policies. This study examines the potential use of deepfake videos in the democratic process, analyzes …


Changing Governance Models By Applying Blockchain Computing, Steve Young Jan 2018

Changing Governance Models By Applying Blockchain Computing, Steve Young

Catholic University Journal of Law and Technology

No abstract provided.