Open Access. Powered by Scholars. Published by Universities.®
The Catholic University of America, Columbus School of Law
- Keyword
-
- First Amendment (3)
- Privacy (3)
- Artificial intelligence (2)
- Blockchain (2)
- Due Process (2)
-
- Fourth Amendment (2)
- Smart contracts (2)
- Technology (2)
- 3D file (1)
- 3D firearm (1)
- 3D gun (1)
- 3D printable file (1)
- 4th Amendment (1)
- 5th Amendment (1)
- ACLU (1)
- AI (1)
- Administration (1)
- All Writs Act (1)
- Apple (1)
- Apple Inc. (1)
- Assisted Reproductive Technology (1)
- BCI (1)
- Border (1)
- Border search (1)
- Braincomputerinterfacing (1)
- CALEA (1)
- CBP (1)
- CRISPR (1)
- CSLI (1)
- Carpenter v. United States (1)
Articles 1 - 15 of 15
Full-Text Articles in Law
Playing God In The 21st Century: How The Push For Human Embryonic Germline Gene Editing Sidelines Individual And Generational Autonomy, Anna E. Melo
Catholic University Journal of Law and Technology
Every four and a half minutes a child with a genetic birth defect is born in the United States. For some, these conditions are treatable and manageable, but sadly for others, they are a death sentence. Congenital malformations and chromosomal abnormalities are the leading cause of infant mortality. CRISPR-Cas9 presents hope for the future, a liberation from the heritable genetic shackles that a child would otherwise be trapped in. With such optimism for future applications of germline gene editing, there are also great concerns with what national and global limitations and auditing must be in place to permit “genetic hedging.” …
Airdropping Justice: The Constitutionality Of Service Of Process Via Non-Fungible Token, Jenifer Jackson
Airdropping Justice: The Constitutionality Of Service Of Process Via Non-Fungible Token, Jenifer Jackson
Catholic University Journal of Law and Technology
No abstract provided.
The Negative Impact Of Service Member And Veteran Post Traumatic Stress Disorder (Ptsd) Rating Or Specter Of Ptsd On Child Custody Arrangements, Erhan Bedestani
The Negative Impact Of Service Member And Veteran Post Traumatic Stress Disorder (Ptsd) Rating Or Specter Of Ptsd On Child Custody Arrangements, Erhan Bedestani
Catholic University Journal of Law and Technology
No abstract provided.
Passcodes, Protection, And Legal Practicality: The Necessity Of A Digital Fifth Amendment, Ethan Swierczewski
Passcodes, Protection, And Legal Practicality: The Necessity Of A Digital Fifth Amendment, Ethan Swierczewski
Catholic University Journal of Law and Technology
No abstract provided.
Moving From Harm Mitigation To Affirmative Discrimination Mitigation: The Untapped Potential Of Artificial Intelligence To Fight School Segregation And Other Forms Of Racial Discrimination, Andrew Gall
Catholic University Journal of Law and Technology
No abstract provided.
Brain-Computer-Interfacing & Respondeat Superior: Algorithmic Decisions, Manipulation, And Accountability In Armed Conflict, Salahudin Ali
Brain-Computer-Interfacing & Respondeat Superior: Algorithmic Decisions, Manipulation, And Accountability In Armed Conflict, Salahudin Ali
Catholic University Journal of Law and Technology
This article examines the impact that brain-computer-interfacing platforms will have on the international law of armed conflict’s respondeat superior legal regime. Major Ali argues that the connection between the human brain and this nascent technology’s underlying technology of artificial intelligence and machine learning will serve as a disruptor to the traditional mental prerequisites required to impart culpability and liability on commanders for actions of their troops. Anticipating that BCI will become increasingly ubiquitous, Major Ali’s article offers frameworks for solution to BCI’s disruptive potential to the internal law of armed conflict.
Protecting Online Privacy In The Digital Age: Carpenter V. United States And The Fourth Amendment’S Third-Party Doctrine, Cristina Del Rosso, Carol M. Bast
Protecting Online Privacy In The Digital Age: Carpenter V. United States And The Fourth Amendment’S Third-Party Doctrine, Cristina Del Rosso, Carol M. Bast
Catholic University Journal of Law and Technology
The goal of this paper is to examine the future of the third-party doctrine with the proliferation of technology and the online data we are surrounded with daily, specifically after the Supreme Court’s decision in Carpenter v. United States. It is imperative that individuals do not forfeit their Constitutional guarantees for the benefit of living in a technologically advanced society. This requires an understanding of the modern-day functional equivalents of “papers” and “effects.”
Looking to the future, this paper contemplates solutions on how to move forward in this technology era by scrutinizing the relevancy of the third-party doctrine due …
The Department Of Justice Versus Apple Inc. -- The Great Encryption Debate Between Privacy And National Security, Julia P. Eckart
The Department Of Justice Versus Apple Inc. -- The Great Encryption Debate Between Privacy And National Security, Julia P. Eckart
Catholic University Journal of Law and Technology
This article is an attempt to objectively examine and assess legal arguments made by Apple Inc. (Apple) and the Department of Justice (DOJ) concerning the DOJ’s use of the All Writs Act[1] (AWA) to require Apple to provide technical assistance to the DOJ so that it could access the encrypted data from the locked iPhone of Syed Rizwan Farook, commonly referred to as the San Bernardino shooter. The DOJ’s initial ex parte application focused on meeting the requirements of United States v. New York Telephone Co.[2] concluding the court order was authorized and appropriate. Apple not only argued …
The Itunes Of Downloadable Guns: Firearms As A First Amendment Right, Sandra Sawan Lara
The Itunes Of Downloadable Guns: Firearms As A First Amendment Right, Sandra Sawan Lara
Catholic University Journal of Law and Technology
As society becomes more technology driven, legal issues continue to arise around the world. From privacy to national security, technology develops at a rate the law simply cannot keep up with. In the United States, one of the biggest legal issues is how the new risks technology brings will interfere with our individual liberties.
Technologies like three-dimensional (“3D”) printing have transformed everything from lifesaving surgeries to gun manufacturing. This technology has led to a whole new way of communicating via computer coding, with the online open source movement leading innovation by allowing for the sharing and editing of files freely. …
Life Becoming Hazy: The Withdrawal Of The United States From The Paris Agreement And How The Youth Of America Are Challenging It, Anne Ustynoski
Life Becoming Hazy: The Withdrawal Of The United States From The Paris Agreement And How The Youth Of America Are Challenging It, Anne Ustynoski
Catholic University Journal of Law and Technology
This Comment covers the ways in which each presidential administration has viewed the United States’ role and responsibilities in combating climate change. It discusses the ways in which the Clean Air Act has evolved and changed, as well as the ways in which the United States has been involved in environmental protection initiatives undertaken by the United Nations. The Comment also examines the ways in which individual states and groups have taken the initiative to combat climate change. Finally, this Comment discusses alternative approaches to combating climate change. For example, it focuses on how youths in America are arguing that …
Warrantless Searches Of Electronic Devices At U.S. Borders: Securing The Nation Or Violating Digital Liberty?, Ahad Khilji
Warrantless Searches Of Electronic Devices At U.S. Borders: Securing The Nation Or Violating Digital Liberty?, Ahad Khilji
Catholic University Journal of Law and Technology
The steady increase of U.S. citizens traveling with smart phones and other electronic devices has been met with the rise of searches and seizures by CBP officers at U.S borders. Although only less than 0.1% of all travelers may actually be subjected to a search while entering the United States, when comparing the statistics between a six month period in 2016 with the same period in 2017, electronic device searches have almost doubled from 8,383 to 14,993. Approximately one million travelers to the U.S. are inspected by the CBP every day. Out of this population, nearly 2,500 electronic devices are …
Privacy Vs. Protection: Why Tracking Mobile-Device Location Data Without A Warrant Requires A Fourth Amendment Exception, Andrew Stover
Privacy Vs. Protection: Why Tracking Mobile-Device Location Data Without A Warrant Requires A Fourth Amendment Exception, Andrew Stover
Catholic University Journal of Law and Technology
No abstract provided.
Enforcing Constitutional Rights Through Computer Code, Steve Young
Enforcing Constitutional Rights Through Computer Code, Steve Young
Catholic University Journal of Law and Technology
Lawmaking and enforcement has advanced since Hammurabi first wrote out his legal code thousands of years ago. Today, the American legal system relies on legislatively-enacted federal, state, county, and municipal legal codes, agency-created regulations, the judge-made common law, and various law enforcement entities. This can be a confusing and complex system of rules and their explanations with varying degrees of enforcement. Blockchain technology is an automatic and efficient alternative to written codes that must be humanly-enforced. There has been limited scholarly interest in the implications of a legal application of blockchain technology to a political system but there have been …
Deepfake Videos: When Seeing Isn't Believing, Holly Kathleen Hall
Deepfake Videos: When Seeing Isn't Believing, Holly Kathleen Hall
Catholic University Journal of Law and Technology
Videos, known as deepfakes, use readily available software to create a work that shows people saying and doing things they may never have uttered or engaged in. The technology making the videos appear very authentic is advancing at such a rate that people may not be able to detect if the videos are fact or fiction. Given the hasty acceptance of other forms of fake news in society, deepfake videos have the ability to affect the nature of information the public receives about candidates and policies. This study examines the potential use of deepfake videos in the democratic process, analyzes …
Changing Governance Models By Applying Blockchain Computing, Steve Young
Changing Governance Models By Applying Blockchain Computing, Steve Young
Catholic University Journal of Law and Technology
No abstract provided.