Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

William & Mary Law School

2017

Discipline
Keyword
Publication
Publication Type

Articles 1 - 30 of 229

Full-Text Articles in Law

The Unreasonable Rise Of Reasonable Suspicion: Terrorist Watchlists And Terry V. Ohio, Jeffrey Kahn Dec 2017

The Unreasonable Rise Of Reasonable Suspicion: Terrorist Watchlists And Terry V. Ohio, Jeffrey Kahn

William & Mary Bill of Rights Journal

Terry v. Ohio’s “reasonable suspicion” test was created in the context of domestic law enforcement, but it did not remain there. This Essay examines the effect of transplanting this test into a new context: the world of terrorist watchlists. In this new context, reasonable suspicion is the standard used to authorize the infringement on liberty that often results from being watchlisted. But nothing else from the case that created that standard remains the same. The government official changes from a local police officer to an anonymous member of the intelligence community. The purpose changes from crime prevention to counterterrorism. …


Private Actors, Corporate Data And National Security: What Assistance Do Tech Companies Owe Law Enforcement?, Caren Morrison Dec 2017

Private Actors, Corporate Data And National Security: What Assistance Do Tech Companies Owe Law Enforcement?, Caren Morrison

William & Mary Bill of Rights Journal

When the government investigates a crime, do citizens have a duty to assist? This question was raised in the struggle between Apple and the FBI over whether the agency could compel Apple to defeat its own password protections on the iPhone of one of the San Bernardino shooters. That case was voluntarily dismissed as moot when the government found a way of accessing the data on the phone, but the issue remains unresolved.

Because of advances in technology, software providers and device makers have been able to develop almost impenetrable protection for their customers’ information, effectively locking law enforcement out …


Carpenter V. United States And The Fourth Amendment: The Best Way Forward, Stephen E. Henderson Dec 2017

Carpenter V. United States And The Fourth Amendment: The Best Way Forward, Stephen E. Henderson

William & Mary Bill of Rights Journal

We finally have a federal ‘test case.’ In Carpenter v. United States, the Supreme Court is poised to set the direction of the Fourth Amendment in the digital age. The case squarely presents how the twentieth-century third party doctrine will fare in contemporary times, and the stakes could not be higher. This Article reviews the Carpenter case and how it fits within the greater discussion of the Fourth Amendment third party doctrine and location surveillance, and I express a hope that the Court will be both a bit ambitious and a good measure cautious.

As for ambition, the Court …


The Fourth Amendment Disclosure Doctrines, Monu Bedi Dec 2017

The Fourth Amendment Disclosure Doctrines, Monu Bedi

William & Mary Bill of Rights Journal

The third party and public disclosure doctrines (together the “disclosure doctrines”) are long-standing hurdles to Fourth Amendment protection. These doctrines have become increasingly relevant to assessing the government’s use of recent technologies such as data mining, drone surveillance, and cell site location data. It is surprising then that both the Supreme Court and scholars, at times, have associated them together as expressing one principle. It turns out that each relies on unique foundational triggers and does not stand or fall with the other. This Article tackles this issue and provides a comprehensive topology for analyzing the respective contours of each …


Touch Dna And Chemical Analysis Of Skin Trace Evidence: Protecting Privacy While Advancing Investigations, Mary Graw Leary Dec 2017

Touch Dna And Chemical Analysis Of Skin Trace Evidence: Protecting Privacy While Advancing Investigations, Mary Graw Leary

William & Mary Bill of Rights Journal

This Article addresses touch DNA, chemical analysis of skin traces, and the implications for crime scene investigation, arguing that changes in how trace evidence is analyzed require alterations in the law’s approach to its use. Part I discusses the history of traditional DNA analysis. Part II examines the emergence of touch DNA and related technologies and how they differ from traditional DNA analysis. Part III outlines the specific risks created by the collection and storing of results under the current outdated jurisprudence. Part IV focuses on specific risks to suspects and victims of crime. Part V proposes a legal framework …


Feeding The Machine: Policing, Crime Data, & Algorithms, Elizabeth E. Joh Dec 2017

Feeding The Machine: Policing, Crime Data, & Algorithms, Elizabeth E. Joh

William & Mary Bill of Rights Journal

No abstract provided.


The Investigative Dynamics Of The Use Of Malware By Law Enforcement, Paul Ohm Dec 2017

The Investigative Dynamics Of The Use Of Malware By Law Enforcement, Paul Ohm

William & Mary Bill of Rights Journal

The police have started to use malware—and other forms of government hacking—to solve crimes. Some fear coming abuses—the widespread use of malware when traditional investigative techniques would work just as well or to investigate political opponents or dissident speakers. This Article argues that these abuses will be checked, at least in part, by the very nature of malware and the way it must be controlled. This analysis utilizes a previously unformalized research methodology called “investigative dynamics” to come to these conclusions. Because every use of malware risks spoiling the tool—by revealing a software vulnerability that can be patched—the police will …


Encryption, Asymmetric Warfare, And The Need For Lawful Access, Geoffrey S. Corn Dec 2017

Encryption, Asymmetric Warfare, And The Need For Lawful Access, Geoffrey S. Corn

William & Mary Bill of Rights Journal

No abstract provided.


Horizontal Cybersurveillance Through Sentiment Analysis, Margaret Hu Dec 2017

Horizontal Cybersurveillance Through Sentiment Analysis, Margaret Hu

William & Mary Bill of Rights Journal

This Essay describes emerging big data technologies that facilitate horizontal cybersurveillance. Horizontal cybersurveillance makes possible what has been termed as “sentiment analysis.” Sentiment analysis can be described as opinion mining and social movement forecasting. Through sentiment analysis, mass cybersurveillance technologies can be deployed to detect potential terrorism and state conflict, predict protest and civil unrest, and gauge the mood of populations and subpopulations. Horizontal cybersurveillance through sentiment analysis has the likely result of chilling expressive and associational freedoms, while at the same time risking mass data seizures and searches. These programs, therefore, must be assessed as adversely impacting a combination …


Notice And Standing In The Fourth Amendment: Searches Of Personal Data, Jennifer Daskal Dec 2017

Notice And Standing In The Fourth Amendment: Searches Of Personal Data, Jennifer Daskal

William & Mary Bill of Rights Journal

In at least two recent cases, courts have rejected service providers’ capacity to raise Fourth Amendment claims on behalf of their customers. These holdings rely on longstanding Supreme Court doctrine establishing a general rule against third parties asserting the Fourth Amendment rights of others. However, there is a key difference between these two recent cases and those cases on which the doctrine rests. The relevant Supreme Court doctrine stems from situations in which someone could take action to raise the Fourth Amendment claim, even if the particular third-party litigant could not. In the situations presented by the recent cases, by …


Incarcerated And Unrepresented: Prison-Based Gerrymandering And Why Evenwel’S Approval Of “Total Population” As A Population Base Shouldn’T Include Incarcerated Populations, Emily J. Heltzel Dec 2017

Incarcerated And Unrepresented: Prison-Based Gerrymandering And Why Evenwel’S Approval Of “Total Population” As A Population Base Shouldn’T Include Incarcerated Populations, Emily J. Heltzel

William & Mary Bill of Rights Journal

No abstract provided.


Protecting The Silence Of Speech: Academic Safe Spaces, The Free Speech Critique, And The Solution Of Free Association, Trevor N. Ward Dec 2017

Protecting The Silence Of Speech: Academic Safe Spaces, The Free Speech Critique, And The Solution Of Free Association, Trevor N. Ward

William & Mary Bill of Rights Journal

No abstract provided.


It's Still Too Easy To Push Blacks, Minorities Off Of Juries, Jeffrey Bellin Dec 2017

It's Still Too Easy To Push Blacks, Minorities Off Of Juries, Jeffrey Bellin

Popular Media

No abstract provided.


Were The 1982 Merger Guidelines Old News?, Alan J. Meese, Sarah L. Stafford Dec 2017

Were The 1982 Merger Guidelines Old News?, Alan J. Meese, Sarah L. Stafford

Faculty Publications

This paper examines the impact of the 1982 Department of Justice Merger Guidelines on the stock market prices of publicly traded firms in the United States. We argue that those Guidelines were perceived by the market as a real change in enforcement policy that would result in substantial deregulation of mergers throughout the economy. We conduct an event study of S&P 500 firms to test this hypothesis and find evidence of a significant positive effect on the stock prices of firms in moderately concentrated industries subject to antitrust regulation, the firms for which the 1982 Guidelines articulate a substantially less …


One Good Plaintiff Is Not Enough, Aaron-Andrew P. Bruhl Dec 2017

One Good Plaintiff Is Not Enough, Aaron-Andrew P. Bruhl

Faculty Publications

This Article concerns an aspect of Article III standing that has played a role in many of the highest-profile controversies of recent years, including litigation over the Affordable Care Act, immigration policy, and climate change. Although the federal courts constantly emphasize the importance of ensuring that only proper plaintiffs invoke the federal judicial power, the Supreme Court and other federal courts have developed a significant exception to the usual requirement of standing. This exception holds that a court entertaining a multiple-plaintiff case may dispense with inquiring into the standing of each plaintiff as long as the court finds that one …


Justice Scalia's Other Standing Legacy, Tara Leigh Grove Dec 2017

Justice Scalia's Other Standing Legacy, Tara Leigh Grove

Faculty Publications

No abstract provided.


Orwell's 1984 And A Fourth Amendment Cybersurveillance Nonintrusion Test, Margaret Hu Dec 2017

Orwell's 1984 And A Fourth Amendment Cybersurveillance Nonintrusion Test, Margaret Hu

Faculty Publications

This Article describes a cybersurveillance nonintrusion test under the Fourth Amendment that is grounded in evolving customary law to replace the reasonable expectation of privacy test formulated in Katz v. United States. To illustrate how customary law norms are shaping modern Fourth Amendment jurisprudence, this Article examines the recurrence of judicial references to George Orwell’s novel, 1984, within the Fourth Amendment context when federal courts have assessed the constitutionality of modern surveillance methods. The Supreme Court has indicated that the Fourth Amendment privacy doctrine must now evolve to impose meaningful limitations on the intrusiveness of new surveillance technologies. …


Report To The Governor And The Chairmen Of The House Committee On Agriculture, Chesapeake And Natural Resources And The Senate Committee On Agriculture, Conservation And Natural Resources, Pursuant To House Bill 1774, Commonwealth Center For Recurrent Flooding Resiliency Dec 2017

Report To The Governor And The Chairmen Of The House Committee On Agriculture, Chesapeake And Natural Resources And The Senate Committee On Agriculture, Conservation And Natural Resources, Pursuant To House Bill 1774, Commonwealth Center For Recurrent Flooding Resiliency

Virginia Coastal Policy Center

This report was required by House Bill 1774 (2017), in which the General Assembly requested that the Commonwealth Center for Recurrent Flooding Resiliency convene a workgroup to study the administration of the Commonwealth’s current stormwater management program, as well as the potential treatment and use of water in roadside ditches in rural, Tidewater Virginia localities.

Under the Virginia Stormwater Management Act, the Department of Environmental Quality administers stormwater management requirements for any localities that opt out of becoming a Virginia Stormwater Management Program authority, but only for land disturbances of one acre or more that are covered by the Virginia …


Crowdfunding Signals, Darian M. Ibrahim Nov 2017

Crowdfunding Signals, Darian M. Ibrahim

Popular Media

No abstract provided.


Protests In Peril, Timothy Zick Nov 2017

Protests In Peril, Timothy Zick

Faculty Publications

No abstract provided.


Walking While Trans: Profiling Of Transgender Women By Law Enforcement, And The Problem Of Proof, Leonore F. Carpenter, R. Barrett Marshall Nov 2017

Walking While Trans: Profiling Of Transgender Women By Law Enforcement, And The Problem Of Proof, Leonore F. Carpenter, R. Barrett Marshall

William & Mary Journal of Race, Gender, and Social Justice

No abstract provided.


The Violent State: Black Women's Invisible Struggle Against Police Violence, Michelle S. Jacobs Nov 2017

The Violent State: Black Women's Invisible Struggle Against Police Violence, Michelle S. Jacobs

William & Mary Journal of Race, Gender, and Social Justice

No abstract provided.


There And Back Again? Police Reforms Through The Prism Of The Recruitment Decisions In The High Court And The Court Of Appeal, Festus M. Kinoti Nov 2017

There And Back Again? Police Reforms Through The Prism Of The Recruitment Decisions In The High Court And The Court Of Appeal, Festus M. Kinoti

William & Mary Journal of Race, Gender, and Social Justice

No abstract provided.


Nevertheless She Persisted: From Mrs. Bradwell To Annalise Keating, Gender Bias In The Courtroom, Chris Chambers Goodman Nov 2017

Nevertheless She Persisted: From Mrs. Bradwell To Annalise Keating, Gender Bias In The Courtroom, Chris Chambers Goodman

William & Mary Journal of Race, Gender, and Social Justice

No abstract provided.


When Fame Takes Away The Right To Privacy In One's Body: Revenge Porn And Tort Remedies For Public Figures, Caroline Drinnon Nov 2017

When Fame Takes Away The Right To Privacy In One's Body: Revenge Porn And Tort Remedies For Public Figures, Caroline Drinnon

William & Mary Journal of Race, Gender, and Social Justice

No abstract provided.


Reforming Prison Policy To Improve Women-Specific Health And Sanitary Care Conditions Of Prisons In Ethiopia, Behailu T. Weldeyohannes Nov 2017

Reforming Prison Policy To Improve Women-Specific Health And Sanitary Care Conditions Of Prisons In Ethiopia, Behailu T. Weldeyohannes

William & Mary Journal of Race, Gender, and Social Justice

No abstract provided.


Pink Hats And Black Fists: The Role Of Women In The Black Lives Matter Movement, Jessica Watters Nov 2017

Pink Hats And Black Fists: The Role Of Women In The Black Lives Matter Movement, Jessica Watters

William & Mary Journal of Race, Gender, and Social Justice

No abstract provided.


Maximizing Ponzi Loss Deductions For Estate And Income Tax Purposes: Are Taxpayers Better Off Dead?, Valrie Chambers, Brian Elzweig Nov 2017

Maximizing Ponzi Loss Deductions For Estate And Income Tax Purposes: Are Taxpayers Better Off Dead?, Valrie Chambers, Brian Elzweig

William & Mary Business Law Review

There is a long history of cases interpreting whether a theft loss deduction for securities fraud is allowable for personal income taxes. The cases require that for a theft loss to be actionable as such, it would have to meet the requirements of the common law definition of theft in the U.S. state in which it occurred. This generally requires direct privity between the person claiming the loss and the person who committed the theft. Because most securities transactions are brokered, the direct privity is lost and a theft loss deduction is denied in favor a capital loss. Recently, in …


How Much Is “Substantial Evidence” And How Big Is A “Significant Gap”?: The Telecommunications Attorney Full Employment Act, Susan Lorde Martin Nov 2017

How Much Is “Substantial Evidence” And How Big Is A “Significant Gap”?: The Telecommunications Attorney Full Employment Act, Susan Lorde Martin

William & Mary Business Law Review

The late U.S. Supreme Court Justice Antonin Scalia described the Telecommunications Act of 1996 as “a model of ambiguity or indeed even self-contradiction.” Legal wags have also described the Act as the Telecommunications Attorney Full Employment Act. Twenty years after the Act became law, it is still being interpreted by courts all over the country and costing taxpayers millions of dollars as local governments defend their telecom decisions in lawsuits. The Act’s basic notion was to allow local zoning authorities to maintain their control over their territories with a few new limitations that would encourage cell phone service companies to …


Can Taxes Mitigate Corporate Governance Inefficiencies?, Noam Noked Nov 2017

Can Taxes Mitigate Corporate Governance Inefficiencies?, Noam Noked

William & Mary Business Law Review

Policymakers have long viewed tax policy as an instrument to influence and change corporate governance practices. Certain tax rules were enacted to discourage pyramidal business structures and large golden parachutes, and to encourage performance-based compensation. Other proposals, such as imposing higher taxes on excessive executive compensation, have also attracted increasing attention.

Contrary to this view, this Article contends that the ability to effectively mitigate corporate governance inefficiencies through the use of corrective taxes is very limited, and that these taxes may cause more harm than benefit. There are a few reasons for the limited effectiveness of corrective taxes. Importantly, the …