Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Series

School of Law Faculty Publications

Criminal Law

Articles 1 - 9 of 9

Full-Text Articles in Law

The Challenges Of Preventing And Prosecuting Social Media Crimes, Thaddeus A. Hoffmeister Sep 2014

The Challenges Of Preventing And Prosecuting Social Media Crimes, Thaddeus A. Hoffmeister

School of Law Faculty Publications

Wanted: Caretaker For Farm. Simply watch over a 688 acre patch of hilly farmland and feed a few cows, you get 300 a week and a nice 2 bedroom trailer, someone older and single preferred but will consider all, relocation a must, you must have a clean record and be trustworthy—this is a permanent position, the farm is used mainly as a hunting preserve, is overrun with game, has a stocked 3 acre pond, but some beef cattle will be kept, nearest neighbor is a mile away, the place is secluded and beautiful, it will be a real get away …


Getting Beyond Intuition In The Probable Cause Inquiry, Erica Goldberg Jan 2013

Getting Beyond Intuition In The Probable Cause Inquiry, Erica Goldberg

School of Law Faculty Publications

Courts are proudly resigned to the fact that the probable cause inquiry is “nontechnical.” In order to conduct a search or make an arrest, police need to satisfy the probable cause standard, which the Supreme Court has deemed “incapable of precise definition or quantification into percentages.” The flexibility of this elusive standard enables courts to defer to police officers’ reasonable judgments and expert intuitions in unique situations. However, police officers are increasingly using investigative techniques that replace their own observational skills with test results from some other source, such as drug sniffing dogs, facial recognition technology, and DNA matching. The …


Cybercrime And The Law: Challenges, Issues, And Outcomes, Susan W. Brenner Nov 2012

Cybercrime And The Law: Challenges, Issues, And Outcomes, Susan W. Brenner

School of Law Faculty Publications

The exponential increase in cybercrimes in the past decade has raised new issues and challenges for law and law enforcement. Based on case studies drawn from her work as a lawyer, Susan W. Brenner identifies a diverse range of cybercrimes, including crimes that target computers (viruses, worms, Trojan horse programs, malware and DDoS attacks) and crimes in which the computer itself is used as a tool (cyberstalking, cyberextortion, cybertheft, and embezzlement). Illuminating legal issues unique to investigations in a digital environment, Brenner examines both national law enforcement agencies and transnational crime, and shows how cyberspace erodes the functional and empirical …


Cybercrime: Criminal Threats From Cyberspace, Susan W. Brenner Feb 2010

Cybercrime: Criminal Threats From Cyberspace, Susan W. Brenner

School of Law Faculty Publications

Cybercrime: Criminal Threats from Cyberspace is intended to explain two things: what cybercrime is and why the average citizen should care about it. To accomplish that task, the book offers an overview of cybercrime and an in-depth discussion of the legal and policy issues surrounding it.

Enhancing her narrative with real-life stories, author Susan W. Brenner traces the rise of cybercrime from mainframe computer hacking in the 1950s to the organized, professional, and often transnational cybercrime that has become the norm in the 21st century. She explains the many different types of computer-facilitated crime, including identity theft, stalking, extortion, and …


Cyberthreats: The Emerging Fault Lines Of The Nation State, Susan W. Brenner Jan 2009

Cyberthreats: The Emerging Fault Lines Of The Nation State, Susan W. Brenner

School of Law Faculty Publications

As new technologies develop, terrorist groups are developing new methods of attack by using the Internet, and by using cyberspace as a battlefield, it has become increasingly difficult to discover the identity of attackers and bring them to justice. The seemingly limitless boundaries of cyberspace have allowed virtually anyone to launch an attack from a remote and anonymous location. But once these attacks occur, it raises several important questions. Who should respond, and how? How should nation-states effectively deal with a cyber-attack? Will the United States and other nation-states be able to survive in a world where virtual boundaries are …


Fantasy Crime: The Role Of Criminal Law In Virtual Worlds, Susan W. Brenner Oct 2008

Fantasy Crime: The Role Of Criminal Law In Virtual Worlds, Susan W. Brenner

School of Law Faculty Publications

This article analyzes activity in virtual worlds that would constitute crime if they were committed in the real world. It reviews the evolution of virtual worlds like Second Life and notes research which indicates that more and more of our lives will move into this realm. The article then analyzes the criminalization of virtual conduct that inflicts “harm” in the real world and virtual conduct that only inflicts “harm” in the virtual world. It explains that the first category qualifies as cybercrime and can be prosecuted under existing law. Finally, it analyzes the necessity and propriety of criminalizing the second …


The Grand Jury Legal Advisor: Resurrecting The Grand Jury’S Shield, Thaddeus A. Hoffmeister Jul 2008

The Grand Jury Legal Advisor: Resurrecting The Grand Jury’S Shield, Thaddeus A. Hoffmeister

School of Law Faculty Publications

This Article advocates for the creation of a Grand Jury Legal Advisor (GJLA) to resurrect the historical autonomy of grand juries. The Article draws upon Hawaii's experiences with the GJLA, and incorporates survey responses from a representative sample of former GJLAs.

The Article begins with a general and historical overview of the grand jury process. This portion of the Article demonstrates how all three branches of government have contributed to the diminishment of the powers of grand jurors. Part IV of this Article discusses the important policy rationales underlying the need for grand jury autonomy; Part V recommends the implementation …


Toward A Criminal Law For Cyberspace: A New Model Of Law Enforcement?, Susan W. Brenner Jan 2004

Toward A Criminal Law For Cyberspace: A New Model Of Law Enforcement?, Susan W. Brenner

School of Law Faculty Publications

This article argues that one consequence of the increasing proliferation of computer technology and the attendant migration of human activities, including illegal activities, into cyberspace is that the efficacy of our traditional approach to enforcing the criminal law is eroding. (1) As Section II explains, it is already apparent that the traditional model is not an effective means of dealing with cybercrime, i.e., crime the commission of which entails the use of computer technology. (2)

We are therefore seeing the emergence of an alternative approach to law enforcement, (3) one that emphasizes collaboration between the public and private sectors and …


Toward A Criminal Law For Cyberspace: Distributed Security, Susan W. Brenner Jan 2004

Toward A Criminal Law For Cyberspace: Distributed Security, Susan W. Brenner

School of Law Faculty Publications

Cybercrime creates unique challenges for the reactive model of crime control that has been predominant for approximately the last century and a half. That model makes certain assumptions about crime, which derive from characteristics of real-world crime. These assumptions do not hold for cybercrime, so the reactive model is not an appropriate means of dealing with online crime. The article explains how modified principles of criminal law can be utilized to implement a new, non-reactive model which can deal effectively with cybercrime. This model of distributed security emphasizes prevention, rather than reaction, which is achieved by holding citizens liable for …