Open Access. Powered by Scholars. Published by Universities.®

Computer Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 3 of 3

Full-Text Articles in Computer Law

Mlat Jiu-Jitsu And Tor: Mutual Legal Assistance Treaties In Surveillance, Sarah Cortes Jan 2015

Mlat Jiu-Jitsu And Tor: Mutual Legal Assistance Treaties In Surveillance, Sarah Cortes

Richmond Journal of Law & Technology

A corrupt Australian Law Enforcement Agency (LEA) wishes to track the communications of a journalist who has published leaked whistleblowing documents from a confidential source, revealing the Australian LEA's complicity in illegal narcotics activity. The target journalist lives in New York and is a U.S. citizen. She opens her laptop, goes online and fires up Tor Browser. She is communicating with her whistleblowing source in Australia, who faces death if his identity is uncovered. Her communication and network traffic passes through Tor relays in Canada, Finland, and Malaysia before arriving at her source in Australia.


Admissibility Of Non-U.S. Electronic Evidence, Kenneth N. Rashbaum, Matthew F. Knouff, Dominique Murray Jan 2012

Admissibility Of Non-U.S. Electronic Evidence, Kenneth N. Rashbaum, Matthew F. Knouff, Dominique Murray

Richmond Journal of Law & Technology

After two long years collecting hundreds of gigabytes of e-mail, data base reports, and social media posts from countries in Europe, Asia, and South America, such as France, South Korea, Argentina, Canada, Australia, and El Salvador, the day of trial has arrived. The trial team has obtained the data at great cost, in dollars as well as person-hours, but is finally ready for trial. First-chair counsel, second-chair counsel, and four paralegals file into the courtroom, not with bankers boxes full of documents as in earlier times, but with laptops, tablet computers, and a data projector. Following opening statements, the first …


In Search Of A Balance Between Police Power And Privacy In The Cybercrime Treaty, D.C. Kennedy Jan 2002

In Search Of A Balance Between Police Power And Privacy In The Cybercrime Treaty, D.C. Kennedy

Richmond Journal of Law & Technology

Imagine that you wake up one morning, turn on your computer, and open an e-mail message with a catchy phrase in the subject line. Immediately after opening the e-mail’s attachment, your personal computer is severely damaged. Obviously having a bad day, you head to your job as an attorney for a multinational corporation. By the time you arrive at work, there has been damage to company computers across the globe. The monetary costs of the damage, coupled with the downtime, are astronomical. The CEO of your company is furious. You hope to diffuse the situation by informing your boss that …