Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Australian Law Enforcement Agency (1)
- Boston College Trustees (1)
- CMA (1)
- CSP (1)
- Communication service providers (1)
-
- Computer Misuse Act (1)
- Council of Europe (1)
- ESI (1)
- ETSI (1)
- Edward Snowden (1)
- Electronically stored information (1)
- Escriba v. Foster Poultry Farms (1)
- European Telecommunications Standards Institute (1)
- FRE (1)
- Federal Rule of Evidence (1)
- Foreword Magazine v. Overdrive (1)
- GILC (1)
- Getto (1)
- Global Internet Liberty Campaign (1)
- I LOVE YOU virus (1)
- ICCPR (1)
- ISPs (1)
- In re Commissioner's Subpoenas (1)
- In re Vee Vinhnee (1)
- International Covenant on Civil and Political Rights (1)
- LEA (1)
- Lorraine v. Markel Insurance Co (1)
- MLAT (1)
- Manual for Complex Litigation (1)
- Mutual Legal Assistance Treaty (1)
Articles 1 - 3 of 3
Full-Text Articles in Computer Law
Mlat Jiu-Jitsu And Tor: Mutual Legal Assistance Treaties In Surveillance, Sarah Cortes
Mlat Jiu-Jitsu And Tor: Mutual Legal Assistance Treaties In Surveillance, Sarah Cortes
Richmond Journal of Law & Technology
A corrupt Australian Law Enforcement Agency (LEA) wishes to track the communications of a journalist who has published leaked whistleblowing documents from a confidential source, revealing the Australian LEA's complicity in illegal narcotics activity. The target journalist lives in New York and is a U.S. citizen. She opens her laptop, goes online and fires up Tor Browser. She is communicating with her whistleblowing source in Australia, who faces death if his identity is uncovered. Her communication and network traffic passes through Tor relays in Canada, Finland, and Malaysia before arriving at her source in Australia.
Admissibility Of Non-U.S. Electronic Evidence, Kenneth N. Rashbaum, Matthew F. Knouff, Dominique Murray
Admissibility Of Non-U.S. Electronic Evidence, Kenneth N. Rashbaum, Matthew F. Knouff, Dominique Murray
Richmond Journal of Law & Technology
After two long years collecting hundreds of gigabytes of e-mail, data base reports, and social media posts from countries in Europe, Asia, and South America, such as France, South Korea, Argentina, Canada, Australia, and El Salvador, the day of trial has arrived. The trial team has obtained the data at great cost, in dollars as well as person-hours, but is finally ready for trial. First-chair counsel, second-chair counsel, and four paralegals file into the courtroom, not with bankers boxes full of documents as in earlier times, but with laptops, tablet computers, and a data projector. Following opening statements, the first …
In Search Of A Balance Between Police Power And Privacy In The Cybercrime Treaty, D.C. Kennedy
In Search Of A Balance Between Police Power And Privacy In The Cybercrime Treaty, D.C. Kennedy
Richmond Journal of Law & Technology
Imagine that you wake up one morning, turn on your computer, and open an e-mail message with a catchy phrase in the subject line. Immediately after opening the e-mail’s attachment, your personal computer is severely damaged. Obviously having a bad day, you head to your job as an attorney for a multinational corporation. By the time you arrive at work, there has been damage to company computers across the globe. The monetary costs of the damage, coupled with the downtime, are astronomical. The CEO of your company is furious. You hope to diffuse the situation by informing your boss that …