12,164 research outputs found

    Carpenter v. United States: How Many Cell Phone Location Points Constitute a Search Under the Fourth Amendment?

    Get PDF
    In Carpenter v. United States, the Supreme Court will decide whether the government’s acquisition of a suspect’s cell site location information (“CSLI”) during an ongoing criminal investigation is a “search” under the Fourth Amendment, and thus requires a showing of probable cause to obtain a warrant. This opinion will have future consequences for Americans and their privacy interests as cell sites continue to be built and CSLI records increasingly contain more private information about cell phone users. This commentary argues that that the necessity of owning and using cell phones renders past tests obsolete. With wavering, subjective expectations of what information is actually private in society today, the Court should thus create a new test that makes a prescriptive claim about expectations of privacy and compares newer technologies with older ones. The Court should hold that obtaining CSLI records without a warrant is an unreasonable search under the Fourth Amendment

    Carpenter v. United States: How Many Cell Phone Location Points Constitute a Search Under the Fourth Amendment?

    Get PDF
    In Carpenter v. United States, the Supreme Court will decide whether the government’s acquisition of a suspect’s cell site location information (“CSLI”) during an ongoing criminal investigation is a “search” under the Fourth Amendment, and thus requires a showing of probable cause to obtain a warrant. This opinion will have future consequences for Americans and their privacy interests as cell sites continue to be built and CSLI records increasingly contain more private information about cell phone users. This commentary argues that that the necessity of owning and using cell phones renders past tests obsolete. With wavering, subjective expectations of what information is actually private in society today, the Court should thus create a new test that makes a prescriptive claim about expectations of privacy and compares newer technologies with older ones. The Court should hold that obtaining CSLI records without a warrant is an unreasonable search under the Fourth Amendment

    Deepfakes: False Pornography Is Here and the Law Cannot Protect You

    Get PDF
    It is now possible for anyone with rudimentary computer skills to create a pornographic deepfake portraying an individual engaging in a sex act that never actually occurred. These realistic videos, called “deepfakes,” use artificial intelligence software to impose a person’s face onto another person’s body. While pornographic deepfakes were first created to produce videos of celebrities, they are now being generated to feature other nonconsenting individuals—like a friend or a classmate. This Article argues that several tort doctrines and recent non-consensual pornography laws are unable to handle published deepfakes of non-celebrities. Instead, a federal criminal statute prohibiting these publications is necessary to deter this activity

    Joint UK Land Environment Simulator (JULES) Version 2.2 User Manual

    Get PDF
    The Joint UK Land Environment Simulator (JULES) is a computer model that simulates many soil and vegetation processes. This document describes how to run version 2.2 of JULES. It primarily describes the format of the input and output files, and does not include detailed descriptions of the science and representation of the processes in the model. The first version of JULES was based on the Met Office Surface Exchange System (MOSES), the land surface model used in the Unified Model (UM) of the UK Met Office. After that initial split, the MOSES and JULES code bases evolved separately, but with JULES2.1 these differences were reconciled, so that all versions since v2.1 have had identical code in both the standalone version (as described here) and in the UM

    Synthesis and characterization of poly[styrene-block-n-butyl methacrylate]

    Get PDF
    Thesis (B.S.)--Massachusetts Institute of Technology, Dept. of Materials Science and Engineering, 1998.Includes bibliographical references (leaf 32).by Douglas J. Harris.B.S

    Fishes of the Mountain Province Section of the Ouachita River

    Get PDF
    A survey of the fishes of the mountain province section of the Ouachita River from the headwaters to Remmel Dam using field collections, literature records, and museum collections showed the ichthyofauna to be made up of 80 species representing 16 families. Fourteen species not previously reported from the mountain province section of the river were collected in this survey. These species include Ichthyomyzon gagei, Nocomis asper, Notropis ortenburgeri, N. rubellus, Pimephales promelas, Moxostoma carinatum, Noturus taylori, Fundulus notatus, Lepomis humilis, Etheostoma histrio, E. proeliare, Percina maculata, P. nasuta, and P. uranidea. The Nocomis specimens were the first collected from the Ouachita River system and the discovery of Noturus taylori represents a major range extension

    Regulation of hepatitis C virus replication via threonine phosphorylation of the NS5A protein

    No full text
    The hepatitis C virus non-structural 5A (NS5A) protein is highly phosphorylated and plays roles in both virus genome replication and assembly of infectious virus particles. NS5A comprises three domains separated by low complexity sequences (LCS). Mass spectrometry analysis of NS5A revealed the existence of a singly phosphorylated tryptic peptide corresponding to the end of LCS I and the beginning of domain II that contained a number of potential phosphorylatable residues (serines and threonines). Here we use a mutagenic approach to investigate the potential role of three of these threonine residues. Phosphomimetic mutations of two of these (T242E and T244E) resulted in significant reductions in virus genome replication and the production of infectious virus, suggesting that the phosphorylation of these residues negatively regulated virus RNA synthesis. Mutation of T245 had no effect, however when T245E was combined with the other two phosphomimetic mutations (TripleE) the inhibitory effect on replication was less pronounced. Effects of the mutations on the ratio of basally/hyperphosphorylated NS5A, together with the apparent molecular weight of the basally phosphorylated species were also observed. Lastly, two of the mutations (T245A and TripleE) resulted in a perinuclear restricted localization of NS5A. These data add further complexity to NS5A phosphorylation and suggest that this analysis be extended outwith the serine-rich cluster within LCS I
    corecore