Fourth Amendment Future: Remote Computer Searches and the Use of Virtual Force
Susan W. Brenner
University of Dayton - School of Law
October 28, 2011
Mississippi Law Journal, Vol. 81, No. 1, 2011
This article examines the Fourth Amendment implications of two tactics that may become part of law enforcement’s efforts to investigate and otherwise control criminal activity. The first is the use of certain types of software, most notably Trojan horse programs, to conduct surreptitious, remote searches of computers and computer media. The other tactic is the use of “virtual force,” e.g., using Distributed Denial of Service and other attacks to shut down or otherwise disable websites that host offending content and/or activities.
Number of Pages in PDF File: 24
Keywords: cybercrime, Fourth Amendment, Trojan horse program, Distributed Denial of Service attack
JEL Classification: K14, K42
Date posted: October 29, 2011 ; Last revised: April 11, 2015
© 2016 Social Science Electronic Publishing, Inc. All Rights Reserved.
This page was processed by apollobot1 in 2.438 seconds