Abstract

http://ssrn.com/abstract=1950703
 
 

Footnotes (151)



 


 



Fourth Amendment Future: Remote Computer Searches and the Use of Virtual Force


Susan W. Brenner


University of Dayton - School of Law

October 28, 2011

Mississippi Law Journal, Vol. 81, No. 1, 2011

Abstract:     
This article examines the Fourth Amendment implications of two tactics that may become part of law enforcement’s efforts to investigate and otherwise control criminal activity. The first is the use of certain types of software, most notably Trojan horse programs, to conduct surreptitious, remote searches of computers and computer media. The other tactic is the use of “virtual force,” e.g., using Distributed Denial of Service and other attacks to shut down or otherwise disable websites that host offending content and/or activities.

Number of Pages in PDF File: 24

Keywords: cybercrime, Fourth Amendment, Trojan horse program, Distributed Denial of Service attack

JEL Classification: K14, K42

Accepted Paper Series


Download This Paper

Date posted: October 29, 2011 ; Last revised: June 14, 2012

Suggested Citation

Brenner, Susan W., Fourth Amendment Future: Remote Computer Searches and the Use of Virtual Force (October 28, 2011). Mississippi Law Journal, Vol. 81, No. 1, 2011. Available at SSRN: http://ssrn.com/abstract=1950703

Contact Information

Susan W. Brenner (Contact Author)
University of Dayton - School of Law ( email )
300 College Park
Dayton, OH 45469
United States
937-229-2929 (Phone)
937-229-2469 (Fax)
Feedback to SSRN


Paper statistics
Abstract Views: 1,677
Downloads: 314
Download Rank: 51,736
Footnotes:  151

© 2014 Social Science Electronic Publishing, Inc. All Rights Reserved.  FAQ   Terms of Use   Privacy Policy   Copyright   Contact Us
This page was processed by apollo8 in 0.391 seconds