I'm posting an abstract of the article below. If the abstract sounds interesting, you can access the full text of the article (which will be published by the University of Mississippi Law Journal later this year) on SSRN.
Here's an abstract of what it covers:
This article examines the 4th Amendment implications of two tactics that may become part of law enforcement’s efforts to investigate and otherwise control criminal activity. The first is the use of certain types of software, most notably Trojan horse programs, to conduct surreptitious, remote searches of computers and computer media. The other tactic is the use of “virtual force,” e.g., using Distributed Denial of Service and other attacks to shut down or otherwise disable websites that host offending content and/or activities.
No comments:
Post a Comment