IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Cyber-Search and Cyber-Seizure: Policy Considerations of Cyber Operations and Fourth Amendment Implications

Cyber-Search and Cyber-Seizure: Policy Considerations of Cyber Operations and Fourth Amendment Implications
View Sample PDF
Author(s): Catherine B. Lotrionte (Georgetown University, USA)
Copyright: 2014
Pages: 44
Source title: Cyber Behavior: Concepts, Methodologies, Tools, and Applications
Source Author(s)/Editor(s): Information Resources Management Association (USA)
DOI: 10.4018/978-1-4666-5942-1.ch025

Purchase

View Cyber-Search and Cyber-Seizure: Policy Considerations of Cyber Operations and Fourth Amendment Implications on the publisher's website for pricing and purchasing information.

Abstract

This chapter discusses the nature of cyber threats against government and private computer systems, describing some steps the government has taken and the challenges involved in protecting those systems. The chapter argues that a national security approach for cyber security policy is the most promising option for preventing these cyber threats while operating within the domestic legal framework. After a review of the President's constitutional authorities to protect the nation from traditional threats, the chapter concludes that the President has some power to monitor Internet communications in transit within the United States when the communications threaten the welfare of the nation. The chapter recommends that this authority be augmented by Congressional action through legislation. The President's powers in cyber security, even given Congressional support, however, are still restrained by the protections the Fourth Amendment provides for traditional forms of communication and individual privacy. Although there is limited Fourth Amendment precedent in the area of cyber security, the well-established exceptions to the Fourth Amendment requirements, based on consent, special governmental needs and the reasonableness of the search or seizure, provide a legal basis for executive branch action to protect critical infrastructures and their computer systems. As the Courts have long held, these exceptions allow the government to conduct searches or seizures without being bound by all of the requirements of the Fourth Amendment. If the government develops its cyber security policy in line with these exceptions, this chapter argues the government can both protect critical computer systems and operate within Fourth Amendment doctrine that recognizes the legitimacy of privacy in electronic communications.

Related Content

Tamara Leigh Wandel. © 2023. 22 pages.
Berceste Gülçin Özdemir. © 2023. 10 pages.
Shalini Ramdeo, Riann Singh. © 2023. 16 pages.
Umut Çıvgın. © 2023. 19 pages.
Kadriye Özyazıcı. © 2023. 20 pages.
Desmond Onyemechi Okocha, Sienne Ozioma Okpor. © 2023. 12 pages.
Nor Hazlina Hashim, Muhammad Emeer Nor Azhar, Marshina Juliza Mohd Hasim, Zaridah Abdullah. © 2023. 16 pages.
Body Bottom