The cyberthreat, government network operations, and the Fourth Amendment
Goldsmith, Jack L.
Brookings Institution, Governance Studies
Extent: 17 p. : digital, PDF.
Cover title ; title from screen (viewed 12/10/10).; "December 08, 2010."; Includes bibliographical references; Harvested from http://www.brookings.edu/~/media/Files/rc/papers/2010/1208_4th_amendment_goldsmith/1208_4th_amendment_goldsmith.pdf on July 7, 2011.
Abstract: To meet the threat of a cyber attack, Jack Goldsmith imagines that sometime in the near future the government mandates the use of a government-coordinated intrusion-prevention system throughout the domestic network to monitor all communications, including private ones. Although such a program would be controversial, Goldsmith argues that massive government snooping in the network can be lawful and deemed consistent with the U.S. Constitution, including the Fourth Amendment, if proper and credible safeguards are put in place. -- publishers' website
United States. Constitution. 4th Amendment
Privacy, Right of--United States
Cyberterrorism--Prevention--Law and legislation--United States
Computer networks--Security measures--Government policy--United States
Constitutional law--United States
Mode of access: World Wide Web; Available in PDF from the Brookings Institution website
This work may be copyrighted of have other restrictions on use. Please contact your librarian if you have questions on the uses of this material.