The cybersecurity risks to the nation’s critical infrastructure and key resources are significant and increasing every day. While a sound legal basis exists for the government to use computer intrusion detection technology to protect its own networks, critical infrastructure and key resources, primarily owned by the private sector, are governed by a different set of constitutional principles and laws. This article… Continue reading Virtual Checkpoints and Cyber-Terry Stops: Digital Scans To Protect the Nation’s Critical Infrastructure and Key Resources
Category: Vol. 6 No 1
Executive Power & The Rule of Law | Articles in JNSLP 6:1 examine the separation of powers in various contemporary applications, such as waging modern warfare, the CIA as a counterterrorism force, outsourcing military action, and cybersecurity and the Fourth Amendment.