The Second Amendment and Cyber Weapons - The Constitutional Relevance of Digital Gun Rights

07/29/2018
by   Jan Kallberg, et al.
0

In the future, the United States government can seek to limit the ownership and usage of cyber weapons. The question is whether the Second Amendment to the United States Constitution gives a right to bear and own military-grade cyber weapons, and if so, under which conditions. The framers of the Bill of Rights, ratified in 1791, did not limit the right to bear arms to defined weapons such as long rifles and pistols, but instead chose the broader word arms. The United States Supreme Court, in the case District of Columbia v. Heller, upheld a demarcation between dangerous and unusual weapons that are not permissible to own and weapons protected by the Second Amendment. Cyber weapons take the form of dual-use software, often shared and globally distributed that in most cases can be weaponized for harmful purposes. In recent years, major corporations have sought to hack back, and if the hack back is authorized, the question becomes whether corporations have digital gun rights. Even if corporations are considered US persons, they do not automatically obtain digital gun rights based on the Second Amendment. This article discusses the core constitutional challenges for the United States government in prohibiting individual ownership of cyber weapons and the rationale for why corporations are in a weaker position regarding ownership of cyber arms. The argument brought forward is that individuals can claim Second Amendment protection of their right to own military-grade software tools, but corporations must meet additional criteria to do so.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
08/15/2023

Research Software Engineering in 2030

This position paper for an invited talk on the "Future of eScience" disc...
research
11/13/2017

United Nations Digital Blue Helmets as a Starting Point for Cyber Peacekeeping

Prior works, such as the Tallinn manual on the international law applica...
research
09/27/2018

Growing and Retaining AI Talent for the United States Government

Artificial Intelligence and Machine Learning have become transformative ...
research
09/22/2020

Football and externalities: Using mathematical modelling to predict the changing fortunes of Newcastle United

The Public Investment Fund (PIF), is Saudi Arabia's sovereign wealth fun...
research
10/28/2022

Digital divide among the States of Mexico: a comparison 2010-2020

Digital divide is one of the challenges that open government must face i...
research
03/08/2021

Socio-Technical Root Cause Analysis of Cyber-enabled Theft of the U.S. Intellectual Property – The Case of APT41

Increased connectivity has made us all more vulnerable. Cyberspace, besi...
research
12/31/2018

Developing Cyber Buffer Zones

The United Nations conducts peace operations around the world, aiming to...

Please sign up or login with your details

Forgot password? Click here to reset