COMPUTER CRIME LAW PROFESSOR KERR

Similar documents
Privacy and Anonymity Steven M Bellovin

ITU Model Cybercrime Law: Project Overview

CYBERCRIME LEGISLATION DEVELOPMENT IN NIGERIA AN UPDATE. Octopus Conference, Strasbourg 06 June, 2012

ITU/HIPPSA Technical Assistance on Cybercrime Law for the Republic of Rwanda, Kigali 11 th -12 th July 2013

Syllabus for P.G. Diploma in Cyber Law and Information Technology

Computer Forensics US-CERT

Typical Investigative Steps and Traveler cases

Communication and Usage of Internet and Policy

MEETINGS OF MINISTERS OF JUSTICE OR OEA/Ser.K/XXXIV

ATLANTIC BROADBAND LAW ENFORCEMENT HANDBOOK

LEGAL SOLUTION CYBERCRIME LEGAL SOLUTION LEGAL SOLUTION NATIONAL, REGIONAL, INTERNATIONAL

Information Security Incident Response Plan

Auditing and assurance

CS 241 Data Organization using C

Information Security Incident Response Plan

CYBER CRIME A COMPARATIVE LAW ANALYSIS SANDRA MARIANA MAAT. submitted in part fulfilment of the requirements for the degree of MAGISTER LEGUM.

ISM 324: Information Systems Security Spring 2014

Oklahoma State University Spears School of Business Department of Management Information Systems

ISACA National Cyber Security Conference 8 December 2017, National Bank of Romania

716 West Ave Austin, TX USA

Typical Investigative Steps and Legal Framework

ECONOMICS 5317: CONTEMPORARY GOVERNMENT AND BUSINESS RELATIONS

Lahore University of Management Sciences. ACCT 250 Auditing Spring Semester 2018

Data Preservation Checklists

DHS Hackers and the Lawyers Who Advise Them

THE UNIVERSITY OF TEXAS AT AUSTIN MIS373 e-discovery and Digital Forensics SPRING 2015 Unique#: (03665) VERSION: 2_011718

Oklahoma State University Institute of Technology Online Common Syllabus Spring 2019

Overview Bank IT examination perspective Background information Elements of a sound plan Customer notifications

Credit Card Data Compromise: Incident Response Plan

UNODC tackling cybercrime in support of a safe and secure AP-IS

Data Breach Preparation and Response. April 21, 2017

Cellular Site Simulator Usage and Privacy

CRIJ 1301 Introduction to Criminal Justice (8-Week On-line Version) Fall 2017 Aug. 28 through Oct. 22

Midstate Telephone & Midstate Communications. Acceptable Use Policy

The Non-Code Layers of the Cyberstack & the Globalization of Criminal Evidence. Peter Swire IISP: Friday Cyber Lecture October 13, 2017

Policy recommendations. Technology fraud and online exploitation

Breach Notification Form

Course Title: Computer Networking 2. Course Section: CNS (Winter 2018) FORMAT: Face to Face

Guiding principles on the Global Alliance against child sexual abuse online

Legal, Ethical, and Professional Issues in Information Security

Acceptable Use Policy (AUP)

Global Alliance Against Child Sexual Abuse Online 2014 Reporting Form

Syllabus: Cybersecurity Law Seminar. George Mason University Antonin Scalia Law School Spring 2018 Professors Kiran S. Raj & Scott Ferber

Business Information System Analysis and Design Fall 2017

BCS Higher Education Qualifications. Diploma in IT. Professional Issues in Information Systems Practice Syllabus

COMPUTER FORENSICS (CFRS)

INFS 2150 (Section A) Fall 2018

Digital Forensics ITP 375 (3 Units)

EXAM PREPARATION GUIDE

Incident Handling. Road Map. Week 4: Incidents, Evidence and the Law. Types of Evidence. Digital Evidence. Characteristics of Evidence

PRC Cyber Security Law --- How does it affect a UK business? Xun Yang Of Counsel, Commercial IP and Technology

Cleveland State University General Policy for University Information and Technology Resources

Oklahoma State University Institute of Technology Face-to-Face Common Syllabus Fall 2017

RMU-IT-SEC-01 Acceptable Use Policy

USF Sarasota-Manatee - New Undergraduate Course Proposal Form

EnviroIssues Privacy Policy Effective Date:

ESET 349 Microcontroller Architecture, Fall 2018

CS 4317: Human-Computer Interaction

List of National Archives and Records Administration (NARA) Inspector General (OIG) investigations closed October September 2016

Comprehensive Study on Cybercrime

Global Alliance Against Child Sexual Abuse Online 2014 Reporting Form BOSNIA AND HERZEGOVINA. Policy Target No. 1

Cybercrime Criminal Law Definitions and Concepts

Motorola Mobility Binding Corporate Rules (BCRs)

Incident Handling. Week 4: Incidents, Evidence and the Law

SAULT COLLEGE OF APPLIED ARTS AND TECHNOLOGY SAULT STE. MARIE, ONTARIO COURSE OUTLINE

California Code of Regulations TITLE 21. PUBLIC WORKS DIVISION 1. DEPARTMENT OF GENERAL SERVICES CHAPTER 1. OFFICE OF THE STATE ARCHITECT

Global Alliance Against Child Sexual Abuse Online 2014 Reporting Form

Introduction to Information Technology ITP 101x (4 Units)

Criminal Justice Statistics on Cybercrime & Electronic Evidence

MANAGEMENT of INFORMATION SECURITY Third Edition

Thailand Initiatives and Challenges in Cyber Terrorism

Report Exec Administrator

Course Syllabus. Course Information

Data Protection and Cybercrime Challenges

Oklahoma State University Institute of Technology Online Common Syllabus Fall 2018

Legal Foundation and Enforcement: Promoting Cybersecurity

TELEPHONE AND MOBILE USE POLICY

Red Flag Regulations

Magna5 reserves the right to make modifications to this policy at any time.

This will allow candidates for whom travelling to a Prometric Test Center is not convenient or possible an opportunity to pursue EDGE certification.

2. VIOLATIONS OF ACCESSHOSTING.COM S ACCEPTABLE USE POLICY. b. Harm to minors. Using the Services to harm, or attempt to harm, minors in any way.

NASD NOTICE TO MEMBERS 97-58

Cybercrime and e-evidence: challenges and solutions.

National Communications Authority

MENTAL RETARDATION BULLETIN

GhostFiber Acceptable Use Policy

Ethical, legal, and policy issues related to security and privacy research and practice

SI Special Topics: Data Security and Privacy: Legal, Policy and Enterprise Issues, Winter 2010

Guidelines for the use of the IT infrastructure at the University of Bayreuth 10 February 2005

Computer forensics Aiman Al-Refaei

CIT110 A+ Hardware Spring 2015

Glenwood Telecommunications, Inc. Acceptable Use Policy (AUP)

China and International Governance of Cybercrime

CSCO 120 CCNA Internetworking Fundamentals Spring 2018

THE UNIVERSITY OF TEXAS AT AUSTIN MIS373 e-discovery and Digital Forensics SPRING 2015 Unique#: (03883) VERSION: 1/23/2015

STUDY GUIDE: MASTER S DEGREE IN INTERNATIONAL ECONOMICS AND PUBLIC POLICY

IS Today: Managing in a Digital World 9/17/12

Internet Service Provider Agreement

TERMS OF USE Terms You Your CMT Underlying Agreement CMT Network Subscribers Services Workforce User Authorization to Access and Use Services.

Cyber Attacks and Data Breaches: A Legal and Business Survival Guide

Transcription:

COMPUTER CRIME LAW PROFESSOR KERR 6369-10 SYLLABUS Spring 2017 I. Course Summary This course examines the legal issues raised by computer-related crime. The course coverage divides into three topics: (1) substantive criminal law, which considers the scope and structure of the criminal laws relating to computer crime; (2) criminal procedure, which examines the nature and function of the privacy laws that regulate law enforcement investigations of computer-related crime; and (3) jurisdictional issues, which evaluate how competing jurisdictions (state vs. state, federal vs. state, and U.S. vs. foreign) might work together or independently to investigate and prosecute computer-related crimes. II. Materials The course assignments are from Orin Kerr, Computer Crime Law (3d. ed. 2013) as well as the 2017 Statutory and Case Supplement to that casebook. Both books are required. The publication date for the 2017 Statutory and Case Supplement is December 31, 2016, so copies will be available by the first week of class. III. Class Policies, Office Hours, Exam During the first week, I will cold call students. Please be prepared. At the end of the first week, each student will sign up for a panel day Tuesday, Wednesday, or Thursday and will be on call on the weekly class meeting that occurs on that day. I reserve the right to adjust grades up or down for class participation. What matters is quality, not quantity. My default office hours this semester will be Wednesday 1:30 to 2:30 pm, in my office (Stuart 311) or by appointment, which you should please feel free to make. I have an open door policy for students in my classes, so feel free to stop by. The best way to get in touch with me is by e-mail: okerr@law.gwu.edu. The exam will be a 3-hour open-book exam. It will likely be a mixture of multiple choice and essay. Everything we cover, in the reading and/or in class, is fair game for the exam.

IV. Class Assignments Here are the class assignments for the course. Assignments are from the main casebook unless noted as readings from the 2017 Supplement (designated Supplement ). Citations to statutes in parentheses immediately below the page assignments are citations to statutes you should read along with the assignment. The current statutes are found in the 2017 Supplement. Class Number Topic Assignment 1 Introduction to Computer Misuse 1-13 2 The Property-Based Approach to Computer Misuse, and an Introduction to 18 U.S.C. 1030, the Computer Fraud and Abuse Act 13-31 (18 U.S.C. 1030) 3 The Meaning of Unauthorized Access: What is Access, and What is Authorization? 31-51, Supplement 123-27. (18 U.S.C. 1030) 4 More on the Meaning of Authorization : Contract and Norms-Based Approaches to Authorization 5 Access to Obtain Information and the Crime of Computer Fraud, 18 U.S.C. 1030(a)(2) and (a)(4) 6 The Computer Damage Statute, 18 U.S.C. 1030(a)(5) 7 More on 1030(a)(5), and Property Crimes to Protect Economic Interests Online 51-65, 68-76. Supplement 127 to 132. (18 U.S.C. 1030) 76-99 Supplement 132-34. (18 USC 1030(a)(2) &(a)(4)) 100-125 Supplement 134-35. (18 U.S.C. 1030(a)(5)) 125-133, 136-150 Supplement 137-38. (18 U.S.C. 1343, 2314)

8 The Economic Espionage Act and Identity Theft 151-168; Supplement 139-143. (18 U.S.C. 1832, 1839, and 1028A) 9 Criminal Copyright Law 10 More on Criminal Copyright, and an Introduction to Online Threats and Harassment 11 Online Threats, Harassment, and Revenge Porn Laws 168-192 (18 U.S.C. 2319, 17 U.S.C. 506 reprinted together in the supplement) 192 to the top of 204. Supplement 143 to 152. (18 U.S.C. 875, 2261A, and skim 47 U.S.C. 223) 212 223 226 (starting at n.1) to 231. Supplement, middle of 155-160. 12 Internet Gambling Bottom of 232 to 247 (18 U.S.C. 1084) 13 Internet Obscenity 247-267 (18 U.S.C. 1462, 1465) 14 Child Pornography Offenses 267-89 Supplement 161-65. (18 U.S.C. 2252, 2252A)

15 Virtual Child Pornography and First Amendment Limits 295-314 (18 U.S.C. 2252A, 2256) 16 Traveler Cases and Online Entrapment 314-327 (18 U.S.C. 2422, 2423) 17 Sentencing Computer Crimes under the U.S. Sentencing Guidelines, and their Application to Child Pornography Offenses Intro on p.328, 333-53. 353-357. 18 Sentencing Computer Misuse Offenses, and an Introduction to the Fourth Amendment 19 Fourth Amendment Searches and Seizures of Computers 20 Exigent Circumstances and Scope of Consent for Computer Search and Seizure 21 Third Party Consent Searches of Computers and Searches Incident to Arrest 22 Computer Border Searches and Government Workplace Searches 23 Warrant Searches: Probable Cause and Particularity for Digital Evidence 24 Executing Computer Warrants and The Scope of Plain View for Computer Searches 25 Ex Ante Restrictions on Warrants, the Fifth Amendment, and the All Writs Act Supplement 167-173. 363- middle of 365 (through n.6). 376-386. Supplement 175-77. 387-409 Supplement from bottom of 177 through 182. 409-430 Supplement 183 to top of 184. 430-43 (end of n.3); Supplement 184-197. Supplement 199-212; 462-72. 473-493 Supplement 212-17. Bottom of 495- top of 513; Supplement 217 to top of 222. 513- middle of 524, 532-541. Supplement 222 to top of 233.

26 Fourth Amendment in a Network Environment, Part I: Non-Content Information 27 Fourth Amendment in a Network Environment, Part II: Contents 541-559; Supplement from note 1 on page 240 to middle of 243. 559-573, Supplement middle of 243 to 251. 28 Introduction to the Wiretap Act 574-592, 29 The Consent Exception and the Provider Exception Supplement 253 to middle of 255. (18 U.S.C. 2510, 2511, 2515) 592-612 Supplement 257-58. (18 U.S.C. 2511(2)) 30 The Cybersecurity Act of 2015 and the Pen Register Statute 31 The Stored Communications Act, Part I 32 The Stored Communications Act, Part II 33 Federalism and Computer Crime Law: The Scope of Federal Authority 34 Federalism and Computer Crime Law, Part II: The Scope of State Authority 35 Computer Crimes Beyond the United States Border 36 The Microsoft Case and Mutual Legal Assistance Treaties Supplement 258 to top of 261. Bottom 618-32 (skim both 6 U.S.C. 1501-10 and 18 U.S.C. 3121-27) 632-652 (18 U.S.C. 2701, 2703, 2708, 2711) 653-73 Supplement 261-64. (18 U.S.C. 2702) 674-686, bottom of 690 (starting at n2) to 696. Supplement 265 to middle of 274. 697- middle of 718, 720 to middle of 723. Supplement middle of 274 to top of 277. Middle of 724-middle of 748 Supplement bottom 277 to 285. 752- top of 770

37 National Security Investigations 788-807 END OF COURSE