Course Syllabus
Computer Crime Law Syllabus
Law 278.78
Fall 2015
Mondays and Wednesdays 2:10-3:25
3 Credits
Boalt Hall Room 170
Course Control Number: 49769
bCourses URL: https://bcourses.berkeley.edu/courses/1355376
Chris Jay Hoofnagle
344 Boalt North Addition
Berkeley, CA 94720
510-643-0213
choofnagle@berkeley.edu
Office Hours: Mondays, from 10-12
Course Description
"Computer crime" has been with us since the 1960s, but our society's dependence upon, and the evolution of, networked communications has changed computer crime dramatically in recent decades. With the aid of a computer, individuals now can levy sophisticated attacks at a scale typically available to organized crime rings or governments. As a result, all 50 states and the federal government have enacted laws prohibiting unauthorized use of computers, and in recent years, governments have tried to harmonize these laws internationally.
A computer can be the means, target of, or the source of information about a crime, and increasingly, those interested in all aspects of criminal law must have some working knowledge of computer crime to effectively investigate, prosecute, and defend cases. This course will explore the policy and law of computer crime and consider how "cybercrimes" are different from and similar to transgressive behavior in physical space. Topics will include the Fourth Amendment, forensics, electronic surveillance, cyberbullying, identity theft, computer hacking and cracking, espionage, cyberterrorism, privacy, the era of “forced disclosure,” and the challenge of cross-jurisdiction enforcement.
This course has a take-home exam and all enrolled JD students will give a short in-class presentation on some topic relevant to computer crime.
Please note, about 60% of reported computer crime cases concern prosecution of child predators. Federal defenders and prosecutors now have significant child pornography/luring dockets, and as a result, a significant amount of class time concerns this difficult, odious topic. These crimes are shocking in their depravity. Care is taken to discuss it with sensitivity, but students should be prepared to engage this material in order to develop a competent understanding of these crimes.
Texts
Required for the Course
Thomas K. Clancy, Cyber Crime and Digital Evidence: Materials and Cases, Second Edition 2014, LexisNexis, ISBN: 978-1-6328-0915-5
Please note: there is a discounted loose-leaf version of the textbook with the same contents and pagination. ISBN: 9781632809186 There is also an ebook.
Optional for the Course
Joseph Menn, Fatal System Error (PublicAffairs) ISBN: 9781586487485
Kevin Poulsen, Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground (Crown) ISBN: 9780307588685
All other optional readings are on Bcourses:
You might find these resources helpful:
- Cybercrime Review—the best blog on computer crime: http://www.cybercrimereview.com/ Links to an external site.
- National Institute for Justice, Investigations Involving the Internet and Computer Networks (2007)
- Susan Brenner’s Cyb3rcrime: http://cyb3rcrim3.blogspot.com/ Links to an external site.
- Robert Cannon’s Cybertelecom: http://www.cybertelecom.org/ Links to an external site.
- CCIPS, Searching & Seizing Computers and Obtaining Electronic Evidence in Criminal Investigations: http://www.cybercrime.gov/ssmanual/index.html Links to an external site.
- CCIPS, Prosecuting Computer Crimes: http://www.cybercrime.gov/ccmanual/index.html Links to an external site.
Grades
Your grade will be determined based upon the final exam (80%) and classroom discussion, which consists of day-to-day discussion and a 10-minute presentation on a topic related to computer crime (20%).
The final exam will be a take-home, open-book exercise. Once you start this exam, you must complete it within 6 hours. This work must be your own. You should not discuss or work with anyone else during the exam administration period. Unless you are 100% certain that there is a serious error on the exam, you should assume that ambiguities and strange facts are part of the challenge, and you should work through it on your own. If you email me with an exam question, I will post it and a response to the class list.
Developing oral advocacy skills is a very important element in legal education, however, many students have few opportunities to engage in public speaking. Your classroom presentation will give you an opportunity to give a 10 minute summation of an issue in computer crime law. Some topics are more technically focused than others, but remember that as an attorney, one of your main functions is to educate others—opposing counsel, judges, and juries—about your client's situation, and that this education will often focus upon the particularities or customs of your client. Pretend that the class is a jury or a judge, and you are tasked with explaining this topic with credibility and fairness.
Please choose from this list and reserve the topic with Chris, or suggest your own topic. Also, please come to my office hours one week in advance of your presentation so that we can discuss it.
- Workplace monitoring (extent of and types employed)
- Encryption
- Types of search protocols
- Compelling passwords
- Security breach notification
- Border searches
- Child pornography: distribution
- Child pornography: possession and viewing
- Child pornography: proving image is a real child
- Social networking sites and child predators
- The Butner Study on CP viewing and child predation
- Melissa Hamilton’s work on CP studies
- Online methods to commit copyright violations
- Spyware
- TOR and the .Onion Psuedo top level domain
- Bitcoin
- The “Anonymous” hacking group
- The Melchert-Dinkel case: encouraging suicide online
- "Cashing out" gains from computer crimes
- Phishing
- Spam
- Recent SCT case not in the textbook: City of Los Angeles v. Patel
- US v. Esquivel-Rios, 725 F.3d 1231 (10th Cir. 2013): how should courts address errors in police databases?
- Identity crimes
- Cyberbullying
- Threats
- Cyberstalking
- Defamation
- Sentencing enhancements
- Sentencing and child pornography
- Sentencing and banning internet use
- The conficker worm
- Stuxnet and flame
- Report on the privacy panel at ICSI’s 10/6 event
- Report on the technical methods panel at ICSI’s 10/6 event
- "Hacking Back" AKA Active Defense
- Advanced Persistent Threats
- The NSA’s Terrorist Surveillance Program
- The Edward Snowden Leaks (PRISM and a growing list of other programs)
Because of the size of this class, participation is very important. Please read for each class and be prepared to discuss the material.
Attendance
Since you are an adult, you can choose to attend or not. However, being absent cannot be good for the 20% of your grade that depends upon in-class discussion.
Office Hours
My office hours are TBD. I am happy to meet with you any day of the week. Just email me. My office is 344 Boalt North Addition.
Events
Berkeley is a center for the study of computers and privacy law. You might be interested in optional events during the semester, the most salient of which are included in the class schedule below. The TRUST Seminar meets on Thursdays at 1 on North Campus (typically Wozniak Lounge in Soda Hall). Many of these seminars are relevant to this class, and there’s free lunch:
https://www.truststc.org/seminar/
Course Summary:
Date | Details | Due |
---|---|---|
Mon Aug 24, 2015 | Assignment Introduction: the problem of computer crime | due by 11:59pm |
Wed Aug 26, 2015 | Assignment Digital Evidence | due by 11:59pm |
Mon Aug 31, 2015 | Assignment The Fourth Amendment "Inside the Box" | due by 11:59pm |
Wed Sep 2, 2015 | Assignment The Fourth Amendment: Private Searches | due by 11:59pm |
Mon Sep 7, 2015 | Assignment Labor Day Holiday / No Class | due by 11:59pm |
Wed Sep 9, 2015 | Assignment Optional Event: FTC Start with Security Workshop in San Francisco | due by 11:59pm |
Assignment The Nature of Digital Searches | due by 11:59pm | |
Mon Sep 14, 2015 | Assignment Warrants for Digital Evidence | due by 11:59pm |
Tue Sep 15, 2015 | Assignment Makeup Session (Mandatory) FTC's Commissioner Julie Brill Lunchtime Talk | due by 11:59pm |
Wed Sep 16, 2015 | Assignment Search Execution | due by 11:59pm |
Fri Sep 18, 2015 | Assignment Optional Event: EDPS Giovanni Buttarelli Speaks at BCLT | due by 11:59pm |
Mon Sep 21, 2015 | Assignment Consent Searches and Passwords | due by 11:59pm |
Wed Sep 23, 2015 | Assignment Seizures of Digital Evidence | due by 11:59pm |
Mon Sep 28, 2015 | Assignment Mobiles and Search | due by 11:59pm |
Wed Sep 30, 2015 | Assignment Computer Networks and Other "Outside the Box" Issues | due by 11:59pm |
Mon Oct 5, 2015 | Assignment Statutory Protections for Data | due by 11:59pm |
Wed Oct 7, 2015 | Assignment Stored Communications Act Pt. 1 | due by 11:59pm |
Mon Oct 12, 2015 | Assignment SCA Part 2 & General Statutory Wrapup | due by 11:59pm |
Wed Oct 14, 2015 | Assignment Obscenity and Child Pornography: Speech Issues | due by 11:59pm |
Mon Oct 19, 2015 | Assignment CP: Elements | due by 11:59pm |
Wed Oct 21, 2015 | Assignment Can Property Law Protect Computers Against Misuse? | due by 11:59pm |
Mon Oct 26, 2015 | Assignment No Class / Chris at Amsterdam Privacy Conference | due by 11:59pm |
Wed Oct 28, 2015 | Assignment No Class / Chris at Amsterdam Privacy Conference | due by 11:59pm |
Mon Nov 2, 2015 | Assignment CFAA Pt. 1 | due by 11:59pm |
Wed Nov 4, 2015 | Assignment CFAA Pt. 2 | due by 11:59pm |
Mon Nov 9, 2015 | Assignment Intellectual Property Crimes | due by 11:59pm |
Wed Nov 11, 2015 | Assignment Veterans Day Holiday / No Class | due by 11:59pm |
Thu Nov 12, 2015 | Assignment Makeup Session (Mandatory) Alessandro Acquisti BCLT Privacy Lecture | due by 11:59pm |
Mon Nov 16, 2015 | Assignment Malware, Spam, & Identity Threats | due by 11:59pm |
Wed Nov 18, 2015 | Assignment Threats | due by 11:59pm |
Mon Nov 23, 2015 | Assignment Cyberstalking and Defamation | due by 11:59pm |
Mon Nov 30, 2015 | Assignment Major internet security events: the conficker worm, stuxnet and flame, the NSA TSP/PRISM | due by 11:59pm |
Tue Dec 1, 2015 | Assignment Student Presentations / The Traveler Cases | due by 11:59pm |
Wed Dec 2, 2015 | Assignment State Actors and Computer Crime: Computer Espionage | due by 11:59pm |
Tue Dec 8, 2015 | Assignment Final Exam Available, Due Last Day of Examination Period | due by 11:59pm |