Latest course syllabus

Computer Crime
Fall 2015
Version 0.99
Updated 3/26/15 to include
final Part Three assignments
Paul Ohm
Syllabus
Course Description
This course will explore the legal issues that judges, legislators, prosecutors, and defense
attorneys are confronting as they respond to the recent explosion in computer-related crime. In
particular, we will consider how crimes in cyberspace will challenge traditional approaches to the
investigation, prosecution, and defense of crime that have evolved from our experience with crimes
in physical space. Topics will include: the Fourth Amendment in cyberspace, the law of electronic
surveillance, computer hacking and other computer crimes, cyberterrorism, the First Amendment in
cyberspace, and civil liberties online.
Although much of this class involves computer and internet technology, no prior technical
background or knowledge is required. Any technology that needs to be understood will be explained
in class, and students should not hesitate to ask for other technical explanations.
Class Times and Office Hours
The class will meet every Monday and Wednesday from 2:30 PM – 3:50 PM in Room 205. I
will generally be available for office hours on Monday and Wednesdays in my office, Room 433, from
10:30 – 11:30 A.M. or at any other time by appointment. I can also be reached via e-mail at
[email protected].
Course Expectations
Grading and Exam. Grades for the course will be based on a final exam and other class
participation. Because I value class participation so much, I may increase or decrease your grade up
five points to reflect your participation.
The final exam is a six-hour, word-limited, take-home final containing a mix of issue
spotting and policy questions. Students may consult any written materials during the exam, but
students must be careful to abide by the honor code.
Participation. I expect you to be prepared to talk every class and will call on you without
prior notice. If, however, you are unable to prepare for class on a particular day for whatever
reason, please attend anyway. Send me an e-mail at least one hour before we begin or leave me a
note on the podium at the front of the room before class starts and I will not call on you that day.
You may not use this “pass” more than three times during the semester unless you talk to me in
advance about your situation. If you do not leave me a note but are unprepared or absent when I
call on you, your grade will be negatively affected.
If you find yourself especially prepared for class after finishing the reading, you can put
yourself on call by volunteering to “catch.” To do so, send me an e-mail at least one hour before we
begin, or leave me a note on the podium (highlighting the word “catch” so I don’t mistake it for a
pass) at the front of the room before class starts, and I will do my best to call on you at some point
during the class. I encourage voluntary participation as well.
1
I will pass around a seating chart on Wednesday, January 14th. Please be sure you can see
the text on the screen from your chosen seat.
In-Class Technology. I do not use the chalkboard in this class. Instead, I project a computer’s
display onto the screen for use as a “virtual blackboard” Following each class, I will upload a copy of
the blackboard to the course website.
Course Materials
Required Text. We will use two primary sources, a casebook: ORIN KERR, COMPUTER CRIME
LAW (West 3d ed. 2012), and the 2015 Supplement to the casebook (ISBN 978-1634592680). The
publisher promises that the supplement will be available online on January 1st.
In addition, I will be providing supplemental materials through the course website at
paulohm.com for many classes. Some of these supplemental materials are noted in the syllabus,
below; others will be added to assignments during the semester, in which case they will be made
available and announced at least two classes prior. You are responsible for consulting the website
before beginning the reading for every class.
Course Website. Our course website is at http://paulohm.com/classes/cc15. Here, you will
find class blackboards, important announcements, supplemental readings (most of which are
mentioned in the day-by-day syllabus, below), changes to the reading, and links to other resources.
Supplemental readings will be made available at least one week prior to the assigned date. The top
part of the website will list “Latest Changes to the Site” which can be scanned to see what is
important and new. Students are advised to consult the website before every class, particularly
when a class is missed. I do not use TWEN.
2
Assigned Topics and Reading
[Numbers in brackets indicate pages assigned.]
Part One: Substantive Computer Crime
Class Number/Date
1: Mon, January 12
2: Wed, January 14
Mon, January 19
3: Wed, January 21
4: Mon, January 26
5: Wed, January 28
6: Mon, February 2
7: Wed, February 4
8: Mon, February 9
9: Wed, February 11
10: Mon, February 16
Topic
Course Overview; Computer
Misuse; Property
Crime/Computer Misuse
Unauthorized Access
Statutes
No Class: MLK, Jr., Day
Unauthorized Access
Statutes Continued
Specific CFAA Crimes
Property Crime and Online
Threats
Criminal Copyright
Child Pornography
First Amendment and
Threats
First Amendment and
Obscenity and Child
Pornography
Sentencing
Assignment
1-29 [29]
29-51 and Supp/111-16 115120 [29]
51-76 [26]
76-82; 87-88 (Notes 1 and 2
only); 100-25; Supp/116 120
[36]
136-50; Supp/117-18 121-22;
201-12; Supp/121 125 [30]
168-96 [29]
267-72; 280-95 [22]
212-31; Supp/121-27 125-31
[27]
247-67; 295-304 [31]
343-57; 366-75 [26]
Part Two: Computer and Network Search and Seizure
Class Number/Date
11: Wed, February 18
12: Mon, February 23
13: Wed, February 25
14: Mon, March 2
Topic
Introduction to the Fourth
Amendment; Government
Action; Definition of Search
Exceptions: Exigent
Circumstances and Consent
More Exceptions; Search
Incident to Valid Arrest and
Riley; Searching Computers
with a Warrant: Probable
Cause and Particularity
Searching Computers with a
3
Assignment
376-400; Supp/137-39 [28]
409-410; 415-420; 424-45
[30] (Skip Trowbridge and
Al-Marri but read notes
following each)
Supp/140-53; 473-76; 486-95
[28] (Skip Adjani but read
notes following)
495-96; 501-13; Supp/153-64
15: Wed, March 4
16: Mon, March 9
17: Wed, March 11
18: Mon, March 16
19: Wed, March 18
Mon, March 23 and Wed,
March 25
20: Mon, March 30
Warrant: Physical Searches;
Computer Forensics; Border
Search Exception
The Fourth Amendment and
Computer Networks:
Analogies and Non-Content
Information
The Fourth Amendment and
Content; Introduction to the
Wiretap Act
Wiretap Exceptions; Pen
Register Act
Stored Communications Act
(Part 1)
Stored Communications Act
(Part 2)
Spring Break
[27] (Skip Hill but read notes
following)
Statutory Refresher;
Encryption and the Fourth
and Fifth Amendments
528-541 [14]
541-59; Supp/170-81 [27]
559-92 [34]
592-613; 618-32; Supp/19192 [39]
632-60 [29]
660-73 [14]
Part Three: Cross-Jurisdictional Computer Crime
Class Number/Date
21: Wed, April 1
22: Mon, April 6
23: Wed, April 8
24: Mon, April 13
Topic
National Security Law and
the Fourth Amendment
Foreign Intelligence
Surveillance Act
The Foreign Intelligence
Surveillance Act I
FISA Continued: Edward
Snowden and NSA
FISA, Edward Snowden, and
the NSA
FISA Continued: Edward
Snowden and NSA
Limits and Sources of
Federal and State Power
Assignment
788-807;
Handout 250; 267-78 [33]
788-827 [40]
Casebook 807-27 [21]
Handout 250-266 [17]
697-724 [28]
Excerpts from 674-724
(Assignment later)
Wed, April 15
25: Mon, April 20
26: Wed, April 22
During Exams
No Class
International and Foreign
computer crime
Review Session One
Review Session Two
4
724-52 [29]
Excerpts from 724-87
(Assignment later)
N/A
N/A
5