Welcome: In this course, each voice in the classroom has something of value to contribute. Please take care to respect the different experiences, beliefs and values expressed by students and staff involved in this course. My colleagues and I support UMass’s commitment to diversity, and welcome individuals regardless of age, background, citizenship, disability, sex, education, ethnicity, family status, gender, gender identity, geographical origin, language, military experience, political views, race, religion, sexual orientation, socioeconomic status, and work experience.
Course description: COMPSCI 391L/591L is a study, analysis, and discussion of the legal issues related to crimes involving computers and networks, including topical actions by dissidents and governments. We will also study the technologies of forensic investigation, intelligence gathering, privacy enhancement, and censorship resistance.
Our main legal topics will include recent and important case law, statutes, and constitutional clauses concerning authorization, access, search and seizure, wiretaps, the right to privacy, and FISA. Our technology topics will include methods of investigation and resistance in the context of the Internet and Cellular networks. Students are assumed to have no background in legal concepts. All students will be required to complete substantial legal readings, complete significant written analysis of rulings, learn about technologies in detail, and participate in lively class discussion. Graduate students enrolled in 591L will be expected to read selected current law and technical articles and to analyze state-of-the-art systems in the context of law and policy.
Some of the laws and cases that we’ll be covering provide the courts’ answers to these questions:
- Can you be compelled by police to turn over the key to encrypted documents?
- Are you breaking the law if you connect to someone’s open wireless access point?
- Does violating a web site’s Terms of Service constitute criminal fraud?
- If you tell your employer you are leaving in two weeks, are you guilty of hacking if you then access your files at the company?
- Since data can be deleted immediately via remote commands, aren’t police always justified in seizing equipment without a warrant to avoid the delay?
- What is the legal justification for the surveillance activities of the US government?
- Why do we have a right to “privacy” if the word never appears in the constitution?
These issues and the others we’ll discuss are fundamental to our profession and our society.
Some of the technical topics that we’ll cover include:
- What information does one expose to third parties from everyday use of cellular phones and why?
- What information can a third party (e.g., advertisers or the government) gather about persons from their use of the Internet and why?
- How do technologies for protecting privacy, such as Tor, operate?
- What technologies are available for investigating crimes perpetrated with the help the Internet, including child exploitation, human trafficking, and electronic theft, and how do they work?
- What technologies are available to thwart government censorship and how do they work?
The specific objectives for the course are as follows:
- To gain an understanding of and familiarity with computer crime case law and general legal reasoning.
- To understand the implications that computer science advances have had on criminal law historically.
- To reason about the implications of current and future computer science advances on hypothetical cases, based on past rulings.
- To gain a familiarity and understanding of the technology that supports privacy and surveillance.
- To gain experience in formal writing, and experience in making well-reasoned arguments both on paper and in class discussion.
Who is this course for? Undergraduates with a strong technical background (COMPSCI 230) and an interest in the law as it applies to technology. This course counts as a COMPSCI elective toward the major (B.S. or B.A.). Graduate students who enroll in 591L will also find the material topical to their program of study and to their professional development. They should expect to cover more of the details, both technical and legal, than the undergraduates enrolled in 391L.
Prerequisites: For undergraduates: COMPSCI 230 and ENGLWRIT 112 (or waiver for it). For graduate students: no formal prerequisites, but note that 500-level courses do not fulfill Ph.D. requirements; M.S. and M.S./Ph.D. may use this course in accordance with their degree requirements.
Class meetings: Engineering Lab 1 (ELAB) Room 304, TuTh 1:00–2:15pm.
Materials: There is one required textbook for this class from which many readings will be assigned: Orin Kerr’s Computer Crime Law, 3rd edition. The 2nd edition is less expensive and mostly but not entirely suffices. If you get the 2nd edition, you will need to occasionally borrow a reserve copy or use a classmate’s copy for certain readings and assignments.
There is one optional textbook: Learning Legal Reasoning: Briefing, Analysis and Theory by John Delaney (ISBN-10: 0960851445). Chapter one is available online for free on the author’s web site. We will cover the content from Chapter two in class, though you may prefer to purchase and read the author’s version.
Other readings will be made available electronically on this web site or on the course Moodle site.
Acknowledgements: I’m very grateful to Professor Brian Neil Levine for providing me materials that assisted me in preparing this course.