Schedule

This page is a master list of all topics, lectures, and readings for the course. Some important notes:

  • The schedule may change at my discretion.
  • The assignments themselves (which cases to briefs, notes to respond to, and so on) are on Moodle.
  • For your convenience, I have linked some opinions here that are also in the book. Generally, use the book’s version, as Kerr shortens the opinions to just the relevant parts. I may provide some shortened/excerpted opinions that are not in Kerr; these are marked as such in the list below.

Submitting assignments. You are expected to complete all assigned assignments and readings (including the numbered end-of-section notes) before each class meeting. You are responsible for submitting assignments by the course meeting in which they are discussed.

Assignments can be turned in only via Moodle and only in PDF format. Do not hand in a printout or email the course staff your submissions, as we won’t accept them or give you credit. Assignments are due at 1:00pm (the start of class). You can re-submit an assignment at any point until then. Assignments will not be accepted after this time. If you’re running close to the deadline, it’s a a good idea to submit some version of your assignment as you finish parts before 1:00pm, and then keep resubmitting to avoid any trouble with the server.

Grading. Each case you brief will be graded according to the briefing rubric. Each note you respond to will be graded according to the note rubric. Other items will be graded as marked.

Overview, briefing, Katz test

September 04 Tue, 06 Thu

Please read the following chapters from Delaney and the cases before class. Olmstead will be discussed on September 4, but the brief is not due until September 6. After the first class meeting, you must read and brief cases before lecture — the first meeting is the only exception to this rule!

  • Delaney, Learning Legal Reasoning.
    • Read pages 1–5 of Chapter 1, which is offered free on the author’s web site.
    • Read all of Chapter 2.
  • Olmstead v. US, 277 U.S. 438 (1928)
  • Katz v. US, 389 U.S. 347 (1967)
  • Smith v. Maryland, 442 U.S. 735 (1979)

Optional/Related:

  • Oyez has a case summary and the oral arguments for Katz; if you have about forty minutes, most of the arguments are fascinating. Highlights include a prescient discussion that will be revisited in Kyllo (around 11:30), and the attorney for Katz bringing up the idea of a new test for 4A applicability (starting around 21:00).

Computer misuse crimes

September 11 Tue

You should at least skim Chapter 1 – it is only six pages long! Like your reading of Delaney, this will give you some background information and introduce you to terminology that will come up repeatedly throughout the course.

Then read the following.

  • Ch 2. Computer Misuse Crimes (don’t skip the intro paragraph, then read the following sections:)
  • §2.A. Why Punish Computer Misuse?
  • §2.C.1 Introduction to Unauthorized Access Statutes
  • §2.C.2 What is Access?
  • §2.C.3 What is Authorization? The Case of Code-Based Restrictions

Here and elsewhere, otherwise unidentified chapters/sections refer to Kerr 4e. You should read not just the text by Kerr, but any opinions or hypotheticals, as well as all of the end-of-section “Notes.” These notes are not optional, and in fact are where much of the interesting content in the text resides – I will expect you to have read them.

The assignments (exactly which opinions you must brief, as well as any other questions I may ask) are on Moodle.

Optional/Related:

September 13 Thu

  • §2.C.4 What is Authorization? The Case of Contract-Based Restrictions
  • §2.C.5 What is Authorization? The Case of Norms-Based Restrictions

September 18 Tue

  • §2.D. 18 USC §1030(a)(2) and its Felony Enhancements
  • §2.E. 18 USC §1030(a)(4) and Computer Fraud Statutes

September 20 Thu

  • §2.F. 18 USC §1030(a)(5) and Computer Damage Statutes
  • §2.G. Hacking Back

4th amendment

September 25 Tue

  • §5.A. The Requirement of Government Action
  • §5.B.1. Defining Searches and Seizures: Searches
    • a) Introduction to 4A “Searches”
    • b) Searches of Stand-Alone Computers
    • c) Searches in the Network Context

September 27 Thu

  • §5.B.1. Defining Searches and Seizures: Searches (continued)
    • c) Searches in the Network Context
  • §5.B.2. Seizures

Midterm 1

October 02 Tue

The first midterm will be in class. More details and some sample questions are now available.

4th amendment, continued

October 04 Thu

  • §5.C Exceptions to the Warrant Requirement
    • §5.C.1. Search Incident to Arrest
    • §5.C.2. Exigent Circumstances

October 11 Thu

  • §5.C.3. Consent

October 16 Tue

  • §5.C.4. Border Searches
  • §5.C.5. Government Workplace Searches
  • §5.D Searching and Seizing Computers with a Warrant
  • §5.D.1. Probable Cause

Optional/Related:

  • Am I Free To Go? an example of a genre of YouTube videos related to border checkpoints not at the border.
  • The EFF’s latest complaint about warrantless border searches of laptops and other electronics
  • Abidor v. Napolitano [2013-12-13] in which a challenge to suspicionless border searches was dismissed

A Brief Detour to TOR

October 18 Thu

See also:

  • Top changes in Tor since the 2004 design paper (Part 1) (Part 2) ; part 2 described guard nodes

October 23 Tue

Optional/Related:

4th amendment, continued

October 25 Thu

  • §5.D.3. The Physical Search Stage
  • §5.D.4. The Electronic Search Stage

October 30 Tue

  • §5.D.5. Ex Ante Restrictions on Computer Warrants

November 01 Thu

  • §5.D.6. Encryption

Optional / Related:

Midterm 2

November 06 Tue

(Also Election Day! Don’t forget to vote!)

The second midterm will be in class; it will focus primarily on material since the first exam, though there will necessarily be some cumulative material. You can expect questions covering primarily 4A law and Tor. It will be of the same style and about the same length as the first midterm.

Statutory privacy protections

November 08 Thu

  • §6, §6.A Statutory Privacy Protections, and The Wiretap Act
  • §6.A.1. The Wiretap Act: The Basic Structure. As usual, and especially here, don’t skip the notes in Kerr; they are particularly important in this chapter.
  • §6.A.2. The Consent Exception

Optional/Related:

November 13 Tue

  • §6.A.3. The Provider Exception
  • §6.B. The Cybersecurity Act of 2015
  • §6.C. The Pen Register Statute

Optional/Related:

November 15 Thu

Cellular networks

November 27 Tue

Optional/Related:

GPS, remote monitoring, mosaic theory

November 29 Thu

Optional/Related:

FISA and national security

December 04 Tue

Optional/Related:

December 06 Thu

(still draft status from here down…)

We’ll review the Snowden leaks in class, covering the surveillance programs that revealed by these leaks. This material will be a review and roundup of material from last class.

Review and wrap-up

December 11 Thu

We’ll review the entire course, have a brief-wrap up discussion, and go over possible final exam questions. I’ll also harangue you to fill out the end-of-semester SRTIs.

Final Exam

Our exam is scheduled for:

12/20/2018
Thursday
10:30–12:30
LGRC A203

Please note (from the Academic Rules and Regulations):

…it is University policy not to require students to take more than two final examinations in one day of the final examination period. If any student is scheduled to take three examinations on the same day, the faculty member running the chronologically middle examination is required to offer a make-up examination if the student notifies the instructor of the conflict at least two weeks prior to the time the examination is scheduled. The student must provide proof of the conflict. This may be obtained from the Registrar’s Office, 213 Whitmore.