Registered Students login to NYLS Portal for updated Course Information and Reading Assignments.
New technologies do not determine human fates,
rather, they alter the spectrum of possibilities within which people act.
(McClintock and Taipale, 1992)
The emergence of modern information-based societies in which the exercise of economic, political, and social power increasingly depends on the opportunities to access, manipulate, and use information and information infrastructure has created opportunities for new crimes and new threats to civil society and global security, as well as for new law enforcement and national security responses.
This course explores how a "networked" world has bred new crimes and new responses, and investigates how information and communication technology (ICT) has become a tool, a target, and a place of criminal activity and national security threats, as well as a mechanism of response. This course addresses such questions as how emerging technologies challenge existing laws and criminal procedures; how nation-states regulate criminal conduct across traditional geographic and political boundaries; what reasonable expectations of privacy are in cyberspace; and how control is shifting from traditional mechanisms of law enforcement to new regulatory regimes, including technology.
The subtext of this course is how the emergence of advanced information societies challenges certain prevailing social and philosophical constructs of criminal justice, social control and individual freedom. (See Subtext).
Specific topics covered include the information environment as crime scene; hacking and unauthorized access; computer use in traditional crimes like financial fraud, drug trafficking, extortion, securities fraud, and political terrorism; identity theft and online fraud; electronic interception, search and seizure, and surveillance; cyberterror; "hactivism"; censorship and free speech; economic espionage; and information warfare.
The required texts for this course are:
David J. Loundy, COMPUTER CRIME, INFORMATION WARFARE, AND ECONOMIC ESPIONAGE, Carolina Academic Press (2003) (ISBN:0890891109).
Jack Balkin, et al. eds., CYBERCRIME: Digital Cops in a Networked World (NYU Press 2007) (ISBN:0814799833).
Other useful background texts include:
Orin S. Kerr, COMPUTER CRIME LAW: AMERICAN CASEBOOK SERIES (2006) (ISBN:0314144005).
Ralph D. Clifford, CYBERCRIME: THE INVESTIGATION, PROSECUTION AND DEFENSE OF A COMPUTER-RELATED CRIME (Second Edition 2006) (ISBN:0890897239).
Samuel C. McQuade, III, UNDERSTANDING AND MANAGING CYBERCRIME (2006) (ISBN:020543973X).
Peter Stephenson, INVESTIGATING COMPUTER RELATED CRIME (2000) (ISBN:0849322189).
Joel McNamara, SECRETS OF COMPUTER ESPIONAGE: TACTICS AND COUNTERMEASURES (2003) (ISBN:0764537105).
Registered Students login to NYLS Portal for updated Reading Assignments.
Course Outline/Class Units
Registererd NYLS students login to my.nyls.edu for updated outline and assignments.
- Overview, What is Cybercrime?
- Computer Intrusions and Attacks (Unauthorized Access)
- Computer Viruses, Time Bombs, Trojans, Malicious Code (Malware)
- Online Fraud and Identity Theft; Intellectual Property Theft; Virtual Crime
- Online Vice: Gambling; Pornography; Child Exploitation
- International Aspects and Jurisdiction
- Infrastructure and Information Security; Risk Management
- Investigating Cybercrime: Digital Evidence and Computer Forensics
- Interception, Search and Seizure, and Surveillance
- Information Warfare, Cyberterrorism, and Hacktivism
- Terrorism, Radicalization, and The War of Ideas
- Trade Secret Theft and Economic Espionage
- National Security
- Case Study: CALEA, VoIP
- PAPER RESEARCH
- USEFUL LINKS FOR DEFINING TECHNICAL TERMS
- COURSE SUBTEXT AND OPTIONAL BACKGROUND MATERIAL
Previous (Archived): [2008 Syllabus] [2007 Syllabus] [2006 Syllabus]
All original material on this or any linked page is copyright the Center for Advanced Studies in Science and Technology Policy © 2003-2009. Permission is granted to reproduce this material in whole or in part for non-commercial purposes, provided it is with proper citation and attribution.