| 
 Registered Students login to NYLS Portal for updated Course Information and Reading Assignments. 
 
                                      
                                     
 UNIT 14:A Case Study: CALEA, VoIP
 PONDERABLES: Students, see handout. REQUIRED READING: Declan McCullough, "Feds' wiretapping rules challenged in court," CNET news.com (Jan. 27, 2006). Federal Communications Commission (FCC): CALEA Information http://www.fcc.gov/calea/ Center for Democracy and Technology: CALEA Information Page http://www.cdt.org/digi_tele/ Douglas Carlson, et al., CALEA: An Update and Open Discussion of the Legal, Technical, and Policy Issues Regarding This Controversial New Regulation (2006) [abstract]. Emily Hancock, CALEA: Does One Size Fit All? pp. 184-206 in Cybercrime, (Jack Balkin, et al. eds., NYU Press 2007). Kevin Poulsen, Bill Would Clean Up Caller ID, Wired News (Apr. 6, 2006) (legislation to outlaw the use of caller ID spoofing techniques).   STATUTES: Communications Assistance for Law Enforcement Act of 1994 (CALEA), Pub. L. No. 103-414, 108 Stat. 427947 U.S.C. §§ 1001-1010. Interception of Digital Communications.
 47 U.S.C. § 1021. Telecommunications Carrier Compliance Payments.
   ADDITIONAL READING: Brief for Petitioners, American Council of Education v. Federal Communications Commission (FCC) (Jan. 26, 2006), available at http://www.educause.edu/ir/library/pdf/EPO0601.pdf   
 Registered Students login to NYLS Portal for updated Reading Assignments. 
 
                                    
                                   
   Course Outline/Class UnitsRegistererd NYLS students login to my.nyls.edu for updated outline and assignments. 
                                    Overview, What is Cybercrime?
                                    Computer Intrusions and Attacks (Unauthorized Access)
                                    Computer Viruses, Time Bombs, Trojans, Malicious Code (Malware)
                                    Online Fraud and Identity Theft; Intellectual Property Theft; Virtual Crime
                                    Online Vice: Gambling; Pornography; Child Exploitation
                                    International Aspects and Jurisdiction
                                    Infrastructure and Information Security; Risk Management
                                    Investigating Cybercrime: Digital Evidence and Computer Forensics
                                    Interception, Search and Seizure, and Surveillance
                                    Information Warfare, Cyberterrorism, and Hacktivism
                                    Terrorism, Radicalization, and The War of Ideas
                                    Trade Secret Theft and Economic Espionage
                                    National Security
                                    Case Study: CALEA, VoIP
                                                                     Course Information
                                    PAPER RESEARCH
                                    USEFUL LINKS FOR DEFINING TECHNICAL TERMS
                                    COURSE SUBTEXT AND OPTIONAL BACKGROUND MATERIAL
                                                                       
 Registered Students login to NYLS Portal for updated Reading Assignments. All original material on this or any linked page is copyright the Center for Advanced Studies in Science and Technology Policy © 2003-2009. Permission is granted to reproduce this material in whole or in part for non-commercial purposes, provided it is with proper citation and attribution.
 
   |