Course Syllabus
Two Important Announcements regarding Class Schedule:
- This course is offered as a Computer Science course. This means that the class schedule will follow the AS&E calendar, not the Fletcher calendar. Fletcher students should note that the first day of classes is Wednesday September 8; Fletcher students should also note that there will be classes on November 8 and 10 (but these will be be via Zoom and taped to accommodate Fletcher students who cannot attend).
- There will be an extra optional class on Saturday September 11, time TBD, on how the Internet works. Those who taken/are taking networking courses, Cyber for Future Policymakers, or How Systems Work can comfortably skip. Those who do not know how the Internet works will find the class useful. This extra class is not required.
- There will be no classes on September 22 and October 18; there is, however, a required assignment for October 18.
Course Schedule:
Please note that cyberlaw and cyberpolicy are dynamic, with rules constantly changing. Thus the readings and even the classes may change as well.
Readings:
There will be a number of readings, including US Supreme Court cases, various government reports, law review articles and other papers, The course reading is demanding; please plan on reading intensively and apportion time accordingly.
There will be a required online text that we will use periodically: James Grimmelmann, Internet Law: Cases and Problems, 10th edition. The Grimmelmann text (Links to an external site.) is available for download only at Semaphore Press. I encourage you to read about Semaphore Press's publishing approach on its website, a piece of which I am excerpting here:
"Each publication has a suggested price. We price full casebooks based on our belief that it is fair to ask a student pay about $1 for the reading material for each one-hour class session. Different schools use different calendars and credit hours, so we've settled on a suggested price for most of our casebooks of $30. We ask that you pay the suggested price either with a credit card (by clicking the appropriate link on our page), or by sending us a check, and then download a digital copy of the casebook. Note that if your professor has assigned, e.g., only 10 class sessions of material from a Semaphore Press book, then we suggest that you pay $10."
I strongly support support this pricing model and hope you will as well. Thank you.
Introduction
September 8: Introduction to the course
- Why a course on cyberlaw and cyberpolicy;
- Why this choice of topics;
- Rules of the road.
Code is Law
September 13: Sorting out the technical complexities of Internet traffic
- What is the client-server model?
- What is peer-to-peer traffic?
- What is utility computing?
- What does it mean to say "data is in the cloud"?
- Why do these different architectures matter from a legal viewpoint?
Readings:
- Frank Easterbrook, Cyberspace and the Law of the Horse (Links to an external site.), 1996 U. Chicago Legal Forum.
- Joel Reidenberg, Lex Informatica (Links to an external site.), Texas Law Review, 1997.
- Introduction to the Court System (Links to an external site.) (US).
- Orin Kerr, How to Read a Judicial Opinion: A Guide for New Law Students (Links to an external site.), 2005.
- Office of the Federal Register, A Guide to the Rulemaking Process. (Links to an external site.)
For those of you for whom computing and the Internet are unfamiliar, please also read:
- Grimmelman, pp. 17-26 and 27-36.
- Rus Shuler, How Does the Internet Work? (Links to an external site.), 2002.
September 15: Who governs the Internet?
- What roles do governments play?
- What roles do international organizations have?
- Who are the different players—ITU, ICANN, IETF—and what do they do?
- What role do tech companies play?
Readings:
- Overview of the ITU's History. (Links to an external site.)
- Malte Ziewitz and Ian Brown, A Prehistory of Internet Governance (Links to an external site.), pp. 18-21 and 23-30.
- Laura DeNardis, The Global War for Internet Independence, Yale University Press, 2014, chapters 1, 2 (skim through p. 46, then read pp. 46-51), 3 (pp. 66-71).
- Kristen Eichensehr, Digital Switzerlands (Links to an external site.), University of Pennsylvania Law Review, 2019.
September 20: Understanding Jurisdiction Part I
- Once it was believed that the Internet transcended borders; now we understand otherwise. What does this mean in practice for speech?
- For criminal activities?
Readings:
- John Perry Barlow, A Declaration of Independence for Cyberspace (Links to an external site.), 1996.
- Jack Goldsmith and Tim Wu, Digital Borders (Links to an external site.), Legal Affairs, 2006.
- Grimmelmann, Dow Jones v. Gutnick (pp. 73-76), Google v. Equustek (pp. 81-89), Gambling Treaty Problem and Diplomatic Mission Problem (pp. 91-93); US Courts (pp. 93-94,103-105, 107-111).
- Rogier Creemers, China's Conception of Cyber Sovereignty: Rhetoric and Realization (Links to an external site.), in Dennis Broeders and Bibi van Berg (eds.), Governing Cyberspace Behavior, Power, and Diplomacy, 2020, pp. 107-144
September 22: NO CLASS
September 27: Understanding Jurisdiction Part II:
- The Internet simplifies conducting activities across borders. Which international treaties handle cyber issues?
- What policy actions effectively act as establishing jurisdiction on cyber matters outside a state's borders?
Readings:
- Budapest Convention on Cybercrime (Links to an external site.), 2001.
- Omer Tene, Microsoft v. USA: Location of Data and the Law of the Horse, IEEE XPlore December 2016 (available through Tisch).
- Jennifer Daskal and Andrew Keane Woods, Congress Should Embrace the DoJ's Cross-Border Data Fix (Links to an external site.), Lawfare, August 1, 2016.
- Jennifer Daskal, Unpacking the CLOUD Act (Links to an external site.), EUCRIM, 2018.
Controlling—and Failing to Control—Speech
September 29: Free Speech in the US: Genesis and Rationale
- What does the U.S. First Amendment say?
- What's the rationale behind the First Amendment?
- How does it get applied?
Readings:
- Grimmelmann, Commerce Clause, p. 112 and First Amendment Basics pp. 121-122.
- Fourteenth Amendment (Links to an external site.).
- New York Times v. Sullivan (Links to an external site.), 376 U.S. 254 (1964).
- We're Going to Publish: An Oral History of the Pentagon Papers (Links to an external site.), New York Times, June 15, 2021.
- Jack Goldsmith, Seven Thoughts on Wikileaks (Links to an external site.), December 10 2010.
October 4: What is Speech?
- What exactly does the First Amendment protect?
- How is this manifested in the online world?
Readings:
- Grimmelmann, First Amendment Basics (pp. 121-126).
- NAACP v. Alabama (Links to an external site.), 357 U.S. 499 (1958).
- Bernstein v. US Dept. of State (Links to an external site.), 922 F. Supp. 1426 (N.D. Cal. 1996).
October 6: Offensive, Dangerous, and Prohibited Speech
- How has the Internet changed speech?
- What dangers ensue?
Readings:
- Reno v. ACLU (Links to an external site.), 521 U.S. 844 (1997); syllabus only.
- Communications Decency Act, Section 230 (Links to an external site.).
- Daniel Solove, Restoring the CDA Section 230 to What It Actually Says (Links to an external site.), February 4, 2021.
- Tim Wu, Is the First Amendment Obsolete? (Links to an external site.), Columbia Law Public Research Paper No. 14-573, Jan. 13, 2018.
- Jill Lepore, The Hacking of America (Links to an external site.), New York Times, September 14, 2018.
- Emily Bazelon, The Problem of Free Speech in an Age of Disinformation (Links to an external site.), New York Times, October 13, 2020 .
- Elyse Samuels, How Misinformation on WhatsApp Led to a Killing in India, (Links to an external site.) Washington Post, February 21 2020.
- Kate Klonick, You'll Never Guess This One Crazy Thing Governs Online Speech (Links to an external site.), August 24, 2016.
- Grimmelmann, People's Front of Judea (pp. 219-220).
October 11: Indigenous Peoples Day: NO CLASS
October 13: Controlling Speech
- Is uncontrolled speech on the Internet a serious danger?
- Which entities control speech on the Internet?
- Are their controls effective—and what does "effective" mean?
Readings:
- Alexis Madrigal, India's Lynching Epidemic and the Problem with Blaming Tech (Links to an external site.), Atlantic Monthly, September 25, 2018.
- Jack Balkin, Old School/New School Speech Regulation (Links to an external site.), 2014.
- Jack Balkin, How to Regulate (and Not Regulate) Social Media (Links to an external site.), Knight First Amendment Institute at Columbia University, March 25, 2020.
- Kate Klonick, The New Governors: The People, Rules, and Processes Governing Free Speech (Links to an external site.), Harvard Law Review, 2018; parts II and III.
- Grimmelmann, pp. 152-154.
- Facebook Oversight Board (Links to an external site.); read the purpose, skim the charter.
- Case 2021-005-FB-UA (Links to an external site.) and Case 2021-003-FB-UA (Links to an external site.).
- Grimmelman, Points of Control (pp. 556-562).
October 18: NO CLASS
Viewing and Tiny Assignment:
- Judy Brewer, Why We Need a More Accessible Digital Landscape (Links to an external site.), May 2019.
Search in Digital Environments
October 20: Searching Communications
- What does the Fourth Amendment mean?
- Is searching communications fundamentally different from searching "persons, houses, papers, and effects"?
Readings:
- Fourth Amendment (Links to an external site.)
- Brandeis dissent, Olmstead v. United States (Links to an external site.), 477 U.S. 238 (1928).
- Katz v. United States (Links to an external site.), 339 U.S. 347 (1967).
- US Code (Links to an external site.) 2510, 2511, 2515, 2518 (only skim 2518).
October 25: Searching the non-content part of communications
- Katz protects communications, but what about the non-content aspects of online speech?
- What information does non-content reveal?
- What protections does non-content have?
- How do governments use this information?
Readings:
- Smith v. Maryland (Links to an external site.), 442 U.S. 735 (1979) Opinion of the Court.
- Kyllo v. United States (Links to an external site.), 533 U.S. 27 (2001); Read Syllabus and Opinion of the Court.
- United States v. Jones (Links to an external site.), 132 U.S. 945 (2012); Read Syllabus and Sotomayor concurrence.
- National Research Council, Bulk Collection of Signals Intelligence, (Links to an external site.)National Academies Press, 2015; Chapter 1 (Introduction and Background).
- Steven Bellovin, Matt Blaze, Susan Landau, and Stephanie Pell, It's Too Complicated: How the Internet Upends Katz, Smith, and Electronic Surveillance Law (Links to an external site.), Harvard Journal of Law and Technology, Fall 2016, Section IV.
- Carpenter v. United States (Links to an external site.), 585 U.S. __ (2018); read Syllabus and Opinion of the court.
October 27: Foreign Intelligence Surveillance
- What is the law on electronic surveillance in foreign intelligence cases and how does it differ from criminal cases?
- What challenges does the Internet pose?
- What advantages does the Internet provide to foreign intelligence surveillance?
- What challenges does that advantage create?
Readings:
- Foreign Intelligence Surveillance Act of 1978 (Links to an external site.).
- Privacy and Civil Liberties Oversight Board, Report on the Surveillance Program Operated Pursuant to Section 702 of the Foreign Intelligence Surveillance Act (Links to an external site.), sections 1-3, 2014.
- Matthew L. Jones, The Spy Who Pwned Me (Links to an external site.), Limn, February 2017.
November 1: Conducting electronic searches: law and practice
- What information must the warrants contain?
- How is a search of electronic devices conducted?
- How is chain of custody established?
- What processes and procedures must be done when searching electronic devices?
Readings:
- Electronic Surveillance Manual: Procedures and Case Law Forms (Links to an external site.), 2005 (rev. 2015), Sections II and III (pp. 1-19).
- Riley v. California (Links to an external site.), 134 U.S. 2473 (2014); Read Syllabus and Opinion of the Court.
- Steven J. Murdoch, Daniel Seng, Burkhard Schafer, and Stephen Mason, The sources and characteristics of electronic evidence and artificial intelligence (Links to an external site.), 1.65-1.93.
- Stephen Mason, Challenging the code to test the truth of the statement (Links to an external site.), 4.37.
- Luciana Duranti and Allison Stanfield, Authenticating Electronic Evidence (Links to an external site.), skim 6.1-6.5, then read 6.6-6.14.
- Nigel Wilson, Andrew Sheldon, Hein Dries, Burkhard Shafer, Stephen Mason, Proof: the technical collection and examination of electronic evidence (Links to an external site.), 9.19-9.25.
- Alex Iftimie, No Server Left Behind: The Justice's Department Novel Law Enforcement Operation to Protect Victims (Links to an external site.), Lawfare, April 19, 2021.
November 3: The Crypto Wars
- What is cryptography?
- What's the conflict about?
- How has criminal activity and investigative techniques changed since the 1990s?
- Whitfield Diffie and Susan Landau, Privacy on the Line: The Politics of Wiretapping and Encryption, MIT Press, rev. and updated ed., 2007 chapter 2.
- Steven M. Bellovin, Matt Blaze, Sandy Clark, and Susan Landau, Going Bright: Wiretapping without Weakening Communications Infrastructure (Links to an external site.), IEEE Security and Privacy, Vol. 11, No. 1, January/February 2013.
- James Comey, Going Dark: Are Technology, Privacy, and Public Safety on a Collision Course? (Links to an external site.), speech at Brookings Institute, October 16, 2014.
- Harold Abelson, Steven M. Bellovin, Josh Benaloh, Matt Blaze, Whitfield Diffie, John Gilmore, John Gilmore, Matthew Green, Susan Landau, Peter G. Neumann, Ronald L. Rivest, Jeffrey I. Schiller, Bruce Schneier, Michael Specter, Daniel J. Weitzner, Keys Under Doormats: mandating insecurity by requiring government access to all locked phones and devices (Links to an external site.), Journal of Cybersecurity, November 17, 2015.
- Susan Landau, The Real Security Risks of the iPhone Case, Science, Vol. 352, Issue 6292, June 17, 2016.
- Syllabus and Sotomayor concurrence, United States v. Jones, 565 US 200 (2011).
- Hal Abelson, Ross Anderson, Steven M. Bellovin, Josh Benaloh, Matt Blaze, Jon Callas, Whitfield Diffie, Susan Landau, Peter G. Neumann, Ronald L. Rivest, Jeffrey I. Schiller, Bruce Schneier, Vanessa Teague, Carmela Troncoso, Bugs in our Pockets: The Risks of Client-Side Scanning, Executive Summary, October 2021.
November 8: Regulations—and A Very Brief Look at Protecting Privacy
- How are regulations in the US promulgated?
- How did this work in the case of CALEA?
- How has this worked in the case of privacy?
Readings:
- (reread) Office of the Federal Register, A Guide to the Rulemaking Process. (Links to an external site.)
- recommended—but not required: Kenneth Bamberger and Deirdre Mulligan, Privacy on the Books and on the Ground. Read pp. 249-295.
Copyright in the online world (a brief look)
November 10: Copyright
- What is the purpose of copyright?
- What does copyright not protect? What benefit does society accrue from that lack of protection?
Readings:
- Copyright law (17 U.S.C. 102 (a) (Links to an external site.)).
- U.S. Copyright Office, Copyright FAQ (Links to an external site.) (skim this).
- Jessica Litman, Digital Copyright (Links to an external site.), Maize Books, University of Michigan Press, 2006, chapters 1, 7, 8.
- U.S.C. 1201 (Links to an external site.): Circumvention of copyright protection systems.
- Grimmelmann, pp. 416-471; 473-475.
- Jessica Litman, Real Copyright Reform (Links to an external site.), 2010, pp. 3-7.
- Listen to a standard version of My Favorite Things from the Sound of Music and then to John Coltrane's version (Links to an external site.).
November 15: Consequences of the DMCA: implications for security research, fair use, and the "right to repair";
- How is copyright working in the digital age?
- Is copyright working in the digital age?
Readings:
- 17 U.S.C. 1201 (Links to an external site.): Circumvention of copyright protection systems.
- Yochai Benkler, The Wealth of Networks (Links to an external site.), Yale University Press, 2006, pp. 59-69.
- Jessica Litman, The Digital Millennium Copyright Act at 22: (Links to an external site.)What Is It, Why It Was Enacted, And Where Are We Now? (Links to an external site.), Hearing Before the United States Senate Committee on the Judiciary Subcommittee on Intellectual Property, 116th Congress, February 11, 2020.
November 17: Alternative solutions; Presentation Day
- Are there ways to enable author control while also enabling fair use, reuse in derivative works, etc.?
Readings:
- Creative Commons, What is Creative Commons (Links to an external site.) and Licenses. (Links to an external site.)
- Pamela Samuelson, Digital Rights Management {and, or, vs.} the Law, Communications of the ACM, Vol. 46, Issue 4 (April 2003).
- Jessica Litman, Real Copyright Reform (Links to an external site.), 2010, section IV.
- The two briefings for the presentations are found in the announcements.
International Cyber Conflict and the Law
November 22: What constitutes cyberwar?
- In what ways has cyber changed attacks, especially those occurring outside of a war?
- How does a nation determine who is launching the attack?
- What types of responses are nations able to mount in response?
- What constitutes an act of war?
- Are there legal and policy instruments that can be used to deter these attacks?
Readings:
- D. D. Clark and S. Landau, Untangling Attribution, (Links to an external site.) (Links to an external site.)Harvard National Security Journal, Vol. 2, Issue 2 (2011).
- Sasha Romanosky, Private-Sector Attribution of Cyberattacks: A Growing Concern for the U.S. Government? (Links to an external site.), Lawfareblog, December 21, 2017.
- Andy Greenberg, How an Entire Nation Became Russia's Test Lab for Cyberwar (Links to an external site.), Wired, June 20, 2017.
- Reid Standish, Russia's Neighbors Respond to Putin's 'Hybrid War', (Links to an external site.) Foreign Policy, October 12, 2017.
November 29: Hacking Back
- If someone breaks into your computer, can you follow them back and recover your data?
- What would happen if the break-in was from abroad?
Readings:
- C. Robert Kehler, Herbert S. Lin, Michael Sulmeyer, Rules of engagement for cyberspace operations: a view from the USA (Links to an external site.), Journal of Cybersecurity, February 28, 2017.
- Computer Fraud and Abuse Act (Links to an external site.), Sections 1030 A, 1030 C (skim), 1030 D and 1030 E intros only.
- Nicholas Schmidle, The Vigilantes Who Hack Back (Links to an external site.), New Yorker, May 7, 2018
- Global Commission on the Stability of Cyberspace, Additional Note to the Norm Against Offensive Cyber Operations by Non-State Actors (Links to an external site.), November 2018.
- Orin Kerr, The Supreme Court Reins in CFAA in Van Buren (Links to an external site.), Lawfare, June 9, 2021.
December 1; The Conundrum of Cyberattacks: Using Vulnerabilities; Presentation Day
- How do different nations handle zero-day vulnerabilities?
- Where does that leave with international agreements regarding cyberattacks?
Readings:
- White House, Vulnerabilities Equities Policy and Process for the United States Government (Links to an external site.) (unclassified), November 15, 2017.
- Andi Wilson Thompson, Assessing the Vulnerabilities Equities Process, Three Years After the VEP Charter (Links to an external site.), Lawfareblog, January 13 2021.
- Stephanie Kirchgaessner, David Pegg, Sam Cutler, Nina Lakhani, and Michael Safi, Revealed: Leak uncovers global use of cyber surveillance weapon (Links to an external site.), Guardian, July 18, 2021.
- Joe McDonald, China tightens control over cybersecurity in data crackdown (Links to an external site.), Associated Press, July 13, 2021.
- Briefings for the presentations.
The Coming Challenges
December 6: Platforms and Anti-Trust; Presentation Day
- Why are tech platforms so concentrated, that is, largely lacking competition?
Readings:
- Farhad Manjoo, Tech's Frightful Five: They've Got Us, New York Times, May 10. 2017.
- Farhad Manjoo, How the Frightful Five Put Start-Ups in a Lose-Lose Situation, New York Times, October 18, 2017.
- Briefings for the presentations.
December 8: Platforms and Anti-Trust
- Does market concentration in high tech—the Fearsome Five (Amazon, Apple, Facebook, Google, and Twitter)—benefit US consumers?
- What are the costs stemming from this concentration?
Readings:
- Jonathan B. Baker, Joseph Farrell, Andrew I. Gavil, Martin Gaynor, Michael Kades, Michael L. Katz, Gene Kimmelman, A. Douglas Melamed, Nancy L. Rose, Steven C. Salop, Fiona M. Scott Morton, and Carl Shapiro, Joint Response to the House Judiciary Committee on the State of Antitrust Law and Implications for Protecting Competition in Digital Markets (Links to an external site.), April 30, 2020.
Summing Up
December 13: Summing Up