Course Syllabus
Three Important Announcements regarding Class Schedule:
- This course is offered as a Computer Science course. This means that the class schedule will follow the AS&E calendar, not the Fletcher calendar. Fletcher students should note that the first day of classes is Wednesday September 7; Fletcher students should also note that there will be classes on November 7 and 9 (but these will be be via Zoom and taped to accommodate Fletcher students who cannot attend).
- There will be an extra optional class on Saturday September 10, time TBD, on how the Internet works. Those who taken/are taking networking courses, Cyber for Future Policymakers, or How Systems Work can comfortably skip. Those who do not know how the Internet works will find the class useful. This extra class is not required.
- There will be no classes on September 26 and October 5.
Course Schedule:
Please note that cyberlaw and cyberpolicy are dynamic, with rules constantly changing. Thus the readings and even the classes may change as well.
Readings:
There will be a number of readings, including US Supreme Court cases, various government reports, law review articles and other papers, The course reading is demanding; please plan on reading intensively and apportion time accordingly.
There will be a required online text that we will use periodically: James Grimmelmann, Internet Law: Cases and Problems, 12th edition. The Grimmelmann text is available for download only at Semaphore Press. I encourage you to read about Semaphore Press's publishing approach on its website, a piece of which I am excerpting here:
"Each publication has a suggested price. We price full casebooks based on our belief that it is fair to ask a student pay about $1 for the reading material for each one-hour class session. Different schools use different calendars and credit hours, so we've settled on a suggested price for most of our casebooks of $30. We ask that you pay the suggested price either with a credit card (by clicking the appropriate link on our page), or by sending us a check, and then download a digital copy of the casebook. Note that if your professor has assigned, e.g., only 10 class sessions of material from a Semaphore Press book, then we suggest that you pay $10."
I strongly support support this pricing model and hope you will as well. Thank you.
Introduction
September 7: Introduction to the course
- Why a course on cyberlaw and cyberpolicy;
- Why this choice of topics;
- Rules of the road.
Code is Law
September 12: Sorting out the technical complexities of Internet traffic
- What is the client-server model?
- What is peer-to-peer traffic?
- What is utility computing?
- What does it mean to say "data is in the cloud"?
- Why do these different architectures matter from a legal viewpoint?
Readings:
- Frank Easterbrook, Cyberspace and the Law of the Horse (Links to an external site.), 1996 U. Chicago Legal Forum.
- Joel Reidenberg, Lex Informatica (Links to an external site.), Texas Law Review, 1997.
- Orin Kerr, How to Read a Judicial Opinion: A Guide for New Law Students (Links to an external site.), 2005.
For those of you for whom computing and the Internet are unfamiliar, please also read:
- Grimmelmann, pp. 17-37.
- Rus Shuler, How Does the Internet Work? (Links to an external site.), 2002.
September 14: Baking the Cake: The Making of Laws in the US
- How are laws made in the US? The federal system and state systems;
- The implementation of laws/administrative law: how did this work in the case of CALEA?
Readings:
- Bill of Rights;
- Introduction to the Court System (Links to an external site.) (US).;
- Grimmelmann: Civil Jurisdiction (94-95); Criminal jurisdiction (108-109);
- Office of the Federal Register, A Guide to the Rulemaking Process. (Links to an external site.)
September 19: Who governs the Internet?
- What roles do governments play?
- What roles do international organizations have?
- Who are the different players—ITU, ICANN, IETF—and what do they do?
- What role do tech companies play?
Readings:
- Overview of the ITU's History. (Links to an external site.)
- Malte Ziewitz and Ian Brown, A Prehistory of Internet Governance (Links to an external site.), pp. 18-21 and 23-30.
- Laura DeNardis, The Global War for Internet Independence, Yale University Press, 2014, chapters 1, 2 (skim through p. 46, then read pp. 46-51), 3 (pp. 66-71).
- Kristen Eichensehr, Digital Switzerlands (Links to an external site.), University of Pennsylvania Law Review, 2019.
September 21: Understanding Jurisdiction Part I
- Once it was believed that the Internet transcended borders; now we understand otherwise. What does this mean in practice for speech?
- For criminal activities?
Readings:
- John Perry Barlow, A Declaration of Independence for Cyberspace (Links to an external site.), 1996.
- Jack Goldsmith and Tim Wu, Digital Borders (Links to an external site.), Legal Affairs, 2006.
- Grimmelmann, Dow Jones v. Gutnick (pp. 74-78), Google v. Equustek (pp. 82-90), Gambling Treaty Problem and Diplomatic Mission Problem (pp. 92-93); US Courts (pp. 94-95, II B: 103-104).
- Rogier Creemers, China's Conception of Cyber Sovereignty: Rhetoric and Realization (Links to an external site.), in Dennis Broeders and Bibi van Berg (eds.), Governing Cyberspace Behavior, Power, and Diplomacy, 2020, pp. 107-144
September 26: NO CLASS
September 28: Understanding Jurisdiction Part II:
- The Internet simplifies conducting activities across borders. Which international treaties handle cyber issues?
- What policy actions effectively act as establishing jurisdiction on cyber matters outside a state's borders?
Readings:
- Budapest Convention on Cybercrime (Links to an external site.), 2001.
- Omer Tene, Microsoft v. USA: Location of Data and the Law of the Horse, IEEE XPlore December 2016 (available through Tisch).
- Jennifer Daskal and Andrew Keane Woods, Congress Should Embrace the DoJ's Cross-Border Data Fix (Links to an external site.), Lawfare, August 1, 2016.
- Jennifer Daskal, Unpacking the CLOUD Act (Links to an external site.), EUCRIM, 2018.
Controlling—and Failing to Control—Speech
October 3: Free Speech in the US: Genesis and Rationale
- What does the U.S. First Amendment say?
- What's the rationale behind the First Amendment?
- How does it get applied?
Readings:
- Grimmelmann, Commerce Clause, p. 113-114 and First Amendment Basics pp. 123-124.
- Fourteenth Amendment (Links to an external site.).
- New York Times v. Sullivan (Links to an external site.), 376 U.S. 254 (1964).
- We're Going to Publish: An Oral History of the Pentagon Papers (Links to an external site.), New York Times, June 15, 2021.
October 5: NO CLASS
October 10: Indigenous Peoples Day: NO CLASS
October 12: What is Speech?
- What exactly does the First Amendment protect?
- How is this manifested in the online world?
- How has the Internet changed speech?
Readings:
- NAACP v. Alabama (Links to an external site.), 357 U.S. 499 (1958).
- Bernstein v. US Dept. of State (Links to an external site.), 922 F. Supp. 1426 (N.D. Cal. 1996).
- Reno v. ACLU (Links to an external site.), 521 U.S. 844 (1997); syllabus only.
- Communications Decency Act, Section 230 (Links to an external site.).
- Jack Goldsmith, Seven Thoughts on Wikileaks (Links to an external site.), December 10 2010.
October 17: Offensive, Dangerous, and Prohibited Speech
- What dangers ensue?
- Is uncontrolled speech on the Internet a serious danger?
- What forms of control are there to limit certain types of problematic speech?
Readings:
- Kate Klonick, You'll Never Guess This One Crazy Thing Governs Online Speech (Links to an external site.), August 24, 2016.
- Tim Wu, Is the First Amendment Obsolete? (Links to an external site.), Section III, Columbia Law Public Research Paper No. 14-573, Jan. 13, 2018.
- Jill Lepore, The Hacking of America (Links to an external site.), New York Times, September 14, 2018.
- Emily Bazelon, The Problem of Free Speech in an Age of Disinformation (Links to an external site.), New York Times, October 13, 2020 .
- Alexis Madrigal, India's Lynching Epidemic and the Problem with Blaming Tech (Links to an external site.), Atlantic Monthly, September 25, 2018.
- Elyse Samuels, How Misinformation on WhatsApp Led to a Killing in India, (Links to an external site.) Washington Post, February 21 2020.
- Daniel Solove, Restoring the CDA Section 230 to What It Actually Says (Links to an external site.), February 4, 2021.
October 19: Controlling Speech
- Which entities control speech on the Internet?
- Are their controls effective—and what does "effective" mean?
Readings:
- Jack Balkin, Old School/New School Speech Regulation, 2014.
- Jack Balkin, How to Regulate (and Not Regulate) Social Media (Links to an external site.), Knight First Amendment Institute at Columbia University, March 25, 2020.
- Kate Klonick, The New Governors: The People, Rules, and Processes Governing Free Speech (Links to an external site.), Harvard Law Review, 2018; parts II and III.
- Facebook Oversight Board (Links to an external site.); read the purpose, skim the charter.
- Case 2021-005-FB-UA (Links to an external site.) and Case 2021-003-FB-UA (Links to an external site.).
- Recommended: Alan Rozenshtein, Silicon Valley's Speech: Technology Giants and the Deregulatory First Amendment, Journal of Free Speech Law, 2021.
Search in Digital Environments
October 24: Searching Communications
- What does the Fourth Amendment mean?
- Is searching communications fundamentally different from searching "persons, houses, papers, and effects"?
Readings:
- Fourth Amendment (Links to an external site.)
- Brandeis dissent, Olmstead v. United States (Links to an external site.), 477 U.S. 238 (1928).
- Katz v. United States (Links to an external site.), 339 U.S. 347 (1967).
- US Code (Links to an external site.) 2510, 2511, 2515, 2518 (only skim 2518).
October 26: NO CLASS
Viewing and Tiny Assignment:
- Judy Brewer, Why We Need a More Accessible Digital Landscape (Links to an external site.), May 2019.
October 31: Searching the non-content part of communications
- Katz protects communications, but what about the non-content aspects of online speech?
- What information does non-content reveal?
- What protections does non-content have?
- How do governments use this information?
Readings:
- Smith v. Maryland (Links to an external site.), 442 U.S. 735 (1979) Opinion of the Court.
- Kyllo v. United States (Links to an external site.), 533 U.S. 27 (2001); Read Syllabus and Opinion of the Court.
- United States v. Jones (Links to an external site.), 132 U.S. 945 (2012); Read Syllabus and Sotomayor concurrence.
- National Research Council, Bulk Collection of Signals Intelligence, (Links to an external site.)National Academies Press, 2015; Chapter 1 (Introduction and Background).
- Steven Bellovin, Matt Blaze, Susan Landau, and Stephanie Pell, It's Too Complicated: How the Internet Upends Katz, Smith, and Electronic Surveillance Law (Links to an external site.), Harvard Journal of Law and Technology, Fall 2016, Section IV.
- Carpenter v. United States (Links to an external site.), 585 U.S. __ (2018); read Syllabus and Opinion of the court.
November 2: Foreign Intelligence Surveillance
- What is the law on electronic surveillance in foreign intelligence cases and how does it differ from criminal cases?
- What challenges does the Internet pose?
- What advantages does the Internet provide to foreign intelligence surveillance?
- What challenges does that advantage create?
Readings:
- Foreign Intelligence Surveillance Act of 1978 (Links to an external site.).
- Privacy and Civil Liberties Oversight Board, Report on the Surveillance Program Operated Pursuant to Section 702 of the Foreign Intelligence Surveillance Act (Links to an external site.), sections 1-3, 2014.
- Matthew L. Jones, The Spy Who Pwned Me (Links to an external site.), Limn, February 2017.
November 7: Conducting electronic searches: law and practice
- What information must the warrants contain?
- How is a search of electronic devices conducted?
- How is chain of custody established?
- What processes and procedures must be done when searching electronic devices?
Readings:
- Electronic Surveillance Manual: Procedures and Case Law Forms (Links to an external site.), 2005 (rev. 2015), Sections II and III (pp. 1-19).
- Riley v. California (Links to an external site.), 134 U.S. 2473 (2014); Read Syllabus and Opinion of the Court.
- Steven J. Murdoch, Daniel Seng, Burkhard Schafer, and Stephen Mason, The sources and characteristics of electronic evidence and artificial intelligence (Links to an external site.), 1.65-1.93.
- Luciana Duranti and Allison Stanfield, Authenticating Electronic Evidence (Links to an external site.), skim 6.1-6.5, then read 6.6-6.14.
- Nigel Wilson, Andrew Sheldon, Hein Dries, Burkhard Shafer, Stephen Mason, Proof: the technical collection and examination of electronic evidence, 9.19-9.25.
- Stephen Mason, Challenging the code to test the truth of the statement (Links to an external site.), 4.37.
- Alex Iftimie, No Server Left Behind: The Justice's Department Novel Law Enforcement Operation to Protect Victims (Links to an external site.), Lawfare, April 19, 2021.
November 9: Administrative Laws: Two Case Studies (CALEA and Privacy)
- How has this worked in the case of privacy?
Readings:
- Robert Gellman, Fair Information Practices: A History, 3-16.
- recommended—but not required: Kenneth Bamberger and Deirdre Mulligan, Privacy on the Books and on the Ground. Read pp. 249-295.
- There are only readings on privacy for today, none on CALEA, which will be covered in class only.
Copyright in the online world (a brief look)
November 14: Copyright
- What is the purpose of copyright?
- What does copyright not protect? What benefit does society accrue from that lack of protection?
Readings:
- Copyright law (17 U.S.C. 102 (a) (Links to an external site.)).
- U.S. Copyright Office, Copyright FAQ (Links to an external site.) (skim this).
- Jessica Litman, Digital Copyright, Maize Books, University of Michigan Press, 2006, chapters 1, 7, 8.
- U.S.C. 1201 (Links to an external site.): Circumvention of copyright protection systems.
- Jessica Litman, Real Copyright Reform (Links to an external site.), 2010, pp. 3-7.
- Listen to a standard version of My Favorite Things from the Sound of Music and then to John Coltrane's version (Links to an external site.).
November 16: Consequences of the DMCA: implications for security research, fair use, and the "right to repair";
- How is copyright working in the digital age?
- Is copyright working in the digital age?
Readings:
- 17 U.S.C. 1201 (Links to an external site.): Circumvention of copyright protection systems.
- Yochai Benkler, The Wealth of Networks (Links to an external site.), Yale University Press, 2006, pp. 59-69.
- Jessica Litman, The Digital Millennium Copyright Act at 22: (Links to an external site.)What Is It, Why It Was Enacted, And Where Are We Now? (Links to an external site.), Hearing Before the United States Senate Committee on the Judiciary Subcommittee on Intellectual Property, 116th Congress, February 11, 2020.
November 21: Alternative solutions; Presentation Day
- Are there ways to enable author control while also enabling fair use, reuse in derivative works, etc.?
Readings:
- Creative Commons, What is Creative Commons (Links to an external site.) and Licenses. (Links to an external site.)
- Pamela Samuelson, Digital Rights Management {and, or, vs.} the Law, Communications of the ACM, Vol. 46, Issue 4 (April 2003).
- Jessica Litman, Real Copyright Reform (Links to an external site.), 2010, section IV.
- Briefings for the presentations (they can be found in the course announcements).
International Cyber Conflict and the Law
November 28: Hacking Back
- If someone breaks into your computer, can you follow them back and recover your data?
- What would happen if the break-in was from abroad?
Readings:
- C. Robert Kehler, Herbert S. Lin, Michael Sulmeyer, Rules of engagement for cyberspace operations: a view from the USA (Links to an external site.), Journal of Cybersecurity, February 28, 2017.
- Computer Fraud and Abuse Act (Links to an external site.), Sections 1030 A, 1030 C (skim), 1030 D and 1030 E intros only.
- Nicholas Schmidle, The Vigilantes Who Hack Back (Links to an external site.), New Yorker, May 7, 2018
- Global Commission on the Stability of Cyberspace, Additional Note to the Norm Against Offensive Cyber Operations by Non-State Actors , November 2018.
- Orin Kerr, The Supreme Court Reins in CFAA in Van Buren (Links to an external site.), Lawfare, June 9, 2021.
November 30; The Conundrum of Cyberattacks: Using Vulnerabilities; Presentation Day
- How do different nations handle zero-day vulnerabilities?
- Where does that leave with international agreements regarding cyberattacks?
Readings:
- White House, Vulnerabilities Equities Policy and Process for the United States Government (Links to an external site.) (unclassified), November 15, 2017.
- Andi Wilson Thompson, Assessing the Vulnerabilities Equities Process, Three Years After the VEP Charter (Links to an external site.), Lawfareblog, January 13 2021.
- Stephanie Kirchgaessner, David Pegg, Sam Cutler, Nina Lakhani, and Michael Safi, Revealed: Leak uncovers global use of cyber surveillance weapon (Links to an external site.), Guardian, July 18, 2021.
- Joe McDonald, China tightens control over cybersecurity in data crackdown (Links to an external site.), Associated Press, July 13, 2021.
- Briefings for the presentations (they can be found in the course announcements).
The Coming Challenges
December 5: Platforms and Anti-Trust; Presentation Day
- Why are tech platforms so concentrated, that is, largely lacking competition?
Readings:
- Farhad Manjoo, Tech's Frightful Five: They've Got Us, New York Times, May 10. 2017.
- Farhad Manjoo, How the Frightful Five Put Start-Ups in a Lose-Lose Situation, New York Times, October 18, 2017.
- Briefings for the presentations (they can be found in the course announcements).
December 7: Platforms and Anti-Trust
- Does market concentration in high tech—the Fearsome Five (Amazon, Apple, Facebook, Google, and Twitter)—benefit US consumers?
- What are the costs stemming from this concentration?
Readings:
- Jonathan B. Baker, Joseph Farrell, Andrew I. Gavil, Martin Gaynor, Michael Kades, Michael L. Katz, Gene Kimmelman, A. Douglas Melamed, Nancy L. Rose, Steven C. Salop, Fiona M. Scott Morton, and Carl Shapiro, Joint Response to the House Judiciary Committee on the State of Antitrust Law and Implications for Protecting Competition in Digital Markets (Links to an external site.), April 30, 2020.
Summing Up
December 12: Summing Up