Course Syllabus
Important Announcements regarding Class Schedule:
- This course is offered as a Computer Science course. This means that the class schedule will follow the AS&E calendar, not the Fletcher calendar.
- Fletcher students should note that the first day of classes is Wednesday September 4.
- There will be an extra optional class on Saturday September 7, time TBD, on how the Internet works. Those who taken/are taking networking courses, Cyber for Future Policymakers, or How Systems Work can comfortably skip. Those who do not know how the Internet works will find the class useful. This extra class is not required.
- No class on October 2; in lieu of class, there is a video to watch with a short reflection piece due on October 15th.
- Fletcher students should also note that there will be classes on November 12 and 13 (Fletcher New York Career days), but these will be on Zoom and taped to accommodate Fletcher students who are on the New York trip.
Readings:
There will be a number of readings, including US Supreme Court cases, various government reports, law review articles and other papers, The course reading is demanding; please plan on reading intensively and apportion time accordingly.
There will be a required online text that we will use periodically: James Grimmelmann, Internet Law: Cases and Problems, 12th edition. The Grimmelmann text is available for download only at Semaphore Press. I encourage you to read about Semaphore Press's publishing approach on its website, a piece of which I am excerpting here:
"Each publication has a suggested price. We price full casebooks based on our belief that it is fair to ask a student pay about $1 for the reading material for each one-hour class session. Different schools use different calendars and credit hours, so we've settled on a suggested price for most of our casebooks of $30. We ask that you pay the suggested price either with a credit card (by clicking the appropriate link on our page), or by sending us a check, and then download a digital copy of the casebook. Note that if your professor has assigned, e.g., only 10 class sessions of material from a Semaphore Press book, then we suggest that you pay $10."
I strongly support this pricing model and hope you will as well. Thank you.
Assignments:
- There will be two short policy briefs due September 29th and October 27th. Each will count 15% of your grade.
- Instead of class on October 2, you will view a short video and then write a short reflection (200-300 words) on how seeing the video changed your thinking. The reflection piece will count 5% of your grade and will be due October 15th.
- In addition, each of you will participate in a group project in which you prepare a group policy brief and do a group presentation in class arguing one side of an issue; there will be an opposing group arguing the other side. The group policy brief will count 20% of your grade, the group presentation and response to questions, 10%. These presentations will be on November 25, December 2 and 4. Each of you will develop part of the group policy brief; these will be shared with your group and me two weeks before the group presentation. Then the group will put together the group presentation. Your individual presentations will not be graded; only the group one will be. The group policy briefs will be due one week before your presentation.
- There will be a final that will count 23% of the course grade.
- Class participation is worth 10% of the grade. Note that the course has extensive readings that are an integral part of the course; I expect you to reflect on the readings and participate actively in class.
- And submitting a short description of yourself and your interests by September 8 5 pm is the remaining 2% of your grade.
NOTE: the readings may change slightly; please check the week before class in case there are updates.
Introduction
September 4: Introduction to the course
- Why a course on cyberlaw and cyberpolicy;
- Why this choice of topics;
- Rules of the road.
Code is Law and Law is Code: Internet Governance
September 9: Sorting out the technical complexities of Internet traffic
- What is the client-server model?
- What is peer-to-peer traffic?
- What is utility computing?
- What does it mean to say "data is in the cloud"?
- Why do these different architectures matter from a legal viewpoint?
Readings:
- Frank Easterbrook, Cyberspace and the Law of the Horse (Links to an external site.), 1996 U. Chicago Legal Forum.
- Joel Reidenberg, Lex Informatica (Links to an external site.), Texas Law Review, 1997.
- Orin Kerr, How to Read a Judicial Opinion: A Guide for New Law Students (Links to an external site.), 2005.
For those of you for whom computing and the Internet are unfamiliar, please also read:
- Grimmelmann, pp. 17-37 (skim).
- Rus Shuler, How Does the Internet Work? (Links to an external site.), 2002.
September 11: Baking the Cake: The Making of Laws in the US
- How are laws made in the US? The federal system and state systems;
- The implementation of laws/administrative law: how did this work in the case of CALEA?
Readings:
- Bill of Rights;
- Introduction to the Court System (Links to an external site.) (US).;
- Grimmelmann: Civil Jurisdiction (94-95); Criminal jurisdiction (108-109);
- Office of the Federal Register, A Guide to the Rulemaking Process. (Links to an external site.)
September 16: Who governs the Internet?
- What roles do governments play?
- What roles do international organizations have?
- Who are the different players—ITU, ICANN, IETF—and what do they do?
- What role do tech companies play?
Readings:
- Overview of the ITU's History. (Links to an external site.)
- Malte Ziewitz and Ian Brown, A Prehistory of Internet Governance (Links to an external site.), pp. 18-21 and 23-30.
- Laura DeNardis, The Global War for Internet Independence, Yale University Press, 2014, chapters 1, 2 (skim through p. 46, then read pp. 46-51), 3 (pp. 66-71).
- Julia Pohle and Thorsten Thiel, Digital Sovereignty, 2020.
September 18: Administrative Law: Fair Information Practice Principles in practice
- Laws don't work out all the issues in controlling a technology; regulators do. How does this work?
- How has this worked in the case of privacy?
- How has it worked in the case of building surveillance capabilities into communications networks?
Readings:
- Robert Gellman, Fair Information Practices: A History, 3-17.
- Recommended—but not required: Kenneth Bamberger and Deirdre Mulligan, Privacy on the Books and on the Ground. Read pp. 249-295.
September 23: Understanding Jurisdiction: Part I
- Once it was believed that the Internet transcended borders; now we understand otherwise. What does this mean in practice for speech?
- For criminal activities?
Readings:
- John Perry Barlow, A Declaration of Independence for Cyberspace (Links to an external site.), 1996.
- Grimmelmann, Civil Jurisdiction, 89-90; Criminal Jurisdiction, 104-105.
- Rogier Creemers, China's Conception of Cyber Sovereignty: Rhetoric and Realization in Dennis Broeders and Bibi van Berg (eds.), Governing Cyberspace Behavior, Power, and Diplomacy, 2020, pp. 107-144. Note that the link is to the book, not to the particular pages.
September 25: Understanding Jurisdiction: Part II
- The Internet simplifies conducting activities across borders. Which international treaties handle cyber issues?
- What policy actions effectively act as establishing jurisdiction on cyber matters outside a state's borders?
Readings:
- Budapest Convention on Cybercrime (Links to an external site.), 2001.
- Omer Tene, Microsoft v. USA: Location of Data and the Law of the Horse, IEEE XPlore December 2016 (available through Tisch).
- Jennifer Daskal, Unpacking the CLOUD Act (Links to an external site.), EUCRIM, 2018.
- Grimmelmann, Seahaven Problem, 86-87.
Controlling—and Failing to Control—Speech
September 30: Free Speech in the US: Genesis and Rationale
- What does the U.S. First Amendment say?
- What's the rationale behind the First Amendment?
- How does it work in practice?
Readings:
- Grimmelmann, First Amendment Basics pp. 119-124.
- Fourteenth Amendment (Links to an external site.).
- NAACP v. Alabama (Links to an external site.), 357 U.S. 499 (1958).
- New York Times v. Sullivan (Links to an external site.), 376 U.S. 254 (1964).
- Optional: We're Going to Publish: An Oral History of the Pentagon Papers (Links to an external site.), New York Times, June 15, 2021.
- Bernstein v. US Dept. of State (Links to an external site.), 922 F. Supp. 1426 (N.D. Cal. 1996).
- Communications Decency Act, Section 230 (Links to an external site.).
- Kate Klonick, The New Governors: The People, Rules, and Processes Governing Online Speech, Harvard Law Review, 2018, Introduction and Section I.
October 2: NO CLASS; instead viewing and an Assignment:
- Judy Brewer, Why We Need a More Accessible Digital Landscape (Links to an external site.), May 2019.
October 7: Offensive, Dangerous, and Prohibited Speech
- What dangers can ensue from free speech?
- Is uncontrolled speech on the Internet a serious danger?
- What forms of control are there to limit certain types of problematic speech?
Readings:
- Tim Wu, Is the First Amendment Obsolete? (Links to an external site.), Section III, Columbia Law Public Research Paper No. 14-573, Jan. 13, 2018.
- Jill Lepore, The Hacking of America (Links to an external site.), New York Times, September 14, 2018.
- Jack Balkin, How to Regulate (and Not Regulate) Social Media (Links to an external site.), Knight First Amendment Institute at Columbia University, March 25, 2020.
- Emily Bazelon, The Problem of Free Speech in an Age of Disinformation (Links to an external site.), New York Times, October 13, 2020.
- Daniel Solove, Restoring the CDA Section 230 to What It Actually Says (Links to an external site.), February 4, 2021.
- Kyle Langvardt and Alan Rozenshtein, The Government’s First Amendment Interest in Ensuring Free Expression on Private Platforms, Lawfare, September 11, 2023.
- Moody v. NetChoice, 2024.
October 9: International Conflict on Free Speech
- Which entities control speech on the Internet?
- Are their controls effective? What does "effective" mean?
- Some states regulate speech; can globally reachable platforms actually support free speech?
Readings:
- Facebook Oversight Board (Links to an external site.); read the purpose, skim the charter.
- Read a Sample Case from the Oversight Board.
- Alexis Madrigal, India's Lynching Epidemic and the Problem with Blaming Tech (Links to an external site.), Atlantic Monthly, September 25, 2018.
- Elyse Samuels, How Misinformation on WhatsApp Led to a Killing in India, (Links to an external site.) Washington Post, February 21 2020.
October 14: Indigenous Peoples' Day: NO CLASS
Search in Digital Environments
October 16: Searching Communications
- What does the Fourth Amendment mean?
- How is searching communications different from searching "persons, houses, papers, and effects"?
Readings:
- Fourth Amendment (Links to an external site.)
- Brandeis dissent, Olmstead v. United States (Links to an external site.), 477 U.S. 238 (1928).
- Katz v. United States (Links to an external site.), 339 U.S. 347 (1967).
- US Code (Links to an external site.) 2510, 2511, 2515, 2518 (only skim 2518).
October 21: Searching the non-content part of communications
- Katz protects communications, but what about the non-content aspects of online speech?
- What information does non-content reveal?
- What protections does non-content have?
- How do governments use this information?
Readings:
- Smith v. Maryland (Links to an external site.), 442 U.S. 735 (1979) Opinion of the Court.
- Kyllo v. United States (Links to an external site.), 533 U.S. 27 (2001); Read Syllabus and Opinion of the Court.
- United States v. Jones (Links to an external site.), 132 U.S. 945 (2012); Read Syllabus and Sotomayor concurrence.
- National Research Council, Bulk Collection of Signals Intelligence, (Links to an external site.)National Academies Press, 2015; Chapter 1 (Introduction and Background).
- Steven Bellovin, Matt Blaze, Susan Landau, and Stephanie Pell, It's Too Complicated: How the Internet Upends Katz, Smith, and Electronic Surveillance Law (Links to an external site.), Harvard Journal of Law and Technology, Fall 2016, Section IV.
- Carpenter v. United States (Links to an external site.), 585 U.S. 296 (2018); read Syllabus and Opinion of the court.
October 23: Foreign Intelligence Surveillance
- What is the law on electronic surveillance in foreign intelligence cases and how does it differ from criminal cases?
- What challenges does the Internet pose?
- What advantages does the Internet provide to foreign intelligence surveillance?
- What challenges does that advantage create?
Readings:
- Foreign Intelligence Surveillance Act of 1978 (Links to an external site.).
- Privacy and Civil Liberties Oversight Board, Report on the Surveillance Program Operated Pursuant to Section 702 of the Foreign Intelligence Surveillance Act (Links to an external site.), sections 1-3, 2014.
- Matthew L. Jones, The Spy Who Pwned Me (Links to an external site.), Limn, February 2017.
- Preston Marquis, FISA Section 702 Reauthorized for Two Years, Lawfare, April 30, 2024.
October 28: Conducting electronic searches: law and practice
- What information must the warrants contain?
- How is a search of electronic devices conducted?
- How is chain of custody established?
- What processes and procedures must be done when searching electronic devices?
Readings:
- Electronic Surveillance Manual: Procedures and Case Law Forms (Links to an external site.), 2005 (rev. 2015), Sections II and III (pp. 1-19).
- Riley v. California (Links to an external site.), 134 U.S. 2473 (2014); Read Syllabus and Opinion of the Court.
- Steven J. Murdoch, Daniel Seng, Burkhard Schafer, and Stephen Mason, The sources and characteristics of electronic evidence and artificial intelligence (Links to an external site.), 1.65-1.93.
- Luciana Duranti and Allison Stanfield, Authenticating Electronic Evidence (Links to an external site.), skim 6.1-6.5, then read 6.6-6.14.
- Nigel Wilson, Andrew Sheldon, Hein Dries, Burkhard Shafer, Stephen Mason, Proof: the technical collection and examination of electronic evidence, 9.19-9.25.
- Stephen Mason, Challenging the code to test the truth of the statement (Links to an external site.), 4.37.
- Alex Iftimie, No Server Left Behind: The Justice's Department Novel Law Enforcement Operation to Protect Victims (Links to an external site.), Lawfare, April 19, 2021.
October 30: Electronic Surveillance; Encryption Issues
Readings: None
Copyright in the online world (a brief look)
November 4: No Class
November 6: Copyright
- What is the purpose of copyright?
- Copyright law allows some uses of content without reimbursement. Why?
- What challenges does digitization and the Internet present to copyright?
Readings:
- Copyright law (17 U.S.C. 102 (a) (Links to an external site.)).
- U.S. Copyright Office, Copyright FAQ (Links to an external site.) (skim this).
- Jessica Litman, Digital Copyright, Maize Books, University of Michigan Press, 2006, chapters 1, 7, 8.
- U.S.C. 1201 (Links to an external site.): Circumvention of copyright protection systems.
- Jessica Litman, Real Copyright Reform (Links to an external site.), 2010, pp. 3-7.
- Listen to a standard version of My Favorite Things from the Sound of Music and then to John Coltrane's version (Links to an external site.).
November 12 (ZOOM CLASS—link in announcements): Consequences of the DMCA—implications for security research, fair use, and the "right to repair"—and Responses
- How is copyright working in the digital age?
- Is copyright working in the digital age?
- Are there ways to enable author control while also enabling fair use, reuse in derivative works, etc.?
Readings:
- 17 U.S.C. 1201 (Links to an external site.): Circumvention of copyright protection systems.
- Yochai Benkler, The Wealth of Networks (Links to an external site.), Yale University Press, 2006, pp. 59-69.
- Jessica Litman, The Digital Millennium Copyright Act at 22: (Links to an external site.)What Is It, Why It Was Enacted, And Where Are We Now? (Links to an external site.), Hearing Before the United States Senate Committee on the Judiciary Subcommittee on Intellectual Property, 116th Congress, February 11, 2020.
- Creative Commons, What is Creative Commons (Links to an external site.) and Licenses. (Links to an external site.)
- Pamela Samuelson, Digital Rights Management {and, or, vs.} the Law, Communications of the ACM, Vol. 46, Issue 4 (April 2003).
- Jessica Litman, Real Copyright Reform (Links to an external site.), 2010, section IV.
The Coming Challenges
November 13 (ZOOM CLASS—link in announcements): Governing the Ungovernable: A Case Study in ML Challenges and Solutions: A Case Study in Contestability
- How do ML systems work?
- What challenges do ML systems present governments?
- How do governments propose to meet those challenges?
Readings:
- Susan Landau, James X. Dempsey, Ece Kamar, Steven M. Bellovin, and Robert Pool, Challenging the Machine: Contestability in Government AI Systems Recommendations and Summary of Workshop on
Advanced Automated Systems, Contestability, and the Law, June 2024, Part II.
- White House, Executive Order 14110: Safe, Secure, and Trustworthy Development and Use of Artificial Intelligence, October 30, 2023, Section 7.2.
- Executive Office of the President, MEMORANDUM FOR THE HEADS OF EXECUTIVE DEPARTMENTS AND AGENCIES, M-24-10, March 28, 2024; Additional Minimum Practices for Rights-Impacting AI. pp. 21-24.
November 18: Market Concentration and Tech Platforms
- Why are tech platforms so concentrated, that is, largely lacking competition?
- Does market concentration in high tech—the Fearsome Five (Amazon, Apple, Facebook, Google, and Twitter)—benefit US consumers?
- What are the costs stemming from this concentration?
Readings:
- Farhad Manjoo, Tech's Frightful Five: They've Got Us, New York Times, May 10. 2017.
- Farhad Manjoo, How the Frightful Five Put Start-Ups in a Lose-Lose Situation, New York Times, October 18, 2017.
- Jonathan B. Baker, Joseph Farrell, Andrew I. Gavil, Martin Gaynor, Michael Kades, Michael L. Katz, Gene Kimmelman, A. Douglas Melamed, Nancy L. Rose, Steven C. Salop, Fiona M. Scott Morton, and Carl Shapiro, Joint Response to the House Judiciary Committee on the State of Antitrust Law and Implications for Protecting Competition in Digital Markets (Links to an external site.), April 30, 2020.
November 20: Hacking Back
- If someone breaks into your computer, can you follow them back and recover your data?
- What would happen if the break-in was from abroad?
- How do different nations handle zero-day vulnerabilities?
- Where does that leave with international agreements regarding cyberattacks?
Readings:
- C. Robert Kehler, Herbert S. Lin, Michael Sulmeyer, Rules of engagement for cyberspace operations: a view from the USA (Links to an external site.), Journal of Cybersecurity, February 28, 2017.
- Computer Fraud and Abuse Act (Links to an external site.), Sections 1030 A, 1030 C (skim), 1030 D and 1030 E intros only.
- Nicholas Schmidle, The Vigilantes Who Hack Back (Links to an external site.), New Yorker, May 7, 2018
- Global Commission on the Stability of Cyberspace, Additional Note to the Norm Against Offensive Cyber Operations by Non-State Actors , November 2018.
- Orin Kerr, The Supreme Court Reins in CFAA in Van Buren (Links to an external site.), Lawfare, June 9, 2021.
Presentations
November 25: The Google Decision plus Presentation
Readings:
- Presentation briefs; see announcements.
December 2: The Conundrum of Cyberdefense: Using Vulnerabilities plus Presentation
Readings:
- How does the US handle zero-day vulnerabilities?
- Presentation briefs: See announcements.
Readings:
- White House, Vulnerabilities Equities Policy and Process for the United States Government (Links to an external site.) (unclassified), November 15, 2017.
- Andi Wilson Thompson, Assessing the Vulnerabilities Equities Process, Three Years After the VEP Charter (Links to an external site.), Lawfareblog, January 13 2021.
- Presentation briefs: Pro-Fairness and Anti-Fairness briefs; see announcements for briefs.
December 4: The Conundrum of Cyberdefense: Using Vulnerabilities plus Presentation
- How do different nations handle zero-day vulnerabilities?
- Where does that leave with international agreements regarding cyberattacks?
Readings:
- Stephanie Kirchgaessner, David Pegg, Sam Cutler, Nina Lakhani, and Michael Safi, Revealed: Leak uncovers global use of cyber surveillance weapon (Links to an external site.), Guardian, July 18, 2021.
- Joe McDonald, China tightens control over cybersecurity in data crackdown (Links to an external site.), Associated Press, July 13, 2021.
- US Department of Commerce, Commerce Adds NSO Group and Other Foreign Companies to Entity List for Malicious Cyber Activities, November 3, 2021.
- Presentation briefs (see Announcements)
Summing Up
December 9: Summing Up