Cybercrime Logo

 

 

 NYLS Cybercrime.AdvancedStudies.Org

 

UNIT 14:
A Case Study: CALEA, VoIP

Cybercrime, Cyberterrorism, and Digital Law Enforcement
NYLS CRI150 SPRING 2009
Professor K. A. Taipale (bio) (contact)


Registered Students login to NYLS Portal for updated Course Information and Reading Assignments.



UNIT 14:
A Case Study: CALEA, VoIP

PONDERABLES:

Students, see handout.

REQUIRED READING:

Declan McCullough, "Feds' wiretapping rules challenged in court," CNET news.com (Jan. 27, 2006).

Federal Communications Commission (FCC): CALEA Information http://www.fcc.gov/calea/

Center for Democracy and Technology: CALEA Information Page http://www.cdt.org/digi_tele/

Douglas Carlson, et al., CALEA: An Update and Open Discussion of the Legal, Technical, and Policy Issues Regarding This Controversial New Regulation (2006) [abstract].

Emily Hancock, CALEA: Does One Size Fit All? pp. 184-206 in Cybercrime, (Jack Balkin, et al. eds., NYU Press 2007).

Kevin Poulsen, Bill Would Clean Up Caller ID, Wired News (Apr. 6, 2006) (legislation to outlaw the use of caller ID spoofing techniques).

 

STATUTES:

Communications Assistance for Law Enforcement Act of 1994 (CALEA), Pub. L. No. 103-414, 108 Stat. 4279
47 U.S.C. §§ 1001-1010. Interception of Digital Communications.
47 U.S.C. § 1021. Telecommunications Carrier Compliance Payments.

 

ADDITIONAL READING:

Brief for Petitioners, American Council of Education v. Federal Communications Commission (FCC) (Jan. 26, 2006), available at http://www.educause.edu/ir/library/pdf/EPO0601.pdf

 


Registered Students login to NYLS Portal for updated Reading Assignments.



 

Course Outline/Class Units

Registererd NYLS students login to my.nyls.edu for updated outline and assignments.

  1. Overview, What is Cybercrime?
  2. Computer Intrusions and Attacks (Unauthorized Access)
  3. Computer Viruses, Time Bombs, Trojans, Malicious Code (Malware)
  4. Online Fraud and Identity Theft; Intellectual Property Theft; Virtual Crime
  5. Online Vice: Gambling; Pornography; Child Exploitation
  6. International Aspects and Jurisdiction
  7. Infrastructure and Information Security; Risk Management
  8. Investigating Cybercrime: Digital Evidence and Computer Forensics
  9. Interception, Search and Seizure, and Surveillance
  10. Information Warfare, Cyberterrorism, and Hacktivism
  11. Terrorism, Radicalization, and The War of Ideas
  12. Trade Secret Theft and Economic Espionage
  13. National Security
  14. Case Study: CALEA, VoIP

Course Information

  1. PAPER RESEARCH
  2. USEFUL LINKS FOR DEFINING TECHNICAL TERMS
  3. COURSE SUBTEXT AND OPTIONAL BACKGROUND MATERIAL

 


Registered Students login to NYLS Portal for updated Reading Assignments.


All original material on this or any linked page is copyright the Center for Advanced Studies in Science and Technology Policy © 2003-2009. Permission is granted to reproduce this material in whole or in part for non-commercial purposes, provided it is with proper citation and attribution.

 

 NYLS Logo