Registered Students login to NYLS Portal for updated Course Information and Reading Assignments.
UNIT 14:
A Case Study: CALEA, VoIP
PONDERABLES:
Students, see handout.
REQUIRED READING:
Declan McCullough, "Feds' wiretapping rules challenged in court," CNET news.com (Jan. 27, 2006).
Federal Communications Commission (FCC): CALEA Information http://www.fcc.gov/calea/
Center for Democracy and Technology: CALEA Information Page http://www.cdt.org/digi_tele/
Douglas Carlson, et al., CALEA: An Update and Open Discussion of the Legal, Technical, and Policy Issues Regarding This Controversial New Regulation (2006) [abstract].
Emily Hancock, CALEA: Does One Size Fit All? pp. 184-206 in Cybercrime, (Jack Balkin, et al. eds., NYU Press 2007).
Kevin Poulsen, Bill Would Clean Up Caller ID, Wired News (Apr. 6, 2006) (legislation to outlaw the use of caller ID spoofing techniques).
STATUTES:
Communications Assistance for Law Enforcement Act of 1994 (CALEA), Pub. L. No. 103-414, 108 Stat. 4279
47 U.S.C. §§ 1001-1010. Interception of Digital Communications.
47 U.S.C. § 1021. Telecommunications Carrier Compliance Payments.
ADDITIONAL READING:
Brief for Petitioners, American Council of Education v. Federal Communications Commission (FCC) (Jan. 26, 2006), available at http://www.educause.edu/ir/library/pdf/EPO0601.pdf
Registered Students login to NYLS Portal for updated Reading Assignments.
Course Outline/Class Units
Registererd NYLS students login to my.nyls.edu for updated outline and assignments.
- Overview, What is Cybercrime?
- Computer Intrusions and Attacks (Unauthorized Access)
- Computer Viruses, Time Bombs, Trojans, Malicious Code (Malware)
- Online Fraud and Identity Theft; Intellectual Property Theft; Virtual Crime
- Online Vice: Gambling; Pornography; Child Exploitation
- International Aspects and Jurisdiction
- Infrastructure and Information Security; Risk Management
- Investigating Cybercrime: Digital Evidence and Computer Forensics
- Interception, Search and Seizure, and Surveillance
- Information Warfare, Cyberterrorism, and Hacktivism
- Terrorism, Radicalization, and The War of Ideas
- Trade Secret Theft and Economic Espionage
- National Security
- Case Study: CALEA, VoIP
Course Information
- PAPER RESEARCH
- USEFUL LINKS FOR DEFINING TECHNICAL TERMS
- COURSE SUBTEXT AND OPTIONAL BACKGROUND MATERIAL
Registered Students login to NYLS Portal for updated Reading Assignments.
All original material on this or any linked page is copyright the Center for Advanced Studies in Science and Technology Policy © 2003-2009. Permission is granted to reproduce this material in whole or in part for non-commercial purposes, provided it is with proper citation and attribution.
|