NOTE: Course offerings change. Classes offered this semester may not be offered in future semesters.

278.78 sec. 1 - Computer Crime Law (Fall 2014)
"The substance and procedure of "

Instructor: Chris Hoofnagle  (view instructor's teaching evaluations | profile)
View all teaching evaluations for this course

Units: 3
Meeting Time: MW 2:10-3:25
Meeting Location: 140

Course Start: August 25, 2014
Class Number (formerly Course Control Number) (Non-1Ls): 49811

"Computer crime" has been with us since the 1960s, but our society's dependence upon, and the evolution of, networked communications has changed computer crime dramatically in recent decades. With the aid of a computer, individuals now can levy sophisticated attacks at a scale typically available to organized crime rings or governments. As a result, all 50 states and the federal government have enacted laws prohibiting unauthorized use of computers, and in recent years, governments have tried to harmonize these laws internationally.

Computers can be the means, target of, or the source of information about a crime, and increasingly, those interested in all aspects of criminal law must have some working knowledge of computer crime to effectively investigate, prosecute, and defend cases. This course will explore the policy and law of computer crime and consider how "cybercrimes" are different from and similar to transgressive behavior in physical space. Topics will include the Fourth Amendment, forensics, electronic surveillance, child predation, cyberbullying, identity theft, computer hacking and cracking, espionage, cyberterrorism, cybersecurity, privacy, and the challenge of cross-jurisdiction enforcement.

No technical knowledge is required for the course, but it is useful to have taken criminal procedure.

Please note, about 60% of reported computer crime cases concern prosecution of child predators. Federal defenders and prosecutors now have significant child pornography/luring dockets, and as a result, a significant amount of class time concerns this difficult, odious topic. These crimes are shocking in their depravity. Care is taken to discuss it with sensitivity, but students should be prepared to engage this material in order to develop a competent understanding of these crimes.

Exam Notes: TH
Course Category: Intellectual Property and Technology Law
This course is cross-listed in the following categories:
Criminal Law

The following files are available for this course:

First Assignment

If you are the instructor or their FSU, you may edit your files on this page.

No reader.

Required Books are in blue

  • Cyber Crime and Digital Evidence: Materials and Cases
    Thomas K. Clancy
    Edition: 1st Edition, 2011
    Publisher: LexisNexis
    ISBN: 9781422494080
    Copyright Date: To Be Determined
    Price: $174.00
    Note: prices are sampled from internet bookstores. Folletts prices are unavailable at this time.
  • Fatal System Error
    Joseph Menn,
    Publisher: PublicAffairs
    ISBN: 9781586487485
    Copyright Date: To Be Determined
    Price: 0.01
    Note: prices are sampled from internet bookstores. Ned's prices are unavailable at this time.
  • Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground
    Kevin Poulsen,
    Publisher: Crown
    ISBN: 9780307588685
    Copyright Date: To Be Determined
    Price: 5
    Note: prices are sampled from internet bookstores. Ned's prices are unavailable at this time.

Go to Course Search