Skip Ribbon Commands
Skip to main content

Winter 2012 Class Descriptions

As of 6/19/2018 5:28:54 AM

Computer Crimes

This course will examine the intersection of law enforcement and

technology. In the first half of the semester, we will look at the various

rules that govern law enforcement actions, such as the use of cell phone

data to track suspects, or the practice of indiscriminately copying and

searching entire hard drives at border crossings and airports. We will

focus in particular on how courts have framed these issues, and what those

responses might suggest for future technological change. We will also

examine different constraints on governmental action, including the Fourth

Amendment, the Electronic Communications Privacy Act ("ECPA"), the Stored

Communications Act, and the Wiretap Act. In the second half of the

semester, we will examine how the internet has spawned new forms of

criminal conduct, and how both Congress and law enforcement have responded to that conduct. We will look at several of the laws specifically

addressing criminal acts committed using computers, as well as the

adaptation of older laws to apply to this newer arena.

3.00 hours