Law 832 /IST 728: Cyber Security Law and Policy
Fall Term 2019
Syracuse University College of Law
Syracuse, New York, USA

This is the new constantly up-dating version of the working syllabus. Click on any subtopic for a full page about that lesson, including assignments.

Lesson & Date Topics
1. Introduction & terminology
1 on 08/19/19 1.a Nature of cyberspace
2 on Aug. 21 1.b. Technical aspects of threats and vulnerabilities
3 on Aug. 26 1.c Categories of actors who pose threats
   
2. The private sector role in securing cyberspace
4 on Aug. 28 2.a. Internet technical standards and governance institutions
5 on Sept. 4 2.b. Private / corporate networks and service providers
   
3. National governments and their role in securing cyberspace
6 on Sept. 9

3.a. The Role of Nation States in Securing Cyber Space

3.b. Implementation mechanisms & intermediaries

7 on Sept. 11

3.c. Legal basis of US statutes affecting cyberspace

3.d. Case study of US attempts to use criminal law

8 on Sept. 16 3.e. Case study of a US attempts to use civil law to affect conduct in cyberspace
9 on Sept. 18 3.f. Case study of a US attempts to use administrative law to affect conduct in cyberspace
   
4. International law's role in securing cyberspace
10 on Sept. 23, 2019

4.a. Sources and Nature of International Law

4.a.i. Treaties (e.g. Budapest Convention and MLATs

4.a.ii Customary International Law

11 on Sept. 25, 2019 4.b. Law of Armed Conflict, customary international law
12 on 9/30/19 4.c. International politics and International Internet governance
 
 
5. Privacy, surveillance and the law
13 on October 2 5.a. A Fourth Amendment primer
14 on Oct. 7 5.b. CALEA, Lawful Intercept on the Internet, and Bug Bounties
15 on Oct. 9 5.c. Statutory Protections (ECPA, Patriot Act, FISA and FISAA)
16 on Oct. 14, 2019 5.d. Espionage, Surveillance and Snowden: Same as it Ever Was?
   
6. Cyber War and Strategy
17 on 10/16/19 6.a. Is cyber a military domain? [Moved from 10/21/19]
18 on Oct. 21 6.b. Offensive Information Operations and Internet of Things [moved from 10/23/19]
19 on Oct. 23 DEBATE [moved from 10/16/19]
20 on Oct. 28 6.c. Exploits as weapons, Zero-Day Exploits (ZDEs), Markets for ZDEs
21 on Oct. 30 6.d. Case study of US-China interactions
   
7. Authentication, Identity, and Data Protection
22 on Nov. 4, 2019 7.a. Whois v. GDPR and Directory Services; NSTIC
23 on Nov. 6 7.b. The Encryption Debate: THE ROLE OF ENCRYPTION IN PROTECTING PRIVACY AND CIVIL LIBERTIES and INFORMATION NEEDS OF LAW ENFORCEMENT AND THE INTELLIGENCE COMMUNITY
[National ID cards, Real Names policies]
24 on Nov. 11 7.c. Case Study of Apples v. FBI and similar litigation
7.d Ethical and political issues of anonymity online
25 on Nov. 13 7.e. Blockchain: Crypto regulation, and cryptocurrencies/blockchain, and SmartĀ  Contracts
   
8. Current legislative and policy initiatives
26 on Nov. 18 8.a. Overview of International cybersecurity initiatives
27 on Nov. 20 8.b. Current legislative and policy initiatives
28 on Dec. 2 [T] Guest Speaker
29 on Dec. 4 In-class Presentations by IST 728 students.

 

Revised 10/15/19.

 

 

Recent Additions

Staff Directory

Connect with us