Computers, Crimes, and Privacy
School of Law
Santa Clara University
Spring 1997
Lecture Notes Outline: Table of
Contents
- I. Mechanics: Seminar
- II. Law and Technology
- III. Three topics:
- I. Today the present, future, and papers. Next week into
the past.
- II. Strong Privacy: The technology
- III. The Supporting Technology: power, bandwidth, VR
- IV. Implications of strong privacy
1/21/97
The Development of Computer Law
- I. Lund v. Virginia (1977)
- II. U.S. v. Seidlitz (1978)
- III. U.S. v Jones: (1977)
- IV. Versaggi (1987)
1/23
- I. Review:
- II. Technological digression:
- III. How the web works: theory and practice.
- IV. The rest of the internet: Web is so popular because
because it is easy to use.
- I. The Hacker Crackdown: The sociology of computer
crime
- II. U.S. v. Robert Riggs (and Craig Neidorf)
- III. Unix source code cases. 1990.
- IV. Review: Issues raised by the criminal cases.
- V. Steve Jackson case:
- VI. "Sending a Message"
- VII. Some final comments
- I. Computer Crime:
- II. Low tech computer crime:
- III. Card counting?
- IV. How much computer crime is there?
- I: The old nightmare: Computers as the end of
privacy.
- II. Public Fork:
- III. Rogan v City of Los Angeles
- IV. Private fork: Thompson v San Antonio Retail Merchants
Association
- V. Fair Credit reporting act.
- VI. Digression: How should we handle the private data base
issue?
- VII. Privacy: How can it be provided, destroyed
- I. The question of standards:
- II. Review:
- III. Digression on details: Digital signatures et.
al.
- IV. As computers get faster, they can encrypt faster,
decrypt faster, and break encryption faster.
- V. Froomkin on the clipper chip:
- VI. Controlling Encryption--today we are playing the
government's role, and trying to figure out how we would control
it if we wanted to.
- VII. Some possible problems with Clipper
- VIII Hardware v Software encryption
- IX.
Beyond Clipper:
- X. International: Dorothy Denning thought piece.
- XI. Why does the government care about cryptography?
- XII. How important is wiretapping? Freeh's statement
- XIII. Chapter 3:
- XIV. Chapter 4: Policy dispute.
- XV. Chapter 5: The digital telephony act
- I. CDA arguments:
- II. Security issue: Macromedia Shockwave Multimedia
plugin.
- III. Security Issue: ActiveX and Quicken.
- IV. Chapter 6: Diffie.
- V. PGP Story:
- VI. Federal Encryption related law:
- VII. Perfect Crimes article
- VIII
Lots more stuff on the CDA
- IX. Sable v FCC: One of the closest things to a relevant
precendent
- X. Clipper III: "Voluntary" infrastructure with
escrow.
- XI. Randall Schwartz Case:
- XII. Remailer liability issues?
- I. What have we learned?
- II. Orwell Lesson: Too early.
- III. Thanks for helping me teach the class.
Back to Course Home Page