Background
Summary
As the Internet has come to be a prime communicate for social networking for the masses and for commercial activities, the criminal justice system has become more interested in asserting authority over it and the activities of those who use it. Initially, the questions facing legal decision makers tended to concern important but relatively straightforward questions about how to categorize this new medium and those who use it. For example, should the Internet be regulated like the print media or like broadcasting, and should online service providers be treated more like bookstores or like publishers? More recently, broader and deeper questions have arisen about the role of law in this new domain. These have ranged from concerns about the nature of crime and how the criminal justice system address these new challenges.
Description
Cyber law will be infused in the Introduction to Criminal Justice course to provide students to the key policy issues related to cybersecurity, including legal authorities and obligations of both the government and the private sector with respect to protecting computer systems and networks, as well as keeping society safe. This section of the course will include a lecture and test regarding federal laws, executive orders, regulations, and cases related to surveillance, cyber intrusions, data breaches, and the right to privacy. The course will also explore the technological landscape that will provide students with opportunities to discuss cutting-edge issues at the intersection of law, technology and policy.
Risk
The number and sophistication of cyber-attacks has increased dramatically over the past five years and is expected to continue to grow. The threat has reached the point that given enough time, motivation, and funding, a determined adversary will likely be able to penetrate any system that is accessible directly from the Internet. It is imperative that cyber security remains salient for the protection for the foundation of our society and to ensure that the backbone of our country’s economic prosperity, national security, and public health—will remain unscathed and always be available when needed.
Real Life Example
In 2011, a security breach by unauthorized intruders into NASDAQ is an example of the kind of breaches directed against important financial infrastructure and illustrates the difficulty of determining clear attribution. The FBI has identified the most significant cyber threats to our nation as those with high intent and high capability to inflict damage or death in the U.S., to illicitly acquire assets, or to illegally obtain sensitive or classified U.S. military, intelligence, or economic information.
Most recently, the need for increase cyber security has been heavily discoursed on the highest level of US government during the 2016 presidential election cycle. Russia, a fierce adversary of the US, has been accused (with damaging facts) of attempting to influence the national election by releasing documents obtained by breaching the Democratic National Committee email system along with other governmental agencies. This act of theft highlights the vulnerability and risks of our founding principles by undermining our democracy. In addition, there is growing concerns about vulnerabilities at the electronic ballot box due cybercrimes that may overturn a national election.