Welcome to the website for Computer Crimes and Personal Security, Module 2 in the Hybrid Online / In-Person Cybersecurity Law and Policy course sequence at Seton Hall Law School.
Here is the online lecture material for Class 1. In this class, we introduce the different methods cyber criminals use and discuss the costs of cyber crime. It’s important to have some understanding of how cyber criminals operate and the nature of cyber crime in order to evaluate and apply the computer crime and personal security laws will will examine during this course.
The first lecture video references some data from the Ponemon Institute study included in your readings. This data relates to the costs of economic cyber crimes against corporate victims:
The second short video features former FBI Director Robert Mueller describing how the FBI deals with cybercrime:
The next short video is from Vice TV’s “Cyberwar” program and describes one famous Russian hacker:
The final video is a lecture given by Ken Blanco, Acting Assistant Attorney General in the U.S. Department of Justice, Criminal Division, on personal cybercrimes such as cyberstalking, harassment, and swatting. You can skip the introductions and start watching at about four minutes in. Note Blanco’s comments about the holes in federal law concerning these crimes. As we will see, there are some state laws dealing with some of these issues, but some of these statutes raise difficult First Amendment and privacy issues.
There are also some optional videos provided with the readings.
Here is Lecture 2:
Here is Lecture 4
Here is Lecture 5
Here is the lecture for Class 6.
For Class 7, here is a brief introductory video and some external video content. You need to watch all the videos to “attend” this class.
Goodman TED Talk:
This next video is part 2 of a video from a conference panel. You can find part 1 on YouTube if you’re interested, but part 2 has the content I want you to watch: