My office hours for Spring 2018 are:
Monday: 2:00 - 3:00, Halligan 241
Tuesday: 1:30-2:30. Mugar 251D
Because of travel related to my new book, Listening In: Cybersecurity in an Insecure Age, I will be travelling some this spring. Please check with my admin, Tina Cottle, whether I'll be in.
I expect to be teaching Privacy in the Digital Age as a full-term course in Spring 2019. Syllabus wil be forthcoming. Meanwhile, for a sense of some what I will cover can be found in the module (half term) course I taught in spring 2018.
My teaching for Fall 2018 is Cyberlaw and Cyberpolicy.
Course description: This course is an introduction to the legal issues of cyberspace. Legal issues in this domain are complex. Technology has been evolving faster than the law's ability to handle the changes, so partially this course will be an education in the legislating and policy making of moving targets. It will also be an education in jurisdiction, privacy, surveillance, and copyright as it relates to the Internet. The perspective will be from US law and jurisprudence, although there will be periodic forays into international issues. Topics covered will include cyberlaw and cybergovernance, the Digital Revolution and its impact on First, Fourth, and Fifth Amendment issues, copyright in the Digital Age, and the Computer Fraud and Abuse Act.
Students need not be computer science majors to take Cyberlaw and Cyberpolicy, but the course will assume some familiarity with how the Internet works as well as some familiarity with laws and policy making. The latter need not be through formal education---e.g., it could come from frequent reading of the press (and by this, I mean the parts of the press that cover legal issues in a thoughtful and detailed way (e.g., the New York Times or the Washington Post---but it will be assumed. During the course, students will be expected to integrate knowledge of technology with law, politics, economics, and domestic and international affairs. There will be significant amounts of reading, writing, and discussion in this class (and no programming).More information on the course can be found here (currently the course syllabus is visible only to Tufts students).
My teaching for Spring 2018 is:
Cyber in the Civil Sector: Threats and Upheavals: There is a myth that the Internet erases borders. But as Internet companies' ability to place localized ads show, that's false. What's more accurate is that the Internet complicates a nation's ability to control of the flow of information within its borders. (This is not a new challenge for sovereign nations; consider the telegraph.) This fluidity has created great economic opportunity and simplified trans-border access, the latter potentially threatening security and other basic state functions. With bits increasingly controlling the world around us, the Digital Revolution poses a highly disruptive threat. In this course, well explore cyber clashes in the civilian sector: from jurisdictional issues and the challenges posed by new technologies to criminal activities and impacts on civil infrastructures. While several of the topics are also covered in International Cyber Conflict: An Introduction to Power and Conflict in Cyberspace, DHP P249, the intersection between the two courses will be relatively minimal. Cyber in the Civil Sector will have a greater focus on technology and, naturally enough, on the civilian, as opposed to national-security, side of the house.
Information on Cyber in the Civil Sector is here.
Privacy in the Digital Age: This module will provide an introduction to the threats to and protections for privacy in the digital age, examining public and private sector threats, and looking at issues from an international point of view. Topics to be covered include privacy threat models, location tracking and first and third party collection by private parties, government threats to privacy, and privacy protective technologies. No programming background needed, but a willingness and interest to play with digital tools is required.
Information on Privacy in the Digital Age is here.
Please Note: These courses are cross listed in Computer Science, but their primary home is Fletcher. That means they will be taught on the Fletcher academic calendar. Both courses are limited enrollment (thirty students each), with half the enrollment from Fletcher and half from AS&E (students from AS&E admitted by permission of the instructor, with preference for students majoring in computer science and/or political science/IR).