Cybercrime describes the major types of crimes involving computers and the internet that are of two types: (1) traditional crimes committed using computers and/or the internet; and (2) new crimes created because of the internet. This course will cover crimes in both areas, including the major federal laws that control cybercrime and criminal procedure and how it applies in a cybercrime context. Cybercrimes involving hacking, cyberbullying, bitcoin and the internet of things and law will be included in this course.
In this course, for each of the twelve legal topics and segments, there is a reading assignment, a video lecture followed by a five-question quiz to test your knowledge and comprehension. You will be able to re-watch any video lecture, and retake the quizzes as you would like.
You may never look at your computer the same again.
This lecture includes an overview of cybercrimes and what you can expect in this course.
This lecture introduces all of the cybercrimes, how they will be presented, criminal procedural issues, then emerging technologies and cybercrimes.
This lecture follows the text of the major cybercrime federal statute, 18 USC 1030, and 18 USC 2701(a), including how these statutes have evolved over time with the advances in the internet.
The crimes of mail and wire fraud are applied to developments of the internet, despite the early beginning of mail fraud applying to postal mailings.
The crime of identity theft is an old crime that has a place to grow --- the internet. This lecture examines the federal law that is used to control identity theft.
This lecture covers cybercrimes that have evolved with the opportunities on the internet, like cyberbullying, cyberstalking and child pornography. Some case studies in this lecture also help in understanding the criminal statutes that control these crimes.
This lecture covers the basics of warrants and the constitutional concept of probable cause in relation to computers and cyberspace.
This lecture applies the constitutional concept of protection against search and seizure without probable cause, and shows through cases how this principle is applied in a cybercrime context.
This lecture begins the criminal procedure section of this course, and explores the unique aspects of self-incrimination and computers. First, the basic constitutional concept of the right of protection against self-incrimination is discussed, then the application of that constitutional concept to computers shows why the 5th Amendment protection against self-incrimination is unique, in this context.
This lecture provides an overview of the digital currency, bitcoin, with humor and then explains how this presents unique problems in cybercrime. The case of Silk Road and Ross Ulbricht is examined.
This lecture continues to examine the digital currency, bitcoin, and to look at the Silk Road case and the Ross Ulbricht case in state court.
This lecture examines a new cybercrime of hacking into the internet of things, and taking control of devices that are reliant on the internet to function. This can range from a mild annoyance to a deadly event. See how one federal agency used their regulatory power to try to control a dangerous situation with medical devices and hacking into the internet of things.
Victoria Sutton, MPA, PhD, JD is a distinguished law professor at Texas Tech University School of Law and is author of eight law books and numerous law articles, and winner of several book awards. She is also a filmmaker. She teaches courses in emerging technologies law, nanotechnology law, biosecurity law, space law, environmental law and cybersecurity law. She has also served as an advisor on cybersecurity and biosecurity for government agencies.